WorldWideScience

Sample records for prevent unauthorized access

  1. Detection and response to unauthorized access to a communication device

    Science.gov (United States)

    Smith, Rhett; Gordon, Colin

    2015-09-08

    A communication gateway consistent with the present disclosure may detect unauthorized physical or electronic access and implement security actions in response thereto. A communication gateway may provide a communication path to an intelligent electronic device (IED) using an IED communications port configured to communicate with the IED. The communication gateway may include a physical intrusion detection port and a network port. The communication gateway may further include control logic configured to evaluate physical intrusion detection signal. The control logic may be configured to determine that the physical intrusion detection signal is indicative of an attempt to obtain unauthorized access to one of the communication gateway, the IED, and a device in communication with the gateway; and take a security action based upon the determination that the indication is indicative of the attempt to gain unauthorized access.

  2. 75 FR 6790 - Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and...

    Science.gov (United States)

    2010-02-10

    ... for Unauthorized Access to Customer Information and Customer Notice AGENCY: Office of Thrift... for Unauthorized Access to Customer Information and Customer Notice. OMB Number: 1550-0110. Form...) Ensure the security and confidentiality of customer records and information; (2) protect against any...

  3. 77 FR 30972 - Empowering Consumers to Prevent and Detect Billing for Unauthorized Charges (“Cramming...

    Science.gov (United States)

    2012-05-24

    .... 98-170; FCC 12-42] Empowering Consumers to Prevent and Detect Billing for Unauthorized Charges... (Commission or FCC) proposes additional rules to help consumers prevent and detect the placement of... ``cramming.'' Several commenters in this proceeding support additional measures to prevent cramming...

  4. Design of Detection and Prevention System of Unauthorized Data Sending from the Local Network

    Directory of Open Access Journals (Sweden)

    D. A. Moskvin

    2010-03-01

    Full Text Available Malware often aims at breaking confidentiality. A malicious program gets inside the local network, finds out necessary data and then illegally transfers this data to the intruder. Prevention of unauthorized data transfer requires development of a special software product, which will detect and prevent leak of information from the local network.

  5. Modification of CAS-protocol for improvement of security web-applications from unauthorized access

    Directory of Open Access Journals (Sweden)

    Alexey I Igorevich Alexandrov

    2017-07-01

    Full Text Available Dissemination of information technologies and the expansion of their application demand constantly increasing security level for users, operating with confidential information and personal data. The problem of setting up secure user identification is probably one of the most common tasks, which occur in the process of software development. Today, despite the availability of a large amount of authentication tools, new solutions, mechanisms and technologies are being introduced regularly. Primarily, it is done to increase the security level of data protection against unauthorized access. This article describes the experience of using central user authentication service based on CAS-protocol (CAS – Central Authentication Service and free open source software, analyzing its main advantages and disadvantages and describing the possibility of its modification, which would increase security of web-based information systems from being accessed illegally. The article contains recommendations for setting a maximum time limit for users working on services, integrated with central authentication; and, analyses the research of implementing modern web-technologies while using user authentication system based on CAS-protocol. In addition, it describes the ways of CAS-server modernization for developing additional modules: a module for collecting and analyzing the use of information systems, and another one, for a user management system. Furthermore, CAS-protocol can be used at universities and other organizations for creating a unified information environment in education.

  6. Regime of preventing, detecting and responding to unauthorized actions in Mecklenburg-Vorpommern (M-V)

    International Nuclear Information System (INIS)

    Gomoll, L.; Gegusch, M.

    2001-01-01

    Full text: In the Federal Republic of Germany (FRG) the ensuring of safety for the population is at first the task of the countries. It also imposes to minimize the radiation risk to the public. Mecklenburg-Vorpommern is a country in northeast of the FRG with coast length of 1470 km and 78 km boundary of European Community. M-V is a sparsely populated area with nearly 2 million people in 23,500 km 2 . Concurrent with law ordinances and regulations by the Federal Government in M-V a system for preventing, detecting and responding to unauthorized actions with radioactive materials is prescribed by ordinance. This regime of preventing, detecting and responding to unlawful uses of radioactive material exists independent of the national system for the accountability, control and security of the materials. 1. Responsibility - The authorities of defence - police and fire service - have to secure the place where the radioactive material is found or laid down together with a bomb. The authorities for atomic supervision are responsible for the clearing and elimination of the radioactive material, to combat illicit situation. 2. To be reachable - In cases of finding, recognizing or blackmailing of/in connection with radioactive material, the information arrives on civil way the police centre in the Internal Ministry. There upon the working staff of defence and the staff of atomic supervision/measurement group being on standby duty on call are mobilized. 3. Equipment - The policemen and firemen have dosimeter for self-safety. The measurement group of the atomic supervision uses instruments and analyser for all different radiation situations. In this kind also there is worth mentioning the connection with remote handling systems of the defuser of munitions. Last kind can be important in cases of blackmailing. 4. Whereabouts of unauthorized material - Unauthorized radioactive material with unknown owners must be storied under separate conditions. Confiscated material, which isn

  7. Computational experiment for the purpose of determining the probabilistic and temporal characteristics of information security systems against unauthorized access in automated information systems

    Directory of Open Access Journals (Sweden)

    A. V. Skrypnikov

    2017-01-01

    Full Text Available The article is devoted to the method of experimental estimation of parameters of functioning of standard information protection systems from unauthorized access, certified, widely used in organizations operating automated information systems. In the course of the experiment, statistical data were evaluated in the dynamics of the functioning of information security systems against unauthorized access in automated information systems. Registration of the parameters for the execution time of protective protection functions was carried out using a special utility called ProcessMonitor from the Sysinternals suite of utilities used to filter processes and threads. The loading of the processor and main memory of the computer with the use of special software, specially designed for performing experimental research, simulates the operation of GIS in real-world work for its intended purpose. A special software for simulating the work of a system with high load is developed in "VisualStudio 2015" within the framework of "ConsoleApplication". At the same time, the processor is loaded at a level of 50-70% and 60-80% of the operative memory. The obtained values of the time of implementation of protective functions in conditions of high utilization of resources of computer facilities for their intended purpose will allow us to assess the conflict and dynamic properties of the GIS. In the future, the obtained experimental estimates can be used to develop a model of information security in automated information systems, as well as in the formation of quality requirements (resource intensity, response time to the user's request, availability, etc.. Also, the results of the computational experiment in the future can be used to develop a software package for assessing the dynamic performance of information security systems against unauthorized access in automated information systems

  8. Violence Prevention, Access to Justice, and Economic ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Solutions to empower women, reduce violence Researchers will identify and analyze interventions in Colombia, Guatemala, Mexico, and Peru. They will assess the impact of efforts on: -preventing violence against women -reducing victimization -improving women's access to justice The results will guide governments, civil ...

  9. Unauthorized Appropriations and Expiring Authorizations

    Science.gov (United States)

    2015-01-15

    Unauthorized FY 2015 Appropriations: Not Available Organ Donation and Recovery Improvement ActP.L. 108-216 Reimbursement of travel and subsistence...FY 2013 Appropriation Authorized: Indefinite Unauthorized FY 2015 Appropriations: Not Available Capital investment grants to support intercity ...priority rail corridor projects necessary to reduce congestion or facilitate ridership growth in intercity rail passenger transportation * FY 2013

  10. Profiling unauthorized natural resource users for better targeting of conservation interventions.

    Science.gov (United States)

    Harrison, Mariel; Baker, Julia; Twinamatsiko, Medard; Milner-Gulland, E J

    2015-12-01

    Unauthorized use of natural resources is a key threat to many protected areas. Approaches to reducing this threat include law enforcement and integrated conservation and development (ICD) projects, but for such ICDs to be targeted effectively, it is important to understand who is illegally using which natural resources and why. The nature of unauthorized behavior makes it difficult to ascertain this information through direct questioning. Bwindi Impenetrable National Park, Uganda, has many ICD projects, including authorizing some local people to use certain nontimber forest resources from the park. However, despite over 25 years of ICD, unauthorized resource use continues. We used household surveys, indirect questioning (unmatched count technique), and focus group discussions to generate profiles of authorized and unauthorized resource users and to explore motivations for unauthorized activity. Overall, unauthorized resource use was most common among people from poor households who lived closest to the park boundary and farthest from roads and trading centers. Other motivations for unauthorized resource use included crop raiding by wild animals, inequity of revenue sharing, and lack of employment, factors that created resentment among the poorest communities. In some communities, benefits obtained from ICD were reported to be the greatest deterrents against unauthorized activity, although law enforcement ranked highest overall. Despite the sensitive nature of exploring unauthorized resource use, management-relevant insights into the profiles and motivations of unauthorized resource users can be gained from a combination of survey techniques, as adopted here. To reduce unauthorized activity at Bwindi, we suggest ICD benefit the poorest people living in remote areas and near the park boundary by providing affordable alternative sources of forest products and addressing crop raiding. To prevent resentment from driving further unauthorized activity, ICDs should be

  11. Measuring attitudes towards unauthorized migration

    NARCIS (Netherlands)

    van der Veer, C.G.; Ommundsen, R.; Krumov, K.; Van Le, H.; Larsen, K.S.

    2008-01-01

    This study reports on the development and cross-national utility of a Likert type scale measuring attitudes toward unauthorized migration into a foreign country in two samples from "migrant-sending" nations. In the first phase a pool of 86 attitude statements were administered to a sample of 505

  12. Complications of an implantable venous access port: Prevention and treatment

    Energy Technology Data Exchange (ETDEWEB)

    Seo, Tae Seok; Song, Myung Gyu [Dept. of Radiology, Guro Hospital, Korea University College of Medicine, Seoul (Korea, Republic of); Cha, In Ho [Dept. Radiology, Chungang University Hospital, Chungang University College of Medicine, Seoul (Korea, Republic of)

    2016-11-15

    Placement of an implantable venous access port (IVAP) is a popular procedure for repeated and intermittent chemotherapy in patients with malignancy. In this article, we present various IVAP related complications. In addition, we review the technical tips to prevent and manage the complications. It is important that the operator should keep the mechanism of the complications in mind, perform a careful procedure for prevention, and manage the complication properly and immediately in case of its development for safety and satisfaction of the patients Complications of an implantable venous access port: Prevention and treatment.

  13. 36 CFR 331.21 - Unauthorized structures.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Unauthorized structures. 331... CONSERVATION AREA, KENTUCKY AND INDIANA § 331.21 Unauthorized structures. The construction, placing, or continued existence of any structure of any kind under, upon, in, or over WCA lands or waters is prohibited...

  14. 36 CFR 327.20 - Unauthorized structures.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Unauthorized structures. 327... CHIEF OF ENGINEERS § 327.20 Unauthorized structures. The construction, placement, or existence of any structure (including, but not limited to, roads, trails, signs, non-portable hunting stands or blinds, buoys...

  15. Vehicle barrier with access delay

    Science.gov (United States)

    Swahlan, David J; Wilke, Jason

    2013-09-03

    An access delay vehicle barrier for stopping unauthorized entry into secure areas by a vehicle ramming attack includes access delay features for preventing and/or delaying an adversary from defeating or compromising the barrier. A horizontally deployed barrier member can include an exterior steel casing, an interior steel reinforcing member and access delay members disposed within the casing and between the casing and the interior reinforcing member. Access delay members can include wooden structural lumber, concrete and/or polymeric members that in combination with the exterior casing and interior reinforcing member act cooperatively to impair an adversarial attach by thermal, mechanical and/or explosive tools.

  16. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  17. Youth suicide prevention: does access to care matter?

    Science.gov (United States)

    Campo, John V

    2009-10-01

    Recent increases in adolescent suicide rates after a decade of decline highlight the relevance of pediatric suicide prevention. Existing strategies to intervene with youth at risk for suicide are largely based on the premise that access to effective services is of critical importance. This review aims to examine the relationship between youth suicide and access to care. Promising reductions in suicidal thinking and behavior have been associated with the application of manualized psychotherapies, collaborative interventions in primary care, lithium for mood-disordered adults, and clozapine in schizophrenia. Suicide rates correlate inversely with indices of care access across the lifespan, including antidepressant prescription rates. Suicide is a preventable cause of death, and any public health relevant effort to prevent youth suicide must include improving access to effective care for at-risk youth as a strategy. Education and training of professionals and consumers, the integration of mental health services in primary care, and the use of novel technologies to track and maintain contact with at-risk youth are worthy of study. Additional research on the relationship between specific treatments, especially antidepressants, and youth suicide risk reduction is desperately needed.

  18. Prevention literacy: community-based advocacy for access and ownership of the HIV prevention toolkit.

    Science.gov (United States)

    Parker, Richard G; Perez-Brumer, Amaya; Garcia, Jonathan; Gavigan, Kelly; Ramirez, Ana; Milnor, Jack; Terto, Veriano

    2016-01-01

    Critical technological advances have yielded a toolkit of HIV prevention strategies. This literature review sought to provide contextual and historical reflection needed to bridge the conceptual gap between clinical efficacy and community effectiveness (i.e. knowledge and usage) of existing HIV prevention options, especially in resource-poor settings. Between January 2015 and October 2015, we reviewed scholarly and grey literatures to define treatment literacy and health literacy and assess the current need for literacy related to HIV prevention. The review included searches in electronic databases including MEDLINE, PsycINFO, PubMed, and Google Scholar. Permutations of the following search terms were used: "treatment literacy," "treatment education," "health literacy," and "prevention literacy." Through an iterative process of analyses and searches, titles and/or abstracts and reference lists of retrieved articles were reviewed for additional articles, and historical content analyses of grey literature and websites were additionally conducted. Treatment literacy was a well-established concept developed in the global South, which was later partially adopted by international agencies such as the World Health Organization. Treatment literacy emerged as more effective antiretroviral therapies became available. Developed from popular pedagogy and grassroots efforts during an intense struggle for treatment access, treatment literacy addressed the need to extend access to underserved communities and low-income settings that might otherwise be excluded from access. In contrast, prevention literacy is absent in the recent surge of new biomedical prevention strategies; prevention literacy was scarcely referenced and undertheorized in the available literature. Prevention efforts today include multimodal techniques, which jointly comprise a toolkit of biomedical, behavioural, and structural/environmental approaches. However, linkages to community advocacy and mobilization

  19. Undocumented migrants lack access to pregnancy care and prevention

    Directory of Open Access Journals (Sweden)

    Andreoli Nicole

    2008-03-01

    Full Text Available Abstract Background Illegal migration is an increasing problem worldwide and the so-called undocumented migrants encounter major problems in access to prevention and health care. The objective of the study was to compare the use of preventive measures and pregnancy care of undocumented pregnant migrants with those of women from the general population of Geneva, Switzerland. Methods Prospective cohort study including pregnant undocumented migrants presenting to the University hospital from February 2005 to October 2006. The control group consisted of a systematic sample of pregnant women with legal residency permit wishing to deliver at the same public hospital during the same time period. Results 161 undocumented and 233 control women were included in the study. Mean ages were 29.4 y (SD 5.8 and 31.1 y (SD 4.8 (p Conclusion Compared to women who are legal residents of Geneva, undocumented migrants have more unintended pregnancies and delayed prenatal care, use fewer preventive measures and are exposed to more violence during pregnancy. Not having a legal residency permit therefore suggests a particular vulnerability for pregnant women. This study underscores the need for better access to prenatal care and routine screening for violence exposure during pregnancy for undocumented migrants. Furthermore, health care systems should provide language- and culturally-appropriate education on contraception, family planning and cervical cancer screening.

  20. Is additional conditionality preventing EU accession? Serbian democratic 'step back'

    Directory of Open Access Journals (Sweden)

    Milenković Miloš

    2013-01-01

    Full Text Available European Union integration of Western Balkan countries in conditioned on the fulfilment on the set of criteria aimed at profound societal change. However, there is a number of additional criteria within the EU enlargement policy for the Western Balkans and Serbia in particular. We have already designated this process as 'culturalization' of accession criteria. It comprises of alterations of criteria from initial, identity-neutral and technical issues to coming to terms with the legacy of identity conflicts in the Balkan region. These conditions pose a significant challenge to political institutions in a not yet consolidated democracy. In this article we analyze how, as a result of additional conditioning, the EU accession, instead of enjoying social consensus, has reopened identity issues, divided the society and boosted discourses on 'sovereignty', 'double standards of international community' and 'injustice' perpetrated to Serbia at the time of disintegration of Yugoslavia. Serbia is in a paradoxical situation we refer to as democratic deadlock - it is in need of consolidated democracy in order to achieve political stability and stable government capable to implement EU reforms, while the instability itself is a result of additional criteria for EU accession (and reactions to it. It is a theoretically intriguing case of additional criteria preventing fulfilment of the basic accession requirements. It is further analyzed how this observed tendency can be redirected through slight alteration of beneficiaries of EU incentives aimed at facilitating cultural change. In order to viably change the political community, external assistance process needs to be as inclusive as possible. It is argued that external assistance should not only cover main political, economic and legal actors, but also include cultural actors, especially culturally legitimate elites.

  1. 32 CFR 776.57 - Unauthorized practice of law.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Unauthorized practice of law. 776.57 Section 776... Rules of Professional Conduct § 776.57 Unauthorized practice of law. (a) Unauthorized practice of law. A... law in a jurisdiction where doing so is prohibited by the regulations of the legal profession in that...

  2. 32 CFR 855.14 - Unauthorized landings.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Unauthorized landings. 855.14 Section 855.14 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE AIRCRAFT CIVIL AIRCRAFT USE... file at HQ USAF/XOOBC. (4) In a foreign country, notifies the local US Defense Attache Office (USDAO...

  3. A robust cloud access scheme with mutual authentication

    Directory of Open Access Journals (Sweden)

    Chen Chin-Ling

    2016-01-01

    Full Text Available Due to the progress of network technology, we can access some information through remote servers, and we also can save and access lots of personal data in remote servers. Therefore, to protect these data and resist unauthorized access is an important issue. Some researchers proposed authentication scheme, but there still exist some security weaknesses. This article is based on the concept of HDFS (Hadoop Distributed File System, and offers a robust authentication scheme. The proposed scheme achieves mutual authentication, prevents re-play attack, solves asynchronous issue, and prevents offline password guessing attack.

  4. Information Security Analysis: A Study to Analyze the Extent to Which Information Security Systems Can Be Utilized to Prevent Intoxicated Individuals from Driving

    Science.gov (United States)

    Pierre, Joseph D.

    2011-01-01

    Information security systems (ISS) have been designed to protect assets from damages and from unauthorized access internally as well as externally. This research is promising similar protection from ISS methods that could prevent intoxicated individuals under the influence of alcohol from driving. However, previous research has shown significant…

  5. IP and Data Access | Division of Cancer Prevention

    Science.gov (United States)

    The following outlines the different patent and licensing mechanisms applicable to studies of third-party agents in the PREVENT Program. Please note that the NCI has a variety of agreement mechanisms by which these terms may be applied and will work with the NCI Technology Transfer Center to determine the appropriate agreement for the studies approved by the PREVENT Program. | The section outlines the different patent and licensing mechanisms applicable to studies of third-party agents in the PREVENT Program.

  6. 25 CFR 11.422 - Unauthorized use of credit cards.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Unauthorized use of credit cards. 11.422 Section 11.422... LAW AND ORDER CODE Criminal Offenses § 11.422 Unauthorized use of credit cards. (a) A person commits a misdemeanor if he or she uses a credit card for the purpose of obtaining property or services with knowledge...

  7. 14 CFR 221.5 - Unauthorized air transportation.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Unauthorized air transportation. 221.5... PROCEEDINGS) ECONOMIC REGULATIONS TARIFFS General § 221.5 Unauthorized air transportation. Tariff publications... Department's granting authority to perform the foreign air transportation covered by such tariff publications...

  8. Access for all: contextualising HIV treatment as prevention in Swaziland

    NARCIS (Netherlands)

    Vernooij, E.; Mehlo, M.; Hardon, A.; Reis, R.

    2016-01-01

    This article explores how notions of the individual and population are evoked in two ongoing HIV treatment as prevention (TasP) implementation studies in Swaziland. By contrasting policy discourses with lived kinship experiences of people living with HIV, we seek to understand how TasP unfolds in

  9. Access to Employee Wellness Programs and Use of Preventive Care Services Among U.S. Adults.

    Science.gov (United States)

    Isehunwa, Oluwaseyi O; Carlton, Erik L; Wang, Yang; Jiang, Yu; Kedia, Satish; Chang, Cyril F; Fijabi, Daniel; Bhuyan, Soumitra S

    2017-12-01

    There is little research at the national level on access to employee wellness programs and the use of preventive care services. This study examined the use of seven preventive care services among U.S working adults with access to employee wellness programs. The study population comprised 17,699 working adults aged ≥18 years, obtained from the 2015 National Health Interview Survey. Multivariate logistic regression models examined the relationship between access to employee wellness programs and use of seven preventive care services: influenza vaccination, blood pressure check, diabetes check, cholesterol check, Pap smear test, mammogram, and colon cancer screening. Data analysis began in Fall 2016. Overall, 46.6% of working adults reported having access to employee wellness programs in 2015. Working adults with access to employee wellness programs had higher odds of receiving influenza vaccination (OR=1.57, 95% CI=1.43, 1.72, pemployee wellness programs and the use of Pap smear test and colon cancer screening services. Using a nationally representative sample of individuals, this study found a positive association between access to employee wellness programs and the use of preventive care services. The results support favorable policies to encourage implementing wellness programs in all worksites, especially those with employees. Copyright © 2017 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  10. 48 CFR 1501.602-3 - Ratification of unauthorized commitments.

    Science.gov (United States)

    2010-10-01

    ... to present its claim to the General Accounting Office in accordance with the instructions contained... commitments, whether oral or written and without regard to dollar value. Examples of unauthorized commitments...

  11. Detection, Localization, and Tracking of Unauthorized UAS and Jammers

    Science.gov (United States)

    Guvenc, Ismail; Ozdemir, Ozgur; Yapici, Yavuz; Mehrpouyan, Hani; Matolak, David

    2017-01-01

    Small unmanned aircraft systems (UASs) are expected to take major roles in future smart cities, for example, by delivering goods and merchandise, potentially serving as mobile hot spots for broadband wireless access, and maintaining surveillance and security. Although they can be used for the betterment of the society, they can also be used by malicious entities to conduct physical and cyber attacks to infrastructure, private/public property, and people. Even for legitimate use-cases of small UASs, air traffic management (ATM) for UASs becomes of critical importance for maintaining safe and collusion-free operation. Therefore, various ways to detect, track, and interdict potentially unauthorized drones carries critical importance for surveillance and ATM applications. In this paper, we will review techniques that rely on ambient radio frequency signals (emitted from UASs), radars, acoustic sensors, and computer vision techniques for detection of malicious UASs. We will present some early experimental and simulation results on radar-based range estimation of UASs, and receding horizon tracking of UASs. Subsequently, we will overview common techniques that are considered for interdiction of UASs.

  12. Access to information and decision making on teenage pregnancy prevention by females in Tshwane.

    Science.gov (United States)

    Masemola-Yende, J P F; Mataboge, Sanah M

    2015-11-05

    The increase in the number of teenage pregnancies and its negative consequences has encouraged various researchers to explore the possible causes of teenage pregnancy. Findings from previously-conducted research have indicated different preventable factors that predispose female teenagers to pregnancy, such as staff attitudes and the lack of information resulting from poor access to health facilities. To explore and describe access to information and decision making on teenage pregnancy prevention by females using a primary healthcare clinic in Tshwane, South Africa. In this study, the researchers used a descriptive qualitative and exploratory research design to explore and describe the verbal reports regarding prevention of teenage pregnancy by females using a primary healthcare clinic in Tshwane, South Africa. Face-to-face semistructured interviews were conducted with 15 female participants aged between 15 and 26, who had been pregnant once or more during their teens. Two themes emerged, namely, access to information and decision making by female teenagers. Five categories that emerged were: access to information on pregnancy prevention; ignoring of provided information; the use of alternative medicine with hormonal contraception; personal reasons for use and non-use of contraception; and decisions made by teenagers to not fall pregnant. Females in this study fell pregnant in their teens, even though they had access to information. Given the complexity of this problem, female teenagers should use their families as primary sources of information for reproductive health promotion and educational institutions should build on this to aid the prevention of teenage pregnancy.

  13. The Effect of Child Access Prevention Laws on Non-Fatal Gun Injuries

    OpenAIRE

    Jeff DeSimone; Sara Markowitz

    2005-01-01

    Many states have passed child access prevention (CAP) laws, which hold the gun owner responsible if a child gains access to a gun that is not securely stored. Previous CAP law research has focused exclusively on gun-related deaths even though most gun injuries are not fatal. We use annual hospital discharge data from 1988-2001 to investigate whether CAP laws decrease non-fatal gun injuries. Results from Poisson regressions that control for various hospital, county and state characteristics, i...

  14. Access to information and decision making on teenage pregnancy prevention by females in Tshwane

    OpenAIRE

    J.P.F. Masemola-Yende; Sanah M. Mataboge

    2015-01-01

    Background: The increase in the number of teenage pregnancies and its negative consequences has encouraged various researchers to explore the possible causes of teenage pregnancy. Findings from previously-conducted research have indicated different preventable factors that predispose female teenagers to pregnancy, such as staff attitudes and the lack of information resulting from poor access to health facilities. Objective: To explore and describe access to information and decision making...

  15. Beyond Culture and Language: Access to Diabetes Preventive Health Services among Somali Women in Norway.

    Science.gov (United States)

    Gele, Abdi A; Torheim, Liv Elin; Pettersen, Kjell Sverre; Kumar, Bernadette

    2015-01-01

    Despite the high prevalence of type 2 diabetes in some immigrant and refugee communities in Norway, there is very little information available on their utilization of diabetes prevention interventions, particularly for women from Somali immigrant communities. A qualitative study of 30 Somali immigrant women aged 25 years and over was carried out in the Oslo area. Unstructured interviews were used to explore women's knowledge of diabetes, their access to preventive health facilities, and factors impeding their reception of preventive health programs targeted for the prevention of type 2 diabetes. The study participants were found to have a good knowledge of diabetes. They knew that a sedentary lifestyle and unhealthy diet are among the risk factors for diabetes. Regardless of their knowledge, participants reported a sedentary lifestyle accompanied with the consumption of an unhealthy diet. This was attributed to a lack of access to tailored physical activity services and poor access to health information. Considering gender-exclusive training facilities for Somali immigrant women and others with similar needs, in addition to access to tailored health information on diet, may encourage Somali women to adopt a healthy lifestyle, and it will definitely contribute to a national strategy for the prevention of diabetes.

  16. Beyond Culture and Language: Access to Diabetes Preventive Health Services among Somali Women in Norway

    Directory of Open Access Journals (Sweden)

    Abdi A. Gele

    2015-01-01

    Full Text Available Despite the high prevalence of type 2 diabetes in some immigrant and refugee communities in Norway, there is very little information available on their utilization of diabetes prevention interventions, particularly for women from Somali immigrant communities. A qualitative study of 30 Somali immigrant women aged 25 years and over was carried out in the Oslo area. Unstructured interviews were used to explore women’s knowledge of diabetes, their access to preventive health facilities, and factors impeding their reception of preventive health programs targeted for the prevention of type 2 diabetes. The study participants were found to have a good knowledge of diabetes. They knew that a sedentary lifestyle and unhealthy diet are among the risk factors for diabetes. Regardless of their knowledge, participants reported a sedentary lifestyle accompanied with the consumption of an unhealthy diet. This was attributed to a lack of access to tailored physical activity services and poor access to health information. Considering gender-exclusive training facilities for Somali immigrant women and others with similar needs, in addition to access to tailored health information on diet, may encourage Somali women to adopt a healthy lifestyle, and it will definitely contribute to a national strategy for the prevention of diabetes.

  17. Unauthorized border crossings and migrant deaths: Arizona, New Mexico, and El Paso, Texas, 2002-2003.

    Science.gov (United States)

    Sapkota, Sanjeeb; Kohl, Harold W; Gilchrist, Julie; McAuliffe, Jay; Parks, Bruce; England, Bob; Flood, Tim; Sewell, C Mack; Perrotta, Dennis; Escobedo, Miguel; Stern, Corrine E; Zane, David; Nolte, Kurt B

    2006-07-01

    We examined the major causes of and risk factors for death among migrants who died while making unauthorized border crossings into the United States from Mexico. Decedents were included in the study if (1) their remains were found between January 1, 2002, and December 31, 2003, in any US county along the 650-mi (1040-km) section of the US-Mexican border from Yuma, Ariz, to El Paso, Tex; (2) their immigration status was unauthorized; and (3) they were believed to have died during transit from Mexico to the United States. Characteristics of the decedents and causes of and risk factors for their deaths were examined. Among the 409 decedents meeting our inclusion criteria, environmental heat exposure (n=250; 61.1%) was the leading cause of death, followed by vehicle crashes (n=33; 8.1%) and drownings (n=24; 5.9%). Male decedents (n= 298; 72.8%) outnumbered female decedents (n = 105; 25.6%) nearly 3 to 1. More than half of the decedents were known to be Mexican nationals (n=235; 57.5%) and were aged 20 to 39 years (n=213; 52.0%); the nationality of 148 (36.2%) decedents was undetermined. Deaths among migrants making unauthorized crossings of the US-Mexican border are due to causes that are largely preventable. Prevention strategies should target young Mexican men, and focus on preventing them from conceiving plans to cross the border, discouraging them from using dangerous routes as crossing points, and providing search-and-rescue teams to locate lost or injured migrant crossers.

  18. Unauthorized Border Crossings and Migrant Deaths: Arizona, New Mexico, and El Paso, Texas, 2002–2003

    Science.gov (United States)

    Sapkota, Sanjeeb; Kohl, Harold W.; Gilchrist, Julie; McAuliffe, Jay; Parks, Bruce; England, Bob; Flood, Tim; Sewell, C. Mack; Perrotta, Dennis; Escobedo, Miguel; Stern, Corrine E.; Zane, David; Nolte, Kurt B.

    2006-01-01

    Objectives. We examined the major causes of and risk factors for death among migrants who died while making unauthorized border crossings into the United States from Mexico. Methods. Decedents were included in the study if (1) their remains were found between January 1, 2002, and December 31, 2003, in any US county along the 650-mi (1040-km) section of the US–Mexican border from Yuma, Ariz, to El Paso, Tex; (2) their immigration status was unauthorized; and (3) they were believed to have died during transit from Mexico to the United States. Characteristics of the decedents and causes of and risk factors for their deaths were examined. Results. Among the 409 decedents meeting our inclusion criteria, environmental heat exposure (n=250; 61.1%) was the leading cause of death, followed by vehicle crashes (n=33; 8.1%) and drownings (n=24; 5.9%). Male decedents (n= 298; 72.8%) outnumbered female decedents (n = 105; 25.6%) nearly 3 to 1. More than half of the decedents were known to be Mexican nationals (n=235; 57.5%) and were aged 20 to 39 years (n=213; 52.0%); the nationality of 148 (36.2%) decedents was undetermined. Conclusions. Deaths among migrants making unauthorized crossings of the US–Mexican border are due to causes that are largely preventable. Prevention strategies should target young Mexican men, and focus on preventing them from conceiving plans to cross the border, discouraging them from using dangerous routes as crossing points, and providing search-and-rescue teams to locate lost or injured migrant crossers. PMID:16735618

  19. Interlaboratory validation data on real-time polymerase chain reaction detection for unauthorized genetically modified papaya line PRSV-YK

    Directory of Open Access Journals (Sweden)

    Kosuke Nakamura

    2016-06-01

    Real-time polymerase chain reaction (PCR detection method for unauthorized genetically modified (GM papaya (Carica papaya L. line PRSV-YK (PRSV-YK detection method was developed using whole genome sequence data (DDBJ Sequenced Read Archive under accession No. PRJDB3976. Interlaboratory validation datasets for PRSV-YK detection method were provided. Data indicating homogeneity of samples prepared for interlaboratory validation were included. Specificity and sensitivity test data for PRSV-YK detection method were also provided.

