WorldWideScience

Sample records for modeling telephone access

  1. COMPUTER AIDED DISTANCE HOUSE AUTOMATION BY TELEPHONE LINE ACCESS

    Directory of Open Access Journals (Sweden)

    İbrahim ÇAYIROĞLU

    2007-03-01

    Full Text Available In this study, control and automation of house instruments have been practiced by using a distance telephone line and a modem. A user can use the buttons of a telephone in distance and he can control the instruments at home. In order to data acquisition from a modem, TAPIEx ActiveX Control 2.6 software has been used. An interface to fulfill the operation provided from the software and controlling the ports has been written. To drive relays from computer output, a relay circuit has been designed. The all instruments at home have been controlled by the relay controlled.

  2. Access to Complex Abortion Care Service and Planning Improved through a Toll-Free Telephone Resource Line

    Directory of Open Access Journals (Sweden)

    Wendy V. Norman

    2014-01-01

    Full Text Available Background. Providing equitable access to the full range of reproductive health services over wide geographic areas presents significant challenges to any health system. We present a review of a service provision model which has provided improved access to abortion care; support for complex issues experienced by women seeking nonjudgmental family planning health services; and a mechanism to collect information on access barriers. The toll-free pregnancy options service (POS of British Columbia Women’s Hospital and Health Centre sought to improve access to services and overcome barriers experienced by women seeking abortion. Methods. We describe the development and implementation of a province-wide toll-free telephone counseling and access facilitation service, including establishment of a provincial network of local abortion service providers in the Canadian province of British Columbia from 1998 to 2010. Results. Over 2000 women annually access service via the POS line, networks of care providers are established and linked to central support, and central program planners receive timely information on new service gaps and access barriers. Conclusion. This novel service has been successful in addressing inequities and access barriers identified as priorities before service establishment. The service provided unanticipated benefits to health care planning and monitoring of provincial health care related service delivery and gaps. This model for low cost health service delivery may realize similar benefits when applied to other health care systems where access and referral barriers exist.

  3. Tracking cellular telephones as an input for developing transport models

    CSIR Research Space (South Africa)

    Cooper, Antony K

    2010-08-01

    Full Text Available of tracking cellular telephones and using the data to populate transport and other models. We report here on one of the pilots, known as DYNATRACK (Dynamic Daily Path Tracking), a larger experiment conducted in 2007 with a more heterogeneous group of commuters...

  4. [A telephone hotline as an easily accessible service for questions on schizophrenia].

    Science.gov (United States)

    Wessling, A; Wölwer, W; Heres, S; Mayenberger, M; Rummel, C; Sievers, M; Wagner, M; Klosterkötter, J; Gaebel, W

    2006-09-01

    Public relations activities of the German Research Network on Schizophrenia (GRNS) have shown that there is a demand for more information about schizophrenia disorder. This confirms international research findings that relatives of schizophrenia patients are particularly in need of information and support. In response, the GRNS has maintained a telephone hotline since 2001. The hotline is manned by clinical experts, psychiatrists, or psychologists once a week. The telephone calls are documented in a systematic manner. From 2001 to 2003, 3,909 calls were registered. This volume exceeds the limit of the hotline's resources. The telephone hotline is mainly used by relatives of psychotic patients. Most questions relate to the symptoms of schizophrenia and pharmaceutical treatment. The need for emotional support is also a high motivational factor for dialing the hotline number. The telephone hotline seems to be a worthwhile addition to the already existing crisis telephones and should be maintained even after public funding of the network expires.

  5. 47 CFR 51.217 - Nondiscriminatory access: Telephone numbers, operator services, directory assistance services...

    Science.gov (United States)

    2010-10-01

    ... be provided in a timely fashion. (iii) Format. A LEC shall provide access to its directory assistance... to allow competing providers full use of these services. (d) Branding of operator services...

  6. Access Nets: Modeling Access to Physical Spaces

    Science.gov (United States)

    Frohardt, Robert; Chang, Bor-Yuh Evan; Sankaranarayanan, Sriram

    Electronic, software-managed mechanisms using, for example, radio-frequency identification (RFID) cards, enable great flexibility in specifying access control policies to physical spaces. For example, access rights may vary based on time of day or could differ in normal versus emergency situations. With such fine-grained control, understanding and reasoning about what a policy permits becomes surprisingly difficult requiring knowledge of permission levels, spatial layout, and time. In this paper, we present a formal modeling framework, called AccessNets, suitable for describing a combination of access permissions, physical spaces, and temporal constraints. Furthermore, we provide evidence that model checking techniques are effective in reasoning about physical access control policies. We describe our results from a tool that uses reachability analysis to validate security policies.

  7. Testing a Model of Functional Impairment in Telephone Crisis Support Workers.

    Science.gov (United States)

    Kitchingman, Taneile A; Wilson, Coralie J; Caputi, Peter; Wilson, Ian; Woodward, Alan

    2016-11-21

    It is well known that helping professionals experience functional impairment related to elevated symptoms of psychological distress as a result of frequent empathic engagement with distressed others. Whether telephone crisis support workers are impacted in a similar way is not currently reported in the literature. The purpose of this study was to test a hypothesized model of factors contributing to functional impairment in telephone crisis support workers. A national sample of 210 telephone crisis support workers completed an online survey including measures of emotion regulation, symptoms of general psychological distress and suicidal ideation, intentions to seek help for symptoms, and functional impairment. Structural equation modeling was used to test the fit of the data to the hypothesized model. Goodness-of-fit indices were adequate and supported the interactive effects of emotion regulation, general psychological distress, suicidal ideation, and intentions to seek help for ideation on functional impairment. These results warrant the deliberate management of telephone crisis support workers' impairment through service selection, training, supervision, and professional development strategies. Future research replicating and extending this model will further inform the modification and/or development of strategies to optimize telephone crisis support workers' well-being and delivery of support to callers.

  8. Semantic Model for Voice Controlled Telephone Dialing and Inquiry Systems

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    A new scheme is presented to detect a large number of keywords in voice controlled switchboard tasks. The new scheme is based on two stages. In the first stage, N-best syllable candidates with their corresponding acoustic scores are generated by an acoustic recognizer. In the second stage, a semantic model based parser is applied to determine the optimum keywords by searching through the lattice of N-best candidates. The experimental results show that when the spoken input deviates from the predefined syntactic constraints, the parser can also demonstrate high performance. For comparison purposes, the most common way to incorporate the syntactic knowledge of the task directly into the acoustic recognizer in the form of a finite state network is also investigated. Furthermore, to address the sparse-data problems, out-of-domain data in the form of newspaper text are used to obtain a more robust combined semantic model. The experiments show that the combined semantic model can improve the keywords detection rate from 90.07% to 92.91% when 80 ungrammatical sentences which do not conform to the task grammar are used as testing material.

  9. Telephone Service

    CERN Multimedia

    2005-01-01

    As part of the upgrade of telephone services, the CERN exchange switches will be updated on Thursday 2 June between 7.00 p.m. and midnight. Telephone services may be affected and possibly even disrupted during this operation. 

  10. Textual information access statistical models

    CERN Document Server

    Gaussier, Eric

    2013-01-01

    This book presents statistical models that have recently been developed within several research communities to access information contained in text collections. The problems considered are linked to applications aiming at facilitating information access:- information extraction and retrieval;- text classification and clustering;- opinion mining;- comprehension aids (automatic summarization, machine translation, visualization).In order to give the reader as complete a description as possible, the focus is placed on the probability models used in the applications

  11. Officer Accessions Flow Model

    Science.gov (United States)

    2011-07-31

    18]) General Charles Campbell noted that , although…. “the Army has a system for organizing, staffing, equipping, training, deploying, sustaining...Harrell, Charles , Ghosh, Biman K., & Bowden Jr.,Royce O. 2004. Simulation Using ProModel. Second edition. McGraw Hill, New York. [22] Klimas, J...RUNS: A Senior Leader Reference Handbook. U.S. Army War College, Carlisle, PA. [24] McNeill , Dan K. 2005 (August). Army Force Generation

  12. Performance Evaluation of Different QoS Models for Connecting Telephone Exchange Centers over Metro Ethernet Networks

    Directory of Open Access Journals (Sweden)

    Ghasem Mirjalily

    2009-12-01

    Full Text Available Recent large deployment of high-speed metro Ethernet networks creates opportunity to connect legacy telephone exchange centers and cellular telephone base stations to the core telephony network. The success of data and legacy voice services convergence shall depend on whether it can provide the customer with the required QoS or not. Packet-base telephony service requires stringent bounds on end-to-end packet delay, jitter, and loss. New protocols such as MPLS and Diffserv are realized due to the major advantages associated with them such as QoS. This paper studies the performance of connecting telephone exchange centers over a metro Ethernet network using MPLS and DiffServ QoS model. We will implement some simulations to evaluate the performance in terms of delay, jitter and loss.

  13. 47 CFR 15.214 - Cordless telephones.

    Science.gov (United States)

    2010-10-01

    ... is intended to be connected to the public switched telephone network shall also comply with the... protection against unintentional access to the public switched telephone network by the base unit and... network or ringing of the handset is preceded by the transmission of a code word. Access to the...

  14. Ethics and the Provision of Telephone Consultation Services by Psychologists.

    Science.gov (United States)

    Nagy, Thomas F.

    With increasing frequency, psychological services are made available to the consumer via the telephone or computer/telephone link. Historically, information services by telephone have been offered consumers on a variety of subjects when psychopathology is minimal. Immediacy, accessibility, minimal psychological investment, telephone ubiquity,…

  15. Managing Delegation in Access Control Models

    CERN Document Server

    Ghorbel-Talbi, Meriam Ben; Cuppens-Boulahia, Nora; Bouhoula, Adel; 10.1109/ADCOM.2007.105

    2010-01-01

    In the field of access control, delegation is an important aspect that is considered as a part of the administration mechanism. Thus, a complete access control must provide a flexible administration model to manage delegation. Unfortunately, to our best knowledge, there is no complete model for describing all delegation requirements for role-based access control. Therefore, proposed models are often extended to consider new delegation characteristics, which is a complex task to manage and necessitate the redefinition of these models. In this paper we describe a new delegation approach for extended role-based access control models. We show that our approach is flexible and is sufficient to manage all delegation requirements.

  16. Telephone-Based Coaching.

    Science.gov (United States)

    Boccio, Mindy; Sanna, Rashel S; Adams, Sara R; Goler, Nancy C; Brown, Susan D; Neugebauer, Romain S; Ferrara, Assiamira; Wiley, Deanne M; Bellamy, David J; Schmittdiel, Julie A

    2017-03-01

    Many Americans continue to smoke, increasing their risk of disease and premature death. Both telephone-based counseling and in-person tobacco cessation classes may improve access for smokers seeking convenient support to quit. Little research has assessed whether such programs are effective in real-world clinical populations. Retrospective cohort study comparing wellness coaching participants with two groups of controls. Kaiser Permanente Northern California, a large integrated health care delivery system. Two hundred forty-one patients who participated in telephonic tobacco cessation coaching from January 1, 2011, to March 31, 2012, and two control groups: propensity-score-matched controls, and controls who participated in a tobacco cessation class during the same period. Wellness coaching participants received an average of two motivational interviewing-based coaching sessions that engaged the patient, evoked their reason to consider quitting, and helped them establish a quit plan. Self-reported quitting of tobacco and fills of tobacco cessation medications within 12 months of follow-up. Logistic regressions adjusting for age, gender, race/ethnicity, and primary language. After adjusting for confounders, tobacco quit rates were higher among coaching participants vs. matched controls (31% vs. 23%, p Coaching participants and class attendees filled tobacco-cessation prescriptions at a higher rate (47% for both) than matched controls (6%, p coaching was as effective as in-person classes and was associated with higher rates of quitting compared to no treatment. The telephonic modality may increase convenience and scalability for health care systems looking to reduce tobacco use and improve health.

  17. Comparing Models of Helper Behavior to Actual Practice in Telephone Crisis Intervention: A Silent Monitoring Study of Calls to the U.S. 1-800-SUICIDE Network

    Science.gov (United States)

    Mishara, Brian L.; Chagnon, Francois; Daigle, Marc; Balan, Bogdan; Raymond, Sylvaine; Marcoux, Isabelle; Bardon, Cecile; Campbell, Julie K.; Berman, Alan

    2007-01-01

    Models of telephone crisis intervention in suicide prevention and best practices were developed from a literature review and surveys of crisis centers. We monitored 2,611 calls to 14 centers using reliable behavioral ratings to compare actual interventions with the models. Active listening and collaborative problem-solving models describe help…

  18. Telephone Exchange Maintenance

    CERN Multimedia

    2005-01-01

    Urgent maintenance work on CERN telephone exchanges will be performed on 24 March from 6 a.m. to 8 a.m. Telephone services may be disrupted or even interrupted during this time. For more details, please contact us by email at Standard.Telephone@cern.ch.

  19. 28 CFR 35.162 - Telephone emergency services.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Telephone emergency services. 35.162... IN STATE AND LOCAL GOVERNMENT SERVICES Communications § 35.162 Telephone emergency services. Telephone emergency services, including 911 services, shall provide direct access to individuals who use...

  20. Telephone Networks Connect Caregiving Families of Alzheimer's Victims.

    Science.gov (United States)

    Goodman, Catherine Chase; Pynoos, Jon

    1988-01-01

    Describes telephone network bringing family caregivers of Alzheimer's victims together over telephone in rotating pattern of twosomes. Explains how five caregiving spouses and five adult children were matched and connected over three months. Describes program's 25 telephone-accessed audiotapes that guided networks and provided information on…

  1. Atom-Role-Based Access Control Model

    Science.gov (United States)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  2. A PROPOSAL FORECASTING MODEL FOR THE GROWTH OF THE MOBILE TELEPHONE MARKET IN BRAZIL

    Directory of Open Access Journals (Sweden)

    Luís Fernando Ascenção Guedes

    2009-10-01

    Full Text Available The element that characterizes the information era is the key role of communication and connectivity, broadly speaking, in social life. Among the ways in which users can enter voice or data networks, one of the most prominent is mobile telephony.Therefore, determining the number of mobile phones in operation in Brazil over the next few years is a relevant issue for the strategic planning of firms in this sector. Thus, this article aims to define a mathematical model suitable for calculating the number of mobile phones in operation in Brazil in forthcoming years, as a function of the behavior of the following variables during the course of time: GDP per capita, population and percentage GDP growth.To this end, a quantitative study was conducted, based on secondary data taken from preceding survey; then a linear and polynomial regression was employed to correlate GDP per capita with mobile phone density. The results showed high correlation (97.5% between phone density and Brazil’s GDP growth from 2004 to 2007. This correlation is also high in Russia, India and China.Moreover, we found that the limiting value of good correlation between GDP per capita and mobile phone density is roughly US$20,000.00 and that the limit of mobile telephony penetration is approximately 120%. Thus, taking into account several economic growth rates, we estimate that the penetration of mobile telephony will take 5 to 11 years to reach its upper limit in Brazil.Key words: Mobile telephony. Prediction model. Telecommunications.

  3. Telephoning in English

    CERN Document Server

    Naterop, B Jean

    1994-01-01

    Many people have to use English on the telephone in the course of their work, either at the level of taking a simple message or involving more complex tasks such as requesting information. Telephoning in English provides an up-to-date and relevant context in which students from lower-intermediate level upwards can develop practical telephone skills. The course principally develops spoken interactive skills, but also includes reading material on telephone systems and techniques. As the material is not restricted to particular job functions, it is suitable for students in a wide range of business and administration fields.

  4. Capabilities and accessibility: a model for progress

    Directory of Open Access Journals (Sweden)

    Nick Tyler

    2011-11-01

    Full Text Available Accessibility is seen to be a core issue which relates directly to the quality of life: if a person cannot reach and use a facility then they cannot take advantage of the benefits that the facility is seeking to provide. In some cases this is about being able to take part in an activity for enjoyment, but in some it is a question of the exercise of human rights – access to healthcare, education, voting and other citizens’ rights. This paper argues that such an equitable accessibility approach requires understanding of the relationships between the capabilities that a person has and the capabilities required of them by society in order to achieve the accessibility they seek. The Capabilities Model, which has been developed at UCL is an attempt to understand this relationship and the paper sets out an approach to quantifying the capabilities in a way that allows designers and implementers of environmental construction and operation to have a more robust approach to their decisions about providing accessibility.

  5. Upgrade of telephone exchange

    CERN Multimedia

    2006-01-01

    As part of the upgrade of telephone services, work will be carried out on the CERN switching centre between Monday 23 October 8.00 p.m. and Tuesday 24 October 2.00 a.m. Telephone services may be disrupted and possibly even interrupted during this operation. We apologise in advance for any inconvenience this may cause. CERN TELECOM Service

  6. Update of telephone exchange

    CERN Multimedia

    2006-01-01

    As part of the upgrade of telephone services, the CERN switching centre will be updated on between Monday 23 October 8.00 p.m. and Tuesday 24 October 2.00 a.m. Telephone services may be disrupted and possibly even interrupted during this operation. We apologise in advance for any inconvenience this may cause. CERN TELECOM Service

  7. Update of telephone exchange

    CERN Multimedia

    2006-01-01

    As part of the upgrade of telephone services, the CERN switching centre will be updated on Monday 3 July between 8.00 p.m. and 3.00 a.m. Telephone services may be disrupted and possibly even interrupted during this operation. We apologise in advance for any inconvenience this may cause. CERN TELECOM Service

  8. Update of telephone exchange

    CERN Multimedia

    2006-01-01

    As part of the upgrade of telephone services, the CERN switching centre will be updated on Wednesday 14 June between 8.00 p.m. and midnight. Telephone services may be disrupted and possibly even interrupted during this operation. We apologise in advance for any inconvenience this may cause. CERN TELECOM Service

  9. Update of telephone exchange

    CERN Multimedia

    2006-01-01

    As part of the upgrade of telephone services, the CERN switching centre will be updated on Monday 3 July between 8.00 p.m. and 3.00 a.m. Telephone services may be disrupted and possibly even interrupted during this operation.We apologise in advance for any inconvenience this may cause. CERN TELECOM Service

  10. A service-oriented data access control model

    Science.gov (United States)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  11. Metrics and Evaluation Models for Accessible Television

    DEFF Research Database (Denmark)

    Li, Dongxiao; Looms, Peter Olaf

    2014-01-01

    The adoption of the UN Convention on the Rights of Persons with Disabilities (UN CRPD) in 2006 has provided a global framework for work on accessibility, including information and communication technologies and audiovisual content. One of the challenges facing the application of the UN CRPD is te...... and evaluation models for access service provision, the paper identifies options that could facilitate the evaluation of UN CRPD outcomes and suggests priorities for future research in this area....... number of platforms on which audiovisual content needs to be distributed, requiring very clear multiplatform architectures to facilitate interworking and assure interoperability. As a consequence, the regular evaluations of progress being made by signatories to the UN CRPD protocol are difficult...

  12. VT Telephone Exchange Boundaries

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) The UtilityTelecom_EXCHANGE represents Vermont Telephone Exchange boundaries as defined by the VT Public Service Board. The original data was...

  13. Large Pelagics Telephone Survey

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Large Pelagics Telephone Survey (LPTS) collects fishing effort information directly from captains holding Highly Migratory Species (HMS) permits (required by...

  14. Thermal Index Evaluation of Local SAR in MRI-Based Head Models of Adult and Children for Portable Telephones

    Science.gov (United States)

    Fujiwara, Osamu; Miyamoto, Kayoko; Wang, Jianqing

    Biological hazards due to radio-frequency (RF) waves result mainly from the temperature rise in tissue. It should be, therefore, clarified to what extent the RF waves of portable telephones increase the temperature-rise in human brain that includes the central part governing the body-temperature regulation function. In this paper, we calculated both the specific absorption rate (SAR) and the resultant temperature-rise for 900 MHz and 2 GHz portable telephones using the finite-difference time-domain (FDTD) method for three typical use positions, i.e., the vertical position, cheek position and tilt position. As a result, we found that there was an increase for median and 1% value of the cumulative distribution of temperature-rise in children’s brains for any use positions of the portable telephones compared to that in the adult’s brain, and also that the increasing trend in children’s brains for temperature-rise is identical to the temperature-rise trend in children’s hypothalamus. In addition, we found that the ten-gram averaged peak SAR among the adult and children heads had the same trend as that of the 0.1% value of the relatively cumulative distribution of temperature-rise, which shows that the ten-gram averaged peak SAR reflects only the localized temperature-rise in the brain surface.

  15. Perti Net-Based Workflow Access Control Model

    Institute of Scientific and Technical Information of China (English)

    陈卓; 骆婷; 石磊; 洪帆

    2004-01-01

    Access control is an important protection mechanism for information systems. This paper shows how to make access control in workflow system. We give a workflow access control model (WACM) based on several current access control models. The model supports roles assignment and dynamic authorization. The paper defines the workflow using Petri net. It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM). Finally, an example of an e-commerce workflow access control model is discussed in detail.

  16. The cost-effectiveness of hospital-based telephone coaching for people with type 2 diabetes: a 10 year modelling analysis.

    Science.gov (United States)

    Varney, J E; Liew, D; Weiland, T J; Inder, W J; Jelinek, G A

    2016-09-27

    Type 2 diabetes (T2DM) is a burdensome condition for individuals to live with and an increasingly costly condition for health services to treat. Cost-effective treatment strategies are required to delay the onset and slow the progression of diabetes related complications. The Diabetes Telephone Coaching Study (DTCS) demonstrated that telephone coaching is an intervention that may improve the risk factor status and diabetes management practices of people with T2DM. Measuring the cost effectiveness of this intervention is important to inform funding decisions that may facilitate the translation of this research into clinical practice. The purpose of this study is to assess the cost-effectiveness of telephone coaching, compared to usual diabetes care, in participants with poorly controlled T2DM. A cost utility analysis was undertaken using the United Kingdom Prospective Diabetes Study (UKPDS) Outcomes Model to extrapolate outcomes collected at 6 months in the DTCS over a 10 year time horizon. The intervention's impact on life expectancy, quality-adjusted life expectancy (QALE) and costs was estimated. Costs were reported from a health system perspective. A 5 % discount rate was applied to all future costs and effects. One-way sensitivity analyses were conducted to reflect uncertainty surrounding key input parameters. The intervention dominated the control condition in the base-case analysis, contributing to cost savings of $3327 per participant, along with non-significant improvements in QALE (0.2 QALE) and life expectancy (0.3 years). The cost of delivering the telephone coaching intervention continuously, for 10 years, was fully recovered through cost savings and a trend towards net health benefits. Findings of cost savings and net health benefits are rare and should prove attractive to decision makers who will determine whether this intervention is implemented into clinical practice. ACTRN12609000075280.

  17. Attributes Enhanced Role-Based Access Control Model

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    as an important area of research. In this paper, we propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that not only takes contextual information into account while making the access control...

  18. Identifying the core competencies of mental health telephone triage.

    Science.gov (United States)

    Sands, Natisha; Elsom, Stephen; Gerdtz, Marie; Henderson, Kathryn; Keppich-Arnold, Sandra; Droste, Nicolas; Prematunga, Roshani K; Wereta, Zewdu W

    2013-11-01

    The primary aim of this study was to identify the core competencies of mental health telephone triage, including key role tasks, skills, knowledge and responsibilities, in which clinicians are required to be competent to perform safe and effective triage. Recent global trends indicate an increased reliance on telephone-based health services to facilitate access to health care across large populations. The trend towards telephone-based health services has also extended to mental health settings, evidenced by the growing number of mental health telephone triage services providing 24-hour access to specialist mental health assessment and treatment. Mental health telephone triage services are critical to the early identification of mental health problems and the provision of timely, appropriate interventions. In spite of the rapid growth in mental health telephone triage and the important role these services play in the assessment and management of mental illness and related risks, there has been very little research investigating this area of practice. An observational design was employed to address the research aims. Structured observations (using dual wireless headphones) were undertaken on 197 occasions of mental health telephone triage over a three-month period from January to March 2011. The research identified seven core areas of mental health telephone triage practice in which clinicians are required to be competent in to perform effective mental health telephone triage, including opening the call; performing mental status examination; risk assessment; planning and action; termination of call; referral and reporting; and documentation. The findings of this research contribute to the evidence base for mental health telephone triage by articulating the core competencies for practice. The mental health telephone triage competencies identified in this research may be used to define an evidence-based framework for mental health telephone triage practice that aims to

  19. Critics voice concerns about counseling by telephone.

    Science.gov (United States)

    1996-05-31

    A key issue in the debate over the Confide HIV-antibody home test kit is whether face-to-face counseling about HIV is necessary. The Confide kit, developed by Direct Access Diagnostics, includes written materials for pre-test counseling written by former U.S. Surgeon General C. Everett Koop. Telephone counselors have been trained in consultation with the American Social Health Association and Cicatelli Associations, which trains for the New York State Health Department. Currently, 17 percent of Americans who undergo HIV-antibody testing get the results by telephone, according to 1992 data from the National Health Interview Survey. The AIDS Foundation Houston feels telephone counseling is not sufficient. Additionally, the National Association of People with AIDS (NAPWA) is concerned that callers who hear the recorded message announcing they tested negative will hang up the telephone without listening to additional information about how to take precautions to remain uninfected. Anna Forbes, an AIDS policy consultant, points out that Confide's counseling method also makes it harder to emphasize the fact that a negative test result does not necessarily mean the person is uninfected. Currently, Direct Access Diagnostics is the only company offering HIV-antibody home test kits. At least two other companies are awaiting approval from the Food and Drug Administration (FDA) to begin marketing of a home test kit over the counter: ChemTrak, based in Sunnyvale, CA, and Home Access, based in Chicago.

  20. GIS model to evaluate the accessibility to major transport ways

    Directory of Open Access Journals (Sweden)

    Antonio Tache

    2015-03-01

    Full Text Available In order to ensure a balanced accessibility to major transport ways, supporting spatial development and economic growth, a GIS model to assess accessibility it was proposed. The model is measuring the average cost of travel (by car, usually from a point to a predetermined number of destinations measured in units of time (minutes. Using the ARCGIS Spatial Analyst module, accessibility territorial indicators were calculated and presented as cartograms and maps that are outlining the accessibility to major transportation routes and to major cities. The proposed model to assess accessibility was tested for Tulcea county (NUTS III level and for the South East region (NUTS II level.

  1. The shape of telephone cord blisters

    Science.gov (United States)

    Ni, Yong; Yu, Senjiang; Jiang, Hongyuan; He, Linghui

    2017-01-01

    Formation of telephone cord blisters as a result of buckling delamination is widely observed in many compressed film-substrate systems. Here we report a universal morphological feature of such blisters characterized by their sequential sectional profiles exhibiting a butterfly shape using atomic force microscopy. Two kinds of buckle morphologies, light and heavy telephone cord blisters, are observed and differentiated by measurable geometrical parameters. Based on the Föppl-von Kármán plate theory, the observed three-dimensional features of the telephone cord blister are predicted by the proposed approximate analytical model and simulation. The latter further replicates growth and coalescence of the telephone cord into complex buckling delamination patterns observed in the experiment.

  2. A Telephone Call

    Institute of Scientific and Technical Information of China (English)

    王晓兰

    2004-01-01

    At about two o'clock on a cold winter morning, a doctor drove seven miles in answer to a telephone call. On his coming the man who had called him in said, “Doctor, I don't have a sore throat, I don't cough.I have no pain either in the side or in the back, I'm not running a temperature, but still I feel that death is near.”

  3. Eight channel telephone telemetry system

    Science.gov (United States)

    Smith, R. E.

    1973-01-01

    A portable, indirectly coupled telephone system is reported which transmits/to a central receiving site eight channels of EEG data of sufficient fidelity for screening and/or limited diagnostic use. The system requires no electrical connection to the telephone at the transmitter or at the receiver and is compatible with common EEG recording practice for real-time recording. It accepts 8 input channels simultaneously with one telephone transmitter and one telephone receiver operates from standard power sources.

  4. Assessing Adult Literacy by Telephone.

    Science.gov (United States)

    Sticht, Thomas G.; Hofstetter, C. Richard; Hofstetter, Carolyn H.

    1996-01-01

    Examines the construct and action validity of the use of simple checklists to assess the declarative knowledge component of adult's literacy by telephone. Finds significant relationships among knowledge when assessed either by listening (telephone) or by reading (mailed questionnaire) modality. Concludes that the telephone method may provide a…

  5. A Formal Semantic Model for the Access Specification Language RASP

    Directory of Open Access Journals (Sweden)

    Mark Evered

    2015-05-01

    Full Text Available The access specification language RASP extends traditional role-based access control (RBAC concepts to provide greater expressive power often required for fine-grained access control in sensitive information systems. Existing formal models of RBAC are not sufficient to describe these extensions. In this paper, we define a new model for RBAC which formalizes the RASP concepts of controlled role appointment and transitions, object attributes analogous to subject roles and a transitive role/attribute derivation relationship.

  6. CONFUSION WITH TELEPHONE NUMBERS

    CERN Document Server

    Telecom Service

    2002-01-01

    he area code is now required for all telephone calls within Switzerland. Unfortunately this is causing some confusion. CERN has received complaints that incoming calls intended for CERN mobile phones are being directed to private subscribers. This is caused by mistakenly dialing the WRONG code (e.g. 022) in front of the mobile number. In order to avoid these problems, please inform your correspondents that the correct numbers are: 079 201 XXXX from Switzerland; 0041 79 201 XXXX from other countries. Telecom Service

  7. CONFUSION WITH TELEPHONE NUMBERS

    CERN Document Server

    Telecom Service

    2002-01-01

    The area code is now required for all telephone calls within Switzerland. Unfortunately this is causing some confusion. CERN has received complaints that incoming calls intended for CERN mobile phones are being directed to private subscribers. This is caused by mistakenly dialing the WRONG code (e.g. 022) in front of the mobile number. In order to avoid these problems, please inform your correspondents that the correct numbers are: 079 201 XXXX from Switzerland; 0041 79 201 XXXX from other countries. Telecom Service  

  8. A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.

    Science.gov (United States)

    Gope, Prosanta; Amin, Ruhul

    2016-11-01

    Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.

  9. Task Delegation Based Access Control Models for Workflow Systems

    Science.gov (United States)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  10. Regression-Based Norms for a Bi-factor Model for Scoring the Brief Test of Adult Cognition by Telephone (BTACT).

    Science.gov (United States)

    Gurnani, Ashita S; John, Samantha E; Gavett, Brandon E

    2015-05-01

    The current study developed regression-based normative adjustments for a bi-factor model of the The Brief Test of Adult Cognition by Telephone (BTACT). Archival data from the Midlife Development in the United States-II Cognitive Project were used to develop eight separate linear regression models that predicted bi-factor BTACT scores, accounting for age, education, gender, and occupation-alone and in various combinations. All regression models provided statistically significant fit to the data. A three-predictor regression model fit best and accounted for 32.8% of the variance in the global bi-factor BTACT score. The fit of the regression models was not improved by gender. Eight different regression models are presented to allow the user flexibility in applying demographic corrections to the bi-factor BTACT scores. Occupation corrections, while not widely used, may provide useful demographic adjustments for adult populations or for those individuals who have attained an occupational status not commensurate with expected educational attainment. © The Author 2015. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  11. Regression-Based Norms for a Bi-factor Model for Scoring the Brief Test of Adult Cognition by Telephone (BTACT)

    Science.gov (United States)

    Gurnani, Ashita S.; John, Samantha E.; Gavett, Brandon E.

    2015-01-01

    The current study developed regression-based normative adjustments for a bi-factor model of the The Brief Test of Adult Cognition by Telephone (BTACT). Archival data from the Midlife Development in the United States-II Cognitive Project were used to develop eight separate linear regression models that predicted bi-factor BTACT scores, accounting for age, education, gender, and occupation-alone and in various combinations. All regression models provided statistically significant fit to the data. A three-predictor regression model fit best and accounted for 32.8% of the variance in the global bi-factor BTACT score. The fit of the regression models was not improved by gender. Eight different regression models are presented to allow the user flexibility in applying demographic corrections to the bi-factor BTACT scores. Occupation corrections, while not widely used, may provide useful demographic adjustments for adult populations or for those individuals who have attained an occupational status not commensurate with expected educational attainment. PMID:25724515

  12. "Open Access" Requires Clarification: Medical Journal Publication Models Evolve.

    Science.gov (United States)

    Lubowitz, James H; Brand, Jefferson C; Rossi, Michael J; Provencher, Matthew T

    2017-03-01

    While Arthroscopy journal is a traditional subscription model journal, our companion journal Arthroscopy Techniques is "open access." We used to believe open access simply meant online and free of charge. However, while open-access journals are free to readers, in 2017 authors must make a greater sacrifice in the form of an article-processing charge (APC). Again, while this does not apply to Arthroscopy, the APC will apply to Arthroscopy Techniques.

  13. Mandarin recognition over the telephone

    Science.gov (United States)

    Kao, Yuhung

    1996-06-01

    Mandarin Chinese is the official language in China and Taiwan, it is the native language of a quarter of the world population. As the services enabled by speech recognition technology (e.g. telephone voice dialing, information query) become more popular in English, we would like to extend this capability to other languages. Mandarin is one of the major languages under research in our laboratory. This paper describes how we extend our work in English speech recognition into Mandarin. We will described the corpus: Voice Across Taiwan, the training of a complete set of Mandarin syllable models, preliminary performance results and error analysis. A fast prototyping system was built, where a user can write any context free grammar with no restriction of vocabulary, then the grammar can be compiled into recognition models. It enables user to quickly test the performance of a new vocabulary.

  14. A Model of Workflow-oriented Attributed Based Access Control

    Directory of Open Access Journals (Sweden)

    Guoping Zhang

    2011-02-01

    Full Text Available the emergence of “Internet of Things” breaks previous traditional thinking, which integrates physical infrastructure and network infrastructure into unified infrastructure. There will be a lot of resources or information in IoT, so computing and processing of information is the core supporting of IoT. In this paper, we introduce “Service-Oriented Computing” to solve the problem where each device can offer its functionality as standard services. Here we mainly discuss the access control issue of service-oriented computing in Internet of Things. This paper puts forward a model of Workflow-oriented Attributed Based Access Control (WABAC, and design an access control framework based on WABAC model. The model grants permissions to subjects according to subject atttribute, resource attribute, environment attribute and current task, meeting access control request of SOC. Using the approach presented can effectively enhance the access control security for SOC applications, and prevent the abuse of subject permissions.

  15. Germany: US open access - is it a model for Europe

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    1991-02-01

    A report commissioned by Ruhrgas on the US open access gas pipeline transportation is discussed, and the finding that a large number of problems still remain unresolved in the US gas industry is outlined. The conclusion that the EC would be ill advised to pursue US open access gas transportation policies as a model for Europe is considered. (U.K.).

  16. Review on Telephone Conversations Analysis

    Institute of Scientific and Technical Information of China (English)

    张咏梅

    2014-01-01

    Telephone conversation, one of the most common uses of human communication, has been a hot topic in linguistic field in modern times. This essay aims at reviewing the main theories and findings in telephone conversation analysis and provid-ing some insights of this aspect which can often be overlooked in our daily life. It is also hoped that this essay can help to pave a foundation for further in-depth study in telephone conversations.

  17. Enhancing Access to Scientific Models through Standard Web Services Project

    Data.gov (United States)

    National Aeronautics and Space Administration — We propose to investigate the feasibility and value of the "Software as a Service" paradigm in facilitating access to Earth Science numerical models. We...

  18. Recommendations concerning energy information model documentation, public access, and evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Wood, D.O.; Mason, M.J.

    1979-10-01

    A review is presented of the Energy Information Administration (EIA) response to Congressional and management concerns, relating specifically to energy information system documentation, public access to EIA systems, and scientific/peer evaluation. The relevant organizational and policy responses of EIA are discussed. An analysis of the model development process and approaches to, and organization of, model evaluation is presented. Included is a survey of model evaluation studies. A more detailed analysis of the origins of the legislated documentation and public access requirements is presented in Appendix A, and the results of an informal survey of other agency approaches to public access and evaluation is presented in Appendix B. Appendix C provides a survey of non-EIA activities relating to model documentation and evaluation. Twelve recommendations to improve EIA's procedures for energy information system documentation, evaluation activities, and public access are determined. These are discussed in detail. (MCW)

  19. Modeling spatial accessibility to parks: a national study

    Directory of Open Access Journals (Sweden)

    Lu Hua

    2011-05-01

    Full Text Available Abstract Background Parks provide ideal open spaces for leisure-time physical activity and important venues to promote physical activity. The spatial configuration of parks, the number of parks and their spatial distribution across neighborhood areas or local regions, represents the basic park access potential for their residential populations. A new measure of spatial access to parks, population-weighted distance (PWD to parks, combines the advantages of current park access approaches and incorporates the information processing theory and probability access surface model to more accurately quantify residential population's potential spatial access to parks. Results The PWD was constructed at the basic level of US census geography - blocks - using US park and population data. This new measure of population park accessibility was aggregated to census tract, county, state and national levels. On average, US residential populations are expected to travel 6.7 miles to access their local neighborhood parks. There are significant differences in the PWD to local parks among states. The District of Columbia and Connecticut have the best access to local neighborhood parks with PWD of 0.6 miles and 1.8 miles, respectively. Alaska, Montana, and Wyoming have the largest PWDs of 62.0, 37.4, and 32.8 miles, respectively. Rural states in the western and Midwestern US have lower neighborhood park access, while urban states have relatively higher park access. Conclusions The PWD to parks provides a consistent platform for evaluating spatial equity of park access and linking with population health outcomes. It could be an informative evaluation tool for health professionals and policy makers. This new method could be applied to quantify geographic accessibility of other types of services or destinations, such as food, alcohol, and tobacco outlets.

  20. VHDL simulation with access to transistor models

    Science.gov (United States)

    Gibson, J.

    1991-01-01

    Hardware description languages such as VHDL have evolved to aid in the design of systems with large numbers of elements and a wide range of electronic and logical abstractions. For high performance circuits, behavioral models may not be able to efficiently include enough detail to give designers confidence in a simulation's accuracy. One option is to provide a link between the VHDL environment and a transistor level simulation environment. The coupling of the Vantage Analysis Systems VHDL simulator and the NOVA simulator provides the combination of VHDL modeling and transistor modeling.

  1. Modeling Access Control Policy of a Social Network

    Directory of Open Access Journals (Sweden)

    Chaimaa Belbergui

    2016-06-01

    Full Text Available Social networks bring together users in a virtual platform and offer them the ability to share -within the Community- personal and professional information’s, photos, etc. which are sometimes sensitive. Although, the majority of these networks provide access control mechanisms to their users (to manage who accesses to which information, privacy settings are limited and do not respond to all users' needs. Hence, the published information remain all vulnerable to illegal access. In this paper, the access control policy of the social network "Facebook" is analyzed in a profound way by starting with its modeling with "Organization Role Based Access Control" model, and moving to the simulation of the policy with an appropriate simulator to test the coherence aspect, and ending with a discussion of analysis results which shows the gap between access control management options offered by Facebook and the real requirements of users in the same context. Extracted conclusions prove the need of developing a new access control model that meets most of these requirements, which will be the subject of a forthcoming work.

  2. Bring Your Own Device - Providing Reliable Model of Data Access

    Directory of Open Access Journals (Sweden)

    Stąpór Paweł

    2016-10-01

    Full Text Available The article presents a model of Bring Your Own Device (BYOD as a model network, which provides the user reliable access to network resources. BYOD is a model dynamically developing, which can be applied in many areas. Research network has been launched in order to carry out the test, in which as a service of BYOD model Work Folders service was used. This service allows the user to synchronize files between the device and the server. An access to the network is completed through the wireless communication by the 802.11n standard. Obtained results are shown and analyzed in this article.

  3. A telephone intervention for dementia caregivers: background, design, and baseline characteristics.

    Science.gov (United States)

    Tremont, Geoffrey; Davis, Jennifer; Papandonatos, George D; Grover, Christine; Ott, Brian R; Fortinsky, Richard H; Gozalo, Pedro; Bishop, Duane S

    2013-11-01

    Family caregivers of individuals with dementia are at heightened risk for emotional and mental health problems. Many caregivers do not seek assistance or become isolated in their caregiving role. Multi-component interventions have demonstrated efficacy for reducing emotional distress and burden, although these approaches are potentially costly and are not widely accessible. In response to these issues, we developed the Family Intervention: Telephone Tracking - Caregiver (FITT-C), which is an entirely telephone-based psychosocial intervention. The purpose of this paper is to describe the study design, methodology, and baseline data for the trial. This study uses a randomized controlled trial design to examine the efficacy of the FITT-C to reduce depressive symptoms and burden in distressed dementia caregivers. All participants (n=250) received a packet of educational materials and were randomly assigned to receive 6 months of the FITT-C intervention or non-directive telephone support. The FITT-C intervention was designed to reduce distress in caregivers and is based on the McMaster Model of Family Functioning, transition theory, and Lazarus and Folkman's Stress and Coping Models. The primary dependent variables were depressive symptoms (Centers for Epidemiological Studies - Depression) and burden (Zarit Burden Interview, Revised Memory and Behavior Problems Checklist - Reaction). Secondary outcome measures included family functioning, self-efficacy, and health-related quality of life. Results of the study will provide important data about the efficacy of a telephone-based approach to reduce distress in dementia caregivers.

  4. User Modeling Combining Access Logs, Page Content and Semantics

    CERN Document Server

    Fortuna, Blaz; Grobelnik, Marko

    2011-01-01

    The paper proposes an approach to modeling users of large Web sites based on combining different data sources: access logs and content of the accessed pages are combined with semantic information about the Web pages, the users and the accesses of the users to the Web site. The assumption is that we are dealing with a large Web site providing content to a large number of users accessing the site. The proposed approach represents each user by a set of features derived from the different data sources, where some feature values may be missing for some users. It further enables user modeling based on the provided characteristics of the targeted user subset. The approach is evaluated on real-world data where we compare performance of the automatic assignment of a user to a predefined user segment when different data sources are used to represent the users.

  5. A Unified Access Model for Interconnecting Heterogeneous Wireless Networks

    Science.gov (United States)

    2015-05-01

    with each other via a central controller. The 2 access technologies used were 802.11 ( WiFi ) and a Carrier-Sense Multiple Access (CSMA) protocol ...wireless subnets could communicate with each other. 3. Results and Discussion Using the 3-VM LTE/ WiFi configuration, we placed a User Datagram Protocol ...control plane protocols . A network model that can abstract disparate MAC layers in heterogeneous networks and interconnect them using a unified and

  6. An Access Path Model for Physical Database Design.

    Science.gov (United States)

    1979-12-28

    target system. 4.1 Algebraic Structure for Physical Design For the purposes of implementation-oriented design, we shall use the logical access paths...subsection, we present an algorithm for gen- erating a maximal labelling that specifies superior support for the access paths most heavily travelled. Assume...A.C.M. SIGMOD Conf., (May 79). [CARD731 Cardenas , A. F., "Evaluation and Selection of File Organization - A Model and a System," Comm. A.C.M., V 16, N

  7. Speech Communication and Telephone Networks

    Science.gov (United States)

    Gierlich, H. W.

    Speech communication over telephone networks has one major constraint: The communication has to be “real time”. The basic principle since the beginning of all telephone networks has been to provide a communication system capable of substituting the air path between two persons having a conversation at 1-m distance. This is the so-called orthotelephonic reference position [7]. Although many technical compromises must be made to enable worldwide communication over telephone networks, it is still the goal to achieve speech quality performance which is close to this reference.

  8. Review of Access Control Models for Cloud Computing

    Directory of Open Access Journals (Sweden)

    Natarajan Meghanathan

    2013-05-01

    Full Text Available The relationship between users and resources is dyn amic in the cloud, and service providers and users are typically not in the same security do main. Identity-based security (e.g., discretionary or mandatory access control models c annot be used in an open cloud computing environment, where each resource node may not be fa miliar, or even do not know each other. Users are normally identified by their attributes o r characteristics and not by predefined identities. There is often a need for a dynamic acc ess control mechanism to achieve cross- domain authentication. In this paper, we will focus on the following three broad categories of access control models for cloud computing: (1 Role -based models; (2 Attribute-based encryption models and (3 Multi-tenancy models. We will review the existing literature on each of the above access control models and their varian ts (technical approaches, characteristics, applicability, pros and cons, and identify future research directions for developing access control models for cloud computing environments .

  9. Integrity Based Access Control Model for Multilevel XML Document

    Institute of Scientific and Technical Information of China (English)

    HONG Fan; FENG Xue-bin; HUANO Zhi; ZHENG Ming-hui

    2008-01-01

    XML's increasing popularity highlights the security demand for XML documents. A mandatory access control model for XML document is presented on the basis of investigation of the function dependency of XML documents and discussion of the integrity properties of multilevel XML document. Then, the algorithms for decomposition/recovery multilevel XML document into/from single level document are given, and the manipulation rules for typical operations of XQuery and XUpdate: QUERY, INSERT,UPDATE, and REMOVE, are elaborated. The multilevel XML document access model can meet the requirement of sensitive information processing application.

  10. The Next Page Access Prediction Using Makov Model

    Directory of Open Access Journals (Sweden)

    Deepti Razdan

    2011-09-01

    Full Text Available Predicting the next page to be accessed by the Webusers has attracted a large amount of research. In this paper, anew web usage mining approach is proposed to predict next pageaccess. It is proposed to identify similar access patterns from weblog using K-mean clustering and then Markov model is used forprediction for next page accesses. The tightness of clusters isimproved by setting similarity threshold while forming clusters.In traditional recommendation models, clustering by nonsequentialdata decreases recommendation accuracy. In thispaper involve incorporating clustering with low order markovmodel which can improve the prediction accuracy. The main areaof research in this paper is pre processing and identification ofuseful patterns from web data using mining techniques with thehelp of open source software.

  11. Automatic Smoker Detection from Telephone Speech Signals

    DEFF Research Database (Denmark)

    Alavijeh, Amir Hossein Poorjam; Hesaraki, Soheila; Safavi, Saeid

    2017-01-01

    on Gaussian mixture model means and weights respectively. Each framework is evaluated using different classification algorithms to detect the smoker speakers. Finally, score-level fusion of the i-vector-based and the NFA-based recognizers is considered to improve the classification accuracy. The proposed......This paper proposes an automatic smoking habit detection from spontaneous telephone speech signals. In this method, each utterance is modeled using i-vector and non-negative factor analysis (NFA) frameworks, which yield low-dimensional representation of utterances by applying factor analysis...... method is evaluated on telephone speech signals of speakers whose smoking habits are known drawn from the National Institute of Standards and Technology (NIST) 2008 and 2010 Speaker Recognition Evaluation databases. Experimental results over 1194 utterances show the effectiveness of the proposed approach...

  12. Telephone survey of service-user experiences of a telephone-based mental health triage service.

    Science.gov (United States)

    Elsom, Stephen; Sands, Natisha; Roper, Cath; Hoppner, Cayte; Gerdtz, Marie

    2013-10-01

    The participation of service users in all aspects of mental health service delivery including policy development, service planning and evaluation is increasingly an expectation of contemporary mental health care. Although there are a growing number of publications reporting service-user perspectives in the evaluation of mental health services, little attention has been paid to the views of service users about mental health triage services. The purpose of the study reported here was to examine service-users' (consumers and informal carers) experiences of a telephone-based mental health triage service. Using a framework developed from the World Health Organisation's elements of responsiveness, we conducted structured telephone interviews with service users who had contacted a telephone-based mental health triage service in regional Victoria, Australia. The main findings of the study were that consumers experienced more difficulty than carers in accessing the service and that, although most participants were satisfied, only a minority reported being involved in decision-making. Further work is needed to improve accessibility of mental health triage services and to investigate barriers to consumer self-referral. Professional development and practice support systems should be established to support mental health triage nurses in the development of collaborative, consumer-focused care.

  13. First principles modeling of magnetic random access memory devices (invited)

    Energy Technology Data Exchange (ETDEWEB)

    Butler, W.H.; Zhang, X.; Schulthess, T.C.; Nicholson, D.M.; Oparin, A.B. [Metals and Ceramics Division, Oak Ridge National Laboratory, Oak Ridge, Tennessee 37831 (United States); MacLaren, J.M. [Department of Physics, Tulane University, New Orleans, Louisiana 70018 (United States)

    1999-04-01

    Giant magnetoresistance (GMR) and spin-dependent tunneling may be used to make magnetic random access memory devices. We have applied first-principles based electronic structure techniques to understand these effects and in the case of GMR to model the transport properties of the devices. {copyright} {ital 1999 American Institute of Physics.}

  14. An Access Control Model of Virtual Machine Security

    Directory of Open Access Journals (Sweden)

    QIN Zhong-yuan

    2013-07-01

    Full Text Available Virtualization technology becomes a hot IT technolo gy with the popu-larity of Cloud Computing. However, new security issues arise with it. Specifically, the resources sharing and data communication in virtual machines are most con cerned. In this paper an access control model is proposed which combines the Chinese Wall a nd BLP model. BLP multi-level security model is introduced with corresponding improvement based on PCW (Prioritized Chinese Wall security model. This model can be used to safely co ntrol the resources and event behaviors in virtual machines. Experimental results show its eff ectiveness and safety.

  15. Privacy Preservation in Role-based Access Control Model

    Directory of Open Access Journals (Sweden)

    Zuo Chen

    2011-08-01

    Full Text Available Privacy preservation is a crucial problem in resource sharing and collaborating among multi-domains. Based on this problem, we propose a role-based access control model for privacy preservation. This scheme avoided the privacy leakage of resources while implementing access control, and it has the advantage of lower communication overhead. We demonstrate this scheme meets the IND-CCA2 semantic security by using random oracle. The simulation result shows this scheme has better execution efficiency and application effects.

  16. Exploring a type-theoretic approach to accessibility constraint modelling

    CERN Document Server

    Pogodalla, Sylvain

    2008-01-01

    The type-theoretic modelling of DRT that [degroote06] proposed features continuations for the management of the context in which a clause has to be interpreted. This approach, while keeping the standard definitions of quantifier scope, translates the rules of the accessibility constraints of discourse referents inside the semantic recipes. In this paper, we deal with additional rules for these accessibility constraints. In particular in the case of discourse referents introduced by proper nouns, that negation does not block, and in the case of rhetorical relations that structure discourses. We show how this continuation-based approach applies to those accessibility constraints and how we can consider the parallel management of various principles.

  17. Techniques to Access Databases and Integrate Data for Hydrologic Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Whelan, Gene; Tenney, Nathan D.; Pelton, Mitchell A.; Coleman, Andre M.; Ward, Duane L.; Droppo, James G.; Meyer, Philip D.; Dorow, Kevin E.; Taira, Randal Y.

    2009-06-17

    This document addresses techniques to access and integrate data for defining site-specific conditions and behaviors associated with ground-water and surface-water radionuclide transport applicable to U.S. Nuclear Regulatory Commission reviews. Environmental models typically require input data from multiple internal and external sources that may include, but are not limited to, stream and rainfall gage data, meteorological data, hydrogeological data, habitat data, and biological data. These data may be retrieved from a variety of organizations (e.g., federal, state, and regional) and source types (e.g., HTTP, FTP, and databases). Available data sources relevant to hydrologic analyses for reactor licensing are identified and reviewed. The data sources described can be useful to define model inputs and parameters, including site features (e.g., watershed boundaries, stream locations, reservoirs, site topography), site properties (e.g., surface conditions, subsurface hydraulic properties, water quality), and site boundary conditions, input forcings, and extreme events (e.g., stream discharge, lake levels, precipitation, recharge, flood and drought characteristics). Available software tools for accessing established databases, retrieving the data, and integrating it with models were identified and reviewed. The emphasis in this review was on existing software products with minimal required modifications to enable their use with the FRAMES modeling framework. The ability of four of these tools to access and retrieve the identified data sources was reviewed. These four software tools were the Hydrologic Data Acquisition and Processing System (HDAPS), Integrated Water Resources Modeling System (IWRMS) External Data Harvester, Data for Environmental Modeling Environmental Data Download Tool (D4EM EDDT), and the FRAMES Internet Database Tools. The IWRMS External Data Harvester and the D4EM EDDT were identified as the most promising tools based on their ability to access and

  18. A formal model for access control with supporting spatial context

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hong; HE YePing; SHI ZhiGuo

    2007-01-01

    There is an emerging recognition of the importance of utilizing contextual information in authorization decisions. Controlling access to resources in the field of wireless and mobile networking require the definition of a formal model for access control with supporting spatial context. However, traditional RBAC model does not specify these spatial requirements. In this paper, we extend the existing RBAC model and propose the SC-RBAC model that utilizes spatial and location-based information in security policy definitions. The concept of spatial role is presented,and the role is assigned a logical location domain to specify the spatial boundary.Roles are activated based on the current physical position of the user which obtained from a specific mobile terminal. We then extend SC-RBAC to deal with hierarchies, modeling permission, user and activation inheritance, and prove that the hierarchical spatial roles are capable of constructing a lattice which is a means for articulate multi-level security policy and more suitable to control the information flow security for safety-critical location-aware information systems. Next, constrained SC-RBAC allows express various spatial separations of duty constraints,location-based cardinality and temporal constraints for specify fine-grained spatial semantics that are typical in location-aware systems. Finally, we introduce 9 invariants for the constrained SC-RBAC and its basic security theorem is proven. The constrained SC-RBAC provides the foundation for applications in need of the constrained spatial context aware access control.

  19. Extending AAA operational model for profile-based access control in ethernet-based Neutral Access Networks

    NARCIS (Netherlands)

    Matias, J.; Jacob, E.; Demchenko, Y.; de Laat, C.; Gommans, L.; Macías López, E.M.; Bogliolo, A.; Perry, M.; Ran, M

    2010-01-01

    Neutral Access Networks (NAN) have appeared as a new model to overcome some restrictions and lack of flexibility that are present currently in broadband access networks. NAN brings new business opportunities by opening this market to new stakeholders. Although the NAN model is accepted, there are so

  20. Accessing Wireless Sensor Networks Via Dynamically Reconfigurable Interaction Models

    Directory of Open Access Journals (Sweden)

    Maria Cecília Gomes

    2012-12-01

    Full Text Available The Wireless Sensor Networks (WSNs technology is already perceived as fundamental for science across many domains, since it provides a low cost solution for environment monitoring. WSNs representation via the service concept and its inclusion in Web environments, e.g. through Web services, supports particularly their open/standard access and integration. Although such Web enabled WSNs simplify data access, network parameterization and aggregation, the existing interaction models and run-time adaptation mechanisms available to clients are still scarce. Nevertheless, applications increasingly demand richer and more flexible accesses besides the traditional client/server. For instance, applications may require a streaming model in order to avoid sequential data requests, or the asynchronous notification of subscribed data through the publish/subscriber. Moreover, the possibility to automatically switch between such models at runtime allows applications to define flexible context-based data acquisition. To this extent, this paper discusses the relevance of the session and pattern abstractions on the design of a middleware prototype providing richer and dynamically reconfigurable interaction models to Web enabled WSNs.

  1. Models of the solvent-accessible surface of biopolymers

    Energy Technology Data Exchange (ETDEWEB)

    Smith, R.E.

    1996-09-01

    Many biopolymers such as proteins, DNA, and RNA have been studied because they have important biomedical roles and may be good targets for therapeutic action in treating diseases. This report describes how plastic models of the solvent-accessible surface of biopolymers were made. Computer files containing sets of triangles were calculated, then used on a stereolithography machine to make the models. Small (2 in.) models were made to test whether the computer calculations were done correctly. Also, files of the type (.stl) required by any ISO 9001 rapid prototyping machine were written onto a CD-ROM for distribution to American companies.