  20. Factors that Prevent Children from Gaining Access to Schooling: A Study of Delhi Slum Households

    Science.gov (United States)

    Tsujita, Yuko

    2013-01-01

    This paper examines the factors that prevent slum children aged 5-14 from gaining access to schooling in light of the worsening urban poverty and sizable increase in rural-to-urban migration. Bias against social disadvantage in terms of gender and caste is not clearly manifested in schooling, while migrated children are less likely to attend…

  1. On the performance of shared access control strategy for femtocells

    KAUST Repository

    Magableh, Amer M.; Radaydeh, Redha Mahmoud; Alouini, Mohamed-Slim

    2013-01-01

    access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to improve and enhance the system performance. The system model considers a femtocell that is equipped with a

  2. Access to information and decision making on teenage pregnancy prevention by females in Tshwane

    Directory of Open Access Journals (Sweden)

    J.P.F. Masemola-Yende

    2015-11-01

    Full Text Available Background: The increase in the number of teenage pregnancies and its negative consequences has encouraged various researchers to explore the possible causes of teenage pregnancy. Findings from previously-conducted research have indicated different preventable factors that predispose female teenagers to pregnancy, such as staff attitudes and the lack of information resulting from poor access to health facilities. Objective: To explore and describe access to information and decision making on teenage pregnancy prevention by females using a primary healthcare clinic in Tshwane, South Africa. Method: In this study, the researchers used a descriptive qualitative and exploratory research design to explore and describe the verbal reports regarding prevention of teenage pregnancy by females using a primary healthcare clinic in Tshwane, South Africa. Face-to-face semistructured interviews were conducted with 15 female participants aged between 15 and 26, who had been pregnant once or more during their teens. Results: Two themes emerged, namely, access to information and decision making by female teenagers. Five categories that emerged were: access to information on pregnancy prevention; ignoring of provided information; the use of alternative medicine with hormonal contraception; personal reasons for use and non-use of contraception; and decisions made by teenagers to not fall pregnant. Females in this study fell pregnant in their teens, even though they had access to information. Conclusion: Given the complexity of this problem, female teenagers should use their families as primary sources of information for reproductive health promotion and educational institutions should build on this to aid the prevention of teenage pregnancy.

  3. Rural-Urban Differences in Access to Preventive Health Care Among Publicly Insured Minnesotans.

    Science.gov (United States)

    Loftus, John; Allen, Elizabeth M; Call, Kathleen Thiede; Everson-Rose, Susan A

    2018-02-01

    Reduced access to care and barriers have been shown in rural populations and in publicly insured populations. Barriers limiting health care access in publicly insured populations living in rural areas are not understood. This study investigates rural-urban differences in system-, provider-, and individual-level barriers and access to preventive care among adults and children enrolled in a public insurance program in Minnesota. This was a secondary analysis of a 2008 statewide, cross-sectional survey of publicly insured adults and children (n = 4,388) investigating barriers associated with low utilization of preventive care. Sampling was stratified with oversampling of racial/ethnic minorities. Rural enrollees were more likely to report no past year preventive care compared to urban enrollees. However, this difference was no longer statistically significant after controlling for demographic and socioeconomic factors (OR: 1.37, 95% CI: 1.00-1.88). Provider- and system-level barriers associated with low use of preventive care among rural enrollees included discrimination based on public insurance status (OR: 2.26, 95% CI: 1.34-2.38), cost of care concerns (OR: 1.72, 95% CI: 1.03-2.89) and uncertainty about care being covered by insurance (OR: 1.70, 95% CI: 1.01-2.85). These and additional provider-level barriers were also identified among urban enrollees. Discrimination, cost of care, and uncertainty about insurance coverage inhibit access in both the rural and urban samples. These barriers are worthy targets of interventions for publicly insured populations regardless of residence. Future studies should investigate additional factors associated with access disparities based on rural-urban residence. © 2017 National Rural Health Association.

  4. Preventing Smoking in Young People: A Systematic Review of the Impact of Access Interventions

    Directory of Open Access Journals (Sweden)

    Karin Humphries

    2009-04-01

    Full Text Available Aims: To examine existing evidence on the effectiveness of interventions that are designed to prevent the illegal sale of tobacco to young people. The review considers specific sub-questions related to the factors that might influence effectiveness, any differential effects for different sub-populations of youth, and barriers and facilitators to implementation. Methods: A review of studies on the impact of interventions on young people under the age of 18 was conducted. It included interventions that were designed to prevent the illegal sale of tobacco to children and young people. The review was conducted in July 2007, and included 20 papers on access restriction studies. The quality of the papers was assessed and the relevant data was extracted. Results: The evidence obtained from the review indicates that access restriction interventions may produce significant reductions in the rate of illegal tobacco sales to youth. However, lack of enforcement and the ability of youth to acquire cigarettes from social sources may undermine the effectiveness of these interventions. Conclusions: When access interventions are applied in a comprehensive manner, they can affect young people’s access to tobacco. However, further research is required to examine the effects of access restriction interventions on young people’s smoking behaviour.

  5. 25 CFR 700.727 - Impoundment and disposal of unauthorized livestock.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Impoundment and disposal of unauthorized livestock. 700... RELOCATION PROCEDURES New Lands Grazing § 700.727 Impoundment and disposal of unauthorized livestock. Unauthorized livestock within any range unit of the New Lands which are not removed therefrom within the...

  6. 25 CFR 168.16 - Impoundment and disposal of unauthorized livestock.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Impoundment and disposal of unauthorized livestock. 168... REGULATIONS FOR THE HOPI PARTITIONED LANDS AREA § 168.16 Impoundment and disposal of unauthorized livestock. Unauthorized livestock within any range unit of the Hopi Partitioned Lands which are not removed therefrom...

  7. 36 CFR 262.10 - Impoundment and disposal of unauthorized livestock.

    Science.gov (United States)

    2010-07-01

    ... unauthorized livestock. 262.10 Section 262.10 Parks, Forests, and Public Property FOREST SERVICE, DEPARTMENT OF... unauthorized livestock. Unauthorized livestock or livestock in excess of those authorized by a grazing permit... officer determines that such livestock use is occurring, has definite knowledge of the kind of livestock...

  8. 25 CFR 304.1 - Penalties for imitation or unauthorized use.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Penalties for imitation or unauthorized use. 304.1... SILVER, USE OF GOVERNMENT MARK § 304.1 Penalties for imitation or unauthorized use. The use of Government trade-marks in an unauthorized manner, or the colorable imitation of such marks, is subject to the...

  9. 37 CFR 1.939 - Unauthorized papers in inter partes reexamination.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Unauthorized papers in inter... Unauthorized papers in inter partes reexamination. (a) If an unauthorized paper is filed by any party at any...) Unless otherwise authorized, no paper shall be filed prior to the initial Office action on the merits of...

  10. 48 CFR 2901.602-3 - Ratification of unauthorized commitments.

    Science.gov (United States)

    2010-10-01

    ... preclude further unauthorized commitments (e.g., ethics, purchase card, or administrative procedures...) Steps to be followed Below the micro-purchase threshold Head of the Contracting Office 1 through 5 & 7... placed on notice by the contracting officer, in writing, that the purchase may be inappropriate because...

  11. 8 CFR 274a.3 - Continuing employment of unauthorized aliens.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Continuing employment of unauthorized aliens. 274a.3 Section 274a.3 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS CONTROL OF EMPLOYMENT OF ALIENS Employer Requirements § 274a.3 Continuing employment of...

  12. Protecting unauthorized immigrant mothers improves their children's mental health.

    Science.gov (United States)

    Hainmueller, Jens; Lawrence, Duncan; Martén, Linna; Black, Bernard; Figueroa, Lucila; Hotard, Michael; Jiménez, Tomás R; Mendoza, Fernando; Rodriguez, Maria I; Swartz, Jonas J; Laitin, David D

    2017-09-08

    The United States is embroiled in a debate about whether to protect or deport its estimated 11 million unauthorized immigrants, but the fact that these immigrants are also parents to more than 4 million U.S.-born children is often overlooked. We provide causal evidence of the impact of parents' unauthorized immigration status on the health of their U.S. citizen children. The Deferred Action for Childhood Arrivals (DACA) program granted temporary protection from deportation to more than 780,000 unauthorized immigrants. We used Medicaid claims data from Oregon and exploited the quasi-random assignment of DACA eligibility among mothers with birthdates close to the DACA age qualification cutoff. Mothers' DACA eligibility significantly decreased adjustment and anxiety disorder diagnoses among their children. Parents' unauthorized status is thus a substantial barrier to normal child development and perpetuates health inequalities through the intergenerational transmission of disadvantage. Copyright © 2017 The Authors, some rights reserved; exclusive licensee American Association for the Advancement of Science. No claim to original U.S. Government Works.

  13. Mercury Toxicity Following Unauthorized Siddha Medicine Intake - A Mimicker of Acquired Neuromyotonia - Report of 32 Cases.

    Science.gov (United States)

    Gnanashanmugam, G; Balakrishnan, R; Somasundaram, S P; Parimalam, N; Rajmohan, P; Pranesh, M B

    2018-01-01

    Mercury is used extensively in the preparation of Siddha medicines, after purification. In this study, we present 32 patients of mercury toxicity following unauthorized Siddha medicine intake who mimicked neuromyotonia clinically. We analyzed the clinical features of these patients, the role of autoimmunity in etiopathology, and compared it with acquired neuromyotonia. This is a retrospective study to analyze inpatients in a tertiary care center, admitted with mercury toxicity following Siddha medicine intake from August 2012 to October 2016. We analyzed the clinical features, laboratory data including mercury, arsenic and lead levels in blood, and serum voltage-gated potassium channels (VGKC)-CASPR2 Ab in selected patients. Thirty-two patients who had high blood mercury levels following Siddha medicine intake were included in the study. All patients (100%) had severe intractable neuropathic pain predominantly involving lower limbs. Twenty-six (81.25%) patients had fasciculations and myokymia. Fifteen patients (46.86%) had autonomic dysfunction (postural hypotension and resting tachycardia). Nine (28.12%) patients had encephalopathic features such as dullness, apathy, drowsiness, or delirium. Anti-VGKC Ab was positive in 12 patients with myokymia. All the patients in the study consumed Siddha medicines obtained from unauthorized dealers. Mercury toxicity following Siddha medicine intake closely mimics acquired neuromyotonia; severe intolerable neuropathic pain is the hallmark feature; Positive VGKC-CASPR2 antibody in some patients must be due to triggered autoimmunity secondary to mercury toxicity due to Siddha medicine intake. The government should establish licensing system to prevent distribution of unauthorized Siddha medicines.

  14. Beyond DAPA and DACA: Revisiting Legislative Reform in Light of Long-Term Trends in Unauthorized Immigration to the United States

    Directory of Open Access Journals (Sweden)

    Robert Warren

    2015-02-01

    exceeded the number who entered across the southern land border without inspection (EWIs in each year from 2008 to 2012.While the CMS estimates are based on sample data and assumptions that are subject to error, these trends are consistent with the best empirical information available.In November 2014 the Obama Administration announced an unprecedented set of executive action initiatives. At this writing, the Deferred Action for Parental Accountability (DAPA program and the expanded Deferred Action for Childhood Arrivals (DACA program, which would provide work authorization and temporary reprieve from removal to eligible persons, have been preliminarily enjoined. The temporary injunction, which the US Department of Justice plans to appeal to the Fifth Circuit Court of Appeals, comes in response to a legal challenge to the two programs by 26 states under Article II, section 3 of the US Constitution which requires the president to “take Care that the Laws be faithfully executed,” and under the Administrative Procedure Act (APA. In addition, the Republican majorities of the 114th Congress have vowed to prevent the implementation of these programs. However, the administration has expressed confidence that it will ultimately prevail in court and in its battle with Congress over these programs. Meanwhile, nongovernmental organizations (NGOs, community-based organizations (CBOs, and others continue to plan intensively for the DAPA and DACA programs, as well as for other executive action initiatives.This paper provides estimates of those who are potentially eligible for DAPA and DACA. However, it also looks beyond DAPA and DACA to make the case for broad legislative reform in light of long-term trends in unauthorized migration to the United States and the unauthorized resident population. In particular, it argues that substantial declines in the unauthorized population—a goal shared by partisans on both sides of the immigration debate—will require reform of the legal

  15. Public Health Investment in Team Care: Increasing Access to Clinical Preventive Services in Los Angeles County

    Directory of Open Access Journals (Sweden)

    Tony Kuo

    2018-02-01

    Full Text Available As part of federal and local efforts to increase access to high quality, clinical preventive services (CPS in underserved populations, the Los Angeles County Department of Public Health (DPH partnered with six local health system and community organization partners to promote the use of team care for CPS delivery. Although these partners were at different stages of organizational capacity, post-program review suggests that each organization advanced team care in their clinical or community environments, potentially affecting >250,000 client visits per year. Despite existing infrastructure and DPH’s funding support of CPS integration, partner efforts faced several challenges. They included lack of sustainable funding for prevention services; limited access to community resources that support disease prevention; and difficulties in changing health-care provider behavior. Although team care can serve as a catalyst or vehicle for delivering CPS, downstream sustainability of this model of practice requires further state and national policy changes that prioritize prevention. Public health is well positioned to facilitate these policy discussions and to assist health system and community organizations in strengthening CPS integration.

  16. Access to health information may improve behavior in preventing Avian influenza among women

    Directory of Open Access Journals (Sweden)

    Ajeng T. Endarti

    2011-02-01

    Full Text Available Background: Improving human behavior toward Avian influenza may lessen the chance to be infected by Avian influenza. This study aimed to identify several factors influencing behavior in the community.Method: A cross-sectional study was conducted in July 2008. Behavior regarding Avian influenza was measured by scoring the variables of knowledge, attitude, and practice. Subjects were obtained from the sub district of Limo, in Depok, West Java, which was considered a high risk area for Avian influenza. The heads of household as the sample unit were chosen by multi-stage sampling.Results: Among 387 subjects, 29.5% of them was had good behavior toward Avian influenza. The final model revealed that gender and access to health information were two dominant factors for good behavior in preventing Avian influenza. Compared with men, women had 67% higher risk to have good behavior [adjusted relative risk (RRa = 1.67; 95% confidence interval (CI = 0.92-3.04; P = 0.092]. Compared to those with no access to health information, subjects with access to health information had 3.4 fold increase to good behavior (RRa = 3.40; 95% CI =  0.84-13.76; P = 0.087.Conclusion: Acces to health information concerning Avian influenza was more effective among women in promoting good behavior toward preventing Avian influenza. (Med J Indones 2011; 20:56-61Keywords: avian influenza, behavior, gender, health promotion

  17. Age verification cards fail to fully prevent minors from accessing tobacco products.

    Science.gov (United States)

    Kanda, Hideyuki; Osaki, Yoneatsu; Ohida, Takashi; Kaneita, Yoshitaka; Munezawa, Takeshi

    2011-03-01

    Proper age verification can prevent minors from accessing tobacco products. For this reason, electronic locking devices based on a proof-of age system utilising cards were installed in almost every tobacco vending machine across Japan and Germany to restrict sales to minors. We aimed to clarify the associations between amount smoked by high school students and the usage of age verification cards by conducting a nationwide cross-sectional survey of students in Japan. This survey was conducted in 2008. We asked high school students, aged 13-18 years, in Japan about their smoking behaviour, where they purchase cigarettes, if or if not they have used age verification cards, and if yes, how they obtained this card. As the amount smoked increased, the prevalence of purchasing cigarettes from vending machines also rose for both males and females. The percentage of those with experience of using an age verification card was also higher among those who smoked more. Somebody outside of family was the top source of obtaining cards. Surprisingly, around 5% of males and females belonging to the group with highest smoking levels applied for cards themselves. Age verification cards cannot fully prevent minors from accessing tobacco products. These findings suggest that a total ban of tobacco vending machines, not an age verification system, is needed to prevent sales to minors.

  18. Expanding Prenatal Care to Unauthorized Immigrant Women and the Effects on Infant Health.

    Science.gov (United States)

    Swartz, Jonas J; Hainmueller, Jens; Lawrence, Duncan; Rodriguez, Maria I

    2017-11-01

    To measure the effect of access to prenatal care on unauthorized and low-income, new legal permanent resident immigrant women and their offspring. We used a difference-in-differences design that leverages the staggered rollout of Emergency Medicaid Plus by county from 2008 to 2013 as a natural experiment to estimate the effect on health service utilization for women and health outcomes for their infants. Regular Medicaid pregnancies were used as an additional control in a triple difference design. Our sample included pregnancies covered by Emergency Medicaid (35,182), Emergency Medicaid Plus (12,510), and Medicaid (166,054). After expansion of access to prenatal care, there was an increase in prenatal visits (7.2 more visits, 95% CI 6.45-7.96), receipt of adequate prenatal care (28% increased rate, CI 26-31), rates of diabetes screening (61% increased rate, CI 56-66), and fetal ultrasonograms (74% increased rate, CI 72-76). Maternal access to prenatal care was also associated with an increased number of well child visits (0.24 more visits, CI 0.07-0.41), increased rates of recommended screenings and vaccines (0.04 increased probability, CI 0.002-0.074), and reduced infant mortality (-1.01/1,000, CI -1.42 to -0.60) and rates of extremely low birth weight (less than 1,000 g) (-1.33/1,000, CI -2.44 to -0.21). Our results provide evidence of increased utilization and improved health outcomes for unauthorized immigrants and their children who are U.S. citizens after introduction of prenatal care expansion in Oregon. This study contributes to the debate around reauthorization of the Children's Health Insurance Program in 2017.

  19. Intra-accumbens Raclopride Administration Prevents Behavioral Changes Induced by Intermittent Access to Sucrose Solution

    Directory of Open Access Journals (Sweden)

    Josué O. Suárez-Ortiz

    2018-02-01

    Full Text Available Overeating is one of the most relevant clinical features in Binge Eating Disorder and in some obesity patients. According to several studies, alterations in the mesolimbic dopaminergic transmission produced by non-homeostatic feeding behavior may be associated with changes in the reward system similar to those produced by drugs of abuse. Although it is known that binge-eating is related with changes in dopaminergic transmission mediated by D2 receptors in the nucleus accumbens shell (NAcS, it has not been determined whether these receptors may be a potential target for the treatment of eating pathology with binge-eating. Accordingly, the aim of the present study was to evaluate whether sugar binging induced by intermittent access to a sucrose solution produced changes in the structure of feeding behavior and whether blocking D2 receptors prevented these changes. We used the intermittent access model to a 10% sucrose solution (2 h/day for 4 weeks to induce sugar binging in Sprague Dawley female rats. Experimental subjects consumed in a 2-h period more than 50% of the caloric intake consumed by the subjects with ad-lib access to the sweetened solution without any increase in body weight or fat accumulation. Furthermore, we evaluated whether sugar binging was associated to the estrous cycle and we did not find differences in caloric intake (estrous vs. diestrus. Subsequently, we characterized the structure of feeding behavior (microstructural analysis and the motivation for palatable food (breakpoints of the subjects with sugar binging and found that feeding episodes had short latencies, high frequencies, as well as short durations and inter-episode intervals. The intermittent access model did not increase breakpoints, as occurred in subjects with ad-lib access to the sucrose. Finally, we evaluated the effects of D2 receptor blockade in the NAcS, and found that raclopride (18 nM prevented the observed changes in the frequency and duration of

  20. Attitudes toward unauthorized immigrants, authorized immigrants, and refugees.

    Science.gov (United States)

    Murray, Kate E; Marx, David M

    2013-07-01

    Rates of human migration are steadily rising and have resulted in significant sociopolitical debates over how to best respond to increasing cultural diversity and changing migration patterns. Research on prejudicial attitudes toward immigrants has focused on the attitudes and beliefs that individuals in the receiving country hold about immigrants. The current study enhances this literature by examining how young adults view authorized and unauthorized immigrants and refugees. Using a between-groups design of 191 undergraduates, we found that participants consistently reported more prejudicial attitudes, greater perceived realistic threats, and greater intergroup anxiety when responding to questions about unauthorized compared with authorized immigrants. Additionally, there were differences in attitudes depending on participants' generational status, with older-generation participants reporting greater perceived realistic and symbolic threat, prejudice, and anxiety than newer-generation students. In some instances, these effects were moderated by participant race/ethnicity and whether they were evaluating authorized or unauthorized immigrants. Lastly, perceived realistic threat, symbolic threat, and intergroup anxiety were significant predictors of prejudicial attitudes. Overall, participants reported positive attitudes toward refugees and resettlement programs in the United States. These findings have implications for future research and interventions focused on immigration and prejudice toward migrant groups. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  1. Accessibility

    DEFF Research Database (Denmark)

    Brooks, Anthony Lewis

    2017-01-01

    This contribution is timely as it addresses accessibility in regards system hardware and software aligned with introduction of the Twenty-First Century Communications and Video Accessibility Act (CVAA) and adjoined game industry waiver that comes into force January 2017. This is an act created...... by the USA Federal Communications Commission (FCC) to increase the access of persons with disabilities to modern communications, and for other purposes. The act impacts advanced communications services and products including text messaging; e-mail; instant messaging; video communications; browsers; game...... platforms; and games software. However, the CVAA has no legal status in the EU. This text succinctly introduces and questions implications, impact, and wider adoption. By presenting the full CVAA and game industry waiver the text targets to motivate discussions and further publications on the subject...

  2. Improving patient access to prevent sight loss: ophthalmic electronic referrals and communication (Scotland).

    Science.gov (United States)

    Khan, A A; Mustafa, M Z; Sanders, R

    2015-02-01

    With the number of people with sight loss predicted to double to four million people in the UK by the year 2050, preventable visual loss is a significant public health issue. Sight loss is associated with an increased risk of falls, accidents and depression and evidence suggests that 50% of sight loss can be avoided. Timely diagnosis is central to the prevention of sight loss. Access to care can be a limiting factor in preventable cases. By improving referrals and access to hospital eye services it is possible to treat and minimise the number of patients with preventable sight loss and the impact this has on wider society. In 2005, NHS Fife took part in a flagship pilot funded by the Scottish government e-health department to evaluate the feasibility, safety, clinical effectiveness, and cost of electronic referral with images of patients directly from community optometrists to Hospital Eye Service (HES). The pilot study showed that electronic referral was feasible, fast, safe, and obviated the need for outpatient appointments in 128 (37%) patients with a high patient satisfaction. The results of the pilot study were presented and in May 2007, the electronic referral system was rolled out regionally in southeast Scotland. Referrals were accepted at a single site with vetting by a trained team and appointments were allocated within 48 hours. Following the implementation of electronic referral, waiting times were reduced from a median of 14 to 4 weeks. Significantly fewer new patients were seen (7462 vs 8714 [p electronic communication between community optometry practices and hospital eye departments. Five electronic forms were specifically designed for cataract, glaucoma, macula, paediatric and general ophthalmic disease. A Virtual Private Network was created which enabled optometrists to connect to the Scottish clinical information gateway system and send referrals to hospital and receive referral status feedback. Numerous hurdles have been encountered and overcome

  3. Syringe access for the prevention of blood borne infections among injection drug users

    Directory of Open Access Journals (Sweden)

    Rich Josiah D

    2003-11-01

    Full Text Available Abstract Background Approximately one-third of acquired immunodeficiency syndrome cases in the United States are associated with the practice of sharing of injection equipment and are preventable through the once-only use of syringes, needles and other injection equipment. Discussion Sterile syringes may be obtained legally by 4 methods depending on the state. They may be purchased over the counter, prescribed, obtained at syringe exchange programs or furnished by authorized agencies. Each of these avenues has advantages and disadvantages; therefore, legal access through all means is the most likely way to promote the use of sterile syringes. Summary By assisting illicit drug injectors to obtain sterile syringes the primary care provider is able to reduce the incidence of blood borne infections, and educate patients about safe syringe disposal. The provider is also able to initiate discussion about drug use in a nonjudgmental manner and to offer care to patients who are not yet ready to consider drug treatment.

  4. Development of unauthorized airborne emission source identification procedure

    Science.gov (United States)

    Shtripling, L. O.; Bazhenov, V. V.; Varakina, N. S.; Kupriyanova, N. P.

    2018-01-01

    The paper presents the procedure for searching sources of unauthorized airborne emissions. To make reasonable regulation decisions on airborne pollutant emissions and to ensure the environmental safety of population, the procedure provides for the determination of a pollutant mass emission value from the source being the cause of high pollution level and the search of a previously unrecognized contamination source in a specified area. To determine the true value of mass emission from the source, the minimum of the mean-root-square mismatch criterion between the computed and measured pollutant concentration in the given location is used.

  5. 7 CFR 766.252 - Unauthorized assistance resulting from submission of false information.

    Science.gov (United States)

    2010-01-01

    ... false information. 766.252 Section 766.252 Agriculture Regulations of the Department of Agriculture... Unauthorized Assistance § 766.252 Unauthorized assistance resulting from submission of false information. A... behalf, submits information to the Agency that the borrower knows to be false. ...

  6. 27 CFR 70.332 - Unauthorized use or sale of stamps.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Unauthorized use or sale....332 Unauthorized use or sale of stamps. Any person who buys, sells, offers for sale, uses, transfers... Code or in regulations made pursuant thereto, any stamp, coupon, ticket, book, or other device...

  7. Escape Excel: A tool for preventing gene symbol and accession conversion errors.

    Science.gov (United States)

    Welsh, Eric A; Stewart, Paul A; Kuenzi, Brent M; Eschrich, James A

    2017-01-01

    Microsoft Excel automatically converts certain gene symbols, database accessions, and other alphanumeric text into dates, scientific notation, and other numerical representations. These conversions lead to subsequent, irreversible, corruption of the imported text. A recent survey of popular genomic literature estimates that one-fifth of all papers with supplementary gene lists suffer from this issue. Here, we present an open-source tool, Escape Excel, which prevents these erroneous conversions by generating an escaped text file that can be safely imported into Excel. Escape Excel is implemented in a variety of formats (http://www.github.com/pstew/escape_excel), including a command line based Perl script, a Windows-only Excel Add-In, an OS X drag-and-drop application, a simple web-server, and as a Galaxy web environment interface. Test server implementations are accessible as a Galaxy interface (http://apostl.moffitt.org) and simple non-Galaxy web server (http://apostl.moffitt.org:8000/). Escape Excel detects and escapes a wide variety of problematic text strings so that they are not erroneously converted into other representations upon importation into Excel. Examples of problematic strings include date-like strings, time-like strings, leading zeroes in front of numbers, and long numeric and alphanumeric identifiers that should not be automatically converted into scientific notation. It is hoped that greater awareness of these potential data corruption issues, together with diligent escaping of text files prior to importation into Excel, will help to reduce the amount of Excel-corrupted data in scientific analyses and publications.

  8. An analysis of flight Quick Access Recorder (QAR) data and its applications in preventing landing incidents

    International Nuclear Information System (INIS)

    Wang, Lei; Wu, Changxu; Sun, Ruishan

    2014-01-01

    A long landing is one type of flight incident that will multiply the risk of a runway excursion. It occurs frequently but receives little attention in research due to difficulty in obtaining the real flight data. The aim of this paper is to discover key flight parameter features of long landing incidents by analyzing Quick Access Recorder (QAR) data and put forward prevention measures from the perspective of pilot operation at the same time. First, 73 flight performance parameter variables and 4 operation parameter variables were defined, covering major landing stages from 1500 ft to touchdown. Then 128 cases of selected QAR data were divided into two groups according to the threshold of identifying normal and long landing. Second, each flight parameter variable of these 128 flights was compared between groups and then the logistic and linear regression models were developed respectively to further examine the links between touchdown distance and these flight parameter variables. Third, potential flight operation causing performance difference of long landing incidents was also analyzed. Finally results indicate that the period of 200 ft to touchdown is the key stage of landing and flare is the most critical operation affecting touchdown distance. It is suggested that the pilot should inspect the ratio of descent rate and groundspeed carefully at the height of 50 ft and pilot's faster and steady pulling up columns is probably helpful for an excellent flare and landing. The findings are expected to be applied into flight operation practice for further preventing long landing incidents and even the runway excursion accidents

  9. Conviviality-driven access control policy

    NARCIS (Netherlands)

    El Kateb, Donia; Zannone, N.; Moawad, Assaad; Caire, Patrice; Nain, Grégory; Mouelhi, Tejeddine; Le Traon, Yves

    2015-01-01

    Nowadays many organizations experience security incidents due to unauthorized access to information. To reduce the risk of such incidents, security policies are often employed to regulate access to information. Such policies, however, are often too restrictive, and users do not have the rights

  10. Reexamining the association between child access prevention gun laws and unintentional shooting deaths of children.

    Science.gov (United States)

    Webster, D W; Starnes, M

    2000-12-01

    A previous study estimated that child access prevention (CAP) laws, which hold adults criminally liable for unsafe firearm storage in the environment of children, were associated with a 23% decline in unintentional firearm mortality rates among children. To reassess the effects of CAP laws and more fully examine the consistency of the estimated law effects across states. A pooled time-series study of unintentional firearm mortality among children from 1979 through 1997. Setting. The 50 states and the District of Columbia. All children laws enacted before 1998 were aggregated, the laws were associated with a 17% decline unintentional firearm death rates among children. The laws' effects were not equal across states. Florida's CAP law was associated with a 51% decline; however, there were no statistically significant aggregate or state-specific law effects in the other 14 states with CAP laws. Florida's CAP law-1 of only 3 such laws allowing felony prosecution of violators-appears to have significantly reduced unintentional firearm deaths to children. However, there is no evidence of effects in the other 14 states with CAP laws.

  11. Access and Use of Interventions to Prevent and Treat Malaria among Pregnant Women in Kenya and Mali: A Qualitative Study

    NARCIS (Netherlands)

    Hill, Jenny; Kayentao, Kassoum; Achieng, Florence; Diarra, Samba; Dellicour, Stephanie; Diawara, Sory I.; Hamel, Mary J.; Ouma, Peter; Desai, Meghna; Doumbo, Ogobara K.; ter Kuile, Feiko O.; Webster, Jayne

    2015-01-01

    Background Coverage of malaria in pregnancy interventions in sub-Saharan Africa is suboptimal. We undertook a systematic examination of the operational, socio-economic and cultural constraints to pregnant women's access to intermittent preventive treatment (IPTp), long-lasting insecticide-treated

  12. Mercury toxicity following unauthorized siddha medicine intake – A mimicker of acquired neuromyotonia - Report of 32 cases

    Directory of Open Access Journals (Sweden)

    G Gnanashanmugam

    2018-01-01

    Full Text Available Context: Mercury is used extensively in the preparation of Siddha medicines, after purification. In this study, we present 32 patients of mercury toxicity following unauthorized Siddha medicine intake who mimicked neuromyotonia clinically. We analyzed the clinical features of these patients, the role of autoimmunity in etiopathology, and compared it with acquired neuromyotonia. Subjects and Methods: This is a retrospective study to analyze inpatients in a tertiary care center, admitted with mercury toxicity following Siddha medicine intake from August 2012 to October 2016. We analyzed the clinical features, laboratory data including mercury, arsenic and lead levels in blood, and serum voltage-gated potassium channels (VGKC-CASPR2 Ab in selected patients. Results: Thirty-two patients who had high blood mercury levels following Siddha medicine intake were included in the study. All patients (100% had severe intractable neuropathic pain predominantly involving lower limbs. Twenty-six (81.25% patients had fasciculations and myokymia. Fifteen patients (46.86% had autonomic dysfunction (postural hypotension and resting tachycardia. Nine (28.12% patients had encephalopathic features such as dullness, apathy, drowsiness, or delirium. Anti-VGKC Ab was positive in 12 patients with myokymia. All the patients in the study consumed Siddha medicines obtained from unauthorized dealers. Conclusions: Mercury toxicity following Siddha medicine intake closely mimics acquired neuromyotonia; severe intolerable neuropathic pain is the hallmark feature; Positive VGKC-CASPR2 antibody in some patients must be due to triggered autoimmunity secondary to mercury toxicity due to Siddha medicine intake. The government should establish licensing system to prevent distribution of unauthorized Siddha medicines.

  13. Mercury Toxicity Following Unauthorized Siddha Medicine Intake – A Mimicker of Acquired Neuromyotonia - Report of 32 Cases

    Science.gov (United States)

    Gnanashanmugam, G.; Balakrishnan, R.; Somasundaram, S. P.; Parimalam, N.; Rajmohan, P.; Pranesh, M. B.

    2018-01-01

    Context: Mercury is used extensively in the preparation of Siddha medicines, after purification. In this study, we present 32 patients of mercury toxicity following unauthorized Siddha medicine intake who mimicked neuromyotonia clinically. We analyzed the clinical features of these patients, the role of autoimmunity in etiopathology, and compared it with acquired neuromyotonia. Subjects and Methods: This is a retrospective study to analyze inpatients in a tertiary care center, admitted with mercury toxicity following Siddha medicine intake from August 2012 to October 2016. We analyzed the clinical features, laboratory data including mercury, arsenic and lead levels in blood, and serum voltage-gated potassium channels (VGKC)-CASPR2 Ab in selected patients. Results: Thirty-two patients who had high blood mercury levels following Siddha medicine intake were included in the study. All patients (100%) had severe intractable neuropathic pain predominantly involving lower limbs. Twenty-six (81.25%) patients had fasciculations and myokymia. Fifteen patients (46.86%) had autonomic dysfunction (postural hypotension and resting tachycardia). Nine (28.12%) patients had encephalopathic features such as dullness, apathy, drowsiness, or delirium. Anti-VGKC Ab was positive in 12 patients with myokymia. All the patients in the study consumed Siddha medicines obtained from unauthorized dealers. Conclusions: Mercury toxicity following Siddha medicine intake closely mimics acquired neuromyotonia; severe intolerable neuropathic pain is the hallmark feature; Positive VGKC-CASPR2 antibody in some patients must be due to triggered autoimmunity secondary to mercury toxicity due to Siddha medicine intake. The government should establish licensing system to prevent distribution of unauthorized Siddha medicines. PMID:29720798

  14. Identifying barriers to receiving preventive dental services: expanding access to preventive dental hygiene services through affiliated practice.

    Science.gov (United States)

    Gross-Panico, Michelle L; Freeman, Wilbur K

    2012-01-01

    Minority children and children from lower income families are more likely to experience the burden of oral disease. Since oral disease reduces quality of life, it is a priority to utilize preventive dental services. The research questions ask if affiliated practice increases utilization of preventive dental services by underserved children from birth to 18 years of age, and what the barriers to receiving preventive dental services are and their level of importance. A survey was administered to parents/guardians of patients from birth to 18 years of age who received preventive dental services from Catholic Healthcare West East Valley Children's Dental Clinic, an affiliated practice dental clinic in Chandler, Arizona. Thirty-four surveys were completed: 21 completed in English and 13 completed in Spanish. The data was analyzed to provide descriptive statistics and non-parametrically analyzed using the Friedman's, Kendall's W and Wilcoxon Signed Ranks Tests. The cost of preventive dental services is more important to this population than both convenience of appointment time and distance traveled. As the cost increases for preventive dental services, this population will utilize preventive dental services less frequently. The study indicated that the increase of self-reported utilization of preventive dental services by underserved children, ranging in age from birth to 18 years old, in Arizona affiliated practice dental clinics, was primarily impacted by perceived reduced costs of receiving care. Funding efforts, reimbursement mechanisms and legislative policies should support this dental care delivery model to provide care to underserved children, adults and seniors throughout the U.S.

  15. Can a safeguards accountancy system really detect an unauthorized removal

    International Nuclear Information System (INIS)

    Ehinger, M.H.; Ellis, J.H.

    1981-11-01

    Theoretical investigations and system studies indicate safeguards material balance data from reprocessing plants can be used to detect unauthorized removals. Plant systems have been modeled and simulated data used to demonstrate the techniques. But how sensitive are the techniques when used with actual plant data. What is the effect of safeguards applications on plant operability. Can safeguards be acceptable to plant operators, and are there any benefits to be derived. The Barnwell Nuclear Fuel Plant (BNFP) has been devoted to answering these and other questions over the past several years. A computerized system of near-real-time accounting and in-process inventory has been implemented and demonstrated during actual plant test runs. Measured inventories and hourly material balance closures have been made to assess safeguards in an operating plant application. The tests have culminated in actual removals of material from the operating plant to investigate the response and measure the sensitivity of the safeguards and data evaluation system

  16. DNA enrichment approaches to identify unauthorized genetically modified organisms (GMOs).

    Science.gov (United States)

    Arulandhu, Alfred J; van Dijk, Jeroen P; Dobnik, David; Holst-Jensen, Arne; Shi, Jianxin; Zel, Jana; Kok, Esther J

    2016-07-01

    With the increased global production of different genetically modified (GM) plant varieties, chances increase that unauthorized GM organisms (UGMOs) may enter the food chain. At the same time, the detection of UGMOs is a challenging task because of the limited sequence information that will generally be available. PCR-based methods are available to detect and quantify known UGMOs in specific cases. If this approach is not feasible, DNA enrichment of the unknown adjacent sequences of known GMO elements is one way to detect the presence of UGMOs in a food or feed product. These enrichment approaches are also known as chromosome walking or gene walking (GW). In recent years, enrichment approaches have been coupled with next generation sequencing (NGS) analysis and implemented in, amongst others, the medical and microbiological fields. The present review will provide an overview of these approaches and an evaluation of their applicability in the identification of UGMOs in complex food or feed samples.

  17. Discussing Firearm Ownership and Access as Part of Suicide Risk Assessment and Prevention: "Means Safety" versus "Means Restriction".

    Science.gov (United States)

    Stanley, Ian H; Hom, Melanie A; Rogers, Megan L; Anestis, Michael D; Joiner, Thomas E

    2017-01-01

    The goal of this study was to describe the relative utility of the terms "means safety" versus "means restriction" in counseling individuals to limit their access to firearms in the context of a mock suicide risk assessment. Overall, 370 participants were randomized to read a vignette depicting a clinical scenario in which managing firearm ownership and access was discussed either using the term "means safety" or "means restriction." Participants rated the term "means safety" as significantly more acceptable and preferable than "means restriction." Participants randomized to the "means safety" condition reported greater intentions to adhere to clinicians' recommendations to limit access to a firearm for safety purposes (F[1,367] = 7.393, p = .007, [Formula: see text]). The term "means safety" may be more advantageous than "means restriction" when discussing firearm ownership and access in clinical settings and public health-oriented suicide prevention efforts.

  18. Quantifying the impact of accessibility on preventive healthcare in sub-Saharan Africa using mobile phone data.

    Science.gov (United States)

    Wesolowski, Amy; O'Meara, Wendy Prudhomme; Tatem, Andrew J; Ndege, Samson; Eagle, Nathan; Buckee, Caroline O

    2015-03-01

    Poor physical access to health facilities has been identified as an important contributor to reduced uptake of preventive health services and is likely to be most critical in low-income settings. However, the relation among physical access, travel behavior, and the uptake of healthcare is difficult to quantify. Using anonymized mobile phone data from 2008 to 2009, we analyze individual and spatially aggregated travel patterns of 14,816,521 subscribers across Kenya and compare these measures to (1) estimated travel times to health facilities and (2) data on the uptake of 2 preventive healthcare interventions in an area of western Kenya: childhood immunizations and antenatal care. We document that long travel times to health facilities are strongly correlated with increased mobility in geographically isolated areas. Furthermore, we found that in areas with equal physical access to healthcare, mobile phone-derived measures of mobility predict which regions are lacking preventive care. Routinely collected mobile phone data provide a simple and low-cost approach to mapping the uptake of preventive healthcare in low-income settings.

  19. 75 FR 71184 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW

    Science.gov (United States)

    2010-11-22

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; BMW AGENCY: National Highway Traffic Safety Administration... changes to prevent an unauthorized person from opening the vehicle by intercepting the signals of its...

  20. The Probability of Detection in the Telephone Line of Device of the Unauthorized Removal of Information

    Directory of Open Access Journals (Sweden)

    I. V. Svintsov

    2011-06-01

    Full Text Available The article discusses the theory of quantitative description of the possible presence in the telephone line devices unauthorized removal of information, investigated with the help of probability theory.

  1. Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2008

    Data.gov (United States)

    Department of Homeland Security — This report provides estimates of the number of unauthorized immigrants residing in the United States as of January 2008 by period of entry, region and country of...

  2. 78 FR 16045 - Safety Advisory: Unauthorized Marking of Compressed Gas Cylinders

    Science.gov (United States)

    2013-03-13

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No. PHMSA-2013-0019; Notice No. 13-03] Safety Advisory: Unauthorized Marking of Compressed Gas Cylinders AGENCY: Pipeline and Hazardous Materials Safety Administration (PHMSA), DOT. ACTION: Safety Advisory...

  3. Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2007

    Data.gov (United States)

    Department of Homeland Security — This report provides estimates of the number of unauthorized immigrants residing in the United States as of January 2007 by period of entry, region and country of...

  4. Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2012

    Data.gov (United States)

    Department of Homeland Security — This report provides estimates of the size of the unauthorized immigrant population residing in the United States as of January 2012 by period of entry, region and...

  5. Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2009

    Data.gov (United States)

    Department of Homeland Security — This report provides estimates of the number of unauthorized immigrants residing in the United States as of January 2009 by period of entry, region and country of...

  6. Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2006

    Data.gov (United States)

    Department of Homeland Security — This report provides estimates of the number of unauthorized immigrants residing in the United States as of January 2006 by period of entry, region and country of...

  7. Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2011

    Data.gov (United States)

    Department of Homeland Security — This report provides estimates of the size of the unauthorized immigrant population residing in the United States as of January 2011 by period of entry, region and...

  8. Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2010

    Data.gov (United States)

    Department of Homeland Security — This report provides estimates of the size of the unauthorized immigrant population residing in the United States as of January 2010 by period of entry, region and...

  9. The Effects of DACAmentation: The Impact of Deferred Action for Childhood Arrivals on Unauthorized Immigrants

    OpenAIRE

    Pope, Nolan G.

    2016-01-01

    As the largest immigration policy in 25 years, Deferred Action for Childhood Arrivals (DACA) made deportation relief and work authorization available to 1.7 million unauthorized immigrants. This paper looks at how DACA affects DACA-eligible immigrants' labor market outcomes. I use a difference-in-differences design for unauthorized immigrants near the criteria cutoffs for DACA eligibility. I find DACA increases the likelihood of working by increasing labor force participation and decreasing t...

  10. Disparities in health care access and receipt of preventive services by disability type: analysis of the medical expenditure panel survey.

    Science.gov (United States)

    Horner-Johnson, Willi; Dobbertin, Konrad; Lee, Jae Chul; Andresen, Elena M

    2014-12-01

    To examine differences in access to health care and receipt of clinical preventive services by type of disability among working-age adults with disabilities. Secondary analysis of Medical Expenditure Panel Survey (MEPS) data from 2002 to 2008. We conducted cross-sectional logistic regression analyses comparing people with different types of disabilities on health insurance status and type; presence of a usual source of health care; delayed or forgone care; and receipt of dental checkups and cancer screening. We pooled annualized MEPS data files across years. Our analytic sample consisted of adults (18-64 years) with physical, sensory, or cognitive disabilities and nonmissing data for all variables of interest. Individuals with hearing impairment had better health care access and receipt than people with other disability types. People with multiple types of limitations were especially likely to have health care access problems and unmet health care needs. There are differences in health care access and receipt of preventive care depending on what type of disability people have. More in-depth research is needed to identify specific causes of these disparities and assess interventions to address health care barriers for particular disability groups. © Health Research and Educational Trust.

  11. Health Service Accessibility and Risk in Cervical Cancer Prevention: Comparing Rural Versus Nonrural Residence in New Mexico

    Science.gov (United States)

    McDonald, Yolanda J.; Goldberg, Daniel W.; Scarinci, Isabel C.; Castle, Philip E.; Cuzick, Jack; Robertson, Michael; Wheeler, Cosette M.

    2018-01-01

    Purpose Multiple intrapersonal and structural barriers, including geography, may prevent women from engaging in cervical cancer preventive care such as screening, diagnostic colposcopy, and excisional precancer treatment procedures. Geographic accessibility, stratified by rural and nonrural areas, to necessary services across the cervical cancer continuum of preventive care is largely unknown. Methods Health care facility data for New Mexico (2010-2012) was provided by the New Mexico Human Papillomavirus Pap Registry (NMHPVPR), the first population-based statewide cervical cancer screening registry in the United States. Travel distance and time between the population-weighted census tract centroid to the nearest facility providing screening, diagnostic, and excisional treatment services were examined using proximity analysis by rural and nonrural census tracts. Mann-Whitney test (P < .05) was used to determine if differences were significant and Cohen's r to measure effect. Findings Across all cervical cancer preventive health care services and years, women who resided in rural areas had a significantly greater geographic accessibility burden when compared to nonrural areas (4.4 km vs 2.5 km and 4.9 minutes vs 3.0 minutes for screening; 9.9 km vs 4.2 km and 10.4 minutes vs 4.9 minutes for colposcopy; and 14.8 km vs 6.6 km and 14.4 minutes vs 7.4 minutes for precancer treatment services, all P < .001). Conclusion Improvements in cervical cancer prevention should address the potential benefits of providing the full spectrum of screening, diagnostic and precancer treatment services within individual facilities. Accessibility, assessments distinguishing rural and nonrural areas are essential when monitoring and recommending changes to service infrastructures (eg, mobile versus brick and mortar). PMID:27557124

  12. Water Quality vs. Sanitation Accessibility: What is the most effective intervention point for preventing cholera in Dhaka, Bangladesh?

    Science.gov (United States)

    Majumder, M. S.; Gute, D.; Faruque, A. S.

    2011-12-01

    Every year, 3 to 5 million individuals contract cholera, an acute diarrheal infection that is caused by the ingestion of food or water containing the Vibrio cholerae bacterium. Because cholera is a waterborne disease, it can be transmitted quickly in environments with inadequate water and sanitation systems where infected waste can easily pollute drinking water. Today, Bangladesh continues to struggle with endemic cholera. Donor organizations address water and sanitation via localized initiatives, including the installation of community water collection sites (i.e. tubewells; water-boiling points; etc.). At this small-scale level, water quality and sanitation accessibility can be improved independently of one another, and when resources are limited, donors must invest in the most effective disease prevention options. This study used laboratory-confirmed cholera incidence data (2000-2009) collected by the International Centre of Diarrheal Disease Research, Bangladesh at their on-site hospital to compare the efficacy of interventions addressing water quality versus sanitation accessibility in Dhaka, Bangladesh. Data regarding use of sanitary latrines and boiling of drinking water were extracted from sequential patient interviews conducted at the Dhaka facility and used as surrogate variables for sanitation accessibility and water quality respectively. Our analysis indicates that boiling water is 10 times more effective at preventing cholera than the use of a sanitary latrine. This finding suggests that regulating water quality is perhaps more critical to cholera prevention than increasing sanitation accessibility in an urban environment like that of Dhaka. At present, WaterAid - one of Bangladesh's most significant water and sanitation donor organizations - invests the majority of its budget on improving sanitation accessibility. The World Health Organization and the United Nations Millennium Development Goals also prioritize sanitation accessibility. However, in

  13. Health Service Accessibility and Risk in Cervical Cancer Prevention: Comparing Rural Versus Nonrural Residence in New Mexico.

    Science.gov (United States)

    McDonald, Yolanda J; Goldberg, Daniel W; Scarinci, Isabel C; Castle, Philip E; Cuzick, Jack; Robertson, Michael; Wheeler, Cosette M

    2017-09-01

    Multiple intrapersonal and structural barriers, including geography, may prevent women from engaging in cervical cancer preventive care such as screening, diagnostic colposcopy, and excisional precancer treatment procedures. Geographic accessibility, stratified by rural and nonrural areas, to necessary services across the cervical cancer continuum of preventive care is largely unknown. Health care facility data for New Mexico (2010-2012) was provided by the New Mexico Human Papillomavirus Pap Registry (NMHPVPR), the first population-based statewide cervical cancer screening registry in the United States. Travel distance and time between the population-weighted census tract centroid to the nearest facility providing screening, diagnostic, and excisional treatment services were examined using proximity analysis by rural and nonrural census tracts. Mann-Whitney test (P brick and mortar). © 2016 National Rural Health Association.

  14. Association Between Parental Barriers to Accessing a Usual Source of Care and Children's Receipt of Preventive Services.

    Science.gov (United States)

    Bellettiere, John; Chuang, Emmeline; Hughes, Suzanne C; Quintanilla, Isaac; Hofstetter, C Richard; Hovell, Melbourne F

    Preventive health services are important for child development, and parents play a key role in facilitating access to services. This study examined how parents' reasons for not having a usual source of care were associated with their children's receipt of preventive services. We used pooled data from the 2011-2014 National Health Interview Survey (n = 34 843 participants). Parents' reasons for not having a usual source of care were framed within the Penchansky and Thomas model of access and measured through 3 dichotomous indicators: financial barriers (affordability), attitudes and beliefs about health care (acceptability), and all other nonfinancial barriers (accessibility, accommodation, and availability). We used multivariable logistic regression models to test associations between parental barriers and children's receipt of past-year well-child care visits and influenza vaccinations, controlling for other child, family, and contextual factors. In 2014, 14.3% (weighted percentage) of children had at least 1 parent without a usual source of care. Children of parents without a usual source of care because they "don't need a doctor and/or haven't had any problems" or they "don't like, trust, or believe in doctors" had 35% lower odds of receiving well-child care (adjusted odds ratio = 0.65; 95% CI, 0.56-0.74) and 23% lower odds of receiving influenza vaccination (adjusted odds ratio = 0.77; 95% CI, 0.69-0.86) than children of parents without those attitudes and beliefs about health care. Financial and other nonfinancial parental barriers were not associated with children's receipt of preventive services. Results were independent of several factors relevant to children's access to preventive health care, including whether the child had a usual source of care. Parents' attitudes and beliefs about having a usual source of care were strongly associated with their children's receipt of recommended preventive health services. Rates of receipt of child preventive

  15. Structural barriers to HIV prevention among men who have sex with men (MSM) in Vietnam: Diversity, stigma, and healthcare access.

    Science.gov (United States)

    Philbin, Morgan M; Hirsch, Jennifer S; Wilson, Patrick A; Ly, An Thanh; Giang, Le Minh; Parker, Richard G

    2018-01-01

    Men who have sex with men (MSM) in Vietnam experience disproportionate rates of HIV infection. To advance understanding of how structural barriers may shape their engagement with HIV prevention services, we draw on 32 in-depth interviews and four focus groups (n = 31) conducted with MSM in Hanoi between October 2015- March 2016. Three primary factors emerged: (1) Diversity, both in relation to identity and income; Vietnamese MSM described themselves as segregated into Bóng kín (hidden, often heterosexually-identified MSM) and Bóng lộ ('out,' transgender, or effeminate MSM). Lower-income, 'hidden' MSM from rural areas were reluctant to access MSM-targeted services; (2) Stigma: MSM reported being stigmatized by the healthcare system, family, and other MSM; and (3) Healthcare access: this was limited due to economic barriers and lack of MSM-friendly services. Our research suggests the need for multiple strategies to reach diverse types of MSM as well as to address barriers in access to health services such as stigma and costs. While a great deal has been written about the diversity of MSM in relation to gender performance and sexual identities, our research points to the substantial structural-level barriers that must be addressed in order to achieve meaningful and effective HIV prevention for MSM worldwide.

  16. Limited access to HIV prevention in French prisons (ANRS PRI2DE: implications for public health and drug policy

    Directory of Open Access Journals (Sweden)

    Blanche Jerôme

    2011-05-01

    Full Text Available Abstract Background Overpopulation, poor hygiene and disease prevention conditions in prisons are major structural determinants of increased infectious risk within prison settings but evidence-based national and WHO guidelines provide clear indications on how to reduce this risk. We sought to estimate the level of infectious risk by measuring how French prisons adhere to national and WHO guidelines. Methods A nationwide survey targeting the heads of medical (all French prisons and psychiatric (26 French prisons units was conducted using a postal questionnaire and a phone interview mainly focusing on access to prevention interventions, i.e. bleach, opioid substitution treatment (OST, HBV vaccination and post-exposure prophylaxis (PEP for French prisoners. Two scores were built reflecting adherence to national and WHO international guidelines, ranging from 0 (no adherence to 10 (maximum adherence and 0 to 9 respectively. Results A majority (N = 113 (66% of the 171 prisons answered the questionnaires, representing 74% coverage (46,786 prisoners of the French prison population: 108 were medical units and 12 were psychiatric units. Inmate access to prevention was poor. The median[IQR] score measuring adherence to national guidelines was quite low (4.5[2.5; 5.5] but adherence to WHO guidelines was even lower 2.5[1.5; 3.5]; PEP was absent despite reported risky practices. Unsuitable OST delivery practices were frequently observed. Conclusions A wide gap exists between HIV prevention policies and their application in prisons. Similar assessments in other countries may be needed to guide a global policy reform in prison settings. Adequate funding together with innovative interventions able to remove structural and ideological barriers to HIV prevention are now needed to motivate those in charge of prison health, to improve their working environment and to relieve French prisoners from their currently debilitating conditions.

  17. Teaching children with autism spectrum disorders to mand for the removal of stimuli that prevent access to preferred items.

    Science.gov (United States)

    Shillingsburg, M Alice; Powell, Nicole M; Bowen, Crystal N

    2013-01-01

    Mand training is often a primary focus in early language instruction and typically includes mands that are positively reinforced. However, mands maintained by negative reinforcement are also important skills to teach. These include mands to escape aversive demands or unwanted items. Another type of negatively reinforced mand important to teach involves the removal of a stimulus that prevents access to a preferred activity. We taught 5 participants diagnosed with autism spectrum disorders to mand for the removal of a stimulus in order to access a preferred item that had been blocked. An evaluation was conducted to determine if participants responded differentially when the establishing operations for the preferred item were present versus absent. All participants learned to mand for the removal of the stimulus exclusively under conditions when the establishing operation was present.

  18. Prevention of suicide with regulations aimed at restricting access to highly hazardous pesticides

    DEFF Research Database (Denmark)

    Gunnell, David; Knipe, Duleeka; Chang, Shu Sen

    2017-01-01

    Background: Pesticide self-poisoning accounts for 14–20% of suicides worldwide. Regulation aimed at restricting access to pesticides or banning highly hazardous pesticides is one approach to reducing these deaths. We systematically reviewed the evidence of the effectiveness of pesticide regulation...... in reducing the incidence of pesticide suicides and overall suicides. Methods: We did a systematic review of the international evidence. We searched MEDLINE, PsycINFO, and Embase for studies published between Jan 1, 1960, and Dec 31, 2016, which investigated the effect of national or regional bans, and sales...... or import restrictions, on the availability of one or more pesticides and the incidence of suicide in different countries. We excluded other interventions aimed at limiting community access to pesticides. We extracted data from studies presenting pesticide suicide data and overall suicide data from before...

  19. Ventanillas de Salud: A Collaborative and Binational Health Access and Preventive Care Program

    Directory of Open Access Journals (Sweden)

    Maria Gudelia Rangel Gomez

    2017-06-01

    Full Text Available While individuals of Mexican origin are the largest immigrant group living in the U.S., this population is also the highest uninsured. Health disparities related to access to health care, among other social determinants, continue to be a challenge for this population. The government of Mexico, in an effort to address these disparities and improve the quality of life of citizens living abroad, has partnered with governmental and non-governmental health-care organizations in the U.S. by developing and implementing an initiative known as Ventanillas de Salud—Health Windows—(VDS. The VDS is located throughout the Mexican Consular network and aim to increase access to health care and health literacy, provide health screenings, and promote healthy lifestyle choices among low-income and immigrant Mexican populations in the U.S.

  20. Ventanillas de Salud: A Collaborative and Binational Health Access and Preventive Care Program.

    Science.gov (United States)

    Rangel Gomez, Maria Gudelia; Tonda, Josana; Zapata, G Rogelio; Flynn, Michael; Gany, Francesca; Lara, Juanita; Shapiro, Ilan; Rosales, Cecilia Ballesteros

    2017-01-01

    While individuals of Mexican origin are the largest immigrant group living in the U.S., this population is also the highest uninsured. Health disparities related to access to health care, among other social determinants, continue to be a challenge for this population. The government of Mexico, in an effort to address these disparities and improve the quality of life of citizens living abroad, has partnered with governmental and non-governmental health-care organizations in the U.S. by developing and implementing an initiative known as Ventanillas de Salud -Health Windows-(VDS). The VDS is located throughout the Mexican Consular network and aim to increase access to health care and health literacy, provide health screenings, and promote healthy lifestyle choices among low-income and immigrant Mexican populations in the U.S.

  1. Factors that influence the preventive care offered to adolescents accessing Public Oral Health Services, NSW, Australia

    Directory of Open Access Journals (Sweden)

    Masoe AV

    2015-06-01

    Full Text Available Angela V Masoe,1 Anthony S Blinkhorn,2 Jane Taylor,1 Fiona A Blinkhorn1 1School of Health Sciences, Faculty of Health and Medicine, Oral Health, University of Newcastle, Ourimbah, NSW, Australia; 2Department of Population Oral Health, Faculty of Dentistry, University of Sydney, Westmead, NSW, Australia Background: Many adolescents are at risk of dental caries and periodontal disease, which may be controlled through health education and clinical preventive interventions provided by oral health and dental therapists (therapists. Senior clinicians (SCs can influence the focus of dental care in the New South Wales (NSW Public Oral Health Services as their role is to provide clinical support and advice to therapists, advocate for their communities, and inform Local Health District (LHD managers of areas for clinical quality improvement. The objective of this study was to record facilitating factors and strategies that are used by SCs to encourage therapists to provide preventive care and advice to adolescent patients. Methods: In-depth, semistructured interviews were undertaken with 16 SCs from all of the 15 NSW LHDs (nine rural and six metropolitan. A framework matrix was used to systematically code data and enable key themes to be identified for analysis. Results: All SCs from the 15 NSW Health LHDs participated in the study. Factors influencing SCs' ability to integrate preventive care into clinical practice were: 1 clinical leadership and administrative support, 2 professional support network, 3 clinical and educational resources, 4 the clinician's patient management aptitude, and 5 clinical governance processes. Clinical quality improvement and continuing professional development strategies equipped clinicians to manage and enhance adolescents' confidence toward self-care. Conclusion: This study shows that SCs have a clear understanding of strategies to enhance the therapist's offer of scientific-based preventive care to adolescents. The problem

  2. Unauthorized Mexican workers in the 1990 Los Angeles County labour force.

    Science.gov (United States)

    Marcelli, E A; Heer, D M

    1997-01-01

    "By analysing how unauthorized Mexicans compare with seven other ethno-racial groups in Los Angeles County, separately and collectively, by educational attainment and time spent in the U.S., we find that unauthorized Mexicans had relatively fewer years of formal education (either in the U.S. or in Mexico) and had been in the U.S. a relatively fewer number of years than in-migrants of other ethno-racial backgrounds in 1990. These findings are then used as proxies to compare the human capital endowments of different ethno-racial groups. We next estimate the number of unauthorized Mexicans by occupation, industry and class of worker, and compare these distributions with the total labour force and with the other ethno-racial groups in Los Angeles County.... Results show that amounts of human capital are positively related to the kinds of occupations filled." (SUMMARY IN FRE AND SPA) excerpt

  3. Inequities in access to HIV prevention services for transgender men: results of a global survey of men who have sex with men.

    Science.gov (United States)

    Scheim, Ayden I; Santos, Glenn-Milo; Arreola, Sonya; Makofane, Keletso; Do, Tri D; Hebert, Patrick; Thomann, Matthew; Ayala, George

    2016-01-01

    Free or low-cost HIV testing, condoms, and lubricants are foundational HIV prevention strategies, yet are often inaccessible for men who have sex with men (MSM). In the global context of stigma and poor healthcare access, transgender (trans) MSM may face additional barriers to HIV prevention services. Drawing on data from a global survey of MSM, we aimed to describe perceived access to prevention services among trans MSM, examine associations between stigma and access, and compare access between trans MSM and cisgender (non-transgender) MSM. The 2014 Global Men's Health and Rights online survey was open to MSM (inclusive of trans MSM) from any country and available in seven languages. Baseline data (n=3857) were collected from July to October 2014. Among trans MSM, correlations were calculated between perceived service accessibility and anti-transgender violence, healthcare provider stigma, and discrimination. Using a nested matched-pair study design, trans MSM were matched 4:1 to cisgender MSM on age group, region, and HIV status, and conditional logistic regression models compared perceived access to prevention services by transgender status. About 3.4% of respondents were trans men, of whom 69 were included in the present analysis. The average trans MSM participant was 26 to 35 years old (56.5%); lived in western Europe, North America, or Oceania (75.4%); and reported being HIV-negative (98.6%). HIV testing, condoms, and lubricants were accessible for 43.5, 53.6, and 26.1% of trans MSM, respectively. Ever having been arrested or convicted due to being trans and higher exposure to healthcare provider stigma in the past six months were associated with less access to some prevention services. Compared to matched cisgender controls, trans MSM reported significantly lower odds of perceived access to HIV testing (OR=0.57, 95% CI=0.33, 0.98) and condom-compatible lubricants (OR=0.54, 95% CI=0.30, 0.98). This first look at access to HIV prevention services for trans MSM

  4. Access and use of interventions to prevent and treat malaria among pregnant women in Kenya and Mali: a qualitative study.