  2. Accessibility to Nodes of Interest: Demographic Weighting the Logistic Model

    Directory of Open Access Journals (Sweden)

    Gioacchino DE CANDIA

    2015-11-01

    Full Text Available This research fits into the genre of spatial analysis, aimed at better understanding of population dynamics in relation to the presence and distribution of infrastructure and related services. Specifically, the analysis uses a model of the gravitational type, based on the assumption of the impedance (attractiveness territorial, based on a curve of type logistics to determine the accessibility of the same, to which to add a system of weights. In this sense, the model was weighted according to the population, to determine the level of “population served” in terms of infrastructure and related services included in the model.

  3. Access Control Model for Sharing Composite Electronic Health Records

    Science.gov (United States)

    Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen

    The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.

  4. Telephone switchboard closure | 19 December

    CERN Multimedia

    2014-01-01

    Exceptionally, the telephone switchboard will close at 4 p.m. on Friday, 19 December, instead of the usual time of 6 p.m., to allow time for closing all systems properly before the annual closure. Therefore, switchboard operator assistance to transfer calls from/to external lines will stop. All other phone services will run as usual.

  5. OJADEAC: An Ontology Based Access Control Model for JADE Platform

    Directory of Open Access Journals (Sweden)

    Ban Sharief Mustafa

    2014-06-01

    Full Text Available Java Agent Development Framework (JADE is a software framework to make easy the development of Multi-Agent applications in compliance with the Foundation for Intelligent Physical Agents (FIPA specifications. JADE propose new infrastructure solutions to support the development of useful and convenient distributed applications. Security is one of the most important issues in implementing and deploying such applications. JADE-S security add-ons are one of the most popular security solutions in JADE platform. It provides several security services including authentication, authorization, signature and encryption services. Authorization service will give authorities to perform an action based on a set of permission objects attached to every authenticated user. This service has several drawbacks when implemented in a scalable distributed context aware applications. In this paper, an ontology-based access control model called (OJADEAC is proposed to be applied in JADE platform by combining Semantic Web technologies with context-aware policy mechanism to overcome the shortcoming of this service. The access control model is represented by a semantic ontology, and a set of two level semantic rules representing platform and application specific policy rules. OJADEAC model is distributed, intelligent, dynamic, context-aware and use reasoning engine to infer access decisions based on ontology knowledge.

  6. Modelling high data rate communication network access protocol

    Science.gov (United States)

    Khanna, S.; Foudriat, E. C.; Paterra, Frank; Maly, Kurt J.; Overstreet, C. Michael

    1990-01-01

    Modeling of high data rate communication systems is different from the low data rate systems. Three simulations were built during the development phase of Carrier Sensed Multiple Access/Ring Network (CSMA/RN) modeling. The first was a model using SIMCRIPT based upon the determination and processing of each event at each node. The second simulation was developed in C based upon isolating the distinct object that can be identified as the ring, the message, the node, and the set of critical events. The third model further identified the basic network functionality by creating a single object, the node which includes the set of critical events which occur at the node. The ring structure is implicit in the node structure. This model was also built in C. Each model is discussed and their features compared. It should be stated that the language used was mainly selected by the model developer because of his past familiarity. Further the models were not built with the intent to compare either structure or language but because the complexity of the problem and initial results contained obvious errors, so alternative models were built to isolate, determine, and correct programming and modeling errors. The CSMA/RN protocol is discussed in sufficient detail to understand modeling complexities. Each model is described along with its features and problems. The models are compared and concluding observations and remarks are presented.

  7. Telephone based speech interfaces in the developing world, from the perspective of human-human communication

    CSIR Research Space (South Africa)

    Naidoo, S

    2005-07-01

    Full Text Available Telephone-based information services hold tremendous potential as a means of information access in the developing world. However,surprisingly little research has been done on the design of such systems - whether basic Interactive Voice Response...

  8. A Novel Model for Security and Data Access for Jointly Accessing the Cloud Service

    Directory of Open Access Journals (Sweden)

    Bansi Khimani

    2015-01-01

    Full Text Available Cloud computing is a set of resources and services offered by Internet. It provides all kinds of services for end user. One of the most important services provided by cloud computing is an Email (Data Storage and File Sharing. Employees or any Committee of Institution are very interested in sharing documents with group members. There is possibility of creating one group to share information with all. So, in everybody’s registered email id, they will get notification for it. Here, everybody have their own mail id. In this research paper, a model is discussed which allow one email id and two users sharing same Email id. This mechanism is like Joint access of single bank account between two members.

  9. Accessing the Spoken Word

    NARCIS (Netherlands)

    Goldman, J.; Renals, S.; Bird, S.; de Jong, Franciska M.G.; Federico, M.; Fleischhauer, C.; Kornbluh, M.; Lamel, L.; Oard, D.W.; Stewart, C.; Wright, R.

    2005-01-01

    Spoken-word audio collections cover many domains, including radio and television broadcasts, oral narratives, governmental proceedings, lectures, and telephone conversations. The collection, access, and preservation of such data is stimulated by political, economic, cultural, and educational needs.

  10. Telephoning

    CERN Document Server

    Bruce, Kay

    1994-01-01

    This is part of a series of books, which gives training in key business communication skills. Emphasis is placed on building awareness of language appropriateness and fluency in typical business interactions. This new edition is in full colour.

  11. WORK ON TELEPHONE NETWORK LEP SITE

    CERN Multimedia

    2000-01-01

    The telephone service will make modifications on the LEP network the 12th December 2000 from 5.30pm. This will cause disturbances on telephone connections on the whole LEP area. For more information please call 160026.

  12. Broadband access network reference models: a different prospective

    Science.gov (United States)

    Mostafa, Mohamed S.

    1996-11-01

    The current view of the fiber-based broadband access network is that it could basically be modeled into two target networks represented by the following architectures, the fiber to the curb, building, home (FTTC/B/H) -- also termed switched digital video (SDV) -- architecture, and the hybrid fiber coax (HFC) architecture. Both architectures support on-demand digital services. One way to distinguish between these two architectures is based on the digital modulation scheme. The SDV/FTTC architecture utilizes baseband digital modulation both in the fiber distribution and the point-to- point drop. Whereas, the HFC architecture is pass-band and utilizes digitally modulated (as well as analog modulated) subcarriers both on the fiber and the coax for distribution to customers. From a network modeling point of view, the distinction between these two architectures is fuzzy. A hybrid between the above two architectures represents other architectural advantages especially bandwidth utilization in the upstream direction. This paper describes this hybrid architecture and provides an evaluation of the different access network configuration scenarios based on an expanded version of the DAVIC reference models.

  13. Telephone Interviewing Practices within Academic Libraries

    Science.gov (United States)

    Engel, Debra; Robbins, Sarah

    2009-01-01

    This study explores the use of telephone interviews within academic libraries by surveying the 112 academic institutional members of the Association of Research Libraries to identify how telephone interviews are utilized. By comparing the literature to the research results, the authors conclude with best practices for telephone interviews.…

  14. Tinamit: Making coupled system dynamics models accessible to stakeholders

    Science.gov (United States)

    Malard, Julien; Inam Baig, Azhar; Rojas Díaz, Marcela; Hassanzadeh, Elmira; Adamowski, Jan; Tuy, Héctor; Melgar-Quiñonez, Hugo

    2017-04-01

    Model coupling is increasingly used as a method of combining the best of two models when representing socio-environmental systems, though barriers to successful model adoption by stakeholders are particularly present with the use of coupled models, due to their high complexity and typically low implementation flexibility. Coupled system dynamics - physically-based modelling is a promising method to improve stakeholder participation in environmental modelling while retaining a high level of complexity for physical process representation, as the system dynamics components are readily understandable and can be built by stakeholders themselves. However, this method is not without limitations in practice, including 1) inflexible and complicated coupling methods, 2) difficult model maintenance after the end of the project, and 3) a wide variety of end-user cultures and languages. We have developed the open-source Python-language software tool Tinamit to overcome some of these limitations to the adoption of stakeholder-based coupled system dynamics - physically-based modelling. The software is unique in 1) its inclusion of both a graphical user interface (GUI) and a library of available commands (API) that allow users with little or no coding abilities to rapidly, effectively, and flexibly couple models, 2) its multilingual support for the GUI, allowing users to couple models in their preferred language (and to add new languages as necessary for their community work), and 3) its modular structure allowing for very easy model coupling and modification without the direct use of code, and to which programming-savvy users can easily add support for new types of physically-based models. We discuss how the use of Tinamit for model coupling can greatly increase the accessibility of coupled models to stakeholders, using an example of a stakeholder-built system dynamics model of soil salinity issues in Pakistan coupled with the physically-based soil salinity and water flow model

  15. Recruitment using mobile telephones in an Irish general population sexual health survey: challenges and practical solutions

    Directory of Open Access Journals (Sweden)

    McBride Orla

    2012-04-01

    Full Text Available Abstract Background Non-coverage of households without a landline telephone is a major concern of telephone survey researchers. Sampling mobile telephone users in national surveys is vital in order to gain access to the growing proportion of households that use mobile telephones extensively or exclusively. The complex logistics of conducting surveys with mobile telephones have been discussed in the literature. This paper outlines the actual challenges encountered during a recent national sexual health survey in Ireland, which utilized a mobile telephone sampling frame to recruit approximately half of the sample. Method The 2010 Irish Contraception and Crisis Pregnancy Survey (ICCP-2010 is a nationally representative sample of adults aged 18-45 years living in Ireland (n = 3002; 1416 recruited by landline telephone and 1586 recruited by mobile telephone. The overall response rate for the survey was 69% (79% for the landline telephone strand; 61% for the mobile telephone strand. All interviews were conducted using computer-assisting telephone interviewing. Results During the 18-week fieldwork period, five main challenges relating to the use of mobile telephones were encountered: (1 explaining to respondents how random digit dialling works in relation to mobile telephones; (2 establishing the respondent's eligibility; (3 calling the respondent with the Caller ID blocked or withheld; (4 calling the respondent when they are in any number of locations or situations; and (5 explaining to respondents the importance of refusal conversion calls for the response rate calculation. Details of how the survey protocols and procedures were monitored and adapted throughout the study to ensure a high response rate are outlined. Conclusion It is undeniably more challenging to recruit respondents using mobile telephones as opposed to landline telephones. Respondents are generally not familiar with being contacted on their personal mobile telephone for the purposes

  16. Notified Access: Extending Remote Memory Access Programming Models for Producer-Consumer Synchronization

    KAUST Repository

    Belli, Roberto

    2015-05-01

    Remote Memory Access (RMA) programming enables direct access to low-level hardware features to achieve high performance for distributed-memory programs. However, the design of RMA programming schemes focuses on the memory access and less on the synchronization. For example, in contemporary RMA programming systems, the widely used producer-consumer pattern can only be implemented inefficiently, incurring in an overhead of an additional round-trip message. We propose Notified Access, a scheme where the target process of an access can receive a completion notification. This scheme enables direct and efficient synchronization with a minimum number of messages. We implement our scheme in an open source MPI-3 RMA library and demonstrate lower overheads (two cache misses) than other point-to-point synchronization mechanisms for each notification. We also evaluate our implementation on three real-world benchmarks, a stencil computation, a tree computation, and a Colicky factorization implemented with tasks. Our scheme always performs better than traditional message passing and other existing RMA synchronization schemes, providing up to 50% speedup on small messages. Our analysis shows that Notified Access is a valuable primitive for any RMA system. Furthermore, we provide guidance for the design of low-level network interfaces to support Notified Access efficiently.

  17. Call Centre- Computer Telephone Integration

    Directory of Open Access Journals (Sweden)

    Dražen Kovačević

    2012-10-01

    Full Text Available Call centre largely came into being as a result of consumerneeds converging with enabling technology- and by the companiesrecognising the revenue opportunities generated by meetingthose needs thereby increasing customer satisfaction. Regardlessof the specific application or activity of a Call centre, customersatisfaction with the interaction is critical to the revenuegenerated or protected by the Call centre. Physical(v, Call centreset up is a place that includes computer, telephone and supervisorstation. Call centre can be available 24 hours a day - whenthe customer wants to make a purchase, needs information, orsimply wishes to register a complaint.

  18. Molecular Code Division Multiple Access: Gaussian Mixture Modeling

    Science.gov (United States)

    Zamiri-Jafarian, Yeganeh

    Communications between nano-devices is an emerging research field in nanotechnology. Molecular Communication (MC), which is a bio-inspired paradigm, is a promising technique for communication in nano-network. In MC, molecules are administered to exchange information among nano-devices. Due to the nature of molecular signals, traditional communication methods can't be directly applied to the MC framework. The objective of this thesis is to present novel diffusion-based MC methods when multi nano-devices communicate with each other in the same environment. A new channel model and detection technique, along with a molecular-based access method, are proposed in here for communication between asynchronous users. In this work, the received molecular signal is modeled as a Gaussian mixture distribution when the MC system undergoes Brownian noise and inter-symbol interference (ISI). This novel approach demonstrates a suitable modeling for diffusion-based MC system. Using the proposed Gaussian mixture model, a simple receiver is designed by minimizing the error probability. To determine an optimum detection threshold, an iterative algorithm is derived which minimizes a linear approximation of the error probability function. Also, a memory-based receiver is proposed to improve the performance of the MC system by considering previously detected symbols in obtaining the threshold value. Numerical evaluations reveal that theoretical analysis of the bit error rate (BER) performance based on the Gaussian mixture model match simulation results very closely. Furthermore, in this thesis, molecular code division multiple access (MCDMA) is proposed to overcome the inter-user interference (IUI) caused by asynchronous users communicating in a shared propagation environment. Based on the selected molecular codes, a chip detection scheme with an adaptable threshold value is developed for the MCDMA system when the proposed Gaussian mixture model is considered. Results indicate that the

  19. Engineering costs proxy models for China rural access network and its application

    Institute of Scientific and Technical Information of China (English)

    FU Yun-jin; ZHOU Huang-jia; XIN Zhan-hong; SUN Hong-bin

    2007-01-01

    The article builds three engineering rural access network models that describe the structure of network elements and their relative engineering parameters for cable access、synchronous code division multiple access (SCDMA), and very small aperture terminal (VSAT) access technologies in the rural areas of China. Of the three access technologies, cable access and SCDMA access are the most popular access technologies. Besides, there still exist some remote special areas such as western mountain areas, whose natural environment is so bad that VSAT becomes the unique economical access way. Fully considering rural areas' geographical environments' impact, the article introduces geographical revised factor (GRF) to the models. By substituting the network data from the operators into the models, the article obtains the integrated networking values and does further researches on different access networks.

  20. Modeling and analysis of multistate access to elective surgery.

    Science.gov (United States)

    Sobolev, B; Brown, P; Zelt, D

    2001-06-01

    In this paper, we attempt to determine whether delays in scheduling operation affect waiting time in a queue for elective surgery. We analyze the waiting-list management system in a Canadian hospital. We estimate the impact of scheduling delays by modeling access to treatment as a multistate process. We found that patients with any delay in scheduling surgery had longer waiting times than patients without delays. For certain sources of delays, the admission rate was 50-60% lower compared with the rate for admissions without a delay independent of urgency of surgical intervention. Our findings support a concern that waiting time for elective surgery is not simply determined by how many patients are on the waiting list, or by how urgently they need treatment, but also by the waiting list management practice.

  1. Is web interviewing a good alternative to telephone interviewing? Findings from the International Tobacco Control (ITC Netherlands Survey

    Directory of Open Access Journals (Sweden)

    Thompson Mary E

    2010-06-01

    Full Text Available Abstract Background Web interviewing is becoming increasingly popular worldwide, because it has several advantages over telephone interviewing such as lower costs and shorter fieldwork periods. However, there are also concerns about data quality of web surveys. The aim of this study was to compare the International Tobacco Control (ITC Netherlands web and telephone samples on demographic and smoking related variables to assess differences in data quality. Methods Wave 1 of the ITC Netherlands Survey was completed by 1,668 web respondents and 404 telephone respondents of 18 years and older. The two surveys were conducted in parallel among adults who reported smoking at least monthly and had smoked at least 100 cigarettes over their lifetime. Results Both the web and telephone survey had a cooperation rate of 78%. Web respondents with a fixed line telephone were significantly more often married, had a lower educational level, and were older than web respondents without a fixed line telephone. Telephone respondents with internet access were significantly more often married, had a higher educational level, and were younger than telephone respondents without internet. Web respondents were significantly less often married and lower educated than the Dutch population of smokers. Telephone respondents were significantly less often married and higher educated than the Dutch population of smokers. Web respondents used the "don't know" options more often than telephone respondents. Telephone respondents were somewhat more negative about smoking, had less intention to quit smoking, and had more self efficacy for quitting. The known association between educational level and self efficacy was present only in the web survey. Conclusions Differences between the web and telephone sample were present, but the differences were small and not consistently favourable for either web or telephone interviewing. Our study findings suggested sometimes a better data

  2. Task-role-based Access Control Model in Smart Health-care System

    Directory of Open Access Journals (Sweden)

    Wang Peng

    2015-01-01

    Full Text Available As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for the medical health-care environment, task-role-based access control model, which overcomes the disadvantages of traditional access control models. The task-role-based access control (T-RBAC model introduces a task concept, dividing tasks into four categories. It also supports supervision role hierarchy. T-RBAC is a proper access control model for Smart Health-care System, and it improves the management of access rights. This paper also proposes an implementation of T-RBAC, a binary two-key-lock pair access control scheme using prime factorization.

  3. Maintenance of the CERN telephone exchanges

    CERN Multimedia

    TS Department

    2008-01-01

    Maintenance work will be carried out on the CERN telephone exchanges between 8 p.m. and midnight on 3 December. During this time, the fixed-line telephone and audio-conference services may be disrupted. However, the CCC and the Fire Brigade will be reachable at all times. Mobile telephone services (GSM) will not be affected by this work. For further details please contact Netops@cern.ch.

  4. Maintenance of the CERN telephone exchanges

    CERN Multimedia

    2007-01-01

    Maintenance work on the CERN telephone exchanges will be performed on 10 July from 8 p.m. to midnight. During this intervention, the fixed telephone services, audioconference services and GSM calls made via the 333 prefix may be disrupted. However, the CCC and the fire brigade will be reachable at all times. For more details about this maintenance work, please call the telephone switchboard on 76111 or send an e-mail. Telecom SectionIT/CS

  5. Maintenance of the CERN telephone exchanges

    CERN Multimedia

    2007-01-01

    A maintenance of the CERN telephone exchanges will be performed on the 10th of July from 8 p.m. to midnight. During this intervention, the fixed telephone services, audioconference services, and GSM calls made via the 333 prefix may be disrupted. However, the CCC and the fire brigade will be reachable at any time. For more details about this maintenance, please contact the telephone switchboard at 76111 or by email. Telecom Section IT/CS

  6. Maintenance of the CERN telephone exchanges

    CERN Multimedia

    TS Department

    2008-01-01

    Maintenance work will be carried out on the CERN telephone exchanges between 8 p.m. and midnight on 3 December. During this time, the fixed-line telephone and audio-conference services may be disrupted. However, the CCC and the Fire Brigade will be reachable at all times. Mobile telephone services (GSM) will not be affected by this work. For further details please contact mailto:Netops@cern.ch.

  7. Evaluating the privacy properties of telephone metadata

    OpenAIRE

    2016-01-01

    Privacy protections against government surveillance are often scoped to communications content and exclude communications metadata. In the United States, the National Security Agency operated a particularly controversial program, collecting bulk telephone metadata nationwide. We investigate the privacy properties of telephone metadata to assess the impact of policies that distinguish between content and metadata. We find that telephone metadata is densely interconnected, can trivially be reid...

  8. Law-Aware Access Control and its Information Model

    CERN Document Server

    Stieghahn, Michael

    2010-01-01

    Cross-border access to a variety of data such as market information, strategic information, or customer-related information defines the daily business of many global companies, including financial institutions. These companies are obliged by law to keep a data processing legal for all offered services. They need to fulfill different security objectives specified by the legislation. Therefore, they control access to prevent unauthorized users from using data. Those security objectives, for example confidentiality or secrecy, are often defined in the eXtensible Access Control Markup Language that promotes interoperability between different systems. In this paper, we show the necessity of incorporating the requirements of legislation into access control. Based on the work flow in a banking scenario we describe a variety of available contextual information and their interrelations. Different from other access control systems our main focus is on law-compliant cross-border data access. By including legislation dir...

  9. Bandwidth Extension of Telephone Speech Aided by Data Embedding

    Directory of Open Access Journals (Sweden)

    David Malah

    2007-01-01

    Full Text Available A system for bandwidth extension of telephone speech, aided by data embedding, is presented. The proposed system uses the transmitted analog narrowband speech signal as a carrier of the side information needed to carry out the bandwidth extension. The upper band of the wideband speech is reconstructed at the receiving end from two components: a synthetic wideband excitation signal, generated from the narrowband telephone speech and a wideband spectral envelope, parametrically represented and transmitted as embedded data in the telephone speech. We propose a novel data embedding scheme, in which the scalar Costa scheme is combined with an auditory masking model allowing high rate transparent embedding, while maintaining a low bit error rate. The signal is transformed to the frequency domain via the discrete Hartley transform (DHT and is partitioned into subbands. Data is embedded in an adaptively chosen subset of subbands by modifying the DHT coefficients. In our simulations, high quality wideband speech was obtained from speech transmitted over a telephone line (characterized by spectral magnitude distortion, dispersion, and noise, in which side information data is transparently embedded at the rate of 600 information bits/second and with a bit error rate of approximately 3⋅10−4. In a listening test, the reconstructed wideband speech was preferred (at different degrees over conventional telephone speech in 92.5% of the test utterances.

  10. Bandwidth Extension of Telephone Speech Aided by Data Embedding

    Directory of Open Access Journals (Sweden)

    Sagi Ariel

    2007-01-01

    Full Text Available A system for bandwidth extension of telephone speech, aided by data embedding, is presented. The proposed system uses the transmitted analog narrowband speech signal as a carrier of the side information needed to carry out the bandwidth extension. The upper band of the wideband speech is reconstructed at the receiving end from two components: a synthetic wideband excitation signal, generated from the narrowband telephone speech and a wideband spectral envelope, parametrically represented and transmitted as embedded data in the telephone speech. We propose a novel data embedding scheme, in which the scalar Costa scheme is combined with an auditory masking model allowing high rate transparent embedding, while maintaining a low bit error rate. The signal is transformed to the frequency domain via the discrete Hartley transform (DHT and is partitioned into subbands. Data is embedded in an adaptively chosen subset of subbands by modifying the DHT coefficients. In our simulations, high quality wideband speech was obtained from speech transmitted over a telephone line (characterized by spectral magnitude distortion, dispersion, and noise, in which side information data is transparently embedded at the rate of 600 information bits/second and with a bit error rate of approximately . In a listening test, the reconstructed wideband speech was preferred (at different degrees over conventional telephone speech in of the test utterances.

  11. Maximising response rates in household telephone surveys

    Directory of Open Access Journals (Sweden)

    Sinclair Martha

    2008-11-01

    Full Text Available Abstract Background Epidemiological and other studies that require participants to respond by completing a questionnaire face the growing threat of non-response. Response rates to household telephone surveys are diminishing because of changes in telecommunications, marketing and culture. Accordingly, updated information is required about the rate of telephone listing in directories and optimal strategies to maximise survey participation. Methods A total of 3426 households in Sydney, Australia were approached to participate in a computer assisted telephone interview (CATI regarding their domestic (recycled and/or drinking water usage. Only randomly selected households in the suburb and postcode of interest with a telephone number listed in the Electronic White Pages (EWP that matched Australian electoral records were approached. Results The CATI response rate for eligible households contacted by telephone was 39%. The rate of matching of electoral and EWP records, a measure of telephone directory coverage, was 55%. Conclusion The use of a combination of approaches, such as an advance letter, interviewer training, establishment of researcher credentials, increasing call attempts and targeted call times, remains a good strategy to maximise telephone response rates. However, by way of preparation for future technological changes, reduced telephone number listings and people's increasing resistance to unwanted phone calls, alternatives to telephone surveys, such as internet-based approaches, should be investigated.

  12. Maintenance of the CERN telephone exchanges

    CERN Multimedia

    2007-01-01

    Maintenance work will be carried out on the CERN telephone exchanges between 8 p.m. and midnight on 20 November. Fixed-line telephone and audioconference services may be disrupted while the work is being carried out. However, the CCC and the fire brigade will be contactable at any time. Mobile telephony services (GSM) will not be affected by the maintenance work. For further details about the maintenance work, please contact the telephone switchboard on 76111 or by email to standard.telephone@cern.ch. Telecom Section IT/CS

  13. Maximising response rates in household telephone surveys.

    Science.gov (United States)

    O'Toole, Joanne; Sinclair, Martha; Leder, Karin

    2008-11-03

    Epidemiological and other studies that require participants to respond by completing a questionnaire face the growing threat of non-response. Response rates to household telephone surveys are diminishing because of changes in telecommunications, marketing and culture. Accordingly, updated information is required about the rate of telephone listing in directories and optimal strategies to maximise survey participation. A total of 3426 households in Sydney, Australia were approached to participate in a computer assisted telephone interview (CATI) regarding their domestic (recycled and/or drinking) water usage. Only randomly selected households in the suburb and postcode of interest with a telephone number listed in the Electronic White Pages (EWP) that matched Australian electoral records were approached. The CATI response rate for eligible households contacted by telephone was 39%. The rate of matching of electoral and EWP records, a measure of telephone directory coverage, was 55%. The use of a combination of approaches, such as an advance letter, interviewer training, establishment of researcher credentials, increasing call attempts and targeted call times, remains a good strategy to maximise telephone response rates. However, by way of preparation for future technological changes, reduced telephone number listings and people's increasing resistance to unwanted phone calls, alternatives to telephone surveys, such as internet-based approaches, should be investigated.

  14. Training interventions for improving telephone consultation skills in clinicians.

    Science.gov (United States)

    Vaona, Alberto; Pappas, Yannis; Grewal, Rumant S; Ajaz, Mubasshir; Majeed, Azeem; Car, Josip

    2017-01-05

    validated tool to assess the effects of a training intervention on paediatric residents' history-taking and case management skills. It reported no difference compared to no intervention, but authors did not report any quantitative analyses and could not supply additional data. We rated this study as being at high risk of bias. Based on GRADE, we assessed the certainty of the evidence as very low, and consequently it is uncertain whether this intervention improves clinicians' telephone skills.We did not find any study assessing the effect of training interventions for improving clinicians' telephone communication skills on patient primary outcomes (health outcomes measured by validated tools or biomedical markers or patient behaviours, patient morbidity or mortality, patient satisfaction, urgency assessment accuracy or adverse events). Telephone consultation skills are part of a wider set of remote consulting skills whose importance is growing as more and more medical care is delivered from a distance with the support of information technology. Nevertheless, no evidence specifically coming from telephone consultation studies is available, and the training of clinicians at the moment has to be guided by studies and models based on face-to-face communication, which do not consider the differences between these two communicative dimensions. There is an urgent need for more research assessing the effect of different training interventions on clinicians' telephone consultation skills and their effect on patient outcomes.

  15. Switch Based Opportunistic Spectrum Access for General Primary User Traffic Model

    KAUST Repository

    Gaaloul, Fakhreddine

    2012-06-18

    This letter studies cognitive radio transceiver that can opportunistically use the available channels of primary user (PU). Specifically, we investigate and compare two different opportunistic channel access schemes. The first scheme applies when the secondary user (SU) has access to only one channel. The second scheme, based on channel switching mechanism, applies when the SU has access to multiple channels but can at a given time monitor and access only one channel. For these access schemes, we derive the exact analytical results for the novel performance metrics of average access time and average waiting time under general PU traffic models.

  16. Equalizing Access to Electronic Networked Resources: A Model for Rural Libraries in the United States.

    Science.gov (United States)

    Senkevitch, Judith J.; Wolfram, Dietmar

    1994-01-01

    Provides an overview of the current state of networking technology in rural libraries and describes a model for educating rural librarians in accessing electronic networks. Topics discussed include information needs in rural libraries; telecommunications technology access in rural areas; and examples of services to enhance information access.…

  17. Lexical access in sign language: A computational model

    Directory of Open Access Journals (Sweden)

    Naomi Kenney Caselli

    2014-05-01

    Full Text Available Psycholinguistic theories have predominantly been built upon data from spoken language, which leaves open the question: How many of the conclusions truly reflect language-general principles as opposed to modality-specific ones? We take a step toward answering this question in the domain of lexical access in recognition by asking whether a single cognitive architecture might explain diverse behavioral patterns in signed and spoken language. Chen and Mirman (2012 presented a computational model of word processing that unified opposite effects of neighborhood density in speech production, perception, and written word recognition. Neighborhood density effects in sign language also vary depending on whether the neighbors share the same handshape or location. We present a spreading activation architecture that borrows the principles proposed by Chen and Mirman (2012, and show that if this architecture is elaborated to incorporate relatively minor facts about either 1 the time course of sign perception or 2 the frequency of sub-lexical units in sign languages, it produces data that match the experimental findings from sign languages. This work serves as a proof of concept that a single cognitive architecture could underlie both sign and word recognition.

  18. Lexical access in sign language: a computational model.

    Science.gov (United States)

    Caselli, Naomi K; Cohen-Goldberg, Ariel M

    2014-01-01

    PSYCHOLINGUISTIC THEORIES HAVE PREDOMINANTLY BEEN BUILT UPON DATA FROM SPOKEN LANGUAGE, WHICH LEAVES OPEN THE QUESTION: How many of the conclusions truly reflect language-general principles as opposed to modality-specific ones? We take a step toward answering this question in the domain of lexical access in recognition by asking whether a single cognitive architecture might explain diverse behavioral patterns in signed and spoken language. Chen and Mirman (2012) presented a computational model of word processing that unified opposite effects of neighborhood density in speech production, perception, and written word recognition. Neighborhood density effects in sign language also vary depending on whether the neighbors share the same handshape or location. We present a spreading activation architecture that borrows the principles proposed by Chen and Mirman (2012), and show that if this architecture is elaborated to incorporate relatively minor facts about either (1) the time course of sign perception or (2) the frequency of sub-lexical units in sign languages, it produces data that match the experimental findings from sign languages. This work serves as a proof of concept that a single cognitive architecture could underlie both sign and word recognition.

  19. Localization of troubles in telephone cable networks

    Energy Technology Data Exchange (ETDEWEB)

    Chuxin Chen; Hollidge, T.L.; Sharma, D.D. [Pacific Bell, San Ramon, CA (United States)

    1996-12-31

    This paper describes an intelligent system which detects the location of troubles in a local telephone cable network. Such a task is very challenging, tedious, and requires human experts with years of experience and high analytical skills. Our system captures the expertise and knowledge required for this task, along with automated access to database systems, so that the system can help a human analyst to pin-point network trouble location more efficiently and accurately, ultimately reducing the cost of maintenance and repair. The system utilizes probabilistic reasoning techniques and logical operators to determine which plant component has the highest failure probability. This is achieved by building a topology of the local cable network, constructing a causal net which contains belief of failure for each plant component, given their current status, history data, cable pair distribution, and connectivity to other components. The Trouble Localization (TL) Module described in this paper is a crucial part of a larger system: Outside Plant Analysis System (OPAS) which has been deployed Statewide for over nine months at Pacific Bell PMAC centers. The TL system module utilizes AI and Object-Oriented technology. It is implemented in C++ on Unix workstations, and its graphical user interface is in an X Window environment.

  20. An Efficient Role and Object Based Access Control Model Implemented in a PDM System

    Institute of Scientific and Technical Information of China (English)

    HUANG Xiaowen; TAN Jian; HUANG Xiangguo

    2006-01-01

    An effective and reliable access control is crucial to a PDM system. This article has discussed the commonly used access control models, analyzed their advantages and disadvantages, and proposed a new Role and Object based access control model that suits the particular needs of a PDM system. The new model has been implemented in a commercial PDM system, which has demonstrated enhanced flexibility and convenience.

  1. Developing a Multicomponent Model of Nutritious Food Access and Related Implications for Community and Policy Practice.

    Science.gov (United States)

    Freedman, Darcy A; Blake, Christine E; Liese, Angela D

    2013-01-01

    Access to nutritious foods is limited in disenfranchised communities in the United States. Policies are beginning to focus on improving nutritious food access in these contexts; yet, few theories are available to guide this work. We developed a conceptual model of nutritious food access based on the qualitative responses of food consumers in 2 different regions of the American South. Five domains (economic, service delivery, spatial-temporal, social, and personal) and related dimensions of nutritious food access were identified. The conceptual model provides practical guidance to researchers, policy makers, and practitioners working to improve nutritious food access in communities.

  2. Developing a Multicomponent Model of Nutritious Food Access and Related Implications for Community and Policy Practice

    Science.gov (United States)

    FREEDMAN, DARCY A.; BLAKE, CHRISTINE E.; LIESE, ANGELA D.

    2014-01-01

    Access to nutritious foods is limited in disenfranchised communities in the United States. Policies are beginning to focus on improving nutritious food access in these contexts; yet, few theories are available to guide this work. We developed a conceptual model of nutritious food access based on the qualitative responses of food consumers in 2 different regions of the American South. Five domains (economic, service delivery, spatial–temporal, social, and personal) and related dimensions of nutritious food access were identified. The conceptual model provides practical guidance to researchers, policy makers, and practitioners working to improve nutritious food access in communities. PMID:24563605

  3. Reintegration: The Role of Spouse Telephone Battlemind

    Science.gov (United States)

    2011-10-01

    treating a service member or veteran . Spouses can have a dramatic effect on the reintegration of the family after deployment and can be a major support...Physical Health in a Sample of Spouses of OEF/OIF Service Members .......... 37 Easing Reintegration : Telephone Support Groups for Spouses of...68 Reintegration : The Role of Spouse Telephone BATTLEMIND Pilot Project

  4. Upgrade of the CERN telephone exchange

    CERN Multimedia

    2006-01-01

    As part of the upgrade of telephone services, maintenance work will be carried out on the CERN switching centre between 8.00 p.m. and 10.00 p.m. on Monday 9 October. Telephone services may be disrupted and possibly even interrupted during this time. We apologise in advance for any inconvenience this may cause. CERN TELECOM Service

  5. The Internet as a Telephone Network.

    Science.gov (United States)

    DeMillo, Richard A.

    1998-01-01

    Some Internet technologists predict that Internet telephony will topple the Public Switched Telephone Network (PSTN) and become the next telephone network. This article examines Internet telephony (real-time and non-real-time communications); its potential for integrating wireline, wireless, and Internet network services; and factors determining…

  6. A Generic Role Based Access Control Model for Wind Power Systems

    DEFF Research Database (Denmark)

    Nagarajan, Anand; Jensen, Christian D.

    2010-01-01

    infrastructure in a software domain in a manufacturer independent manner as well as establishing secure communication and authenticating the other parties in electrical power infrastructures, but they do not address the problem of access control. We therefore propose a generic model for access control in wind...... power systems, which is based on the widely used role-based access control model. The proposed model is tested using a prototype designed in conformance with the standards that are in use in modern wind power infrastructure and the results are presented to determine the overhead in communication caused...... while adhering to the proposed access model....

  7. A Trusted Host's Authentication Access and Control Model Faced on User Action

    Institute of Scientific and Technical Information of China (English)

    ZHANG Miao; XU Guoai; HU Zhengming; YANG Yixian

    2006-01-01

    The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.

  8. Open Access : sustainable business models and ethical imperatives

    OpenAIRE

    Look, Hugh

    2004-01-01

    Presentation in the ICSTI 2004 Public Conference titled 'Technical and Economic Challenges of Scientific Information: (STM Content Access, Linking and Archiving)'. ICSTI Public Conference was hosted by The IEE at Savoy Place in London on May 17th 2004.

  9. Traditions of the Sun, One Model for Expanding Audience Access

    Science.gov (United States)

    Hawkins, I.; Paglierani, R.

    2006-12-01

    The Internet is a powerful tool with which to expand audience access, bringing students, teachers and the public to places and resources they might not otherwise visit or make use of. We will present Traditions of the Sun, an experiential Web site that invites exploration of the world's ancient observatories with special emphasis on Chaco Culture National Historic Park in the Four Corners region of the US and several sites in the Yucatan Peninsula in Mexico. Traditions of the Sun includes resources in English and Spanish along with a unique trilingual on-line book, "Traditions of the Sun, A Photographic Journal," containing explanatory text in Yucatec Maya as well. Traditions of the Sun offers rich opportunities for virtual visits to ancient sites used for solar observing while learning about current NASA research on the Sun and indigenous solar practices within a larger historical and cultural context. The site contains hundreds of photographs, historic images and rich multimedia to help tell the story of the Sun-Earth Connection. Visitors to the site can zoom in on the great Mayan cities of Chichen Itza, Uxmal, Dzibilchaltun, and Mayapan to learn about Mayan astronomy, history, culture, and science. They can also visit Chaco Canyon to watch sunrise over Pueblo Bonito on the summer solstice, take a virtual reality tour of the great kiva at Casa Rinconada or see panoramic vistas from Fajada Butte, an area which, for preservation purposes, is restricted to the public. Traditions of the Sun provides one model of how exploration and discovery can come to life for both formal and informal audiences via the Internet. Traditions of the Sun is a collaborative project between NASA's Sun-Earth Connection Education Forum, the National Park Service, Instituto National de Antropologia e Historia, Universidad Nacional Autonoma de Mexico, and Ideum.

  10. Investigating the mechanisms of seasonal ENSO phase locking bias in the ACCESS coupled model

    Science.gov (United States)

    Rashid, Harun A.; Hirst, Anthony C.

    2016-02-01

    The mechanisms of coupled model bias in seasonal ENSO phase locking are investigated using versions 1.0 and 1.3 of the CSIRO-BOM ACCESS coupled model (hereafter, ACCESS1.0 and ACCESS1.3, respectively). The two ACCESS coupled models are mostly similar in construction except for some differences, the most notable of which are in the cloud and land surface schemes used in the models. ACCESS1.0 simulates a realistic seasonal phase locking, with the ENSO variability peaking in December as in observations. On the other hand, the simulated ENSO variability in ACCESS1.3 peaks in March, a bias shown to be shared by many other CMIP5 models. To explore the mechanisms of this model bias, we contrast the atmosphere-ocean feedbacks associated with ENSO in both ACCESS model simulations and also compare the key feedbacks with those in other CMIP5 models. We find evidence that the ENSO phase locking bias in ACCESS1.3 is primarily caused by incorrect simulations of the shortwave feedback and the thermocline feedback in this model. The bias in the shortwave feedback is brought about by unrealistic SST-cloud interactions leading to a positive cloud feedback bias that is largest around March, in contrast to the strongest negative cloud feedback found in ACCESS1.0 simulations and observations at that time. The positive cloud feedback bias in ACCESS1.3 is the result of a dominant role played by the low-level clouds in its modeled SST-cloud interactions in the tropical eastern Pacific. Two factors appear to contribute to the dominance of low-level clouds in ACCESS1.3: the occurrence of a stronger mean descending motion bias and, to a lesser extent, a larger mean SST cold bias during March-April in ACCESS1.3 than in ACCESS1.0. A similar association is found between the positive cloud feedback bias and the biases in spring-time mean descending motion and SST for a group of CMIP5 models that show a seasonal phase locking bias similar to ACCESS1.3. Significant differences are also found

  11. Design and Implement an Novel File Access Prediction Model in Linux

    Institute of Scientific and Technical Information of China (English)

    LIU Xie; LIU Xin-song; YANG Feng; BAI Ying-jie

    2004-01-01

    So far, file access prediction models is mainly based on either the file access frequency or the historical record of the latest access. In this paper, a new file access prediction model called frequency- and recency-based successor (FRS) is presented which combines the advantages of the file frequency with the historical record. FRS model has the capability of rapid response to workload changes and can predict future events with greater accuracy than most of other prediction models. To evaluate the performance of FRS mode, the Linux kernel is modified to predict and prefetch upcoming accesses. The experiment shows that FRS can accurately predict approximately 80% of all file access events, while maintaining an immediate successor queue (ISQ) per-file which only requires regular dynamic updates.

  12. H-RBAC: A Hierarchical Access Control Model for SaaS Systems

    Directory of Open Access Journals (Sweden)

    Dancheng Li

    2011-08-01

    Full Text Available SaaS is a new way to deploy software as a hosted service and accessed over the Internet which means the customers don’t need to maintain the software code and data on their own servers. So it’s more important for SaaS systems to take security issues into account. Access control is a security mechanism that enables an authority to access to certain restricted areas and resources according to the permissions assigned to a user. Several access models have been proposed to realize the access control of single instance systems. However, most of the existing models couldn’t address the following SaaS system problems: (1 role name conflicts (2 cross-level management (3 the isomerism of tenants' access control (4 temporal delegation constraints. This paper describes a hierarchical RBAC model called H-RBAC solves all the four problems of SaaS systems mentioned above. This model addresses the SaaS system access control in both system level and tenant level. It combines the advantages of RBDM and ARBAC97 model and introduces temporal constraints to SaaS access control model. In addition, a practical approach to implement the access control module for SaaS systems based on H-RBAC model is also proposed in this paper.

  13. A cost model for broadband access networks: FTTx versus WiMAX

    Science.gov (United States)

    Pereira, João Paulo Ribeiro

    2007-09-01

    Local communities and governments are taking various steps to fight the so-called "digital divide" between well served urban communities and undeserved areas. In order to make broadband access available to these under served areas, several technical solutions are available with the capacity to provide high speed Internet access, video, telephony services, etc. This paper presents a cost-model and a tool for the evaluation of broadband access technologies (xDSL, HFC, FTTx, WiMAX, PLC and satellite), and compares two technologies: FTTx and WiMAX. Our tool compares these different access technologies in different scenarios, and examining the capital expense and deployment of building access networks with the same requisite performance using each technology. The cost model is limited to the access part of the network. The results obtained by our evaluation tool give the possibility to compare several BB access technologies, and support the decision about which is the better technological solution for a given scenario

  14. Thermal effects of radiation from cellular telephones

    Science.gov (United States)

    Wainwright, Peter

    2000-08-01

    A finite element thermal model of the head has been developed to calculate temperature rises generated in the brain by radiation from cellular telephones and similar electromagnetic devices. A 1 mm resolution MRI dataset was segmented semiautomatically, assigning each volume element to one of ten tissue types. A finite element mesh was then generated using a fully automatic tetrahedral mesh generator developed at NRPB. There are two sources of heat in the model: firstly the natural metabolic heat production; and secondly the power absorbed from the electromagnetic field. The SAR was derived from a finite difference time domain model of the head, coupled to a model `mobile phone', namely a quarter-wavelength antenna mounted on a metal box. The steady-state temperature distribution was calculated using the standard Pennes `bioheat equation'. In the normal cerebral cortex the high blood perfusion rate serves to provide an efficient cooling mechanism. In the case of equipment generally available to the public, the maximum temperature rise found in the brain was about 0.1 °C. These results will help in the further development of criteria for exposure guidelines, and the technique developed may be used to assess temperature rises associated with SARs for different types of RF exposure.

  15. Modeling of Bandwidth Aggregation over Heterogeneous Wireless Access Networks

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Dittmann, Lars

    2012-01-01

    Motivated by the multihomming capability of the mobile devices and the fact that the heterogeneous wireless access networks overlap in coverage, mobile operators are looking for solutions that will benefit by simultaneous use of the available multiple access interfaces. Multipath or multilink...... transfer deals with the problem on how to effectively aggregate the bandwidth by simultaneous usage of heterogeneous networks that a host is attached to in order to improve the throughput. This paper deals with a simulation based analysis of bandwidth aggregation techniques and their impact on higher layer...

  16. Probabilistic models for access strategies to dynamic information elements

    DEFF Research Database (Denmark)

    Hansen, Martin Bøgsted; Olsen, Rasmus L.; Schwefel, Hans-Peter

    In various network services (e.g., routing and instances of context-sensitive networking) remote access to dynamically changing information elements is a required functionality. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach...... for information elements spread over a large number of network nodes are provided, which allow to draw conclusions on scalability properties. The impact of different distribution types for the network delays as well as for the time between changes of the information element on the mismatch probability...

  17. Maintenance of the CERN telephone exchanges

    CERN Multimedia

    2007-01-01

    Maintenance work will be carried out on the CERN telephone exchanges between 8 p.m. and midnight on 20 November. Fixed-line telephone and audioconference services may be disrupted while the work is being carried out. However, the CCC and the fire brigade will be reachable at any time. Mobile telephony services (GSM) will not be affected by the maintenance work. For further details about the maintenance work, please contact the telephone switchboard on 76111 or by email. Telecom Section - IT/CS

  18. Evaluating the privacy properties of telephone metadata.

    Science.gov (United States)

    Mayer, Jonathan; Mutchler, Patrick; Mitchell, John C

    2016-05-17

    Since 2013, a stream of disclosures has prompted reconsideration of surveillance law and policy. One of the most controversial principles, both in the United States and abroad, is that communications metadata receives substantially less protection than communications content. Several nations currently collect telephone metadata in bulk, including on their own citizens. In this paper, we attempt to shed light on the privacy properties of telephone metadata. Using a crowdsourcing methodology, we demonstrate that telephone metadata is densely interconnected, can trivially be reidentified, and can be used to draw sensitive inferences.

  19. A General Attribute and Rule Based Role-Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource. This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments.

  20. Task-and-role-based access-control model for computational grid

    Institute of Scientific and Technical Information of China (English)

    LONG Tao; HONG Fan; WU Chi; SUN Ling-li

    2007-01-01

    Access control in a grid environment is a challenging issue because the heterogeneous nature and independent administration of geographically dispersed resources in grid require access control to use fine-grained policies. We established a task-and-role-based access-control model for computational grid (CG-TRBAC model), integrating the concepts of role-based access control (RBAC) and task-based access control (TBAC). In this model, condition restrictions are defined and concepts specifically tailored to Workflow Management System are simplified or omitted so that role assignment and security administration fit computational grid better than traditional models; permissions are mutable with the task status and system variables, and can be dynamically controlled. The CG-TRBAC model is proved flexible and extendible. It can implement different control policies. It embodies the security principle of least privilege and executes active dynamic authorization. A task attribute can be extended to satisfy different requirements in a real grid system.

  1. Dataflow models for shared memory access latency analysis

    NARCIS (Netherlands)

    Staschulat, Jan; Bekooij, Marco

    2009-01-01

    Performance analysis of applications in multi-core platforms is challenging because of temporal interference while accessing shared resources. Especially, memory arbiters introduce a non-constant delay which significantly influences the execution time of a task. In this paper, we selected a priority

  2. Psychiatric diagnosis by telephone: is it an opportunity?

    NARCIS (Netherlands)

    Muskens, E.M.H.; Lucassen, P.; Groenleer, W.; Weel, C. van; Oude Voshaar, R.C.; Speckens, A.

    2014-01-01

    BACKGROUND: For reasons of feasibility, diagnostic telephone interviews are frequently used in research of psychiatric morbidity. However, it is unknown whether diagnostic telephone interviews are as valid as diagnostic face-to-face interviews. RESEARCH QUESTION: Are diagnostic telephone interviews

  3. Psychiatric diagnosis by telephone : is it an opportunity?

    NARCIS (Netherlands)

    Muskens, Esther M. H.; Lucassen, Peter; Groenleer, Wilke; van Weel, Chris; Voshaar, Richard Oude; Speckens, Anne

    2014-01-01

    BACKGROUND: For reasons of feasibility, diagnostic telephone interviews are frequently used in research of psychiatric morbidity. However, it is unknown whether diagnostic telephone interviews are as valid as diagnostic face-to-face interviews. RESEARCH QUESTION: Are diagnostic telephone interviews

  4. Assisting the visually impaired to deal with telephone interview jobs using information and commutation technology.

    Science.gov (United States)

    Yeh, Fung-Huei; Yang, Chung-Chieh

    2014-12-01

    This study proposed a new information and commutation technology assisted blind telephone interview (ICT-ABTI) system to help visually impaired people to do telephone interview jobs as normal sighted people and create more diverse employment opportunities for them. The study also used an ABAB design to assess the system with seven visually impaired people. As the results, they can accomplish 3070 effective telephone interviews per month independently. The results also show that working performance of the visually impaired can be improved effectively with appropriate design of operation working flow and accessible software. The visually impaired become productive, lucrative, and self-sufficient by using ICT-ABTI system to do telephone interview jobs. The results were also shared through the APEC Digital Opportunity Center platform to help visually impaired in Philippines, Malaysia and China.

  5. Mapping crime scenes and cellular telephone usage

    CSIR Research Space (South Africa)

    Schmitz, Peter MU

    2000-12-01

    Full Text Available This paper describes a method that uses a desktop geographical information system (GIS) to plot cellular telephone conversations made when crimes are committed, such as hijackings, hostage taking, kidnapping, rape and murder. The maps produced...

  6. The Telephone: An Invention with Many Fathers

    Energy Technology Data Exchange (ETDEWEB)

    Brenni, Paolo (CNR-FST-IMSS, Florence, Italy)

    2008-10-01

    The names of A.G. Bell, A. Meucci, P.Reis, E. Gray, just to mention the most important ones, are all connected with the invention of the telephone. Today, the Italian inventor A. Meucci is recognized as being the first to propose a working prototype of the electric telephone. However, for a series of reasons his strenuous efforts were not rewarded. I will not repeat here the endless and complex disputes about the 'real father' of the telephone. From an historical point of view it is more interesting to understand why so many individuals from different backgrounds conceived of a similar apparatus and why most of these devices were simply forgotten or just remained laboratory curiosities. The case of the development of the telephone is an emblematic and useful example for better understanding the intricate factors which are involved in the birth of an invention and reasons for its success and failure.

  7. Using Direct Sub-Level Entity Access to Improve Nuclear Stockpile Simulation Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Robert Y. Parker

    1999-08-01

    Direct sub-level entity access is a seldom-used technique in discrete-event simulation modeling that addresses the accessibility of sub-level entity information. The technique has significant advantages over more common, alternative modeling methods--especially where hierarchical entity structures are modeled. As such, direct sub-level entity access is often preferable in modeling nuclear stockpile, life-extension issues, an area to which it has not been previously applied. Current nuclear stockpile, life-extension models were demonstrated to benefit greatly from the advantages of direct sub-level entity access. In specific cases, the application of the technique resulted in models that were up to 10 times faster than functionally equivalent models where alternative techniques were applied. Furthermore, specific implementations of direct sub-level entity access were observed to be more flexible, efficient, functional, and scalable than corresponding implementations using common modeling techniques. Common modeling techniques (''unbatch/batch'' and ''attribute-copying'') proved inefficient and cumbersome in handling many nuclear stockpile modeling complexities, including multiple weapon sites, true defect analysis, and large numbers of weapon and subsystem types. While significant effort was required to enable direct sub-level entity access in the nuclear stockpile simulation models, the enhancements were worth the effort--resulting in more efficient, more capable, and more informative models that effectively addressed the complexities of the nuclear stockpile.

  8. Using Direct Sub-Level Entity Access to Improve Nuclear Stockpile Simulation Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Parker, Robert Y. [Brigham Young Univ., Provo, UT (United States)

    1999-08-01

    Direct sub-level entity access is a seldom-used technique in discrete-event simulation modeling that addresses the accessibility of sub-level entity information. The technique has significant advantages over more common, alternative modeling methods--especially where hierarchical entity structures are modeled. As such, direct sub-level entity access is often preferable in modeling nuclear stockpile, life-extension issues, an area to which it has not been previously applied. Current nuclear stockpile, life-extension models were demonstrated to benefit greatly from the advantages of direct sub-level entity access. In specific cases, the application of the technique resulted in models that were up to 10 times faster than functionally equivalent models where alternative techniques were applied. Furthermore, specific implementations of direct sub-level entity access were observed to be more flexible, efficient, functional, and scalable than corresponding implementations using common modeling techniques. Common modeling techniques (''unbatch/batch'' and ''attribute-copying'') proved inefficient and cumbersome in handling many nuclear stockpile modeling complexities, including multiple weapon sites, true defect analysis, and large numbers of weapon and subsystem types. While significant effort was required to enable direct sub-level entity access in the nuclear stockpile simulation models, the enhancements were worth the effort--resulting in more efficient, more capable, and more informative models that effectively addressed the complexities of the nuclear stockpile.

  9. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  10. A model for optimizing file access patterns using spatio-temporal parallelism

    Energy Technology Data Exchange (ETDEWEB)

    Boonthanome, Nouanesengsy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Patchett, John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Geveci, Berk [Kitware Inc., Clifton Park, NY (United States); Ahrens, James [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bauer, Andy [Kitware Inc., Clifton Park, NY (United States); Chaudhary, Aashish [Kitware Inc., Clifton Park, NY (United States); Miller, Ross G. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Shipman, Galen M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Williams, Dean N. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2013-01-01

    For many years now, I/O read time has been recognized as the primary bottleneck for parallel visualization and analysis of large-scale data. In this paper, we introduce a model that can estimate the read time for a file stored in a parallel filesystem when given the file access pattern. Read times ultimately depend on how the file is stored and the access pattern used to read the file. The file access pattern will be dictated by the type of parallel decomposition used. We employ spatio-temporal parallelism, which combines both spatial and temporal parallelism, to provide greater flexibility to possible file access patterns. Using our model, we were able to configure the spatio-temporal parallelism to design optimized read access patterns that resulted in a speedup factor of approximately 400 over traditional file access patterns.

  11. Maintenance of the CERN telephone exchanges

    CERN Multimedia

    IT Department

    2011-01-01

    Maintenance work will be carried out on the CERN telephone exchanges between 20h00 and 2h00 on the 16 November. Fixed-line telephone and audio-conference services may be disrupted during this intervention. Nevertheless, the CCC and the fire brigade will be reachable at any time. Mobile telephony services (GSM) will not be affected by the maintenance work. IT/CS

  12. Maintenance of the CERN telephone exchanges

    CERN Multimedia

    IT Department

    2011-01-01

    Maintenance work will be carried out on the CERN telephone exchanges between 20h00 and midnight on the 21st of February in order to apply the latest software patches. Fixed-line telephone and audio-conference services may be disrupted during this intervention. Nevertheless, the CCC and the fire brigade will be reachable at any time. Mobile telephony services (GSM) will not be affected by the maintenance work. CS Group

  13. Maintenance of the CERN telephone exchanges

    CERN Multimedia

    IT Department

    2009-01-01

    Maintenance work will be carried out on the CERN telephone exchanges between 8h30 and 17h30 on Saturday 9 May. Fixed-line telephone and audio-conference services may be disrupted during this intervention. Nevertheless, the CCC and the fire brigade will be reachable at any time. Mobile telephony services (GSM) will not be affected by the maintenance work. IT/CS/CS

  14. Maintenance of the CERN telephone exchanges

    CERN Multimedia

    IT Department

    2009-01-01

    Maintenance work will be carried out on the CERN telephone exchanges between 20h00 and midnight on the 29th of July in order to apply the latest software patches. Fixed-line telephone and audio-conference services may be disrupted during this intervention. Nevertheless, the CCC and the fire brigade will be reachable at any time. Mobile telephony services (GSM) will not be affected by the maintenance work. IT/CS/CS

  15. Maintenance of the CERN telephone exchanges

    CERN Multimedia

    IT/CS

    2014-01-01

    Maintenance work will be carried out on the CERN telephone exchanges between 8 p.m. and 2 a.m. on 26 August.   Fixed-line telephone and audio-conference services may be disrupted during this intervention. Nevertheless, the CCC and the Fire Brigade will be reachable at any time. Mobile telephony services (GSM) will not be affected by the maintenance work.