    Science.gov (United States)

    Hill, Jenny; Kayentao, Kassoum; Achieng, Florence; Diarra, Samba; Dellicour, Stephanie; Diawara, Sory I; Hamel, Mary J; Ouma, Peter; Desai, Meghna; Doumbo, Ogobara K; ter Kuile, Feiko O; Webster, Jayne

    2015-01-01

    Coverage of malaria in pregnancy interventions in sub-Saharan Africa is suboptimal. We undertook a systematic examination of the operational, socio-economic and cultural constraints to pregnant women's access to intermittent preventive treatment (IPTp), long-lasting insecticide-treated nets (LLINs) and case management in Kenya and Mali to provide empirical evidence for strategies to improve coverage. Focus group discussions (FGDs) were held as part of a programme of research to explore the delivery, access and use of interventions to control malaria in pregnancy. FGDs were held with four sub-groups: non-pregnant women of child bearing age (aged 15-49 years), pregnant women or mothers of children aged pregnancy, disease prevention in mother and foetus, checking the position of the baby in preparation for delivery, and ensuring admission to a facility in case of complications. Barriers to accessing care related to the quality of the health provider-client interaction, perceived health provider skills and malpractice, drug availability, and cost of services. Pregnant women perceived themselves and their babies at particular risk from malaria, and valued diagnosis and treatment from a health professional, but cost of treatment at health facilities drove women to use herbal remedies or drugs bought from shops. Women lacked information on the safety, efficacy and side effects of antimalarial use in pregnancy. Women in these settings appreciated the benefits of antenatal care and yet health services in both countries are losing women to follow-up due to factors that can be improved with greater political will. Antenatal services need to be patient-centred, free-of-charge or highly affordable and accountable to the women they serve.

  5. Access and use of interventions to prevent and treat malaria among pregnant women in Kenya and Mali: a qualitative study.

    Directory of Open Access Journals (Sweden)

    Jenny Hill

    Full Text Available Coverage of malaria in pregnancy interventions in sub-Saharan Africa is suboptimal. We undertook a systematic examination of the operational, socio-economic and cultural constraints to pregnant women's access to intermittent preventive treatment (IPTp, long-lasting insecticide-treated nets (LLINs and case management in Kenya and Mali to provide empirical evidence for strategies to improve coverage.Focus group discussions (FGDs were held as part of a programme of research to explore the delivery, access and use of interventions to control malaria in pregnancy. FGDs were held with four sub-groups: non-pregnant women of child bearing age (aged 15-49 years, pregnant women or mothers of children aged <1 year, adolescent women, and men. Content analysis was used to develop themes and sub-themes from the data.Women and men's perceptions of the benefits of antenatal care were generally positive; motivation among women consisted of maintaining a healthy pregnancy, disease prevention in mother and foetus, checking the position of the baby in preparation for delivery, and ensuring admission to a facility in case of complications. Barriers to accessing care related to the quality of the health provider-client interaction, perceived health provider skills and malpractice, drug availability, and cost of services. Pregnant women perceived themselves and their babies at particular risk from malaria, and valued diagnosis and treatment from a health professional, but cost of treatment at health facilities drove women to use herbal remedies or drugs bought from shops. Women lacked information on the safety, efficacy and side effects of antimalarial use in pregnancy.Women in these settings appreciated the benefits of antenatal care and yet health services in both countries are losing women to follow-up due to factors that can be improved with greater political will. Antenatal services need to be patient-centred, free-of-charge or highly affordable and accountable

  6. Vascular access and infection prevention and control: a national survey of routine practices in Irish haemodialysis units.

    Science.gov (United States)

    McCann, Margaret; Clarke, Michael; Mellotte, George; Plant, Liam; Fitzpatrick, Fidelma

    2013-04-01

    National and international guidelines recommend the use of effective vascular access (VA) and infection prevention and control practices within the haemodialysis environment. Establishing an arterio-venous fistula (AVF) and preventing central venous catheter (CVC)-related infections are ongoing challenges for all dialysis settings. We surveyed VA and routine infection prevention and control practices in dialysis units, to provide national data on these practices in Ireland. A descriptive survey was emailed to nurse managers at all adult (n = 19) and children (n = 1) outpatient haemodialysis units in the Republic of Ireland. Data collected included AVF formation, CVC insertion and maintenance practices, VA use and surveillance of infection and screening protocols. Nineteen of the 20 units responded to the survey. The AVF prevalence was 49% for 1370 patients in 17 units who provided these data [mean prevalence per unit: 45.7% (SD 16.2)]; the CVC mean prevalence per unit was 52.5% (SD 16.0). Fourteen dialysis units experienced inadequate access to vascular surgical procedures either due to a lack of dedicated theatre time or hospital beds. Six units administered intravenous prophylactic antimicrobials prior to CVC insertion with only two units using a CVC insertion checklist at the time of catheter insertion. In general, dialysis units in Ireland show a strong adherence to national guidelines. Compared with the 12 countries participating in the Dialysis Outcomes Practice Patterns Study (DOPPS 4), in 2010, AVF prevalence in Irish dialysis units is the second lowest. Recommendations include establishing an AVF national prevalence target rate, discontinuing the administration of intravenous prophylactic antimicrobials prior to CVC insertion and promoting the use of CVC insertion checklists.

  7. Medieval and Renaissance anatomists: the printing and unauthorized copying of illustrations, and the dissemination of ideas.

    Science.gov (United States)

    Lanska, Douglas J; Lanska, John Robert

    2013-01-01

    The vanguard that began to question Galenic anatomical dogma originated in northern Italy in the latter half of the thirteenth century, and not coincidentally this was where human dissection was introduced, which in turn eventually fostered the origins of realistic anatomical illustration in the late fifteenth century. With the advent of the printing press and moveable type at this time, printed books began to supersede hand-copied medieval manuscripts, and labor-intensive techniques were soon developed to integrate text and illustrations on the printed page. The same technology was used to pirate the illustrations of prior authors with varying fidelity. Specific medieval and Renaissance anatomical illustrations can often be traced from their inceptions through different stages of development to the final printed images, and then through subsequent pirated versions in various abridgements or other compendia. The most important milestone in the development of anatomy and anatomical illustration was the publication in 1543 by Andreas Vesalii of De humani corporis fabrica (On the Fabric of the Human Body), commonly referred to simply as the Fabrica. With this work, Vesalii succeeded in coordinating a publication production team (author, artists, block cutters, publisher, and typesetters) to achieve an unprecedented integration of scientific discourse, medical illustration, and typography. However, despite Vesalii's valiant efforts to prevent unauthorized duplication, the illustrations from the Fabrica were extensively plagiarized. Although Vesalii found such piracy frustrating and annoying, the long-term effect was to make Vesalii's ideas known to a wider readership and to help solidify his own revolutionary contributions to anatomy. © 2013 Elsevier B.V. All rights reserved.

  8. WOMEN'S ACCESSION TO THE PROGRAM FOR CANCER PREVENTION OF CERVICAL IN PRIMARY CARE, ANANINDEUA-PA

    Directory of Open Access Journals (Sweden)

    Fernanda Suelen Jacques Sousa de Assis

    2014-02-01

    Full Text Available Objective: To evaluate the adherence of women to take on the Prevention of Cervical Cancer (PCC, their difficulties and their knowledge. Methods: Cross-sectional study by interviewing women enrolled in a Family Health Strategy (FHS, Ananindeua-Pará. Results: Most women were between 20-39 years of age (72.6%, had low income and low education. Reported the exam annually (64.0% and every two years (17.0%, while 14.0% of them never realized. Of the participants who never performed the examination, the age group of 20-29 was the most prevalent (73.3% (p<0.05. It was found that the women had heard about the disease (97.1% and considered cancer as a wound that can lead to death (81.4%. There was a significant relationship between knowledge about cancer of the cervix (heard, concept, as it is known, timing, late detection, first sexual intercourse, condom use, contraceptive use and sexually transmitted disease with the examination (p<0.05. Shame was reported as greater difficulty (25.5%, followed by neglect (22.5% and lack of time (12.5%. Women who were examined rated as "Good" program PCC FHS. Conclusion: Women showed good adhesion to take PCC, said the main difficulty shame and demonstrated the concept on the subject.

  9. Associations of HIV Testing, Sexual Risk and Access to Prevention Among Female Sex Workers in the Dominican Republic.

    Science.gov (United States)

    Johnston, Lisa G; Bonilla, Luis; Caballero, Tessie; Rodriguez, Martha; Dolores, Yordana; de la Rosa, Miguel Angel; Malla, Annie; Burnett, Janet; Terrero, Víctor; Martinez, Sam; Morgan, Oliver

    2017-08-01

    The Caribbean region has one of the highest proportions of HIV in the general female population attributable to sex work. In 2008 (n = 1256) and 2012 (n = 1525) in the Dominican Republic, HIV biological and behavioral surveys were conducted among female sex workers (FSW) in four provinces using respondent driven sampling. Participants were ≥15 years who engaged in intercourse in exchange for money in the past 6 months and living/working in the study province. There were no statistically significant changes in HIV and other infections prevalence from 2008 to 2012, despite ongoing risky sexual practices. HIV testing and receiving results was low in all provinces. FSW in 2012 were more likely to receive HIV testing and results if they participated in HIV related information and education and had regular checkups at health centers. Further investigation is needed to understand barriers to HIV testing and access to prevention services.

  10. How do socio-economic factors and distance predict access to prevention and rehabilitation services in a Danish municipality?

    DEFF Research Database (Denmark)

    Hindhede, Anette L; Bonde, Ane; Schipperijn, Jasper

    2016-01-01

    Aim: The aim was to explore to which extent a Danish prevention centre catered for marginalised groups within the catchment area. We examined if the district’s socio-economic vulnerability status and distance from the citizens’ residential sector to the centre influenced referrals of citizens...... to the centre, citizens’ attendance at initial appointment and completion of planned activities at the centre. Background: Disparities in access to health care services is one among many aspects of inequality in health. The determinants within populations (e.g. socio-economic status, ethnicity and education...... was estimated based on the citizens’ educational level, ethnicity, income, and unemployment rate and a socio-economic vulnerability score (SE-score) was calculated. Logistic regression was used to describe the probability that a person was referred to the centre, attended the initial appointment and completed...

  11. Establish a perioperative check forum for peripheral intravenous access to prevent the occurrence of phlebitis

    Directory of Open Access Journals (Sweden)

    Po-Chun Chiu

    2015-04-01

    Full Text Available The prevalence of intravenous (IV catheter-related infections is 0.5 per 1000 device days, and these infections cause tenderness, erythema, swelling and phlebitis. Catheter-related bloodstream infections (CRBSI may independently increase hospital costs and length of stay; the aim of the study was to set up a standard operating procedure (SOP for the maintenance of peripheral vein catheter patency and the prevention of IV catheter-related complications. This is a retrospective study, enrolling patients who received anesthesia between April 2010 and January 2011. The study included 1 month of pretest phase, and 3 months each of “notification” phase, “observation” phase and “end” phase, respectively. The cannulations were set up by surgical ward nurses following the SOP on establishing peripheral intravenous catheter in our hospital. The cannulation sites were then examined before surgery and postoperatively by registered nurse anesthetists using the Baxter Scale. We also tried to set up a feedback circuit to let ward nurses know about the IV patency rate. As a result, 14,682 patients were enrolled in the study. The incidence of IV therapy-related adverse events was 0.78% in the notification phase, 0.43% in the observation phase, and 0.13% in the end phase. Overall IV therapy-related events declined significantly (p < 0.01, and the presence of phlebitis was associated with age (p < 0.05. An SOP established to assess IV patency through a checklist can reduce phlebitis and improve quality. The checklist increases ward nurses' and nurse anesthetists' awareness of IV patency, and the feedback circuit substantially reduces IV event rate.

  12. Establish a perioperative check forum for peripheral intravenous access to prevent the occurrence of phlebitis.

    Science.gov (United States)

    Chiu, Po-Chun; Lee, Ya-Hui; Hsu, Hung-Te; Feng, Yu-Tung; Lu, I-Cheng; Chiu, Shun-Li; Cheng, Kuang-I

    2015-04-01

    The prevalence of intravenous (IV) catheter-related infections is 0.5 per 1000 device days, and these infections cause tenderness, erythema, swelling and phlebitis. Catheter-related bloodstream infections (CRBSI) may independently increase hospital costs and length of stay; the aim of the study was to set up a standard operating procedure (SOP) for the maintenance of peripheral vein catheter patency and the prevention of IV catheter-related complications. This is a retrospective study, enrolling patients who received anesthesia between April 2010 and January 2011. The study included 1 month of pretest phase, and 3 months each of "notification" phase, "observation" phase and "end" phase, respectively. The cannulations were set up by surgical ward nurses following the SOP on establishing peripheral intravenous catheter in our hospital. The cannulation sites were then examined before surgery and postoperatively by registered nurse anesthetists using the Baxter Scale. We also tried to set up a feedback circuit to let ward nurses know about the IV patency rate. As a result, 14,682 patients were enrolled in the study. The incidence of IV therapy-related adverse events was 0.78% in the notification phase, 0.43% in the observation phase, and 0.13% in the end phase. Overall IV therapy-related events declined significantly (p phlebitis was associated with age (p phlebitis and improve quality. The checklist increases ward nurses' and nurse anesthetists' awareness of IV patency, and the feedback circuit substantially reduces IV event rate. Copyright © 2015. Published by Elsevier Taiwan.

  13. 75 FR 19464 - Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and...

    Science.gov (United States)

    2010-04-14

    ... Supervision, 1700 G Street, NW., Washington, DC 20552. SUPPLEMENTARY INFORMATION: OTS may not conduct or... situation to determine the nature and scope of the incident, and identify the information systems and types... Supervision, 1700 G Street, NW., Washington, DC 20552. Dated: April 8, 2010. Ira L. Mills, Paperwork Clearance...

  14. Improving access to optometry services for people at risk of preventable sight loss: a qualitative study in five UK locations.

    Science.gov (United States)

    Leamon, S; Hayden, C; Lee, H; Trudinger, D; Appelbee, E; Hurrell, D-L; Richardson, I

    2014-12-01

    Reducing preventable sight loss is an increasing priority for public health and health care providers. We examined the factors affecting people's use of optometry services in population groups at increased risk of sight loss. This is a qualitative study in five UK locations. In England, participants were from the Pakistani and Black Caribbean communities; in Scotland from the Pakistani community; and in Northern Ireland and Wales from white socio-economically deprived communities. Thirty-four focus groups were conducted (n = 289). The study included people who attend optometry services and people not engaged with services. Barriers to access included limited awareness of eye health and eye disease, concern about the cost of spectacles and the appropriateness of optometry in a commercial setting. Attendance at the optometrist was primarily symptom led. A positive previous experience or continuing relationship with the optometrist helped to alleviate the barriers and promote attendance. Addressing the disparity between the broader messages about eye health and the current perception of the function of optometry could help improve access to services. Uptake may be improved through the co-production of interventions that better resonate with local communities. Non-retail service delivery options should be explored. © The Author 2014, Published by Oxford University Press on behalf of Faculty of Public Health.

  15. Using a service sector segmented approach to identify community stakeholders who can improve access to suicide prevention services for veterans.

    Science.gov (United States)

    Matthieu, Monica M; Gardiner, Giovanina; Ziegemeier, Ellen; Buxton, Miranda

    2014-04-01

    Veterans in need of social services may access many different community agencies within the public and private sectors. Each of these settings has the potential to be a pipeline for attaining needed health, mental health, and benefits services; however, many service providers lack information on how to conceptualize where Veterans go for services within their local community. This article describes a conceptual framework for outreach that uses a service sector segmented approach. This framework was developed to aid recruitment of a provider-based sample of stakeholders (N = 70) for a study on improving access to the Department of Veterans Affairs and community-based suicide prevention services. Results indicate that although there are statistically significant differences in the percent of Veterans served by the different service sectors (F(9, 55) = 2.71, p = 0.04), exposure to suicidal Veterans and providers' referral behavior is consistent across the sectors. Challenges to using this framework include isolating the appropriate sectors for targeted outreach efforts. The service sector segmented approach holds promise for identifying and referring at-risk Veterans in need of services. Reprint & Copyright © 2014 Association of Military Surgeons of the U.S.

  16. Stigma as experienced by women accessing prevention of parent to child transmission of HIV services in Karnataka, India

    Science.gov (United States)

    Rahangdale, Lisa; Banandur, Pradeep; Sreenivas, Amita; Turan, Janet; Washington, Reynold; Cohen, Craig R.

    2010-01-01

    In Karnataka, India only one-third of HIV-infected pregnant women received antiretroviral prophylaxis at delivery in 2007 through the state government’s prevention of parent-to-child HIV transmission (PPTCT) program. The current qualitative study explored the role of HIV-associated stigma as a barrier to accessing PPTCT services in the rural northern Karnataka district of Bagalkot using in depth interviews and focus group discussions with HIV-infected women who had participated in the PPTCT program, male and female family members, and HIV service providers. Participants discussed personal experiences, community perceptions of HIV, and decision-making related to accessing PPTCT services. They described stigma towards HIV-infected individuals from multiple sources: healthcare workers, community members, family and self. Stigma-related behaviors were based on fears of HIV transmission through personal contact and moral judgment. Experience and/or fears of discrimination led pregnant women to avoid using PPTCT interventions. Government, cultural and historical factors are described as the roots of much the stigma-related behavior in this setting. Based on these formative data, PPTCT program planners should consider further research and interventions aimed at diminishing institutional and interpersonal HIV-associated stigma experienced by pregnant women. PMID:20635247

  17. 31 CFR 601.5 - Penalty for unauthorized control or possession.

    Science.gov (United States)

    2010-07-01

    ... CURRENCY AND OTHER SECURITIES § 601.5 Penalty for unauthorized control or possession. The Secretary of the... heretofore adopted for the printing of paper currency or other obligations or securities of the United States, is and will be subject to the provisions of 18 U.S.C. 474A which provides, in part, that it is...

  18. Consequences of Arizona's Immigration Policy on Social Capital among Mexican Mothers with Unauthorized Immigration Status

    Science.gov (United States)

    Valdez, Carmen R.; Padilla, Brian; Valentine, Jessa Lewis

    2013-01-01

    This study explores the consequences of increasingly restrictive immigration policies on social capital among Mexican mothers with unauthorized immigrant status in Arizona. Three focus groups conducted in Arizona explore how mothers' experiences with immigration policies have affected their neighborhood, community, and family ties. Focus group…

  19. Piracy among Undergraduate and Graduate Students: Influences on Unauthorized Book Copies

    Science.gov (United States)

    Dionisio, Pedro; Leal, Carmo; Pereira, Helia; Salgueiro, Maria Fatima

    2013-01-01

    The unauthorized duplication of books through photocopies and Internet downloads, especially in the case of academic books, is currently one of the most challenging problems facing the publishing industry. Photocopying has become widespread with these texts, apparently without major ethical concerns on the part of students. The purpose of this…

  20. In-State-Tuition for Unauthorized Residents: Teaching a Person to Fish

    Science.gov (United States)

    Dryden, Joe; Martinez, Cristina

    2014-01-01

    Illegal immigration has become one of the most important issues we face as a nation, and as greater attention is focused on the sociological and economic impact of illegal immigration, policies related to in-state-tuition for unauthorized residents are in a state of flux. Since 2005, the number of states offering in-state-tuition for unauthorized…

  1. Elvis is returning to the building: understanding a decline in unauthorized file sharing

    NARCIS (Netherlands)

    Poort, J.; Weda, J.

    2015-01-01

    A set of representative consumer surveys shows that in the Netherlands unauthorized file sharing of music has declined substantially between 2008 and 2012. It decreased slightly for games, but almost doubled for films and TV series. Overall, file sharing dropped from 38% to 27% of the population.

  2. Exploring Information Security Awareness Training to Reduce Unauthorized Disclosure of Information in Public Schools

    Science.gov (United States)

    Fleming, Antoine

    2017-01-01

    Advances in technological uses within public schools provide increased methods to collect and store non-public personal information (NPI) or personally identifiable information (PII) from both students and employees. Consequently, the sensitive information collected is susceptible to unauthorized disclosure, as various public school employees are…

  3. Unauthorized Immigrant Students in the United States: Educational Policies, Practices, and the Role of School Psychology

    Science.gov (United States)

    Sulkowski, Michael L.

    2017-01-01

    Overlooking Ellis Island, the famous port of entry for millions of U.S. immigrants, is the Statue of Liberty. Miss Liberty's lamp has welcomed millions of immigrants to the United States. However, in light of recent executive orders against immigration as well as efforts to detain and deport millions of unauthorized immigrants, one might wonder…

  4. Assessing the Efficacy of Restricting Access to Barbecue Charcoal for Suicide Prevention in Taiwan: A Community-Based Intervention Trial

    Science.gov (United States)

    Chen, Ying-Yeh; Chen, Feng; Chang, Shu-Sen; Wong, Jacky; Yip, Paul S F

    2015-01-01

    Objective Charcoal-burning suicide has recently been spreading to many Asian countries. There have also been several cases involving this new method of suicide in Western countries. Restricting access to suicide means is one of the few suicide-prevention measures that have been supported by empirical evidence. The current study aims to assess the effectiveness of a community intervention program that restricts access to charcoal to prevent suicide in Taiwan. Methods and Findings A quasi-experimental design is used to compare method-specific (charcoal-burning suicide, non-charcoal-burning suicide) and overall suicide rates in New Taipei City (the intervention site, with a population of 3.9 million) with two other cities (Taipei City and Kaohsiung City, the control sites, each with 2.7 million residents) before (Jan 1st 2009- April 30th 2012) and after (May 1st 2012-Dec. 31st 2013) the initiation of a charcoal-restriction program on May 1st 2012. The program mandates the removal of barbecue charcoal from open shelves to locked storage in major retail stores in New Taipei City. No such restriction measure was implemented in the two control sites. Generalized linear regression models incorporating secular trends were used to compare the changes in method-specific and overall suicide rates before and after the initiation of the restriction measure. A simulation approach was used to estimate the number of lives saved by the intervention. Compared with the pre-intervention period, the estimated rate reduction of charcoal-burning suicide in New Taipei City was 37% (95% CI: 17%, 50%) after the intervention. Taking secular trends into account, the reduction was 30% (95% CI: 14%, 44%). No compensatory rise in non-charcoal-burning suicide was observed in New Taipei City. No significant reduction in charcoal-burning suicide was observed in the other two control sites. The simulation approach estimated that 91 (95%CI [55, 128]) lives in New Taipei City were saved during the 20

  5. A randomized trial of motivational interviewing and facilitated contraceptive access to prevent rapid repeat pregnancy among adolescent mothers.

    Science.gov (United States)

    Stevens, Jack; Lutz, Robyn; Osuagwu, Ngozi; Rotz, Dana; Goesling, Brian

    2017-10-01

    Most interventions designed to reduce teen pregnancy rates have not focused on pregnant and/or parenting adolescents. Therefore, a large randomized controlled trial was conducted regarding a motivational interviewing program entitled Teen Options to Prevent Pregnancy in a low-income sample of adolescent mothers. This program recommended monthly sessions between a participant and a registered nurse over 18 months. This program also featured facilitated birth control access through transportation assistance and a part-time contraceptive clinic. The impact of this program on rapid repeat pregnancies at 18 months after enrollment was evaluated. Five hundred ninety-eight adolescent females were enrolled from 7 obstetrics-gynecology clinics and 5 postpartum units of a large hospital system in a Midwestern city. Each participant was enrolled at least 28 weeks pregnant or less than 9 weeks postpartum. Each participant was randomized to either the Teen Options to Prevent Pregnancy intervention or a usual-care control condition. Intervention participants averaged 4.5 hours of assistance. Participants were contacted by blinded research staff at 6 and 18 months to complete self-report surveys. Differences in outcomes between the intervention and control groups were assessed using ordinary least-squares regression. There was an 18.1% absolute reduction in self-reported repeat pregnancy in the intervention group relative to the control group (20.5% vs 38.6%%; P Teen Options to Prevent Pregnancy program represents one of the few evidence-based interventions to reduce rapid repeat teen pregnancy. This relatively brief intervention may be a viable alternative to more time-intensive programs that adolescent mothers may be unable or unwilling to receive. Copyright © 2017 Elsevier Inc. All rights reserved.

  6. Wi-Fi Networks Security and Accessing Control

    OpenAIRE

    Tarek S. Sobh

    2013-01-01

    As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects. The unauthorized access point (AP) problem has raised more attention and resulted in obtaining wireless access without subscriber permission.This work assumes Wi-Fi...

  7. [Access to intermittent preventive treatment (IPt) in a situation of abolition of user's fee: role of economic welfare].

    Science.gov (United States)

    Faye, A; Manga, N M; Seck, I; Niang, K; Leye, M M; Diagne-Camara, M; Diongue, M; Ba, M; Ndiaye, P; Tal-Dia, A

    2012-08-01

    In Senegal, the free distribution of sulfadoxine pyrimethamine during antenatal care is recommended to remove the disparity in the context of intermittent preventive treatment against malaria. The objective of this study was thus to identify factors influencing access to treatment in a situation of abolition of user fees. It was a cross-sectional and analytical study. It covered a sample of 1906 women aged 15-49 years randomly selected during the national survey on malaria in Senegal. Data were collected during a personal interview. The economic well-being was measured from the characteristics of housing and durable goods. The multivariate analysis was performed using logistic regression. The average age was 27.94 ± 5.34, 64.27% resided in rural area and 71.8% had received no schooling. Among the surveyed women, 23% were in the poorest quintile, while 16.3% were in the richest. Intermittent preventive treatment was performed in 49.3%. IPt were made more in urban areas (OR 1.45 95% [1.17 to 1.72]). It increased with the level of education with an OR of 1.5 and 1.68 in primary and secondary. The completion of the IPt increased with economic welfare. The OR ranged from 1.44 to 2.95 in the second quintile to the richest. Free medication does not necessarily benefit poor people. Other accompanying measures must be developed to facilitate the distribution of drugs particularly at community level with the involvement of people.

  8. What Prevents Central Asian Migrant Workers from Accessing HIV Testing? Implications for Increasing HIV Testing Uptake in Kazakhstan.

    Science.gov (United States)

    Davis, Alissa; Terlikbayeva, Assel; Terloyeva, Dina; Primbetova, Sholpan; El-Bassel, Nabila

    2017-08-01

    Several barriers prevent key populations, such as migrant workers, from accessing HIV testing. Using data from a cross-sectional study among Central Asian migrant workers (n = 623) in Kazakhstan, we examined factors associated with HIV testing. Overall, 48% of participants had ever received an HIV test. Having temporary registration (AOR 1.69; (95% CI [1.12-2.56]), having an employment contract (AOR 2.59; (95% CI [1.58-4.23]), being able to afford health care services (AOR 3.61; (95% CI [1.86-7.03]) having a medical check-up in the past 12 months (AOR 1.85; 95% CI [1.18-2.89]), and having a regular doctor (AOR 2.37; 95% CI [1.20-4.70]) were associated with having an HIV test. HIV testing uptake among migrants in Kazakhstan falls far short of UNAIDS 90-90-90 goals. Intervention strategies to increase HIV testing among this population may include initiatives that focus on improving outreach to undocumented migrants, making health care services more affordable, and linking migrants to health care.

  9. The Defense Science Board Permanent Task Force on Nuclear Weapons Surety. Report on the Unauthorized Movement of Nuclear Weapons

    National Research Council Canada - National Science Library

    Welch, Larry D; Agnew, Harold M; Bien, Lyle G; Crawford, John C; Foster, Jr., John S; Gold, Sydell P; McCarthy, James P; Mies, Richard W; Neary, Thomas H; Selden, Robert L

    2008-01-01

    ...]) and the Commander, U.S. Strategic Command to conduct an independent investigation of the unauthorized transfer of nuclear warheads between Minot Air Force Base, North Dakota, and Barksdale Air Force Base, Louisiana on 30 August 2007...

  10. 36 CFR 261.22 - Unauthorized use of “Smokey Bear” and “Woodsy Owl” symbol.

    Science.gov (United States)

    2010-07-01

    ..., DEPARTMENT OF AGRICULTURE PROHIBITIONS General Prohibitions § 261.22 Unauthorized use of “Smokey Bear” and “Woodsy Owl” symbol. (a) Manufacture, importation, reproduction, or use of “Smokey Bear” except as...

  11. Cascade of access to interventions to prevent HIV mother to child transmission in the metropolitan area of Rio de Janeiro, Brazil

    Directory of Open Access Journals (Sweden)

    Elaine S. Pires Araujo

    2014-05-01

    Conclusions: Access to the full package of interventions for the prevention of HIV vertical transmission was low, with no significant trend of improvement over the years. The vertical transmission rates observed were higher than those found in reference services in the municipality of Rio de Janeiro and in the richest regions of the country.

  12. Facial and Periorbital Cellulitis due to Skin Peeling with Jet Stream by an Unauthorized Person

    Directory of Open Access Journals (Sweden)

    Asli Feride Kaptanoglu

    2014-01-01

    Full Text Available Technologies and devices for cosmetic procedures are developing with each passing day. However, increased and unauthorized use of such emerging technologies may also lead to increases in unexpected results and complications as well. Here, we report a case of facial cellulitis after a “beauty parlor” session of skin cleaning with jet stream peeling device in 19-year old female patient for the first time. Complications due to improper and unauthorized use of jet stream peeling devices may also cause doubts about the safety and impair the reputation of the technology as well. In order to avoid irreversible complications, local authorities should follow the technology and update the regulations where the dermatologists should take an active role.

  13. How Can We Better Detect Unauthorized GMOs in Food and Feed Chains?

    Science.gov (United States)

    Fraiture, Marie-Alice; Herman, Philippe; De Loose, Marc; Debode, Frédéric; Roosens, Nancy H

    2017-06-01

    Current GMO detection systems have limited abilities to detect unauthorized genetically modified organisms (GMOs). Here, we propose a new workflow, based on next-generation sequencing (NGS) technology, to overcome this problem. In providing information about DNA sequences, this high-throughput workflow can distinguish authorized and unauthorized GMOs by strengthening the tools commonly used by enforcement laboratories with the help of NGS technology. In addition, thanks to its massive sequencing capacity, this workflow could be used to monitor GMOs present in the food and feed chain. In view of its potential implementation by enforcement laboratories, we discuss this innovative approach, its current limitations, and its sustainability of use over time. Copyright © 2017 Elsevier Ltd. All rights reserved.

  14. Facial and Periorbital Cellulitis due to Skin Peeling with Jet Stream by an Unauthorized Person.

    Science.gov (United States)

    Kaptanoglu, Asli Feride; Mullaaziz, Didem; Suer, Kaya

    2014-01-01

    Technologies and devices for cosmetic procedures are developing with each passing day. However, increased and unauthorized use of such emerging technologies may also lead to increases in unexpected results and complications as well. Here, we report a case of facial cellulitis after a "beauty parlor" session of skin cleaning with jet stream peeling device in 19-year old female patient for the first time. Complications due to improper and unauthorized use of jet stream peeling devices may also cause doubts about the safety and impair the reputation of the technology as well. In order to avoid irreversible complications, local authorities should follow the technology and update the regulations where the dermatologists should take an active role.

  15. Unauthorized Disclosure: Can Behavioral Indicators Help Predict Who Will Commit Unauthorized Disclosure of Classified National Security Information?