  16. Multihop Medium Access Control for WSNs: An Energy Analysis Model

    Directory of Open Access Journals (Sweden)

    Haapola Jussi

    2005-01-01

    Full Text Available We present an energy analysis technique applicable to medium access control (MAC and multihop communications. Furthermore, the technique's application gives insight on using multihop forwarding instead of single-hop communications. Using the technique, we perform an energy analysis of carrier-sense-multiple-access (CSMA- based MAC protocols with sleeping schemes. Power constraints set by battery operation raise energy efficiency as the prime factor for wireless sensor networks. A detailed energy expenditure analysis of the physical, the link, and the network layers together can provide a basis for developing new energy-efficient wireless sensor networks. The presented technique provides a set of analytical tools for accomplishing this. With those tools, the energy impact of radio, MAC, and topology parameters on the network can be investigated. From the analysis, we extract key parameters of selected MAC protocols and show that some traditional mechanisms, such as binary exponential backoff, have inherent problems.

  17. Predicting Web Page Accesses, using Users’ Profile and Markov Models

    OpenAIRE

    Zeynab Fazelipour

    2016-01-01

    Nowadays web is an important source for information retrieval, the sources on WWW are constantly increasing and the users accessing the web have different backgrounds. Consequently, finding the information which satisfies the personal users needs is not so easy. Exploration of users behaviors in the web, as a method for extracting the knowledge lying behind the way of how the users interact with the web, is considered as an important tool in the field of web mining. By identifying user's beha...

  18. Modeling of highway access weight: Effects on speed and lateral variation

    Directory of Open Access Journals (Sweden)

    Weijie Lu

    2015-11-01

    Full Text Available Highway access points are places where motor vehicles turn off the roadway onto arterial roads. Numerous conflict points exist at highway access points as a result of access and through traffic. Higher speeds and lateral offset variation cause greater risk of potential crashes. This research aimed to formulate a new method of access weight calculation that would show the speed and lateral offset variation characteristics of various access types under the same traffic conditions. Seven access types commonly found on highways in China were considered and analyzed for their safety performance. Data for a vehicle’s lateral offset, speed, acceleration, and deceleration rate were collected by means of a driving simulation method. Both field tests and simulation tests were compared to validate the accuracy of the simulation results from the viewpoint of vehicle speed and trajectory. Finally, access density, derived from the proposed access weighting model, was analyzed and correlated with crash rates on National Highway G205 (South Nanjing section. Spearman correlation results showed that the access rated crash rates have a high correlation. The proposed access weight calculation method shows promise for its application in safety evaluation, access design, and reconstruction.

  19. An Approach to Enforcing Clark-Wilson Model in Role-based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    LIANGBin; SHIWenchang; SUNYufang; SUNBo

    2004-01-01

    Using one security model to enforce another is a prospective solution to multi-policy support. In this paper, an approach to the enforcing Clark-Wilson data integrity model in the Role-based access control (RBAC) model is proposed. An enforcement construction with great feasibility is presented. In this construction, a direct way to enforce the Clark-Wilson model is provided, the corresponding relations among users, transformation procedures, and constrained data items are strengthened; the concepts of task and subtask are introduced to enhance the support to least-privilege. The proposed approach widens the applicability of RBAC. The theoretical foundation for adopting Clark-Wilson model in a RBAC system with small cost is offered to meet the requirements of multi-policy support and policy flexibility.

  20. An enhancement of the role-based access control model to facilitate information access management in context of team collaboration and workflow.

    Science.gov (United States)

    Le, Xuan Hung; Doll, Terry; Barbosu, Monica; Luque, Amneris; Wang, Dongwen

    2012-12-01

    Although information access control models have been developed and applied to various applications, few of the previous works have addressed the issue of managing information access in the combined context of team collaboration and workflow. To facilitate this requirement, we have enhanced the Role-Based Access Control (RBAC) model through formulating universal constraints, defining bridging entities and contributing attributes, extending access permissions to include workflow contexts, synthesizing a role-based access delegation model to target on specific objects, and developing domain ontologies as instantiations of the general model to particular applications. We have successfully applied this model to the New York State HIV Clinical Education Initiative (CEI) project to address the specific needs of information management in collaborative processes. An initial evaluation has shown this model achieved a high level of agreement with an existing system when applied to 4576 cases (kappa=0.801). Comparing to a reference standard, the sensitivity and specificity of the enhanced RBAC model were at the level of 97-100%. These results indicate that the enhanced RBAC model can be effectively used for information access management in context of team collaboration and workflow to coordinate clinical education programs. Future research is required to incrementally develop additional types of universal constraints, to further investigate how the workflow context and access delegation can be enriched to support the various needs on information access management in collaborative processes, and to examine the generalizability of the enhanced RBAC model for other applications in clinical education, biomedical research, and patient care.

  1. Application of Attribute Based Access Control Model for Industrial Control Systems

    Directory of Open Access Journals (Sweden)

    Erkan Yalcinkaya

    2017-02-01

    Full Text Available The number of reported security vulnerabilities and incidents related to the industrial control systems (ICS has increased recent years. As argued by several researchers, authorization issues and poor access control are key incident vectors. The majority of ICS are not designed security in mind and they usually lack strong and granular access control mechanisms. The attribute based access control (ABAC model offers high authorization granularity, central administration of access policies with centrally consolidated and monitored logging properties. This research proposes to harness the ABAC model to address the present and future ICS access control challenges. The proposed solution is also implemented and rigorously tested to demonstrate the feasibility and viability of ABAC model for ICS.

  2. Tips for telephone and electronic medical consultation.

    Science.gov (United States)

    Gupta, Sailesh G

    2013-11-01

    The world is gradually shrinking in terms of time, and communications, while expanding in terms of population and distances. Patients demand and expect telephone and e-mail consultations and medical professionals are only too happy to oblige. However, a telephone consult is never so satisfying for the patients and well as the doctor as a face consult. Besides much essential information, cues and clues to diagnosis may be missed only with an audio input from patients. A telephone consult should be offered only to know the patient, and only after a prior face consult. It should be ensured that the patient can definitely understand, and follow the directions, and manage the disorder at home. While a telephone consultation may be considered convenient and short, there may be several disadvantages of such consultation, a wrong diagnosis and an inappropriate prescription being just two of them. Telephone etiquette should be followed by the staff and the physician. A triage system may be set up to filter calls that need to be necessarily answered by the physician himself. Telephone consults should be charged, and should be followed by a face consult as soon as possible. E-mail consultations are governed essentially by the same principles that govern telephone consultations. There is a slight advantage of e-mail consultation in that reports can be submitted online, including radiological reports. However, confidentiality is an important and uncertain issue in cyber space. A memorandum of understanding maybe signed between the patient and the physician. The information provided on e-mail should be of a general nature and a face consult should precede e-mail consultation. Patients may be referred to web resources for information. Telemedicine is a useful tool to obtain a medical diagnosis and to provide medical advice, and is likely to be used vastly in the near future.

  3. Maintaining Access to print Materials – a Finnish Model

    Directory of Open Access Journals (Sweden)

    Pentti Vattulainen

    2005-11-01

    Full Text Available Even though there are signs that the end of the hybrid library might well be in sight within a few years, we still have to manage and develop the hybrid library. Hybridism manifests itself in all sectors of the library profession, starting from library space and building planning, information provision on internet, virtual reference etc. In collection management one of the most challenging issues is how to manage the rising costs of hybrid collection development. The challenge is to provide access for every user to the document he or she needs and at same time to ensure at least an acceptable basic print collection in the library (Ceynova & Coners, 2003. Many tools have been developed to support local libraries in managing hybridism. Co-operation and specialisation of different types of libraries is naturally needed in this. Another direction is to provide centralised tools for managing reasonable service levels for users in terms of access to information. In Finland, library co-operation has been developed over many decades and specialisation in terms of collections and database constructions etc. have been essential in formulating national collections.

  4. Communications and Information: On-Hook Telephone Security Guidelines

    Science.gov (United States)

    2007-11-02

    TYPE: Type-accepted telephone MANUFACTURER: AT&T MODEL: 7507 TRADE NAME: Digital voice terminal DESCRIPTION & USE: For use with ISDN protocol . ORDER...upward modulation factor given by: Emax - E mu = E and/or a downward modulation factor given by: E - Emin md = E Where E...is the peak-amplitude of the unmodulated carrier, Emax is the maximum peak-amplitude of the modulated carrier, and Emin is the minimum peak-amplitude

  5. IBD patients in remission strongly prefer annual telephone calls by IBD nurse - compared to outpatient visits

    DEFF Research Database (Denmark)

    Bager, Palle; Hentze, Runa; Markussen, Toto

    by a telephone call by an IBD nurse. Furthermore an extended acute access to the hospital is needed if flare occurs. Patients and Methods: 150 consecutive IBD patients attending to the outpatient clinic at Aarhus University Hospital were presented to the SM approach. On a Likert scale they were asked to what...

  6. The contribution of atom accessibility to site of metabolism models for cytochromes P450.

    Science.gov (United States)

    Rydberg, Patrik; Rostkowski, Michal; Gloriam, David E; Olsen, Lars

    2013-04-01

    Three different types of atom accessibility descriptors are investigated in relation to site of metabolism predictions. To enable the integration of local accessibility we have constructed 2DSASA, a method for the calculation of the atomic solvent accessible surface area that is independent of 3D coordinates. The method was implemented in the SMARTCyp site of metabolism prediction models and improved the results by up to 4 percentage points for nine cytochrome P450 isoforms. The final models are made available at http://www.farma.ku.dk/smartcyp.

  7. Telephone versus office-based management of warfarin: impact on international normalized ratios and outcomes.

    Science.gov (United States)

    Stoudenmire, Laura G; DeRemer, Christina E; Elewa, Hazem

    2014-08-01

    Studies have concluded that telephone-based management of warfarin is an effective alternative to in-office management. High rates of patient and physician satisfaction have been reported with telephone-based monitoring. Proposed benefits of telephone-based monitoring include time- and cost savings for patients and healthcare providers alike as well as increased access to care for those patients who have difficulty making in-office appointments. This study aimed to evaluate the impact of telephone versus office-based management of warfarin on extreme INR values. A retrospective cohort study was conducted to assess outcomes of patients receiving warfarin managed either by telephone or in-office appointments. The primary endpoint of the study was the frequency of extreme INR values, defined as an INR ≤1.5 or ≥4.5. A total of 110 patients were evaluated; subjects were distributed 2:1 between the in-office and telephone groups. Baseline characteristics were similar between groups. Subjects followed via telephone had a twofold increase in the incidence of extreme INR values compared to the patients followed in-office (15.18 vs. 7.98 %; p < 0.0001). Overall TTR was similar between groups (85.39 vs. 80.38 %, p = 0.1171). There was no difference between the two groups in the incidence of major bleeding events (2.67 vs. 0 %, p = 1.00), thromboembolic events (8 vs. 0 %, p = 0.1740), or hospitalizations related to anticoagulation therapy (6.67 vs. 0 %, p = 0.1758). Patients monitored via telephone had a higher incidence of extreme INR values than patients followed in-office, which may lead to an increased incidence of adverse outcomes in the long-term. Well-designed, prospective studies are needed to confirm such findings.

  8. Multi-model-based Access Control in Construction Projects

    CERN Document Server

    Hilbert, Frank; Araujo, Larissa; 10.4204/EPTCS.83.1

    2012-01-01

    During the execution of large scale construction projects performed by Virtual Organizations (VO), relatively complex technical models have to be exchanged between the VO members. For linking the trade and transfer of these models, a so-called multi-model container format was developed. Considering the different skills and tasks of the involved partners, it is not necessary for them to know all the models in every technical detailing. Furthermore, the model size can lead to a delay in communication. In this paper an approach is presented for defining model cut-outs according to the current project context. Dynamic dependencies to the project context as well as static dependencies on the organizational structure are mapped in a context-sensitive rule. As a result, an approach for dynamic filtering of multi-models is obtained which ensures, together with a filtering service, that the involved VO members get a simplified view of complex multi-models as well as sufficient permissions depending on their tasks.

  9. Multi-model-based Access Control in Construction Projects

    Directory of Open Access Journals (Sweden)

    Frank Hilbert

    2012-04-01

    Full Text Available During the execution of large scale construction projects performed by Virtual Organizations (VO, relatively complex technical models have to be exchanged between the VO members. For linking the trade and transfer of these models, a so-called multi-model container format was developed. Considering the different skills and tasks of the involved partners, it is not necessary for them to know all the models in every technical detailing. Furthermore, the model size can lead to a delay in communication. In this paper an approach is presented for defining model cut-outs according to the current project context. Dynamic dependencies to the project context as well as static dependencies on the organizational structure are mapped in a context-sensitive rule. As a result, an approach for dynamic filtering of multi-models is obtained which ensures, together with a filtering service, that the involved VO members get a simplified view of complex multi-models as well as sufficient permissions depending on their tasks.

  10. Cellular telephone use and cancer risk

    DEFF Research Database (Denmark)

    2006-01-01

    -up of a large nationwide cohort of 420,095 persons whose first cellular telephone subscription was between 1982 and 1995 and who were followed through 2002 for cancer incidence. Standardized incidence ratios (SIRs) were calculated by dividing the number of observed cancer cases in the cohort by the number....... The risk for smoking-related cancers was decreased among men (SIR = 0.88, 95% CI = 0.86 to 0.91) but increased among women (SIR = 1.11, 95% CI = 1.02 to 1.21). Additional data on income and smoking prevalence, primarily among men, indicated that cellular telephone users who started subscriptions in the mid...

  11. Using the Telephone for Business

    Institute of Scientific and Technical Information of China (English)

    N. J. Stirk

    2004-01-01

    @@ You are probably used to making informal calls to family and friends.When making calls to companies, however, some special rules and conventions apply. In this article we explain how to call someone in a company that you do not know personally (the most common kind of formal call made by office staff) and give you some models and language that you can use.

  12. Work on the CERN telephone exchanges

    CERN Multimedia

    2006-01-01

    Corrective maintenance work on the CERN telephone exchanges will be carried out on 13th March 2006, resulting in service interruptions across the west area of the Meyrin site between 9.00 p.m. and 11.00 p.m. We apologise for any inconvenience this may cause. CERN TELECOM Service Tel.: 76111 GSM: 160101

  13. The Invention of the Communication Engine 'Telephone'

    NARCIS (Netherlands)

    Van der Kooij, B.J.G.

    2016-01-01

    This case study is a historic analysis of the developments that resulted in the electric telephone. It is a story about human communication. Long distance communication that had already developed with the electrical telegraph system created by Samuel Morse in America and Cooke & Wheatstone in

  14. The Invention of the Communication Engine 'Telephone'

    NARCIS (Netherlands)

    Van der Kooij, B.J.G.

    2016-01-01

    This case study is a historic analysis of the developments that resulted in the electric telephone. It is a story about human communication. Long distance communication that had already developed with the electrical telegraph system created by Samuel Morse in America and Cooke & Wheatstone in Britai

  15. The International Telephone Network and Democratization.

    Science.gov (United States)

    Sun, Su-Lien; Barnett, George A.

    1994-01-01

    Examines the relationship between the international telephone network and democratization through network analysis. Highlights include principles of modern democracy; community and global interactions; a country's pattern of communication and its relationship to democratic development; and a country's position in the international telephone…

  16. Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

    Directory of Open Access Journals (Sweden)

    Yunchuan Guo

    2014-01-01

    Full Text Available Access control is a key technology in providing security in the Internet of Things (IoT. The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC. STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM and the election-based update mechanism (EUM. We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  17. Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

    Science.gov (United States)

    Guo, Yunchuan; Yin, Lihua; Li, Chao

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model. PMID:25177731

  18. Spatiotemporal access model based on reputation for the sensing layer of the IoT.

    Science.gov (United States)

    Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  19. Investigation of the RF-imposition method for the unsanctioned information retrieval from a telephone line

    Directory of Open Access Journals (Sweden)

    Юрий Владимирович Лыков

    2015-07-01

    Full Text Available Presented in the paper Investigations are focused on special aspects connected with selection of the carrier frequency values for realization of the RF-imposition method. For this method a possibility of the information leakage from various modern models of telephones is estimated too. It is also analyzed an efficiency of means for blocking of the information leakage by the RF-imposition method and an influence of such means on the speech signal quality during a telephone conversation

  20. Air Force Enlisted Personnel Retention-Accession Model.

    Science.gov (United States)

    1980-06-01

    axes are made, with the implcation that they are career choices. In this model, corner or interior solutions may occur with interior or mixed career...with the enlistment data for mental category IV and high school 32 ...... *1 non-graduates, suggests that for all practical purposes the Air Force...the full information available and should, other things equal, provide the best point estimates. Except for the 1959-1967 period, the point estimate

  1. Modeling and performance analysis of IP access interface in optical transmission networks with packet switching

    OpenAIRE

    Lackovic, Marko; Bungarzeanu, Cristian

    2006-01-01

    The article analyzes the influence of the Internet Protocol (IP) access interface on the packet loss probability and delay times in the optical packet switched network. The network and node model have been proposed, and the structure of the IP access interface, including assembler and holder, have been included in the analysis. It has been shown that the increase of the maximum optical packet sizes, as well as use of the holding feature as contention resolution mechanism, decrease the packet ...

  2. MODEL OF FEES CALCULATION FOR ACCESS TO TRACK INFRASTRUCTURE FACILITIES

    Directory of Open Access Journals (Sweden)

    M. I. Mishchenko

    2014-12-01

    Full Text Available Purpose. The purpose of the article is to develop a one- and two-element model of the fees calculation for the use of track infrastructure of Ukrainian railway transport. Methodology. On the basis of this one can consider that when planning the planned preventive track repair works and the amount of depreciation charges the guiding criterion is not the amount of progress it is the operating life of the track infrastructure facilities. The cost of PPTRW is determined on the basis of the following: the classification track repairs; typical technological processes for track repairs; technology based time standards for PPTRW; costs for the work of people, performing the PPTRW, their hourly wage rates according to the Order 98-Ts; the operating cost of machinery; regulated list; norms of expenditures and costs of materials and products (they have the largest share of the costs for repairs; railway rates; average distances for transportation of materials used during repair; standards of general production expenses and the administrative costs. Findings. The models offered in article allow executing the objective account of expenses in travelling facilities for the purpose of calculation of the proved size of indemnification and necessary size of profit, the sufficient enterprises for effective activity of a travelling infrastructure. Originality. The methodological bases of determination the fees (payments for the use of track infrastructure on one- and two-element base taking into account the experience of railways in the EC countries and the current transport legislation were grounded. Practical value. The article proposes the one- and two-element models of calculating the fees (payments for the TIF use, accounting the applicable requirements of European transport legislation, which provides the expense compensation and income formation, sufficient for economic incentives of the efficient operation of the TIE of Ukrainian railway transport.

  3. Usability and Information access challenges in complex simulation models

    CSIR Research Space (South Africa)

    Naidoo, S

    2008-07-01

    Full Text Available scenario as a file using an XML format to store the data. Because VGD uses a distributed simulation architecture, the tool also allows the user to specify where each model will run. In this case the user will, in addition to the scenario, also specify... example of this is the terrain configuration files that specify the type of terrain data to be used. This terrain configuration file must be set up in order for the simulation to run and is located in the same folder as the scenario configuration...

  4. Throughput Analysis Model for IEEE 802.11e EDCA with Multiple Access Categories

    Directory of Open Access Journals (Sweden)

    Y. Lee

    2013-08-01

    Full Text Available IEEE 802.11e standard has been specified to support differentiated quality of service (QoS, one of the critical issues on the conventional IEEE 802.11 wireless local area networks (WLANs. Enhanced Distributed Channel Access (EDCA is the fundamental and mandatory contention-based channel access method of IEEE 802.11e, and delivers traffic based on differentiated Access Categories (ACs. A general three dimensional Markov chain model of IEEE 802.11e EDCA for performance analysis is proposed in this paper. The analytical model considers multiple stations with an arbitrary number of different ACs. It also differentiates the contention window (CW sizes and the arbitration interframe spaces (AIFSs, and considers virtual collision mechanism. Based on the model, the saturation throughput of EDCA is derived, and the accuracy of the proposed model is validated via simulations.

  5. Do new and traditional models of primary care differ with regard to access?

    Science.gov (United States)

    Miedema, Baukje; Easley, Julie; Thompson, Ashley E.; Boivin, Antoine; Aubrey-Bassler, Kris; Katz, Alan; Hogg, William E.; Breton, Mylaine; Francoeur, Danièle; Wong, Sabrina T.; Wodchis, Walter P.

    2016-01-01

    Abstract Objective To examine access to primary care in new and traditional models using 2 dimensions of the concept of patient-centred access. Design An international survey examining the quality and costs of primary health care (the QUALICOPC study) was conducted in 2013 in Canada. This study adopted a descriptive cross-sectional survey method using data from practices across Canada. Each participating practice filled out the Family Physician Survey and the Practice Survey, and patients in each participating practice were asked to complete the Patient Experiences Survey. Setting All 10 Canadian provinces. Participants A total of 759 practices and 7172 patients. Main outcome measures Independent t tests were conducted to examine differences between new and traditional models of care in terms of availability and accommodation, and affordability of care. Results Of the 759 practices, 407 were identified as having new models of care and 352 were identified as traditional. New models of care were distinct with respect to payment structure, opening hours, and having an interdisciplinary work force. Most participating practices were from large cities or suburban areas. There were few differences between new and traditional models of care regarding accessibility and accommodation in primary care. Patients under new models of care reported easier access to other physicians in the same practice, while patients from traditional models reported seeing their regular family physicians more frequently. There was no difference between the new and traditional models of care with regard to affordability of primary care. Patients attending clinics with new models of care reported that their physicians were more involved with them as a whole person than patients attending clinics based on traditional models did. Conclusion Primary care access issues do not differ strongly between traditional and new models of care; however, patients in the new models of care believed that their

  6. Location-allocation and accessibility models for improving the spatial planning of public health services.

    Science.gov (United States)

    Polo, Gina; Acosta, C Mera; Ferreira, Fernando; Dias, Ricardo Augusto

    2015-01-01

    This study integrated accessibility and location-allocation models in geographic information systems as a proposed strategy to improve the spatial planning of public health services. To estimate the spatial accessibility, we modified the two-step floating catchment area (2SFCA) model with a different impedance function, a Gaussian weight for competition among service sites, a friction coefficient, distances along a street network based on the Dijkstra's algorithm and by performing a vectorial analysis. To check the accuracy of the strategy, we used the data from the public sterilization program for the dogs and cats of Bogot´a, Colombia. Since the proposed strategy is independent of the service, it could also be applied to any other public intervention when the capacity of the service is known. The results of the accessibility model were consistent with the sterilization program data, revealing that the western, central and northern zones are the most isolated areas under the sterilization program. Spatial accessibility improvement was sought by relocating the sterilization sites using the maximum coverage with finite demand and the p-median models. The relocation proposed by the maximum coverage model more effectively maximized the spatial accessibility to the sterilization service given the non-uniform distribution of the populations of dogs and cats throughout the city. The implementation of the proposed strategy would provide direct benefits by improving the effectiveness of different public health interventions and the use of financial and human resources.

  7. Location-allocation and accessibility models for improving the spatial planning of public health services.

    Directory of Open Access Journals (Sweden)

    Gina Polo

    Full Text Available This study integrated accessibility and location-allocation models in geographic information systems as a proposed strategy to improve the spatial planning of public health services. To estimate the spatial accessibility, we modified the two-step floating catchment area (2SFCA model with a different impedance function, a Gaussian weight for competition among service sites, a friction coefficient, distances along a street network based on the Dijkstra's algorithm and by performing a vectorial analysis. To check the accuracy of the strategy, we used the data from the public sterilization program for the dogs and cats of Bogot´a, Colombia. Since the proposed strategy is independent of the service, it could also be applied to any other public intervention when the capacity of the service is known. The results of the accessibility model were consistent with the sterilization program data, revealing that the western, central and northern zones are the most isolated areas under the sterilization program. Spatial accessibility improvement was sought by relocating the sterilization sites using the maximum coverage with finite demand and the p-median models. The relocation proposed by the maximum coverage model more effectively maximized the spatial accessibility to the sterilization service given the non-uniform distribution of the populations of dogs and cats throughout the city. The implementation of the proposed strategy would provide direct benefits by improving the effectiveness of different public health interventions and the use of financial and human resources.

  8. Desigualdades no acesso e na utilização de serviços odontológicos no Brasil: análise do Sistema de Vigilância de Fatores de Risco e Proteção para Doenças Crônicas por Inquérito Telefônico (VIGITEL 2009 Inequalities in access to and utilization of dental care in Brazil: an analysis of the Telephone Survey Surveillance System for Risk and Protective Factors for Chronic Diseases (VIGITEL 2009

    Directory of Open Access Journals (Sweden)

    Marco A. Peres

    2012-01-01

    Full Text Available Pretendeu-se descrever o padrão de utilização, acesso e tipo de serviço odontológico utilizado por adultos e idosos das capitais brasileiras segundo características sociodemográficas. Foram utilizados dados do Sistema de Vigilância de Fatores de Risco e Proteção para Doenças Crônicas por Inquérito Telefônico (VIGITEL de 2009 (n = 54.367. Mais da metade da população revelou necessitar de tratamento odontológico no último ano e desta, 15,2% não conseguiram atendimento. O uso de serviço odontológico privado foi de 61,1%. A participação do Sistema Único de Saúde variou de 6,2% no Distrito Federal a 35,2% em Boa Vista. Análises multivariáveis de Poisson revelaram que as maiores prevalências de percepção de necessidades de tratamento ocorreram nas mulheres, nos adultos de meia idade e nos mais escolarizados. Falta de acesso aos serviços odontológicos foram mais prevalentes em mulheres, nos mais jovens, nos menos escolarizados e nos pardos. Os resultados deste estudo revelam a existência de marcantes iniquidades na utilização e acesso de serviços odontológicos nas capitais brasileiras.This study aimed to evaluate access to and utilization of various types of dental services by individuals 18 years or older in Brazil's State capitals. We gathered data from the Telephone Survey Surveillance System for Risk and Protective Factors for Chronic Diseases (VIGITEL in 2009 (n = 54,367. More than half of the target population reported the need for dental treatment in the previous year; of these, 15.2% lacked access to dental services when needed. The private sector provided 61.1% of all dental appointments. The share of services provided by the Unified National Health System (SUS ranged from 6.2% in the Federal District to 35.2% in Boa Vista, in the North. Multivariate Poisson regression models showed higher prevalence of dental treatment needs among women, middle-aged adults, and individuals with more schooling. Lack of

  9. Utilities:Other:Telephone Lines at Pipe Spring National Monument, Arizona (Utilities.gdb:Other:telephone)

    Data.gov (United States)

    National Park Service, Department of the Interior — This feature class represent telephone lines at Pipe Spring National Monument, Arizona. The utility pipelines were collected by a Trimble GeoXT GPS unit with...

  10. The TriLab, a Novel ICT Based Triple Access Mode Laboratory Education Model

    Science.gov (United States)

    Abdulwahed, Mahmoud; Nagy, Zoltan K.

    2011-01-01

    This paper introduces a novel model of laboratory education, namely the TriLab. The model is based on recent advances in ICT and implements a three access modes to the laboratory experience (virtual, hands-on and remote) in one software package. A review of the three modes is provided with highlights of advantages and disadvantages of each mode.…

  11. Elimination of HIV in South Africa through expanded access to antiretroviral therapy: a model comparison study

    NARCIS (Netherlands)

    Hontelez, J.A.; Lurie, M.N.; Barnighausen, T.; Bakker, R.; Baltussen, R.; Tanser, F.; Hallett, T.B.; Newell, M.L.; Vlas, S.J. de

    2013-01-01

    BACKGROUND: Expanded access to antiretroviral therapy (ART) using universal test and treat (UTT) has been suggested as a strategy to eliminate HIV in South Africa within 7 y based on an influential mathematical modeling study. However, the underlying deterministic model was criticized widely, and ot

  12. Elimination of HIV in South Africa through Expanded Access to Antiretroviral Therapy: A Model Comparison Study

    NARCIS (Netherlands)

    J.A.C. Hontelez (Jan); M.N. Lurie (Mark N.); T. Bärnighausen (Till); R. Bakker (Roel); R.M.P.M. Baltussen (Rob); F. Tanser (Frank); T.B. Hallett (Timothy); M.-L. Newell (Marie-Louise); S.J. de Vlas (Sake)

    2013-01-01

    textabstractBackground:Expanded access to antiretroviral therapy (ART) using universal test and treat (UTT) has been suggested as a strategy to eliminate HIV in South Africa within 7 y based on an influential mathematical modeling study. However, the underlying deterministic model was criticized wid

  13. Elimination of HIV in South Africa through Expanded Access to Antiretroviral Therapy : A Model Comparison Study

    NARCIS (Netherlands)

    J.A.C. Hontelez (Jan); M.N. Lurie (Mark N.); T. Bärnighausen (Till); R. Bakker (Roel); R.M.P.M. Baltussen (Rob); F. Tanser (Frank); T.B. Hallett (Timothy); M.L. Newell (Marie Louise); S.J. de Vlas (Sake)

    2013-01-01

    textabstractBackground: Expanded access to antiretroviral therapy (ART) using universal test and treat (UTT) has been suggested as a strategy to eliminate HIV in South Africa within 7 y based on an influential mathematical modeling study. However, the underlying deterministic model was criticized wi

  14. Video Modeling and Observational Learning to Teach Gaming Access to Students with ASD

    Science.gov (United States)

    Spriggs, Amy D.; Gast, David L.; Knight, Victoria F.

    2016-01-01

    The purpose of this study was to evaluate both video modeling and observational learning to teach age-appropriate recreation and leisure skills (i.e., accessing video games) to students with autism spectrum disorder. Effects of video modeling were evaluated via a multiple probe design across participants and criteria for mastery were based on…

  15. DEVELOPMENT OF MATHEMATICAL MODEL OF NETWORK, USES THE COMPETING ACCESS TO THE DATA TRANSMISSION AREA

    Directory of Open Access Journals (Sweden)

    G. V. Abramov

    2012-01-01

    Full Text Available In this article we consider a mathematical model of a network that uses competitive environment, access to data. The authors have conducted theoretical and experimental investigation of the delivery time information, the formation of queues in the switching devices. Checking the adequacy of the model is performed using formal statistical tests of Fisher and Student.

  16. Telephone speech enhancement for hearing-impaired listeners using multi-channel compression

    Science.gov (United States)

    Natarajan, Harikrishna P.; Krishnamurthy, Ashok K.; Feth, Lawrence L.

    2002-05-01

    Elderly listeners with sensorineural hearing impairment usually have difficulty with telephone communication if they do not use a hearing aid or telephone amplifier. In many cases, these devices may not be readily available or maybe uncomfortable to use. We describe here an alternative strategy to enhance the speech by pre-processing the signal before sending it over the telephone line. The pre-processing is based on a multi-channel compression algorithm that modifies the critical band spectrum of the speech signal to bring it within the dynamic hearing range of the listener, while also compensating for the effects of the telephone line. We describe the algorithm and the results of a simulation study in which the Articulation Index (AI) is used to measure the intelligibility enhancement, and the Glasberg, Moore and Stone (1999) model is used to simulate the effects of the hearing loss.

  17. Nurse-led telephone follow-up after total knee arthroplasty

    DEFF Research Database (Denmark)

    Szöts, Kirsten; Konradsen, Hanne; Solgaard, Søren;

    2015-01-01

    AIM AND OBJECTIVES: To generate information on how telephone follow-up consultations, structured by nursing status according to the VIPS-model, functioned after total knee arthroplasty. The objectives were to unfold the content of the telephone follow-ups according to the structure for nursing...... status and to explore the patients' views of the telephone follow-ups. BACKGROUND: The length of stay in hospital following total knee arthroplasty has fallen markedly, and patients now have to be responsible for their recovery from a very early stage. After discharge, patients may experience a variety...... Telephone follow-up was valued by total knee arthroplasties patients as representing a holistic approach and providing adequate information, counselling and support after discharge to home. Three categories were identified with regard to the patients' views: 'A means for reflection and provision of adequate...

  18. Gas data transmission system by satellite telephone; Systeme de transmission de donnees sur le gaz utilisant le telephone par satellite

    Energy Technology Data Exchange (ETDEWEB)

    Ogasawara, S.; Tanji, A. [Dengineer Co., Ltd (Japan); Akiyama, S. [Buyo Gas Company (Japan)

    2000-07-01

    Dengineer Co., Ltd. and Buyo Gas Co., Ltd. had been developing and using the data and alarm transmission system by public telephone since 1984, that was first practical use in Japan. It is very important for business management that adjusts the production value of gas by measuring gas pressures in each governor. Also, it is indispensable to know the accident of gas leakage or abnormal gas pressure quickly. But this convenient system is not spread yet in Japanese market cause of the following reasons. - Take time and cost for installation of terminal station. - Terminal station is apt to damage by thunder. - Big disaster must stop working this system. In order to solve those problems, we have developed and tested the system organized of the satellite telephone system and solar cells for power. This system will be very useful for wide place, not only Japanese market but also the area, which has no electricity and phone. Also, it will be convenient for international rescue as is able to access it from the foreign countries. (authors)

  19. Interactive, open source, travel time scenario modelling: tools to facilitate participation in health service access analysis.

    Science.gov (United States)

    Fisher, Rohan; Lassa, Jonatan

    2017-04-18

    Modelling travel time to services has become a common public health tool for planning service provision but the usefulness of these analyses is constrained by the availability of accurate input data and limitations inherent in the assumptions and parameterisation. This is particularly an issue in the developing world where access to basic data is limited and travel is often complex and multi-modal. Improving the accuracy and relevance in this context requires greater accessibility to, and flexibility in, travel time modelling tools to facilitate the incorporation of local knowledge and the rapid exploration of multiple travel scenarios. The aim of this work was to develop simple open source, adaptable, interactive travel time modelling tools to allow greater access to and participation in service access analysis. Described are three interconnected applications designed to reduce some of the barriers to the more wide-spread use of GIS analysis of service access and allow for complex spatial and temporal variations in service availability. These applications are an open source GIS tool-kit and two geo-simulation models. The development of these tools was guided by health service issues from a developing world context but they present a general approach to enabling greater access to and flexibility in health access modelling. The tools demonstrate a method that substantially simplifies the process for conducting travel time assessments and demonstrate a dynamic, interactive approach in an open source GIS format. In addition this paper provides examples from empirical experience where these tools have informed better policy and planning. Travel and health service access is complex and cannot be reduced to a few static modeled outputs. The approaches described in this paper use a unique set of tools to explore this complexity, promote discussion and build understanding with the goal of producing better planning outcomes. The accessible, flexible, interactive and

  20. Perspectives on open access high resolution digital elevation models to produce global flood hazard layers

    Science.gov (United States)

    Sampson, Christopher; Smith, Andrew; Bates, Paul; Neal, Jeffrey; Trigg, Mark

    2015-12-01

    Global flood hazard models have recently become a reality thanks to the release of open access global digital elevation models, the development of simplified and highly efficient flow algorithms, and the steady increase in computational power. In this commentary we argue that although the availability of open access global terrain data has been critical in enabling the development of such models, the relatively poor resolution and precision of these data now limit significantly our ability to estimate flood inundation and risk for the majority of the planet's surface. The difficulty of deriving an accurate 'bare-earth' terrain model due to the interaction of vegetation and urban structures with the satellite-based remote sensors means that global terrain data are often poorest in the areas where people, property (and thus vulnerability) are most concentrated. Furthermore, the current generation of open access global terrain models are over a decade old and many large floodplains, particularly those in developing countries, have undergone significant change in this time. There is therefore a pressing need for a new generation of high resolution and high vertical precision open access global digital elevation models to allow significantly improved global flood hazard models to be developed.

  1. Patient satisfaction with nurse-led telephone follow-up after curative treatment for breast cancer

    Directory of Open Access Journals (Sweden)

    Dirksen Carmen D

    2010-04-01

    Full Text Available Abstract Background Current frequent follow-up after treatment for breast cancer does not meet its intended aims, but does depend on expensive and scarce specialized knowledge for routine history taking and physical examinations. The study described in this paper compared patient satisfaction with a reduced follow-up strategy, i.e. nurse-led telephone follow-up, to satisfaction with traditional hospital follow-up. Methods Patient satisfaction was assessed among patients (n = 299 who were participants of a randomized controlled trial investigating the cost-effectiveness of several follow-up strategies in the first year after treatment for breast cancer. Data on patient satisfaction were collected at baseline, three, six and 12 months after treatment, using the Dutch version of Ware's Patient Satisfaction Questionnaire III (PSQ III. In addition to general satisfaction, the PSQ III reports on satisfaction scores for technical competence, interpersonal aspects, and access of care. Regression analysis was used to predict satisfaction scores from whether or not nurse-led telephone follow-up was received. Results Nurse-led telephone follow-up had no statistically significant influence on general patient satisfaction (p = 0.379, satisfaction with technical competence (p = 0.249, and satisfaction with interpersonal aspects (p = 0.662. Regarding access of care, patient satisfaction scores were significantly higher for patients receiving telephone follow-up (p = 0.015. However, a mean difference at 12 months of 3.1 points was judged to be not clinically relevant. Conclusions No meaningful differences were found in satisfaction scores between nurse-led telephone and hospital follow-up in the first year after breast cancer treatment. With high satisfaction scores and the potential to substantially reduce clinic visits, nurse-led telephone follow-up may be an acceptable alternative to traditional hospital follow-up. Trial registration number ISRCTN 74071417.

  2. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    Science.gov (United States)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  3. Towards a Reference Model for Open Access and Knowledge Sharing, Lessons from Systems Research

    CERN Document Server

    Di Maio, Paola

    2011-01-01

    The Open Access Movement has been striving to grant universal unrestricted access to the knowledge and data outputs of publicly funded research. leveraging the real time, virtually cost free publishing opportunities offered by the internet and the web. However, evidence suggests that in the systems engineering domain open access policies are not widely adopted. This paper presents the rationale, methodology and results of an evidence based inquiry that investigates the dichotomy between policy and practice in Open Access (OA) of systems engineering research in the UK, explores entangled dimensions of the problem space from a socio-technical perspective, and issues a set of recommendations, including a reference model outline for knowledge sharing in systems research

  4. PRESENTATION OF MANDATORY POLICY OF ACCESS CONTROL VIA THE HARRISONRUSSO-WILLIAM’S MODEL

    Directory of Open Access Journals (Sweden)

    Korolev I. D.

    2015-03-01

    Full Text Available The accepted model of the access control is realized with the monitor of safety in the protected automated information system. Models of safety are considered, as a rule, as a system which is a single whole and has the uniform monitor of safety. Nevertheless, the architecture of the real automated information systems and processes of their functioning can be characterized by distribution. The distributed automated information system consists more than of one local segment representing isolated set of subjects and objects of access. In the distributed system local segments can be realized both on the basis of discretionary, and on the basis of mandatory models of safety (i.e. to be diverse. One of directions of a safety in this case is realization of the general monitor of the safety providing the uniform (coordinated policy of access control. For safe interaction of patchwork systems it’s necessary to bring them to a single model. Hence, while the integration of information systems the problem of their interaction becomes persistent. Thus in the systems processing the information of a various level of confidentiality, it is necessary to realize mandatory access control. In given clause the mandatory policy of the safety presented by classical model of Bell-LaPadula, is described by the elements of classical model of Harrison-Russo-William. Using the mechanisms of change of a matrix access the opportunity of assignment and change of confidentiality marks is described and the observance of safe practices within the limits of mandatory access control is analyzed. The safety of application of the given approach has been proved. The perspective direction of research has been defined

  5. Telephone-Delivered Cognitive Behavioral Therapy and Telephone-Delivered Nondirective Supportive Therapy for Rural Older Adults With Generalized Anxiety Disorder: A Randomized Clinical Trial.

    Science.gov (United States)

    Brenes, Gretchen A; Danhauer, Suzanne C; Lyles, Mary F; Hogan, Patricia E; Miller, Michael E

    2015-10-01

    Generalized anxiety disorder (GAD) is common in older adults; however, access to treatment may be limited, particularly in rural areas. To examine the effects of telephone-delivered cognitive behavioral therapy (CBT) compared with telephone-delivered nondirective supportive therapy (NST) in rural older adults with GAD. Randomized clinical trial in the participants' homes of 141 adults aged 60 years and older with a principal or coprincipal diagnosis of GAD who were recruited between January 27, 2011, and October 22, 2013. Telephone-delivered CBT consisted of as many as 11 sessions (9 were required) focused on recognition of anxiety symptoms, relaxation, cognitive restructuring, the use of coping statements, problem solving, worry control, behavioral activation, exposure therapy, and relapse prevention, with optional chapters on sleep and pain. Telephone-delivered NST consisted of 10 sessions focused on providing a supportive atmosphere in which participants could share and discuss their feelings and did not provide any direct suggestions for coping. Primary outcomes included interviewer-rated anxiety severity (Hamilton Anxiety Rating Scale) and self-reported worry severity (Penn State Worry Questionnaire-Abbreviated) measured at baseline, 2 months' follow-up, and 4 months' follow-up. Mood-specific secondary outcomes included self-reported GAD symptoms (GAD Scale 7 Item) measured at baseline and 4 months' follow-up and depressive symptoms (Beck Depression Inventory) measured at baseline, 2 months' follow-up, and 4 months' follow-up. Among the 141 participants, 70 were randomized to receive CBT and 71 to receive NST. At 4 months' follow-up, there was a significantly greater decline in worry severity among participants in the telephone-delivered CBT group (difference in improvement, -4.07; 95% CI, -6.26 to -1.87; P = .004) but no significant differences in general anxiety symptoms (difference in improvement, -1.52; 95% CI, -4.07 to 1.03; P = .24). At 4 months

  6. Molecular mobility with respect to accessible volume in Monte Carlo lattice model for polymers

    Science.gov (United States)

    Diani, J.; Gilormini, P.

    2017-02-01

    A three-dimensional cubic Monte Carlo lattice model is considered to test the impact of volume on the molecular mobility of amorphous polymers. Assuming classic polymer chain dynamics, the concept of locked volume limiting the accessible volume around the polymer chains is introduced. The polymer mobility is assessed by its ability to explore the entire lattice thanks to reptation motions. When recording the polymer mobility with respect to the lattice accessible volume, a sharp mobility transition is observed as witnessed during glass transition. The model ability to reproduce known actual trends in terms of glass transition with respect to material parameters, is also tested.

  7. Coopetitive Business Models in Future Mobile Broadband with Licensed Shared Access (LSA

    Directory of Open Access Journals (Sweden)

    P. Ahokangas

    2016-08-01

    Full Text Available Spectrum scarcity forces mobile network operators (MNOs providing mobile broadband services to develop new business models that address spectrum sharing. It engages MNOs into coopetitive relationship with incumbents. Licensed Shared Access (LSA concept complements traditional licensing and helps MNOs to access new spectrum bands on a shared basis. This paper discusses spectrum sharing with LSA from business perspective. It describes how coopetition and business model are linked conceptually, and identifies the influence of coopetition on future business models in LSA. We develop business models for dominant and challenger MNOs in traditional licensing and future with LSA. The results indicate that coopetition and business model concepts are linked via value co-creation and value co-capture. LSA offers different business opportunities to dominant and challenger MNOs. Offering, value proposition, customer segments and differentiation in business models become critical in mobile broadband.

  8. Work on the CERN telephone exchanges

    CERN Multimedia

    2004-01-01

    Corrective maintenance work on the CERN telephone exchanges will be carried out on 23 September 2004, resulting in interruptions of service across the whole CERN site between 6:00 a.m. and 8:00 a.m. and from 7:00 p.m. onwards. We apologise for any inconvenience this may cause. CERN TELECOM Service Tel.: 76111 GSM: 160026- 163610 Calls between GSM mobile phones will not be affected.

  9. Changes on the CERN telephone network

    CERN Multimedia

    2003-01-01

    The continuation of ours tasks to update the network is scheduled as follows: Date Change type Affected area June 11 Update of switch N4 Meyrin Ouest Update of switch N2 Meyrin Disturbances or even interruptions of telephony services may occur from 18:30 to 00:00 hrs on the above mentioned dates. In case of problem, please send us your remarks by email to Standard.Telephone@cern.ch.

  10. Tractable Stochastic Geometry Model for IoT Access in LTE Networks

    KAUST Repository

    Gharbieh, Mohammad

    2017-02-07

    The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.

  11. MATHEMATICAL MODEL FOR ACCESS MODE OF CONTENTION-COLLISION CANCELLATION IN A STAR LAN

    Institute of Scientific and Technical Information of China (English)

    Lu Zhaoyi; Sun Lijun

    2004-01-01

    I type system model of CCCAM(Contention-Collision Cancellation Access Mode)is studied through mathematical modelling and simulation. There are two innovations: (1) in the account; (2) the time at which customers depart after having been served successfully are chosen to be the embedded point, thereby "free period" is introduced reasonably. So the mathematical modelling and analysis result in this paper are significant for application of wire star LAN and wireless star LAN.

  12. 30 CFR 57.18012 - Emergency telephone numbers.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Emergency telephone numbers. 57.18012 Section 57.18012 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND... Programs Surface and Underground § 57.18012 Emergency telephone numbers. Emergency telephone numbers...

  13. 30 CFR 56.18012 - Emergency telephone numbers.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Emergency telephone numbers. 56.18012 Section 56.18012 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND... Programs § 56.18012 Emergency telephone numbers. Emergency telephone numbers shall be posted at...

  14. 24 CFR 3285.704 - Telephone and cable TV.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Telephone and cable TV. 3285.704....704 Telephone and cable TV. Refer to § 3285.906 for considerations pertinent to installation of telephone and cable TV....

  15. 24 CFR 3285.906 - Telephone and cable TV.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Telephone and cable TV. 3285.906... Installation Instructions § 3285.906 Telephone and cable TV. It is recommended that the installation instructions explain that telephone and cable TV wiring should be installed in accordance with requirements...

  16. A Tractable Model of the LTE Access Reservation Procedure for Machine-Type Communications

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen; Min Kim, Dong; Madueño, Germán Corrales;

    2015-01-01

    A canonical scenario in Machine-Type Communications (MTC) is the one featuring a large number of devices, each of them with sporadic traffic. Hence, the number of served devices in a single LTE cell is not determined by the available aggregate rate, but rather by the limitations of the LTE access...... reservation protocol. Specifically, the limited number of contention preambles and the limited amount of uplink grants per random access response are crucial to consider when dimensioning LTE networks for MTC. We propose a low-complexity model that encompasses these two limitations and allows us to evaluate...... on the preamble collisions. A comparison with the simulated LTE access reservation procedure that follows the 3GPP specifications, confirms that our model provides an accurate estimation of the system outage event and the number of supported MTC devices....

  17. A sustainable business model for Open-Access journal publishing a proposed plan for High-Energy Physics

    CERN Document Server

    Vigen, Jens

    2007-01-01

    The High Energy Physics community over the last 15 years has achieved so-called full green Open Access through the wide dissemination of preprints via arXiv, a central subject repository managed by Cornell University. However, green Open Access does not alleviate the economic difficulties of libraries as they are still expected to offer access to versions of record of the peer-reviewed literature. For this reason the particle physics community is now addressing the issue of gold Open Access by converting a set of the existing core journals to Open Access. A Working Party has been established to bring together funding agencies, laboratories and libraries into a single consortium, called SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). This consortium will engage with publishers to build a sustainable model for Open Access publishing. In this model, subscription fees from multiple institutions are replaced by contracts with publishers of Open Access journals, where the SCOAP3 conso...

  18. A new tool for modeling dune field evolution based on an accessible, GUI version of the Werner dune model

    Science.gov (United States)

    Barchyn, Thomas E.; Hugenholtz, Chris H.

    2012-02-01

    Research into aeolian dune form and dynamics has benefited from simple and abstract cellular automata computer models. Many of these models are based upon a seminal framework proposed by Werner (1995). Unfortunately, most versions of this model are not publicly available or are not provided in a format that promotes widespread use. In our view, this hinders progress in linking model simulations to empirical data (and vice versa). To this end, we introduce an accessible, graphical user interface (GUI) version of the Werner model. The novelty of this contribution is that it provides a simple interface and detailed instructions that encourage widespread use and extension of the Werner dune model for research and training purposes. By lowering barriers for researchers to develop and test hypotheses about aeolian dune and dune field patterns, this release addresses recent calls to improve access to earth surface models.

  19. Open Access needs terminology to distinguish between Gold OA funding models

    OpenAIRE

    Eve, Martin

    2012-01-01

    Shedding further light on the wider open access debate, Martin Eve calls for a more precise terminology for the variety of Gold OA business models that currently exist to help correct the false assumption in many academics’ minds that Gold OA necessarily requires an Article Processing Charge (APC).

  20. Modeling the video distribution link in the Next Generation Optical Access Networks

    DEFF Research Database (Denmark)

    Amaya, F.; Cárdenas, A.; Tafur Monroy, Idelfonso

    2011-01-01

    In this work we present a model for the design and optimization of the video distribution link in the next generation optical access network. We analyze the video distribution performance in a SCM-WDM link, including the noise, the distortion and the fiber optic nonlinearities. Additionally, we...

  1. Econobiophysics - game of choosing. Model of selection or election process with diverse accessible information

    Science.gov (United States)

    2011-01-01

    We propose several models applicable to both selection and election processes when each selecting or electing subject has access to different information about the objects to choose from. We wrote special software to simulate these processes. We consider both the cases when the environment is neutral (natural process) as well as when the environment is involved (controlled process). PMID:21892959

  2. Online access and sharing of reality-based 3d models

    Directory of Open Access Journals (Sweden)

    Simone Minto

    2014-12-01

    Full Text Available The article presents an investigation on techniques and solutions for publishing reality-based 3D models online. The process starts from a dense point cloud and leads to a reduced textured 3D model accessible on the web with a browser. The work is divided into four phases: (i generation of a polygon mesh model, (ii 3D model segmentation, (iii simplification of the polygonal model (geometry and texture in different levels of detail (LoD and (iv publication on the web. The entire workflow is based on open source software. Comparisons with commercial solutions are also reported.

  3. TRBAC:基于信任的访问控制模型%TRBAC: Trust Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    刘武; 段海新; 张洪; 任萍; 吴建平

    2011-01-01

    访问控制是根据网络用户的身份或属性,对该用户执行某些操作或访问某些网络资源进行控制的过程.对现有访问控制模型进行分析,并针对其不足对RBAC模型进行了扩展,提出了基于信任的访问控制模型TRBAC(trust based access control model).该模型可以提供更加安全、灵活以及细粒度的动态访问授权机制,从而提高授权机制的安全性与可靠性.%Access control is a process which controls users to execute some operations or access some network resources according to the users' identity or attribution. The discretionary access control and mandatory access control are two main access control modes which are broadly used in secure operating systems. Discretionary access control is based on user identity and/or groups and mandatory access control is usually based on sensitivity labels. Neither of these two modes can completely satisfy the requirements of all access control. Discretionary access control is too loose to restrict the propagation of privileges while mandatory access control is too rigid to use flexibly. This paper analyzes current access control models, and extends the RBAC (role based access control) model aiming at its deficiency, and based on which we propose a trust based access control model (TRBAC). The TRBAC model can provide more security, flexible and fine-grained dynamic access control mechanism, and therefore improve both the security and the reliability of authorization mechanism.

  4. Maintenance of the telephone exchange in building 40

    CERN Multimedia

    2006-01-01

    In order to secure the power supply of the telephone exchange in Building 40, maintenance work will be done on 18th December from 7.30 am to 8 am. During this intervention, the fixed telephone services in Building 39 and 40 will be interrupted. The fixed telephone services in other CERN buildings will not be affected by this maintenance. The mobile telephone services (GSM) will not be affected. For more details, please send your questions to Standard.Telephone@cern.ch Telecom Services IT/CS

  5. [Evaluation of 2 inanimate models to improve percutaneous fluoroscopy-guided renal access time].

    Science.gov (United States)

    Maldonado-Alcaraz, Efraín; González-Meza García, Fernando; Serrano-Brambila, Eduardo Alonso

    2015-01-01

    Training devices for percutaneous renal access are expensive, have hazardous biological materials, or radiation. Two devices were designed that eliminate some or all of these characteristics (ManiPERC and iPERC). To compare the improvement in access time to the posterior lower calix with 2 inanimate models in a group of Urology residents. Quasi-experimental clinical trial with 16 Urology residents to compare the improvement over time of percutaneous renal access by training in 2 inanimate models (iPERC: simulated fluoroscopy and ManiPERC: real fluoroscopy). Subjects were assigned to one of 2 groups (iPERC and ManiPERC) and a video analysis of all of them was performed before and after 20 training sessions. Both groups improved their access time; with iPERC from 133.88±41.40 to 76±12.62s (p=0.006) and from 176.5±85.81 to 68.75 to 18.40s (p=0.007) with ManiPERC. Comparing iPERC versus ManiPERC there was no difference between them in improving access time (ANCOVA: Model F (1.13)=1.598, p=0.228). Both models are equivalent in improving skills; however, even though none of them generated bio-waste, the absence of radioactive emissions makes iPERC the more advantageous model. Copyright © 2015 Academia Mexicana de Cirugía A.C. Published by Masson Doyma México S.A. All rights reserved.

  6. Consistency maintenance for constraint in role-based access control model

    Institute of Scientific and Technical Information of China (English)

    韩伟力; 陈刚; 尹建伟; 董金祥

    2002-01-01

    Constraint is an important aspect of role-based access control and is sometimes argued to be the principal motivation for role-based access control (RBAC). But so far'few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces correaponding formal rules, rulebased reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally,the paper introduces briefly the application of consistency maintenance in ZD-PDM, an enterprise-ori-ented product data management (PDM) system.

  7. Consistency maintenance for constraint in role-based access control model

    Institute of Scientific and Technical Information of China (English)

    韩伟力; 陈刚; 尹建伟; 董金祥

    2002-01-01

    Constraint is an important aspect of role-based access control and is sometimes argued to be the principal motivation for role-based access control (RBAC). But so far few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces corresponding formal rules, rule-based reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally, the paper introduces briefly the application of consistency maintenance in ZD-PDM, an enterprise-oriented product data management (PDM) system.

  8. The effects of mobile telephoning on driving performance.

    Science.gov (United States)

    Brookhuis, K A; de Vries, G; de Waard, D

    1991-08-01

    The effects of telephoning while driving were studied in three different traffic conditions, i.e. in light traffic on a quiet motorway, in heavy traffic on a four-lane ring-road, and in city traffic. Twelve subjects, unfamiliar with mobile telephones, drove an instrumented vehicle for one hour each day during three weeks and while in each of the three traffic conditions, had to operate the mobile telephone for a short while. To ensure a fixed "heavy traffic load" in the second condition, the subjects were instructed to follow another instrumented vehicle (at a safe distance). The results showed a significant effect of telephoning while driving as opposed to normal driving (i.e., not involving telephone conversation), on the effort subjectively measured by an effort scale and objectively measured by heartrate indices and on some of the measured parameters of driving performance. One half of the subjects had to operate the telephone manually, the other half performed the telephone task with a handsfree mobile telephone set. The subjects who operated the handsfree telephone showed better control over the test vehicle than the subjects who operated the handheld telephone, as measured by the steering wheel movements. Also, a clear improvement over time in the course of the 15 test days was found for some of the measurements. As a consequence of the results, some advice concerning mobile telephoning can be given to authorities, manufacturers, and users.

  9. Modeling people with motor disabilities to empower the automatic accessibility and ergonomic assessment of new products.

    Science.gov (United States)

    Kaklanis, Nikolaos; Stavropoulos, Georgios; Tzovaras, Dimitrios

    2015-11-01

    Virtual User Models (VUMs) can be a valuable tool for accessibility and ergonomic evaluation of designs in simulation environments. As increasing the accessibility of a design is usually translated into additional costs and increased development time, the need for specifying the percentage of population for which the design will be accessible is crucial. This paper addresses the development of VUMs representing specific groups of people with disabilities. In order to create such VUMs, we need to know the functional limitations, i.e. disability parameters, caused by each disability and their variability over the population. Measurements were obtained from 90 subjects with motor disabilities and were analyzed using both parametric and nonparametric regression methods as well as a proposed hybrid regression method able to handle small sample sizes. Validation results showed that in most cases the proposed regression analysis can produce valid estimations on the variability of each disability parameter.

  10. An exploration of multilevel modeling for estimating access to drinking-water and sanitation.

    Science.gov (United States)

    Wolf, Jennyfer; Bonjour, Sophie; Prüss-Ustün, Annette

    2013-03-01

    Monitoring progress towards the targets for access to safe drinking-water and sanitation under the Millennium Development Goals (MDG) requires reliable estimates and indicators. We analyzed trends and reviewed current indicators used for those targets. We developed continuous time series for 1990 to 2015 for access to improved drinking-water sources and improved sanitation facilities by country using multilevel modeling (MLM). We show that MLM is a reliable and transparent tool with many advantages over alternative approaches to estimate access to facilities. Using current indicators, the MDG target for water would be met, but the target for sanitation missed considerably. The number of people without access to such services is still increasing in certain regions. Striking differences persist between urban and rural areas. Consideration of water quality and different classification of shared sanitation facilities would, however, alter estimates considerably. To achieve improved monitoring we propose: (1) considering the use of MLM as an alternative for estimating access to safe drinking-water and sanitation; (2) completing regular assessments of water quality and supporting the development of national regulatory frameworks as part of capacity development; (3) evaluating health impacts of shared sanitation; (4) using a more equitable presentation of countries' performances in providing improved services.

  11. Usability Evaluation of Notebook Computers and Cellular Telephones Among Users with Visual and Upper Extremity Disabilities

    OpenAIRE

    Mooney, Aaron Michael

    2002-01-01

    Information appliances such as notebook computers and cellular telephones are becoming integral to the lives of many. These devices facilitate a variety of communication tasks, and are used for employment, education, and entertainment. Those with disabilities, however, have limited access to these devices, due in part to product designs that do not consider their special needs. A usability evaluation can help identify the needs and difficulties those with disabilities have when using a pro...

  12. A 4D-Role Based Access Control Model for Multitenancy Cloud Platform

    Directory of Open Access Journals (Sweden)

    Jiangfeng Li

    2016-01-01

    Full Text Available Since more and more applications and services have been transferred from servers in the B/S architecture to cloud, user access control has become a significant part in a multitenancy cloud platform. Role based access control model makes users participate in an enterprise system as particular identities. However, in a multitenancy cloud environment, it has a high probability that the information of tenants has been leaked by using existing role based access control (RBAC model. Moreover, management problems may emerge in the multitenancy platform with the increment of the number of tenants. In this paper, a novel concept of 4D-role is presented. With a detailed definition on the concept of 4D-role, a 4D-role based multitenancy model is proposed for running various applications and services in the multitenancy cloud platform. A theoretical analysis indicates that the model has the characters of tenant isolation, role hierarchy, and administration independence. The three characters are also verified by experimental evaluation. Moreover, the evaluation results indicate that the model has a good performance in using cloud resources when large-scale users are operating in the cloud platform simultaneously.

  13. Modeling coding-sequence evolution within the context of residue solvent accessibility

    Directory of Open Access Journals (Sweden)

    Scherrer Michael P

    2012-09-01

    Full Text Available Abstract Background Protein structure mediates site-specific patterns of sequence divergence. In particular, residues in the core of a protein (solvent-inaccessible residues tend to be more evolutionarily conserved than residues on the surface (solvent-accessible residues. Results Here, we present a model of sequence evolution that explicitly accounts for the relative solvent accessibility of each residue in a protein. Our model is a variant of the Goldman-Yang 1994 (GY94 model in which all model parameters can be functions of the relative solvent accessibility (RSA of a residue. We apply this model to a data set comprised of nearly 600 yeast genes, and find that an evolutionary-rate ratio ω that varies linearly with RSA provides a better model fit than an RSA-independent ω or an ω that is estimated separately in individual RSA bins. We further show that the branch length t and the transition-transverion ratio κ also vary with RSA. The RSA-dependent GY94 model performs better than an RSA-dependent Muse-Gaut 1994 (MG94 model in which the synonymous and non-synonymous rates individually are linear functions of RSA. Finally, protein core size affects the slope of the linear relationship between ω and RSA, and gene expression level affects both the intercept and the slope. Conclusions Structure-aware models of sequence evolution provide a significantly better fit than traditional models that neglect structure. The linear relationship between ω and RSA implies that genes are better characterized by their ω slope and intercept than by just their mean ω.

  14. Model of traffic access mode and railway station choice of suburban railway system in Slovenia

    Directory of Open Access Journals (Sweden)

    Gregor RAK

    2014-12-01

    Full Text Available This article presents the establishment of a model of understanding the access mode and railway station choice of Slovenian passengers. Therefore, a model has been designed to predict the determination of existing decision making preferences of railway users about the access mode and railway station choice with a stated preference survey and face to face method. The target group in the survey were railway passengers in the suburban environment that use the rail for work and school purposes. The total number of respondents was 412. The survey showed that most passengers access the railway station with car (60,2%, by foot (26,2%, with public transport (bus – 8,3% and with bike (5,3%. Average distance to the station is 4,9 km, average time of access is 10,5 min. Upon exit most passengers walk to the final destination (84,5%, use the public transport (bus – 14,1%, car (1,2% or bike (0,2%. Average time from exit of the train to final destination is 13,1 min, average distance is 1,58 km.

  15. Telephone interventions for adherence to colpocytological examination

    Directory of Open Access Journals (Sweden)

    Thais Marques Lima

    Full Text Available ABSTRACT Objective: to test the effects of behavioral and educational intervention by telephone on adherence of women with inappropriate periodicity to colpocytological examination. Method: quasi-experimental study with a sample of 524 women, selected with the following inclusion criteria: be aged between 25 and 64 years, have initiated sexual activity, have inappropriate periodicity of examination and have mobile or landline phone. The women were divided into two groups for application of behavioral and educational intervention by telephone. It was used an intervention script according to the principles of Motivational Interviewing. Results: on comparing the results before and after the behavioral and educational interventions, it was found that there was a statistically significant change (p = 0.0283 with increase of knowledge of women who participated in the educational intervention. There was no change in the attitude of women of any of the groups and there was an increase of adherence to colpocytological examination in both groups (p < 0.0001, with greater adherence of women participating in the behavioral group (66.8%. Conclusion: the behavioral and educational interventions by phone were effective in the adherence of women to colpocytological examination, representing important strategies for permanent health education and promotion of care for the prevention of cervical cancer.

  16. Estimating spatial accessibility to facilities on the regional scale: an extended commuting-based interaction potential model

    Directory of Open Access Journals (Sweden)

    Charreire Hélène

    2011-01-01

    Full Text Available Abstract Background There is growing interest in the study of the relationships between individual health-related behaviours (e.g. food intake and physical activity and measurements of spatial accessibility to the associated facilities (e.g. food outlets and sport facilities. The aim of this study is to propose measurements of spatial accessibility to facilities on the regional scale, using aggregated data. We first used a potential accessibility model that partly makes it possible to overcome the limitations of the most frequently used indices such as the count of opportunities within a given neighbourhood. We then propose an extended model in order to take into account both home and work-based accessibility for a commuting population. Results Potential accessibility estimation provides a very different picture of the accessibility levels experienced by the population than the more classical "number of opportunities per census tract" index. The extended model for commuters increases the overall accessibility levels but this increase differs according to the urbanisation level. Strongest increases are observed in some rural municipalities with initial low accessibility levels. Distance to major urban poles seems to play an essential role. Conclusions Accessibility is a multi-dimensional concept that should integrate some aspects of travel behaviour. Our work supports the evidence that the choice of appropriate accessibility indices including both residential and non-residential environmental features is necessary. Such models have potential implications for providing relevant information to policy-makers in the field of public health.

  17. Open Access Papers Have a Greater Citation Advantage in the Author-Pays Model

    Directory of Open Access Journals (Sweden)

    Elaine Sullo

    2016-03-01

    Full Text Available Objective – To investigate the citation performance of open access (OA and toll access (TA papers published in author-pays open access journals. Design – Longitudinal citation analysis. Setting – Publications in Springer and Elsevier’s author-pays open access journals. Subjects – 633 journals published using the author-pays model. This model encompasses both journals where the article processing charge (APC is required and journals in which authors can request open access and voluntarily pay APCs for accepted manuscripts. Methods – The authors identified APC funded journals (journals funded by mandatory author processing charges as well as those where authors voluntarily paid a fee in order to have their articles openly accessible from both Springer and Elsevier, and analyzed papers published in these journals from 2007 to 2011. The authors excluded journals that adopted the APC model later than 2007. To identify Springer titles, the authors created a search strategy to identify open access articles in SpringerLink. A total of 576 journals were identified and double checked in the Sherpa-Romeo database (a database of copyright and open access self-archiving policies of academic journals to verify their open access policies. The authors then downloaded the journal content using SpringerLink, and using Springer Author-Mapper, separated out the open access articles from the toll access articles. In order to identify the Elsevier APC funded journals, the authors referred to “Open Access Journal Directory: A-Z,” which contained 35 OA journals (p. 584. Once the authors consulted “Sponsored articles” issued by Elsevier and verified titles in Sherpa-Romeo, they identified 57 journals that fit the “author-pays” model. The bibliographic information was downloaded and OA articles were separated from TA articles. The authors confirmed that all journals were indeed OA publications by downloading the full-text from off-campus locations

  18. An interaction-based access control model (IBAC) for collaborative services

    Energy Technology Data Exchange (ETDEWEB)

    Altunay, Mine; /Fermilab; Byrd, Gregory T.; Brown, Doug E.; Dean, Ralph A.; /North Carolina State U.

    2008-04-01

    A collaboration is a collection of services that work together to achieve a common goal. Although collaborations help when tackling difficult problems, they lead to security issues. First, a collaboration is often performed by services that are drawn from different security domains. Second, a service interacts with multiple peer services during the collaboration. These interactions are not isolated from one another--e.g., data may flow through a sequence of different services. As a result, a service is exposed to multiple peer services in varying degrees, leading to different security threats. We identify the types of interactions that can be present in collaborations, and discuss the security threats due to each type. We propose a model for representing the collaboration context so that a service can be made aware of the existing interactions. We provide an access control model for a service participating in a collaboration. We couple our access control model with a policy model, so that the access requirements from collaborations can be expressed and evaluated.

  19. Capacity models on expressway near a bus bay stop with an access

    Institute of Scientific and Technical Information of China (English)

    张洪宾; 孙小端; 贺玉龙; 宇仁德

    2015-01-01

    To determinate the expressway capacity near a bus bay stop with an access, capacity models on the expressway near a bus stop with an access were developed on the basis of gap acceptance theory and queuing theory. Depending on a bus stop position to an entrance or an exit ramp, the capacity models were developed for four cases. Bus bay stops with overflow and bus bay stops without overflow were considered. A comparison of simulation experiment and model calculation was carried out. Results show that the suggested models have high accuracy and reliability, at bus arrival rate below 60 vehicles per hour (veh/h) or vehicle volumes at the entrance and the exit below 200 passenger cars units per hour (pcu/h), and there are no significant difference in the capacities for four cases. When bus arrival rate is above 240 veh/h, the capacities of all four cases will decline rapidly. With berth number increasing, the increasing of the capacities is no obvious for four cases. As the bus arrival rate and vehicle volumes at the entrance and the exit increase, bus stops located downstream of an entrance and upstream of an exit have a remarkably effect on the capacities. The latter case is much heavier than the former. Those results can be used to traffic design and optimization on urban expressway near a bus stop with an access.

  20. Modeling of electron conduction in contact resistive random access memory devices as random telegraph noise.

    Science.gov (United States)

    Tseng, Yuan Heng; Shen, Wen Chao; Lin, Chrong Jung

    2012-04-01

    The intense development and study of resistive random access memory (RRAM) devices has opened a new era in semiconductor memory manufacturing. Resistive switching and carrier conduction inside RRAM films have become critical issues in recent years. Electron trapping/detrapping behavior is observed and investigated in the proposed contact resistive random access memory (CR-RAM) cell. Through the fitting of the space charge limiting current (SCLC) model, and analysis in terms of the random telegraph noise (RTN) model, the temperature-dependence of resistance levels and the high-temperature data retention behavior of the contact RRAM film are successfully and completely explained. Detail analyses of the electron capture and emission from the traps by forward and reverse read measurements provide further verifications for hopping conduction mechanism and current fluctuation discrepancies.

  1. INTEGRATIVE METHOD OF TEACHING INFORMATION MODELING IN PRACTICAL HEALTH SERVICE BASED ON MICROSOFT ACCESS QUERIES

    Directory of Open Access Journals (Sweden)

    Svetlana A. Firsova

    2016-06-01

    Full Text Available Introduction: this article explores the pedagogical technology employed to teach medical students foundations of work with MICROSOFT ACCESS databases. The above technology is based on integrative approach to the information modeling in public health practice, drawing upon basic didactic concepts that pertain to objects and tools databases created in MICROSOFT ACCESS. The article examines successive steps in teaching the topic “Queries in MICROSOFT ACCESS” – from simple queries to complex ones. The main attention is paid to such components of methodological system, as the principles and teaching methods classified according to the degree of learners’ active cognitive activity. The most interesting is the diagram of the relationship of learning principles, teaching methods and specific types of requests. Materials and Methods: the authors used comparative analysis of literature, syllabi, curricula in medical informatics taught at leading medical universities in Russia. Results: the original technique of training in putting queries with databases of MICROSOFT ACCESS is presented for analysis of information models in practical health care. Discussion and Conclusions: it is argued that the proposed pedagogical technology will significantly improve the effectiveness of teaching the course “Medical Informatics”, that includes development and application of models to simulate the operation of certain facilities and services of the health system which, in turn, increases the level of information culture of practitioners.

  2. A Model-driven Role-based Access Control for SQL Databases

    Directory of Open Access Journals (Sweden)

    Raimundas Matulevičius

    2015-07-01

    Full Text Available Nowadays security has become an important aspect in information systems engineering. A mainstream method for information system security is Role-based Access Control (RBAC, which restricts system access to authorised users. While the benefits of RBAC are widely acknowledged, the implementation and administration of RBAC policies remains a human intensive activity, typically postponed until the implementation and maintenance phases of system development. This deferred security engineering approach makes it difficult for security requirements to be accurately captured and for the system’s implementation to be kept aligned with these requirements as the system evolves. In this paper we propose a model-driven approach to manage SQL database access under the RBAC paradigm. The starting point of the approach is an RBAC model captured in SecureUML. This model is automatically translated to Oracle Database views and instead-of triggers code, which implements the security constraints. The approach has been fully instrumented as a prototype and its effectiveness has been validated by means of a case study.

  3. Can “Feature” be used to Model the Changing Access Control Policies?

    Directory of Open Access Journals (Sweden)

    K.Shantha Kumari

    2012-11-01

    Full Text Available Access control policies [ACPs] regulate the access to data and resources in information systems. These ACPs are framed from the functional requirements and the Organizational security & privacy policies. It was found to be beneficial, when the ACPs are included in the early phases of the software development leading to secure development of information systems. Many approaches are available for including the ACPs in requirements and design phase. They relied on UML artifacts, Aspects and also Feature for this purpose. But the earlier modeling approaches are limited in expressing the evolving ACPs due to organizational policy changes and business process modifications. In this paper, we analyze, whether “Feature”- defined as an increment in program functionality can be used as a modeling entity to represent the Evolving Access control requirements. We discuss the two prominent approaches that use Feature in modeling ACPs. Also we have a comparative analysis to find the suitability of Features in the context of changing ACPs. We conclude with our findings and provide directions for further research.

  4. QoS Modeling for End-to-End Performance Evaluation over Networks with Wireless Access

    Directory of Open Access Journals (Sweden)

    Gerardo Gómez

    2010-01-01

    Full Text Available This paper presents an end-to-end Quality of Service (QoS model for assessing the performance of data services over networks with wireless access. The proposed model deals with performance degradation across protocol layers using a bottom-up strategy, starting with the physical layer and moving on up to the application layer. This approach makes it possible to analytically assess performance at different layers, thereby facilitating a possible end-to-end optimization process. As a representative case, a scenario where a set of mobile terminals connected to a streaming server through an IP access node has been studied. UDP, TCP, and the new TCP-Friendly Rate Control (TFRC protocols were analyzed at the transport layer. The radio interface consisted of a variable-rate multiuser and multichannel subsystem, including retransmissions and adaptive modulation and coding. The proposed analytical QoS model was validated on a real-time emulator of an end-to-end network with wireless access and proved to be very useful for the purposes of service performance estimation and optimization.

  5. Improving Maternal Healthcare Access and Neonatal Survival through a Birthing Home Model in Rural Haiti

    Directory of Open Access Journals (Sweden)

    Elizabeth Wickstrom

    2007-10-01

    Full Text Available High neonatal mortality in Haiti is sustained by limited access to essential maternity services, particularly for Haiti’s rural population. We investigated the feasibility of a rural birthing home model to provide basic prenatal, delivery, and neonatal services for women with uncomplicated pregnancies while simultaneously providing triage and transport of women with pregnancy related complications. The model included consideration of the local context, including women’s perceptions of barriers to healthcare access and available resources to implement change. Evaluation methods included the performance of a baseline community census and collection of pregnancy histories from 791 women living in a defined area of rural Haiti. These retrospective data were compared with pregnancy outcome for 668 women subsequently receiving services at the birthing home. Of 764 reported most recent pregnancies in the baseline survey, 663(87% occurred at home with no assistance from skilled health staff. Of 668 women followed after opening of the birthing home, 514 (77% subsequently gave birth at the birthing home, 94 (14% were referred to a regional hospital for delivery, and only 60 (9% delivered at home or on the way to the birthing home. Other measures of clinical volume and patient satisfaction also indicated positive changes in health care seeking. After introduction of the birthing home, fewer neonates died than predicted by historical information or national statistics. The present experience points out the feasibility of a rural birthing home model to increase access to essential maternity services.

  6. Telephone titration of heart failure medications.

    Science.gov (United States)

    Steckler, Anne E; Bishu, Kalkidan; Wassif, Heba; Sigurdsson, Gardar; Wagner, Judy; Jaenicke, Connie; Vats, Shashank; Rector, Thomas; Anand, Inder S

    2011-01-01

    In clinical practice, heart failure (HF) medications are underused and prescribed at lower than recommended doses. Telephone care is an option that could help to titrate HF medication in a timely manner. We describe our experience of a nurse-run, cardiologist- or nurse practitioner-supervised clinic to up-titrate HF medications via telephone. Patients with the diagnosis of HF, New York Heart Association classes I to III, were referred to a registered nurse-run, cardiologist-/nurse practitioner-supervised HF medication titration clinic. Clinical and medication data collected at enrollment to the clinic and at 3 to 6 months after optimization of HF medications in patients who did or did not reach the target doses were compared. Effect on left ventricular (LV) function was also evaluated. There were 79 patients in the evaluation: 64 with HF and LV systolic dysfunction (LVSD) and the remaining 15 with HF and preserved ejection fraction (EF). Seventy-two percent of patients with LVSD were on an angiotensin-converting enzyme inhibitor (ACEI) or angiotensin receptor blocker (ARB), and 61% were on a β-blocker at baseline, and this increased to 98% and 97%, respectively, after optimization. Target doses was achieved in 50% of patients for ACEI or ARB, and in 41% for β-blockers. The median time to optimization was 54 days (interquartile range, 20-97 days). The average number of phone calls at the time of optimization were 5.4 (SD, 3.7), and the average number of clinic visits was 1.9 (SD, 1.3). Reasons for not reaching the target doses included hypotension, hyperkalemia, and renal dysfunction for ACEI and bradycardia for β-blockers. Overall, the EF increased by 10% (SD, 10%) after 6 months, and 35% or greater in 42% of patients whose baseline EF was less than 35%. There were no adverse events related to the dose up-titration. Telephonic titration of HF medications was feasible and safe and was achieved in 97% patients on ACEI/ARB and β-blockers. Medication titration was

  7. How to implement ‘access to medicine’ AND enhance economic performance:business model options for global access

    OpenAIRE

    Peukert, J. (Jürgen); Fuggenthaler, T. (Thomas)

    2009-01-01

    Access to medicine’ or ‘global access’ is at the core heart of corporate responsibility for pharmaceutical companies. Corporate responsibility, however, is not restricted to a philanthropic dimension (such as donations), which is often referred to as corporate citizenship. It also includes corporate social responsibility (in the narrower sense) and corporate governance and thereby paves the way for linking corporate citizenship – “to be a good corporate citizen and contribute to the communit...

  8. Beyond 'flood hotspots': Modelling emergency service accessibility during flooding in York, UK

    Science.gov (United States)

    Coles, Daniel; Yu, Dapeng; Wilby, Robert L.; Green, Daniel; Herring, Zara

    2017-03-01

    This paper describes the development of a method that couples flood modelling with network analysis to evaluate the accessibility of city districts by emergency responders during flood events. We integrate numerical modelling of flood inundation with geographical analysis of service areas for the Ambulance Service and the Fire & Rescue Service. The method was demonstrated for two flood events in the City of York, UK to assess the vulnerability of care homes and sheltered accommodation. We determine the feasibility of emergency services gaining access within the statutory 8- and 10-min targets for high-priority, life-threatening incidents 75% of the time, during flood episodes. A hydrodynamic flood inundation model (FloodMap) simulates the 2014 pluvial and 2015 fluvial flood events. Predicted floods (with depth >25 cm and areas >100 m2) were overlain on the road network to identify sites with potentially restricted access. Accessibility of the city to emergency responders during flooding was quantified and mapped using; (i) spatial coverage from individual emergency nodes within the legislated timeframes, and; (ii) response times from individual emergency service nodes to vulnerable care homes and sheltered accommodation under flood and non-flood conditions. Results show that, during the 2015 fluvial flood, the area covered by two of the three Fire & Rescue Service stations reduced by 14% and 39% respectively, while the remaining station needed to increase its coverage by 39%. This amounts to an overall reduction of 6% and 20% for modelled and observed floods respectively. During the 2014 surface water flood, 7 out of 22 care homes (32%) and 15 out of 43 sheltered accommodation nodes (35%) had modelled response times above the 8-min threshold from any Ambulance station. Overall, modelled surface water flooding has a larger spatial footprint than fluvial flood events. Hence, accessibility of emergency services may be impacted differently depending on flood mechanism

  9. Breakthroughs in telephone technology from Bell to smartphones

    CERN Document Server

    Curley, Robert

    2012-01-01

    In an age where near-instantaneous communication is available through all manners of portable and pocket-sized devices, it is easy to overlook the genesis of telecommunication instrumentation-the telephone. Since Alexander Graham Bell patented the first phone in the 1800s, the telephone has undergone numerous changes to its look and functionality. This detailed volume examines the development of the telephone and related technologies, including everything from the transistor to fax machines, smart phones, and VoIP technology.

  10. Telephone operator change: your questions answered

    CERN Multimedia

    CERN Bulletin

    2015-01-01

    CERN will be changing mobile telephone operators on 24 June. As the community prepares for the summer switchover, everyone has questions. What brought on the change? Why are we losing our old phone numbers? What kind of improvements will we see? "Just as with every contract at CERN, we issue calls for tenders every few years to ensure we are still receiving the best possible service," explains Tony Cass, from the Communication Systems group within the IT department. "As we came to the end of our contract with Sunrise, we put out a call for tenders, which was won by Swisscom. Not only is their pricing more competitive, they will also be providing better service conditions." The scope of these new service conditions is multifaceted: there will be improvements to the redundancy and reliability of the network as well as modern 4G network coverage in the LHC tunnel. "People will also see their mobile phone bills decrease," says Tony. "This will esp...

  11. Barriers of access to care in a managed competition model: lessons from Colombia

    Directory of Open Access Journals (Sweden)

    Mogollón-Pérez Amparo Susana

    2010-10-01

    Full Text Available Abstract Background The health sector reform in Colombia, initiated by Law 100 (1993 that introduced a managed competition model, is generally presented as a successful experience of improving access to care through a health insurance regulated market. The study's objective is to improve our understanding of the factors influencing access to the continuum of care in the Colombian managed competition model, from the social actors' point of view. Methods An exploratory, descriptive-interpretative qualitative study was carried out, based on case studies of four healthcare networks in rural and urban areas. Individual semi-structured interviews were conducted to a three stage theoretical sample: I cases, II providers and III informants: insured and uninsured users (35, health professionals (51, administrative personnel (20, and providers' (18 and insurers' (10 managers. Narrative content analysis was conducted; segmented by cases, informant's groups and themes. Results Access, particularly to secondary care, is perceived as complex due to four groups of obstacles with synergetic effects: segmented insurance design with insufficient services covered; insurers' managed care and purchasing mechanisms; providers' networks structural and organizational limitations; and, poor living conditions. Insurers' and providers' values based on economic profit permeate all factors. Variations became apparent between the two geographical areas and insurance schemes. In the urban areas barriers related to market functioning predominate, whereas in the rural areas structural deficiencies in health services are linked to insufficient public funding. While financial obstacles are dominant in the subsidized regime, in the contributory scheme supply shortage prevails, related to insufficient private investment. Conclusions The results show how in the Colombian healthcare system structural and organizational barriers to care access, that are common in developing countries

  12. A cluster randomised trial of a telephone-based intervention for parents to increase fruit and vegetable consumption in their 3- to 5-year-old children: study protocol

    Directory of Open Access Journals (Sweden)

    Fletcher Amanda

    2010-04-01

    Full Text Available Abstract Background Inadequate fruit and vegetable consumption in childhood increases the risk of developing chronic disease. Despite this, a substantial proportion of children in developed nations, including Australia, do not consume sufficient quantities of fruits and vegetables. Parents are influential in the development of dietary habits of young children but often lack the necessary knowledge and skills to promote healthy eating in their children. The aim of this study is to assess the efficacy of a telephone-based intervention for parents to increase the fruit and vegetable consumption of their 3- to 5-year-old children. Methods/Design The study, conducted in the Hunter region of New South Wales, Australia, employs a cluster randomised controlled trial design. Two hundred parents from 15 randomly selected preschools will be randomised to receive the intervention, which consists of print resources and four weekly 30-minute telephone support calls delivered by trained telephone interviewers. The calls will assist parents to increase the availability and accessibility of fruit and vegetables in the home, create supportive family eating routines and role-model fruit and vegetable consumption. A further two hundred parents will be randomly allocated to the control group and will receive printed nutrition information only. The primary outcome of the trial will be the change in the child's consumption of fruit and vegetables as measured by the fruit and vegetable subscale of the Children's Dietary Questionnaire. Pre-intervention and post-intervention parent surveys will be administered over the telephone. Baseline surveys will occur one to two weeks prior to intervention delivery, with follow-up data collection calls occurring two, six, 12 and 18 months following baseline data collection. Discussion If effective, this telephone-based intervention may represent a promising public health strategy to increase fruit and vegetable consumption in

  13. Accessing and Utilizing Remote Sensing Data for Vectorborne Infectious Diseases Surveillance and Modeling

    Science.gov (United States)

    Kiang, Richard; Adimi, Farida; Kempler, Steven

    2008-01-01

    Background: The transmission of vectorborne infectious diseases is often influenced by environmental, meteorological and climatic parameters, because the vector life cycle depends on these factors. For example, the geophysical parameters relevant to malaria transmission include precipitation, surface temperature, humidity, elevation, and vegetation type. Because these parameters are routinely measured by satellites, remote sensing is an important technological tool for predicting, preventing, and containing a number of vectorborne infectious diseases, such as malaria, dengue, West Nile virus, etc. Methods: A variety of NASA remote sensing data can be used for modeling vectorborne infectious disease transmission. We will discuss both the well known and less known remote sensing data, including Landsat, AVHRR (Advanced Very High Resolution Radiometer), MODIS (Moderate Resolution Imaging Spectroradiometer), TRMM (Tropical Rainfall Measuring Mission), ASTER (Advanced Spaceborne Thermal Emission and Reflection Radiometer), EO-1 (Earth Observing One) ALI (Advanced Land Imager), and SIESIP (Seasonal to Interannual Earth Science Information Partner) dataset. Giovanni is a Web-based application developed by the NASA Goddard Earth Sciences Data and Information Services Center. It provides a simple and intuitive way to visualize, analyze, and access vast amounts of Earth science remote sensing data. After remote sensing data is obtained, a variety of techniques, including generalized linear models and artificial intelligence oriented methods, t 3 can be used to model the dependency of disease transmission on these parameters. Results: The processes of accessing, visualizing and utilizing precipitation data using Giovanni, and acquiring other data at additional websites are illustrated. Malaria incidence time series for some parts of Thailand and Indonesia are used to demonstrate that malaria incidences are reasonably well modeled with generalized linear models and artificial

  14. 49 CFR 39.39 - How do PVOs ensure that passengers with disabilities are able to use accessible cabins?

    Science.gov (United States)

    2010-10-01

    ... access to them. (b) You must, with respect to reservations made by any means (e.g., telephone, Internet... accessible cabin. (g) To prevent fraud in the assignment of accessible cabins (e.g., attempts by...

  15. 角色访问控制%Role based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    毛碧波; 孙玉芳

    2003-01-01

    Role based access control (RBAC)was proposed in 70's, and prevailed in 90's, and then Sandhu etc pro-posed formal RBAC model. Now RBAC is attracting increasing attention, and many governmental and commercial or-ganizations have adopted it, its importance is more and more apparent. In this paper we illuminates the distinctionsand similarities of role and user groups, and based the model that was proposed by Sandhu, we examine the relation-ship of role hierarchies and role constraints and formally describes that, and explain the most important part of roleconstraints ,which is separation of duties.

  16. Universal model for collective access patterns in the Internet traffic dynamics: A superstatistical approach

    Science.gov (United States)

    Tamazian, A.; Nguyen, V. D.; Markelov, O. A.; Bogachev, M. I.

    2016-07-01

    We suggest a universal phenomenological description for the collective access patterns in the Internet traffic dynamics both at local and wide area network levels that takes into account erratic fluctuations imposed by cooperative user behaviour. Our description is based on the superstatistical approach and leads to the q-exponential inter-session time and session size distributions that are also in perfect agreement with empirical observations. The validity of the proposed description is confirmed explicitly by the analysis of complete 10-day traffic traces from the WIDE backbone link and from the local campus area network downlink from the Internet Service Provider. Remarkably, the same functional forms have been observed in the historic access patterns from single WWW servers. The suggested approach effectively accounts for the complex interplay of both “calm” and “bursty” user access patterns within a single-model setting. It also provides average sojourn time estimates with reasonable accuracy, as indicated by the queuing system performance simulation, this way largely overcoming the failure of Poisson modelling of the Internet traffic dynamics.

  17. Open Access Publishing in High-Energy Physics the SCOAP$^{3}$ model

    CERN Document Server

    Mele, S

    2009-01-01

    The Open Access (OA) movement is gaining an increasing momentum: its goal is to grant anyone, anywhere and anytime free access to the results of publicly funded scientific research. The High- Energy Physics (HEP) community has pioneered OA for decades, through its widespread “pre-print culture”. After almost half a century of worldwide dissemination of pre-prints, in paper first and electronically later, OA journals are becoming the natural evolution of scholarly communication in HEP. Among other OA business models, the one based on a sponsoring consortium appears as the most viable option for a transition of the HEP peer-reviewed literature to OA. The Sponsoring Consortium for Open Access Publishing in Particle Physics (SCOAP3) is proposed as a central body to remunerate publishers for their peer-review service, effectively replacing the “reader-pays” model of traditional subscriptions with an “author-side” funding, without any direct financial burden on individual authors and research groups. Su...

  18. A Reprocessing Model for Complete Execution of RFID Access Operations on Tag Memory

    Institute of Scientific and Technical Information of China (English)

    Wooseok Ryu; Bonghee Hong; Joonho Kwon; Ge Yu

    2012-01-01

    This paper investigates the problem of inconsistent states of radio frequency identification (RFID) tag data caused by incomplete execution of read/write operations during access to RFID tag memory.Passive RFID tags require RF communication to access memory data.This study is motivated by the volatility of RF communication,where instability is caused by intermittent connections and uncertain communication.If a given tag disappears from the communication area of the reader during the reading or writing of tag data,the operation is incomplete,resulting in an inconsistent state of tag data.To avoid this inconsistency,it is necessary to ensure that any operations on tag memory are completed.In this paper,we propose an asynchronous reprocessing model for finalizing any incomplete execution of read/write operations to remove inconsistent states.The basic idea is to resume incomplete operations autonomously by detecting a tag's re-observation from any reader.To achieve this,we present a concurrency control mechanism based on continuous query processing that enables the suspended tag operations to be re-executed.The performance study shows that our model improves the number of successful operations considerably in addition to suppressing inconsistent data access completely.

  19. An automated telephone-based smoking cessation education and counseling system.

    Science.gov (United States)

    Ramelson, H Z; Friedman, R H; Ockene, J K

    1999-02-01

    Automated patient education and counseling over the telephone is a convenient and inexpensive method for modifying health-related behaviors. A computer-controlled, telecommunications technology called Telephone-Linked Care (TLC) was used to develop a behavioral intervention to assist smokers to quit and to prevent relapse. The education and counseling is offered through a series of interactive telephone conversations which can take place in the smoker's home. The system's automated dialogues are driven by an expert system that controls the logic. The content is derived from the Transtheoretical Model of behavioral change, principles of Social Cognitive Theory, strategies of patient-centered counseling and recommendations of clinical experts in smoking cessation. The system asks questions, provides information, gives positive reinforcement and feedback, and makes suggestions for behavioral change. Information that the patient communicates is stored and is used to influence the content of subsequent conversations.

  20. Future Arctic marine access: analysis and evaluation of observations, models, and projections of sea ice

    Directory of Open Access Journals (Sweden)

    T. S. Rogers

    2013-02-01

    Full Text Available There is an emerging need for regional applications of sea ice projections to provide more accuracy and greater detail to scientists, national, state and local planners, and other stakeholders. The present study offers a prototype for a comprehensive, interdisciplinary study to bridge observational data, climate model simulations, and user needs. The study's first component is an observationally based evaluation of Arctic sea ice trends during 1980–2008, with an emphasis on seasonal and regional differences relative to the overall pan-Arctic trend. Regional sea ice loss has varied, with a significantly larger decline of winter maximum (January–March extent in the Atlantic region than in other sectors. A lead–lag regression analysis of Atlantic sea ice extent and ocean temperatures indicates that reduced sea ice extent is associated with increased Atlantic Ocean temperatures. Correlations between the two variables are greater when ocean temperatures lag rather than lead sea ice. The performance of 13 global climate models is evaluated using three metrics to compare sea ice simulations with the observed record. We rank models over the pan-Arctic domain and regional quadrants and synthesize model performance across several different studies. The best performing models project reduced ice cover across key access routes in the Arctic through 2100, with a lengthening of seasons for marine operations by 1–3 months. This assessment suggests that the Northwest and Northeast Passages hold potential for enhanced marine access to the Arctic in the future, including shipping and resource development opportunities.

  1. Future Arctic marine access: analysis and evaluation of observations, models, and projections of sea ice

    Directory of Open Access Journals (Sweden)

    T. S. Rogers

    2012-09-01

    Full Text Available There is an emerging need for regional applications of sea ice projections to provide more accuracy and greater detail to scientists, national, state and local planners, and other stakeholders. The present study offers a prototype for a comprehensive, interdisciplinary study to bridge observational data, climate model simulations, and user needs. The study's first component is an observationally-based evaluation of Arctic sea ice trends during 1980–2008, with an emphasis on seasonal and regional differences relative to the overall pan-Arctic trend. Regional sea ice los has varied, with a significantly larger decline of winter maximum (January–March extent in the Atlantic region than in other sectors. A lead-lag regression analysis of Atlantic sea ice extent and ocean temperatures indicates that reduced sea ice extent is associated with increased Atlantic Ocean temperatures. Correlations between the two variables are greater when ocean temperatures lag rather than lead sea ice. The performance of 13 global climate models is evaluated using three metrics to compare sea ice simulations with the observed record. We rank models over the pan-Arctic domain and regional quadrants, and synthesize model performance across several different studies. The best performing models project reduced ice cover across key access routes in the Arctic through 2100, with a lengthening of seasons for marine operations by 1–3 months. This assessment suggests that the Northwest and Northeast Passages hold potential for enhanced marine access to the Arctic in the future, including shipping and resource development opportunities.

  2. Policy Issues in Accessibility and Interoperability of Scientific Data: Experiences from the Carbon Modeling Field

    Science.gov (United States)

    Kishor, P.; Peckham, S. D.; Gower, S. T.; Batzli, S.

    2010-12-01

    Large-scale terrestrial ecosystem modeling is highly parameterized, and requires lots of historical data. Routine model runs can easily utlize hundreds of Gigabytes, even Terabytes of data on tens, perhaps hundreds of parameters. It is a given that no one modeler can or does collect all the required data. All modelers depend upon other scientists, and governmental and research agencies for their data needs. This is where data accessibility and interoperability become crucial for the success of the project. Having well-documented and quality data available in a timely fashion can greatly assist a project's progress, while the converse can bring the project to a standstill, leading to a large amount of wasted staff time and resources. Data accessibility is a complex issue -- at best, it is an unscientific composite of a variety of factors: technological, legal, cultural, semantic, and economic. In reality, it is a concept that most scientists only worry about when they need some data, and mostly never after their project is complete. The exigencies of the vetting, review and publishing processes overtake the long-term view of making one's own data available to others with the same ease and openness that was desired when seeking data from others. This presentation describes our experience with acquiring data for our carbon modeling efforts, dealing with federal, state and local agencies, variety of data formats, some published, some not so easy to find, and documentation that ranges from excellent to non-existent. A set of indicators are proposed to place and determine the accessibility of scientific data -- those we are seeking and those we are producing -- in order to bring some transparency and clarity that can make data acquisition and sharing easier. The paper concludes with a proposal to utilize a free, open and well-recognized data marks such as CC0 (CC-Zero), Public Domain Dedication License, and CC-BY created by Creative Commons that would advertize the

  3. Optimum feedback strategy for access control mechanism modelled as stochastic differential equation in computer network

    Directory of Open Access Journals (Sweden)

    Ahmed N. U.

    2004-01-01

    Full Text Available We consider optimum feedback control strategy for computer communication network, in particular, the access control mechanism. The dynamic model representing the source and the access control system is described by a system of stochastic differential equations developed in our previous works. Simulated annealing (SA was used to optimize the parameters of the control law based on neural network. This technique was found to be computationally intensive. In this paper, we have proposed to use a more powerful algorithm known as recursive random search (RRS. By using this technique, we have been able to reduce the computation time by a factor of five without compromising the optimality. This is very important for optimization of high-dimensional systems serving a large number of aggregate users. The results show that the proposed control law can improve the network performance by improving throughput, reducing multiplexor and TB losses, and relaxing, not avoiding, congestion.

  4. The naming of gender-marked pronouns supports interactivity in models of lexical access

    Directory of Open Access Journals (Sweden)

    Albert Costa

    2009-01-01

    Full Text Available When a speaker names an object using a gender-marked pronominal form, the referent word corresponding to the target object has to be selected in order to access the grammatical gender. By contrast, the phonological content of the referent word is not needed. In two picture-naming interference experiments we explored whether the lexical selection of a referent word is affected by its phonological properties. In Experiment 1, Spanish participants named pictures using a sentence with a noun or a pronoun while ignoring words semantically or phonologically related. The results showed a semantic interference effect and a Phonological Facilitation Effect (PFE in both type of utterances. In Experiment 2 the PFE was replicated with Italian participants in a different pronominal utterance. The PFE suggests that the lexical selection of the referent word is facilitated by the presentation of a distractor word phonologically related. These findings are consistent with the predictions of interactive models of lexical access.

  5. 47 CFR 69.3 - Filing of access service tariffs.

    Science.gov (United States)

    2010-10-01

    ... telephone companies involved in a merger or acquisition. (1) Notwithstanding the requirements of § 69.3(e)(9... resulting from the merger or acquisition of telephone properties are to be made effective on the next annual access tariff filing effective date following consummation of the merger or acquisition transaction,...

  6. Evidence-based development of a mobile telephone food record.

    Science.gov (United States)

    Six, Bethany L; Schap, Tusarebecca E; Zhu, Fengqing M; Mariappan, Anand; Bosch, Marc; Delp, Edward J; Ebert, David S; Kerr, Deborah A; Boushey, Carol J

    2010-01-01

    Mobile telephones with an integrated camera can provide a unique mechanism for collecting dietary information that reduces burden on record-keepers. Objectives for this study were to test whether participant's proficiency with the mobile telephone food record improved after training and repeated use and to measure changes in perceptions regarding use of the mobile telephone food record after training and repeated use. Seventy-eight adolescents (26 males, 52 females) ages 11 to 18 years were recruited to use the mobile telephone food record for one or two meals. Proficiency with the mobile telephone food record was defined as capturing a useful image for image analysis and self-reported ease of use. Positive changes in perceptions regarding use of the mobile telephone food record were assumed to equate to potentially improved proficiency with the mobile telephone food record. Participants received instruction for using the mobile telephone food record prior to their first meal, and captured an image of their meals before and after eating. Following the first meal, participants took part in an interactive session where they received additional training on capturing images in various snacking situations and responded to questions about user preferences. Changes in the participants' abilities to capture useful images and perceptions about the usability of the mobile telephone food record were examined using McNemar, Wilcoxon rank-sum test, and paired t test. After using the mobile telephone food record, the majority of participants (79%) agreed that the software was easy to use. Eleven percent of participants agreed taking images before snacking would be easy. After additional training, the percent increased significantly to 32% (Ptechnologies; however, the mobile telephone food record design needs to accommodate the lifestyles of its users to ensure useful images and continuous use. Further, these results suggest that additional training in using a new technology may

  7. Data and Model Discovery and Access Using I.D.E.A.S

    Science.gov (United States)

    Samuels, C.

    2011-12-01

    Consumers of satellite earth observational data are typically unaware of the data and models they need to solve a problem of interest to them, nor how to discover and access these data and models. We will present the Intelligent Data Exploration and Analytics System (I.D.E.A.S.), currently being developed by The SI Organization, Inc., that intends to systematically address these user problems and challenges through intelligent compute responses and guidance rather than the hunt and hope concepts offered today through numerous websites. I.D.E.A.S. consists of a web-deployed Storefront, Smart Engine and High Performance Cloud Computing backbone. It provides for data and model discovery and access to federated NASA and other U.S. agency data repositories, and available model repositories. Innovative methods for data and model discovery, learned workflows for discovery based on users' problem sets, access and management is used to provide near real-time Modeling as a Service (MaaS) services. These MaaS services provide for model set up, calibration, utilization, and product generation. Model revisions and user collaboration are also provided. I.D.E.A.S. is being developed for users to discover and use earth observational satellite (and airborne) data and models to generate value-added solutions and products for users' problem sets, focused on utilizing this data for societal benefit. In this paper, we will introduce I.D.E.A.S. and how it will be applied to provide an end-to-end capability for water management solutions for drought estimation and prediction. Drought management solutions within I.D.E.A.S.' MaaS functionality will demonstrate applicability of utilizing NASA earth observational data for drought estimation and prediction for agriculture. In particular, we will investigate drought estimation and prediction for pasture lands and the resulting effect on grazing animal mortality in arid climates (e.g., northern Kenya and southwestern U.S.). For this application

  8. Methodology of the Access to Care and Timing Simulation Model for Traumatic Spinal Cord Injury Care.

    Science.gov (United States)

    Santos, Argelio; Fallah, Nader; Lewis, Rachel; Dvorak, Marcel F; Fehlings, Michael G; Burns, Anthony Scott; Noonan, Vanessa K; Cheng, Christiana L; Chan, Elaine; Singh, Anoushka; Belanger, Lise M; Atkins, Derek

    2017-03-12

    Despite the relatively low incidence, the management and care of persons with traumatic spinal cord injury (tSCI) can be resource intensive and complex, spanning multiple phases of care and disciplines. Using a simulation model built with a system level view of the healthcare system allows for prediction of the impact of interventions on patient and system outcomes from injury through to community reintegration after tSCI. The Access to Care and Timing (ACT) project developed a simulation model for tSCI care using techniques from operations research and its development has been described previously. The objective of this article is to briefly describe the methodology and the application of the ACT Model as it was used in several of the articles in this focus issue. The approaches employed in this model provide a framework to look into the complexity of interactions both within and among the different SCI programs, sites and phases of care.

  9. The Model and Control Methods of Access to Information and Technology Resources of Automated Control Systems in Water Supply Industry

    Science.gov (United States)

    Rytov, M. Yu; Spichyack, S. A.; Fedorov, V. P.; Petreshin, D. I.

    2017-01-01

    The paper describes a formalized control model of access to information and technological resources of automated control systems at water supply enterprises. The given model considers the availability of various communication links with information systems and technological equipment. There are also studied control methods of access to information and technological resources of automated control systems at water supply enterprises. On the basis of the formalized control model and appropriate methods there was developed a software-hardware complex for rapid access to information and technological resources of automated control systems, which contains an administrator’s automated workplace and ultimate users.

  10. A comparison of nonresponse in mail, telephone, and face-to-face surveys

    NARCIS (Netherlands)

    Hox, J.J.; Leeuw, E.D. de

    1994-01-01

    This article reports a meta-analysis of 45 studies that explicitly compare the response obtained using a mail, telephone or face-to-face survey. The data analysis uses a generalized hierarchical linear model. Sampling procedure (e.g., local convenience sample, random general sample), saliency of

  11. A comparison of nonresponse in mail, telephone, and face-to-face surveys

    NARCIS (Netherlands)

    Hox, J.J.; Leeuw, E.D. de

    1994-01-01

    This article reports a meta-analysis of 45 studies that explicitly compare the response obtained using a mail, telephone or face-to-face survey. The data analysis uses a generalized hierarchical linear model. Sampling procedure (e.g., local convenience sample, random general sample), saliency of top

  12. Extending residential care through telephone counseling: Initial results from the Betty Ford Center Focused Continuing Care protocol

    OpenAIRE

    2008-01-01

    There is increasing evidence that a chronic care model may be effective when treating substance use disorders. In 1996, the Betty Ford Center (BFC) began implementing a telephone-based continuing care intervention now called Focused Continuing Care (FCC) to assist and support patients in their transition from residential treatment to longer-term recovery in the “real world”. This article reports on patient utilization and outcomes of FCC. FCC staff placed clinically directed telephone calls t...

  13. Perti Net-Based Workflow Access Control Model%基于Perti网的工作流访问控制模型研究

    Institute of Scientific and Technical Information of China (English)

    陈卓; 骆婷; 石磊; 洪帆

    2004-01-01

    Access control is an important protection mechanism for information systems.This paper shows how to make access control in workflow system.We give a workflow access control model (WACM) based on several current access control models.The model supports roles assignment and dynamic authorization.The paper defines the workflow using Petri net.It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM).Finally, an example of an e-commerce workflow access control model is discussed in detail.

  14. Alternative Measured-Service Rate Structures for Local Telephone Service,

    Science.gov (United States)

    1980-06-01

    Pricing," American Economic Review , Vol. 60, 1970, pp. 265-283. Cosgrove, J. G. and P. G. Linhart, "Customer Choices Under Local Measured Telephone...November 1976. "Optimal Pricing of Local Telephone Service," American Economic Review , Vol. 68, September 1978, pp. 517-537. , "Economic Issues in

  15. Brain tumour risk in relation to mobile telephone use

    DEFF Research Database (Denmark)

    Johansen, Christoffer

    2010-01-01

    The rapid increase in mobile telephone use has generated concern about possible health risks related to radiofrequency electromagnetic fields from this technology.......The rapid increase in mobile telephone use has generated concern about possible health risks related to radiofrequency electromagnetic fields from this technology....

  16. 39 CFR 6.4 - Attendance by conference telephone call.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Attendance by conference telephone call. 6.4 Section 6.4 Postal Service UNITED STATES POSTAL SERVICE THE BOARD OF GOVERNORS OF THE U.S. POSTAL SERVICE MEETINGS (ARTICLE VI) § 6.4 Attendance by conference telephone call. For regularly scheduled meetings...

  17. Design and implementation of telephone dialer based on Arduino

    Science.gov (United States)

    Ma, Zilong; Lei, Ying

    2017-03-01

    Introduces a system design scheme of the telephone dialer based on Arduino, including the design principle, hardware and software design and the experimental results in this paper. The scheme is based on the dual tone multi frequency (DTMF) dialing mode, using the Arduino UNO as the main controller, the serial port send out the telephone number to be dialed, speaker synthesize the voice.

  18. [Potential selection bias in telephone surveys: landline and mobile phones].

    Science.gov (United States)

    Garcia-Continente, Xavier; Pérez-Giménez, Anna; López, María José; Nebot, Manel

    2014-01-01

    The increasing use of mobile phones in the last decade has decreased landline telephone coverage in Spanish households. This study aimed to analyze sociodemographic characteristics and health indicators by type of telephone service (mobile phone vs. landline or landline and mobile phone). Two telephone surveys were conducted in Spanish samples (February 2010 and February 2011). Multivariate logistic regression analyses were performed to analyze differences in the main sociodemographic characteristics and health indicators according to the type of telephone service available in Spanish households. We obtained 2027 valid responses (1627 landline telephones and 400 mobile phones). Persons contacted through a mobile phone were more likely to be a foreigner, to belong to the manual social class, to have a lower educational level, and to be a smoker than those contacted through a landline telephone. The profile of the population that has only a mobile phone differs from that with a landline telephone. Therefore, telephone surveys that exclude mobile phones could show a selection bias. Copyright © 2013 SESPAS. Published by Elsevier Espana. All rights reserved.

  19. 26 CFR 49.4252-2 - Toll telephone service.

    Science.gov (United States)

    2010-04-01

    ... subscriber for toll telephone service furnished to the hotel or its guests, but no tax attaches to any charge made by the hotel for service rendered in placing the calls for its guests. (c) Cross reference. For... 26 Internal Revenue 16 2010-04-01 2010-04-01 true Toll telephone service. 49.4252-2 Section 49...

  20. 47 CFR 68.4 - Hearing aid-compatible telephones.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Hearing aid-compatible telephones. 68.4 Section... (CONTINUED) CONNECTION OF TERMINAL EQUIPMENT TO THE TELEPHONE NETWORK General § 68.4 Hearing aid-compatible... for export) or imported for use in the United States after August 16, 1989, must be hearing...

  1. Establishing a Telephone Conferencing System: The Dynamics of Doing It.

    Science.gov (United States)

    Connell, Eileen

    Based on experience gained in a project in Vermont that is demonstrating potential applications of telephone conferencing to services for the developmentally disabled, this paper summarizes the most important factors in establishing a telephone conferencing system. Basic terminology is described and factors to be considered in selecting telephone…

  2. Editors View the Continuous Publication Model as a Satisfactory Alternative for Open Access LIS Journals

    Directory of Open Access Journals (Sweden)

    Richard Hayman

    2014-09-01

    Full Text Available A Review of: Cirasella, J., & Bowdoin, S. (2013. Just roll with it? Rolling volumes vs. discrete issues in open access library and information science journals. Journal of Librarianship and Scholarly Communication, 1(4. http://dx.doi.org/10.7710/2162-3309.1086 Abstract Objective – To understand the prevalence of, motivations for, and satisfaction with using a rolling-volume publishing model, as opposed to publishing discrete issues, across open access academic journals in library and information science. Design – A 12 question survey questionnaire. Setting – English-language, open access library and information science (LIS journals published in the United States of America. Subjects – A total of 21 open access LIS journals identified via the Directory of Open Access Journals that were actively publishing, and that also met the authors’ standard of scholarliness, which they established by identifying a journal’s peer-review process or other evidence of rigorous review. Based on responses, 12 journals published using discrete issues, while 9 published as rolling volumes or as rolling volumes with some discrete issues. Methods – In late 2011, the study’s authors invited lead editors or primary journal contacts to complete the survey. Survey participants were asked to identify whether their journal published in discrete issues, rolling volumes, or rolling volumes with occasional discrete issues, with the latter two categories combined as one for ease of results analysis. Survey logic split respondents into two groups, either discrete-issue or rolling-volume. Respondents in both categories were posed similar sets of questions, with the key difference being that the questions directed at each category accounted for the publication model the journals themselves identified as using. Editors from both groups were asked about the reasons for using the publication model they identified for their journal: within the survey tool, authors

  3. A Comparison of Telephone Genetic Counseling and In-Person Genetic Counseling from the Genetic Counselor's Perspective.

    Science.gov (United States)

    Burgess, Kelly R; Carmany, Erin P; Trepanier, Angela M

    2016-02-01

    Growing demand for and limited geographic access to genetic counseling services is increasing the need for alternative service delivery models (SDM) like telephone genetic counseling (TGC). Little research has been done on genetic counselors' perspectives of the practice of TGC. We created an anonymous online survey to assess whether telephone genetic counselors believed the tasks identified in the ABGC (American Board of Genetic Counseling) Practice Analysis were performed similarly or differently in TGC compared to in person genetic counseling (IPGC). If there were differences noted, we sought to determine the nature of the differences and if additional training might be needed to address them. Eighty eight genetic counselors with experience in TGC completed some or all of the survey. Respondents identified differences in 13 (14.8%) of the 88 tasks studied. The tasks identified as most different in TGC were: "establishing rapport through verbal and nonverbal interactions" (60.2%; 50/83 respondents identified the task as different), "recognizing factors affecting the counseling interaction" (47.8%; 32/67), "assessing client/family emotions, support, etc." (40.1%; 27/66) and "educating clients about basic genetic concepts" (35.6%; 26/73). A slight majority (53.8%; 35/65) felt additional training was needed to communicate information without visual aids and more effectively perform psychosocial assessments. In summary, although a majority of genetic counseling tasks are performed similarly between TGC and IPGC, TGC counselors recognize that specific training in the TGC model may be needed to address the key differences.

  4. Advancing Telephone Focus Groups Method Through the Use of Webinar

    Directory of Open Access Journals (Sweden)

    Eunice Chong

    2015-10-01

    Full Text Available Telephone focus groups have been increasingly popular in public health research and evaluation. One of the main concerns of telephone focus groups is the lack of nonverbal cues among participants, which could limit group interactions and dynamics during the focus group discussion. To overcome this limitation, we supplemented telephone focus groups with webinar technology in a recent evaluation of a provincial public health program in Ontario, Canada. In this article, we share the methods used and our experiences in conducting telephone focus groups supplemented with webinar technology, including advantages and challenges. Our experience will inform other researchers who may consider using telephone focus groups with webinars in future research and evaluation.

  5. Telephone: The Old Technology that is Never Old

    Directory of Open Access Journals (Sweden)

    Olubunmi Philip Aborisade

    2012-09-01

    Full Text Available Telephone technology is a technology that stands the test of time. Since it was invented in 1876 by Alexander Graham Belle, it remains the technology of all time. This article reports the major finding of a recent research, how technology transforms citizen journalism business in Nigeria. According to the research, Telephone technology has over the years emerged the major tool with which ordinary citizens in Nigeria without journalism and media background or affiliation participate in the process of news gathering, reporting and distribution. Guided by the recent use of telephone around the world by ordinary citizens to report themselves during protests through different social media outlets-Facebook, Tweeter, Youtube, the article illuminates the evergreen nature of the telephone. The article therefore concluded that the telephone technology invented in 1876 has survived the test of time. Instead of being obsolete, it blends with emerging communications technology to improve on its performance.