    Science.gov (United States)

    2015-06-01

    Katherine Herbig, Espionage by the Numbers: A Statistical Overview, accessed April 14, 2015, http://www.wright.edu/rsp/Security/Treason/Numbers.htm 5...submitted for top-secret clearances with “derogatory financial information.”43 The debt amount reviewed was $500 in delinquency for at least 120 days, which...Investigative Service’s (DIS) “ delinquent debt criteria with amount of delinquent debt” and Defense Central Index of Investigation’s (DCII) final

  16. Nanopore sequencing technology: a new route for the fast detection of unauthorized GMO.

    Science.gov (United States)

    Fraiture, Marie-Alice; Saltykova, Assia; Hoffman, Stefan; Winand, Raf; Deforce, Dieter; Vanneste, Kevin; De Keersmaecker, Sigrid C J; Roosens, Nancy H C

    2018-05-21

    In order to strengthen the current genetically modified organism (GMO) detection system for unauthorized GMO, we have recently developed a new workflow based on DNA walking to amplify unknown sequences surrounding a known DNA region. This DNA walking is performed on transgenic elements, commonly found in GMO, that were earlier detected by real-time PCR (qPCR) screening. Previously, we have demonstrated the ability of this approach to detect unauthorized GMO via the identification of unique transgene flanking regions and the unnatural associations of elements from the transgenic cassette. In the present study, we investigate the feasibility to integrate the described workflow with the MinION Next-Generation-Sequencing (NGS). The MinION sequencing platform can provide long read-lengths and deal with heterogenic DNA libraries, allowing for rapid and efficient delivery of sequences of interest. In addition, the ability of this NGS platform to characterize unauthorized and unknown GMO without any a priori knowledge has been assessed.

  17. Project WP#422: Consolidated Research Program, Right of Way Automated Monitoring Threat Prevention (Topic Area #1); Leak Detection (Topic Area #2)

    Science.gov (United States)

    2012-08-30

    Preventing unauthorized intrusions on pipeline Right of Ways (ROWs) and mechanical damage due to third party strikes by machinery is a constant challenge for the pipeline industry. Equally important for safety and environmental protection is the dete...

  18. 76 FR 52625 - Empowering Consumers To Prevent and Detect Billing for Unauthorized Charges (“Cramming...

    Science.gov (United States)

    2011-08-23

    ... that restrict accurate commercial speech.'' See, e.g., New York State Restaurant Association v. New... requiring restaurants to post calorie content information on their menus and menu boards) (citing Zauderer v... bills. The proposed rules are designed to advance the government's interest by providing consumers with...

  19. 78 FR 61250 - Empowering Consumers To Prevent and Detect Billing for Unauthorized Charges (“Cramming...

    Science.gov (United States)

    2013-10-03

    ... mailing address, and CG Docket No. 11-116. Paper filers: Parties who choose to file by paper must file an... messenger-delivered paper filings for the Commission's Secretary must be delivered to FCC Headquarters at... Communications Commission. Mark Stone, Deputy Chief, Consumer and Governmental Affairs Bureau. [FR Doc. 2013...

  20. 77 FR 41955 - Empowering Consumers To Prevent and Detect Billing for Unauthorized Charges (“Cramming...

    Science.gov (United States)

    2012-07-17

    ..., pursuant to the Small Business Paperwork Relief Act of 2002, Public Law 107-198, see 44 U.S.C. 3506(c)(4... given the importance of the issues in this proceeding. DATES: Reply comments are due on or before July... in this matter will be available for public inspection and copying during regular business hours at...

  1. Spontaneous diffusion of an effective skin cancer prevention program through Web-based access to program materials.

    Science.gov (United States)

    Hall, Dawn M; Escoffery, Cam; Nehl, Eric; Glanz, Karen

    2010-11-01

    Little information exists about the diffusion of evidence-based interventions, a process that can occur naturally in organized networks with established communication channels. This article describes the diffusion of an effective skin cancer prevention program called Pool Cool through available Web-based program materials. We used self-administered surveys to collect information from program users about access to and use of Web-based program materials. We analyzed the content of e-mails sent to the official Pool Cool Web site to obtain qualitative information about spontaneous diffusion. Program users were dispersed throughout the United States, most often learning about the program through a Web site (32%), publication (26%), or colleague (19%). Most respondents (86%) reported that their pool provided educational activities at swimming lessons. The Leader's Guide (59%) and lesson cards (50%) were the most commonly downloaded materials, and most respondents reported using these core items sometimes, often, or always. Aluminum sun-safety signs were the least frequently used materials. A limited budget was the most commonly noted obstacle to sun-safety efforts at the pool (85%). Factors supporting sun safety at the pool centered around risk management (85%) and health of the pool staff (78%). Diffusion promotes the use of evidence-based health programs and can occur with and without systematic efforts. Strategies such as providing well-packaged, user-friendly program materials at low or no cost and strategic advertisement of the availability of program materials may increase program use and exposure. Furthermore, highlighting the benefits of the program can motivate potential program users.

  2. Frequent inaccuracies in ABCD(2) scoring in non-stroke specialists' referrals to a daily Rapid Access Stroke Prevention service.

    LENUS (Irish Health Repository)

    Bradley, David

    2013-09-15

    The \\'accuracy\\' of age, blood pressure, clinical features, duration and diabetes (ABCD(2)) scoring by non-stroke specialists referring patients to a daily Rapid Access Stroke Prevention (RASP) service is unclear, as is the accuracy of ABCD(2) scoring by trainee residents. In this prospective study, referrals were classified as \\'confirmed TIAs\\' if the stroke specialist confirmed a clinical diagnosis of possible, probable or definite TIA, and \\'non-TIAs\\' if patients had a TIA mimic or completed stroke. ABCD(2) scores from referring physicians were compared with scores by experienced stroke specialists and neurology\\/geriatric medicine residents at a daily RASP clinic; inter-observer agreement was examined. Data from 101 referrals were analysed (mean age=60.0years, 58% male). The median interval between referral and clinic assessment was 1day. Of 101 referrals, 52 (52%) were \\'non-TIAs\\': 45 (86%) of 52 were \\'TIA mimics\\' and 7 (14%) of 52 were completed strokes. There was only \\'fair\\' agreement in total ABCD(2) scoring between referring physicians and stroke specialists (κ=0.37). Agreement was \\'excellent\\' between residents and stroke specialists (κ=0.91). Twenty of 29 patients scored as \\'moderate to high risk\\' (score 4-6) by stroke specialists were scored \\'low risk\\' (score 0-3) by referring physicians. ABCD(2) scoring by referring doctors is frequently inaccurate, with a tendency to underestimate stroke risk. These findings emphasise the importance of urgent specialist assessment of suspected TIA patients, and that ABCD(2) scores by non-stroke specialists cannot be relied upon in isolation to risk-stratify patients. Inter-observer agreement in ABCD(2) scoring was \\'excellent\\' between residents and stroke specialists, indicating short-term training may improve accuracy.

  3. Prevention of suicide with regulations aimed at restricting access to highly hazardous pesticides: a systematic review of the international evidence.

    Science.gov (United States)

    Gunnell, David; Knipe, Duleeka; Chang, Shu-Sen; Pearson, Melissa; Konradsen, Flemming; Lee, Won Jin; Eddleston, Michael

    2017-10-01

    pesticides in five of the six countries studied, including four studies using optimum analytical methods, were followed by reductions in pesticide suicides and, in three of these countries, falls in overall suicide mortality. Greece was the only country studied that did not show a decrease in pesticide suicide following a ban. There were no high-quality studies of restricting sales to people for occupational uses; four of the seven studies (in three of the five countries studied-India, Denmark, and the USA) showed sales restrictions were followed by decreases in pesticide suicides; one of the two studies investigating trends in overall suicide mortality reported a fall in deaths in Denmark, but there were also decreases in suicide deaths from other methods. National bans on highly hazardous pesticides, which are commonly ingested in acts of self-poisoning, seem to be effective in reducing pesticide-specific and overall suicide rates. Evidence is less consistent for sales restrictions. A worldwide ban on the use of highly hazardous pesticides is likely to prevent tens of thousands of deaths every year. None. Copyright © 2017 The Author(s). Published by Elsevier Ltd. This is an Open Access article under the CC BY 4.0 license. Published by Elsevier Ltd.. All rights reserved.

  4. Risk behavior and access to HIV/AIDS prevention services in a community sample of homeless persons entering permanent supportive housing.

    Science.gov (United States)

    Wenzel, Suzanne L; Rhoades, Harmony; Harris, Taylor; Winetrobe, Hailey; Rice, Eric; Henwood, Ben

    2017-05-01

    Homeless persons suffer disproportionately high rates of HIV infection, and moving into permanent supportive housing (PSH) can provide a stable base from which to access needed prevention services. However, little is known about HIV risk or prevention behavior during this critical time of transition. The current study investigated STI and HIV risk and prevention behavior and recent use of prevention and treatment services (i.e., education, testing, medication) among homeless persons preparing to move into PSH. Data come from interviews with 421 homeless adults before they moved into PSH. Thirty-seven percent of the respondents were sexually active; of those, 75.7% reported unprotected sex. Nearly two-thirds (64%) reported past year HIV testing and 40% reported testing for another STI. Fewer than one-third (31%) of respondents reported receiving posttest counseling at their last HIV test. HIV seropositivity was self-reported by 10%. Among those persons who were HIV-positive, 57.1% reported less than 100% antiretroviral (ARV) adherence. Among HIV-negative respondents, less than 1% had been prescribed preexposure prophylaxis (PrEP). Less than half (46.4%) of the sample reported any HIV prevention education in the past year. This population of homeless adults about to move into PSH report high rates of HIV risk behavior, but low rates of HIV prevention education and very little PrEP utilization. Further, low rates of ARV adherence among HIV-positive respondents indicate significant risk for HIV transmission and acquisition. Entering PSH is a period of transition for homeless persons when integrated care is critically important to ensure positive health outcomes, but these data suggest that PrEP and other HIV prevention services are poorly accessed among this population. As such, multipronged services that integrate PrEP and other HIV prevention services are needed to prevent transmission and acquisition of HIV in this high-risk, vulnerable population and ensure the

  5. Prevention

    DEFF Research Database (Denmark)

    Halken, S; Høst, A

    2001-01-01

    , breastfeeding should be encouraged for 4-6 months. In high-risk infants a documented extensively hydrolysed formula is recommended if exclusive breastfeeding is not possible for the first 4 months of life. There is no evidence for preventive dietary intervention neither during pregnancy nor lactation...... populations. These theories remain to be documented in proper, controlled and prospective studies. Breastfeeding and the late introduction of solid foods (>4 months) is associated with a reduced risk of food allergy, atopic dermatitis, and recurrent wheezing and asthma in early childhood. In all infants....... Preventive dietary restrictions after the age of 4-6 months are not scientifically documented....

  6. Computer access security code system

    Science.gov (United States)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  7. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    Science.gov (United States)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  8. Comparison of fingerprint and facial biometric verification technologies for user access and patient identification in a clinical environment

    Science.gov (United States)

    Guo, Bing; Zhang, Yu; Documet, Jorge; Liu, Brent; Lee, Jasper; Shrestha, Rasu; Wang, Kevin; Huang, H. K.

    2007-03-01

    As clinical imaging and informatics systems continue to integrate the healthcare enterprise, the need to prevent patient mis-identification and unauthorized access to clinical data becomes more apparent especially under the Health Insurance Portability and Accountability Act (HIPAA) mandate. Last year, we presented a system to track and verify patients and staff within a clinical environment. This year, we further address the biometric verification component in order to determine which Biometric system is the optimal solution for given applications in the complex clinical environment. We install two biometric identification systems including fingerprint and facial recognition systems at an outpatient imaging facility, Healthcare Consultation Center II (HCCII). We evaluated each solution and documented the advantages and pitfalls of each biometric technology in this clinical environment.

  9. Piloting the use of indigenous methods to prevent Nipah virus infection by interrupting bats' access to date palm sap in Bangladesh.

    Science.gov (United States)

    Nahar, Nazmun; Mondal, Utpal Kumar; Sultana, Rebeca; Hossain, M Jahangir; Khan, M Salah Uddin; Gurley, Emily S; Oliveras, Elizabeth; Luby, Stephen P

    2013-09-01

    People in Bangladesh frequently drink fresh date palm sap. Fruit bats (Pteropus giganteus) also drink raw sap and may contaminate the sap by shedding Nipah virus through saliva and urine. In a previous study we identified two indigenous methods to prevent bats accessing the sap, bamboo skirts and lime (calcium carbonate). We conducted a pilot study to assess the acceptability of these two methods among sap harvesters. We used interactive community meetings and group discussions to encourage all the sap harvesters (n = 12) from a village to use either bamboo skirts or lime smear that some of them (n = 4) prepared and applied. We measured the preparation and application time and calculated the cost of bamboo skirts. We conducted interviews after the use of each method. The sap harvesters found skirts effective in preventing bats from accessing sap. They were sceptical that lime would be effective as the lime was washed away by the sap flow. Preparation of the skirt took ∼105 min. The application of each method took ∼1 min. The cost of the bamboo skirt is minimal because bamboo is widely available and they made the skirts with pieces of used bamboo. The bamboo skirt method appeared practical and affordable to the sap harvesters. Further studies should explore its ability to prevent bats from accessing date palm sap and assess if its use produces more or better quality sap, which would provide further incentives to make it more acceptable for its regular use.

  10. Development of a thematic collection of Musa spp accessions using SCAR markers for preventive breeding against Fusarium oxysporum f. sp cubense tropical race 4.

    Science.gov (United States)

    Silva, P R O; de Jesus, O N; Bragança, C A D; Haddad, F; Amorim, E P; Ferreira, C F

    2016-03-11

    Bananas are one of the most consumed fruits worldwide, but are affected by many pests and diseases. One of the most devastating diseases is Fusarium wilt, caused by Fusarium oxysporum f. sp cubense (Foc). Recently, Fusarium tropical race 4 (Foc TR4) has been causing irreparable damage, especially in Asia and Africa where it has devastated entire plantations, including areas with Cavendish, which is known to be resistant to Foc race 1. Although this race is not yet present in Brazil, results obtained by Embrapa in partnership with the University of Wageningen, The Netherlands, indicate that 100% of the cultivars used by Brazilian growers are susceptible to Foc TR 4. In our study, 276 banana accessions were screened with sequence characterized amplified region (SCAR) markers that have been linked to the resistance of Foc TR 4. Two SCAR primers were tested and the results revealed that SCAR ScaU1001 was efficient at discriminating accessions with possible resistance in 36.6% of the evaluated accessions. This is the first attempt to develop a thematic collection of possible Foc TR 4 resistant banana accessions in Brazil, which could be tested in Asian or African countries to validate marker-assisted selection (MAS), and for use in the preventive breeding of the crop to safeguard our banana plantations against Foc TR 4. We believe that this is an important step towards the prevention of this devastating disease, especially considering that our banana plantations are at risk.

  11. Detection and Prevention of Insider Threats in Database Driven Web Services

    Science.gov (United States)

    Chumash, Tzvi; Yao, Danfeng

    In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider both insider and outsider attacks in the third-party web hosting scenarios. We present SafeWS, a modular solution that is inserted between server side scripts and databases in order to prevent and detect website hijacking and unauthorized access to stored data. To achieve the required security, SafeWS utilizes a combination of lightweight cryptographic integrity and encryption tools, software engineering techniques, and security data management principles. We also describe our implementation of SafeWS and its evaluation. The performance analysis of our prototype shows the overhead introduced by security verification is small. SafeWS will allow business owners to significantly reduce the security risks and vulnerabilities of outsourcing their sensitive customer data to third-party providers.

  12. Detecting un-authorized genetically modified organisms (GMOs) and derived materials.

    Science.gov (United States)

    Holst-Jensen, Arne; Bertheau, Yves; de Loose, Marc; Grohmann, Lutz; Hamels, Sandrine; Hougs, Lotte; Morisset, Dany; Pecoraro, Sven; Pla, Maria; Van den Bulcke, Marc; Wulff, Doerte

    2012-01-01

    Genetically modified plants, in the following referred to as genetically modified organisms or GMOs, have been commercially grown for almost two decades. In 2010 approximately 10% of the total global crop acreage was planted with GMOs (James, 2011). More than 30 countries have been growing commercial GMOs, and many more have performed field trials. Although the majority of commercial GMOs both in terms of acreage and specific events belong to the four species: soybean, maize, cotton and rapeseed, there are another 20+ species where GMOs are commercialized or in the pipeline for commercialization. The number of GMOs cultivated in field trials or for commercial production has constantly increased during this time period. So have the number of species, the number of countries involved, the diversity of novel (added) genetic elements and the global trade. All of these factors contribute to the increasing complexity of detecting and correctly identifying GMO derived material. Many jurisdictions, including the European Union (EU), legally distinguish between authorized (and therefore legal) and un-authorized (and therefore illegal) GMOs. Information about the developments, field trials, authorizations, cultivation, trade and observations made in the official GMO control laboratories in different countries around the world is often limited, despite several attempts such as the OECD BioTrack for voluntary dissemination of data. This lack of information inevitably makes it challenging to detect and identify GMOs, especially the un-authorized GMOs. The present paper reviews the state of the art technologies and approaches in light of coverage, practicability, sensitivity and limitations. Emphasis is put on exemplifying practical detection of un-authorized GMOs. Although this paper has a European (EU) bias when examples are given, the contents have global relevance. Copyright © 2012 Elsevier Inc. All rights reserved.

  13. Legalization Programs and the Integration of Unauthorized Immigrants: A Comparison of S. 744 and IRCA

    Directory of Open Access Journals (Sweden)

    María E. Enchautegui

    2014-02-01

    Full Text Available Experiences under the Immigration Reform and Control Act of 1986 (IRCA may prove to be a poor guide for understanding how smoothly today’s unauthorized immigrants will integrate into the economy under reform proposals such as the Border Security, Economic Opportunity, and Immigration Modernization Act (S. 744. While IRCA provided a relatively quick path to legal permanent resident status, S. 744 proposes a decade long process with much attendant uncertainty.  This and other provisions in S. 744 may adversely affect immigrants’ integration and economic mobility. 

  14. Practitioner Perceptions of Patients Wearing Decorative Contact Lenses Purchased Through Unauthorized Sellers.

    Science.gov (United States)

    Gaiser, Hilary; Ho, Connie; Janier, Nicole; Wee, Amy; Johnson, Catherine; Watanabe, Ronald

    2017-03-01

    To describe practitioner experiences regarding ocular complications in patients wearing decorative contact lenses, and to investigate the compliance of unauthorized distributors of decorative contact lenses to current Food and Drug Administration (FDA) and Federal Trade Commission (FTC) regulations. Also, to provide data to support a more targeted public health approach to reducing the incidence of illegal contact lens sales and associated ocular complications. An institutional review board-approved online survey was distributed through mass email to a list of 98 optometrists in the Boston, MA area. Concurrently, an empirical evaluation of independent, online decorative contact lens sellers who were not associated with FDA-approved contact lens manufacturers was performed to determine their adherence to FDA and FTC guidelines. The first 18 noncoincidental websites that resulted from a Google search for "costume contact lens sellers" and "cosmetic contact lens sellers" were examined as to the brands and parameters of lenses being sold, whether or not a valid prescription was required or verified, and if consumer education was provided. Twenty-two optometrists completed the online survey. Seventy-seven percent of respondents reported having patients with complications from decorative contact lenses that were purchased both legally and illegally. The most common age group for complications was 18 to 25 years (61%). One third of complications were seen in first-time lens wearers, half of whom never received proper care instructions or were unaware that care instructions existed. One quarter of the lenses were purchased illegally with unlicensed stores being the most common place of purchase. Of the 18 online sites examined, 72% of sellers failed to adhere to FTC and FDA regulations. A significant number of individuals who obtain contact lenses illegally from unauthorized sources are young adults. Most unauthorized sellers reviewed did not adhere to the proper protocol

  15. Framing migration and the process of crimmigration: A systematic analysis of the media representation of unauthorized immigrants in the Netherlands.

    Science.gov (United States)

    Brouwer, Jelmer; van der Woude, Maartje; van der Leun, Joanne

    2017-01-01

    In this article we examine whether the proposal to criminalize illegal stay in the Netherlands was preceded by increased negative media attention for unauthorized immigrants. Using a corpus linguistics approach, we carried out a quantitative discourse analysis of all newspaper articles on unauthorized migrants over a period of 15 years. Our results show that the amount of media coverage actually strongly decreased in the years before the proposal, and this coverage was moreover increasingly less negative. This study thus nuances the somewhat popular belief that unauthorized migrants are increasingly portrayed in negative ways and shows that the framing of migrants as criminals is a more diffuse process in which the media seem to follow rather than fuel politics and policy.

  16. Intermittent preventive treatment of malaria in pregnancy: the effect of new delivery approaches on access and compliance rates in Uganda

    DEFF Research Database (Denmark)

    Mbonye, Anthony K; Magnussen, Pascal; Bygbjerg, Ib Christian

    2007-01-01

    and increase access and compliance to it. METHODS: The study was designed to assess new approaches of delivering IPT through these groups and compare it with IPT at health units. The primary outcome measures were: the proportion of adolescents and primigravidae accessed; gestational age at recruitment...... and the proportion of women who completed two doses of sulfadoxine-pyremethamine. RESULTS: Two thousand seven hundred and eighty-five pregnant women (78% of those in the study area) participated. With new approaches, 92.4% of the women received IPT during the second trimester as recommended by the policy, vs. 76.......1% at health units, P approaches (P approaches also accessed IPT early: the mean gestational age when receiving the first dose of sulfadoxine...

  17. Access point analysis in smoking and nonsmoking adolescents: Findings from the European Smoking Prevention Framework Approach study

    NARCIS (Netherlands)

    Vries, H. de; Riet, J.P. van 't; Panday, S.; Reubsaet, A.

    2007-01-01

    This study analyzed possibilities to access European adolescents for tobacco control activities in out-of-school settings as part of comprehensive tobacco control programs. Data on leisure time behaviors of secondary school students were gathered during three waves from six European Union countries

  18. The role of private pesticide vendors in preventing access to pesticides for self-poisoning in rural Sri Lanka

    DEFF Research Database (Denmark)

    Weerasinghe, Manjula; Pearson, Melissa; Peiris, Ravi

    2014-01-01

    they did want to help to improve identification of such customers. The community did not blame vendors when pesticides used for self-poison were purchased from their shops. Vendors have already taken steps to restrict access, including selling low toxic products, counselling and asking customer to return...

  19. Mining Roles and Access Control for Relational Data under Privacy and Accuracy Constraints

    Science.gov (United States)

    Pervaiz, Zahid

    2013-01-01

    Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized insider can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization to anonymize and…

  20. Exploring the Meaning and Paths of Advocacy for Undocumented Students' Access to Education

    Science.gov (United States)

    Crawford, Emily R.; Arnold, Noelle Witherspoon

    2016-01-01

    There is widespread national debate over how to address and advocate for undocumented immigrants in the United States. Education is key to the economic, occupational, and social mobility of young unauthorized immigrants, but policies and practices can hinder or open their access to education. Educators pursue a range of activities to support…

  1. 10 CFR 74.11 - Reports of loss or theft or attempted theft or unauthorized production of special nuclear material.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Reports of loss or theft or attempted theft or... Requirements § 74.11 Reports of loss or theft or attempted theft or unauthorized production of special nuclear... plutonium shall notify the NRC Operations Center within 1 hour of discovery of any loss or theft or other...

  2. Access to Preventive Health Care for Undocumented Migrants: A Comparative Study of Germany, The Netherlands and Spain from a Human Rights Perspective

    Directory of Open Access Journals (Sweden)

    Veronika Flegar

    2016-02-01

    Full Text Available The present study analyzes the preventive health care provisions for nationals and undocumented migrants in Germany, the Netherlands and Spain in light of four indicators derived from the United Nations Committee on Economic, Social and Cultural Rights’ General Comment 14 (GC 14. These indicators are (i immunization; (ii education and information; (iii regular screening programs; and (iv the promotion of the underlying determinants of health. It aims to answer the question of what preventive health care services for undocumented migrants are provided for in Germany, the Netherlands and Spain and how this should be evaluated from a human rights perspective. The study reveals that the access to preventive health care for undocumented migrants is largely insufficient in all three countries but most extensive in the Netherlands and least extensive in Germany. The paper concludes that a human rights-based approach to health law and policy can help to refine and concretize the individual rights and state obligations for the preventive health care of undocumented migrants. While the human rights framework is still insufficiently clear in some respects, the research concedes the added value of a rights-based approach as an evaluation tool, advocacy framework and moral principle to keep in mind when adopting or evaluating state policies in the health sector.

  3. Limited access to HIV prevention in French prisons (ANRS PRI2DE): implications for public health and drug policy

    OpenAIRE

    Michel, Laurent; Jauffret-Roustide, Marie; Blanche, Jerôme; Maguet, Olivier; Calderon, Christine; Cohen, Julien; Carrieri, Patrizia M

    2011-01-01

    Abstract Background Overpopulation, poor hygiene and disease prevention conditions in prisons are major structural determinants of increased infectious risk within prison settings but evidence-based national and WHO guidelines provide clear indications on how to reduce this risk. We sought to estimate the level of infectious risk by measuring how French prisons adhere to national and WHO guidelines. Methods A nationwide survey targeting the heads of medical (all French prisons) and psychiatri...

  4. Preventive Dental Checkups and Their Association With Access to Usual Source of Care Among Rural and Urban Adult Residents.

    Science.gov (United States)

    Khan, Aishah; Thapa, Janani R; Zhang, Donglan

    2017-09-01

    This study aimed to assess the relationship between rural or urban residence and having a usual source of care (USC), and the utilization of preventive dental checkups among adults. Cross-sectional analysis was conducted using data from the Medical Expenditure Panel Survey 2012. We performed a logit regression on the relationship between rural and urban residence, having a USC, and having at least 1 dental checkup in the past year, adjusting for sociodemographic characteristics and health status. After controlling for covariates, rural adult residents had significantly lower odds of having at least 1 dental checkup per year compared to their urban counterparts (odds ratio [OR] = 0.73, 95% confidence interval [CI]: 0.62-0.86, P rural and urban residents, having a USC was significantly associated with an 11% (95% CI = 9%-13%) increase in the probability of having a preventive dental checkup within a year. Individuals with a USC were more likely to obtain a preventive dental visit, with similar effects in rural and urban settings. We attributed the lower odds of having a checkup in rural regions to the lower density of oral health care providers in these areas. Integration of rural oral health care into primary care may help mitigate the challenges due to a shortage of oral health care providers in rural areas. © 2017 National Rural Health Association.

  5. The unauthorized Mexican immigrant population and welfare in Los Angeles County: a comparative statistical analysis.

    Science.gov (United States)

    Marcelli, E A; Heer, D M

    1998-01-01

    "Using a unique 1994 Los Angeles County Household Survey of foreign-born Mexicans and the March 1994 and 1995 Current Population Surveys, we estimate the number of unauthorized Mexican immigrants (UMIs) residing in Los Angeles County, and compare their use of seven welfare programs with that of other non-U.S. citizens and U.S. citizens. Non-U.S. citizens were found to be no more likely than U.S. citizens to have used welfare, and UMIs were 11% (14%) less likely than other non-citizens (U.S.-born citizens).... We demonstrate how results differ depending on the unit of analysis employed, and on which programs constitute ¿welfare'." excerpt

  6. Reductions in access to HIV prevention and care services are associated with arrest and convictions in a global survey of men who have sex with men.

    Science.gov (United States)

    Santos, Glenn-Milo; Makofane, Keletso; Arreola, Sonya; Do, Tri; Ayala, George

    2017-02-01

    Men who have sex with men (MSM) are disproportionately impacted by HIV. Criminalisation of homosexuality may impede access to HIV services. We evaluated the effect of the enforcement of laws criminalising homosexuality on access to services. Using data from a 2012 global online survey that was published in a prior paper, we conducted a secondary analysis evaluating differences in perceived accessibility to health services (ie, 'how accessible are ____' services) between MSM who responded 'yes'/'no' to: 'have you ever been arrested or convicted for being gay/MSM?' Of the 4020 participants who completed the study and were included in the analysis, 8% reported ever being arrested or convicted under laws relevant to being MSM. Arrests and convictions were most common in sub-Saharan Africa (23.6% (58/246)), Eastern Europe/Central Asia (18.1% (123/680)), the Caribbean (15% (15/100)), Middle East/North Africa (13.2% (10/76)) and Latin America (9.7% (58/599)). Those arrested or convicted had significantly lower access to sexually transmitted infection treatment (adjusted OR (aOR)=0.81; 95% CI 0.67 to 0.97), condoms (aOR=0.77; 95% CI 0.61 to 0.99) and medical care (aOR=0.70; 95% CI 0.54 to 0.90), compared with other MSM, while accounting for clustering by country and adjusting for age, HIV status, education and country-level income. Arrests and convictions under laws relevant to being MSM have a strong negative association with access to HIV prevention and care services. Creating an enabling legal and policy environment, and increasing efforts to mitigate antihomosexuality stigma to ensure equitable access to HIV services are needed, along with decriminalisation of homosexuality, to effectively address the public health needs of this population. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  7. Public health service options for affordable and accessible noncommunicable disease and related chronic disease prevention and management

    Directory of Open Access Journals (Sweden)

    Brownie S

    2014-11-01

    Full Text Available Sharon Brownie,1,2 Andrew P Hills,3,4 Rachel Rossiter51Workforce and Health Services, Griffith Health, Griffith University, Gold Coast, QLD, Australia; 2Oxford PRAXIS Forum, Green Templeton College, Oxford University, Oxford, United Kingdom; 3Allied Health Research, Mater Research Institute – The University of Queensland and Mater Mothers' Hospital, South Brisbane, QLD, Australia; 4Griffith Health Institute, Griffith Health, Griffith University, Gold Coast, QLD, Australia; 5MMHN and Nurse Practitioner Programs, School of Nursing and Midwifery, University of Newcastle, Callaghan, NSW, AustraliaAbstract: Globally, nations are confronted with the challenge of providing affordable health services to populations with increasing levels of noncommunicable and chronic disease. Paradoxically, many nations can both celebrate increases in life expectancy and bemoan parallel increases in chronic disease prevalence. Simply put, despite living longer, not all of that time is spent in good health. Combined with factors such as rising levels of obesity and related noncommunicable disease, the demand for health services is requiring nations to consider new models of affordable health care. Given the level of disease burden, all staff, not just doctors, need to be part of the solution and encouraged to innovate and deliver better and more affordable health care, particularly preventative primary health care services. This paper draws attention to a range of exemplars to encourage and stimulate readers to think beyond traditional models of primary health service delivery. Examples include nurse-led, allied health-led, and student-led clinics; student-assisted services; and community empowerment models. These are reported for the interest of policy makers and health service managers involved in preventative and primary health service redesign initiatives.Keywords: primary health care planning, community health care, nurse-led clinics, allied health personnel

  8. Production of Lawyers in Israel – What Does Unauthorized Practice of Law Have to Do With It?

    Directory of Open Access Journals (Sweden)

    Neta Ziv

    2013-07-01

    Full Text Available Discussions about the "flooding" of the legal profession have focused on jurisprudence and legal culture (how people resolve disputes; accessibility to legal education and the acceleration in the number of law schools; social and cultural factors (professional status, and structural entry barriers to the professional. This paper analyzes the reality of the growing number of lawyers in Israel with reference to an additional factor: the most extensive rules regarding Unauthorized Practice of Law, strictly guarded by the Israeli Bar Association. As law had become an accepted forum for resolving private and public disputes, any kind of activity entailing provision of legal advice, legal documentation or representation is restricted to lawyers only. Consequently, entry into the profession becomes the only way to take part and become engaged in the field of legal services. Los debates sobre la “inundación” de la abogacía se han centrado en la jurisprudencia y la cultura legal (en la forma de resolver disputas; la accesibilidad a la educación en derecho y el aumento del número de escuelas de derecho; los factores sociales y culturales (estatus profesional, y las barreras de acceso estructurales a la profesión. Este artículo analiza la realidad del número creciente de abogados en Israel, haciendo referencia a un factor adicional: la normativa más amplia relacionada con la práctica no autorizada del derecho, vigilada estrechamente por la Asociación de Abogados de Israel. Está asumido que el derecho es el foro en el que resolver disputas privadas y públicas, por lo que cualquier actividad que implique la provisión de consejo legal, documentación legal, o representación, está limitada únicamente a los abogados. De esta forma, acceder a la profesión se convierte en la única forma de participar e implicarse en el campo de los servicios legales.