  6. Open Access, Library Subscriptions and Article Processing Charges: Hybrid journals models and issues

    OpenAIRE

    Vijayakumar, J. K.; Tamarkin, Molly

    2016-01-01

    Hybrid journals contains articles behind a pay-wall to be subscribed, as well as papers made open access when author pays article processing charge (APC). In such cases, an Institution will end up paying twice and Publishers tend to double-dip. Discussions and pilot models are emerging on pricing options, such as “offset pricing,” [where APCs are adjusted or discounted with subscription costs as vouchers or reductions in next year subscriptions, APCs beyond the subscription costs are modestl...

  7. Providing comprehensive and consistent access to astronomical observatory archive data: the NASA archive model

    Science.gov (United States)

    McGlynn, Thomas; Fabbiano, Giuseppina; Accomazzi, Alberto; Smale, Alan; White, Richard L.; Donaldson, Thomas; Aloisi, Alessandra; Dower, Theresa; Mazzerella, Joseph M.; Ebert, Rick; Pevunova, Olga; Imel, David; Berriman, Graham B.; Teplitz, Harry I.; Groom, Steve L.; Desai, Vandana R.; Landry, Walter

    2016-07-01

    Since the turn of the millennium a constant concern of astronomical archives have begun providing data to the public through standardized protocols unifying data from disparate physical sources and wavebands across the electromagnetic spectrum into an astronomical virtual observatory (VO). In October 2014, NASA began support for the NASA Astronomical Virtual Observatories (NAVO) program to coordinate the efforts of NASA astronomy archives in providing data to users through implementation of protocols agreed within the International Virtual Observatory Alliance (IVOA). A major goal of the NAVO collaboration has been to step back from a piecemeal implementation of IVOA standards and define what the appropriate presence for the US and NASA astronomy archives in the VO should be. This includes evaluating what optional capabilities in the standards need to be supported, the specific versions of standards that should be used, and returning feedback to the IVOA, to support modifications as needed. We discuss a standard archive model developed by the NAVO for data archive presence in the virtual observatory built upon a consistent framework of standards defined by the IVOA. Our standard model provides for discovery of resources through the VO registries, access to observation and object data, downloads of image and spectral data and general access to archival datasets. It defines specific protocol versions, minimum capabilities, and all dependencies. The model will evolve as the capabilities of the virtual observatory and needs of the community change.

  8. A Model for Remote Access and Protection of Smartphones using Short Message Service

    CERN Document Server

    Kuppusamy, K S; Aghila, G; 10.5121/ijcseit.2012.2109

    2012-01-01

    The smartphone usage among people is increasing rapidly. With the phenomenal growth of smartphone use, smartphone theft is also increasing. This paper proposes a model to secure smartphones from theft as well as provides options to access a smartphone through other smartphone or a normal mobile via Short Message Service. This model provides option to track and secure the mobile by locking it. It also provides facilities to receive the incoming call and sms information to the remotely connected device and enables the remote user to control the mobile through SMS. The proposed model is validated by the prototype implementation in Android platform. Various tests are conducted in the implementation and the results are discussed.

  9. Numerical model for sedimentation in the access channel and harbor basin of Belawan Port

    Institute of Scientific and Technical Information of China (English)

    Hang Tuah. Salim

    2010-01-01

    Belawan is the largest port serving North Sumatra for the import and export.Port has facilities for handling container, CPO liquid bulk cargo,Oil,and other agriculture products.Its location is at the fiver mouth which is subjected to the heavy sedimentation especially after many deforestation activities in its catchment area. The numerical modeling was developed for predicting the rate of sediment caused by erosion in the catchment area for several scenarios.This predicted rate of sediment was applied as input to model of sedimentation in the ocean.Present condition of sedimentation data was used as calibrated data.This integrated model was used to simulate the sedimentation in Belawan access channel and harbor basin for several development plans.

  10. 16 CFR 310.8 - Fee for access to the National Do Not Call Registry.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Fee for access to the National Do Not Call... OF CONGRESS TELEMARKETING SALES RULE § 310.8 Fee for access to the National Do Not Call Registry. (a... outbound telephone call to any person whose telephone number is within a given area code unless such...

  11. Teaching the iPhone with Voiceover Accessibility to People with Visual Impairments

    Science.gov (United States)

    Celusnak, Brian M.

    2016-01-01

    Moving from a conventional telephone keypad to a cellular telephone with a touchscreen can seem quite challenging for some people. When one is visually impaired, there is always the option of using VoiceOver, the iPhone's built-in access technology that is designed to allow individuals with visual impairments the ability to access the visual…

  12. Elder abuse telephone screen reliability and validity.

    Science.gov (United States)

    Buri, Hilary M; Daly, Jeanette M; Jogerst, Gerald J

    2009-01-01

    (a) To identify reliable and valid questions that identify elder abuse, (b) to assess the reliability and validity of extant self-reported elder abuse screens in a high-risk elderly population, and (c) to describe difficulties of completing and interpreting screens in a high-need elderly population. All elders referred to research-trained social workers in a community service agency were asked to participate. Of the 70 elders asked, 49 participated, 44 completed the first questionnaire, and 32 completed the duplicate second questionnaire. A research assistant administered the telephone questionnaires. Twenty-nine (42%) persons were judged abused, 12 (17%) had abuse reported, and 4 (6%) had abuse substantiated. The elder abuse screen instruments were not found to be predictive of assessed abuse or as predictors of reported abuse; the measures tended toward being inversely predictive. Two questions regarding harm and taking of belongings were significantly different for the assessed abused group. In this small group of high-need community-dwelling elders, the screens were not effective in discriminating between abused and nonabused groups. Better instruments are needed to assess for elder abuse.

  13. Geographically weighted regression for modelling the accessibility to the public hospital network in Concepción Metropolitan Area, Chile

    OpenAIRE

    Marcela Martínez Bascuñán; Carolina Rojas Quezada

    2016-01-01

    Accessibility models in transport geography based on geographic information systems have proven to be an effective method in determining spatial inequalities associated with public health. This work aims to model the spatial accessibility from populated areas within the Concepción metropolitan area (CMA), the second largest city in Chile. The city’s public hospital network is taken into consideration with special reference to socio-regional inequalities. The use of geographically weighted reg...

  14. Phonomicrosurgery simulation: A low-cost teaching model using easily accessible materials.

    Science.gov (United States)

    Zambricki, Elizabeth A; Bergeron, Jennifer L; DiRenzo, Elizabeth E; Sung, C Kwang

    2016-11-01

    To introduce the use of a new phonomicrosurgical trainer using easily accessible materials, and to establish the effectiveness of the model. The model uses a grape imbedded in gelatin, a microscope, and microlaryngeal instruments. The study was designed to test baseline differences in training levels, as well as improvement in performance after training with the simulation model. Thirty subjects enrolled in the Stanford University School of Medicine otolaryngology training program performed microlaryngeal surgery tasks on a grape. Tasks were designed to model both excision of a vocal fold lesion and vocal fold injection. Anonymized video recordings comparing presimulation and postsimulation training were collected and graded by an expert laryngologist. Both objective comparison of skills and subjective participant surveys were analyzed. Objectively, trainees in all groups made statistically significant improvements across all tested variables, including microscope positioning, creation of a linear incision, elevation of epithelial flaps, excision of a crescent of tissue, vocal fold injection, preservation of remaining tissue, and time to complete all tasks. Subjectively, 100% of participants felt that they had increased comfort with microlaryngeal instruments and decreased intimidation of microlaryngeal surgery after completing the simulation training. This appreciation of skills was most notable and statistically significant in the intern trainees. Microlaryngeal surgical simulation is a tool that can be used to train residents to prepare them for phonomicrosurgical procedures at all levels of training. Our low-cost model with accessible materials can be easily duplicated and used to introduce trainees to microlaryngeal surgery or improve skills of more senior trainees. NA Laryngoscope, 126:2528-2533, 2016. © 2016 The American Laryngological, Rhinological and Otological Society, Inc.

  15. New Regenerative Vascular Grafts for Hemodialysis Access: Evaluation of a Preclinical Animal Model.

    Science.gov (United States)

    Valencia Rivero, Karen Tatiana; Jaramillo Escobar, Juliana; Galvis Forero, Sergio David; Miranda Saldaña, Maria Clara; López Panqueva, Rocío Del Pilar; Sandoval Reyes, Néstor Fernando; Briceño Triana, Juan Carlos

    2017-04-17

    The purpose of this study was to evaluate a suitable animal model for the in vivo evaluation of patency and vascular tissue regeneration in small intestinal submucosa (SIS) vascular grafts for hemodialysis access. First, a 4-mm U-shaped SIS vascular graft was implanted between the internal carotid artery (CA) and the external jugular vein (JV) in five sheep and six swine. The U-shape grafts remained functional for 53 ± 4 days in sheep and 32 ± 2 days in swine. The sheep model presented exaggerated inflammation, so the swine model was selected for the in vivo study. Based on these initial results, a 4-mm C-shape SIS vascular graft with SIS circumferential reinforcement was developed to mechanically improve the vascular graft and manage complications identified during surgery in both sheep and swine. The C-shape vascular graft was implanted in a swine model (n = 3) between the CA and JV. GORE-TEX® vascular grafts were used as controls in the contralateral side of the neck. C-shape grafts remained patent for 47 ± 4 days, whereas the GORE-TEX® grafts were patent for 30 ± 15 days. The C-shape vascular graft was easier to handle during surgery, and its circumferential reinforcement improved in vivo patency, avoiding kinks in the graft after implantation. Histological results showed neovascularization and some regeneration with the alignment of endothelial cells in the vascular wall of the grafts. The model developed may be helpful in other research involving in vivo studies of vascular grafts for hemodialysis access.

  16. A sustainable business model for Open-Access journal publishing: a proposed plan for High-Energy Physics

    Directory of Open Access Journals (Sweden)

    Jens Vigen

    2008-01-01

    Full Text Available The High Energy Physics community over the last 15 years has achieved so-called full green Open Access through the wide dissemination of preprints via arXiv, a central subject repository managed by Cornell University. However, green Open Access does not alleviate the economic difficulties of libraries as they are still expected to offer access to versions of record of the peer-reviewed literature. For this reason the particle physics community is now addressing the issue of gold Open Access by converting a set of the existing core journals to Open Access. A Working Party has been established to bring together funding agencies, laboratories and libraries into a single consortium, called SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics. This consortium will engage with publishers to build a sustainable model for Open Access publishing. In this model, subscription fees from multiple institutions are replaced by contracts with publishers of Open Access journals, where the SCOAP3 consortium is a single financial partner.

  17. A Dynamic Web Page Prediction Model Based on Access Patterns to Offer Better User Latency

    CERN Document Server

    Mukhopadhyay, Debajyoti; Saha, Dwaipayan; Kim, Young-Chon

    2011-01-01

    The growth of the World Wide Web has emphasized the need for improvement in user latency. One of the techniques that are used for improving user latency is Caching and another is Web Prefetching. Approaches that bank solely on caching offer limited performance improvement because it is difficult for caching to handle the large number of increasingly diverse files. Studies have been conducted on prefetching models based on decision trees, Markov chains, and path analysis. However, the increased uses of dynamic pages, frequent changes in site structure and user access patterns have limited the efficacy of these static techniques. In this paper, we have proposed a methodology to cluster related pages into different categories based on the access patterns. Additionally we use page ranking to build up our prediction model at the initial stages when users haven't already started sending requests. This way we have tried to overcome the problems of maintaining huge databases which is needed in case of log based techn...

  18. Model Based User's Access Requirement Analysis of E-Governance Systems

    Science.gov (United States)

    Saha, Shilpi; Jeon, Seung-Hwan; Robles, Rosslin John; Kim, Tai-Hoon; Bandyopadhyay, Samir Kumar

    The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify user's access requirement for the stakeholders and then according to the models of Nath's approach. Based on this analysis, the Govt. can also make standards of security based on the e-governance models. Thus there will be less human errors and bias. This analysis leads to the security architecture of the specific G2C application.

  19. Short assessment of the Big Five: robust across survey methods except telephone interviewing.

    Science.gov (United States)

    Lang, Frieder R; John, Dennis; Lüdtke, Oliver; Schupp, Jürgen; Wagner, Gert G

    2011-06-01

    We examined measurement invariance and age-related robustness of a short 15-item Big Five Inventory (BFI-S) of personality dimensions, which is well suited for applications in large-scale multidisciplinary surveys. The BFI-S was assessed in three different interviewing conditions: computer-assisted or paper-assisted face-to-face interviewing, computer-assisted telephone interviewing, and a self-administered questionnaire. Randomized probability samples from a large-scale German panel survey and a related probability telephone study were used in order to test method effects on self-report measures of personality characteristics across early, middle, and late adulthood. Exploratory structural equation modeling was used in order to test for measurement invariance of the five-factor model of personality trait domains across different assessment methods. For the short inventory, findings suggest strong robustness of self-report measures of personality dimensions among young and middle-aged adults. In old age, telephone interviewing was associated with greater distortions in reliable personality assessment. It is concluded that the greater mental workload of telephone interviewing limits the reliability of self-report personality assessment. Face-to-face surveys and self-administrated questionnaire completion are clearly better suited than phone surveys when personality traits in age-heterogeneous samples are assessed.

  20. CERN Action on Open Access : Open Meeting on Changing the Publishing Model

    CERN Document Server

    CERN. Geneva

    2005-01-01

    Leader of the discussion: Chief Scientific Officer Jos Engelen, CERN. Particle physicists are again contributing to change by Director-General Robert Aymar, CERN. A general presentation of the CERN policy and visions. Improving the impact of your research by Former Editor-in-Chief Alex Bradshaw, New Journal of Physics. Springer Open Choice by Chief executive officer Derk Haank, Springer. The JHEP experience by Scientific director Hector Rubinstein, JHEP. The impact of the J series, existing and coming journals: JHEP JCAP JSTAT JINST. National libraries ensuring long-term archiving of digital information speaker to be decided. Debate The Director-General is calling all CERN editors and authors to a meeting to contribute to the discussion on the direction that CERN should take in its experimentation with new publishing models. The current subscription-funded publishing model for journal articles (where access to a particular journal is granted upon payment of a subscription, often arranged by the institutional ...

  1. Out-of-Bounds Array Access Fault Model and Automatic Testing Method Study

    Institute of Scientific and Technical Information of China (English)

    GAO Chuanping; DUAN Miyi; TAN Liqun; GONG Yunzhan

    2007-01-01

    Out-of-bounds array access(OOB) is one of the fault models commonly employed in the objectoriented programming language. At present, the technology of code insertion and optimization is widely used in the world to detect and fix this kind of fault. Although this method can examine some of the faults in OOB programs, it cannot test programs thoroughly, neither to find the faults correctly. The way of code insertion makes the test procedures so inefficient that the test becomes costly and time-consuming. This paper, uses a kind of special static test technology to realize the fault detection in OOB programs. We first establish the fault models in OOB program, and then develop an automatic test tool to detect the faults. Some experiments have exercised and the results show that the method proposed in the paper is efficient and feasible in practical applications.

  2. Stereolithographic models of the solvent-accessible surface of biopolymers. Topical report

    Energy Technology Data Exchange (ETDEWEB)

    Bradford, J. [Olathe South High School, KS (United States); Noel, P. [Center High School, Kansas City, MO (United States); Emery, J.D. [and others

    1996-11-01

    The solvent-accessible surfaces of several biopolymers were calculated. As part of the DOE education outreach activity, two high school students participated in this project. Computer files containing sets of triangles were produced. These files are called stl files and are the ISO 9001 standard. They have been written onto CD-ROMs for distribution to American companies. Stereolithographic models were made of some of them to ensure that the computer calculations were done correctly. Stereolithographic models were made of interleukin 1{beta} (IL-1{beta}), three antibodies (an anti-p-azobenzene arsonate, an anti-Brucella A cell wall polysaccharide, and an HIV neutralizing antibody), a triple stranded coiled coil, and an engrailed homeodomain. Also, the biopolymers and their files are described.

  3. NOAA Operational Model Archive Distribution System (NOMADS): High Availability Applications for Reliable Real Time Access to Operational Model Data

    Science.gov (United States)

    Alpert, J. C.; Wang, J.

    2009-12-01

    To reduce the impact of natural hazards and environmental changes, the National Centers for Environmental Prediction (NCEP) provide first alert and a preferred partner for environmental prediction services, and represents a critical national resource to operational and research communities affected by climate, weather and water. NOMADS is now delivering high availability services as part of NOAA’s official real time data dissemination at its Web Operations Center (WOC) server. The WOC is a web service used by organizational units in and outside NOAA, and acts as a data repository where public information can be posted to a secure and scalable content server. A goal is to foster collaborations among the research and education communities, value added retailers, and public access for science and development efforts aimed at advancing modeling and GEO-related tasks. The user (client) executes what is efficient to execute on the client and the server efficiently provides format independent access services. Client applications can execute on the server, if it is desired, but the same program can be executed on the client side with no loss of efficiency. In this way this paradigm lends itself to aggregation servers that act as servers of servers listing, searching catalogs of holdings, data mining, and updating information from the metadata descriptions that enable collections of data in disparate places to be simultaneously accessed, with results processed on servers and clients to produce a needed answer. The services used to access the operational model data output are the Open-source Project for a Network Data Access Protocol (OPeNDAP), implemented with the Grid Analysis and Display System (GrADS) Data Server (GDS), and applications for slicing, dicing and area sub-setting the large matrix of real time model data holdings. This approach insures an efficient use of computer resources because users transmit/receive only the data necessary for their tasks including

  4. Telephone techniques and etiquette: a medical practice staff training tool.

    Science.gov (United States)

    Hills, Laura Sachs

    2007-01-01

    The telephone is usually the first contact a prospective or new patient has with a medical practice. It is also the method that existing patients and others commonly use to ask questions or convey information. At the same time, a telephone that rings off the hook can be one of the biggest drains on staff time and a source of tremendous frustration. This article suggests practical techniques for managing the medical practice telephone. It provides seven never-fail strategies for saving time on the phone while remaining courteous and attentive to callers. It offers tips to help readers avoid getting caught in an endless game of telephone tag. The article highlights strategies that work particularly well when placing calls and when dealing with a busy signal or voicemail system problem in the practice. It also describes the fine points for taking accurate and complete telephone messages without turning off callers or misleading them. This article further explores practical strategies for using and not abusing the hold button and offers additional tips for telephone equipment and accessories readers may find helpful. Finally, this article suggests guidelines for using an answering machine or voicemail system and provides a 25-question quiz to help readers assess their own telephone technique.

  5. Problems and possibilities of using telephone technology in education

    Directory of Open Access Journals (Sweden)

    Danilović Mirčeta S.

    2002-01-01

    Full Text Available The paper explores the possibilities of using telephone technology in educational process. It is emphasized how valuable audio-teleconference and tutorial teaching are by means of telephone technology but skepticism is also expressed concerning the possibilities of using this type of technology in our educational system. The causes for such skepticism are mostly to be found in our economic conditions, inadequacy of material sources and technical problems i.e. underdeveloped telephone networks. Telephone technology is not suitable for work with a whole class. It is primarily intended for one-to-one teaching, in the USA most often called 'tutorship'. Accordingly, 'telephone tutorship' is the most widespread form of telephone application in the teaching process. When it is being accomplished, a student (user has only to have a telephone at home or that public phone network is operating and he/she can communicate with his/her 'tutor', (teacher. 'A tutor' can be at home and communicate with his/her students or at a local learning center wherefrom he/she can communicate with a student. Students can also be at their local learning center or at home.

  6. A Model of Alcohol Drinking under an Intermittent Access Schedule Using Group-Housed Mice

    Science.gov (United States)

    Smutek, Magdalena; Turbasa, Mateusz; Sikora, Magdalena; Piechota, Marcin; Zajdel, Joanna; Przewlocki, Ryszard; Parkitna, Jan Rodriguez

    2014-01-01

    Here, we describe a new model of voluntary alcohol drinking by group-housed mice. The model employs sensor-equipped cages that track the behaviors of the individual animals via implanted radio chips. After the animals were allowed intermittent access to alcohol (three 24 h intervals every week) for 4 weeks, the proportions of licks directed toward bottles containing alcohol were 50.9% and 39.6% for the male and female mice, respectively. We used three approaches (i.e., quinine adulteration, a progressive ratio schedule and a schedule involving a risk of punishment) to test for symptoms of compulsive alcohol drinking. The addition of 0.01% quinine to the alcohol solution did not significantly affect intake, but 0.03% quinine induced a greater than 5-fold reduction in the number of licks on the alcohol bottles. When the animals were required to perform increasing numbers of instrumental responses to obtain access to the bottle with alcohol (i.e., a progressive ratio schedule), they frequently reached a maximum of 21 responses irrespective of the available reward. Although the mice rarely achieved higher response criteria, the number of attempts was ∼10 times greater in case of alcohol than water. We have developed an approach for mapping social interactions among animals that is based on analysis of the sequences of entries into the cage corners. This approach allowed us to identify the mice that followed other animals in non-random fashions. Approximately half of the mice displayed at least one interaction of this type. We have not yet found a clear correlation between imitative behavior and relative alcohol preference. In conclusion, the model we describe avoids the limitations associated with testing isolated animals and reliably leads to stable alcohol drinking. Therefore, this model may be well suited to screening for the effects of genetic mutations or pharmacological treatments on alcohol-induced behaviors. PMID:24804807

  7. Geographically weighted regression for modelling the accessibility to the public hospital network in Concepción Metropolitan Area, Chile

    Directory of Open Access Journals (Sweden)

    Marcela Martínez Bascuñán

    2016-11-01

    Full Text Available Accessibility models in transport geography based on geographic information systems have proven to be an effective method in determining spatial inequalities associated with public health. This work aims to model the spatial accessibility from populated areas within the Concepción metropolitan area (CMA, the second largest city in Chile. The city’s public hospital network is taken into consideration with special reference to socio-regional inequalities. The use of geographically weighted regression (GWR and ordinary least squares (OLS for modelling accessibility with socioeconomic and transport variables is proposed. The explanatory variables investigated are: illiterate population, rural housing, alternative housing, homes with a motorised vehicle, public transport routes, and connectivity. Our results identify that approximately 4.1% of the population have unfavourable or very unfavourable accessibility to public hospitals, which correspond to rural areas located south of CMA. Application of a local GWR model (0.87 R2 adjusted helped to improve the settings over the use of traditional OLS methods (multiple regression (0.67 R2 adjusted and to find the spatial distribution of both coefficients of the explanatory variables, demonstrating the local significance of the model. Thus, accessibility studies have enormous potential to contribute to the development of public health and transport policies in turn to achieve equality in spatial accessibility to specialised health care.

  8. Perceptions of crisis care in populations who self-referred to a telephone-based mental health triage service.

    Science.gov (United States)

    Sands, Natisha; Elsom, Stephen; Keppich-Arnold, Sandra; Henderson, Kathryn; Thomas, Phillipa A

    2016-04-01

    Although psychiatric crises are very common in people with mental illness, little is known about consumer perceptions of mental health crisis care. Given the current emphasis on recovery-oriented approaches, shared decision-making, and partnering with consumers in planning and delivering care, this knowledge gap is significant. Since the late 1990s, access to Australian mental health services has been facilitated by 24/7 telephone-based mental health triage systems, which provide initial psychiatric assessment, referral, support, and advice. A significant proportion of consumers access telephone-based mental health triage services in a state of crisis, but to date, there has been no published studies that specifically report on consumer perceptions on the quality and effectiveness of the care provided by these services. This article reports on a study that investigated consumer perceptions of accessing telephone-based mental health triage services. Seventy-five mental health consumers participated in a telephone interview about their triage service use experience. An eight-item survey designed to measure the responsiveness of mental health services was used for data collection. The findings reported here focus on the qualitative data produced in the study. Consumer participants shared a range of perspectives on telephone-based mental health triage that provide invaluable insights into the needs, expectations, and service use experiences of consumers seeking assistance with a mental health problem. Consumer perceptions of crisis care have important implications for practice. Approaches and interventions identified as important to quality care can be used to inform educational and practice initiatives that promote person-centred, collaborative crisis care.

  9. Europlanet-RI: Access to Planetary Data, Tools, Models and Support Information

    Science.gov (United States)

    Schmidt, W.; Capria, M. T.; Chanteur, G.

    2012-04-01

    During the past three years the Europlanet Research Infrastructure consortium with financial support from the EU's 7th framework program has developed a wide range of tools to support all aspects of planetary research. During the final year of the project these are being integrated into the "Integrated and Distributed Information Service IDIS" [1]. The challenge is the diversity of research fields involved in planetary research, each with its own way of collecting and archiving data and publishing its results. Nevertheless the results of one field are needed by others to be able to correctly interpret their observations, and to design new kinds of measurements to advance our knowledge of the Solar system. The IDIS team in close cooperation with the efforts of the International Planetary Data Alliance (IPDA) has developed a data model which allows the registration of a wide range of data sources including the results from modelling efforts thereby providing Virtual Observatory (IDIS-VO) [2,3] services for the community to register and access data from planetary data centres, laboratory measurements, spectral- and molecular data bases and simulations. Once a data set from any of these sources is registered with IDIS, it can be accessed, its used archive format translated into a compatible internal format and combined with other data using the visualization tools developed in connection with IDIS. Tools to calculate ephemeris data for a wide range of solar system bodies, to visualize their locations or identify them from existing images can be found as well as interactive tools to evaluate chemical reaction paths, spectral information from gas or solids or the mapping of planetary surfaces. Additionally information about ground observation possibilities, test facilities, laboratories, research institutes and scientists with detailed contact information is made available to the user. For the developers of new space instruments and operators of active missions support

  10. Community outreach midwifery-led model improves antenatal access in a disadvantaged population.

    Science.gov (United States)

    Reeve, Carole; Banfield, Sally; Thomas, Amanda; Reeve, David; Davis, Stephanie

    2016-06-01

    This study aimed to assess the impact of a new model of antenatal care for women living in a very remote area. This is a retrospective 2-year evaluation of antenatal care. Two hundred thirteen pregnant women in Aboriginal communities in the Fitzroy Valley of Western Australia participated in this study. The implementation of a midwifery-led interdisciplinary model of antenatal outreach care. The indicators measured were numbers of antenatal visits, their location and quality care indicators (presentation in first trimester, alcohol and smoking, ultrasound and blood-borne virus screening) and outcome indicators (birth weight, prematurity, in utero deaths and mode of delivery). There was an increase in access to antenatal care and improvements in quality-of-care indicators. The proportion of visits provided in local Aboriginal communities increased from 10% to 24%. There were statistically significant increases in women presenting in the first trimester (40-58%), screening for alcohol and smoking (48-93%) and having an ultrasound in pregnancy (59-94%). There were no significant improvements in neonatal outcome indicators. There is a large disparity in maternal and child health outcomes between Aboriginal and Torres Strait Islander (Indigenous) and non-Indigenous Australians thought to be due to decreased access to antenatal care, poorer socioeconomic status and the associated risk factors. The change in model of care resulted in earlier presentation for antenatal care, increased numbers of antenatal visits and increased screening for risk factors. Regular auditing of services enables the identification of opportunity for improvement with the goal of improving health outcomes. © 2015 National Rural Health Alliance Inc.

  11. The climate4impact platform: Providing, tailoring and facilitating climate model data access

    Science.gov (United States)

    Pagé, Christian; Pagani, Andrea; Plieger, Maarten; Som de Cerff, Wim; Mihajlovski, Andrej; de Vreede, Ernst; Spinuso, Alessandro; Hutjes, Ronald; de Jong, Fokke; Bärring, Lars; Vega, Manuel; Cofiño, Antonio; d'Anca, Alessandro; Fiore, Sandro; Kolax, Michael

    2017-04-01

    One of the main objectives of climate4impact is to provide standardized web services and tools that are reusable in other portals. These services include web processing services, web coverage services and web mapping services (WPS, WCS and WMS). Tailored portals can be targeted to specific communities and/or countries/regions while making use of those services. Easier access to climate data is very important for the climate change impact communities. To fulfill this objective, the climate4impact (http://climate4impact.eu/) web portal and services has been developed, targeting climate change impact modellers, impact and adaptation consultants, as well as other experts using climate change data. It provides to users harmonized access to climate model data through tailored services. It features static and dynamic documentation, Use Cases and best practice examples, an advanced search interface, an integrated authentication and authorization system with the Earth System Grid Federation (ESGF), a visualization interface with ADAGUC web mapping tools. In the latest version, statistical downscaling services, provided by the Santander Meteorology Group Downscaling Portal, were integrated. An innovative interface to integrate statistical downscaling services will be released in the upcoming version. The latter will be a big step in bridging the gap between climate scientists and the climate change impact communities. The climate4impact portal builds on the infrastructure of an international distributed database that has been set to disseminate the results from the global climate model results of the Coupled Model Intercomparison project Phase 5 (CMIP5). This database, the ESGF, is an international collaboration that develops, deploys and maintains software infrastructure for the management, dissemination, and analysis of climate model data. The European FP7 project IS-ENES, Infrastructure for the European Network for Earth System modelling, supports the European

  12. Editorial: Models, technologies and approaches toward widening the open access to learning and education

    Directory of Open Access Journals (Sweden)

    Rachid Benlamri

    2016-03-01

    Full Text Available This special issue is devoted to novel models and technologies as well as current methodical approaches and best practices in the field of Open Learning and Open Education as enablers of personal growth, social inclusion, open innovation, and sustainable economic development in the challenging conditions of globalization and world-wide competition in productivity and services. The Open Access to Learning and Education embraces not only various technologies, such as mobile and intelligent technologies, content and data management, user-centered design, but also diverse directions of use, such as e-learning and training, organizational development, Massive Open Online Courses, special needs education, all building an excellent basis for various educational and business arrangements that widen the learning and education opportunities for all people around the globe. Against this background, this special issue demonstrates the immense speed and relentlessness of the Open Access concept growth presenting a wide range of examples toward supporting competency and skills development to ensure highly capable human capital, and solve individual, business, urban, demographic, health as well as social inclusion issues in today’s highly demanding digital economy environment.

  13. Trading on extinction: An open-access deterrence model for the South African abalone fishery

    Directory of Open Access Journals (Sweden)

    Douglas J. Crookes

    2016-03-01

    Full Text Available South African rhinoceros (e.g.Diceros bicornis and abalone (Haliotis midae have in common that they both are harvested under open-access conditions, are high-value commodities and are traded illegally. The difference is that a legal market for abalone already exists. An open-access deterrence model was developed for South African abalone, using Table Mountain National Park as a case study. It was found that illegal poaching spiked following the closure of the recreational fishery. The resource custodian's objective is to maximise returns from confiscations. This study showed that a legal trade results in a trading on extinction resource trap, with a race for profits, an increase in the probability of detection after a poaching event and the depletion of populations. In contrast with HS Gordon's seminal article (J Polit Econ 1954;62:124-142, profit maximisation does not automatically improve the sustainability of the resource. Under certain conditions (e.g. a legal trade with costly enforcement, profit maximisation may actually deplete abalone populations. The article also has implications for rhino populations, as a legal trade is currently proposed.

  14. Elimination of HIV in South Africa through expanded access to antiretroviral therapy: a model comparison study.

    Directory of Open Access Journals (Sweden)

    Jan A C Hontelez

    2013-10-01

    Full Text Available BACKGROUND: Expanded access to antiretroviral therapy (ART using universal test and treat (UTT has been suggested as a strategy to eliminate HIV in South Africa within 7 y based on an influential mathematical modeling study. However, the underlying deterministic model was criticized widely, and other modeling studies did not always confirm the study's finding. The objective of our study is to better understand the implications of different model structures and assumptions, so as to arrive at the best possible predictions of the long-term impact of UTT and the possibility of elimination of HIV. METHODS AND FINDINGS: We developed nine structurally different mathematical models of the South African HIV epidemic in a stepwise approach of increasing complexity and realism. The simplest model resembles the initial deterministic model, while the most comprehensive model is the stochastic microsimulation model STDSIM, which includes sexual networks and HIV stages with different degrees of infectiousness. We defined UTT as annual screening and immediate ART for all HIV-infected adults, starting at 13% in January 2012 and scaled up to 90% coverage by January 2019. All models predict elimination, yet those that capture more processes underlying the HIV transmission dynamics predict elimination at a later point in time, after 20 to 25 y. Importantly, the most comprehensive model predicts that the current strategy of ART at CD4 count ≤350 cells/µl will also lead to elimination, albeit 10 y later compared to UTT. Still, UTT remains cost-effective, as many additional life-years would be saved. The study's major limitations are that elimination was defined as incidence below 1/1,000 person-years rather than 0% prevalence, and drug resistance was not modeled. CONCLUSIONS: Our results confirm previous predictions that the HIV epidemic in South Africa can be eliminated through universal testing and immediate treatment at 90% coverage. However, more realistic

  15. Hemodialysis Reliable Outflow (HeRO) device in end-stage dialysis access: a decision analysis model.

    Science.gov (United States)

    Dageforde, Leigh Anne; Bream, Peter R; Moore, Derek E

    2012-09-01

    The Hemodialysis Reliable Outflow (HeRO) dialysis access device is a permanent tunneled dialysis graft connected to a central venous catheter and is used in patients with end-stage dialysis access (ESDA) issues secondary to central venous stenosis. The safety and effectiveness of the HeRO device has previously been proven, but no study thus far has compared the cost of its use with tunneled dialysis catheters (TDCs) and thigh grafts in patients with ESDA. A decision analytic model was developed to simulate outcomes for patients with ESDA undergoing placement of a HeRO dialysis access device, TDC, or thigh graft. Outcomes of interest were infection, thrombosis, and ischemic events. Baseline values, ranges, and costs were determined from a systematic review of the literature. Total costs were based on 1 year of post-procedure outcomes. Sensitivity analyses were conducted to test model strength. The HeRO dialysis access device is the least costly dialysis access with an average 1-year cost of $6521. The 1-year cost for a TDC was $8477. A thigh graft accounted for $9567 in a 1-year time period. The HeRO dialysis access device is the least costly method of ESDA. The primary determinants of cost in this model are infection in TDCs and leg ischemia necessitating amputation in thigh grafts. Further study is necessary to incorporate patient preference and quality of life into the model. Copyright © 2012 Elsevier Inc. All rights reserved.

  16. Using tailored telephone counseling to accelerate the adoption of colorectal cancer screening.

    Science.gov (United States)

    Costanza, Mary E; Luckmann, Roger; Stoddard, Anne M; White, Mary Jo; Stark, Jennifer R; Avrunin, Jill S; Rosal, Milagros C; Clemow, Lynn

    2007-01-01

    Few interventions to increase colorectal cancer screening have used a stage of change model to promote screening adoption. None have used computer-assisted tailored telephone counseling calls. This study's purpose was to implement and evaluate stage-based computer-assisted tailored telephone counseling to promote colorectal cancer screening in a primary care population. This randomized controlled trial used a two-stepped intervention that included a mailed booklet on colorectal cancer screening followed by computer-assisted telephone counseling that was based on the Precaution Adoption Process Model. Chart audit was used to document completion of colonoscopy, sigmoidoscopy or fecal occult blood testing. Record audits were completed on 2,474 (88%) of the 2,817 eligible participants. There was no significant difference in the frequency and nature of the screening tests completed in the study arms. In a sub-analysis, stages of adoption were evaluated pre- and post-telephone counseling. Over half those receiving counseling reported a change in stage towards screening adoption. Overall, the intervention did not increase colorectal screening compared to control. Two possible reasons for the absence of a screening effect include: (a) the focus of the protocol on education for most patients rather than motivation, and (b) the requirement that patients interested in screening seek further information and a referral on their own from their providers. While those receiving telephone counseling improved their stage of adoption, we cannot rule out selection bias. Stronger physician recommendation to speak with the counselors could improve call acceptance. Future colorectal screening should address these weaknesses.

  17. Lumpy - an interactive Lumped Parameter Modeling code based on MS Access and MS Excel.

    Science.gov (United States)

    Suckow, A.

    2012-04-01

    Several tracers for dating groundwater (18O/2H, 3H, CFCs, SF6, 85Kr) need lumped parameter modeling (LPM) to convert measured values into numbers with unit time. Other tracers (T/3He, 39Ar, 14C, 81Kr) allow the computation of apparent ages with a mathematical formula using radioactive decay without defining the age mixture that any groundwater sample represents. Also interpretation of the latter profits significantly from LPM tools that allow forward modeling of input time series to measurable output values assuming different age distributions and mixtures in the sample. This talk presents a Lumped Parameter Modeling code, Lumpy, combining up to two LPMs in parallel. The code is standalone and freeware. It is based on MS Access and Access Basic (AB) and allows using any number of measurements for both input time series and output measurements, with any, not necessarily constant, time resolution. Several tracers, also comprising very different timescales like e.g. the combination of 18O, CFCs and 14C, can be modeled, displayed and fitted simultaneously. Lumpy allows for each of the two parallel models the choice of the following age distributions: Exponential Piston flow Model (EPM), Linear Piston flow Model (LPM), Dispersion Model (DM), Piston flow Model (PM) and Gamma Model (GM). Concerning input functions, Lumpy allows delaying (passage through the unsaturated zone) shifting by a constant value (converting 18O data from a GNIP station to a different altitude), multiplying by a constant value (geochemical reduction of initial 14C) and the definition of a constant input value prior to the input time series (pre-bomb tritium). Lumpy also allows underground tracer production (4He or 39Ar) and the computation of a daughter product (tritiugenic 3He) as well as partial loss of the daughter product (partial re-equilibration of 3He). These additional parameters and the input functions can be defined independently for the two sub-LPMs to represent two different recharge

  18. Accessing key steps of human tumor progression in vivo by using an avian embryo model

    Science.gov (United States)

    Hagedorn, Martin; Javerzat, Sophie; Gilges, Delphine; Meyre, Aurélie; de Lafarge, Benjamin; Eichmann, Anne; Bikfalvi, Andreas

    2005-02-01

    Experimental in vivo tumor models are essential for comprehending the dynamic process of human cancer progression, identifying therapeutic targets, and evaluating antitumor drugs. However, current rodent models are limited by high costs, long experimental duration, variability, restricted accessibility to the tumor, and major ethical concerns. To avoid these shortcomings, we investigated whether tumor growth on the chick chorio-allantoic membrane after human glioblastoma cell grafting would replicate characteristics of the human disease. Avascular tumors consistently formed within 2 days, then progressed through vascular endothelial growth factor receptor 2-dependent angiogenesis, associated with hemorrhage, necrosis, and peritumoral edema. Blocking of vascular endothelial growth factor receptor 2 and platelet-derived growth factor receptor signaling pathways by using small-molecule receptor tyrosine kinase inhibitors abrogated tumor development. Gene regulation during the angiogenic switch was analyzed by oligonucleotide microarrays. Defined sample selection for gene profiling permitted identification of regulated genes whose functions are associated mainly with tumor vascularization and growth. Furthermore, expression of known tumor progression genes identified in the screen (IL-6 and cysteine-rich angiogenic inducer 61) as well as potential regulators (lumican and F-box-only 6) follow similar patterns in patient glioma. The model reliably simulates key features of human glioma growth in a few days and thus could considerably increase the speed and efficacy of research on human tumor progression and preclinical drug screening. angiogenesis | animal model alternatives | glioblastoma

  19. Game-theory Model based on Carrier Sense Multiple Access Protocol in Wireless Network

    Directory of Open Access Journals (Sweden)

    Jun Tian

    2014-06-01

    Full Text Available In order to solve game-theory model problem based on carrier sense multiple access protocol with collision avoidance in wireless network, a game-theory-based general and compatible modeling process is proposed, where the transmission probability of a node in a slot time is regarded as mixed game and network performance parameter M is taken as revenue function of game so as to build M rounds non-cooperative mixed strategy game with N gamers. After performing M rounds game, it will acquire M Nash-equilibria which is not equal to each other, and then these Nash-equilibria are taken as the input of single objective programming model with many constraints so as to obtain compromise equilibria. Finally, a minimum contention window based on compromise equilibria is designed. The throughput and successful transmission rate are analyzed through the simulation, and the simulation experiment results show our proposed modeling process has the more throughputs and the lower drop performance than the existing methods.

  20. The contribution of atom accessibility to site of metabolism models for cytochromes P450

    DEFF Research Database (Denmark)

    Rydberg, Patrik; Rostkowski, M.; Gloriam, D.E.

    2013-01-01

    Three different types of atom accessibility descriptors are investigated in relation to site of metabolism predictions. To enable the integration of local accessibility we have constructed 2DSASA, a method for the calculation of the atomic solvent accessible surface area that is independent of 3D...

  1. Telephone surveying for drug abuse: methodological issues and an application.

    Science.gov (United States)

    Frank, B

    1985-01-01

    In light of New York State's experience, it is probable that future household drug use surveys will use telephone administration. Drug use questions are not as sensitive as had been thought, and are easily administered by telephone. In addition, the lower costs, the computer-assisted capabilities, and the saving in time are some of the advantages in comparison to face-to-face surveying. In order to address the nontelephone segments of the household population--despite their declining proportion--and to improve response rates, mixed-mode interviewing may have to be considered. Given a better understanding of telephone-associated behavior and the increasing popularity of technological advances, such as the portability and mobility of phones, telephone surveying may become even more attractive in the future.

  2. Telephone surveys underestimate cigarette smoking among African-Americans

    Directory of Open Access Journals (Sweden)

    Hope eLandrine

    2013-09-01

    Full Text Available Background. This study tested the hypothesis that data from random digit-dial telephone surveys underestimate the prevalence of cigarette smoking among African-American adults. Method. A novel, community-sampling method was used to obtain a statewide, random sample of N= 2118 California (CA African-American/Black adults, surveyed door-to-door. This Black community sample was compared to the Blacks in the CA Health Interview Survey (N = 2315, a statewide, random digit-dial telephone-survey conducted simultaneously. Results. Smoking prevalence was significantly higher among community (33% than among telephone-survey (19% Blacks, even after controlling for sample-differences in demographics.Conclusions. Telephone surveys underestimate smoking among African-Americans and probably underestimate other health risk behaviors as well. Alternative methods are needed to obtain accurate data on African-American health behaviors and on the magnitude of racial disparities in them.

  3. Telephone Switching Facilities, Published in Not Provided, US Army.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Telephone Switching Facilities dataset as of Not Provided. Data by this publisher are often provided in Not Applicable coordinate system; in a Not Applicable...

  4. A Cerebellar-model Associative Memory as a Generalized Random-access Memory

    Science.gov (United States)

    Kanerva, Pentti

    1989-01-01

    A versatile neural-net model is explained in terms familiar to computer scientists and engineers. It is called the sparse distributed memory, and it is a random-access memory for very long words (for patterns with thousands of bits). Its potential utility is the result of several factors: (1) a large pattern representing an object or a scene or a moment can encode a large amount of information about what it represents; (2) this information can serve as an address to the memory, and it can also serve as data; (3) the memory is noise tolerant--the information need not be exact; (4) the memory can be made arbitrarily large and hence an arbitrary amount of information can be stored in it; and (5) the architecture is inherently parallel, allowing large memories to be fast. Such memories can become important components of future computers.

  5. Analysis and modeling of resistive switching mechanisms oriented to resistive random-access memory

    Institute of Scientific and Technical Information of China (English)

    Huang Da; Wu Jun-Jie; Tang Yu-Hua

    2013-01-01

    With the progress of the semiconductor industry,the resistive random-access memory (RAM) has drawn increasing attention.The discovery of the memristor has brought much attention to this study.Research has focused on the resistive switching characteristics of different materials and the analysis of resistive switching mechanisms.We discuss the resistive switching mechanisms of different materials in this paper and analyze the differences of those mechanisms from the view point of circuitry to establish their respective circuit models.Finally,simulations are presented.We give the prospect of using different materials in resistive RAM on account of their resistive switching mechanisms,which are applied to explain their resistive switchings.

  6. Telephone interventions for adherence to colpocytological examination.

    Science.gov (United States)

    Lima, Thais Marques; Nicolau, Ana Izabel Oliveira; Carvalho, Francisco Herlânio Costa; Vasconcelos, Camila Teixeira Moreira; Aquino, Priscila de Souza; Pinheiro, Ana Karina Bezerra

    2017-02-06

    to test the effects of behavioral and educational intervention by telephone on adherence of women with inappropriate periodicity to colpocytological examination. quasi-experimental study with a sample of 524 women, selected with the following inclusion criteria: be aged between 25 and 64 years, have initiated sexual activity, have inappropriate periodicity of examination and have mobile or landline phone. The women were divided into two groups for application of behavioral and educational intervention by telephone. It was used an intervention script according to the principles of Motivational Interviewing. on comparing the results before and after the behavioral and educational interventions, it was found that there was a statistically significant change (p = 0.0283) with increase of knowledge of women who participated in the educational intervention. There was no change in the attitude of women of any of the groups and there was an increase of adherence to colpocytological examination in both groups (p educativa por telefone na adesão das mulheres com periodicidade inadequada ao exame colpocitológico. estudo quase-experimental, com amostra constituída por 524 mulheres selecionadas conforme os critérios de inclusão: estar na faixa etária entre 25 e 64 anos, ter iniciado atividade sexual, estar com a periodicidade do exame inadequada e possuir telefone móvel ou fixo. As mulheres foram divididas em dois grupos para aplicação da intervenção comportamental e educativa por telefone. Utilizou-se um roteiro de intervenção segundo os preceitos da Entrevista Motivacional. ao comparar antes e depois das intervenções comportamental e educativa constatou-se que houve uma mudança estatisticamente significativa (p = 0,0283) no aumento do conhecimento das mulheres que participaram da intervenção educativa; não houve mudança comprovada na atitude das mulheres de nenhum dos grupos e houve um aumento da adesão ao exame colpocitológico nos dois grupos (p

  7. The cellular mobile telephone: social perception and real facts

    Directory of Open Access Journals (Sweden)

    Pedro Javier Galache Ríos

    2005-12-01

    Full Text Available The cellular mobil telephone has evolved, in a very short period of time, from a technology restricted and scarcely used to the universalitation of its use by all the societies.The social perception that cellular mobil telephone represents a public health risk has created the need of developing a great deal of scientific/tecnics studies and also the implementation of legislation that gaaranties the development and use of information with the uppermost aim of public health protection.

  8. Accessible integration of agriculture, groundwater, and economic models using the Open Modeling Interface (OpenMI: methodology and initial results

    Directory of Open Access Journals (Sweden)

    T. Bulatewicz

    2010-03-01

    Full Text Available Policy for water resources impacts not only hydrological processes, but the closely intertwined economic and social processes dependent on them. Understanding these process interactions across domains is an important step in establishing effective and sustainable policy. Multidisciplinary integrated models can provide insight to inform this understanding, though the extent of software development necessary is often prohibitive, particularly for small teams of researchers. Thus there is a need for practical methods for building interdisciplinary integrated models that do not incur a substantial development effort. In this work we adopt the strategy of linking individual domain models together to build a multidisciplinary integrated model. The software development effort is minimized through the reuse of existing models and existing model-linking tools without requiring any changes to the model source codes, and linking these components through the use of the Open Modeling Interface (OpenMI. This was found to be an effective approach to building an agricultural-groundwater-economic integrated model for studying the effects of water policy in irrigated agricultural systems. The construction of the integrated model provided a means to evaluate the impacts of two alternative water-use policies aimed at reducing irrigated water use to sustainable levels in the semi-arid grasslands overlying the Ogallala Aquifer of the Central US. The results show how both the economic impact in terms of yield and revenue and the environmental impact in terms of groundwater level vary spatially throughout the study region for each policy. Accessible integration strategies are necessary if the practice of interdisciplinary integrated simulation is to become widely adopted.

  9. Analyzing the Energy and Power Consumption of Remote Memory Accesses in the OpenSHMEM Model

    Energy Technology Data Exchange (ETDEWEB)

    Jana, Siddhartha [University of Houston, Houston; Hernandez, Oscar R [ORNL; Poole, Stephen W [ORNL; Hsu, Chung-Hsing [ORNL; Chapman, Barbara [University of Houston, Houston

    2014-01-01

    PGAS models like OpenSHMEM provide interfaces to explicitly initiate one-sided remote memory accesses among processes. In addition, the model also provides synchronizing barriers to ensure a consistent view of the distributed memory at different phases of an application. The incorrect use of such interfaces affects the scalability achievable while using a parallel programming model. This study aims at understanding the effects of these constructs on the energy and power consumption behavior of OpenSHMEM applications. Our experiments show that cost incurred in terms of the total energy and power consumed depends on multiple factors across the software and hardware stack. We conclude that there is a significant impact on the power consumed by the CPU and DRAM due to multiple factors including the design of the data transfer patterns within an application, the design of the communication protocols within a middleware, the architectural constraints laid by the interconnect solutions, and also the levels of memory hierarchy within a compute node. This work motivates treating energy and power consumption as important factors while designing compute solutions for current and future distributed systems.

  10. The EV Project Price/Fee Models for Publicly Accessible Charging

    Energy Technology Data Exchange (ETDEWEB)

    Francfort, James Edward [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-12-01

    As plug-in electric vehicles (PEVs) are introduced to the market place and gain more consumer acceptance, it is important for a robust and self-sustaining non-residential infrastructure of electric vehicle supply equipment (EVSE) to be established to meet the needs of PEV drivers. While federal and state financial incentives for electric vehicles were in place and remain so today, future incentives are uncertain. In order for PEVs to achieve mainstream adoption, an adequate and sustainable commercial or publicly available charging infrastructure was pursued by The EV Project to encourage increased PEV purchases by alleviating range anxiety, and by removing adoption barriers for consumers without a dedicated overnight parking location to provide a home-base charger. This included determining a business model for publicly accessible charge infrastructure. To establish this business model, The EV Project team created a fee for charge model along with various ancillary offerings related to charging that would generate revenue. And after placing chargers in the field the Project rolled out this fee structure.

  11. Market-Based Higher Education: Does Colorado's Voucher Model Improve Higher Education Access and Efficiency?

    Science.gov (United States)

    Hillman, Nicholas W.; Tandberg, David A.; Gross, Jacob P. K.

    2014-01-01

    In 2004, Colorado introduced the nation's first voucher model for financing public higher education. With state appropriations now allocated to students, rather than institutions, state officials expect this model to create cost efficiencies while also expanding college access. Using difference-in-difference regression analysis, we find…

  12. Utilities:Other:Telephone Nodes at Pipe Spring National Monument, Arizona (Utilities.gdb:Other:telephone_node)

    Data.gov (United States)

    National Park Service, Department of the Interior — This feature class represent the nodes of the telephone lines at Pipe Spring National Monument, Arizona. The utility pipelines were collected by a Trimble GeoXT GPS...

  13. Telephone Exchange Areas, Telephone_exchange_areas, Published in 2007, 1:600 (1in=50ft) scale, Buffalo County.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Telephone Exchange Areas dataset, published at 1:600 (1in=50ft) scale, was produced all or in part from Road Centerline Files information as of 2007. It is...

  14. Hub and spoke model: making rural healthcare in India affordable, available and accessible.

    Science.gov (United States)

    Devarakonda, Srichand

    2016-01-01

    Quality health care should be within everyone's reach, especially in a developing country. While India has the largest private health sector in the world, only one-fifth of healthcare expenditure is publically financed; it is mostly an out-of-pocket expense. About 70% of Indians live in rural areas making about $3 per day, and a major portion of that goes towards food and shelter and, thus, not towards health care. Transportation facilities in rural India are poor, making access to medical facilities difficult, and infrastructure facilities are minimal, making the available medical care insufficient. The challenge presented to India was to provide health care that was accessible, available and affordable to people in rural areas and the low-income bracket. The intent of this article is to determine whether the hub and spoke model (HSM), when implemented in the healthcare industry, can expand the market reach and increase profits while reducing costs of operations for organizations and, thereby, cost to customers. This article also discusses the importance of information and communications technologies (ICT) in the HSM approach, which the handful of published articles in this topic have failed to discuss. This article opts for an exploratory study, including review of published literature, web articles, viewpoints of industry experts, published journals, and in-depth interviews. This article will discuss how and why the HSM works in India's healthcare industry while isolating its strengths and weaknesses, and analyzing the impact of India's success. India's HSM implementation has become a paramount example of an acceptable model that, while exceeding the needs and expectations of its patients, is cost-effective and has obtained operational and health-driven results. Despite being an emerging nation, India takes the top spot in terms of affordability of ICT as well as for having the highest number of computer-literate graduates and healthcare workers in the world

  15. Develop and test a solvent accessible surface area-based model in conformational entropy calculations.

    Science.gov (United States)

    Wang, Junmei; Hou, Tingjun

    2012-05-25

    It is of great interest in modern drug design to accurately calculate the free energies of protein-ligand or nucleic acid-ligand binding. MM-PBSA (molecular mechanics Poisson-Boltzmann surface area) and MM-GBSA (molecular mechanics generalized Born surface area) have gained popularity in this field. For both methods, the conformational entropy, which is usually calculated through normal-mode analysis (NMA), is needed to calculate the absolute binding free energies. Unfortunately, NMA is computationally demanding and becomes a bottleneck of the MM-PB/GBSA-NMA methods. In this work, we have developed a fast approach to estimate the conformational entropy based upon solvent accessible surface area calculations. In our approach, the conformational entropy of a molecule, S, can be obtained by summing up the contributions of all atoms, no matter they are buried or exposed. Each atom has two types of surface areas, solvent accessible surface area (SAS) and buried SAS (BSAS). The two types of surface areas are weighted to estimate the contribution of an atom to S. Atoms having the same atom type share the same weight and a general parameter k is applied to balance the contributions of the two types of surface areas. This entropy model was parametrized using a large set of small molecules for which their conformational entropies were calculated at the B3LYP/6-31G* level taking the solvent effect into account. The weighted solvent accessible surface area (WSAS) model was extensively evaluated in three tests. For convenience, TS values, the product of temperature T and conformational entropy S, were calculated in those tests. T was always set to 298.15 K through the text. First of all, good correlations were achieved between WSAS TS and NMA TS for 44 protein or nucleic acid systems sampled with molecular dynamics simulations (10 snapshots were collected for postentropy calculations): the mean correlation coefficient squares (R²) was 0.56. As to the 20 complexes, the TS

  16. Evaluating the impact of climate policies on regional food availability and accessibility using an Integrated Assessment Model

    Science.gov (United States)

    Gilmore, E.; Cui, Y. R.; Waldhoff, S.

    2015-12-01

    Beyond 2015, eradicating hunger will remain a critical part of the global development agenda through the Sustainable Development Goals (SDG). Efforts to limit climate change through both mitigation of greenhouse gas emissions and land use policies may interact with food availability and accessibility in complex and unanticipated ways. Here, we develop projections of regional food accessibility to 2050 under the alternative futures outlined by the Shared Socioeconomic Pathways (SSPs) and under different climate policy targets and structures. We use the Global Change Assessment Model (GCAM), an integrated assessment model (IAM), for our projections. We calculate food access as the weighted average of consumption of five staples and the portion of income spend on those commodities and extend the GCAM calculated universal global producer price to regional consumer prices drawing on historical relationships of these prices. Along the SSPs, food access depends largely on expectations of increases in population and economic status. Under a more optimistic scenario, the pressures on food access from increasing demand and rising prices can be counterbalanced by faster economic development. Stringent climate policies that increase commodity prices, however, may hinder vulnerable regions, namely Sub-Saharan Africa, from achieving greater food accessibility.

  17. Face Recognition for Access Control Systems Combining Image-Difference Features Based on a Probabilistic Model

    Science.gov (United States)

    Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko

    We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.

  18. Using Developmental Theory: When Not to Play Telephone Games

    Directory of Open Access Journals (Sweden)

    Sara Nora Ross

    2008-06-01

    Full Text Available As a powerful way to help understand the behaviors of people and socialgroupings of all kinds, developmental stage theory attracts attention and use outside ofpurely academic environments. These uses take the form of written materials and manykinds of interventions. The level of accuracy of developmental theory informationgenerated and used outside of academe demonstrates wide variety. This variety isreflected in materials and interventions. The information used in materials andinterventions becomes increasingly distorted as it becomes further removed from originaltheoretical sources. This has major implications for the ethics and expertise issues that areinherent in applied developmental theory. A classification scheme of information-usebehaviors, many of which contribute to distortion processes, is used to code actual casesof creating and disseminating distorted developmental theory information, invoking themetaphor of telephone games. Case evidence indicates that casual, illustrative figures in a2006 book by Wilber were used by others for various serious and theoretical purposes,and resulted in major distortions of developmental theory. Wilber’s figures representproblematic issues and errors, including distortion of theory, if they are used—as theyindeed were—for any purpose more serious than his original purpose. Stemming fromthose issues and errors, a highly distorted picture of cognitive development and a pseudoversionof Commons and Richards’ Model of Hierarchical Complexity theory emerged,telephone game-like, in the cases discussed. Errors were widely propagated on theinternet. Because outside of academe, specialized expertise in developmental theory isdifficult to acquire, the sub-field of applied developmental theory requires not onlyaccurate information but also strong communication ethics to govern behaviors ofinformation providers. Such providers need to protect themselves at the same time theyprotect and inform consumers of

  19. Making interdisciplinary solid Earth modeling and analysis tools accessible in a diverse undergraduate and graduate classroom

    Science.gov (United States)

    Becker, T. W.

    2011-12-01

    I present results from ongoing, NSF-CAREER funded educational and research efforts that center around making numerical tools in seismology and geodynamics more accessible to a broader audience. The goal is not only to train students in quantitative, interdisciplinary research, but also to make methods more easily accessible to practitioners across disciplines. I describe the two main efforts that were funded, the Solid Earth Research and Teaching Environment (SEATREE, geosys.usc.edu/projects/seatree/), and a new Numerical Methods class. SEATREE is a modular and user-friendly software framework to facilitate using solid Earth research tools in the undergraduate and graduate classroom and for interdisciplinary, scientific collaboration. We use only open-source software, and most programming is done in the Python computer language. We strive to make use of modern software design and development concepts while remaining compatible with traditional scientific coding and existing, legacy software. Our goals are to provide a fully contained, yet transparent package that lets users operate in an easy, graphically supported "black box" mode, while also allowing to look under the hood, for example to conduct numerous forward models to explore parameter space. SEATREE currently has several implemented modules, including on global mantle flow, 2D phase velocity tomography, and 2D mantle convection and was used at the University of Southern California, Los Angeles, and at a 2010 CIDER summer school tutorial. SEATREE was developed in collaboration with engineering and computer science undergraduate students, some of which have gone on to work in Earth Science projects. In the long run, we envision SEATREE to contribute to new ways of sharing scientific research, and making (numerical) experiments truly reproducible again. The other project is a set of lecture notes and Matlab exercises on Numerical Methods in solid Earth, focusing on finite difference and element methods. The

  20. An accessibility graph-based model to optimize tsunami evacuation sites and routes in Martinique, France

    Science.gov (United States)

    Péroche, M.; Leone, F.; Gutton, R.

    2014-01-01

    The risk of tsunami threatens the whole Caribbean coastline especially the Lesser Antilles. The first available models of tsunami propagation estimate that the travel time from the closest seismic sources would only take few minutes to impact the Martinique Island. Considering this threat, the most effective measure is a planned and organized evacuation of the coastal population. This requires an efficient regional warning system, estimation of the maximum expected tsunami flood height, preparation of the population to evacuate, and drawing up of local and regional emergency plans. In order to produce an efficient evacuation plan, we have to assess the number of people at risk, the potential evacuation routes, the safe areas and the available time to evacuate. However, this essential information is still lacking in the French West Indies emergency plans. This paper proposes a model of tsunami evacuation sites accessibility for Martinique directly addressed to decision makers. It is based on a population database at a local scale, the development of connected graphs of roads, the identification of potential safe areas and the velocity setting for pedestrians. Evacuation routes are calculated using the Dijkstra's algorithm which gives the shortest path between areas at risk and designated evacuation sites. The first results allow us to map the theoretical times and routes to keep the exposed population safe and to compare these results with a tsunami travel time scenario.

  1. Improving Navigation information for the Rotterdam Harbour access through a 3D Model and HF radar

    Science.gov (United States)

    Schroevers, Marinus

    2015-04-01

    The Port of Rotterdam is one of the largest harbours in the world and a gateway to Europe. For the access to Rotterdam harbour, information on hydrodynamic and meteorological conditions is of vital importance for safe and swift navigation. This information focuses on the deep navigation channel in the shallow foreshore, which accommodates large seagoing vessels. Due to a large seaward extension of the Port of Rotterdam area in 2011, current patterns have changed. A re-evaluation of the information needed, showed a need for an improved accuracy of the cross channel currents and swell, and an extended forecast horizon. To obtain this, new information system was designed based on a three dimensional hydrodynamic model which produces a 72 hour forecast. Furthermore, the system will assimilate HF radars surface current to optimize the short term forecast. The project has started in 2013 by specifying data needed from the HF radar. At the same time (temporary) buoys were deployed to monitor vertical current profiles. The HF radar will be operational in July 2015, while the model development starts beginning 2015. A pre operational version of the system is presently planned for the end of 2016. A full operational version which assimilates the HF radar data is planned for 2017.

  2. TTLEM: Open access tool for building numerically accurate landscape evolution models in MATLAB

    Science.gov (United States)

    Campforts, Benjamin; Schwanghart, Wolfgang; Govers, Gerard

    2017-04-01

    Despite a growing interest in LEMs, accuracy assessment of the numerical methods they are based on has received little attention. Here, we present TTLEM which is an open access landscape evolution package designed to develop and test your own scenarios and hypothesises. TTLEM uses a higher order flux-limiting finite-volume method to simulate river incision and tectonic displacement. We show that this scheme significantly influences the evolution of simulated landscapes and the spatial and temporal variability of erosion rates. Moreover, it allows the simulation of lateral tectonic displacement on a fixed grid. Through the use of a simple GUI the software produces visible output of evolving landscapes through model run time. In this contribution, we illustrate numerical landscape evolution through a set of movies spanning different spatial and temporal scales. We focus on the erosional domain and use both spatially constant and variable input values for uplift, lateral tectonic shortening, erodibility and precipitation. Moreover, we illustrate the relevance of a stochastic approach for realistic hillslope response modelling. TTLEM is a fully open source software package, written in MATLAB and based on the TopoToolbox platform (topotoolbox.wordpress.com). Installation instructions can be found on this website and the therefore designed GitHub repository.

  3. Towards developing a compact model for magnetization switching in straintronics magnetic random access memory devices

    Science.gov (United States)

    Barangi, Mahmood; Erementchouk, Mikhail; Mazumder, Pinaki

    2016-08-01

    Strain-mediated magnetization switching in a magnetic tunneling junction (MTJ) by exploiting a combination of piezoelectricity and magnetostriction has been proposed as an energy efficient alternative to spin transfer torque (STT) and field induced magnetization switching methods in MTJ-based magnetic random access memories (MRAM). Theoretical studies have shown the inherent advantages of strain-assisted switching, and the dynamic response of the magnetization has been modeled using the Landau-Lifshitz-Gilbert (LLG) equation. However, an attempt to use LLG for simulating dynamics of individual elements in large-scale simulations of multi-megabyte straintronics MRAM leads to extremely time-consuming calculations. Hence, a compact analytical solution, predicting the flipping delay of the magnetization vector in the nanomagnet under stress, combined with a liberal approximation of the LLG dynamics in the straintronics MTJ, can lead to a simplified model of the device suited for fast large-scale simulations of multi-megabyte straintronics MRAMs. In this work, a tensor-based approach is developed to study the dynamic behavior of the stressed nanomagnet. First, using the developed method, the effect of stress on the switching behavior of the magnetization is investigated to realize the margins between the underdamped and overdamped regimes. The latter helps the designer realize the oscillatory behavior of the magnetization when settling along the minor axis, and the dependency of oscillations on the stress level and the damping factor. Next, a theoretical model to predict the flipping delay of the magnetization vector is developed and tested against LLG-based numerical simulations to confirm the accuracy of findings. Lastly, the obtained delay is incorporated into the approximate solutions of the LLG dynamics, in order to create a compact model to liberally and quickly simulate the magnetization dynamics of the MTJ under stress. Using the developed delay equation, the

  4. Towards developing a compact model for magnetization switching in straintronics magnetic random access memory devices

    Energy Technology Data Exchange (ETDEWEB)

    Barangi, Mahmood, E-mail: barangi@umich.edu; Erementchouk, Mikhail; Mazumder, Pinaki [Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, Michigan 48109-2121 (United States)

    2016-08-21

    Strain-mediated magnetization switching in a magnetic tunneling junction (MTJ) by exploiting a combination of piezoelectricity and magnetostriction has been proposed as an energy efficient alternative to spin transfer torque (STT) and field induced magnetization switching methods in MTJ-based magnetic random access memories (MRAM). Theoretical studies have shown the inherent advantages of strain-assisted switching, and the dynamic response of the magnetization has been modeled using the Landau-Lifshitz-Gilbert (LLG) equation. However, an attempt to use LLG for simulating dynamics of individual elements in large-scale simulations of multi-megabyte straintronics MRAM leads to extremely time-consuming calculations. Hence, a compact analytical solution, predicting the flipping delay of the magnetization vector in the nanomagnet under stress, combined with a liberal approximation of the LLG dynamics in the straintronics MTJ, can lead to a simplified model of the device suited for fast large-scale simulations of multi-megabyte straintronics MRAMs. In this work, a tensor-based approach is developed to study the dynamic behavior of the stressed nanomagnet. First, using the developed method, the effect of stress on the switching behavior of the magnetization is investigated to realize the margins between the underdamped and overdamped regimes. The latter helps the designer realize the oscillatory behavior of the magnetization when settling along the minor axis, and the dependency of oscillations on the stress level and the damping factor. Next, a theoretical model to predict the flipping delay of the magnetization vector is developed and tested against LLG-based numerical simulations to confirm the accuracy of findings. Lastly, the obtained delay is incorporated into the approximate solutions of the LLG dynamics, in order to create a compact model to liberally and quickly simulate the magnetization dynamics of the MTJ under stress. Using the developed delay equation, the

  5. The Association of Expanded Access to a Collaborative Midwifery and Laborist Model With Cesarean Delivery Rates.

    Science.gov (United States)

    Rosenstein, Melissa G; Nijagal, Malini; Nakagawa, Sanae; Gregorich, Steven E; Kuppermann, Miriam

    2015-10-01

    To examine the association between expanded access to collaborative midwifery and laborist services and cesarean delivery rates. This was a prospective cohort study at a community hospital between 2005 and 2014. In 2011, privately insured women changed from a private practice model to one that included 24-hour midwifery and laborist coverage. Primary cesarean delivery rates among nulliparous, term, singleton, vertex women and vaginal birth after cesarean delivery (VBAC) rates among women with prior cesarean delivery were compared before and after the change. Multivariable logistic regression models estimated the effects of the change on the odds of primary cesarean delivery and VBAC; an interrupted time-series analysis estimated the annual rates before and after the expansion. There were 3,560 nulliparous term singleton vertex deliveries and 1,324 deliveries with prior cesarean delivery during the study period; 45% were among privately insured women whose care model changed. The primary cesarean delivery rate among these privately insured women decreased after the change, from 31.7% to 25.0% (P=.005, adjusted odds ratio [OR] 0.56, 95% confidence interval [CI] 0.39-0.81). The interrupted time-series analysis estimated a 7% drop in the primary cesarean delivery rate in the year after the expansion and a decrease of 1.7% per year thereafter. The VBAC rate increased from 13.3% before to 22.4% afterward (adjusted OR 2.03, 95% CI 1.08-3.80). The change from a private practice to a collaborative midwifery-laborist model was associated with a decrease in primary cesarean rates and an increase in VBAC rates. II.

  6. The Importance of Non-accessible Crosslinks and Solvent Accessible Surface Distance in Modeling Proteins with Restraints From Crosslinking Mass Spectrometry.

    Science.gov (United States)

    Matthew Allen Bullock, Joshua; Schwab, Jannik; Thalassinos, Konstantinos; Topf, Maya

    2016-07-01

    Crosslinking mass spectrometry (XL-MS) is becoming an increasingly popular technique for modeling protein monomers and complexes. The distance restraints garnered from these experiments can be used alone or as part of an integrative modeling approach, incorporating data from many sources. However, modeling practices are varied and the difference in their usefulness is not clear. Here, we develop a new scoring procedure for models based on crosslink data-Matched and Nonaccessible Crosslink score (MNXL). We compare its performance with that of other commonly-used scoring functions (Number of Violations and Sum of Violation Distances) on a benchmark of 14 protein domains, each with 300 corresponding models (at various levels of quality) and associated, previously published, experimental crosslinks (XLdb). The distances between crosslinked lysines are calculated either as Euclidean distances or Solvent Accessible Surface Distances (SASD) using a newly-developed method (Jwalk). MNXL takes into account whether a crosslink is nonaccessible, i.e. an experimentally observed crosslink has no corresponding SASD in a model due to buried lysines. This metric alone is shown to have a significant impact on modeling performance and is a concept that is not considered at present if only Euclidean distances are used. Additionally, a comparison between modeling with SASD or Euclidean distance shows that SASD is superior, even when factoring out the effect of the nonaccessible crosslinks. Our benchmarking also shows that MNXL outperforms the other tested scoring functions in terms of precision and correlation to Cα-RMSD from the crystal structure. We finally test the MNXL at different levels of crosslink recovery (i.e. the percentage of crosslinks experimentally observed out of all theoretical ones) and set a target recovery of ∼20% after which the performance plateaus.

  7. Structured telephone support or non-invasive telemonitoring for patients with heart failure.

    Science.gov (United States)

    Inglis, Sally C; Clark, Robyn A; Dierckx, Riet; Prieto-Merino, David; Cleland, John G F

    2015-10-31

    Specialised disease management programmes for heart failure aim to improve care, clinical outcomes and/or reduce healthcare utilisation. Since the last version of this review in 2010, several new trials of structured telephone support and non-invasive home telemonitoring have been published which have raised questions about their effectiveness. To review randomised controlled trials (RCTs) of structured telephone support or non-invasive home telemonitoring compared to standard practice for people with heart failure, in order to quantify the effects of these interventions over and above usual care. We updated the searches of the Cochrane Central Register of Controlled Trials (CENTRAL), Database of Abstracts of Reviews of Effects (DARE), Health Technology AsseFssment Database (HTA) on the Cochrane Library; MEDLINE (OVID), EMBASE (OVID), CINAHL (EBSCO), Science Citation Index Expanded (SCI-EXPANDED), Conference Proceedings Citation Index- Science (CPCI-S) on Web of Science (Thomson Reuters), AMED, Proquest Theses and Dissertations, IEEE Xplore and TROVE in January 2015. We handsearched bibliographies of relevant studies and systematic reviews and abstract conference proceedings. We applied no language limits. We included only peer-reviewed, published RCTs comparing structured telephone support or non-invasive home telemonitoring to usual care of people with chronic heart failure. The intervention or usual care could not include protocol-driven home visits or more intensive than usual (typically four to six weeks) clinic follow-up. We present data as risk ratios (RRs) with 95% confidence intervals (CIs). Primary outcomes included all-cause mortality, all-cause and heart failure-related hospitalisations, which we analysed using a fixed-effect model. Other outcomes included length of stay, health-related quality of life, heart failure knowledge and self care, acceptability and cost; we described and tabulated these. We performed meta-regression to assess homogeneity (the

  8. Increasing access to specialty surgical care: application of a new resource allocation model to bariatric surgery.

    Science.gov (United States)

    Leroux, Eric J; Morton, John M; Rivas, Homero

    2014-08-01

    To calculate the public health impact and economic benefit of using ancillary health care professionals for routine postoperative care. The need for specialty surgical care far exceeds its supply, particularly in weight loss surgery. Bariatric surgery is cost-effective and the only effective long-term weight loss strategy for morbidly obese patients. Without clinically appropriate task shifting, surgeons, hospitals, and untreated patients incur a high opportunity cost. Visit schedules, time per visit, and revenues were obtained from bariatric centers of excellence. Case-specific surgeon fees were derived from published Current Procedural Terminology data. The novel Microsoft Excel model was allowed to run until a steady state was evident (status quo). This model was compared with one in which the surgeon participates in follow-up visits beyond 3 months only if there is a complication (task shifting). Changes in operative capacity and national quality-adjusted life years (QALYs) were calculated. In the status quo model, per capita surgical volume capacity equilibrates at 7 surgical procedures per week, with 27% of the surgeon's time dedicated to routine long-term follow-up visits. Task shifting increases operative capacity by 38%, resulting in 143,000 to 882,000 QALYs gained annually. Per surgeon, task shifting achieves an annual increase of 95 to 588 QALYs, $5 million in facility revenue, 48 cases of cure of obstructive sleep apnea, 44 cases of remission of type 2 diabetes mellitus, and 35 cases of cure of hypertension. Optimal resource allocation through task shifting is economically appealing and can achieve dramatic public health benefit by increasing access to specialty surgery.

  9. Accessibility and ICT: A review of literature, a conceptual model and a research agenda

    NARCIS (Netherlands)

    Van Wee, B.; Chorus, C.

    2009-01-01

    Over the past two decades many papers are published in the area of ICTs impact on travel behaviour. Literature focusing on the impacts of ICT on accessibility is relatively scarce. In this paper we give an overview of impacts of ICT on four components of accessibility as distinguished by Geurs and V

  10. Accessibility and ICT: A review of literature, a conceptual model and a research agenda

    NARCIS (Netherlands)

    Van Wee, B.; Chorus, C.

    2009-01-01

    Over the past two decades many papers are published in the area of ICTs impact on travel behaviour. Literature focusing on the impacts of ICT on accessibility is relatively scarce. In this paper we give an overview of impacts of ICT on four components of accessibility as distinguished by Geurs and V

  11. Modelling and Analysing Access Control Policies in XACML 3.0

    DEFF Research Database (Denmark)

    Ramli, Carroline Dewi Puspa Kencana

    XACML (eXtensible Access Control Markup Language) is a prominent access control language that is widely adopted both in industry and academia. XACML is an international standard in the field of information security. The problem with XACML is that its specification is described in natural language...

  12. Scientific Communication in the Developing World in an Open Access Mode: The SciELO Model

    Institute of Scientific and Technical Information of China (English)

    Rogerio Meneghini; Abel L. Packer

    2006-01-01

    This paper introduces the Scientific Electronic Library Online (SciELO) program and its three main objectives. Then the paper presents the methodology of open access to scientific information by the SciELO. At last, it shows the perspectives of open access in developing countries.

  13. Telephone Crisis Support Workers' Psychological Distress and Impairment.

    Science.gov (United States)

    Kitchingman, Taneile A; Wilson, Coralie J; Caputi, Peter; Wilson, Ian; Woodward, Alan

    2017-03-24

    In order to respond to crises with appropriate intervention, crisis workers are required to manage their own needs as well as the needs of those they respond to. A systematic review of the literature was conducted to examine whether telephone crisis support workers experience elevated symptoms of psychological distress and are impaired by elevated symptoms. Studies were identified in April 2015 by searching three databases, conducting a gray literature search, and forward and backward citation chaining. Of 113 identified studies, seven were included in the review. Results suggest that that telephone crisis support workers experience symptoms of vicarious traumatization, stress, burnout, and psychiatric disorders, and that they may not respond optimally to callers when experiencing elevated symptoms of distress. However, definitive conclusions cannot be drawn due to the paucity and methodological limitations of available data. While the most comprehensive search strategy possible was adopted, resource constraints meant that conference abstracts were not searched and authors were not contacted for additional unpublished information. There is an urgent need to identify the impact of telephone crisis support workers' role on their well-being, the determinants of worker well-being in the telephone crisis support context, and the extent to which well-being impacts their performance and caller outcomes. This will help inform strategies to optimize telephone crisis support workers' well-being and their delivery of support to callers.

  14. Can Smartphones Enhance Telephone-Based Cognitive Assessment (TBCA?

    Directory of Open Access Journals (Sweden)

    Rick Yiu-Cho Kwan

    2013-12-01

    Full Text Available TBCA has emerged to solve the limitations of administering cognitive assessments face-to-face. The recent development of telephones and knowledge advances in the area of cognitive impairment may affect the development of TBCA. The purpose of this paper is to discuss how smartphones can be used to enhance the applicability of TBCA, which has previously been administered by conventional telephone. This paper will first review, describe and critique the existing TBCA instruments. It will then discuss the recent developments in tele-technology, the popularity of tele-technology among the elderly, potential benefits and challenges in using smartphones for cognitive assessment, and possible future developments in this technology. In the systematic review, eighteen TBCA instruments were identified. They were found to be valid in differentiating between people with and without dementia. TBCA was previously found to be launched on a conventional telephone platform. The advances in understanding of cognitive impairment may demand that telephones be equipped with more advanced features. Recently, the development and penetration of smartphones among the elderly has been rapid. This may allow the smartphone to enhance its TBCA applicability by overcoming the limitations of the conventional telephone, rendering the TBCA more efficient in addressing the increasing demand and complexity of cognitive assessments in the future. However, more research and technology developments are needed before smartphones can become a valid platform for TBCA.

  15. ATLAS Event Data Organization and I/O Framework Capabilities in Support of Heterogeneous Data Access and Processing Models

    CERN Document Server

    Malon, David; The ATLAS collaboration

    2016-01-01

    Choices in persistent data models and data organization have significant performance ramifications for data-intensive scientific computing. In experimental high energy physics, organizing file-based event data for efficient per-attribute retrieval may improve the I/O performance of some physics analyses but hamper the performance of processing that requires full-event access. In-file data organization tuned for serial access by a single process may be less suitable for opportunistic sub-file-based processing on distributed computing resources. Unique I/O characteristics of high-performance computing platforms pose additional challenges. The ATLAS experiment at the Large Hadron Collider employs a flexible I/O framework and a suite of tools and techniques for persistent data organization to support an increasingly heterogeneous array of data access and processing models.

  16. ATLAS Event Data Organization and I/O Framework Capabilities in Support of Heterogeneous Data Access and Processing Models

    CERN Document Server

    Malon, David; The ATLAS collaboration; van Gemmeren, Peter

    2016-01-01

    Choices in persistent data models and data organization have significant performance ramifications for data-intensive scientific computing. In experimental high energy physics, organizing file-based event data for efficient per-attribute retrieval may improve the I/O performance of some physics analyses but hamper the performance of processing that requires full-event access. In-file data organization tuned for serial access by a single process may be less suitable for opportunistic sub-file-based processing on distributed computing resources. Unique I/O characteristics of high-performance computing platforms pose additional challenges. This paper describes work in the ATLAS experiment at the Large Hadron Collider to provide an I/O framework and tools for persistent data organization to support an increasingly heterogenous array of data access and processing models.

  17. 47 CFR 36.505 - Accumulated amortization-Tangible-Account 3400 (Class B Telephone Companies); Accumulated...

    Science.gov (United States)

    2010-10-01

    ... (Class B Telephone Companies); Accumulated amortization-Capital Leases-Account 3410 (Class A Telephone... and Deferrals § 36.505 Accumulated amortization—Tangible—Account 3400 (Class B Telephone Companies); Accumulated amortization—Capital Leases—Account 3410 (Class A Telephone Companies). (a) Amounts in...

  18. Does distance decay modelling of supermarket accessibility predict fruit and vegetable intake by individuals in a large metropolitan area?

    Science.gov (United States)

    Robinson, Paul L; Dominguez, Fred.; Teklehaimanot, Senait.; Lee, Martin; Brown, Arleen; Goodchild, Michael

    2013-01-01

    Background Obesity, a major risk factor for hypertension, diabetes, and other chronic diseases is influenced by a person’s local environmental setting. Accessibility to supermarkets has been shown to influence nutritional behaviors and obesity rates; however the specific local environmental conditions and behavioral mechanisms at work in this process remain unclear. Purpose To determine how individual fruit and vegetable consumption behavior was influenced by a distance decay based gravity model of neighborhood geographic accessibility to supermarkets, across neighborhoods in Los Angeles County, independent of other factors that are known to influence nutritional behaviors. Methods A distance decay based accessibility model (gravity model) was specified for a large sample (n=7,514) of urban residents. The associations between their fruit and vegetable consumption patterns and their local accessibility to supermarkets were explored, while controlling for covariates known to influence eating behaviors. Results Significant variation in geographic accessibility and nutritional behavior existed by age, gender, race and ethnicity, education, marital status, poverty status, neighborhood safety and knowledge of nutritional guidelines. Logistic regression showed an independent effect of geographic accessibility to supermarkets, even after the inclusion of known controlling factors. Conclusion A basic gravity model was an effective predictor of fruit and vegetable consumption in an urban population, setting the stage for inclusion of supply and demand parameters, and the ability to estimate local directions and magnitudes of the factors that contribute to the differential obesity rates found in United States urban areas. This knowledge will facilitate more targeted interventions that can help eliminate health disparities. PMID:23395954

  19. Ongoing spontaneous activity controls access to consciousness: a neuronal model for inattentional blindness.

    Directory of Open Access Journals (Sweden)

    Stanislas Dehaene

    2005-05-01

    Full Text Available Even in the absence of sensory inputs, cortical and thalamic neurons can show structured patterns of ongoing spontaneous activity, whose origins and functional significance are not well understood. We use computer simulations to explore the conditions under which spontaneous activity emerges from a simplified model of multiple interconnected thalamocortical columns linked by long-range, top-down excitatory axons, and to examine its interactions with stimulus-induced activation. Simulations help characterize two main states of activity. First, spontaneous gamma-band oscillations emerge at a precise threshold controlled by ascending neuromodulator systems. Second, within a spontaneously active network, we observe the sudden "ignition" of one out of many possible coherent states of high-level activity amidst cortical neurons with long-distance projections. During such an ignited state, spontaneous activity can block external sensory processing. We relate those properties to experimental observations on the neural bases of endogenous states of consciousness, and particularly the blocking of access to consciousness that occurs in the psychophysical phenomenon of "inattentional blindness," in which normal subjects intensely engaged in mental activity fail to notice salient but irrelevant sensory stimuli. Although highly simplified, the generic properties of a minimal network may help clarify some of the basic cerebral phenomena underlying the autonomy of consciousness.

  20. Intermittent ethanol access schedule in rats as a preclinical model of alcohol abuse.

    Science.gov (United States)

    Carnicella, Sebastien; Ron, Dorit; Barak, Segev

    2014-05-01

    One of the major challenges in preclinical studies of alcohol abuse and dependence remains the development of paradigms that will elicit high ethanol intake and mimic the progressive transition from low or moderate social drinking to excessive alcohol consumption. Exposure of outbred rats to repeated cycles of free-choice ethanol intake and withdrawal with the use of intermittent access to 20% ethanol in a 2-bottle choice procedure (IA2BC) has been shown to induce a gradual escalation of voluntary ethanol intake and preference, eventually reaching ethanol consumption levels of 5-6 g/kg/24 h, and inducing pharmacologically relevant blood ethanol concentrations (BECs). This procedure has recently been gaining popularity due to its simplicity, high validity, and reliable outcomes. Here we review experimental and methodological data related to IA2BC, and discuss the usefulness and advantages of this procedure as a valuable pre-training method for initiating operant ethanol self-administration of high ethanol intake, as well as conditioned place preference (CPP). Despite some limitations, we provide evidence that IA2BC and related operant procedures provide the possibility to operationalize multiple aspects of alcohol abuse and addiction in a rat model, including transition from social-like drinking to excessive alcohol consumption, binge drinking, alcohol seeking, relapse, and neuroadaptations related to excessive alcohol intake. Hence, IA2BC appears to be a useful and relevant procedure for preclinical evaluation of potential therapeutic approaches against alcohol abuse disorders.

  1. Protocol for a Randomized Controlled Trial of Proactive Web-Based Versus Telephone-Based Information and Support: Can Electronic Platforms Deliver Effective Care for Lung Cancer Patients?

    Science.gov (United States)

    Boyes, Allison W; O'Brien, Lorna; Baker, Amanda L; Henskens, Frans A; Clinton-McHarg, Tara; Bellamy, Douglas; Colburn, Glenda; Rose, Shiho; Cox, Martine E; Fradgley, Elizabeth A; Baird, Hannah; Barker, Daniel

    2016-01-01

    Background Community-based services such as telephone support lines can provide valuable informational, emotional, and practical support for cancer patients via telephone- or Web-based (live chat or email) platforms. However, very little rigorous research has examined the efficacy of such services in improving patient outcomes. Objective This study will determine whether: proactive telephone or Web-delivered support produces outcomes superior to printed information; and Web-delivered support produces outcomes comparable to telephone support. Methods A consecutive sample of 501 lung cancer outpatients will be recruited from 50 Australian health services to participate in a patient-randomized controlled trial (RCT). Eligible individuals must: be 18 years or older; have received a lung cancer diagnosis (including mesothelioma) within the previous 4 months; have an approximate life expectancy of at least 6 months; and have Internet access. Participants will be randomly allocated to receive: (1) an information booklet, (2) proactive telephone support, or (3) proactive Web support, chat, and/or email. The primary patient outcomes will be measured by the General Health Questionnaire (GHQ-12) and Health Education and Impact Questionnaire (heiQ) at 3 and 6 months post recruitment. The acceptability of proactive recruitment strategies will also be assessed. Results It is hypothesized that participants receiving telephone or Web support will report reduced distress (GHQ-12 scores that are 0.3 standard deviations (SD) lower) and greater self-efficacy (heiQ scores that are 0.3 SDs higher) than participants receiving booklets. Individuals receiving Web support will report heiQ scores within 0.29 SDs of individuals receiving telephone support. Conclusions If proven effective, electronic approaches such as live-chat and email have the potential to increase the accessibility and continuity of supportive care delivered by community-based services. This evidence may also inform the

  2. Telephone management of poisonings using syrup of ipecac.

    Science.gov (United States)

    Veltri, J C; Temple, A R

    1976-01-01

    Seven hundred and seventy-six cases were studied during a six-month period to see if induction of emesis could be successfully managed at home by telephone. Emesis was successful in 98.8% of cases. In 6.7% of all cases, symptoms were found at 4-hour follow-up that were referrable to the ingestion, but all were considered to be of minor consequence. No complications of vomiting occurred. Twenty-four hour follow-up investigation indicated no significant complications of induction of emesis or complications from managing the patient by telephone. It is our conclusion that, with appropriate telephone supervision, home-induced emesis of ingestions expected to produce mild to moderate symptoms is as effective as emergency room or physician office management of cases. Furthermore, the absence of adverse affects of complications arising from the induction of emesis at home in our cases confirms that this form of management is quite safe.

  3. Browsing for the Best Internet Access Provider?

    Science.gov (United States)

    Weil, Marty

    1996-01-01

    Highlights points to consider when choosing an Internet Service Provider. Serial Line Internet Protocol (SLIP) and Point to Point Protocol (PPP) are compared regarding price, performance, bandwidth, speed, and technical support. Obtaining access via local, national, consumer online, and telephone-company providers is discussed. A pricing chart and…

  4. Calling(sup SM) network: A global telephone utility

    Science.gov (United States)

    Tuck, Edward F.; Patterson, David P.; Stuart, James R.; Lawrence, Mark H.

    There is a very large demand for basic telephone service in developing nations and remote parts of industrialized nations, which cannot be met by conventional wireline and cellular systems. This is the world's largest unserved market. We describe a system which uses recent advances in active phased arrays, fast-packet switching technology, adaptive routing, and light spacecraft technology, in part based on the work of the Jet Propulsion Laboratory and on recently-declassified work done on the Strategic Defense Initiative, to make it possible to address this market with a global telephone network based on a large low-Earth-orbit constellation of identical satellites. A telephone utility can use such a network to provide the same modern basic and enhanced telephone services offered by telephone utilities in the urban centers of fully-industrialized nations. Economies of scale permit capital and operating costs per subscriber low enough to provide service to all subscribers, regardless of location, at prices comparable to the same services in urban areas of industrialized nations, while generating operating profits great enough to attract the capital needed for its construction. The bandwidth needed to support the capacity needed to gain those economies of scale require that the system use Ka-band frequencies. This choice of frequencies places unusual constraints on the network design, and in particular forces the use of a large number of satellites. Global demand for basic and enhanced telephone service is great enough to support at least three networks of the size described herein. The volume of advanced components, and services such as launch services, required to construct and replace these networks is sufficient to propel certain industries to market leadership positions in the early 21st century.

  5. Towards effective telephone-based delivery of government services

    CSIR Research Space (South Africa)

    Barnard, E

    2003-09-01

    Full Text Available -section of the population. A further advantage of telephone-based services is the relatively low levels of infrastructure and user sophistication at which such services can operate. We believe that useful services can be delivered to citizens equipped with nothing but a... with nothing but a normal telephone, and requiring no more than the ability to understand and respond to spoken commands. Such a verbal interface is highly appropriate from a cultural perspective in many developing countries, where a strong oral tradition...

  6. Maintenance of the telephone exchange in building 40

    CERN Multimedia

    2006-01-01

    In order to secure the power supply of the telephone exchange in building 40, a maintenance will be done on the 18th of December from 7.30 am to 8 am. During this intervention, the fixed telephony services in building 39 and 40 will be interrupted. The fixed telephony services in other CERN buildings won't be affected by this maintenance. The mobile telephony services (GSM) won't be affected. For more details, please send your questions to Standard.Telephone@cern.ch Telecom Services IT/CS

  7. Communication of medication orders by telephone--"writing it right".

    Science.gov (United States)

    Koczmara, Christine; Jelincic, Valentina; Perri, Dan

    2006-01-01

    Communication is commonly cited as a contributing factor to adverse events causing patient harm (Baker et al., 2004). There are numerous ways and reasons that communication failures can occur, such as poor handwriting, transcription errors, lack of verification, lack of integration of information, and ineffective team functioning. Errors that can occur in critical care with the verbal communication and receipt of a telephone order will be highlighted. These examples, together with proposed strategies for improving telephone order safety, are intended to promote awareness and potential practice changes in the critical care environment.

  8. Schedule for the update of CERN telephone network

    CERN Multimedia

    2003-01-01

    The continuation of ours tasks to update the network is scheduled as follows: May 12 Update of switch N7: Bldg. 39 and 40 We would like to remind you that disturbances or even interruptions of telephony services may occur from 18:30 to 00:00 on the above mentioned dates. CERN divisions are invited to avoid any change requests (set-ups, move or removals) of telephones and fax machines until 12th May. Should you need more details, please send us your questions by email to Standard.Telephone@cern.ch.

  9. The Long-Run Impact on Population and Income of Open Access to Land in a Model with Parental Altruism

    OpenAIRE

    2000-01-01

    Steady state levels of population and per capita income are examined using a Becker-Barro (1988) style of model of an economy with identical altruistic parents bearing costly children who receive bequests of capital and land. Inspired by the work of North (1981) and others, the problem of open access land with ancillary negative effects on private (but not public) productivity of capital is examined. It is seen that open access to land can lead to overpopulation in a ceteris paribus sense, an...

  10. Percutaneous Access: Acute Effects on Renal Function and Structure in a Porcine Model

    Science.gov (United States)

    Handa, Rajash K.; Willis, Lynn R.; Evan, Andrew P.; Connors, Bret A.; Ying, Jun; Fat-Anthony, William; Wind, Kelli R.; Johnson, Cynthia D.; Blomgren, Philip M.; Estrada, Mark C.; Paterson, Ryan F.; Kuo, Ramsay L.; Kim, Samuel C.; Matlaga, Brian R.; Miller, Nicole L.; Watkins, Stephanie L.; Handa, Shelly E.; Lingeman, James E.

    2007-04-01

    Percutaneous nephrolithotomy (PCNL) involves gaining access into the urinary collecting system to remove kidney stones. Animal studies demonstrated that a reduction in renal filtration and perfusion in both kidneys, and a decline in tubular organic anion transport in the treated kidney characterizes the acute (hours) functional response to unilateral percutaneous access. The acute morphologic and histological changes in the treated kidney were consistent with blunt trauma and ischemia. Only tubular organic anion transport remained depressed during the late (3-day) response to the access procedure. Human studies revealed an acute decline in glomerular function and bilateral renal vasoconstriction following unilateral PCNL. Therefore, percutaneous access is not a benign procedure, but is associated with acute functional and structural derangements.

  11. The acceptability to patients of PhysioDirect telephone assessment and advice services; a qualitative interview study.

    Science.gov (United States)

    Pearson, Jennifer; Richardson, Jane; Calnan, Michael; Salisbury, Chris; Foster, Nadine E

    2016-03-28

    In response to long waiting lists and problems with access to primary care physiotherapy, several Primary Care Trusts (PCTs) (now Clinical Commissioning Groups CCGs) developed physiotherapy-led telephone assessment and treatment services. The Medical Research Council (MRC) funded PhysioDirect trial was a randomised control trial (RCT) in four PCTs, with a total of 2252 patients that compared this approach with usual physiotherapy care. This nested qualitative study aimed to explore the acceptability of the PhysioDirect telephone assessment and advice service to patients with musculoskeletal conditions. We conducted 57 semi-structured interviews with adults from 4 PCTs who were referred from general practice to physiotherapy with musculoskeletal conditions and were participating in the PhysioDirect trial. The Framework method was used to analyse the qualitative data. The PhysioDirect service was largely viewed as acceptable although some saw it as a first step to subsequent face-to-face physiotherapy. Most participants found accessing the PhysioDirect service straightforward and smooth, and they valued the faster access to physiotherapy advice offered by the telephone service. Participants generally viewed both the PhysioDirect service and the physiotherapists providing the service as helpful. Participants' preferences and priorities for treatment defined the acceptable features of PhysioDirect but the acceptable features were traded off against less acceptable features. Some participants felt that the PhysioDirect service was impersonal and impaired the development of a good relationship with their physiotherapist, which made the service feel remote and less valuable. The PhysioDirect service was broadly acceptable to participants since it provided faster access to physiotherapy advice for their musculoskeletal conditions. Participants felt that it is best placed as one method of accessing physiotherapy services, in addition to, rather than as a replacement for

  12. Implementing an Open Access Policy – Modeling KAUST in the Region

    KAUST Repository

    Baessa, Mohamed A.

    2014-11-12

    The presentation will discuss different open access approaches, and what can well-fit academic and governmental institutions. As a case study of KAUST, presenters will discuss how it can be initiated in a university set-up, how to get academic stakeholder engaged with support, and how the final stage is reached. Details about the KAUST Open Access Policy for research articles, theses and dissertations and the required tools and workflow to implement the policies will be highlighted.

  13. Is the Short Version of the Big Five Inventory (BFI-S Applicable for Use in Telephone Surveys?

    Directory of Open Access Journals (Sweden)

    Brust Oliver A.

    2016-09-01

    Full Text Available The inclusion of psychological indicators in survey research has become more common because they offer the possibility of explaining much of the variance in sociological variables. The Big Five personality dimensions in particular are often used to explain opinions, attitudes, and behavior. However, the short versions of the Big Five Inventory (BFI-S were developed for face-to-face surveys. Studies have shown distortions in the identification of the Big Five factor structure in subsamples of older respondents in landline telephone surveys. We applied the same BFI-S but with a shorter rating scale in a telephone survey with two subsamples (landline and mobile phone. Using exploratory structural equation modeling (ESEM, we identified the Big Five structure in the subsamples and the age groups. This finding leads us to conclude that the BFI-S is a powerful means of including personality characteristics in telephone surveys.

  14. Modelling and understanding primary health care accessibility and utilization in rural South Africa: an exploration using a geographical information system.

    Science.gov (United States)

    Tanser, Frank; Gijsbertsen, Brice; Herbst, Kobus

    2006-08-01

    Physical access to health care affects a large array of health outcomes, yet meaningfully estimating physical access remains elusive in many developing country contexts where conventional geographical techniques are often not appropriate. We interviewed (and geographically positioned) 23,000 homesteads regarding clinic usage in the Hlabisa health sub-district, KwaZulu-Natal, South Africa. We used a cost analysis within a geographical information system to estimate mean travel time (at any given location) to clinic and to derive the clinic catchments. The model takes into account the proportion of people likely to be using public transport (as a function of estimated walking time to clinic), the quality and distribution of the road network and natural barriers, and was calibrated using reported travel times. We used the model to investigate differences in rural, urban and peri-urban usage of clinics by homesteads in the study area and to quantify the effect of physical access to clinic on usage. We were able to predict the reported clinic used with an accuracy of 91%. The median travel time to nearest clinic is 81 min and 65% of homesteads travel 1h or more to attend the nearest clinic. There was a significant logistic decline in usage with increasing travel time (p rural/peri-urban counterparts, respectively, after controlling for systematic differences in travel time to clinic. The estimated median travel time to the district hospital is 170 min. The methodology constitutes a framework for modelling physical access to clinics in many developing country settings.

  15. An Effective Security Mechanism for M-Commerce Applications Exploiting Ontology Based Access Control Model for Healthcare System

    Directory of Open Access Journals (Sweden)

    S.M. Roychoudri

    2016-09-01

    Full Text Available Health organizations are beginning to move mobile commerce services in recent years to enhance services and quality without spending much investment for IT infrastructure. Medical records are very sensitive and private to any individuals. Hence effective security mechanism is required. The challenges of our research work are to maintain privacy for the users and provide smart and secure environment for accessing the application. It is achieved with the help of personalization. Internet has provided the way for personalization. Personalization is a term which refers to the delivery of information that is relevant to individual or group of individuals in the format, layout specified and in time interval. In this paper we propose an Ontology Based Access Control (OBAC Model that can address the permitted access control among the service providers and users. Personal Health Records sharing is highly expected by the users for the acceptance in mobile commerce applications in health care systems.

  16. The macroeconomic consequences of renouncing to universal access to antiretroviral treatment for HIV in Africa: a micro-simulation model.

    Science.gov (United States)

    Ventelou, Bruno; Arrighi, Yves; Greener, Robert; Lamontagne, Erik; Carrieri, Patrizia; Moatti, Jean-Paul

    2012-01-01

    Previous economic literature on the cost-effectiveness of antiretroviral treatment (ART) programs has been mainly focused on the microeconomic consequences of alternative use of resources devoted to the fight against the HIV pandemic. We rather aim at forecasting the consequences of alternative scenarios for the macroeconomic performance of countries. We used a micro-simulation model based on individuals aged 15-49 selected from nationally representative surveys (DHS for Cameroon, Tanzania and Swaziland) to compare alternative scenarios : 1-freezing of ART programs to current levels of access, 2- universal access (scaling up to 100% coverage by 2015, with two variants defining ART eligibility according to previous or current WHO guidelines). We introduced an "artificial" ageing process by programming methods. Individuals could evolve through different health states: HIV negative, HIV positive (with different stages of the syndrome). Scenarios of ART procurement determine this dynamics. The macroeconomic impact is obtained using sample weights that take into account the resulting age-structure of the population in each scenario and modeling of the consequences on total growth of the economy. Increased levels of ART coverage result in decreasing HIV incidence and related mortality. Universal access to ART has a positive impact on workers' productivity; the evaluations performed for Swaziland and Cameroon show that universal access would imply net cost-savings at the scale of the society, when the full macroeconomic consequences are introduced in the calculations. In Tanzania, ART access programs imply a net cost for the economy, but 70% of costs are covered by GDP gains at the 2034 horizon, even in the extended coverage option promoted by WHO guidelines initiating ART at levels of 350 cc/mm(3) CD4 cell counts. Universal Access ART scaling-up strategies, which are more costly in the short term, remain the best economic choice in the long term. Renouncing or

  17. Tumour risk associated with use of cellular telephones or cordless desktop telephones

    Directory of Open Access Journals (Sweden)

    Söderqvist Fredrik

    2006-10-01

    Full Text Available Abstract Background The use of cellular and cordless telephones has increased dramatically during the last decade. There is concern of health problems such as malignant diseases due to microwave exposure during the use of these devices. The brain is the main target organ. Methods Since the second part of the 1990's we have performed six case-control studies on this topic encompassing use of both cellular and cordless phones as well as other exposures. Three of the studies concerned brain tumours, one salivary gland tumours, one non-Hodgkin lymphoma (NHL and one testicular cancer. Exposure was assessed by self-administered questionnaires. Results Regarding acoustic neuroma analogue cellular phones yielded odds ratio (OR = 2.9, 95 % confidence interval (CI = 2.0–4.3, digital cellular phones OR = 1.5, 95 % CI = 1.1–2.1 and cordless phones OR = 1.5, 95 % CI = 1.04–2.0. The corresponding results were for astrocytoma grade III-IV OR = 1.7, 95 % CI = 1.3–2.3; OR = 1.5, 95 % CI = 1.2–1.9 and OR = 1.5, 95 % CI = 1.1–1.9, respectively. The ORs increased with latency period with highest estimates using > 10 years time period from first use of these phone types. Lower ORs were calculated for astrocytoma grade I-II. No association was found with salivary gland tumours, NHL or testicular cancer although an association with NHL of T-cell type could not be ruled out. Conclusion We found for all studied phone types an increased risk for brain tumours, mainly acoustic neuroma and malignant brain tumours. OR increased with latency period, especially for astrocytoma grade III-IV. No consistent pattern of an increased risk was found for salivary gland tumours, NHL, or testicular cancer.

  18. Telephone-Based Depression Care Management for Postpartum Women: A Randomized Controlled Trial.

    Science.gov (United States)

    Wisner, Katherine L; Sit, Dorothy K Y; McShea, Mary; Luther, James F; Eng, Heather F; Dills, John L; Moses-Kolko, Eydie L; Wisniewski, Stephen R

    2017-08-08

    With a period prevalence of 21.9% in the year after birth, depression is a common complication of childbearing. We assessed the impact of telephone-delivered depression care management (DCM) on symptom levels, health service utilization, and functional status 3, 6, and 12 months postpartum. The randomized controlled trial was conducted at the University of Pittsburgh, Pittsburgh, Pennsylvania, from March 2006 through September 2010. Women (N = 628) who screened positive for depression (a score of 10 or greater on the Edinburgh Postnatal Depression Scale) 4 to 6 weeks postpartum were evaluated with the Structured Clinical Interview for DSM-IV-TR Axis I Disorders, Research Version, Patient Edition With Psychotic Screen and enrolled in a randomized trial of DCM compared to enhanced usual care (EUC). Clinicians conducted telephone contacts to educate, assist with treatment decisions, monitor symptoms, facilitate access to services, and encourage links to community resources. Independent evaluators collected symptom scores, functional status, and health services use at 3, 6, and 12 months postpartum. Primary outcome was reduction of symptoms as measured by the Structured Interview Guide for the Hamilton Depression Rating Scale with Atypical Depression Supplement. Mean depressive symptom and function scores significantly improved (by greater than 50%) in both groups of women but did not differ by DCM versus EUC assignment. Health services use was similar in women randomly assigned to DCM compared to EUC. Women with childhood sexual abuse responded significantly more favorably to DCM on depression and functional measures (all P values < .02). Both DCM and EUC favorably impacted depression symptom levels and function. The subgroup of women with childhood sexual abuse benefited significantly more from DCM compared to the EUC condition. Regular telephone availability of a clinician is a resource that appears to be particularly therapeutic to women with childhood sexual abuse

  19. GP views of nurse-led telephone referral for paediatric assessment.

    Science.gov (United States)

    Birch, S; Glasper, E A; Aitken, P; Wiltshire, M; Cogman, G

    Following the introduction of a new nurse-led telephone referral service to a dedicated paediatric emergency assessment unit (PEAU), a study was conducted to determine the views of general practitioners (GPs) who use the service. The PEAU operates between 10 am and 10 pm on weekdays and between 10 am and 6 pm at weekends. The unit has four beds and treatment and stabilization areas, plus associated services in a dedicated area of a regional child health unit. The design utilized a faxed questionnaire over a 1-month period to all consenting GPs using the PEAU with a postal questionnaire follow-up. Non-parametric Likert scores and qualitative data were used to determine levels of satisfaction with the service and the subsequent management of the referred children. Sixty-nine GPs referred 80 children to the PEAU via the service over a period of 1 month. All consented to participate and were sent a faxed questionnaire, which generated 39 (57%) responses. A follow-up questionnaire sent to the 39 respondents achieved a return of 25 (64%) responses. Thirty-four GPs agreed that referral via the dedicated nurse service was easier than the previous senior house officer referral system. Of the 25 GP respondents to the follow-up postal survey, the majority (17) agreed that the follow-up morning after discharge telephone call to parents by the PEAU nurses was helpful. Four GPs indicated that the 24-hour open access system, offered by the nursing staff, in which a parent may attend PEAU with a discharged child causing concern without a previous appointment, does not always work. This study has shown that a nurse-led telephone referral system to a PEAU for GPs and the subsequent management of the children has been favourably received.

  20. TEACHING BY TELEPHONE, AN EXPERIMENT IN LANGUAGE TEACHING.

    Science.gov (United States)

    GOROSCH, MAX

    PROFICIENCY IN ENGLISH IS A REQUIREMENT IN SWEDEN FOR VOCATIONAL SCHOOL TEACHERS. TEACHING BY TELEPHONE WAS EXPERIMENTED WITH IN AN ATTEMPT TO CREATE A RESERVE OF THESE TEACHERS WHO WOULD MEET THE REQUIRED PROFICIENCY LEVEL. CANDIDATES WHO PASSED AN INITIAL PROFICIENCY TEST FOLLOWED A COURSE FOR FOUR MONTHS IN WHICH SELF-INSTRUCTIONAL BOOKS WITH…

  1. 77 FR 63240 - Telephone Consumer Protection Act of 1991

    Science.gov (United States)

    2012-10-16

    ... organizations, companies with whom consumers have an established business relationship, and calls to persons... COMMISSION 47 CFR Part 64 Telephone Consumer Protection Act of 1991 AGENCY: Federal Communications Commission... that the Office of Management and Budget (OMB) has approved, for a period of three years,...

  2. Disproportionate sampling for population subgroups in telephone surveys.

    Science.gov (United States)

    Kalsbeek, William D; Boyle, Walter R; Agans, Robert P; White, John E

    2007-04-15

    Population studies often seek to examine phenomena in important population subgroups or to compare results among these and other subgroups. When subgroups of interest comprise a relatively small percentage of the population and acceptable subgroup member lists are not available to serve as sampling frames, it may be prohibitively expensive even by telephone to screen through a sample of the entire population. This paper considers some statistical effects of estimation from a class of two-stratum telephone sample designs where part of the frame with a higher subgroup concentration is disproportionately sampled compared to the rest of the frame. Using proportionate sampling as a reference, the relative impact of this disproportionate design is determined for nominal and effective sample sizes, where the latter are tied to the effect of variation in sample weights that occurs in disproportionately allocated samples. Findings are illustrated using two recent telephone surveys. Whereas nominal subgroup sample sizes may be improved by disproportionate sampling, we conclude that both the survey designer and analyst should use this type of design cautiously in telephone surveys.

  3. 7 CFR 1737.60 - Telephone loan budget.

    Science.gov (United States)

    2010-01-01

    ... funds to be used. The budget shall show, as applicable, amounts for central offices, outside plant and..., vehicles and work equipment, office equipment, operating funds, refinancing with loan funds, debt... Telephone Bank (RTB) or concurrently with RTB, the budget shall include the amount required for the...

  4. 76 FR 60765 - Mail or Telephone Order Merchandise Rule

    Science.gov (United States)

    2011-09-30

    ..., and the page of the comment. \\13\\ DMA is a global trade organization representing business and...'s largest retail trade association with membership from all retailing formats and distribution..., not telephone dial-up. \\19\\ U.S. Census Bureau, E-Stats, 2007 E-Commerce Multi-Sector Report, May 28...

  5. Comparison of Mail and Telephone Methods of Studying Media Contactors

    Science.gov (United States)

    McGuire, Bernadette; LeRoy, David J.

    1977-01-01

    A reliable description of the person who writes media letters to newspapers and broadcast stations can be compiled from a combination of telephone and mail data less expensively than attempting to locate these letter writers through a random sample. (Author/JEG)

  6. Assessment of cognitive status in the elderly using telephone interviews.

    Science.gov (United States)

    Debling, D; Amelang, M; Hasselbach, P; Stürmer, T

    2005-10-01

    To examine the feasibility to assess cognitive status in the elderly using telephone interviews. From January to December 2003, 740 participants of the ongoing Heidelberg longitudinal study (HeiDE) aged 70 years or more were eligible for a telephone interview on cognitive status. Validated instruments to assess cognitive status, including the Telephone Interview of Cognitive Status (TICS) and the East Boston Memory Test (EBMT, immediate and delayed recall), the Verbal Fluency Test, the HAWIE-"Vocabulary Test" and the HAWIE-"General Knowledge", a prospective memory test, and a digit span backwards-test were translated into German, if applicable. Out of 740 participants at the age of 70 or older, 473 participants were interviewed (64.9%). The total score of the TICS (maximum=best: 41) ranged from 21 to 40 (mean 33.5, SD 3.1; median 34.0). The EBMT scores (immediate recall; maximum=best: 12) ranged from 4 to 12 (mean 9.2, SD 1.7; median 9.0). Cognitive status could be successfully assessed by telephone interview in elderly participants of an ongoing population-based cohort study. Specifically, some of the tests showed pronounced variability allowing cross-sectional analyses whereas others seem more valuable for longitudinal assessment.

  7. 26 CFR 49.4251-4 - Prepaid telephone cards.

    Science.gov (United States)

    2010-04-01

    ..., sells 1,000 cards it calls prepaid telephone cards to R, a convenience store owner, for $7,000. C..., R is a transferee reseller. Because R's customers will purchase other than for resale, they will be holders. Each card sold by R provides its holder, R's customer, with a fixed amount of...

  8. Referring patients for telephone counseling to promote colorectal cancer screening.

    Science.gov (United States)

    Luckmann, Roger; Costanza, Mary E; Rosal, Milagros; White, Mary Jo; Cranos, Caroline

    2013-09-01

    To determine the feasibility, acceptability, and outcomes of a telephone counseling intervention promoting colorectal cancer (CRC) screening when patients are referred for counseling by primary care providers (PCPs). Interventional cohort study with no formal control group. PCPs in 3 practices were prompted to address CRC screening in patient encounters and, if appropriate, to recommend referral for telephone counseling. A telephone counselor called referred patients, made an appointment for a counseling call, and mailed an educational booklet to patients. Counseling included education about CRC and screening tests, motivational interviewing, barrier counseling, and facilitated referral for colonoscopy or mailing of a fecal occult blood testing kit. About 7 months following counseling, electronic records were searched for evidence of colonoscopy. PCPs addressed CRC screening with 1945 patients, most of whom were up-to-date with CRC testing, recommended counseling referral to 362, and of these 180 (49.7%) accepted the referral. A total of 140 (77.8%) of referred patients were contacted and 67 (37.2%) received counseling. After counseling 93.9% were planning on CRC screening compared with 54.6% at the beginning of the call. Of those planning a colonoscopy, 53.2% received one within 7 months. Referring patients for telephone counseling to promote CRC screening may be feasible and acceptable to PCPs and to some patients, and may increase CRC screening. Further evaluation of the intervention may be warranted to compare the rate of screening associated with the intervention to rates related to usual care and to other interventions.