  9. Internet access is NOT restricted globally to high income countries: so why are evidenced based prevention and treatment programs for mental disorders so rare?

    Science.gov (United States)

    Watts, Sarah E; Andrews, Gavin

    2014-08-01

    Mental disorders are widespread and universal. They are frequently accompanied by considerable harmful consequences for the individual and come at a significant economic cost to a community. Yet while effective evidence based prevention and treatment exists, there are a number of barriers to access, implement and disseminate. Cognitive behavior therapy programs, such as those available at www.thiswayup.com.au are widely available using the Internet in high income countries, such as Australia. With the ubiquitous uptake of Internet users globally, it is suggested that low and middle income countries should consider ways to embrace and scale up these cost effective programs. An explanation of why and some suggestions as to how this can be done are presented. Crown Copyright © 2014. Published by Elsevier B.V. All rights reserved.

  10. Mapping the availability and accessibility of healthy food in rural and urban New Zealand--Te Wai o Rona: Diabetes Prevention Strategy.

    Science.gov (United States)

    Wang, Jing; Williams, Margaret; Rush, Elaine; Crook, Nic; Forouhi, Nita G; Simmons, David

    2010-07-01

    Uptake of advice for lifestyle change for obesity and diabetes prevention requires access to affordable 'healthy' foods (high in fibre/low in sugar and fat). The present study aimed to examine the availability and accessibility of 'healthy' foods in rural and urban New Zealand. We identified and visited ('mapped') 1230 food outlets (473 urban, 757 rural) across the Waikato/Lakes areas (162 census areas within twelve regions) in New Zealand, where the Te Wai O Rona: Diabetes Prevention Strategy was underway. At each site, we assessed the availability of 'healthy' foods (e.g. wholemeal bread) and compared their cost with those of comparable 'regular' foods (e.g. white bread). Healthy foods were generally more available in urban than rural areas. In both urban and rural areas, 'healthy' foods were more expensive than 'regular' foods after adjusting for the population and income level of each area. For instance, there was an increasing price difference across bread, meat, poultry, with the highest difference for sugar substitutes. The weekly family cost of a 'healthy' food basket (without sugar) was 29.1% more expensive than the 'regular' basket ($NZ 176.72 v. $NZ 136.84). The difference between the 'healthy' and 'regular' basket was greater in urban ($NZ 49.18) than rural areas ($NZ 36.27) in adjusted analysis. 'Healthy' foods were more expensive than 'regular' choices in both urban and rural areas. Although urban areas had higher availability of 'healthy' foods, the cost of changing to a healthy diet in urban areas was also greater. Improvement in the food environment is needed to support people in adopting healthy food choices.

  11. Use of next generation sequencing data to develop a qPCR method for specific detection of EU-unauthorized genetically modified Bacillus subtilis overproducing riboflavin.

    Science.gov (United States)

    Barbau-Piednoir, Elodie; De Keersmaecker, Sigrid C J; Delvoye, Maud; Gau, Céline; Philipp, Patrick; Roosens, Nancy H

    2015-11-11

    Recently, the presence of an unauthorized genetically modified (GM) Bacillus subtilis bacterium overproducing vitamin B2 in a feed additive was notified by the Rapid Alert System for Food and Feed (RASFF). This has demonstrated that a contamination by a GM micro-organism (GMM) may occur in feed additives and has confronted for the first time,the enforcement laboratories with this type of RASFF. As no sequence information of this GMM nor any specific detection or identification method was available, Next GenerationSequencing (NGS) was used to generate sequence information. However, NGS data analysis often requires appropriate tools, involving bioinformatics expertise which is not alwayspresent in the average enforcement laboratory. This hampers the use of this technology to rapidly obtain critical sequence information in order to be able to develop a specific qPCRdetection method. Data generated by NGS were exploited using a simple BLAST approach. A TaqMan® qPCR method was developed and tested on isolated bacterial strains and on the feed additive directly. In this study, a very simple strategy based on the common BLAST tools that can be used by any enforcement lab without profound bioinformatics expertise, was successfully used toanalyse the B. subtilis data generated by NGS. The results were used to design and assess a new TaqMan® qPCR method, specifically detecting this GM vitamin B2 overproducing bacterium. The method complies with EU critical performance parameters for specificity, sensitivity, PCR efficiency and repeatability. The VitB2-UGM method also could detect the B. subtilis strain in genomic DNA extracted from the feed additive, without prior culturing step. The proposed method, provides a crucial tool for specifically and rapidly identifying this unauthorized GM bacterium in food and feed additives by enforcement laboratories. Moreover, this work can be seen as a case study to substantiate how the use of NGS data can offer an added value to easily

  12. Sexual Behaviors, Experiences of Sexual Violence, and Substance Use among Women Who inject Drugs: Accessing Health and Prevention Services in Puerto Rico.

    Science.gov (United States)

    Collazo-Vargas, Erika M; Dodge, Brian; Herbenick, Debby; Guerra-Reyes, Lucia; Mowatt, Rasul; Otero-Cruz, Ilia M; Rodríguez-Díaz, Carlos

    2018-06-01

    People who inject drugs (PWID) face numerous gender-specific health risks, which increase their susceptibility to adverse outcomes, including violence. There is a need for research on female PWID to capture their unique experiences and understand behavioral and gender-based differences. This study aimed to understand which drug use and sexual behaviors are the most prevalent among female PWID accessing health services in Puerto Rico and to gather preliminary information on those individuals' experiences of sexual violence. Utilizing a transformative theoretical perspective, a mixed-methods study was conducted with a sample of 90 Puerto Rican women who reported recent (past 12 months) injection drug use (IDU) This manuscript focused on Phase 1, in which participants completed an interviewer-administered survey eliciting information about sexual behaviors, drug use, experiences of sexual violence, and access to healthcare services. Phase 2 involved an in-depth interview focused on sexual health and access to healthcare services. Female PWID were found to engage in a variety of sexual behaviors throughout their lifespans and at their most recent sexual events. There were significant differences across age groups for participants, those being time of most recent sexual event (p = 0.007), partner's sex (p = 0.039), relationship with partner (p = 0.023), contraception method used (p = 0.057), and reports of partner orgasm (p = 0.055). Over half of all participants reported having experienced sexual violence in their lifetime. This study extends the literature on PWID in Puerto Rico by underscoring the diversity of female PWID sexual experiences and needs while illustrating how those experiences are often mediated by drug use. The findings highlight the need for further research on female PWID in Puerto Rico to better develop programs that include sexual violence prevention as part of future interventions for this population.

  13. Access to Difficult-to-reach Population Subgroups: A Family Midwife Based Home Visiting Service for Implementing Nutrition-related Preventive Activities - A Mixed Methods Explorative Study

    Directory of Open Access Journals (Sweden)

    Helena Walz

    2015-08-01

    Full Text Available Health and social inequality are tightly linked and still pose an important public health problem. However, vulnerable and disadvantaged populations are difficult to reach for health-related interventions. Given the long-lasting effects of an adverse, particular nutrition-related, intrauterine and neonatal environment on health development (perinatal programming, an early and easy access is essential for sustainable interventions. The goal of this explorative study was therefore to elucidate whether an existing access of family midwives (FMs to families in need of support could be an option to implement effective public health and nutrition interventions. To that end three research objectives were formulated: (1 to determine whether a discernible impact of home visits by FMs can be described; (2 to identify subgroups among these families in need of more specific interventions; (3 to determine how relevant nutrition-related topics are for both FMs and the supported families. For addressing these objectives a mixed methods design was used: Routine documentation data from 295 families visited by a family midwife (FM were analyzed (secondary analysis, and structured expert interviews with FMs were conducted and analyzed. Study reporting followed the STROBE (STrengthening the Reporting of OBservational studies in Epidemiology statement. Based on the FMs reports, a significant improvement (p < 0.001 regarding psycho-social variables could be determined after the home visits. Single mothers, however, seemed to benefit less from the FMs service compared to their counterparts (p = 0.015. Nutritional counseling was demanded by 89% of the families during the home visits. In addition, nutrition-related topics were reported in the interviews to be of high interest to both families and the FMs. Based on the obtained results it is concluded that FMs home visits offer a promising access to vulnerable and disadvantaged families for implementing nutrition

  14. 12 CFR Appendix B to Part 748 - Guidance on Response Programs for Unauthorized Access to Member Information and Member Notice

    Science.gov (United States)

    2010-01-01

    ..., SUSPICIOUS TRANSACTIONS, CATASTROPHIC ACTS AND BANK SECRECY ACT COMPLIANCE Pt. 748, App. B Appendix B to Part... Catastrophic Act and Bank Secrecy Act Compliance regulation, 29 interprets section 501(b) of the Gramm-Leach... response program. 38 See FFIEC Information Technology Examination Handbook, Outsourcing Technology Services...

  15. Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services.

    Science.gov (United States)

    Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Lee, Sungyoung; Chung, Tae Choong

    2016-01-01

    Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to pre-defined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider.

  16. Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access

    Directory of Open Access Journals (Sweden)

    Sandeep Gupta

    2018-01-01

    Full Text Available Smartphones are the most popular and widespread personal devices. Apart from their conventional use, that is, calling and texting, they have also been used to perform multiple security sensitive activities, such as online banking and shopping, social networking, taking pictures, and e-mailing. On a positive side, smartphones have improved the quality of life by providing multiple services that users desire, for example, anytime-anywhere computing. However, on the other side, they also pose security and privacy threats to the users’ stored data. User authentication is the first line of defense to prevent unauthorized access to the smartphone. Several authentication schemes have been proposed over the years; however, their presentation might be perplexing to the new researchers to this domain, under the shade of several buzzwords, for example, active, continuous, implicit, static, and transparent, being introduced in academic papers without comprehensive description. Moreover, most of the reported authentication solutions were evaluated mainly in terms of accuracy, overlooking a very important aspect—the usability. This paper surveys various types and ways of authentication, designed and developed primarily to secure the access to smartphones and attempts to clarify correlated buzzwords, with the motivation to assist new researchers in understanding the gist behind those concepts. We also present the assessment of existing user authentication schemes exhibiting their security and usability issues.

  17. Mercury toxicity following unauthorized siddha medicine intake – A mimicker of acquired neuromyotonia - Report of 32 cases

    OpenAIRE

    G Gnanashanmugam; R Balakrishnan; S P Somasundaram; N Parimalam; P Rajmohan; M B Pranesh

    2018-01-01

    Context: Mercury is used extensively in the preparation of Siddha medicines, after purification. In this study, we present 32 patients of mercury toxicity following unauthorized Siddha medicine intake who mimicked neuromyotonia clinically. We analyzed the clinical features of these patients, the role of autoimmunity in etiopathology, and compared it with acquired neuromyotonia. Subjects and Methods: This is a retrospective study to analyze inpatients in a tertiary care center, admitted with m...

  18. Incidents of illicit trafficking and other unauthorized activities involving nuclear and other radioactive materials (1993-2005)

    International Nuclear Information System (INIS)

    2010-01-01

    The confirmed incidents of illicit trafficking and other unauthorized activities involving nuclear and other radioactive materials between 1993-2005 shows that, 27% involved nuclear materials, 62% radioactive materials,7% involved both nuclear and other radioactive materials while the remainder involved other radioactive and non radioactive materials.Also 80% of nuclear material which was recovered during the same period was not reported as stolen or lost.

  19. Unauthorized Immigration to the United States: Annual Estimates and Components of Change, by State, 1990 to 2010

    Science.gov (United States)

    Warren, Robert; Warren, John Robert

    2013-01-01

    We describe a method for producing annual estimates of the unauthorized immigrant population in the United Sates and components of population change, for each state and D.C., for 1990 to 2010. We quantify a sharp drop in the number of unauthorized immigrants arriving since 2000, and we demonstrate the role of departures from the population (emigration, adjustment to legal status, removal by the Department of Homeland Security (DHS), and deaths) in reducing population growth from one million in 2000 to population losses in 2008 and 2009. The number arriving in the U.S. peaked at more than one million in 1999 to 2001, and then declined rapidly through 2009. We provide evidence that population growth stopped after 2007 primarily because entries declined and not because emigration increased during the economic crisis. Our estimates of the total unauthorized immigrant population in the U.S. and in the top ten states are comparable to those produced by DHS and the Pew Hispanic Center. For the remaining states and D.C., our data and methods produce estimates with smaller ranges of sampling error. PMID:23956482

  20. The educational legacy of unauthorized migration: comparisons across U.S.-immigrant groups in how parents' status affects their offspring.

    Science.gov (United States)

    Bean, Frank D; Leach, Mark A; Brown, Susan K; Bachmeier, James D; Hipp, John R

    2011-01-01

    This research compares several national-origin groups in terms of how parents’ entry, legalization and naturalization (i.e., membership) statuses relate to their children’s educational attainment. In the case of Asian groups, the members of which predominantly come to the United States as permanent legal migrants, we hypothesize (1) that father’s and mother’s statuses will be relatively homogenous and few in number and (2) that these will exert minimal net effects on second-generation attainment. For Mexicans, many of whom initially come as temporary unauthorized migrants, we hypothesize (1) that parental status combinations will be heterogeneous and greater in number and (2) that marginal membership statuses will exert negative net effects on education in the second generation. To assess these ideas, we analyze unique intergenerational data from Los Angeles on the young adult members of second-generation national-origin groups and their parents. The findings show that Asian immigrant groups almost universally exhibit similar father–mother migration statuses and high educational attainment among children. By contrast, Mexicans manifest more numerous discrepant father–mother combinations, with those in which the mother remains unauthorized carrying negative implications for children’s schooling. The paper discusses the theoretical and policy implications of the delays in incorporation that result from Mexican Americans needing extra time and resources compared to the members of other groups to overcome their handicap of marginal membership status (i.e., being more likely to enter and remain unauthorized).

  1. Unauthorized Immigration to the United States: Annual Estimates and Components of Change, by State, 1990 to 2010.

    Science.gov (United States)

    Warren, Robert; Warren, John Robert

    2013-06-01

    We describe a method for producing annual estimates of the unauthorized immigrant population in the United Sates and components of population change, for each state and D.C., for 1990 to 2010. We quantify a sharp drop in the number of unauthorized immigrants arriving since 2000, and we demonstrate the role of departures from the population (emigration, adjustment to legal status, removal by the Department of Homeland Security (DHS), and deaths) in reducing population growth from one million in 2000 to population losses in 2008 and 2009. The number arriving in the U.S. peaked at more than one million in 1999 to 2001, and then declined rapidly through 2009. We provide evidence that population growth stopped after 2007 primarily because entries declined and not because emigration increased during the economic crisis. Our estimates of the total unauthorized immigrant population in the U.S. and in the top ten states are comparable to those produced by DHS and the Pew Hispanic Center. For the remaining states and D.C., our data and methods produce estimates with smaller ranges of sampling error.

  2. Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows

    Directory of Open Access Journals (Sweden)

    Davy Preuveneers

    2017-09-01

    Full Text Available Microservices offer a compelling competitive advantage for building data flow systems as a choreography of self-contained data endpoints that each implement a specific data processing functionality. Such a ‘single responsibility principle’ design makes them well suited for constructing scalable and flexible data integration and real-time data flow applications. In this paper, we investigate microservice based data processing workflows from a security point of view, i.e., (1 how to constrain data processing workflows with respect to dynamic authorization policies granting or denying access to certain microservice results depending on the flow of the data; (2 how to let multiple microservices contribute to a collective data-driven authorization decision and (3 how to put adequate measures in place such that the data within each individual microservice is protected against illegitimate access from unauthorized users or other microservices. Due to this multifold objective, enforcing access control on the data endpoints to prevent information leakage or preserve one’s privacy becomes far more challenging, as authorization policies can have dependencies and decision outcomes cross-cutting data in multiple microservices. To address this challenge, we present and evaluate a workflow-oriented authorization framework that enforces authorization policies in a decentralized manner and where the delegated policy evaluation leverages feature toggles that are managed at runtime by software circuit breakers to secure the distributed data processing workflows. The benefit of our solution is that, on the one hand, authorization policies restrict access to the data endpoints of the microservices, and on the other hand, microservices can safely rely on other data endpoints to collectively evaluate cross-cutting access control decisions without having to rely on a shared storage backend holding all the necessary information for the policy evaluation.

  3. Evidence of accessibility and utility of point-of-care diagnostics as an integral part of prevention of mother-to-child transmission services: systematic scoping review protocol.

    Science.gov (United States)

    Katoba, Juliet; Hangulu, Lydia; Mashamba-Thompson, Tivani Phosa

    2017-11-04

    Point-of-care (POC) testing has been shown to help improve healthcare access in resource-limited settings. However, there is paucity of evidence on accessibility of POC testing for prevention of mother-to-child transmission (PMTCT) in resource-limited settings. We propose to conduct a systematic scoping review to map the evidence on POC testing services for PMTCT. A scoping review framework, proposed by Arksey and O'Malley, will guide the study. A comprehensive literature search will be performed in the following electronic databases: PubMed, Science Direct, Cochrane Central, Google Scholar and databases within EBSCOhost (Medline and CINAHL). The primary research articles published in peer-reviewed journals and grey articles addressing our question will be included. One reviewer will conduct title screening and the results will be exported to endnote library. Two independent reviewers will perform abstract, then full article screening in parallel. The same process shall be employed to extract data from eligible studies. Data analysis will involve a narrative summary of included studies and thematic content analysis aided by NVIVO software V.11. The mixed methods assessment tool will be used to assess the quality of studies that will be included. Ethical approval is not applicable to this study. The study findings will be disseminated through publication in a peer-reviewed journal and presentations at conferences related to syphilis, HIV, PMTCT, bacterial infections and POC diagnostics. CRD42017056267. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  4. 14 CFR 1213.106 - Preventing release of classified information to the media.

    Science.gov (United States)

    2010-01-01

    ... ADMINISTRATION RELEASE OF INFORMATION TO NEWS AND INFORMATION MEDIA § 1213.106 Preventing release of classified... interviews, audio/visual) to the news media is prohibited. The disclosure of classified information to unauthorized individuals may be cause for prosecution and/or disciplinary action against the NASA employee...

  5. Preventing AVF thrombosis: the rationale and design of the Omega-3 fatty acids (Fish Oils and Aspirin in Vascular access OUtcomes in REnal Disease (FAVOURED study

    Directory of Open Access Journals (Sweden)

    Rosman Johan

    2009-01-01

    Full Text Available Abstract Background Haemodialysis (HD is critically dependent on the availability of adequate access to the systemic circulation, ideally via a native arteriovenous fistula (AVF. The Primary failure rate of an AVF ranges between 20–54%, due to thrombosis or failure of maturation. There remains limited evidence for the use of anti-platelet agents and uncertainty as to choice of agent(s for the prevention of AVF thrombosis. We present the study protocol for a randomised, double-blind, placebo-controlled, clinical trial examining whether the use of the anti-platelet agents, aspirin and omega-3 fatty acids, either alone or in combination, will effectively reduce the risk of early thrombosis in de novo AVF. Methods/Design The study population is adult patients with stage IV or V chronic kidney disease (CKD currently on HD or where HD is planned to start within 6 months in whom a planned upper or lower arm AVF is to be the primary HD access. Using a factorial-design trial, patients will be randomised to aspirin or matching placebo, and also to omega-3 fatty acids or matching placebo, resulting in four treatment groups (aspirin placebo/omega-3 fatty acid placebo, aspirin/omega-3 fatty acid placebo, aspirin placebo/omega-3 fatty acid, aspirin/omega-3 fatty acid. Randomisation will be achieved using a dynamic balancing method over the two stratification factors of study site and upper versus lower arm AVF. The medication will be commenced pre-operatively and continued for 3 months post surgery. The primary outcome is patency of the AVF at three months after randomisation. Secondary outcome measures will include functional patency at six and twelve months, primary patency time, secondary (assisted patency time, and adverse events, particularly bleeding. Discussion This multicentre Australian and New Zealand study has been designed to determine whether the outcome of surgery to create de novo AVF can be improved by the use of aspirin and/or omega-3 fatty

  6. Preventing AVF thrombosis: the rationale and design of the Omega-3 fatty acids (Fish Oils) and Aspirin in Vascular access OUtcomes in REnal Disease (FAVOURED) study.

    Science.gov (United States)

    Irish, Ashley; Dogra, Gursharan; Mori, Trevor; Beller, Elaine; Heritier, Stephane; Hawley, Carmel; Kerr, Peter; Robertson, Amanda; Rosman, Johan; Paul-Brent, Peta-Anne; Starfield, Melissa; Polkinghorne, Kevan; Cass, Alan

    2009-01-21

    Haemodialysis (HD) is critically dependent on the availability of adequate access to the systemic circulation, ideally via a native arteriovenous fistula (AVF). The Primary failure rate of an AVF ranges between 20-54%, due to thrombosis or failure of maturation. There remains limited evidence for the use of anti-platelet agents and uncertainty as to choice of agent(s) for the prevention of AVF thrombosis. We present the study protocol for a randomised, double-blind, placebo-controlled, clinical trial examining whether the use of the anti-platelet agents, aspirin and omega-3 fatty acids, either alone or in combination, will effectively reduce the risk of early thrombosis in de novo AVF. The study population is adult patients with stage IV or V chronic kidney disease (CKD) currently on HD or where HD is planned to start within 6 months in whom a planned upper or lower arm AVF is to be the primary HD access. Using a factorial-design trial, patients will be randomised to aspirin or matching placebo, and also to omega-3 fatty acids or matching placebo, resulting in four treatment groups (aspirin placebo/omega-3 fatty acid placebo, aspirin/omega-3 fatty acid placebo, aspirin placebo/omega-3 fatty acid, aspirin/omega-3 fatty acid). Randomisation will be achieved using a dynamic balancing method over the two stratification factors of study site and upper versus lower arm AVF. The medication will be commenced pre-operatively and continued for 3 months post surgery. The primary outcome is patency of the AVF at three months after randomisation. Secondary outcome measures will include functional patency at six and twelve months, primary patency time, secondary (assisted) patency time, and adverse events, particularly bleeding. This multicentre Australian and New Zealand study has been designed to determine whether the outcome of surgery to create de novo AVF can be improved by the use of aspirin and/or omega-3 fatty acids. Recently a placebo-controlled trial has shown that

  7. Georgia's Medicaid Family Planning Waiver: Working Together with Title X to Enhance Access to and Use of Contraceptive and Preventive Health Services.

    Science.gov (United States)

    Dunlop, Anne L; Adams, Esther Kathleen; Hawley, Jonathan; Blake, Sarah C; Joski, Peter

    We sought to assess the impact of Georgia's family planning demonstration waiver upon access to and use of contraceptive and preventive health services within Title X and Medicaid. Georgia Title X and Medicaid data for January 2009 through December 2013 (before and after the waiver), restricting Title X data to women targeted by the waiver (18-44 years, incomes from 25% and 50% through 200% of the federal poverty level [FPL]) was assembled by quarter and marginal effects of the changes before and after waiver implementation were derived using multivariate regression models. After implementation, there was a significant increase in the probability of Title X clients in the waiver-targeted age and income ranges who had Medicaid versus no insurance and who exited the encounter with higher effectiveness contraceptive methods, including long-acting reversible contraceptives (LARCs), and with cervical cytology and sexually transmitted infection testing. In the Medicaid data from 2009 to 2013, there was an increase in the mean number of encounters per enrollee (2.19 vs. 2.42) and in LARC users; however, the percentage of all Georgia women living under 200% of the FPL with a family planning encounter in Title X and Medicaid decreased from 19% to 15%. Our findings suggest that implementation of the Georgia family planning demonstration waiver contributed to the increased use of higher effectiveness contraceptive methods, including LARCs, within the Medicaid and Title X programs as well as the increased use of preventive screenings among Title X clients. However, when the full population of low-income Georgia women targeted by the waiver was considered, a greater percentage was not served over the demonstration period. Copyright © 2016 Jacobs Institute of Women's Health. Published by Elsevier Inc. All rights reserved.

  8. Evolving trade policy and the Trans-Pacific Partnership Agreement: does it threaten Vietnam's access to medicine and its progress towards scaling up HIV prevention, treatment and care?

    Science.gov (United States)

    Linh, Nguyen Nhat; Huong, Nguyen Thanh; Thuy, Hua Thanh

    2015-01-01

    The Trans-Pacific Partnership Agreement (TPP) has undergone 18 rounds of secretive negotiation between the USA and 11 Asia-Pacific countries. Aiming at a free trade area, this multilateral trade proposal covers all aspects of commercial relations among the countries involved. Despite some anticipated positive impacts in trade, specific articles in this proposal's intellectual property and transparency chapters might negatively impact access to medicine, in general, and to antiretroviral (ARV) drugs, in particular, in Vietnam. Drawing on a desk review and qualitative in-depth interviews with 20 key informants from government, academia, hospitals and civil society, we analyse various provisions of the proposal being negotiated leaked after the 14th round of negotiations in September 2012. Findings suggest that the TPP could lead to increased monopoly protection and could limit technological advancements within the local pharmaceutical manufacturing industry, resulting in higher medicine prices in Vietnam. This outcome would have a significant impact on Vietnam's ability to achieve goals for HIV prevention, treatment and care, and create barriers to universal health-care coverage. This research provides unique evidence for Vietnam to advocate for more equitable pharmaceutical provisions in and to raise awareness of the implications of the TPP among the pharmaceutical stakeholder community in Vietnam.

  9. 14 CFR 1213.107 - Preventing unauthorized release of sensitive but unclassified (SBU) information/material to the...

    Science.gov (United States)

    2010-01-01

    .../material to the news media. (a) All NASA SBU information requires accountability and approval for release... sensitive but unclassified (SBU) information/material to the news media. 1213.107 Section 1213.107 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION RELEASE OF INFORMATION TO NEWS AND...

  10. Factors affecting the delivery, access, and use of interventions to prevent malaria in pregnancy in sub-Saharan Africa: a systematic review and meta-analysis.

    Science.gov (United States)

    Hill, Jenny; Hoyt, Jenna; van Eijk, Anna Maria; D'Mello-Guyett, Lauren; Ter Kuile, Feiko O; Steketee, Rick; Smith, Helen; Webster, Jayne

    2013-01-01

    Malaria in pregnancy has important consequences for mother and baby. Coverage with the World Health Organization-recommended prevention strategy for pregnant women in sub-Saharan Africa of intermittent preventive treatment in pregnancy (IPTp) and insecticide-treated nets (ITNs) is low. We conducted a systematic review to explore factors affecting delivery, access, and use of IPTp and ITNs among healthcare providers and women. We searched the Malaria in Pregnancy Library and Global Health Database from 1 January 1990 to 23 April 2013, without language restriction. Data extraction was performed by two investigators independently, and data was appraised for quality and content. Data on barriers and facilitators, and the effect of interventions, were explored using content analysis and narrative synthesis. We conducted a meta-analysis of determinants of IPTp and ITN uptake using random effects models, and performed subgroup analysis to evaluate consistency across interventions and study populations, countries, and enrolment sites. We did not perform a meta-ethnography of qualitative data. Ninety-eight articles were included, of which 20 were intervention studies. Key barriers to the provision of IPTp and ITNs were unclear policy and guidance on IPTp; general healthcare system issues, such as stockouts and user fees; health facility issues stemming from poor organisation, leading to poor quality of care; poor healthcare provider performance, including confusion over the timing of each IPTp dose; and women's poor antenatal attendance, affecting IPTp uptake. Key determinants of IPTp coverage were education, knowledge about malaria/IPTp, socio-economic status, parity, and number and timing of antenatal clinic visits. Key determinants of ITN coverage were employment status, education, knowledge about malaria/ITNs, age, and marital status. Predictors showed regional variations. Delivery of ITNs through antenatal clinics presents fewer problems than delivery of IPTp. Many

  11. Factors affecting the delivery, access, and use of interventions to prevent malaria in pregnancy in sub-Saharan Africa: a systematic review and meta-analysis.

    Directory of Open Access Journals (Sweden)

    Jenny Hill

    Full Text Available Malaria in pregnancy has important consequences for mother and baby. Coverage with the World Health Organization-recommended prevention strategy for pregnant women in sub-Saharan Africa of intermittent preventive treatment in pregnancy (IPTp and insecticide-treated nets (ITNs is low. We conducted a systematic review to explore factors affecting delivery, access, and use of IPTp and ITNs among healthcare providers and women.We searched the Malaria in Pregnancy Library and Global Health Database from 1 January 1990 to 23 April 2013, without language restriction. Data extraction was performed by two investigators independently, and data was appraised for quality and content. Data on barriers and facilitators, and the effect of interventions, were explored using content analysis and narrative synthesis. We conducted a meta-analysis of determinants of IPTp and ITN uptake using random effects models, and performed subgroup analysis to evaluate consistency across interventions and study populations, countries, and enrolment sites. We did not perform a meta-ethnography of qualitative data. Ninety-eight articles were included, of which 20 were intervention studies. Key barriers to the provision of IPTp and ITNs were unclear policy and guidance on IPTp; general healthcare system issues, such as stockouts and user fees; health facility issues stemming from poor organisation, leading to poor quality of care; poor healthcare provider performance, including confusion over the timing of each IPTp dose; and women's poor antenatal attendance, affecting IPTp uptake. Key determinants of IPTp coverage were education, knowledge about malaria/IPTp, socio-economic status, parity, and number and timing of antenatal clinic visits. Key determinants of ITN coverage were employment status, education, knowledge about malaria/ITNs, age, and marital status. Predictors showed regional variations.Delivery of ITNs through antenatal clinics presents fewer problems than delivery

  12. Inspection report of unauthorized possession and use of unsealed americium-241 and subsequent confiscation, J.C. Haynes Company, Newark, Ohio

    International Nuclear Information System (INIS)

    1985-11-01

    This US Nuclear Regulatory Commission report documents the circumstances surrounding the March 26, 1985, confiscation and subsequent decontamination activities related to the use of unauthorized quantities of americium-241 at the John C. Haynes Company (licensee) of Newark, Ohio. It focuses on the period from early February to July 26, 1985. The incident started when NRC Region III recieved information that John C. Haynes possessed unauthorized quantities of americium-241 and was conducting unauthorized activities (diamond irradiation). By July 26, 1985, the decontamination activities at the licensee's laboratory were concluded. The licensee's actions with diamond irradiation resulted in contamination in restricted and unrestricted areas of the facility. The confiscation and decontamination activities required the combined efforts of NRC, Federal Bureau of Investigation, US Department of Energy, Oak Ridge Associated Universities, the State of Ohio, and the US Environmental Protection Agency. The report describes the factual information and significant findings associated with the confiscation and decontamination activities

  13. Assessment of policy and access to HIV prevention, care, and treatment services for men who have sex with men and for sex workers in Burkina Faso and Togo.