  9. NETWORK. A History of the Scottish Telephone Referral Service.

    Science.gov (United States)

    Smith, Vernon

    Since its beginnings in 1974 as an outgrowth of the BBC Adult Literacy project, NETWORK SCOTLAND LTD (formerly the Scottish Telephone Referral Service) has grown to play a key role in the provision of broadcast support and educational information services in the United Kingdom. The referral service was originally established to provide a mechanism…

  10. Evaluation of a speech-driven telephone information serviceusing the PARADISE framework: a closer look at subjectivemeasures

    NARCIS (Netherlands)

    Smeele, P.M.T.; Waals, J.A.J.S.

    2003-01-01

    For the evaluation of a speech-driven telephone flight information service we applied the PARADISE model developed by Walker and colleagues [1] in order to gain insight into the factors affecting the user satisfaction of this service. We conducted an experiment in which participants were asked to ca

  11. Usage of data-encoded web maps with client side color rendering for combined data access, visualization, and modeling purposes

    Science.gov (United States)

    Pliutau, Denis; Prasad, Narasimha S.

    2013-05-01

    Current approaches to satellite observation data storage and distribution implement separate visualization and data access methodologies which often leads to the need in time consuming data ordering and coding for applications requiring both visual representation as well as data handling and modeling capabilities. We describe an approach we implemented for a data-encoded web map service based on storing numerical data within server map tiles and subsequent client side data manipulation and map color rendering. The approach relies on storing data using the lossless compression Portable Network Graphics (PNG) image data format which is natively supported by web-browsers allowing on-the-fly browser rendering and modification of the map tiles. The method is easy to implement using existing software libraries and has the advantage of easy client side map color modifications, as well as spatial subsetting with physical parameter range filtering. This method is demonstrated for the ASTER-GDEM elevation model and selected MODIS data products and represents an alternative to the currently used storage and data access methods. One additional benefit includes providing multiple levels of averaging due to the need in generating map tiles at varying resolutions for various map magnification levels. We suggest that such merged data and mapping approach may be a viable alternative to existing static storage and data access methods for a wide array of combined simulation, data access and visualization purposes.

  12. Long-term vascular access ports as a means of sedative administration in a rodent fMRI survival model.

    Science.gov (United States)

    Hettinger, Patrick C; Li, Rupeng; Yan, Ji-Geng; Matloub, Hani S; Cho, Younghoon R; Pawela, Christopher P; Rowe, Daniel B; Hyde, James S

    2011-09-15

    The purpose of this study is to develop a rodent functional magnetic resonance imaging (fMRI) survival model with the use of heparin-coated vascular access devices. Such a model would ease the administration of sedative agents, reduce the number of animals required in survival experiments and eliminate animal-to-animal variability seen in previous designs. Seven male Sprague-Dawley rats underwent surgical placement of an MRI-compatible vascular access port, followed by implantable electrode placement on the right median nerve. Functional MRI during nerve stimulation and resting-state functional connectivity MRI (fcMRI) were performed at times 0, 2, 4, 8 and 12 weeks postoperatively using a 9.4T scanner. Anesthesia was maintained using intravenous dexmedetomidine and reversed using atipamezole. There were no fatalities or infectious complications during this study. All vascular access ports remained patent. Blood oxygen level dependent (BOLD) activation by electrical stimulation of the median nerve using implanted electrodes was seen within the forelimb sensory region (S1FL) for all animals at all time points. The number of activated voxels decreased at time points 4 and 8 weeks, returning to a normal level at 12 weeks, which is attributed to scar tissue formation and resolution around the embedded electrode. The applications of this experiment extend far beyond the scope of peripheral nerve experimentation. These vascular access ports can be applied to any survival MRI study requiring repeated medication administration, intravenous contrast, or blood sampling.

  13. BRICK v0.2, a simple, accessible, and transparent model framework for climate and regional sea-level projections

    Science.gov (United States)

    Wong, Tony E.; Bakker, Alexander M. R.; Ruckert, Kelsey; Applegate, Patrick; Slangen, Aimée B. A.; Keller, Klaus

    2017-07-01

    Simple models can play pivotal roles in the quantification and framing of uncertainties surrounding climate change and sea-level rise. They are computationally efficient, transparent, and easy to reproduce. These qualities also make simple models useful for the characterization of risk. Simple model codes are increasingly distributed as open source, as well as actively shared and guided. Alas, computer codes used in the geosciences can often be hard to access, run, modify (e.g., with regards to assumptions and model components), and review. Here, we describe the simple model framework BRICK (Building blocks for Relevant Ice and Climate Knowledge) v0.2 and its underlying design principles. The paper adds detail to an earlier published model setup and discusses the inclusion of a land water storage component. The framework largely builds on existing models and allows for projections of global mean temperature as well as regional sea levels and coastal flood risk. BRICK is written in R and Fortran. BRICK gives special attention to the model values of transparency, accessibility, and flexibility in order to mitigate the above-mentioned issues while maintaining a high degree of computational efficiency. We demonstrate the flexibility of this framework through simple model intercomparison experiments. Furthermore, we demonstrate that BRICK is suitable for risk assessment applications by using a didactic example in local flood risk management.

  14. Easing reintegration: telephone support groups for spouses of returning Iraq and Afghanistan service members.

    Science.gov (United States)

    Nichols, Linda Olivia; Martindale-Adams, Jennifer; Graney, Marshall J; Zuber, Jeffrey; Burns, Robert

    2013-01-01

    Spouses of returning Iraq (Operation Iraqi Freedom, OIF) and Afghanistan (Operation Enduring Freedom, OEF) military service members report increased depression and anxiety post deployment as they work to reintegrate the family and service member. Reconnecting the family, renegotiating roles that have shifted, reestablishing communication patterns, and dealing with mental health concerns are all tasks that spouses must undertake as part of reintegration. We tested telephone support groups focusing on helping spouses with these basic reintegration tasks. Year-long telephone support groups focused on education, skills building (communication skills, problem solving training, cognitive behavioral techniques, stress management), and support. Spouse depression and anxiety were decreased and perceived social support was increased during the course of the study. In subgroup analyses, spouses with husbands whose injuries caused care difficulties had a positive response to the intervention. However, they were more likely to be depressed, be anxious, and have less social support compared to participants who had husbands who had no injury or whose injury did not cause care difficulty. Study findings suggest that this well-established, high-access intervention can help improve quality of life for military spouses who are struggling with reintegration of the service member and family.

  15. Earth System Model Development and Analysis using FRE-Curator and Live Access Servers: On-demand analysis of climate model output with data provenance.

    Science.gov (United States)

    Radhakrishnan, A.; Balaji, V.; Schweitzer, R.; Nikonov, S.; O'Brien, K.; Vahlenkamp, H.; Burger, E. F.

    2016-12-01

    There are distinct phases in the development cycle of an Earth system model. During the model development phase, scientists make changes to code and parameters and require rapid access to results for evaluation. During the production phase, scientists may make an ensemble of runs with different settings, and produce large quantities of output, that must be further analyzed and quality controlled for scientific papers and submission to international projects such as the Climate Model Intercomparison Project (CMIP). During this phase, provenance is a key concern:being able to track back from outputs to inputs. We will discuss one of the paths taken at GFDL in delivering tools across this lifecycle, offering on-demand analysis of data by integrating the use of GFDL's in-house FRE-Curator, Unidata's THREDDS and NOAA PMEL's Live Access Servers (LAS).Experience over this lifecycle suggests that a major difficulty in developing analysis capabilities is only partially the scientific content, but often devoted to answering the questions "where is the data?" and "how do I get to it?". "FRE-Curator" is the name of a database-centric paradigm used at NOAA GFDL to ingest information about the model runs into an RDBMS (Curator database). The components of FRE-Curator are integrated into Flexible Runtime Environment workflow and can be invoked during climate model simulation. The front end to FRE-Curator, known as the Model Development Database Interface (MDBI) provides an in-house web-based access to GFDL experiments: metadata, analysis output and more. In order to provide on-demand visualization, MDBI uses Live Access Servers which is a highly configurable web server designed to provide flexible access to geo-referenced scientific data, that makes use of OPeNDAP. Model output saved in GFDL's tape archive, the size of the database and experiments, continuous model development initiatives with more dynamic configurations add complexity and challenges in providing an on

  16. Coverage, access, and affordability under health reform: learning from the Massachusetts model.

    Science.gov (United States)

    Long, Sharon K; Stockley, Karen; Nordahl, Kate Willrich

    While the impacts of the Affordable Care Act will vary across the states given their different circumstances, Massachusetts' 2006 reform initiative, the template for national reform, provides a preview of the potential gains in insurance coverage, access to and use of care, and health care affordability for the rest of the nation. Under reform, uninsurance in Massachusetts dropped by more than 50%, due, in part, to an increase in employer-sponsored coverage. Gains in health care access and affordability were widespread, including a 28% decline in unmet need for doctor care and a 38% decline in high out-of-pocket costs.

  17. 多域环境下的分布式RBAC模型%A distributed role-based access control model for multi-domain environments

    Institute of Scientific and Technical Information of China (English)

    洪帆; 朱贤; 邢光林

    2006-01-01

    Access control in multi-domain environments is an important question in building coalition between domains. Based on the RBAC access control model and the concepts of secure domain,the role delegation and role mapping are proposed, which support the third-party authorization. A distributed RBAC model is then presented. Finally implementation issues are discussed.

  18. Microsoft Access Small Business Solutions State-of-the-Art Database Models for Sales, Marketing, Customer Management, and More Key Business Activities

    CERN Document Server

    Hennig, Teresa; Linson, Larry; Purvis, Leigh; Spaulding, Brent

    2010-01-01

    Database models developed by a team of leading Microsoft Access MVPs that provide ready-to-use solutions for sales, marketing, customer management and other key business activities for most small businesses. As the most popular relational database in the world, Microsoft Access is widely used by small business owners. This book responds to the growing need for resources that help business managers and end users design and build effective Access database solutions for specific business functions. Coverage includes::; Elements of a Microsoft Access Database; Relational Data Model; Dealing with C

  19. Effectiveness of a physiotherapy-initiated telephone triage of orthopedic waitlist patients

    Directory of Open Access Journals (Sweden)

    Gilmore L

    2011-08-01

    Full Text Available Joanne Morris1, Karen Grimmer-Somers2, Saravana Kumar2, Karen Murphy3, Lisa Gilmore1, Bryan Ashman1, Chandima Perera1, Kathryn Vine1, Corinne Coulter11The Canberra Hospital, ACT Government Health Directorate, Canberra, ACT, Australia; 2International Centre for Allied Health Evidence, University of South Australia, Adelaide, SA, Australia; 3ACT Government Health Directorate, Canberra, ACT, AustraliaBackground: There is generally a lengthy wait on outpatient orthopedic waiting lists in Australian public hospitals to consult a specialist. Patients then wait again for surgery, if required. Patients with higher need are rarely prioritized, and there is the potential for increased morbidity for those who wait. There is generally no option of alternative care whilst waiting. This paper compares historical orthopedic outpatient clinic data with the outcomes of a physiotherapy-led initiative in one large Australian tertiary hospital.Methods: Two physiotherapists working within-scope conducted a telephone triage (October to December 2010 using a standard instrument for all new patients on the orthopedic waiting list. They were offered primary treatment options of retaining their appointment, being discharged, referral to a new model of assessment (multidisciplinary specialist clinic, or referral to physiotherapy. The outcomes were costs of the service, waiting time, and percentage of patients taking up management options. This was compared with a historical sample of new patients on the orthopedic waiting list (January to March 2009, whose treatment consumption was tracked longitudinally.Results: The telephone triage resulted in 16.4% patients being discharged directly (compared with 0.1% comparison sample. For approximately AU$17.00 per patient, the telephone triage process released 21 booked appointments on the outpatient clinic waiting list. Moreover, approximately 26% patients were referred directly to physiotherapy, which was not a primary management

  20. Do counselor techniques predict quitting during smoking cessation treatment? A component analysis of telephone-delivered Acceptance and Commitment Therapy.

    Science.gov (United States)

    Vilardaga, Roger; Heffner, Jaimee L; Mercer, Laina D; Bricker, Jonathan B

    2014-10-01

    No studies to date have examined the effect of counselor techniques on smoking cessation over the course of treatment. To address this gap, we examined the degree to which the use of specific Acceptance and Commitment Therapy (ACT) counseling techniques in a given session predicted smoking cessation reported at the next session. The data came from the ACT arm of a randomized controlled trial of a telephone-delivered smoking cessation intervention. Trained raters coded 139 counseling sessions across 44 participants. The openness, awareness and activation components of the ACT model were rated for each telephone counseling session. Multilevel logistic regression models were used to estimate the predictive relationship between each component during any given telephone session and smoking cessation at the following telephone session. For every 1-unit increase in counselors' use of openness and awareness techniques there were 42% and 52% decreases in the odds of smoking at the next counseling session, respectively. However, there was no significant predictive relationship between counselors' use of activation techniques and smoking cessation. Overall, results highlight the theoretical and clinical value of examining therapists' techniques as predictors of outcome during the course of treatment. Published by Elsevier Ltd.

  1. New schedule for the update of CERN telephone network

    CERN Multimedia

    2003-01-01

    The continuation of ours tasks to update the network is scheduled as follows: Date Change type Affected area May 6 Update of switch N4 Meyrin Ouest May 8 Update of switch N6 Prévessin Site May 12 Update of switch N7 Building 39 and 40 We would like to remind you that disturbances or even interruptions of telephony services may occur from 18:30 to 00:00 on the above mentioned dates. CERN divisions are invited to avoid any change requests (set-ups, move or removals) of telephones and fax machines until 12th May. Should you need more details, please send us your questions by email to Standard.Telephone@cern.ch.

  2. New schedule for the update of CERN telephone network

    CERN Multimedia

    2003-01-01

    The continuation of ours tasks to update the network is scheduled as follows: Date Change type Affected area April 28 Update of switch in LHC 1 LHC 1 Point April 29 Update of switch in LHC 5 LHC 5 Point May 6 Update of switch N4 Meyrin Ouest May 8 Update of switch N6 Prévessin Site May 12 Update of switch N7 Building 39 and 40 We would like to remind you that disturbances or even interruptions of telephony services may occur from 18:30 to 00:00 on the above mentioned dates. CERN divisions are invited to avoid any change requests (set-ups, move or removals) of telephones and fax machines until 12th May. Should you need more details, please send us your questions by email to Standard.Telephone@cern.ch.

  3. 75 FR 8112 - In the Matter of Certain Mobile Telephones and Wireless Communication Devices Featuring Digital...

    Science.gov (United States)

    2010-02-23

    ... COMMISSION In the Matter of Certain Mobile Telephones and Wireless Communication Devices Featuring Digital... communication devices featuring digital cameras, and components thereof by reason of infringement of certain... mobile telephones or wireless communication devices featuring digital cameras, or ] components...

  4. 75 FR 44282 - In the Matter of Certain Mobile Telephones and Wireless Communication Devices Featuring Digital...

    Science.gov (United States)

    2010-07-28

    ... From the Federal Register Online via the Government Publishing Office INTERNATIONAL TRADE COMMISSION In the Matter of Certain Mobile Telephones and Wireless Communication Devices Featuring Digital... importation of certain mobile telephones and wireless communication devices featuring digital cameras,...

  5. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  6. Reintegration the Role of Spouse Telephone Battlemind Randomized Clinical Trial

    Science.gov (United States)

    2012-10-01

    Afghanistan service members. The goal is to build spouses’ resilience to cope with reintegration challenges, help them serve as a support system for... reintegration difficulties; strategies to support the returning service member; and cues to alert spouses when to seek mental health services for the...available on request) Spouse Telephone Support (STS). In May 2010, Public Law 111-163 Caregivers and Veterans Omnibus Health Services Act of 2010

  7. THE MACHINE LEARNING SYSTEM OF TELEPHONE NETWORKS MANAGEMENT

    Institute of Scientific and Technical Information of China (English)

    CaoLiming; ZhouQiang

    1996-01-01

    The problem of fault information process in telephone networks management system in AT & T in the US has been solved with step-wise learning approach.This method makes the information decrease step by step by means of merge and sort, classifies the information to several typical classes and establishes the knowledgebase (KB) eventually. If new fault information is inputted, we will call the knowledge in KB and predict the related faults which will happen.

  8. Automatic frequency assignment for cellular telephones using constraint satisfaction techniques

    OpenAIRE

    Carlsson, Mats; Grindal, Mats

    1993-01-01

    We study the problem of automatic frequency assignment for cellular telephone systems. The frequency assignment problem is viewed as the problem to minimize the unsatisfied soft constraints in a constraint satisfaction problem (CSP) over a finite domain of frequencies involving co-channel, adjacent channel, and co-site constraints. The soft constraints are automatically derived from signal strength prediction data. The CSP is solved using a generalized graph coloring algorit...

  9. Collecting household water usage data: telephone questionnaire or diary?

    Directory of Open Access Journals (Sweden)

    Sinclair Martha I

    2009-11-01

    Full Text Available Abstract Background Quantitative Microbial Risk Assessment (QMRA, a modelling approach, is used to assess health risks. Inputs into the QMRA process include data that characterise the intensity, frequency and duration of exposure to risk(s. Data gaps for water exposure assessment include the duration and frequency of urban non-potable (non-drinking water use. The primary objective of this study was to compare household water usage results obtained using two data collection tools, a computer assisted telephone interview (CATI and a 7-day water activity diary, in order to assess the effect of different methodological survey approaches on derived exposure estimates. Costs and logistical aspects of each data collection tool were also examined. Methods A total of 232 households in an Australian dual reticulation scheme (where households are supplied with two grades of water through separate pipe networks were surveyed about their water usage using both a CATI and a 7-day diary. Householders were questioned about their use of recycled water for toilet flushing, garden watering and other outdoor activities. Householders were also questioned about their water use in the laundry. Agreement between reported CATI and diary water usage responses was assessed. Results Results of this study showed that the level of agreement between CATI and diary responses was greater for more frequent water-related activities except toilet flushing and for those activities where standard durations or settings were employed. In addition, this study showed that the unit cost of diary administration was greater than for the CATI, excluding consideration of the initial selection and recruitment steps. Conclusion This study showed that it is possible to successfully 'remotely' coordinate diary completion providing that adequate instructions are given and that diary recording forms are well designed. In addition, good diary return rates can be achieved using a monetary incentive

  10. Automated telephone reminder messages can assist electronic diabetes care.

    Science.gov (United States)

    Mollon, Brent; Holbrook, Anne M; Keshavjee, Karim; Troyan, Sue; Gaebel, Kathryn; Thabane, Lehana; Perera, Gihan

    2008-01-01

    Telephone reminder systems have been used to assist in the treatment of many chronic diseases. However, it is unclear if these systems can increase medication and appointment adherence in patients with diabetes without direct patient-provider telephone contact. We tested the feasibility of using an automated telephone reminder system (ATRS) to deliver reminder messages to 253 adults with diabetes enrolled in a randomized controlled trial. Eighty-four percent of the patients were able to register using voice recognition and at least one reminder was delivered to 95% of registered patients over a period of 7.5 months. None of the demographic features studied predicted a patient's ability to enroll or to receive reminder calls. At the end of the study, 63% of patients indicated that they wished to continue to receive ATRS calls. The level of system use as determined by the number of received reminder calls was not associated with a change in the number of physician visits or diabetes-related laboratory tests during follow-up. The clinical benefits and sustainability of ATRS remain unproven, but our results indicate that an automated reminder system can be effective for providing messages to a large group of older patients with diabetes.

  11. Pediatric telephone advice: a new medical service in Israel.

    Science.gov (United States)

    Sher, C; Mimouni, M; Weitzen, T; Waisman, Y

    1994-08-01

    Although controversy still exists about dispensing medical advice over the telephone, such services are widely offered by pediatricians in the USA. In Israel, however, such services have not yet been developed. In a joint project of the Moked Keshev (a private medical help line) at Magen David Adom (national ambulance service) and the Children's Medical Center of Israel, the first pediatric telephone advice service in Israel was established. In this study we analyzed 512 consecutive incoming calls received during the first 11 months of service operation. Of these, 42% of calls concerned children in the 1 month to 1 year age group. Unexpectedly, calls were almost evenly distributed throughout the week with a slight decrease on Fridays and Saturdays (sabbath), and 45.7% of the calls were received during the morning shift. The three most common reasons for contact were: of a general nature such as fever (23%), gastrointestinal problems (19%), and medical questions (18%). In only 20.7% of the cases were the patients advised to go to the nearest hospital emergency department, emphasizing the non-emergent nature of the calls. At the time of follow-up (within 24 h), patient status was assessed as: improved (73.7%), same (22.6%), and worse (3.8%). Of those who became worse, none required an emergency department evaluation. The present study demonstrates that a Pediatric Telephone Advice Service in Israel is technically functional, medically safe, and contributes to the health management of children.

  12. Initial experiments on the effectiveness of telephone access to government services

    CSIR Research Space (South Africa)

    Cloete, Jacob PL

    2004-08-01

    Full Text Available - and post-experiment interviews and an observed experiment. The experiments were performed at the Department of Labour in Pretoria, South Africa, in November 2003. Unscreened participants were solicited from the queue of UIF applicants. 14 callers used..., a number of conclusions were reached. Although transaction- completion rates were comparable for the speech-input and DTMF systems, users were much more comfortable with the speech-based system as reflected in somewhat higher user-satisfaction...

  13. The macroeconomic consequences of renouncing to universal access to antiretroviral treatment for HIV in Africa: a micro-simulation model.

    Directory of Open Access Journals (Sweden)

    Bruno Ventelou

    Full Text Available AIM: Previous economic literature on the cost-effectiveness of antiretroviral treatment (ART programs has been mainly focused on the microeconomic consequences of alternative use of resources devoted to the fight against the HIV pandemic. We rather aim at forecasting the consequences of alternative scenarios for the macroeconomic performance of countries. METHODS: We used a micro-simulation model based on individuals aged 15-49 selected from nationally representative surveys (DHS for Cameroon, Tanzania and Swaziland to compare alternative scenarios : 1-freezing of ART programs to current levels of access, 2- universal access (scaling up to 100% coverage by 2015, with two variants defining ART eligibility according to previous or current WHO guidelines. We introduced an "artificial" ageing process by programming methods. Individuals could evolve through different health states: HIV negative, HIV positive (with different stages of the syndrome. Scenarios of ART procurement determine this dynamics. The macroeconomic impact is obtained using sample weights that take into account the resulting age-structure of the population in each scenario and modeling of the consequences on total growth of the economy. RESULTS: Increased levels of ART coverage result in decreasing HIV incidence and related mortality. Universal access to ART has a positive impact on workers' productivity; the evaluations performed for Swaziland and Cameroon show that universal access would imply net cost-savings at the scale of the society, when the full macroeconomic consequences are introduced in the calculations. In Tanzania, ART access programs imply a net cost for the economy, but 70% of costs are covered by GDP gains at the 2034 horizon, even in the extended coverage option promoted by WHO guidelines initiating ART at levels of 350 cc/mm(3 CD4 cell counts. CONCLUSION: Universal Access ART scaling-up strategies, which are more costly in the short term, remain the best economic

  14. The Macroeconomic Consequences of Renouncing to Universal Access to Antiretroviral Treatment for HIV in Africa: A Micro-Simulation Model

    Science.gov (United States)

    Ventelou, Bruno; Arrighi, Yves; Greener, Robert; Lamontagne, Erik; Carrieri, Patrizia; Moatti, Jean-Paul

    2012-01-01

    Aim Previous economic literature on the cost-effectiveness of antiretroviral treatment (ART) programs has been mainly focused on the microeconomic consequences of alternative use of resources devoted to the fight against the HIV pandemic. We rather aim at forecasting the consequences of alternative scenarios for the macroeconomic performance of countries. Methods We used a micro-simulation model based on individuals aged 15–49 selected from nationally representative surveys (DHS for Cameroon, Tanzania and Swaziland) to compare alternative scenarios : 1-freezing of ART programs to current levels of access, 2- universal access (scaling up to 100% coverage by 2015, with two variants defining ART eligibility according to previous or current WHO guidelines). We introduced an “artificial” ageing process by programming methods. Individuals could evolve through different health states: HIV negative, HIV positive (with different stages of the syndrome). Scenarios of ART procurement determine this dynamics. The macroeconomic impact is obtained using sample weights that take into account the resulting age-structure of the population in each scenario and modeling of the consequences on total growth of the economy. Results Increased levels of ART coverage result in decreasing HIV incidence and related mortality. Universal access to ART has a positive impact on workers' productivity; the evaluations performed for Swaziland and Cameroon show that universal access would imply net cost-savings at the scale of the society, when the full macroeconomic consequences are introduced in the calculations. In Tanzania, ART access programs imply a net cost for the economy, but 70% of costs are covered by GDP gains at the 2034 horizon, even in the extended coverage option promoted by WHO guidelines initiating ART at levels of 350 cc/mm3 CD4 cell counts. Conclusion Universal Access ART scaling-up strategies, which are more costly in the short term, remain the best economic choice in the

  15. 30 CFR 77.508 - Lightning arresters, ungrounded and exposed power conductors and telephone wires.

    Science.gov (United States)

    2010-07-01

    ... power conductors and telephone wires. 77.508 Section 77.508 Mineral Resources MINE SAFETY AND HEALTH... arresters, ungrounded and exposed power conductors and telephone wires. All ungrounded, exposed power conductors and telephone wires shall be equipped with suitable lightning arresters which are...

  16. 30 CFR 75.521 - Lightning arresters; ungrounded and exposed power conductors and telephone wires.

    Science.gov (United States)

    2010-07-01

    ... power conductors and telephone wires. 75.521 Section 75.521 Mineral Resources MINE SAFETY AND HEALTH... Electrical Equipment-General § 75.521 Lightning arresters; ungrounded and exposed power conductors and telephone wires. Each ungrounded, exposed power conductor and each ungrounded, exposed telephone wire...

  17. 46 CFR 32.30-1 - Voice tubes or telephone equipment-T/ALL.

    Science.gov (United States)

    2010-10-01

    ..., MACHINERY, AND HULL REQUIREMENTS Sound Powered Telephone, Voice Tube, and Engine Order Telegraph Systems § 32.30-1 Voice tubes or telephone equipment—T/ALL. Each tankships must have communication equipment... 46 Shipping 1 2010-10-01 2010-10-01 false Voice tubes or telephone equipment-T/ALL....

  18. State University of New York Controls Over Telephone Systems at Selected Campuses.

    Science.gov (United States)

    New York State Office of the Comptroller, Albany.

    The State University of New York (SUNY) consists of 29 State-operated campuses. Campuses of the SUNY system each operate and manage their own telephone systems. Campuses may own or lease their own telephone system called a private branch exchange (PBX). A PBX makes a campus a miniature telephone company with the ability to add and delete telephone…

  19. CTEPP STANDARD OPERATING PROCEDURE FOR TELEPHONE SAMPLE SUBJECTS RECRUITMENT (SOP-1.12)

    Science.gov (United States)

    The subject recruitment procedures for the telephone sample component are described in the SOP. A random telephone sample list is ordered from a commercial survey sampling firm. Using this list, introductory letters are sent to targeted homes prior to making initial telephone c...

  20. 47 CFR 64.608 - Provision of hearing aid compatible telephones by exchange carriers.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Provision of hearing aid compatible telephones... Provision of hearing aid compatible telephones by exchange carriers. In the absence of alternative suppliers in an exchange area, an exchange carrier must provide a hearing aid compatible telephone, as...

  1. 47 CFR 68.201 - Connection to the public switched telephone network.

    Science.gov (United States)

    2010-10-01

    ... CARRIER SERVICES (CONTINUED) CONNECTION OF TERMINAL EQUIPMENT TO THE TELEPHONE NETWORK Terminal Equipment Approval Procedures § 68.201 Connection to the public switched telephone network. Terminal equipment may not be connected to the public switched telephone network unless it has either been certified by...

  2. Accessing Data Bases Through Interface Views Using a Unified Graph-Oriented Entity-Relationship Model

    DEFF Research Database (Denmark)

    Kraft, Peter; Sørensen, Jens Otto

    Interface Abstract: The paper describes an Entity Relationship (ER) model with a diagrammed schema and extensions modeled into a graph. The semantics of schema symbols are fundamentally simple implying a unified model where given conceptualizations of environments are diagrammed uniquely. By the ......Interface Abstract: The paper describes an Entity Relationship (ER) model with a diagrammed schema and extensions modeled into a graph. The semantics of schema symbols are fundamentally simple implying a unified model where given conceptualizations of environments are diagrammed uniquely...

  3. Accessibility modeling and evaluation: the TIGRIS XL land-use and transport interaction model for the Netherlands

    NARCIS (Netherlands)

    Zondag, B.; de Bok, M.; Geurs, Karst Teunis; Molenwijk, E.

    2015-01-01

    In current practice, transportation planning often ignores the effects of major transportation improvements on land use and the distribution of land use activities, which might affect the accessibility impacts and economic efficiency of the transportation investment strategies. In this paper, we

  4. Fresh produce consumption and the association between frequency of food shopping, car access, and distance to supermarkets.

    Science.gov (United States)

    Gustat, Jeanette; O'Malley, Keelia; Luckett, Brian G; Johnson, Carolyn C

    2015-01-01

    Fresh fruit and vegetables are important components of a healthy diet. Distance to a supermarket has been associated with the ability to access fresh produce. A randomly sampled telephone survey was conducted with the main shopper for 3000 households in New Orleans, Louisiana in 2011. Individuals were asked where and how often they shopped for groceries, frequency of consumption of a variety of foods, and whether they had access to a car. Bivariate models assessed the relationship between four outcomes: car access, distance to the store patronized by the respondent, number of monthly shopping trips, and daily servings of produce. Structural equation modeling (SEM) was used to distinguish direct and indirect effects. In bivariate models, car access was positively associated with number of shopping trips and produce consumption while distance was inversely associated with shopping trips. In SEM models, produce consumption was not associated with car access or distance, but to the number of monthly shopping trips. The frequency of shopping is associated with car access but a further distance deters it. Access to stores closer to the shopper may promote more frequent shopping and consumption of produce.

  5. Are transnational tobacco companies’ market access strategies linked to economic development models? A case study of South Korea

    Science.gov (United States)

    Lee, Sungkyu; Holden, Chris; Lee, Kelley

    2013-01-01

    Transnational tobacco companies (TTCs) have used varied strategies to access previously closed markets. Using TTCs’ efforts to enter the South Korean market from the late 1980s as a case study, this article asks whether there are common patterns in these strategies that relate to the broader economic development models adopted by targeted countries. An analytical review of the existing literature on TTCs’ efforts to access emerging markets was conducted to develop hypotheses relating TTCs’ strategies to countries’ economic development models. A case study of Korea was then undertaken based on analysis of internal tobacco industry documents. Findings were consistent with the hypothesis that TTCs’ strategies in Korea were linked to Korea’s export-oriented economic development model and its hostile attitude toward foreign investment. A fuller understanding of TTCs’ strategies for expansion globally can be derived by locating them within the economic development models of specific countries or regions. Of foremost importance is the need for governments to carefully balance economic and public health policies when considering liberalisation. PMID:23327486

  6. Are transnational tobacco companies' market access strategies linked to economic development models? A case study of South Korea.

    Science.gov (United States)

    Lee, Sungkyu; Holden, Chris; Lee, Kelley

    2013-01-01

    Transnational tobacco companies (TTCs) have used varied strategies to access previously closed markets. Using TTCs' efforts to enter the South Korean market from the late 1980s as a case study, this article asks whether there are common patterns in these strategies that relate to the broader economic development models adopted by targeted countries. An analytical review of the existing literature on TTCs' efforts to access emerging markets was conducted to develop hypotheses relating TTCs' strategies to countries' economic development models. A case study of Korea was then undertaken based on analysis of internal tobacco industry documents. Findings were consistent with the hypothesis that TTCs' strategies in Korea were linked to Korea's export-oriented economic development model and its hostile attitude towards foreign investment. A fuller understanding of TTCs' strategies for expansion globally can be derived by locating them within the economic development models of specific countries or regions. Of foremost importance is the need for governments to carefully balance economic and public health policies when considering liberalisation.

  7. Ontology Based Access Control

    Directory of Open Access Journals (Sweden)

    Özgü CAN

    2010-02-01

    Full Text Available As computer technologies become pervasive, the need for access control mechanisms grow. The purpose of an access control is to limit the operations that a computer system user can perform. Thus, access control ensures to prevent an activity which can lead to a security breach. For the success of Semantic Web, that allows machines to share and reuse the information by using formal semantics for machines to communicate with other machines, access control mechanisms are needed. Access control mechanism indicates certain constraints which must be achieved by the user before performing an operation to provide a secure Semantic Web. In this work, unlike traditional access control mechanisms, an "Ontology Based Access Control" mechanism has been developed by using Semantic Web based policies. In this mechanism, ontologies are used to model the access control knowledge and domain knowledge is used to create policy ontologies.

  8. Evidence that attitude accessibility augments the relationship between speeding attitudes and speeding behavior: a test of the MODE model in the context of driving.

    Science.gov (United States)

    Elliott, Mark A; Lee, Emme; Robertson, Jamie S; Innes, Rhona

    2015-01-01

    According to the MODE model of attitude-to-behavior processes, attitude accessibility augments attitude-behavior correspondence, reflecting an automatic influence of attitudes on behavior. We therefore tested whether attitude accessibility moderates the attitude-behavior relationship in a context that is governed by characteristically automatic behavior, namely driving. In study 1 (correlational design), participants (N=130) completed online questionnaire measures of the valences and accessibilities of their attitudes towards speeding. Two weeks later, online questionnaire measures of subsequent speeding behavior were obtained. Attitude valence was a significantly better predictor of behavior at high (mean+1SD) versus low (mean-1SD) levels of attitude accessibility. In study 2 (experimental design), attitude accessibility was manipulated with a repeated attitude expression task. Immediately after the manipulation, participants (N=122) completed online questionnaire measures of attitude valence and accessibility, and two weeks later, subsequent speeding behavior. Increased attitude accessibility in the experimental (versus control) condition generated an increase in attitude-behavior correspondence. The findings are consistent with the MODE model's proposition that attitudes can exert an automatic influence on behavior. Interventions to reduce speeding could usefully increase the accessibility of anti-speeding attitudes and reduce the accessibility of pro-speeding attitudes.

  9. Urban Railway Accessibility

    Institute of Scientific and Technical Information of China (English)

    GUAN Hongzhi; YIN Yuanfei; YAN Hai; HAN Yan; QIN Huanmei

    2007-01-01

    Effective use of urban rapid railway systems requires that the railway systems be effectively connected with other transportation modes so that they are accessible. This paper uses the logit model and data to analyze the factors influencing railway access choices in a railway choice access model. The results indicate that access time, access cost, and access distance are factors significantly affecting railway access choices. The user's income significantly affects the probability of choosing to walk rather than to take a taxi,but is not related to choosing buses or bicycles. Vehicle ownership significantly affects the probability of choosing a taxi, but is not significantly related to the other modes. The conclusions provide an analysis tool for urban railway planning and construction.

  10. Accent modulates access to word meaning: Evidence for a speaker-model account of spoken word recognition.

    Science.gov (United States)

    Cai, Zhenguang G; Gilbert, Rebecca A; Davis, Matthew H; Gaskell, M Gareth; Farrar, Lauren; Adler, Sarah; Rodd, Jennifer M

    2017-11-01

    Speech carries accent information relevant to determining the speaker's linguistic and social background. A series of web-based experiments demonstrate that accent cues can modulate access to word meaning. In Experiments 1-3, British participants were more likely to retrieve the American dominant meaning (e.g., hat meaning of "bonnet") in a word association task if they heard the words in an American than a British accent. In addition, results from a speeded semantic decision task (Experiment 4) and sentence comprehension task (Experiment 5) confirm that accent modulates on-line meaning retrieval such that comprehension of ambiguous words is easier when the relevant word meaning is dominant in the speaker's dialect. Critically, neutral-accent speech items, created by morphing British- and American-accented recordings, were interpreted in a similar way to accented words when embedded in a context of accented words (Experiment 2). This finding indicates that listeners do not use accent to guide meaning retrieval on a word-by-word basis; instead they use accent information to determine the dialectic identity of a speaker and then use their experience of that dialect to guide meaning access for all words spoken by that person. These results motivate a speaker-model account of spoken word recognition in which comprehenders determine key characteristics of their interlocutor and use this knowledge to guide word meaning access. Copyright © 2017 The Authors. Published by Elsevier Inc. All rights reserved.

  11. Policies to Spur Energy Access. Executive Summary; Volume 1, Engaging the Private Sector in Expanding Access to Electricity; Volume 2, Case Studies to Public-Private Models to Finance Decentralized Electricity Access

    Energy Technology Data Exchange (ETDEWEB)

    Walters, Terri [National Renewable Energy Lab. (NREL), Golden, CO (United States); Rai, Neha [International Institute for Environment and Development (IIED), London (England); Esterly, Sean [National Renewable Energy Lab. (NREL), Golden, CO (United States); Cox, Sadie [National Renewable Energy Lab. (NREL), Golden, CO (United States); Reber, Tim [National Renewable Energy Lab. (NREL), Golden, CO (United States); Muzammil, Maliha [Univ. of Oxford (United Kingdom); Mahmood, Tasfiq [International Center for Climate Change and Development, Baridhara (Bangladesh); Kaur, Nanki [International Institute for Environment and Development (IIED), London (England); Tesfaye, Lidya [Echnoserve Consulting (Ethiopia); Mamuye, Simret [Echnoserve Consulting (Ethiopia); Knuckles, James [Univ. of London (England). Cass Business School; Morris, Ellen [Columbia Univ., New York, NY (United States); de Been, Merijn [Delft Univ. of Technology (Netherlands); Steinbach, Dave [International Institute for Environment and Development (IIED), London (England); Acharya, Sunil [Digo Bikas Inst. (Nepal); Chhetri, Raju Pandit [National Renewable Energy Lab. (NREL), Golden, CO (United States); Bhushal, Ramesh [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2015-09-01

    Government policy is one of the most important factors in engaging the private sector in providing universal access to electricity. In particular, the private sector is well positioned to provide decentralized electricity products and services. While policy uncertainty and regulatory barriers can keep enterprises and investors from engaging in the market, targeted policies can create opportunities to leverage private investment and skills to expand electricity access. However, creating a sustainable market requires policies beyond traditional electricity regulation. The report reviews the range of policy issues that impact the development and expansion of a market for decentralized electricity services from establishing an enabling policy environment to catalyzing finance, building human capacity, and integrating energy access with development programs. The case studies in this report show that robust policy frameworks--addressing a wide range of market issues--can lead to rapid transformation in energy access. The report highlights examples of these policies in action Bangladesh, Ethiopia, Mali, Mexico, and Nepal.

  12. Pro Access 2010 Development

    CERN Document Server

    Collins, Mark

    2011-01-01

    Pro Access 2010 Development is a fundamental resource for developing business applications that take advantage of the features of Access 2010 and the many sources of data available to your business. In this book, you'll learn how to build database applications, create Web-based databases, develop macros and Visual Basic for Applications (VBA) tools for Access applications, integrate Access with SharePoint and other business systems, and much more. Using a practical, hands-on approach, this book will take you through all the facets of developing Access-based solutions, such as data modeling, co

  13. Barriers to access to treatment for mothers with postpartum depression in primary health care centers: a predictive model

    Directory of Open Access Journals (Sweden)

    Pablo Martínez

    2016-01-01

    Full Text Available Objective to develop a predictive model to evaluate the factors that modify the access to treatment for Postpartum Depression (PPD. Methods prospective study with mothers who participated in the monitoring of child health in primary care centers. For the initial assessment and during 3 months, it was considered: sociodemographic data, gyneco-obstetric data, data on the services provided, depressive symptoms according to the Edinburgh Postpartum Depression Scale (EPDS and quality of life according to the Short Form-36 Health Status Questionnaire (SF-36. The diagnosis of depression was made based on MINI. Mothers diagnosed with PPD in the initial evaluation, were followed-up. Results a statistical model was constructed to determine the factors that prevented access to treatment, which consisted of: item 2 of EPDS (OR 0.43, 95%CI: 0.20-0.93 and item 5 (OR 0.48, 95%CI: 0.21-1.09, and previous history of depression treatment (OR 0.26, 95%CI: 0.61-1.06. Area under the ROC curve for the model=0.79; p-value for the Hosmer-Lemershow=0.73. Conclusion it was elaborated a simple, well standardized and accurate profile, which advises that nurses should pay attention to those mothers diagnosed with PPD, presenting low/no anhedonia (item 2 of EPDS, scarce/no panic/fear (item 5 of EPDS, and no history of depression, as it is likely that these women do not initiate treatment.

  14. Lowering the Barrier to Cross-Disciplinary Scientific Data Access via a Brokering Service Built Around a Unified Data Model

    Science.gov (United States)

    Lindholm, D. M.; Wilson, A.

    2012-12-01

    The steps many scientific data users go through to use data (after discovering it) can be rather tedious, even when dealing with datasets within their own discipline. Accessing data across domains often seems intractable. We present here, LaTiS, an Open Source brokering solution that bridges the gap between the source data and the user's code by defining a unified data model plus a plugin framework for "adapters" to read data from their native source, "filters" to perform server side data processing, and "writers" to output any number of desired formats or streaming protocols. A great deal of work is being done in the informatics community to promote multi-disciplinary science with a focus on search and discovery based on metadata - information about the data. The goal of LaTiS is to go that last step to provide a uniform interface to read the dataset into computer programs and other applications once it has been identified. The LaTiS solution for integrating a wide variety of data models is to return to mathematical fundamentals. The LaTiS data model emphasizes functional relationships between variables. For example, a time series of temperature measurements can be thought of as a function that maps a time to a temperature. With just three constructs: "Scalar" for a single variable, "Tuple" for a collection of variables, and "Function" to represent a set of independent and dependent variables, the LaTiS data model can represent most scientific datasets at a low level that enables uniform data access. Higher level abstractions can be built on top of the basic model to add more meaningful semantics for specific user communities. LaTiS defines its data model in terms of the Unified Modeling Language (UML). It also defines a very thin Java Interface that can be implemented by numerous existing data interfaces (e.g. NetCDF-Java) such that client code can access any dataset via the Java API, independent of the underlying data access mechanism. LaTiS also provides a

  15. Accessing Data Bases Through Interface Views Using a Unified Graph-Oriented Entity-Relationship Model

    DEFF Research Database (Denmark)

    Kraft, Peter; Sørensen, Jens Otto

    Interface Abstract: The paper describes an Entity Relationship (ER) model with a diagrammed schema and extensions modeled into a graph. The semantics of schema symbols are fundamentally simple implying a unified model where given conceptualizations of environments are diagrammed uniquely. By the ......Interface Abstract: The paper describes an Entity Relationship (ER) model with a diagrammed schema and extensions modeled into a graph. The semantics of schema symbols are fundamentally simple implying a unified model where given conceptualizations of environments are diagrammed uniquely....... By the model almost all parts of a total system can be specified on a conceptual level. The paper focuses on languages by which views corresponding to complex user interfaces are derived, and on the applicability of views in manipulation of stored information. As an overall advantage we claim that working...... with a unified graphic model is more efficient and less error-prone than working with more complex ER models and models based on lexical description. Key terms: Entity-relationship model, path expressions, entity-relationship language, derived interface view, view updates, graphical models....

  16. Creating three-dimensional models for the inclusion of accessibility requirements in architecture.

    Directory of Open Access Journals (Sweden)

    Silvana da Rocha Rodrigues

    2013-12-01

    Full Text Available Este artículo presenta un conjunto de herramientas que ayuda al arquitecto en la representación gráfica de sus proyectos de accesibilidad. La propuesta visa la dificultad de los profesionales de Arquitectura para presentar sus proyectos a los clientes, ya que estos no tienen el repertorio técnico necesario a la comprensión de los dibujos técnicos tradicionales. Para minimizar esas dificultades, se ha desarrollado una herramienta llamada SketchUp_Access, la que integra una biblioteca de modelos de accesibilidad para el software SketchUp y ofrece un conjunto de herramientas que, dadas las normas de ccesibilidad, auxilia al arquitecto en la representación gráfica de su proyecto.

  17. Statistical Modeling of Antenna: Urban Equipment Interactions for LTE Access Points

    Directory of Open Access Journals (Sweden)

    Xin Zeng

    2012-01-01

    Full Text Available The latest standards for wireless networks such as LTE are essentially based on small cells in order to achieve a large network capacity. This applies for antennas to be deployed at street level or even within buildings. However, antennas are commonly designed, simulated, and measured in ideal conditions, which is not the real situation for most applications where antennas are often deployed in proximity to objects acting as disturbers. In this paper, three conventional wireless access point scenarios (antenna-wall, antenna-shelter, and antenna lamppost are investigated for directional or omnidirectional antennas. The paper first addresses the definition of three performance indicators for such scenarios and secondly uses such parameters towards the statistical analysis of the interactions between the wall and the antennas.

  18. Introducing a Fresh Cadaver Model for Ultrasound-guided Central Venous Access Training in Undergraduate Medical Education

    Directory of Open Access Journals (Sweden)

    Ryan Miller

    2016-05-01

    Full Text Available Introduction: Over the past decade, medical students have witnessed a decline in the opportunities to perform technical skills during their clinical years. Ultrasound-guided central venous access (USG-CVA is a critical procedure commonly performed by emergency medicine, anesthesia, and general surgery residents, often during their first month of residency. However, the acquisition of skills required to safely perform this procedure is often deficient upon graduation from medical school. To ameliorate this lack of technical proficiency, ultrasound simulation models have been introduced into undergraduate medical education to train venous access skills. Criticisms of simulation models are the innate lack of realistic tactile qualities, as well as the lack of anatomical variances when compared to living patients. The purpose of our investigation was to design and evaluate a life-like and reproducible training model for USG-CVA using a fresh cadaver. Methods: This was a cross-sectional study at an urban academic medical center. An 18-point procedural knowledge tool and an 18-point procedural skill evaluation tool were administered during a cadaver lab at the beginning and end of the surgical clerkship. During the fresh cadaver lab, procedure naïve third-year medical students were trained on how to perform ultrasound-guided central venous access of the femoral and internal jugular vessels. Preparation of the fresh cadaver model involved placement of a thin-walled latex tubing in the anatomic location of the femoral and internal jugular vein respectively. Results: Fifty-six third-year medical students participated in this study during their surgical clerkship. The fresh cadaver model provided high quality and lifelike ultrasound images despite numerous cannulation attempts. Technical skill scores improved from an average score of 3 to 12 (p<0.001 and procedural knowledge scores improved from an average score of 4 to 8 (p<0.001. Conclusion: The use of

  19. Properties of Closed-Loop Reference Models in Adaptive Control: Part I Full States Accessible

    CERN Document Server

    Gibson, Travis E; Lavretsky, Eugene

    2012-01-01

    This paper explores the properties of adaptive systems with closed-loop reference models. Historically, reference models in adaptive systems run open-loop in parallel with the plant and controller, using no information from the plant or controller to alter the trajectory of the reference system. Closed-loop reference models on the other hand use information from the plant to alter the reference trajectory. We show that closed-loop reference models have one more free design parameter as compared to their open-loop counterparts. Using the extra design freedom, we study closed--loop reference models and their impact on transient response and robustness in adaptive systems.

  20. [Depression telephone helpline: help seeking during the financial crisis].

    Science.gov (United States)

    Economou, M; Peppou, L E; Louki, E; Komporozos, A; Mellou, A; Stefanis, C

    2012-01-01

    Mental health telephone help-lines usually play a significant role in mental health services system. Their importance is substantiated during periods of financial crisis, where the mental health of the population is gravely inflicted. Media reports have documented a large increase in calls made to mental health telephone help-lines around the world as a corollary to the global economic crisis; however, a systematic investigation of this observation is still lacking. In this context, the present study endeavours to fill this gap in the literature, while it adds strength to the handful of studies which have empirically supported the impact of the financial crisis on mental health in Greece. Data were extracted from information gleaned during the calls made to the Depression Telephone Helpline of the Greek University Mental Health Research Institute. The information entailed the reason for calling, the socio-demographic and clinical profile of the person with mental health problems, his/her previous and current contacts with mental health professionals and the treatment he/she might be receiving. The results showed a steep increase in calls with direct or indirect reference to the economic crisis during the first half of 2010 and onwards. The callers who referred to the economic crisis manifested depressive symptomatology of clinical significance to a greater degree than callers who made no such reference. The latter exhibited increased levels of distress and agitation as well as drug/alcohol misuse. Concomitantly, a higher frequency of depressive symptomatology was discerned among the unemployed, whereas employed people were found to experience anxiety symptoms to a higher degree. The impact of the financial crisis on the mental health of the Greek population has been considerable, underscoring in this way the importance of mental health help-lines as emotional buffers and as guides for timely and appropriate service use in response to the emerging mental health

  1. The Impact of a Telephone-Based Chronic Disease Management Program on Medical Expenditures.

    Science.gov (United States)

    Avery, George; Cook, David; Talens, Sheila

    2016-06-01

    The impact of a payer-provided telephone-based chronic disease management program on medical expenditures was evaluated using claims data from 126,245 members in employer self-ensured health plans (16,224 with a chronic disease in a group enrolled in the self-management program, 13,509 with a chronic disease in a group not participating in the program). A random effects regression model controlling for retrospective risk, age, sex, and diagnosis with a chronic disease was used to determine the impact of program participation on market-adjusted health care expenditures. Further confirmation of results was obtained by an ordinary least squares model comparing market- and risk-adjusted costs to the length of participation in the program. Participation in the program is associated with an average annual savings of $1157.91 per enrolled member in health care expenditures. Savings increase with the length of participation in the program. The results support the use of telephone-based patient self-management of chronic disease as a cost-effective means to reduce health care expenditures in the working-age population. (Population Health Management 2016;19:156-162).

  2. The Determinants of the Global Mobile Telephone Deployment: An Empirical Analysis

    Directory of Open Access Journals (Sweden)

    Sheikh Taher ABU

    2010-01-01

    Full Text Available This study aims to analyze the global mobile phones by examining the instruments stimulating the diffusion pattern. A rigorous demand model is estimated using global mobile telecommu-nications panel dataset comprised with 51 countries classified in order to World Bank income categories from 1990-2007. In particular, the paper examines what factors contribute the most to the deployment of global mobile telephones. To construct an econometric model, the number of subscribers to mobile phone per 100 inhabitants is taken as dependent variable, while the following groups of variables (1 GDP per capita income and charges, (2 competition policies (3 telecom infrastructure (4 technological innovations (5 others are selected as independent variables. Estimation results report the presence of substantial disparity among groups. Additionally GDP per capita income and own-price elasticity comprised with call rate, subscription charges, are reported. The analysis of impulse responses for price, competition policies, and technological innovations such as digitalization of mobile network, mobile network coverage indicates that substantial mobile telephone growth is yet to be realized especially in developing countries. A new and important empirical finding is that there are still many opportunities available for mobile phone development in the world pro-poor nations by providing better telecom infrastructure.

  3. 1What do first-time mothers worry about? A study of usage patterns and content of calls made to a postpartum support telephone hotline

    Directory of Open Access Journals (Sweden)

    Naassan Georges

    2010-10-01

    Full Text Available Abstract Background Telephone hotlines designed to address common concerns in the early postpartum could be a useful resource for parents. Our aim was to test the feasibility of using a telephone as an intervention in a randomized controlled trial. We also aimed to test to use of algorithms to address parental concerns through a telephone hotline. Methods Healthy first-time mothers were recruited from postpartum wards of hospitals throughout Lebanon. Participants were given the number of a 24-hour telephone hotline that they could access for the first four months after delivery. Calls were answered by a midwife using algorithms developed by the study team whenever possible. Callers with medical complaints were referred to their physicians. Call patterns and content were recorded and analyzed. Results Eighty-four of the 353 women enrolled (24% used the hotline. Sixty percent of the women who used the service called more than once, and all callers reported they were satisfied with the service. The midwife received an average of three calls per day and most calls occurred during the first four weeks postpartum. Our algorithms were used to answer questions in 62.8% of calls and 18.6% of calls required referral to a physician. Of the questions related to mothers, 66% were about breastfeeding. Sixty percent of questions related to the infant were about routine care and 23% were about excessive crying. Conclusions Utilization of a telephone hotline service for postpartum support is highest in the first four weeks postpartum. Most questions are related to breastfeeding, routine newborn care, and management of a fussy infant. It is feasible to test a telephone hotline as an intervention in a randomized controlled trial. Algorithms can be developed to provide standardized answers to the most common questions.

  4. Ludvig Lorenz, Electromagnetism, and the Theory of Telephone Currents

    CERN Document Server

    Kragh, Helge

    2016-01-01

    Ludvig V. Lorenz (1829-1891) was Denmark's first theoretical physicist and the only one whose work attracted international attention in the second half of the nineteenth century. This paper presents a survey of Lorenz's contributions to physics with an emphasis on his work in electrodynamics and electrical science. His 1867 electrodynamic theory of light was of a theoretical and foundational nature, while his unpublished theory of telephone currents was oriented toward practical problems in long-distance telephony. Lorenz's theories are briefly compared to those of better known physicists such as H. A. Lorentz, J. C. Maxwell, and O. Heaviside.

  5. Towards a 21st century telephone exchange at CERN

    CERN Document Server

    AUTHOR|(SzGeCERN)745509; Hesnaux, Anthony Gerard; Sierra, Rodrigo; Chapron, Frederic; CERN. Geneva. IT Department

    2015-01-01

    The advent of mobile telephony and Voice over IP (VoIP) has significantly impacted the traditional telephone exchange industry—to such an extent that private branch exchanges are likely to disappear completely in the near future. For large organisations, such as CERN, it is important to be able to smooth this transition by implementing new multimedia platforms that can protect past investments and the flexibility needed to securely interconnect emerging VoIP solutions and forthcoming developments such as Voice over LTE (VoLTE). We present the results of ongoing studies and tests at CERN of the latest technologies in this area.

  6. Breast clinic triage tool: telephone assessment of new referrals.

    Science.gov (United States)

    Cusack, Leila; Brennan, Meagan; Weissenberg, Leisha; Moore, Katrina

    2012-04-01

    Efficient systems to triage increasing numbers of new referrals to breast clinics are needed, to optimise the management of patients with cancer and benign disease. A tool was developed to triage the urgency of referrals and allocate the most appropriate clinician consultation (surgeon or breast physician (BP)). 259 consecutive new referrals were triaged using the tool. 100% new cancers and 256 (98.8%) referrals overall were triaged to both appropriate category of urgency and the appropriate clinician. This triage tool provides a simple method for assessing new referrals to a breast clinic and can be easily delivered by trained administrative staff by telephone.

  7. Towards a 21st century telephone exchange at CERN

    Science.gov (United States)

    Valentín, F.; Hesnaux, A.; Sierra, R.; Chapron, F.

    2015-12-01

    The advent of mobile telephony and Voice over IP (VoIP) has significantly impacted the traditional telephone exchange industry—to such an extent that private branch exchanges are likely to disappear completely in the near future. For large organisations, such as CERN, it is important to be able to smooth this transition by implementing new multimedia platforms that can protect past investments and the flexibility needed to securely interconnect emerging VoIP solutions and forthcoming developments such as Voice over LTE (VoLTE). We present the results of ongoing studies and tests at CERN of the latest technologies in this area.