    Science.gov (United States)

    Duvall, Sandra; Irani, Laili; Compaoré, Cyrille; Sanon, Patrice; Bassonon, Dieudonne; Anato, Simplice; Agounke, Jeannine; Hodo, Ama; Kugbe, Yves; Chaold, Gertrude; Nigobora, Berry; MacInnis, Ron

    2015-03-01

    In Burkina Faso and Togo, key populations of men who have sex with men (MSM) and sex workers (SW) have a disproportionately higher HIV prevalence. This study analyzed the 2 countries' policies impacting MSM and SW; to what extent the policies and programs have been implemented; and the role of the enabling environment, country leadership, and donor support. The Health Policy Project's Policy Assessment and Advocacy Decision Model methodology was used to analyze policy and program documents related to key populations, conduct key informant interviews, and hold stakeholder meetings to validate the findings. Several policy barriers restrict MSM/SW from accessing services. Laws criminalizing MSM/SW, particularly anti-solicitation laws, result in harassment and arrests of even nonsoliciting MSM/SW. Policy gaps exist, including few MSM/SW-supportive policies and HIV prevention measures, e.g., lubricant not included in the essential medicines list. The needs of key populations are generally not met due to policy gaps around MSM/SW participation in decision-making and funding allocation for MSM/SW-specific programming. Misaligned policies, eg, contradictory informed consent laws and protocols, and uneven policy implementation, such as stockouts of sexually transmitted infection kits, HIV testing materials, and antiretrovirals, undermine evidence-based policies. Even in the presence of a supportive donor and political community, public stigma and discrimination (S&D) create a hostile enabling environment. Policies are needed to address S&D, particularly health care provider and law enforcement training, and to authorize, fund, guide, and monitor services for key populations. MSM/SW participation and development of operational guidelines can improve policy implementation and service uptake.

  14. Issues With Access to Acquisition Data and Information in the Department of Defense

    Science.gov (United States)

    2017-01-01

    retailers scored 670 (Sternstein, 2015).1 One way that enterprises, and possibly DoD, can deal with collecting, storing , accessing, and sharing an...intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to...management strategy.2 Data warehouses store vast quantities of structured data using a multidimensional approach but do not allow data quality

  15. Cannabis for therapeutic purposes: patient characteristics, access, and reasons for use.

    Science.gov (United States)

    Walsh, Zach; Callaway, Robert; Belle-Isle, Lynne; Capler, Rielle; Kay, Robert; Lucas, Philippe; Holtzman, Susan

    2013-11-01

    The authorized and unauthorized use of cannabis for therapeutic purposes (CTP) has increased dramatically in recent years, and physicians have called for further research to better clarify the parameters of effective and appropriate use. We report findings from a large cross-sectional study of the use of CTP in Canada and compare use across medical conditions and across authorized and unauthorized users. We examined cannabis use history, medical conditions and symptoms, patterns of current use of CTP, modes of access and perceived effectiveness among 628 self-selected Canadians consumers of CTP. Participants were recruited from medical cannabis dispensaries and from organizations that assist users of CTP. Patients reported using cannabis to treat multiple symptoms, with sleep, pain, and anxiety being the most common. Cannabis was perceived to provide effective symptoms relief across medical conditions. Patterns of use were also consistent across medical conditions. Notable differences were observed with regard to modes of access. Across medical conditions respondents reported using cannabis to effectively address diverse symptoms. Results indicate a substantial disconnect between the therapeutic use of cannabis and research on the risks and benefits of such use; particularly with regard to the anxiolytic and sedative use of cannabis. Authorized and unauthorized users exhibited few meaningful differences with regard to medical conditions and patterns of use, but faced substantial differences regarding access. Copyright © 2013 Elsevier B.V. All rights reserved.

  16. On the performance of shared access control strategy for femtocells

    KAUST Repository

    Magableh, Amer M.

    2013-02-18

    Femtocells can be employed in cellular systems to enhance the indoor coverage, especially in the areas with high capacity growing demands and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named as shared access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to improve and enhance the system performance. The system model considers a femtocell that is equipped with a total of N separated antennas or channels to multiplex independent traffic. Then, a set of N1 channels is used for closed access only by the authorized users, and the remaining set of channel resources can be used for open access by either authorized or unauthorized users upon their demands and spatial locations. For this system model, we obtain the signal-to-interference ratio characteristics, such as the distribution and the moment generating function, in closed forms for two fading models of indoor and outdoor environments. The signal-tointerference ratio statistics are then used to derive some important performance measures of the proposed SAP in closed form, such as the average bit error rate, outage probability, and average channel capacity for the two fading models under consideration. Numerical results for the obtained expressions are provided and supported by Monte Carlo simulations to validate the analytical development and study the effectiveness of the proposed SAP under different conditions. Copyright © 2012 John Wiley and Sons, Ltd.

  17. Fine-Grained Access Control for Electronic Health Record Systems

    Science.gov (United States)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  18. Observations on physical protection methods for protecting against unauthorized acts by an insider

    International Nuclear Information System (INIS)

    Ericson, D.M.; Goldman, L.A.; Lobner, R.R.

    1983-01-01

    Two basic approaches have evolved over the past several years for physical protection against sabotage by insiders. One, area-type physical protection, involves the use of access controls at area boundaries. Current practices at nuclear power plants generally fall into this category. The second, component-level physical protection, involves hardware at individual components as well as access controls at the boundary. The area-type physical protection concepts include team, area, and operational zoning. Team zoning requires the formation of multiperson teams that must be used to gain access to vital areas. Area zoning divides the plant into two or more zones, each of which is operated and maintained by separate, dedicated teams. Operational zoning is a closed-loop access control system that permits an initial vital area access, but blocks access to certain other vital areas until the operability of equipment in the first area is verified by test or inspection. Component-level physical protection is also a closed-loop system in which both area and component access are monitored. Each of the above measures can provide effective protection against an insider in certain instances, but each has weaknesses that must be recognized. An approach for protection against the insider is to take the most promising features of each of the above physical protection measures and supplement these capabilities with damage control and design changes as appropriate for a particular plant

  19. Standards and Access.

    Science.gov (United States)

    Fox, Tom

    1993-01-01

    Argues that easy claims about the relationship between language mastery and academic or economic access (made by both conservative commentators on education and mainstream writing teachers) are false and obscure real social and political boundaries, such as racism, sexism, elitism, and homophobia, that really do prevent access. (SR)

  20. Factors affecting the delivery, access, and use of interventions to prevent malaria in pregnancy in sub-Saharan Africa: a systematic review and meta-analysis

    NARCIS (Netherlands)

    Hill, Jenny; Hoyt, Jenna; van Eijk, Anna Maria; D'Mello-Guyett, Lauren; ter Kuile, Feiko O.; Steketee, Rick; Smith, Helen; Webster, Jayne

    2013-01-01

    Malaria in pregnancy has important consequences for mother and baby. Coverage with the World Health Organization-recommended prevention strategy for pregnant women in sub-Saharan Africa of intermittent preventive treatment in pregnancy (IPTp) and insecticide-treated nets (ITNs) is low. We conducted

  1. Barriers to Access and Adoption of Pre-Exposure Prophylaxis for the Prevention of HIV Among Men Who Have Sex With Men (MSM) in a Relatively Rural State.

    Science.gov (United States)

    Hubach, Randolph D; Currin, Joseph M; Sanders, Carissa A; Durham, André R; Kavanaugh, Katherine E; Wheeler, Denna L; Croff, Julie M

    2017-08-01

    Biomedical intervention approaches, including antiretroviral pre-exposure prophylaxis (PrEP), have been demonstrated to reduce HIV incidence among several at-risk populations and to be cost effective. However, there is limited understanding of PrEP access and uptake among men who have sex with men (MSM) residing in relatively rural states. Twenty semistructured interviews were conducted (August-November 2016) to assess opinions of and perceived barriers to accessing and adopting PrEP among MSM residing in Oklahoma. Participants perceived substantial barriers to accessing PrEP including a stigmatizing environment and less access to quality, LGBT-sensitive medical care. Overall, geographic isolation limits access to health providers and resources that support sexual health for Oklahoma MSM. Addressing stigma situated across ecological levels in an effort to increase adoption of PrEP by MSM residing in rural states remains necessary. Without this, social determinants may continue to negatively influence PrEP adoption and sexual health outcomes.

  2. Access to Anti-smoking Information among School Children and its Potential Impact on Preventing Smoking Initiation: Results from the Global Youth Tobacco Use Survey (GYTS) 2014 in Viet Nam.

    Science.gov (United States)

    Minh, Hoang Van; Minh, Hoang Van; Giang, Kim Bao; Hai, Phan Thi; Hoang, Trinh Dinh; Huyen, Doan Thu; Khue, Luong Ngoc; Linh, Nguyen Thuy; Lam, Nguyen Tuan; Nga, Pham Thi Quynh

    2016-01-01

    Scientific evidence on all aspects of smoking amongst youth is very important for designing appropriate interventions to reduce smoking among this vulnerable population. This paper describes current access to antismoking information among school children aged 13 to 15 years in Vietnam in 2014 and examines its potential impact on preventing smoking initiation. The data used in this paper were obtained from the 2014 Global Youth Tobacco Survey (GYTS) in Vietnam. Students were asked questions about their level of awareness of anti-smoking information from various sources in the past 30 days and about lessons in school regarding the dangers of tobacco use during the last 12 months. Those who have never smoked were asked "whether or not they thought about avoiding cigarettes because of health warnings on cigarette packages" and answers were analyzed in combination with data on access to anti-smoking information from other sources. The prevalence of exposure to antismoking campaigns was high among school children in Viet Nam: 55.3% of current smokers reported thoughts of smoking cessation because of health warnings on cigarette packages; 60.5% of never smokers avoided initiating smoking because of the same health warnings. The potential impact of graphic health warnings to prevent school-aged children from smoking initiation would be stronger if there was concurrent access to anti-smoking programs on the dangers of tobacco use in schools. However, school education for tobacco prevention and control has not been as strong as expected. A more comprehensive school curriculum on tobacco prevention and control is recommended to reinforce antismoking messages among school children.

  3. A comparison of the effect of alcohol and povidone-iodine mixture with alcohol after povidon-iodine in prevention of vascular access inflammation in patients undergoing hemodialysis

    Directory of Open Access Journals (Sweden)

    Bazzi A

    2014-11-01

    Full Text Available Background and Objective: The quality of hemodialysis can be promoted through reducing vascular access complications in these patients. One of the crucial roles of nurses in hemodialysis wards is reducing inflammation and infection of the vascular access. This study was conducted to compare the incidence of inflammation around the vascular access area in patients undergoing hemodialysis between two antiseptic methods of alcohol after povidone-iodine and the combination of alcohol and povidone-iodine. Materials and Method: This clinical trial was performed under the supervision of Mashhad University of Medical Sciences, Iran, after gaining ethical committee approval in 2014. In the present study, 100 participants were selected by convenience sampling method and randomly divided into three groups of combination of alcohol and povidone-iodine (n = 37, alcohol after using povidone-iodine (n = 32, and control group (n = 31. In the intervention groups 1 and 2, vascular access was disinfected using a combination of alcohol and povidone-iodine and alcohol after povidone-iodine, respectively. In the control group, vascular access was disinfected using the method of the related ward. Patients were fully observed for phlebitis occurrence for 12 hemodialysis sessions (1 month. Vascular access was controlled using the Iranian Nurses Association's phlebitis criteria. Data were analyzed using chi-square, ANOVA test, and Fisher's exact test in SPSS version 16. Results: The incidence rate of inflammation in the combination of alcohol and povidone-iodine, alcohol after povidone-iodine, and control groups, respectively, were 46%, 87.9%, and 100%. The incidence rate of inflammation was significantly lower in the combination of alcohol and povidone-iodine compared to the alcohol after povidone-iodine group (P < 0.001. However, no significant differences existed between the alcohol after povidone-iodine and control group. Conclusion: The combination of alcohol and

  4. Development of a wireless protection against imitation system for identification and control of vehicle access

    Directory of Open Access Journals (Sweden)

    Aleksei A. Gavrishev

    2018-03-01

    Full Text Available This article deals with wireless systems for identification and control of vehicle access to protected objects. Known systems are considered. As a result, it has been established that one of the most promising approaches to identifying and controlling vehicle access to protected objects is the use of systems based on the "friend or foe" principle. Among these systems, there are "one-directional" and "bedirectional" identification and access control systems. "Bidirectional" systems are more preferable for questions of identification and access control. However, at present, these systems should have a reduced probability of recognizing the structure of the request and response signals because the potential attacker can easily perform unauthorized access to the radio channel of the system. On this basis, developed a wireless system identification and control vehicle access to protected objects based on the principle of "friend or foe", featuring increased protection from unauthorized access and jamming through the use of rewritable drives chaotic sequences. In addition, it’s proposed to use to identify the vehicle's RFID tag containing additional information about it. Are some specifications of the developed system (the possible frequency range of the request-response signals, the communication range, data rate, the size of the transmitted data, guidelines for choosing RFID. Also, with the help of fuzzy logic, was made the security assessment from unauthorized access request-response signals based on the system of "friend or foe", which are transferred via radio channel, developed systems and analogues. The security assessment of the developed system shows an adequate degree of protection against complex threats (view, spoofing, interception and jamming of traffic in comparison with known systems of this class. Among the main advantages of the developed system it’s necessary to mention increased security from unauthorized access and jamming

  5. Broadband Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Broadband Access. Worldwide market for broadband access $30 Billion! Over 200 million broadband subscribers worldwide! Various Competing Broadband access. Digital Subscriber line; Wireless; Optical Fiber.

  6. Barriers to access prevention of mother-to-child transmission for HIV positive women in a well-resourced setting in Vietnam

    NARCIS (Netherlands)

    Nguyen, T.A.; Oosterhoff, P.P.J.; Yen, P.N.; Wright, P.; Hardon, A.P.

    2008-01-01

    Background: According to Vietnamese policy, HIV-infected women should have access at least to HIV testing and Nevirapine prophylaxis, or where available, to adequate counselling, HIV infection staging, ARV prophylaxis, and infant formula. Many studies in high HIV prevalence settings have reported

  7. Condoms and sexual health education as evidence: impact of criminalization of in-call venues and managers on migrant sex workers access to HIV/STI prevention in a Canadian setting.

    Science.gov (United States)

    Anderson, S; Shannon, K; Li, J; Lee, Y; Chettiar, J; Goldenberg, S; Krüsi, A

    2016-11-17

    Despite a large body of evidence globally demonstrating that the criminalization of sex workers increases HIV/STI risks, we know far less about the impact of criminalization and policing of managers and in-call establishments on HIV/STI prevention among sex workers, and even less so among migrant sex workers. Analysis draws on ethnographic fieldwork and 46 qualitative interviews with migrant sex workers, managers and business owners of in-call sex work venues in Metro Vancouver, Canada. The criminalization of in-call venues and third parties explicitly limits sex workers' access to HIV/STI prevention, including manager restrictions on condoms and limited onsite access to sexual health information and HIV/STI testing. With limited labour protections and socio-cultural barriers, criminalization and policing undermine the health and human rights of migrant sex workers working in -call venues. This research supports growing evidence-based calls for decriminalization of sex work, including the removal of criminal sanctions targeting third parties and in-call venues, alongside programs and policies that better protect the working conditions of migrant sex workers as critical to HIV/STI prevention and human rights.

  8. Research priorities to achieve universal access to hepatitis C prevention, management and direct-acting antiviral treatment among people who inject drugs

    DEFF Research Database (Denmark)

    Grebely, Jason; Bruneau, Julie; Lazarus, Jeffrey V

    2017-01-01

    of HCV among PWID. The Kirby Institute, UNSW Sydney and the International Network on Hepatitis in Substance Users (INHSU) established an expert round table panel to assess current research gaps and establish future research priorities for the prevention and management of HCV among PWID. This round table......, gaps in research, and develop research priorities. Topics for discussion included the epidemiology of injecting drug use, HCV, and HIV among PWID, HCV prevention, HCV testing, linkage to HCV care and treatment, DAA treatment for HCV infection, and reinfection following successful treatment. This paper...

  9. Barriers to access prevention of mother-to-child transmission for HIV positive women in a well-resourced setting in Vietnam

    Directory of Open Access Journals (Sweden)

    Wright Pamela

    2008-04-01

    Full Text Available Abstract Background According to Vietnamese policy, HIV-infected women should have access at least to HIV testing and Nevirapine prophylaxis, or where available, to adequate counselling, HIV infection staging, ARV prophylaxis, and infant formula. Many studies in high HIV prevalence settings have reported low coverage of PMTCT services, but there have been few reports from low HIV prevalence settings, such as Asian countries. We investigated the access of HIV-infected pregnant women to PMTCT services in the well-resourced setting of the capital city, Hanoi. Methods Fifty-two HIV positive women enrolled in a self-help group in Hanoi were consulted, through in-depth interviews and bi-weekly meetings, about their experiences in accessing PMTCT services. Results Only 44% and 20% of the women had received minimal and comprehensive PMTCT services, respectively. Nine women did not receive any services. Twenty-two women received no counselling. The women reported being limited by lack of knowledge and information due to poor counselling, gaps in PMTCT services, and fear of stigma and discrimination. HIV testing was done too late for optimal interventions and poor quality of care by health staff was frequently mentioned. Conclusion In a setting where PMTCT is available, HIV-infected women and children did not receive adequate care because of barriers to accessing those services. The results suggest key improvements would be improving quality of counselling and making PMTCT guidelines available to health services. Women should receive early HIV testing with adequate counselling, safe care and prophylaxis in a positive atmosphere towards HIV-infected women.

  10. Increasing Access to Prevention of Postpartum Hemorrhage Interventions for Births in Health Facilities and at Home in Four Districts of Rwanda.

    Science.gov (United States)

    Dao, Blami; Ngabo, Fidele; Zoungrana, Jeremie; Rawlins, Barbara; Mukarugwiro, Beata; Musoni, Pascal; Favero, Rachel; MacDowell, Juliet; Eugene, Kanyamanza

    2015-12-01

    To assess coverage, acceptability, and feasibility of a program to prevent postpartum hemorrhage (PPH) at community and facility levels, a study was conducted in 60 health facilities and their catchment areas in four districts in Rwanda. A total of 220 skilled birth attendants at these facilities were trained to provide active management of the third stage of labor and 1994 community health workers (ASMs) were trained to distribute misoprostol at home births. A total of 4,074 pregnant women were enrolled in the program (20.5% of estimated deliveries). Overall uterotonic coverage was 82.5%: 85% of women who delivered at a facility received a uterotonic to prevent PPH; 76% of women reached at home at the time of birth by an ASM ingested misoprostol--a 44.3% coverage rate. Administration of misoprostol at the time of birth for home births achieved moderate uterotonic coverage. Advancing the distribution of misoprostol through antenatal care services could further increase coverage.

  11. Research priorities to achieve universal access to hepatitis C prevention, management and direct-acting antiviral treatment among people who inject drugs.

    Science.gov (United States)

    Grebely, Jason; Bruneau, Julie; Lazarus, Jeffrey V; Dalgard, Olav; Bruggmann, Philip; Treloar, Carla; Hickman, Matthew; Hellard, Margaret; Roberts, Teri; Crooks, Levinia; Midgard, Håvard; Larney, Sarah; Degenhardt, Louisa; Alho, Hannu; Byrne, Jude; Dillon, John F; Feld, Jordan J; Foster, Graham; Goldberg, David; Lloyd, Andrew R; Reimer, Jens; Robaeys, Geert; Torrens, Marta; Wright, Nat; Maremmani, Icro; Norton, Brianna L; Litwin, Alain H; Dore, Gregory J

    2017-09-01

    Globally, it is estimated that 71.1 million people have chronic hepatitis C virus (HCV) infection, including an estimated 7.5 million people who have recently injected drugs (PWID). There is an additional large, but unquantified, burden among those PWID who have ceased injecting. The incidence of HCV infection among current PWID also remains high in many settings. Morbidity and mortality due to liver disease among PWID with HCV infection continues to increase, despite the advent of well-tolerated, simple interferon-free direct-acting antiviral (DAA) HCV regimens with cure rates >95%. As a result of this important clinical breakthrough, there is potential to reverse the rising burden of advanced liver disease with increased treatment and strive for HCV elimination among PWID. Unfortunately, there are many gaps in knowledge that represent barriers to effective prevention and management of HCV among PWID. The Kirby Institute, UNSW Sydney and the International Network on Hepatitis in Substance Users (INHSU) established an expert round table panel to assess current research gaps and establish future research priorities for the prevention and management of HCV among PWID. This round table consisted of a one-day workshop held on 6 September, 2016, in Oslo, Norway, prior to the International Symposium on Hepatitis in Substance Users (INHSU 2016). International experts in drug and alcohol, infectious diseases, and hepatology were brought together to discuss the available scientific evidence, gaps in research, and develop research priorities. Topics for discussion included the epidemiology of injecting drug use, HCV, and HIV among PWID, HCV prevention, HCV testing, linkage to HCV care and treatment, DAA treatment for HCV infection, and reinfection following successful treatment. This paper highlights the outcomes of the roundtable discussion focused on future research priorities for enhancing HCV prevention, testing, linkage to care and DAA treatment for PWID as we strive

  12. Ensuring safe access to medication for palliative care while preventing prescription drug abuse: innovations for American inner cities, rural areas, and communities overwhelmed by addiction

    Directory of Open Access Journals (Sweden)

    Francoeur RB

    2011-09-01

    Full Text Available Richard B FrancoeurSchool of Social Work, Adelphi University, Garden City, NY, USA; Center for the Psychosocial Study of Health and Illness, Columbia University, New York, NY, USAAbstract: This article proposes and develops novel components of community-oriented programs for creating and affording access to safe medication dispensing centers in existing retail pharmacies and in permanent or travelling pharmacy clinics that are guarded by assigned or off-duty police officers. Pharmacists at these centers would work with police, medical providers, social workers, hospital administrators, and other professionals in: planning and overseeing the safe storage of controlled substance medications in off-site community safe-deposit boxes; strengthening communication and cooperation with the prescribing medical provider; assisting the prescribing medical provider in patient monitoring (checking the state prescription registry, providing pill counts and urine samples; expanding access to lower-cost, and in some cases, abuse-resistant formulations of controlled substance medications; improving transportation access for underserved patients and caregivers to obtain prescriptions; and integrating community agencies and social networks as resources for patient support and monitoring. Novel components of two related community-oriented programs, which may be hosted outside of safe medication dispensing centers, are also suggested and described: (1 developing medication purchasing cooperatives (ie, to help patients, families, and health institutions afford the costs of medications, including tamper- or abuse-resistant/deterrent drug formulations; and (2 expanding the role of inner-city methadone maintenance treatment programs in palliative care (ie, to provide additional patient monitoring from a second treatment team focusing on narcotics addiction, and potentially, to serve as an untapped source of opioid medication for pain that is less subject to abuse

  13. Ensuring safe access to medication for palliative care while preventing prescription drug abuse: innovations for American inner cities, rural areas, and communities overwhelmed by addiction.

    Science.gov (United States)

    Francoeur, Richard B

    2011-01-01

    This article proposes and develops novel components of community-oriented programs for creating and affording access to safe medication dispensing centers in existing retail pharmacies and in permanent or travelling pharmacy clinics that are guarded by assigned or off-duty police officers. Pharmacists at these centers would work with police, medical providers, social workers, hospital administrators, and other professionals in: planning and overseeing the safe storage of controlled substance medications in off-site community safe-deposit boxes; strengthening communication and cooperation with the prescribing medical provider; assisting the prescribing medical provider in patient monitoring (checking the state prescription registry, providing pill counts and urine samples); expanding access to lower-cost, and in some cases, abuse-resistant formulations of controlled substance medications; improving transportation access for underserved patients and caregivers to obtain prescriptions; and integrating community agencies and social networks as resources for patient support and monitoring. Novel components of two related community-oriented programs, which may be hosted outside of safe medication dispensing centers, are also suggested and described: (1) developing medication purchasing cooperatives (ie, to help patients, families, and health institutions afford the costs of medications, including tamper-or abuse-resistant/deterrent drug formulations); and (2) expanding the role of inner-city methadone maintenance treatment programs in palliative care (ie, to provide additional patient monitoring from a second treatment team focusing on narcotics addiction, and potentially, to serve as an untapped source of opioid medication for pain that is less subject to abuse, misuse, or diversion).

  14. DETECTION OF UNAUTHORIZED CONSTRUCTION EQUIPMENT IN PIPELINE RIGHT-OF-WAYS

    International Nuclear Information System (INIS)

    James E. Huebler

    2002-01-01

    Natural gas transmission companies mark the right-of-way areas where pipelines are buried with warning signs to prevent accidental third-party damage. Nevertheless, pipelines are sometimes damaged by third-party construction equipment. A single incident can be devastating, causing death and millions of dollars of property loss. This damage could be prevented if potentially hazardous construction equipment could be detected and identified before the pipeline was damaged. The Gas Technology Institute (GTI) is developing a system to solve this problem by using an optical fiber as a distributed sensor and interrogating the fiber with an optical time domain reflectometer. Key issues are the ability to detect encroachment and the ability to discriminate among potentially hazardous and benign encroachment. The work performed in the first quarter of the project includes development of the Research Management Plan, writing a paper assessing of the state-of-the-art in encroachment and third party damage detection, and development of factors for selecting the optical fiber sensors

  15. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  16. Sustainable prevention of resource conflicts. Conflict risks for access and use of raw materials (report 1); Rohstoffkonflikte nachhaltig vermeiden. Konfliktrisiken bei Zugang und Nutzung von Rohstoffen (Teilbericht 1)

    Energy Technology Data Exchange (ETDEWEB)

    Taenzler, Dennis; Westerkamp, Meike [Adelphi Research, Berlin (Germany); Supersberger, Nikolaus; Ritthoff, Michael; Bleischwitz, Raimund [Wuppertal Institut fuer Klima, Umwelt, Energie GmbH, Wuppertal (Germany)

    2011-04-15

    Inequalities of resources ownership and the consequences of the exploitation of non-renewable resources have always caused violent conflicts of varying intensity. The resulting interdependence between conflicts on the one hand and resources on the other hand - discussed here under the term of conflict-resources nexus - is complex and requires a detailed theoretical and conceptional assessment. The risks of conflict vary as a function of the constellations of actors and the existing political, economic and social boundary conditions. These risks are often globally linked and reflect the flow of resources between consumer countries, transit countries, and producer countries. Conflicts in producer countries may endanger the supply of raw materials to consumer countries. Whether the raw material is an energetic resource like natural gas, petroleum, or coal, or a non-energetic resource like coltane or copper: There are many who demand that Germany should adapt to stronger competition and shorter supply and should also be aware of the possibility of conflicts about raw materials. This part-report of the project 'Sustainable Prevention of Resource Conflicts' presents important theoretical and conceptional considerations on the risk of conflict in the raw materials sector. On this basis, further reports will present case studies, scenarios, and preventive strategies. (orig./RHM)

  17. Open access

    NARCIS (Netherlands)

    Valkenburg, P.M.

    2015-01-01

    Open access week Van 19 tot en met 25 oktober 2015 vond wereldwijd de Open Access Week plaats. Tijdens deze week werden er over de hele wereld evenementen georganiseerd waar open access een rol speelt. Ook in Nederland zijn er diverse symposia, workshops en debatten georganiseerd zoals het debat in

  18. 28 CFR 16.51 - Security of systems of records.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Security of systems of records. 16.51... Security of systems of records. (a) Each component shall establish administrative and physical controls to prevent unauthorized access to its systems of records, to prevent unauthorized disclosure of records, and...

  19. Getting More Than You Paid For: Unauthorized "Natural" Substances in Herbal Food Supplements on EU Market.

    Science.gov (United States)

    Zovko Končić, Marijana

    2018-04-01

    As the population in the industrialized world develops preference for what is perceived as a natural and holistic way of disease treatment, the popularity and the number of food supplements on the market, including herbal ones, is experiencing an unprecedented rise. However, unlike herbal medicinal products, intended for treating or preventing disease, current legislation classifies food supplements as products intended for achieving nutritional or physiological effect and to supplement the normal diet. Accordingly, most food supplements are not to be associated with specific health claims. However, either due to the subtle suggestions by the producers or the wishful thinking of the consumers, certain pharmacological effects from food supplements are often expected. Medicinal plants included in food supplements usually do not produce dramatic and instant pharmacological effects. Therefore, in order to meet the expectation of their customers, some producers have turned to the illicit and dangerous practice of adulterating their products with synthetic adulterants, including naturally occurring molecules, having the desired activity. Such practice is prevalent in, although not limited to, food supplements intended for use as weight-loss aids, as well as for sport performance and libido enhancement. The review is focusing on naturally occurring alkaloids, phenylethanolamines, and their semi-synthetic derivatives in food supplements in the European Union as reported by the Rapid Alert System for Food and Feed. Their desired and undesired pharmacological effects, as well as the methods for their detection and quantification in food supplements, will be reviewed. Georg Thieme Verlag KG Stuttgart · New York.

  20. A simple and rapid chromatographic method to determine unauthorized basic colorants (rhodamine B, auramine O, and pararosaniline) in processed foods.

    Science.gov (United States)

    Tatebe, Chiye; Zhong, Xining; Ohtsuki, Takashi; Kubota, Hiroki; Sato, Kyoko; Akiyama, Hiroshi

    2014-09-01

    A simple and rapid high-performance liquid chromatography (HPLC) method to determine basic colorants such as pararosaniline (PA), auramine O (AO), and rhodamine B (RB) in various processed foods was developed. Linearity of the calibration curves ranged from 0.05 to 50 μg/mL for PA and 0.05-100 μg/mL for AO and RB. The detection and quantification limits (LOD and LOQ) of the basic colorants, which were evaluated as signal-to-noise ratios of 3 for LOD and 10 for LOQ, ranged from 0.0125 to 0.05 and 0.025 to 0.125 μg/g, respectively. The recoveries and relative standard deviations of three basic colorants in six processed foods, namely, chili sauce, curry paste, gochujang (hot pepper paste), tandoori chicken (roasted chicken prepared with yogurt and spices), powder soup, and shrimp powder ranged from 70.2% to 102.8% and 0.8% to 8.0%, respectively. The intraday precision of the recovery test ranged from 1.7% to 4.5%, whereas the interday precision ranged from 3.7% to 7.7%. The reported method has been successfully applied to basic colorant determination in various processed foods such as fat-based food matrices (curry paste and tandoori chicken), chili products (gochujang and chili sauce), and protein-based products (shrimp powder and powder soup). Thin layer chromatography and liquid chromatography/mass spectrometry methods for the determination of basic colorants in processed foods were also developed for rapid analysis and identification, respectively. These methods are very useful for monitoring unauthorized basic colorants in inspection centers or quarantine laboratories in many countries.