  8. Electromagnetic fields in the vicinity of DECT cordless telephones and mobile phones

    Directory of Open Access Journals (Sweden)

    Paweł Mamrot

    2015-12-01

    Full Text Available Background: Mobile telephones belong to the most frequently used personal devices. In their surroundings they produce the electromagnetic field (EMF, in which exposure range there are not only users but also nearby bystanders. The aim of the investigations and EMF measurements in the vicinity of phones was to identify the electric field levels with regard to various working modes. Material and methods: Twelve sets of DECT (digital enhanced cordless telecommunications cordless phones (12 base units and 15 handsets, 21 mobile telephones produced by different manufactures, and 16 smartphones in various applications, (including multimedia in the conditions of daily use in living rooms were measured. Measurements were taken using the point method in predetermined distances of 0.05–1 m from the devices without the presence of users. Results: In the vicinity of DECT cordless phone handsets, electric field strength ranged from 0.26 to 2.30 V/m in the distance of 0.05 m – 0.18–0.26 V/m (1 m. In surroundings of DECT cordless telephones base units the values of EMF were from 1.78–5.44 V/m (0.05 m to 0.19– 0.41 V/m (1 m. In the vicinity of mobile phones working in GSM mode with voice transmission, the electric field strength ranged from 2.34–9.14 V/m (0.05 m to 0.18–0.47 V/m (1 m while in the vicinity of mobile phones working in WCDMA (Wideband Code Division Multiple Access mode the electric field strength ranged from 0.22–1.83 V/m (0.05 m to 0.18–0.20 V/m (1 m. Conclusions: The mean values of the electric field strength for each group of devices, mobile phones and DECT wireless phones sets do not exceed the reference value of 7 V/m, adopted as the limit for general public exposure. Med Pr 2015;66(6:803–814

  9. Episodic memory impairment in Addison's disease: results from a telephonic cognitive assessment.

    Science.gov (United States)

    Henry, Michelle; Thomas, Kevin G F; Ross, Ian L

    2014-06-01

    Patients with Addison's disease frequently self-report memory and attention difficulties, even when on standard replacement therapy. However, few published studies examine, using objective measures and assessing across multiple domains, the cognitive functioning of Addison's disease patients relative to healthy controls. The primary aim of this study was to investigate whether the previously reported subjective cognitive deficits in Addison's disease are confirmed by objective measures. Conducting comprehensive neuropsychological assessments of patients with relatively rare clinical disorders, such as Addison's disease, is challenging because access to those patients is often limited, and because their medical condition might prevent extended testing sessions. Brief telephonic cognitive assessments are a useful tool in such circumstances. Hence, we administered the Brief Test of Adult Cognition by Telephone to 27 Addison's disease patients and 27 matched healthy controls. The instrument provides objective assessment of episodic memory, working memory, executive functioning, reasoning, and speed of processing. Statistical analyses confirmed that, as expected, patients performed significantly more poorly than controls on the episodic memory subtest. There were, however, no significant between-group differences on the attention, executive functioning, reasoning, and speed of processing subtests. Furthermore, patients with a longer duration of illness performed more poorly across all domains of cognition. We conclude that, for Addison's disease patients, previously reported subjective cognitive deficits are matched by objective impairment, but only in the domain of episodic memory. Future research might investigate (a) whether these memory deficits are material-specific (i.e., whether non-verbal memory is also affected), and (b) the neurobiological mechanisms underlying these deficits.

  10. Injuries caused by pets in Asian urban households: a cross-sectional telephone survey

    Science.gov (United States)

    Chan, Emily Y Y; Gao, Yang; Li, Liping; Lee, Po Yi

    2017-01-01

    Objectives Little is known about pet-related injuries in Asian populations. This study primarily aimed to investigate the incidence rate of pet-related household injuries in Hong Kong, an urban Chinese setting. Setting Cantonese-speaking non-institutionalised population of all ages in Hong Kong accessible by telephone land-line. Participants A total of 43 542 telephone numbers were dialled and 6570 residents successfully completed the interviews. Primary and secondary outcome measures Data of pet-related household injuries in the previous 12 months, pet ownership and socio-demographic characteristics were collected with a questionnaire. Direct standardisation of the incidence rates of pet-related household injuries by gender and age to the 2009 Hong Kong Population Census was estimated. Univariate and multivariate analyses were performed to estimate risks of socio-demographic factors and pet ownership for the injury. Results A total of 84 participants experienced pet-related household injuries in the past 12 months, with an overall person-based incidence rate of 1.28%. The majority of the victims were injured once (69.6%). Cats (51.6%) were the most common pets involved. Pet owners were at an extremely higher risk after controlling for other factors (adjusted OR: 52.0, 95% CI 22.1 to 98.7). Females, the unmarried, those with higher monthly household income and those living in lower-density housing were more likely to be injured by pets. Conclusions We project a pet-related household injury incidence rate of 1.24% in the general Hong Kong population, with 86 334 residents sustaining pet-related injuries every year. Pet ownership puts people at extremely high risk, especially the unmarried. Further studies should focus on educating pet owners to reduce pet-related injuries in urban Greater China. PMID:28110284

  11. An Analysis of the Distributed Architecture for a Telephone Based Human Computer Dialogue System

    Institute of Scientific and Technical Information of China (English)

    WANGHengt; DULimin

    2004-01-01

    The main purpose of this paper was to present a distributed speech interactive system built on LAN (Local area network), which integrated Automatic speech recognition (ASR), Text to speech (TTS) and Natural language perception (NLP) technologies to allow multiusers to access and converse with it concurrently. During a typical telephone based interaction, users could retrieve up-to-date stock information and call for somebody by directly speaking their name. Though there were far too many papers published to describe such system, most of them all focused on the algorithm on speech recognition rather than the architecture. Our paper was written to make for it and proposed an efficient and effective dynamic load balancing algorithm with sender active and non-preemptive concepts based on the distributed architecture and multithread concurrency in order to solve the loads allocating when multi-users accessed the system and gave rise to much burden to the servers. This paper was composed of five part: (1) an introduction about why such architecture was built; (2) an overview about the system; (3) proposed and implemented the algorithm; (4) evaluated and tested the system performance based on the architecture; and (5) a brief summary.

  12. A Hybrid Networking Model for the Access Layer of the Communication Network for Distribution in Smart Grid

    Directory of Open Access Journals (Sweden)

    Wang Hao

    2016-01-01

    Full Text Available The access layer in the communication network for distribution is an important link in the automation of smart distribution power grid. In current access layer of communication network for distribution in Chinese power grid systems, several communication methods like optical fiber, mediumvoltage carrier communication, 1.8GHz TD-LTE power private wireless network, 230MHz TD-LTE power private wireless network, public wireless network are constructed concurrently and running simultaneously in an identical power supply area. This traditional networking model will cause repeated construction and operation and maintenance difficulties in the communication network of power grid. On the basis of giving a detailed analysis of the radio link budget of TD-LTE power private wireless network in two frequencies, this paper present a multi-communication methods hybrid networking model, which gives a clear boundary for different communication methods based on the isoline with equal signal strength of the TD-LTE power private wireless network and accomplish the optimization of communication resources for distribution.

  13. Access to emergency number services.

    Science.gov (United States)

    Harkins, Judith E; Strauss, Karen Peltz

    2008-01-01

    Access to emergency services is mandated by Title II of the Americans with Disabilities Act (ADA). The Department of Justice oversees the accessibility of public safety answering points (PSAPs), popularly called 9-1-1 centers. The Federal Communications Commission (FCC) has at least two roles in emergency number access: (1) as regulator of the ADA's Title IV on telecommunications access, and (2) as regulator of communications companies with regard to support of and interconnection with PSAPs. The rules of both agencies contributed significantly to the improvement during the 1990s of access to 9-1-1 for people who are deaf, hard of hearing, or speech disabled. However, as new technologies for text wireless communications and relay services have moved quickly to Internet protocol (IP)-based technologies over the past 5-8 years, the use of traditional wireline telephones and text telephones among deaf, hard of hearing, and speech-disabled people has declined. PSAPs cannot be contacted via the newer forms of telecommunications, such as e-mail, instant messaging, and IP-based forms of relay services, including video relay services. The gap between the technology supported by policy and the technologies currently being used by deaf and hard of hearing people has become a serious problem that is difficult to solve because of the separate jurisdictions of the two agencies, the need for coordination within the FCC, technological challenges, and funding issues. In this article, the key policy and technology challenges will be analyzed and recommendations made for short-and long-term solutions to this dilemma.

  14. Alternative Models of Entrance Exams and Access to Higher Education: The Case of the Czech Republic

    Science.gov (United States)

    Konecny, Tomas; Basl, Josef; Myslivecek, Jan; Simonova, Natalie

    2012-01-01

    The study compares the potential effects of a university admission exam model based on program-specific knowledge and an alternative model relying on general study aptitude (GSA) in the context of a strongly stratified educational system with considerable excess of demand over supply of university education. Using results of the "Sonda…

  15. The challenge of disability and access: reconceptualizing the role of the medical model.

    Science.gov (United States)

    Rothman, Juliet C

    2010-01-01

    The fields of social work and disability seek to optimize well-being and life experience for clients with disabilities. The field of disability has defined and explored several frameworks for understanding disability, which are currently polarized between the problem-centered "medical" models and the social "disability as construction" models. The differences and the interplay between them affects both individuals and society. Four foundational social work theoretical models are considered in terms of their ability to integrate with disability frameworks and to address the differences between them. The bio-psycho-socio-cultural-spiritual model is suggested as the optimal model to both resolve the disability frameworks' duality and to optimally integrate social work and disability service provision.

  16. Utilizing Free and Open Source Software to access, view and compare in situ observations, EO products and model output data

    Science.gov (United States)

    Vines, Aleksander; Hamre, Torill; Lygre, Kjetil

    2014-05-01

    The GreenSeas project (Development of global plankton data base and model system for eco-climate early warning) aims to advance the knowledge and predictive capacities of how marine ecosystems will respond to global change. A main task has been to set up a data delivery and monitoring core service following the open and free data access policy implemented in the Global Monitoring for the Environment and Security (GMES) programme. The aim is to ensure open and free access to historical plankton data, new data (EO products and in situ measurements), model data (including estimates of simulation error) and biological, environmental and climatic indicators to a range of stakeholders, such as scientists, policy makers and environmental managers. To this end, we have developed a geo-spatial database of both historical and new in situ physical, biological and chemical parameters for the Southern Ocean, Atlantic, Nordic Seas and the Arctic, and organized related satellite-derived quantities and model forecasts in a joint geo-spatial repository. For easy access to these data, we have implemented a web-based GIS (Geographical Information Systems) where observed, derived and forcasted parameters can be searched, displayed, compared and exported. Model forecasts can also be uploaded dynamically to the system, to allow modelers to quickly compare their results with available in situ and satellite observations. We have implemented the web-based GIS(Geographical Information Systems) system based on free and open source technologies: Thredds Data Server, ncWMS, GeoServer, OpenLayers, PostGIS, Liferay, Apache Tomcat, PRTree, NetCDF-Java, json-simple, Geotoolkit, Highcharts, GeoExt, MapFish, FileSaver, jQuery, jstree and qUnit. We also wanted to used open standards to communicate between the different services and we use WMS, WFS, netCDF, GML, OPeNDAP, JSON, and SLD. The main advantage we got from using FOSS was that we did not have to invent the wheel all over again, but could use

  17. Stochastic geometry model for multi-channel fog radio access networks

    KAUST Repository

    Emara, Mostafa

    2017-06-29

    Cache-enabled base station (BS) densification, denoted as a fog radio access network (F-RAN), is foreseen as a key component of 5G cellular networks. F-RAN enables storing popular files at the network edge (i.e., BS caches), which empowers local communication and alleviates traffic congestions at the core/backhaul network. The hitting probability, which is the probability of successfully transmitting popular files request from the network edge, is a fundamental key performance indicator (KPI) for F-RAN. This paper develops a scheduling aware mathematical framework, based on stochastic geometry, to characterize the hitting probability of F-RAN in a multi-channel environment. To this end, we assess and compare the performance of two caching distribution schemes, namely, uniform caching and Zipf caching. The numerical results show that the commonly used single channel environment leads to pessimistic assessment for the hitting probability of F-RAN. Furthermore, the numerical results manifest the superiority of the Zipf caching scheme and quantify the hitting probability gains in terms of the number of channels and cache size.

  18. Evaluation of PCMH Model Adoption on Teamwork and Impact on Patient Access and Safety.

    Science.gov (United States)

    Khanna, Niharika; Shaya, Fadia T; Gaitonde, Priyanka; Abiamiri, Andrea; Steffen, Ben; Sharp, David

    2017-04-01

    Each of the participating patient-centered medical home (PCMH) received coaching and participated in learning collaborative for improving teamwork. The objective of the study was to assess the impact of trainings on patient-centered teamwork. The Teamwork Perception Questionnaire (TPQ) was administered once in spring 2014 and then in fall 2015. The TPQ consists of 35 questions across 5 domains: mutual support, situation monitoring, communication, team structure, and leadership. Based on our objective we compared the frequencies of strongly agree/agree by domain. The difference was tested using chi-square test. We compared the scores on each domain (strongly agree/agree = 1; maximum score = 7) via Wilcoxon rank sum test. The response rate for this survey was n = 29 (80.6%) in spring 2014, and n = 31 (86.1%) in fall 2015. We found that the practice members significantly ( P teamwork specifically in communication and in leadership. This we believe will continue to result in enhanced patient access to care and safety.

  19. A model for Intelligent Random Access Memory architecture (IRAM) cellular automata algorithms on the Associative String Processing machine (ASTRA)

    CERN Document Server

    Rohrbach, F; Vesztergombi, G

    1997-01-01

    In the near future, the computer performance will be completely determined by how long it takes to access memory. There are bottle-necks in memory latency and memory-to processor interface bandwidth. The IRAM initiative could be the answer by putting Processor-In-Memory (PIM). Starting from the massively parallel processing concept, one reached a similar conclusion. The MPPC (Massively Parallel Processing Collaboration) project and the 8K processor ASTRA machine (Associative String Test bench for Research \\& Applications) developed at CERN \\cite{kuala} can be regarded as a forerunner of the IRAM concept. The computing power of the ASTRA machine, regarded as an IRAM with 64 one-bit processors on a 64$\\times$64 bit-matrix memory chip machine, has been demonstrated by running statistical physics algorithms: one-dimensional stochastic cellular automata, as a simple model for dynamical phase transitions. As a relevant result for physics, the damage spreading of this model has been investigated.

  20. Assessment of radiofrequency exposure from cellular telephone daily use in an epidemiological study

    DEFF Research Database (Denmark)

    Berg, Gabriele; Schüz, Joachim; Samkange-Zeeb, Florence

    2005-01-01

    and linear regression models were used to analyse the association between information from the interview and from the SMP. RESULTS: In total, 1757 personal mobile phone calls were recorded for 45 persons by SMP and traffic records. The correlation between the self-reported information about the number...... and the duration of calls with the cumulative power of calls was 0.50 (Pnumber or the cumulative duration of calls. After inclusion of possible confounding factors in the regression model......, the variance increased to 26%. Minor confounding factors were "network provider", "contract form", and "cellular phone model". DISCUSSION: The number of calls alone is a sufficient parameter to estimate the cumulative power emitted by the handset of a cellular telephone. The cumulative power emitted...

  1. The benefit of non contrast-enhanced magnetic resonance angiography for predicting vascular access surgery outcome: a computer model perspective.

    Directory of Open Access Journals (Sweden)

    Maarten A G Merkx

    Full Text Available INTRODUCTION: Vascular access (VA surgery, a prerequisite for hemodialysis treatment of end-stage renal-disease (ESRD patients, is hampered by complication rates, which are frequently related to flow enhancement. To assist in VA surgery planning, a patient-specific computer model for postoperative flow enhancement was developed. The purpose of this study is to assess the benefit of non contrast-enhanced magnetic resonance angiography (NCE-MRA data as patient-specific geometrical input for the model-based prediction of surgery outcome. METHODS: 25 ESRD patients were included in this study. All patients received a NCE-MRA examination of the upper extremity blood vessels in addition to routine ultrasound (US. Local arterial radii were assessed from NCE-MRA and converted to model input using a linear fit per artery. Venous radii were determined with US. The effect of radius measurement uncertainty on model predictions was accounted for by performing Monte-Carlo simulations. The resulting flow prediction interval of the computer model was compared with the postoperative flow obtained from US. Patients with no overlap between model-based prediction and postoperative measurement were further analyzed to determine whether an increase in geometrical detail improved computer model prediction. RESULTS: Overlap between postoperative flows and model-based predictions was obtained for 71% of patients. Detailed inspection of non-overlapping cases revealed that the geometrical details that could be assessed from NCE-MRA explained most of the differences, and moreover, upon addition of these details in the computer model the flow predictions improved. CONCLUSIONS: The results demonstrate clearly that NCE-MRA does provide valuable geometrical information for VA surgery planning. Therefore, it is recommended to use this modality, at least for patients at risk for local or global narrowing of the blood vessels as well as for patients for whom an US-based model

  2. The effectiveness and cost-effectiveness of telephone triage of patients requesting same day consultations in general practice: study protocol for a cluster randomised controlled trial comparing nurse-led and GP-led management systems (ESTEEM).

    Science.gov (United States)

    Campbell, John L; Britten, Nicky; Green, Colin; Holt, Tim A; Lattimer, Valerie; Richards, Suzanne H; Richards, David A; Salisbury, Chris; Taylor, Rod S; Fletcher, Emily

    2013-01-04

    Recent years have seen an increase in primary care workload, especially following the introduction of a new General Medical Services contract in 2004. Telephone triage and telephone consultation with patients seeking health care represent initiatives aimed at improving access to care. Some evidence suggests that such approaches may be feasible but conclusions regarding GP workload, cost, and patients' experience of care, safety, and health status are equivocal. The ESTEEM trial aims to assess the clinical- and cost-effectiveness of nurse-led computer-supported telephone triage and GP-led telephone triage, compared to usual care, for patients requesting same-day consultations in general practice. ESTEEM is a pragmatic, multi-centre cluster randomised clinical trial with patients randomised at practice level to usual care, computer decision-supported nurse triage, or GP-led triage. Following triage of 350-550 patients per practice we anticipate estimating and comparing total primary care workload (volume and time), the economic cost to the NHS, and patient experience of care, safety, and health status in the 4-week period following the index same-day consultation request across the three trial conditions.We will recruit all patients seeking a non-emergency same-day appointment in primary care. Patients aged 12.0-15.9 years and temporary residents will be excluded from the study.The primary outcome is the number of healthcare contacts taking place in the 4-week period following (and including) the index same-day consultation request. A range of secondary outcomes will be examined including patient flow, primary care NHS resource use, patients' experience of care, safety, and health status.The estimated sample size required is 3,751 patients (11,253 total) in each of the three trial conditions, to detect a mean difference of 0.36 consultations per patient in the four week follow-up period between either intervention group and usual care 90% power, 5% alpha, and an

  3. Telephone interventions for adherence to colpocytological examination 1

    Science.gov (United States)

    Lima, Thais Marques; Nicolau, Ana Izabel Oliveira; Carvalho, Francisco Herlânio Costa; Vasconcelos, Camila Teixeira Moreira; Aquino, Priscila de Souza; Pinheiro, Ana Karina Bezerra

    2017-01-01

    ABSTRACT Objective: to test the effects of behavioral and educational intervention by telephone on adherence of women with inappropriate periodicity to colpocytological examination. Method: quasi-experimental study with a sample of 524 women, selected with the following inclusion criteria: be aged between 25 and 64 years, have initiated sexual activity, have inappropriate periodicity of examination and have mobile or landline phone. The women were divided into two groups for application of behavioral and educational intervention by telephone. It was used an intervention script according to the principles of Motivational Interviewing. Results: on comparing the results before and after the behavioral and educational interventions, it was found that there was a statistically significant change (p = 0.0283) with increase of knowledge of women who participated in the educational intervention. There was no change in the attitude of women of any of the groups and there was an increase of adherence to colpocytological examination in both groups (p < 0.0001), with greater adherence of women participating in the behavioral group (66.8%). Conclusion: the behavioral and educational interventions by phone were effective in the adherence of women to colpocytological examination, representing important strategies for permanent health education and promotion of care for the prevention of cervical cancer. PMID:28177055

  4. New Caledonia: Solidarite SIDA - telephone hot-line.

    Science.gov (United States)

    Sibille, P

    2000-01-01

    This article traces the experience of the first 2 years of managing the Solidarite SIDA toll-free telephone hotline service, including the services offered, the training needed for those answering the calls, statistics on those using the service, and the types of questions asked. SIDA was established in May 1996 as a support network. The goals of Solidarite SIDA have been encouraging contacts and the exchange of information; defending and promoting the rights and dignity of the people living with HIV and AIDS, their families, and friends; and sharing experiences with official organizations and other associations. The SOS AIDS telephone hotline was opened on December 1, 1996, to provide a sympathetic ear and to give information, advice and moral support to callers and to document the problems. Overall, it is noted that majority who utilize the services are young Melanesians who require information most often related to HIV transmission and its preventative measures. It is also indicated that the free phone is a source of advice and support with regard to worries connected to sexuality. In view of this, more advertising is necessary and documentation of calls should be continued in order to provide statistics to official institutions and other associations who work in HIV and AIDS. The expansion of the program is projected.

  5. Open access

    NARCIS (Netherlands)

    Valkenburg, P.M.

    2015-01-01

    Open access week Van 19 tot en met 25 oktober 2015 vond wereldwijd de Open Access Week plaats. Tijdens deze week werden er over de hele wereld evenementen georganiseerd waar open access een rol speelt. Ook in Nederland zijn er diverse symposia, workshops en debatten georganiseerd zoals het debat in

  6. Enhanced Intelligent Driver Model to Access the Impact of Driving Strategies on Traffic Capacity

    CERN Document Server

    Kesting, Arne; Helbing, Dirk

    2009-01-01

    With an increasing number of vehicles equipped with adaptive cruise control (ACC), the impact of such vehicles on the collective dynamics of traffic flow becomes relevant. By means of simulation, we investigate the influence of variable percentages of ACC vehicles on traffic flow characteristics. For simulating the ACC vehicles, we propose a new car-following model that also serves as basis of an ACC implementation in real cars. The model is based on the Intelligent Driver Model [Treiber et al., Physical Review E 62, 1805 (2000)] and inherits its intuitive behavioural parameters: desired velocity, acceleration, comfortable deceleration, and desired minimum time headway. It eliminates, however, the sometimes unrealistic behaviour of the Intelligent Driver Model in cut-in situations with ensuing small gaps that regularly are caused by lane changes of other vehicles in dense or congested traffic. We simulate the influence of different ACC strategies on the maximum capacity before breakdown, and the (dynamic) bot...

  7. AFSC/REFM: Isolation by distance (IBD) Alaskan fish stock structure modeling (NCEI Accession 0130929)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This model study examines several management strategies for two marine fish species subject to isolation-by-distance (IBD): Pacific cod in the Aleutian Islands (AI)...

  8. Spatial and temporal variations in ammonia emissions - a freely accessible model code for Europe

    DEFF Research Database (Denmark)

    Skjøth, Carsten Ambelas; Geels, Camilla; Berge, H.

    2011-01-01

    on these input data improves the NH3 calculations in a CTM model when the results are compared with calculations obtained by traditional methods in emission handling. It is also shown how input data can be modified over a specific target region resulting in even further improvement in performance over......Deriving a parameterisation of ammonia emissions for use in chemistry-transport models (CTMs) is a complex problem as the emission varies locally as a result of local climate and local agricultural management. In current CTMs such factors are generally not taken into account. This paper...... demonstrates how local climate and local management can be accounted for in CTMs by applying a modular approach for deriving data as input to a dynamic ammonia emission model for Europe. Default data are obtained from information in the RAINS system, and it is demonstrated how this dynamic emission model based...

  9. Ontological Model-Based Transparent Access To Information In A Medical Multi-Agent System

    Directory of Open Access Journals (Sweden)

    Felicia GÎZĂ-BELCIUG

    2012-01-01

    Full Text Available Getting the full electronic medical record of a patient is an important step in providing a quality medical service. But the degree of heterogeneity of data from health unit informational systems is very high, because each unit can have a different model for storing patients’ medical data. In order to achieve the interoperability and integration of data from various medical units that store partial patient medical information, this paper proposes a multi-agent systems and ontology based approach. Therefore, we present an ontological model for describing the particular structure of the data integration process. The system is to be used for centralizing the information from a patient’s partial medical records. The main advantage of the proposed model is the low ratio between the complexity of the model and the amount of information that can be retrieved in order to generate the complete medical history of a patient.

  10. Towards a quality-controlled and accessible Pitzer model for seawater and related systems

    Directory of Open Access Journals (Sweden)

    David Turner

    2016-09-01

    Full Text Available We elaborate the need for a quality-controlled chemical speciation model for seawater and related natural waters, work which forms the major focus of SCOR Working Group 145. Model development is based on Pitzer equations for the seawater electrolyte and trace components. These equations can be used to calculate activities of dissolved ions and molecules and, in combination with thermodynamic equilibrium constants, chemical speciation. The major tasks to be addressed are ensuring internal consistency of the Pitzer model parameters (expressing the interactions between pairs and triplets of species, which ultimately determines the calculated activities, assessing uncertainties, and identifying important data gaps that should be addressed by new measurements. It is recognised that natural organic matter plays an important role in many aquatic ecosystems, and options for including this material in a Pitzer-based model are discussed. The process of model development begins with the core components which include the seawater electrolyte and the weak acids controlling pH. This core model can then be expanded by incorporating additional chemical components, changing the standard seawater composition and/or broadening the range of temperature and pressure, without compromising its validity. Seven important areas of application are identified: open ocean acidification; micro-nutrient biogeochemistry and geochemical tracers; micro-nutrient behaviour in laboratory studies; water quality in coastal and estuarine waters; cycling of nutrients and trace metals in pore waters; chemical equilibria in hydrothermal systems; brines and salt lakes.

  11. The structure and content of telephonic scripts found useful in a Medicaid Chronic Disease Management Program.

    Science.gov (United States)

    Roth, Alexis M; Ackermann, Ronald T; Downs, Stephen M; Downs, Anne M; Zillich, Alan J; Holmes, Ann M; Katz, Barry P; Murray, Michael D; Inui, Thomas S

    2010-06-01

    In 2003, the Indiana Office of Medicaid Policy and Planning launched the Indiana Chronic Disease Management Program (ICDMP), a programme intended to improve the health and healthcare utilization of 15,000 Aged, Blind and Disabled Medicaid members living with diabetes and/or congestive heart failure in Indiana. Within ICDMP, programme components derived from the Chronic Care Model and education based on an integrated theoretical framework were utilized to create a telephonic care management intervention that was delivered by trained, non-clinical Care Managers (CMs) working under the supervision of a Registered Nurse. CMs utilized computer-assisted health education scripts to address clinically important topics, including medication adherence, diet, exercise and prevention of disease-specific complications. Employing reflective listening techniques, barriers to optimal self-management were assessed and members were encouraged to engage in health-improving actions. ICDMP evaluation results suggest that this low-intensity telephonic intervention shifted utilization and lowered costs. We discuss this patient-centred method for motivating behaviour change, the theoretical constructs underlying the scripts and the branched-logic format that makes them suitable to use as a computer-based application. Our aim is to share these public-domain materials with other programmes.

  12. 'PhysioDirect' telephone assessment and advice services for physiotherapy: protocol for a pragmatic randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Hopper Cherida

    2009-08-01

    Full Text Available Abstract Background Providing timely access to physiotherapy has long been a problem for the National Health Service in the United Kingdom. In an attempt to improve access some physiotherapy services have introduced a new treatment pathway known as PhysioDirect. Physiotherapists offer initial assessment and advice by telephone, supported by computerised algorithms, and patients are sent written self-management and exercise advice by post. They are invited for face-to-face treatment only when necessary. Although several such services have been developed, there is no robust evidence regarding clinical and cost-effectiveness, nor the acceptability of PhysioDirect. Methods/Design This protocol describes a multi-centre pragmatic individually randomised trial, with nested qualitative research. The aim is to determine the effectiveness, cost-effectiveness, and acceptability of PhysioDirect compared with usual models of physiotherapy based on patients going onto a waiting list and receiving face-to-face care. PhysioDirect services will be established in four areas in England. Adult patients in these areas with musculoskeletal problems who refer themselves or are referred by a primary care practitioner for physiotherapy will be invited to participate in the trial. About 1875 consenting patients will be randomised in a 2:1 ratio to PhysioDirect or usual care. Data about outcome measures will be collected at baseline and 6 weeks and 6 months after randomisation. The primary outcome is clinical improvement at 6 months; secondary outcomes include cost, waiting times, time lost from work and usual activities, patient satisfaction and preference. The impact of PhysioDirect on patients in different age-groups and with different conditions will also be examined. Incremental cost-effectiveness will be assessed in terms of quality adjusted life years in relation to cost. Qualitative methods will be used to explore factors associated with the success or failure of

  13. Watershed Modeling Applications with the Open-Access Modular Distributed Watershed Educational Toolbox (MOD-WET) and Introductory Hydrology Textbook

    Science.gov (United States)

    Huning, L. S.; Margulis, S. A.

    2014-12-01

    Traditionally, introductory hydrology courses focus on hydrologic processes as independent or semi-independent concepts that are ultimately integrated into a watershed model near the end of the term. When an "off-the-shelf" watershed model is introduced in the curriculum, this approach can result in a potential disconnect between process-based hydrology and the inherent interconnectivity of processes within the water cycle. In order to curb this and reduce the learning curve associated with applying hydrologic concepts to complex real-world problems, we developed the open-access Modular Distributed Watershed Educational Toolbox (MOD-WET). The user-friendly, MATLAB-based toolbox contains the same physical equations for hydrological processes (i.e. precipitation, snow, radiation, evaporation, unsaturated flow, infiltration, groundwater, and runoff) that are presented in the companion e-textbook (http://aqua.seas.ucla.edu/margulis_intro_to_hydro_textbook.html) and taught in the classroom. The modular toolbox functions can be used by students to study individual hydrologic processes. These functions are integrated together to form a simple spatially-distributed watershed model, which reinforces a holistic understanding of how hydrologic processes are interconnected and modeled. Therefore when watershed modeling is introduced, students are already familiar with the fundamental building blocks that have been unified in the MOD-WET model. Extensive effort has been placed on the development of a highly modular and well-documented code that can be run on a personal computer within the commonly-used MATLAB environment. MOD-WET was designed to: 1) increase the qualitative and quantitative understanding of hydrological processes at the basin-scale and demonstrate how they vary with watershed properties, 2) emphasize applications of hydrologic concepts rather than computer programming, 3) elucidate the underlying physical processes that can often be obscured with a complicated

  14. Financial performance monitoring of the technical efficiency of critical access hospitals: a data envelopment analysis and logistic regression modeling approach.

    Science.gov (United States)

    Wilson, Asa B; Kerr, Bernard J; Bastian, Nathaniel D; Fulton, Lawrence V

    2012-01-01

    From 1980 to 1999, rural designated hospitals closed at a disproportionally high rate. In response to this emergent threat to healthcare access in rural settings, the Balanced Budget Act of 1997 made provisions for the creation of a new rural hospital--the critical access hospital (CAH). The conversion to CAH and the associated cost-based reimbursement scheme significantly slowed the closure rate of rural hospitals. This work investigates which methods can ensure the long-term viability of small hospitals. This article uses a two-step design to focus on a hypothesized relationship between technical efficiency of CAHs and a recently developed set of financial monitors for these entities. The goal is to identify the financial performance measures associated with efficiency. The first step uses data envelopment analysis (DEA) to differentiate efficient from inefficient facilities within a data set of 183 CAHs. Determining DEA efficiency is an a priori categorization of hospitals in the data set as efficient or inefficient. In the second step, DEA efficiency is the categorical dependent variable (efficient = 0, inefficient = 1) in the subsequent binary logistic regression (LR) model. A set of six financial monitors selected from the array of 20 measures were the LR independent variables. We use a binary LR to test the null hypothesis that recently developed CAH financial indicators had no predictive value for categorizing a CAH as efficient or inefficient, (i.e., there is no relationship between DEA efficiency and fiscal performance).

  15. Ilusão de acesso: o modelo ALCA Delusion of access: the FTAA model

    Directory of Open Access Journals (Sweden)

    Germán A. de la Reza

    2002-12-01

    Full Text Available O presente artigo tem como foco a estrutura da ALCA e suas implicações nas disparidades econômicas no hemisfério. Analisa, em particular, as possibilidades de satisfação dos objetivos dos países da América Latina e do Caribe de acesso a mercados, levando em consideração as negociações hemisféricas em curso. Suas seções fornecem uma visão geral das contribuições, no sentido de demonstrar as conseqüências da ALCA para as economias pequenas; uma análise do processo de liberalização de tarifas de um ponto de vista fiscal; e, com base na noção de que várias barreiras não-tarifárias usadas pelos Estados Unidos tendem a continuar em operação depois de 2005, a última seção trata do significado de um processo de liberalização desigual nas Américas. No seu todo, pretende evidenciar a idéia de que a ALCA impõe um regime de comércio incapaz de servir como fonte de distribuição igualitária de benefícios econômicos dentro do hemisfério ocidental.The present article focuses on the FTAA framework and its implications on the economic disparities in the Hemisphere. In particular, it analyses the possibilities of satisfaction of the Latin American and Caribbean countries market-access objectives taking into consideration the current hemispheric negotiations. Its sections provide an overview of the contributions made to assert FTAA consequences for the small economies; an analysis of the tariff liberalization process from a fiscal point of view; and based on the finding that several non-tariff barriers used by the United States are likely to remain in operation after 2005, the last section draws on the significations of an uneven liberalization process in the Americas. In its ensemble, it seeks to substantiate the idea that FTAA entails a trade regime unable to serve as a source of equal distribution of economic benefits within the Western Hemisphere.

  16. Field-Based Video Pre-Test Counseling, Oral Testing, and Telephonic Post-Test Counseling: Implementation of an HIV Field Testing Package among High-Risk Indian Men

    Science.gov (United States)

    Snyder, Hannah; Yeldandi, Vijay V.; Kumar, G. Prem; Liao, Chuanhong; Lakshmi, Vemu; Gandham, Sabitha R.; Muppudi, Uma; Oruganti, Ganesh; Schneider, John A.

    2012-01-01

    In India, men who have sex with men (MSM) and truck drivers are high-risk groups that often do not access HIV testing due to stigma and high mobility. This study evaluated a field testing package (FTP) that identified HIV positive participants through video pre-test counseling, OraQuick oral fluid HIV testing, and telephonic post-test counseling…

  17. PRBAC:A role-based provenance access control model%PRBAC:一种基于角色的起源访问控制模型

    Institute of Scientific and Technical Information of China (English)

    马晓; 王凤英; 常玲霞

    2016-01-01

    T his paper proposes a novel role-based provenance access control model (PRBAC )to better utilize provenance data to control access to the other data .The model is built on prove‐nance-based access control (PBAC) and role-based access control (RBAC) .And this scheme di‐vided the dependency list as a foundation of access control ,introduced the notion of role in role-based access control and gave out the access control algorithm .The analysis results indicate the proposed model can solve the issues that the authorization management is not flexible ,the system has low access efficiency and access control policy is not secure enough ,and other problems .%为了更好地利用数据起源对其它数据进行访问控制,建立了一种基于角色的起源访问控制模型(PRBAC )。该模型以基于起源的访问控制模型(PBAC )和基于角色的访问控制模型(RBAC)为基础,划分了作为访问控制基础的依赖关系列表,并引入RBAC中角色集的概念,给出了具体的访问控制算法。分析结果表明PRBAC能解决基于起源的访问控制模型中授权管理不灵活、系统运行效率低和访问控制策略不够安全等问题。

  18. Toward a Multifaceted Model of Internet Access for Understanding Digital Divides: An Empirical Investigation

    NARCIS (Netherlands)

    Deursen, van Alexander J.A.M.; Dijk, van Jan A.G.M.

    2015-01-01

    In this investigation, a multifaceted model of Internet appropriation that encompasses four types of access—motivational, material, skills, and usage—is tested with a representative sample of the Dutch population. The analysis indicates that while the digital divide policies' focus has moved to skil

  19. On the Modeling and Analysis of Heterogeneous Radio Access Networks using a Poisson Cluster Process

    DEFF Research Database (Denmark)

    Suryaprakash, Vinay; Møller, Jesper; Fettweis, Gerhard P.

    Future mobile networks are visualized as networks that consist of more than one type of base station to cope with rising user demands. Such networks are referred to as heterogeneous networks. There have been various attempts at modeling and optimization of such networks using spatial point proces...

  20. Application of PIP data in health economic models for market access

    Directory of Open Access Journals (Sweden)

    Nadine van Dongen

    2010-11-01

    Full Text Available Nadine van Dongen1, Mark JC Nuijten21Van Dongen Research Ltd, London, UK; 2Ars Accessus Medica, Amsterdam, The NetherlandsAbstract: Cost-effectiveness data from a state of the art health economic analysis should permit reliable, reproducible, and verifiable insights into the effectiveness of a drug and the possible savings that might be achieved relative to other drugs and/or treatments. The data for a model may come from a variety of sources and are subject to varying degrees of uncertainty. The reliability of the estimates depends on the choice of the data sources. Data sources for the variables being used in a model may be clinical trials, databases, medical records, and Delphi panels. A limitation of these data sources is that they often lack the input from the patient’s perspective. Patient Intelligence applications can provide data to be used in health economic models for any given situation regarding treatment of persons suffering from a disorder, disease, or complaint. The objective of this paper to explore the opportunity of integrating patient data generated by Patient Intelligence applications as an alternative data source for a Delphi panel and databases in health economic models.Keywords: effectiveness, Patient Intelligence, data source, Delphi panel

  1. An accessible method for implementing hierarchical models with spatio-temporal abundance data

    Science.gov (United States)

    Ross, Beth E.; Hooten, Melvin B.; Koons, David N.

    2012-01-01

    A common goal in ecology and wildlife management is to determine the causes of variation in population dynamics over long periods of time and across large spatial scales. Many assumptions must nevertheless be overcome to make appropriate inference about spatio-temporal variation in population dynamics, such as autocorrelation among data points, excess zeros, and observation error in count data. To address these issues, many scientists and statisticians have recommended the use of Bayesian hierarchical models. Unfortunately, hierarchical statistical models remain somewhat difficult to use because of the necessary quantitative background needed to implement them, or because of the computational demands of using Markov Chain Monte Carlo algorithms to estimate parameters. Fortunately, new tools have recently been developed that make it more feasible for wildlife biologists to fit sophisticated hierarchical Bayesian models (i.e., Integrated Nested Laplace Approximation, ‘INLA’). We present a case study using two important game species in North America, the lesser and greater scaup, to demonstrate how INLA can be used to estimate the parameters in a hierarchical model that decouples observation error from process variation, and accounts for unknown sources of excess zeros as well as spatial and temporal dependence in the data. Ultimately, our goal was to make unbiased inference about spatial variation in population trends over time.

  2. Alternative Models to Deliver Developmental Math: Issues of Use and Student Access

    Science.gov (United States)

    Kosiewicz, Holly; Ngo, Federick; Fong, Kristen

    2016-01-01

    Objective: Changing how community colleges deliver developmental education has become a key policy lever to increase student achievement. Alternative development education models reduce the amount of time a student spends in remediation, provide students with supplemental instruction and support, and contextualize content to align with student…

  3. Toward a Multifaceted Model of Internet Access for Understanding Digital Divides: An Empirical Investigation

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; van Dijk, Johannes A.G.M.

    2015-01-01

    In this investigation, a multifaceted model of Internet appropriation that encompasses four types of access—motivational, material, skills, and usage—is tested with a representative sample of the Dutch population. The analysis indicates that while the digital divide policies' focus has moved to

  4. Modelling public transport route choice, with multiple access and egress modes

    NARCIS (Netherlands)

    Brands, T.; Romph, de E.; Veitch, T.; Cook, J.

    2014-01-01

    Public transport (PT) is important, because the current traffic system faces well known problems like congestion, environmental impact and use of public space. To be able to assess the effects of policy measures properly, it is necessary to model the behavior of the (PT) traveler in a realistic way.

  5. Expanding Health Care Access Through Education: Dissemination and Implementation of the ECHO Model.

    Science.gov (United States)

    Katzman, Joanna G; Galloway, Kevin; Olivas, Cynthia; McCoy-Stafford, Kimberly; Duhigg, Daniel; Comerci, George; Kalishman, Summers; Buckenmaier, Chester C; McGhee, Laura; Joltes, Kristin; Bradford, Andrea; Shelley, Brian; Hernandez, Jessica; Arora, Sanjeev

    2016-03-01

    Project ECHO (Extension for Community Healthcare Outcomes) is an evidence-based model that provides high-quality medical education for common and complex diseases through telementoring and comanagement of patients with primary care clinicians. In a one to many knowledge network, the ECHO model helps to bridge the gap between primary care clinicians and specialists by enhancing the knowledge, skills, confidence, and practice of primary care clinicians in their local communities. As a result, patients in rural and urban underserved areas are able to receive best practice care without long waits or having to travel long distances. The ECHO model has been replicated in 43 university hubs in the United States and five other countries. A new replication tool was developed by the Project ECHO Pain team and U.S. Army Medical Command to ensure a high-fidelity replication of the model. The adoption of the tool led to successful replication of ECHO in the Army Pain initiative. This replication tool has the potential to improve the fidelity of ECHO replication efforts around the world.

  6. Making Digital Elevation ModelsAccessible, Comprehensible, and Engaging through Real-Time Visualization

    DEFF Research Database (Denmark)

    Kjeldsen, Thomas Kim; Mikkelsen, Peter Trier; Mosegaard, Jesper

    2015-01-01

    In this paper we present our initial experiments with the new high quality digital elevation model, “Danmarks Højdemodel-2015” (DHM) exposed as an interactive 3D visualization on web and in virtual reality. We argue that such data has great opportunities to spawn new business and new insight...

  7. Data publication and dissemination of interactive keys under the open access model

    Science.gov (United States)

    The concepts of publication, citation and dissemination of interactive keys and other online keys are discussed and illustrated by a sample paper published in the present issue (doi: 10.3897/zookeys.21.271). The present model is based on previous experience with several existing examples of publishi...

  8. Archive Access to the THORPEX Interactive Grand Global Ensemble (TIGGE) Suite of Model Output

    Science.gov (United States)

    Rutledge, G. K.; Schuster, D.; Worley, S.; Stepaniak, D.; Toth, Z.; Zhu, Y.; Bougeault, P.; Anthony, S.

    2008-05-01

    The World Meteorological Organization (WMO) Observing System Research and Predictability EXperiment (THORPEX) Programme (THORPEX) Interactive Grand Global Ensemble (TIGGE), is a key component of the World Weather Research Programme intended to accelerate improvements in 1-day to 2-week weather forecasts. Centralized archives of ensemble model forecast data, from many international centers, are being used to enable extensive data sharing and research during Phase I of the project. The designated TIGGE archive centers include the Chinese Meteorological Administration (CMA), The European Center for Medium-Range Weather Forecasts (ECMWF), and The National Center for Atmospheric Research (NCAR). Scientific data requirements and archive planning solidified in late 2005, and archive collection was initiated in October 2006 with receipt of partial sets of parameters from multiple data providers. Ten operational weather forecasting centers producing daily global ensemble forecasts to 1-2 weeks ahead have agreed to deliver in near-real-time a selection of forecast data to the TIGGE data archives at CMA, ECMWF and NCAR. The objective of TIGGE (GEO task WE-06-03) is to establish closer cooperation between the academic and operational community by encouraging use of operational products for research, and to explore actively the concept and benefits of multi- model probabilistic weather forecasts, with a particular focus on severe weather prediction. The future operational use of the TIGGE infrastructure as part of a "Global Interactive Forecasting System" will be considered, subject to positive results from research undertaken with the TIGGE data archives. The Unidata Internet Data Distribution (IDD) system is the primary mode used to transport ensemble model data from the data providers to the archive centers. ECMWF acts as one initial collection point to collect model output from the Japanese Meteorological Agency (JMA), Korea Meteorological Administration (KMA), Meteo

  9. Telephone Service Areas, TelephoneServiceAreas-This data set represents the service areas of companies providing (dial tone) telephone service in Utah., Published in 2001, Smaller than 1:100000 scale, State of Utah Automated Geographic Reference Center.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Telephone Service Areas dataset, published at Smaller than 1:100000 scale, was produced all or in part from Other information as of 2001. It is described as...

  10. Feasibility of telephone follow-up after medical abortion.

    Science.gov (United States)

    Perriera, Lisa K; Reeves, Matthew F; Chen, Beatrice A; Hohmann, Heather L; Hayes, Jennifer; Creinin, Mitchell D

    2010-02-01

    This study was conducted to assess the feasibility of using telephone calls combined with high-sensitivity urine pregnancy testing as a primary method of follow-up after medical abortion. We enrolled 139 women up to 63 days of gestation to receive mifepristone 200 mg orally and misoprostol 800 mcg vaginally or buccally, per their choice. Participants were contacted by phone one week after mifepristone administration and interviewed using standardized questions. If the subject or clinician thought the pregnancy was not expelled, the subject returned for an ultrasound examination. Otherwise, subjects performed high-sensitivity home urine pregnancy testing 30 days after the mifepristone and were called within 3 days of the test. Those with positive pregnancy tests returned for an ultrasound examination. Those with negative tests required no further follow-up. Six of the 139 (4.3%, 95% CI 1.6-9.1%) subjects presented prior to Phone Call 1 for an in-person visit. All 133 (100%, 95% CI 97.8-100%) subjects eligible for their first telephone follow-up were contacted. Eight of the 133 (6.1%, 95% CI 2.6-11.5%) women were asked to return for evaluation and all did so (100%, 95% CI 63.1-100%). Eight of the 133 women eligible for the 30 day phone call presented for an interim visit prior to the call. After 30 days, 116 of the 117 (99.1%, 95% CI 97.5-100%) eligible subjects were contacted. One subject was not reached for the day 30 phone call. Twenty-seven of the 116 (23.3%, 95% CI 15.6-31.0%) subjects had a positive pregnancy test and required follow-up. Two of these subjects (7.4%, 95% CI 1.0-24.2%) did not return for in-person follow-up. Two of the 116 (1.7%, 95% CI 0.2-6.1%) subjects had inconclusive pregnancy tests and were asked to return for follow-up. One of these subjects (50%, 95% CI 1.2-98.7%) did not return. Complete follow-up was achieved in 135 of the 139 subjects (97.1%, 95% CI 94.3-99.9%). None of the 26 women evaluated for a positive or inconclusive pregnancy

  11. The Impact of Telephone Channels on the Accuracy of Automatic Speaker Recognition

    Directory of Open Access Journals (Sweden)

    V. Delić

    2011-11-01

    Full Text Available This paper presents an experimental study on the impact of telephone channels on the accuracy of automatic speaker recognition. Speaker models and the design of the recognizer used in this study are based on Hidden Markov models. In order to simulate telephonequality speech signals, several experimental conditions were introduced taking two control factors into consideration: the type of the applied codec and the probability of transmission errors. In addition, the impact of echo signals – that are often present in Internet telephony – on the accuracy of automatic speaker recognition systems is considered. Finally, the paper provides a brief overview of several methodologies for the adaptation of the recognizer to the expected environmental conditions that may enhance the robustness of the speaker recognizer.

  12. A Telephone Communication Skills Exercise for Veterinary Students: Experiences, Challenges, and Opportunities.

    Science.gov (United States)

    Grevemeyer, Bernard; Betance, Larry; Artemiou, Elpida

    2016-01-01

    Evidence from human medicine shows a rise in telephone communication in support of after-hours services and in providing medical advice, follow-up information, etc. While specific training programs are continuously being developed for human medical education, limited publications are available on training veterinary students in telephone communication. Presented is our method of introducing a telephone communication skills exercise to third-year veterinary students. The exercise progressed over three phases and currently follows the principles of the Calgary-Cambridge Guide. Challenges and improvements on implementing a telephone communication exercise are discussed. Within veterinary communication curricula, attention should be given to the specific communication skills required for successful telephone consultations. In the absence of visual nonverbal cues and prompts during a telephone interaction, communication skills must be applied with greater intent and attention to achieve an effective consultation outcome.

  13. A randomized study of electronic mail versus telephone follow-up after emergency department visit.

    Science.gov (United States)

    Ezenkwele, Ugo A; Sites, Frank D; Shofer, Frances S; Pritchett, Ellen N; Hollander, Judd E

    2003-02-01

    This study was conducted to determine whether electronic mail (e-mail) increases contact rates after patients are discharged from the emergency department (ED). Following discharge, patients were randomized to be contacted by telephone or e-mail. The main outcome was success of contact. Secondary outcome was the median time of response. There were 1561 patients initially screened. Of these, 444 had e-mail and were included in the study. Half were contacted by telephone and the rest via e-mail. Our telephone contact rate was 58% (129/222) after two calls in a 48-h period and our e-mail contact was 41% (90/222). The telephone was nearly two times better than e-mail. The median time of response was 48 h for e-mail and 18 h for telephone. It is concluded that the telephone is a better modality of contact than e-mail for patients discharged from the ED.

  14. Improving the accessibility and re-use of environmental models through provision of model metadata - a scoping study

    Science.gov (United States)

    Riddick, Andrew; Hughes, Andrew; Harpham, Quillon; Royse, Katherine; Singh, Anubha

    2014-05-01

    There has been an increasing interest both from academic and commercial organisations over recent years in developing hydrologic and other environmental models in response to some of the major challenges facing the environment, for example environmental change and its effects and ensuring water resource security. This has resulted in a significant investment in modelling by many organisations both in terms of financial resources and intellectual capital. To capitalise on the effort on producing models, then it is necessary for the models to be both discoverable and appropriately described. If this is not undertaken then the effort in producing the models will be wasted. However, whilst there are some recognised metadata standards relating to datasets these may not completely address the needs of modellers regarding input data for example. Also there appears to be a lack of metadata schemes configured to encourage the discovery and re-use of the models themselves. The lack of an established standard for model metadata is considered to be a factor inhibiting the more widespread use of environmental models particularly the use of linked model compositions which fuse together hydrologic models with models from other environmental disciplines. This poster presents the results of a Natural Environment Research Council (NERC) funded scoping study to understand the requirements of modellers and other end users for metadata about data and models. A user consultation exercise using an on-line questionnaire has been undertaken to capture the views of a wide spectrum of stakeholders on how they are currently managing metadata for modelling. This has provided a strong confirmation of our original supposition that there is a lack of systems and facilities to capture metadata about models. A number of specific gaps in current provision for data and model metadata were also identified, including a need for a standard means to record detailed information about the modelling

  15. Classification of stop place in consonant-vowel contexts using feature extrapolation of acoustic-phonetic features in telephone speech.

    Science.gov (United States)

    Lee, Jung-Won; Choi, Jeung-Yoon; Kang, Hong-Goo

    2012-02-01

    Knowledge-based speech recognition systems extract acoustic cues from the signal to identify speech characteristics. For channel-deteriorated telephone speech, acoustic cues, especially those for stop consonant place, are expected to be degraded or absent. To investigate the use of knowledge-based methods in degraded environments, feature extrapolation of acoustic-phonetic features based on Gaussian mixture models is examined. This process is applied to a stop place detection module that uses burst release and vowel onset cues for consonant-vowel tokens of English. Results show that classification performance is enhanced in telephone channel-degraded speech, with extrapolated acoustic-phonetic features reaching or exceeding performance using estimated Mel-frequency cepstral coefficients (MFCCs). Results also show acoustic-phonetic features may be combined with MFCCs for best performance, suggesting these features provide information complementary to MFCCs.

  16. RNA Futile Cycling in Model Persisters Derived from MazF Accumulation (Open Access)

    Science.gov (United States)

    2015-11-17

    MazF and its antitoxin MazE, bacterial populations that were almost entirely tolerant to fluoroquinolone and -lactam antibiotics were obtained upon...of transcription. Thus, in MazF model persisters, futile cycles of RNA synthesis and degradation result in both significant metabolic demands and...they remained highly metabolically active. We further uncovered a futile cycle driven by continued transcription and MazF-mediated transcript degradation

  17. Model to identify mathematics topics in MXit lingo to provide tutors quick access to supporting documentation

    CSIR Research Space (South Africa)

    Butgereit, L

    2011-11-01

    Full Text Available of ?parabola? could be a subtopic in the major topic of ?algebra?. Subtopics could belong to more than one major topic; for example, the subtopic ?parabola? could also belong to the major topic ?graphs?. As with the compilation of the Create... instantiation of the ? model for integration into the Dr Math tutoring platform, mathematics topics were subdivided into topics and subtopics. The topics were algebra, geometry, trigonometry, calculus, statistics, financial mathematics, number theory...

  18. Toward a model for lexical access based on acoustic landmarks and distinctive features

    Science.gov (United States)

    Stevens, Kenneth N.

    2002-04-01

    This article describes a model in which the acoustic speech signal is processed to yield a discrete representation of the speech stream in terms of a sequence of segments, each of which is described by a set (or bundle) of binary distinctive features. These distinctive features specify the phonemic contrasts that are used in the language, such that a change in the value of a feature can potentially generate a new word. This model is a part of a more general model that derives a word sequence from this feature representation, the words being represented in a lexicon by sequences of feature bundles. The processing of the signal proceeds in three steps: (1) Detection of peaks, valleys, and discontinuities in particular frequency ranges of the signal leads to identification of acoustic landmarks. The type of landmark provides evidence for a subset of distinctive features called articulator-free features (e.g., [vowel], [consonant], [continuant]). (2) Acoustic parameters are derived from the signal near the landmarks to provide evidence for the actions of particular articulators, and acoustic cues are extracted by sampling selected attributes of these parameters in these regions. The selection of cues that are extracted depends on the type of landmark and on the environment in which it occurs. (3) The cues obtained in step (2) are combined, taking context into account, to provide estimates of ``articulator-bound'' features associated with each landmark (e.g., [lips], [high], [nasal]). These articulator-bound features, combined with the articulator-free features in (1), constitute the sequence of feature bundles that forms the output of the model. Examples of cues that are used, and justification for this selection, are given, as well as examples of the process of inferring the underlying features for a segment when there is variability in the signal due to enhancement gestures (recruited by a speaker to make a contrast more salient) or due to overlap of gestures from

  19. [The permanence of access to health care: a tradition of hospitality and innovative organizational model].

    Science.gov (United States)

    Georges-Tarragano, C

    2015-01-01

    The PASS ("Permanence d'Accès aux Soins de Santé") are hospital-based units providing primary care services to patients who lack health care coverage. Using a "whole person" approach and providing a combination of health and social care, the PASS offer an appropriately adapted response to complex health problems within a context of marked social vulnerability and contribute to reducing health inequalities. The PASS are an example of an interdisciplinary approach to health care which contrasts with the segmentary approach typical of conventional hospital departments. Operating at the interface between primary and secondary care, the PASS have the potential to become key players in developing models of patient pathways. Their presence reduces inappropriate emergency attendances and hospitalisation by offering medical care in a timely fashion, in an outpatient-type setting. The PASS can provide a resource for research into optimum models of health care, where the social context of health needs are fully recognized and inform medical treatment appropriately. According to their potential development, PASS are living labs of an innovative organizational model of care.

  20. Speech technology for information access: a South African case study

    CSIR Research Space (South Africa)

    Barnard, E

    2010-03-01

    Full Text Available Telephone-based information access has the potential to deliver a significant positive impact in the developing world. We discuss some of the most important issues that must be addressed in order to realize this potential, including matters related...