  1. Comparison of methods to monitor the distribution and impacts of unauthorized travel routes in a border park

    Science.gov (United States)

    Esque, Todd C.; Inman, Rich; Nussear, Kenneth E.; Webb, Robert; Girard, M.M.; DeGayner, J.

    2016-01-01

    The distribution and abundance of human-caused disturbances vary greatly through space and time and are cause for concern among land stewards in natural areas of the southwestern border-lands between the USA and Mexico. Human migration and border protection along the international boundary create Unauthorized Trail and Road (UTR) networks across National Park Service lands and other natural areas. UTRs may cause soil erosion and compaction, damage to vegetation and cultural resources, and may stress wildlife or impede their movements. We quantify the density and severity of UTR disturbances in relation to soils, and compare the use of previously established targeted trail assessments (hereafter — targeted assessments) against randomly placed transects to detect trail densities at Coronado National Memorial in Arizona in 2011. While trail distributions were similar between methods, targeted assessments estimated a large portion of the park to have the lowest density category (0–5 trail encounters per/km2), whereas the random transects in 2011 estimated more of the park as having the higher density categories (e.g., 15–20 encounters per km2category). Soil vulnerability categories that were assigned, a priori, based on published soil texture and composition did not accurately predict the impact of UTRs on soil, indicating that empirical methods may be better suited for identifying severity of compaction. While the estimates of UTR encounter frequencies were greater using the random transects than the targeted assessments for a relatively short period of time, it is difficult to determine whether this difference is dependent on greater cross-border activity, differences in technique, or from confounding environmental factors. Future surveys using standardized sampling techniques would increase accuracy.

  2. Access Not Denied? The Role American Localities Can Play

    Directory of Open Access Journals (Sweden)

    Helen B. Marrow

    2010-10-01

    Full Text Available San Francisco represents a unique case in the United States in that it has enacted a set of inclusive policies at the local level to increase unauthorized immigrants’ access to and utilization of health care. Based on interviews conducted with 36 primary care providers working in the city’s public safety net in 2009, I examine how this inclusive local policy environment both reinforces and constrains their aspirational views of unauthorized immigrants as morally “deserving” patients, and how it operates to help provide care to unauthorized immigrants. On one hand, this environment reinforces safety-net providers’ aspirational views by creating a more legal-status-blind environment that encourages unauthorized immigrants to come in for care, and by facilitating their abilities to offer key services to and advocate for unauthorized immigrant patients. At the same time, this environment constrains their aspirational views by operating through an institutional structure whose bureaucratic rules effectively deter some unauthorized immigrants from accessing care, and by explicitly delimiting unauthorized immigrants’ access to care to the realm of select primary medical services. These results highlight the great potential of, but also the limitations and internal dilemmas constituting, local “right to care” strategies that seek to ameliorate unauthorized immigrants’ health vulnerability in what is still a hostile U.S. federal context.En matière d’accès aux soins des immigrants illégaux, San Francisco constitue aux Etats-Unis un cas à part. La municipalité californienne a en effet voté un ensemble de politiques inclusives au niveau local visant à élargir cet accès. Sur la base d’entretiens réalisés auprès de 36 prestataires de soins primaires qui travaillaient dans le système de protection sociale de la ville en 2009, j’ai examiné d’une part la manière dont ces politiques locales inclusives renforcent et

  3. Open Access

    Science.gov (United States)

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder…

  4. Open access

    African Journals Online (AJOL)

    Prof. Dennis Ocholla

    The argument that access to information is an instrumental and individual as well as ... and Dean School of Information Studies, University of Wisconsin, Milwaukee, USA. ... to scholarly publications and can be in any digital format, including text, movies and ... language barriers, censorship, lack of access to the Internet and ...

  5. Federal Family Education Loan Information System. Weak Computer Controls Increase Risk of Unauthorized Access to Sensitive Data. Report to the Secretary of Education.

    Science.gov (United States)

    General Accounting Office, Washington, DC. Accounting and Information Management Div.

    This report presents an evaluation of the general controls over the Federal Family Education Loan Program (FFELP) information system maintained and operated by a contractor for the U.S. Department of Education (ED), which administers FFELP. The evaluation found that ED's general controls over the FFELP information system did not adequately protect…

  6. Youth access to tobacco.

    Science.gov (United States)

    Rigotti, N A

    1999-01-01

    To start smoking, young people need a supply of tobacco products. Reducing youth access to tobacco is a new approach to preventing tobacco use that has been a focus of federal, state, and local tobacco control efforts over the past decade. All 50 states ban tobacco sales to minors, but compliance is poor because laws are not enforced. Consequently, young people have little trouble obtaining tobacco products. Commercial sources of tobacco (stores and vending machines) are important for underage smokers, who often purchase their own cigarettes. Underage youths also obtain tobacco from noncommercial sources such as friends, relatives, older adolescents, and adults. Educating retailers about tobacco sales laws has not produced long-term improvement in their compliance. Active enforcement of tobacco sales laws changes retailer behavior, but whether this reduces young people's access to tobacco or their tobacco use is not clear. The effectiveness of new local, state, and federal actions that aim to reduce youth access to tobacco remains to be determined. Can enforcing tobacco sales laws reduce young people's access to tobacco? If so, will this prevent or delay the onset of their tobacco use? How will youths' sources of tobacco change as commercial sources are restricted? What are the social (noncommercial) sources of tobacco for minors and how can youths' access to tobacco from these sources be reduced? What is the impact of the new federal policies aimed at reducing youth access to tobacco? Do new state and local laws that ban youth possession or use of tobacco have a net positive or negative impact on youth attitudes, access to tobacco, or tobacco use? What is the relative effectiveness and cost-effectiveness of efforts to reduce the supply of tobacco compared to those that aim to reduce demand for tobacco? Will either work alone or are both necessary to achieve reductions in youth smoking?

  7. Access Contested

    International Development Research Centre (IDRC) Digital Library (Canada)

    Transforming Global Information and Communication Markets: The Political Economy of ... 8 Control and Resistance: Attacks on Burmese Opposition Media 153 ...... “Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet,” in Access ...

  8. Accessing memory

    Science.gov (United States)

    Yoon, Doe Hyun; Muralimanohar, Naveen; Chang, Jichuan; Ranganthan, Parthasarathy

    2017-09-26

    A disclosed example method involves performing simultaneous data accesses on at least first and second independently selectable logical sub-ranks to access first data via a wide internal data bus in a memory device. The memory device includes a translation buffer chip, memory chips in independently selectable logical sub-ranks, a narrow external data bus to connect the translation buffer chip to a memory controller, and the wide internal data bus between the translation buffer chip and the memory chips. A data access is performed on only the first independently selectable logical sub-rank to access second data via the wide internal data bus. The example method also involves locating a first portion of the first data, a second portion of the first data, and the second data on the narrow external data bus during separate data transfers.

  9. Forbidden Access

    CERN Multimedia

    C. Colloca TS/FM

    2004-01-01

    TS/FM group informs you that, for the replacement of the door of the main entrance at bldg. 500, the access will be closed to the public between 19 and 30 July 2004. Access to the Main Building complex will be assured at any time through both of the side doors and from bldg. 64. For more information, please contact 73273. C. Colloca TS/FM

  10. Access Control of Web- and Java-Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  11. Accessible Knowledge - Knowledge on Accessibility

    DEFF Research Database (Denmark)

    Kirkeby, Inge Mette

    2015-01-01

    Although serious efforts are made internationally and nationally, it is a slow process to make our physical environment accessible. In the actual design process, architects play a major role. But what kinds of knowledge, including research-based knowledge, do practicing architects make use of when...... designing accessible environments? The answer to the question is crucially important since it affects how knowledge is distributed and how accessibility can be ensured. In order to get first-hand knowledge about the design process and the sources from which they gain knowledge, 11 qualitative interviews...... were conducted with architects with experience of designing for accessibility. The analysis draws on two theoretical distinctions. The first is research-based knowledge versus knowledge used by architects. The second is context-independent knowledge versus context-dependent knowledge. The practitioners...

  12. Surveillance for Certain Health Behaviors, Chronic Diseases, and Conditions, Access to Health Care, and Use of Preventive Health Services Among States and Selected Local Areas
- Behavioral Risk Factor Surveillance System, United States, 2012.

    Science.gov (United States)

    Chowdhury, Pranesh P; Mawokomatanda, Tebitha; Xu, Fang; Gamble, Sonya; Flegel, David; Pierannunzi, Carol; Garvin, William; Town, Machell

    2016-04-29

    Chronic diseases (e.g., heart diseases, cancer, chronic lower respiratory disease, stroke, diabetes, and arthritis) and unintentional injuries are the leading causes of morbidity and mortality in the United States. Behavioral risk factors (e.g., tobacco use, poor diet, physical inactivity, excessive alcohol consumption, failure to use seat belts, and insufficient sleep) are linked to the leading causes of death. Modifying these behavioral risk factors and using preventive health services (e.g., cancer screenings and influenza and pneumococcal vaccination of adults aged ≥65 years) can substantially reduce morbidity and mortality in the U.S. Continuous monitoring of these health-risk behaviors, chronic conditions, and use of preventive services are essential to the development of health promotion strategies, intervention programs, and health policies at the state, city, and county level. January-December 2012. The Behavioral Risk Factor Surveillance System (BRFSS) is an ongoing, state-based, random-digit-dialed landline- and cellular-telephone survey of noninstitutionalized adults aged ≥18 years residing in the United States. BRFSS collects data on health-risk behaviors, chronic diseases and conditions, access to health care, and use of preventive health services related to the leading causes of death and disability. This report presents results for all 50 states, the District of Columbia, participating U.S. territories that include the Commonwealth of Puerto Rico (Puerto Rico) and Guam, 187 Metropolitan/Micropolitan Statistical Areas (MMSAs), and 210 counties (n = 475,687 survey respondents) for the year 2012. In 2012, the estimated prevalence of health-risk behaviors, chronic diseases or conditions, access to health care, and use of preventive health services substantially varied by state and territory, MMSA, and county. The following portion of the abstract lists a summary of results by selected BRFSS measures. Each set of proportions refers to the range of

  13. Preventing information inference in access control

    NARCIS (Netherlands)

    Paci, F.; Zannone, N.

    2015-01-01

    Technological innovations like social networks, personal devices and cloud computing, allow users to share and store online a huge amount of personal data. Sharing personal data online raises significant privacy concerns for users, who feel that they do not have full control over their data. A

  14. Violence Prevention, Access to Justice, and Economic ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Women and inequality in Latin America Women's economic empowerment and the reduction of violence against women have become urgent priorities in the political and social agendas of Latin American countries. This is particularly true given ... Equidad de Género: Ciudadanía, Trabajo y Familia, A.C.. Pays d' institution.

  15. Increasing Access to Prevention of Postpartum Hemorrhage ...

    African Journals Online (AJOL)

    AJRH Managing Editor

    Administration of misoprostol at the time of birth for home births achieved moderate uterotonic coverage. Advancing the distribution of misoprostol through antenatal care services could .... estimated 15% rate of refusal to participate in the.

  16. Open access

    CERN Document Server

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder consent, and many authors, musicians, filmmakers, and other creators who depend on royalties are understandably unwilling to give their consent. But for 350 years, scholars have written peer-reviewed journal articles for impact, not for money, and are free to consent to open access without losing revenue. In this concise introduction, Peter Suber tells us what open access is and isn't, how it benefits authors and readers of research, how we pay for it, how it avoids copyright problems, how it has moved from the periphery to the mainstream, and what its future may hold. Distilling a decade of Suber's influential writing and thinking about open access, this is the indispe...

  17. Access French

    CERN Document Server

    Grosz, Bernard

    2014-01-01

    Access is the major new language series designed with the needs of today's generation of students firmly in mind. Whether learning for leisure or business purposes or working towards a curriculum qualification, Access French is specially designed for adults of all ages and gives students a thorough grounding in all the skills required to understand, speak, read and write contemporary French from scratch. The coursebook consists of 10 units covering different topic areas, each of which includes Language Focus panels explaining the structures covered and a comprehensive glossary. Learning tips

  18. Gaining Access.

    Science.gov (United States)

    Wand, Sean; Thermos, Adam C.

    1998-01-01

    Explains the issues to consider before a college decides to purchase a card-access system. The benefits of automation, questions involving implementation, the criteria for technology selection, what typical card technology involves, privacy concerns, and the placement of card readers are discussed. (GR)

  19. Access control system operation

    International Nuclear Information System (INIS)

    Barnes, L.D.

    1981-06-01

    An automated method for the control and monitoring of personnel movement throughout the site was developed under contract to the Department of Energy by Allied-General Nuclear Services (AGNS) at the Barnwell Nuclear Fuel Plant (BNFP). These automated features provide strict enforcement of personnel access policy without routine patrol officer involvement. Identification methods include identification by employee ID number, identification by voice verification and identification by physical security officer verification. The ability to grant each level of access authority is distributed over the organization to prevent any single individual at any level in the organization from being capable of issuing an authorization for entry into sensitive areas. Each access event is recorded. As access events occur, the inventory of both the entered and the exited control area is updated so that a current inventory is always available for display. The system has been operated since 1979 in a development mode and many revisions have been implemented in hardware and software as areas were added to the system. Recent changes have involved the installation of backup systems and other features required to achieve a high reliability. The access control system and recent operating experience are described

  20. Knowledge and use of unauthorized HIV self-test kits among men who have sex with men in Spain, following approval of an over-the-counter self-test in the U.S: a cross-sectional study.

    Science.gov (United States)

    Koutentakis, Konstantinos; Rosales-Statkus, María Elena; Hoyos, Juan; Fernández-Balbuena, Sonia; Ruiz, Mónica; Agustí, Cristina; de la Fuente, Luis; Belza, María José

    2016-07-08

    Shortly after the approval of an over-the-counter HIV self-test in the US, we conducted a study to estimate the proportion of men who have sex with men (MSM) in Spain who knew that unauthorized HIV self-tests could be purchased online, and the proportion that had already used these tests, as well as their socio-demographic and behavioural correlates. Between September 2012 and February 2013, MSM users of gay dating websites were invited to complete an online questionnaire. We calculated estimates of the knowledge and use of unauthorized HIV self-testing and assessed the associated factors by rare event logit regression models. Among 8620 participants, 4.2 % (95 % CI:3.8-4.6) knew they could buy an unauthorized HIV self-test kit online, and 12.7 % (95 % CI:12.0-13.4) thought that such a test might exist, although they had never seen one. Only 0.7 % (95 % CI:0.5-0.9) had ever self-tested. In the multivariable analysis, knowledge of online availability of self-tests was associated with being a non-Latin American foreigner, having at least two previous HIV tests, intending to test for HIV in the next year, and knowing about U.S. approval of self-testing. Ever-use of HIV self-testing was associated with being over 34 years of age, living outside Spain during the last 12 months, and knowing about U.S. approval of self-testing. Both knowledge and use of unauthorized HIV self-testing among MSM in Spain was very low among HIV negative or untested MSM in Spain. The recent approval in the United Kingdom and France might increase the number of MSM seeking such testing and possibly using unauthorized test kits not meeting quality standards.

  1. Low knowledge and anecdotal use of unauthorized online HIV self-test kits among attendees at a street-based HIV rapid testing programme in Spain.

    Science.gov (United States)

    Belza, M José; Figueroa, Carmen; Rosales-Statkus, M Elena; Ruiz, Mónica; Vallejo, Fernando; de la Fuente, Luis

    2014-08-01

    The objectives of this study were to estimate the percentage of potential users who know that unauthorized HIV self-tests can be purchased online and the percentage of those who have already used them, and to determine socio-demographic and behavioural correlates. A self-administered questionnaire was employed to collect data from attendees at a street-based HIV testing programme. Logistic regression for rare events was performed. Of the 3340 participants, 5.3% (95% confidence interval (CI) 4.5-6.0%) had knowledge of self-tests being sold online and 7.5% (95% CI 6.6-8.5%) thought they existed but had never seen them; only 0.6% (95% CI 0.3-0.9%) had ever used one. Knowing that self-tests are sold online (odds ratio (OR) 3.6, 95% CI 2.4-5.4) and using them (OR 7.3, 95% CI 2.2-23.8) were associated with having undergone more than two previous HIV tests. Use was also associated with being neither Spanish nor Latin American (OR 3.8, 95% CI 1.2-12.0) and with having a university degree (OR 0.2, 95% CI 0.1-0.7). At the time of the study, the impact on the population of issues related to the use of unauthorized tests was very low. However, media coverage following the approval of self-testing in the USA might have changed the situation. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.

  2. Education Information Security: Improvements Made But Control Weaknesses Remain

    National Research Council Canada - National Science Library

    2001-01-01

    To assess the effectiveness of information system general controls in place to prevent unauthorized access, disclosure, and disruption to Education's primary accounting and payment system (i.e., EDCAPS...

  3. 21 CFR 1311.205 - Pharmacy application requirements.

    Science.gov (United States)

    2010-04-01

    ... memory to prevent the unauthorized access to, or use of, the private key. (v) The pharmacy application... prescription data into a database or spreadsheet that is readable and sortable. (13) The pharmacy application...

  4. CDC STATE System Tobacco Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2018. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. Legislation—Youth Access. The STATE...

  5. CDC STATE System Tobacco Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2016. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. Legislation—Youth Access. The STATE...

  6. IMPROVING ACCESS TO DRUGS

    Directory of Open Access Journals (Sweden)

    Max Joseph Herman

    2012-11-01

    Full Text Available Although essentially not all therapies need drug intervention, drugs is still an important components in health sector, either in preventive, curative, rehabilitative or promotion efforts. Hence the access to drugs is a main problem, either in international or national scale even to the smallest unit. The problem on access to drugs is very complicated and cannot be separated especially from pharmacy management problems; moreover in general from the overall lack of policy development and effective of health policy, and also the implementation process. With the policy development and effective health policy, rational drug uses, sufficient health service budget so a country can overcome the health problems. Besides infrastructures, regulations, distribution and cultural influences; the main obstacles for drug access is drugs affordability if the price of drugs is an important part and determined by many factors, especially the drug status whether is still patent orgenerics that significantly decrease cost of health cares and enhance the drugs affordability. The determination of essential drug prices in developing countries should based on equity principal so that poor people pay cheaper and could afford the essential drugs. WHO predicts two third of world population can not afford the essential drugs in which in developing countries, some are because of in efficient budget allocation in consequence of drug distribution management, including incorrect selection and allocation and also irrational uses. In part these could be overcome by enhancing performances on the allocation pharmacy needs, including the management of information system, inventory management, stock management and the distribution. Key words: access, drugs, essential drugs, generic drugs

  7. Easy Access: Auditing the System Network

    Science.gov (United States)

    Wiech, Dean

    2013-01-01

    In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online…

  8. Detecting authorized and unauthorized genetically modified organisms containing vip3A by real-time PCR and next-generation sequencing.

    Science.gov (United States)

    Liang, Chanjuan; van Dijk, Jeroen P; Scholtens, Ingrid M J; Staats, Martijn; Prins, Theo W; Voorhuijzen, Marleen M; da Silva, Andrea M; Arisi, Ana Carolina Maisonnave; den Dunnen, Johan T; Kok, Esther J

    2014-04-01

    The growing number of biotech crops with novel genetic elements increasingly complicates the detection of genetically modified organisms (GMOs) in food and feed samples using conventional screening methods. Unauthorized GMOs (UGMOs) in food and feed are currently identified through combining GMO element screening with sequencing the DNA flanking these elements. In this study, a specific and sensitive qPCR assay was developed for vip3A element detection based on the vip3Aa20 coding sequences of the recently marketed MIR162 maize and COT102 cotton. Furthermore, SiteFinding-PCR in combination with Sanger, Illumina or Pacific BioSciences (PacBio) sequencing was performed targeting the flanking DNA of the vip3Aa20 element in MIR162. De novo assembly and Basic Local Alignment Search Tool searches were used to mimic UGMO identification. PacBio data resulted in relatively long contigs in the upstream (1,326 nucleotides (nt); 95 % identity) and downstream (1,135 nt; 92 % identity) regions, whereas Illumina data resulted in two smaller contigs of 858 and 1,038 nt with higher sequence identity (>99 % identity). Both approaches outperformed Sanger sequencing, underlining the potential for next-generation sequencing in UGMO identification.

  9. Control of unauthorized transportation of nuclear and radioactive materials across state territories and borders: detection, response and decision support

    International Nuclear Information System (INIS)

    Stavrov, Andrei; Frymire, Allan; Kagan, Leonid; Karczewski, Jerzy

    2008-01-01

    A new solution to control the illicit transportation of nuclear and radioactive materials is proposed and described. This solution consists in the creation of a system of gamma and gamma-neutron radiation monitors and fundamentally new software/hardware package RAVEN (Radiation Alarm and Video Event Notification) which integrates different type monitors in a single network. The main purpose of this system is to analyze and store data coming from radiation monitors, to process these data and to help the user to interpret them. This ensures the user's correct response to all the alarms triggered by radiation monitors and indicating the presence of radioactive and/or nuclear materials in scanned objects. The developed system can integrate fixed radiation monitors that can be installed in different sites within not only one country but in different sites worldwide in a single network. The system can be adapted to the local conditions and allows the user: (i) To detect minimum quantities of special nuclear and radioactive materials (specified by the national and international requirements) by their gamma and/or neutron radiation; (ii) To acquire, store and analyze digital data and video images related to cargos with radioactive materials crossing a state border or an object limits; (iii) To make these data accessible to users at different levels ensuring effective operation of both central alarm stations (state, regional or agency center) and local alarm stations (border cross points or object limits). (author)

  10. Fishing Access Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — The Vermont Fish & Wildlife Department maintains developed fishing access areas. These sites provide public access to waters in Vermont for shore fishing...

  11. Accessibility and sensory experiences

    DEFF Research Database (Denmark)

    Ryhl, Camilla

    2010-01-01

    and accessibility. Sensory accessibility accommodates aspects of a sensory disability and describes architectural design requirements needed to ensure access to architectural experiences. In the context of architecture accessibility has become a design concept of its own. It is generally described as ensuring...... physical access to the built environment by accommodating physical disabilities. While the existing concept of accessibility ensures the physical access of everyone to a given space, sensory accessibility ensures the choice of everyone to stay and be able to participate and experience....

  12. Guidelines for prevention in psychology.

    Science.gov (United States)

    2014-04-01

    The effectiveness of prevention to enhance human functioning and reduce psychological distress has been demonstrated. From infancy through adulthood, access to preventive services and interventions is important to improve the quality of life and human functioning and reduce illness and premature death. The importance of prevention is consistent with the Patient Protection and Affordable Care Act of 2010. Even with the increased focus on prevention, psychology training programs rarely require specific courses on prevention. In particular, conceptualizations about best practices in prevention, particularly at the environmental level, are lacking. Therefore, psychologists engaged in prevention can benefit from a set of guidelines that address and inform prevention practices. Accordingly, the Guidelines for Prevention in Psychology are intended to "inform psychologists, the public, and other interested parties regarding desirable professional practices" in prevention. The Prevention Guidelines are recommended based on their potential benefits to the public and the professional practice of psychology. They support prevention as an important area of practice, research, and training for psychologists. The Guidelines give increased attention to prevention within APA, encouraging psychologists to become involved with preventive activities relevant to their area of practice. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  13. Condoms and sexual health education as evidence: impact of criminalization of in-call venues and managers on migrant sex workers access to HIV/STI prevention in a Canadian setting

    OpenAIRE

    Anderson, S.; Shannon, K.; Li, J.; Lee, Y.; Chettiar, J.; Goldenberg, S.; Kr?si, A.

    2016-01-01

    Background Despite a large body of evidence globally demonstrating that the criminalization of sex workers increases HIV/STI risks, we know far less about the impact of criminalization and policing of managers and in-call establishments on HIV/STI prevention among sex workers, and even less so among migrant sex workers. Methods Analysis draws on ethnographic fieldwork and 46 qualitative interviews with migrant sex workers, managers and business owners of in-call sex work venues in Metro Vanco...

  14. Salmonella Prevention

    Science.gov (United States)

    ... and in vegetable and fruit harvesting and packing operations may help prevent salmonellosis caused by contaminated foods. Better education of food industry workers in basic food safety and restaurant inspection procedures may prevent cross-contamination and other ...

  15. JISC Open Access Briefing Paper

    OpenAIRE

    Swan, Alma

    2005-01-01

    What Open Access is. What Open Access is not. How is Open Access provided? Open Access archives or repositories. Open Access journals. Why should authors provide Open Access to their work? Further information and resources

  16. Preventing Informal Urban Development

    DEFF Research Database (Denmark)

    Enemark, Stig; McLaren, Robin

    2008-01-01

    . This is directly linked to citizen participation in the process of land use control. Decentralisation should aim to combine responsibility for decision making with accountability for financial, social, and environmental consequences. Decentralisation requires access to appropriate quality of land information......, addresses the main issue of how to prevent informal urban development, especially through the use of adequate and sustainable means of land use control and good governance. Three key means are addressed: Decentralisation: There is a need to separate central policy/regulation making and local decision making...... in the decision making process? Legislation in itself is not enough. A cultural change within society may need to be encouraged. Again, access to participation requires access to land information. Comprehensive planning at local level supported by citizen participation should also enable establishment proper...

  17. Professional Access 2013 programming

    CERN Document Server

    Hennig, Teresa; Hepworth, George; Yudovich, Dagi (Doug)

    2013-01-01

    Authoritative and comprehensive coverage for building Access 2013 Solutions Access, the most popular database system in the world, just opened a new frontier in the Cloud. Access 2013 provides significant new features for building robust line-of-business solutions for web, client and integrated environments.  This book was written by a team of Microsoft Access MVPs, with consulting and editing by Access experts, MVPs and members of the Microsoft Access team. It gives you the information and examples to expand your areas of expertise and immediately start to develop and upgrade projects. Exp

  18. Access 2010 Programmer's Reference

    CERN Document Server

    Hennig, Teresa; Griffith, Geoffrey L

    2010-01-01

    A comprehensive guide to programming for Access 2010 and 2007. Millions of people use the Access database applications, and hundreds of thousands of developers work with Access daily. Access 2010 brings better integration with SQL Server and enhanced XML support; this Wrox guide shows developers how to take advantage of these and other improvements. With in-depth coverage of VBA, macros, and other programming methods for building Access applications, this book also provides real-world code examples to demonstrate each topic.: Access is the leading database that is used worldwide; While VBA rem

  19. Collaborative Approaches and Policy Opportunities for Accelerated Progress toward Effective Disease Prevention, Care, and Control: Using the Case of Poverty Diseases to Explore Universal Access to Affordable Health Care

    Directory of Open Access Journals (Sweden)

    Samia Laokri

    2017-08-01

    Full Text Available BackgroundThere is a massive global momentum to progress toward the sustainable development and universal health coverage goals. However, effective policies to health-care coverage can only emerge through high-quality services delivered to empowered care users by means of strong local health systems and a translational standpoint. Health policies aimed at removing user fees for a defined health-care package may fail at reaching desired results if not applied with system thinking.MethodSecondary data analysis of two country-based cost-of-illness studies was performed to gain knowledge in informed decision-making toward enhanced access to care in the context of resource-constraint settings. A scoping review was performed to map relevant experiences and evidence underpinning the defined research area, the economic burden of illness.FindingsOriginal studies reflected on catastrophic costs to patients because of care services use and related policy gaps. Poverty diseases such as tuberculosis (TB may constitute prime examples to assess the extent of effective high-priority health-care coverage. Our findings suggest that a share of the economic burden of illness can be attributed to implementation failures of health programs and supply-side features, which may highly impair attainment of the global stated goals. We attempted to define and discuss a knowledge development framework for effective policy-making and foster system levers for integrated care.DiscussionBottlenecks to effective policy persist and rely on interrelated patterns of health-care coverage. Health system performance and policy responsiveness have to do with collaborative work among all health stakeholders. Public–private mix strategies may play a role in lowering the economic burden of disease and solving some policy gaps. We reviewed possible added value and pitfalls of collaborative approaches to enhance dynamic local knowledge development and realize integration with the various

  20. Collaborative Approaches and Policy Opportunities for Accelerated Progress toward Effective Disease Prevention, Care, and Control: Using the Case of Poverty Diseases to Explore Universal Access to Affordable Health Care.

    Science.gov (United States)

    Laokri, Samia

    2017-01-01

    There is a massive global momentum to progress toward the sustainable development and universal health coverage goals. However, effective policies to health-care coverage can only emerge through high-quality services delivered to empowered care users by means of strong local health systems and a translational standpoint. Health policies aimed at removing user fees for a defined health-care package may fail at reaching desired results if not applied with system thinking. Secondary data analysis of two country-based cost-of-illness studies was performed to gain knowledge in informed decision-making toward enhanced access to care in the context of resource-constraint settings. A scoping review was performed to map relevant experiences and evidence underpinning the defined research area, the economic burden of illness. Original studies reflected on catastrophic costs to patients because of care services use and related policy gaps. Poverty diseases such as tuberculosis (TB) may constitute prime examples to assess the extent of effective high-priority health-care coverage. Our findings suggest that a share of the economic burden of illness can be attributed to implementation failures of health programs and supply-side features, which may highly impair attainment of the global stated goals. We attempted to define and discuss a knowledge development framework for effective policy-making and foster system levers for integrated care. Bottlenecks to effective policy persist and rely on interrelated patterns of health-care coverage. Health system performance and policy responsiveness have to do with collaborative work among all health stakeholders. Public-private mix strategies may play a role in lowering the economic burden of disease and solving some policy gaps. We reviewed possible added value and pitfalls of collaborative approaches to enhance dynamic local knowledge development and realize integration with the various health-care silos. Despite a large political

  1. Prevention: Exercise

    Medline Plus

    Full Text Available ... Steroid Injections Lumbar Zygapophysical (Facet) Joint Injections PREVENTION Lifestyle Choices 10 Tips for a Healthy Back Smoking Weight Patient Safety Exercise Strengthening Strengthen ...

  2. Overview: Routes to Open Access

    OpenAIRE

    Tullney, Marco; van Wezenbeek, Wilma

    2017-01-01

    Slides of an overview presentation given at a CESAER workshop on Open Access, February 2nd, 2017, in Brussels Cover major routes to more open access as discussed in the Task Force Open Science of CESAER: (national) open access strategies open access mandates open access incentives open access awareness open access publishing open access infrastructure

  3. Physical Access Control Database -

    Data.gov (United States)

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  4. Design for Accessibility

    DEFF Research Database (Denmark)

    Herriott, Richard

    2012-01-01

    A report on how nine rail builder, operators and transport designers deal with design for accessibility......A report on how nine rail builder, operators and transport designers deal with design for accessibility...

  5. Information on Open Access

    African Journals Online (AJOL)

    Open Access (OA), defined most simply, means free full text online. There are over 130 Open Access journals hosted on the AJOL website. You can find a full list of these journals here: OA journals on AJOL ...

  6. Access Customized Forms

    OpenAIRE

    Cosma Emil; Jeflea Victor

    2010-01-01

    By using Word, Excel or PowerPoint one can automate routine operations using the VBA language (Visual Basic for Applications). This language is also used in Access, allowing access to data stored in tables or queries. Thus, Access and VBA resources can be used together. Access is designed for programming forms and reports (among other things), so there won’t be found any of the VBA editor’s specific forms.

  7. Accessing Electronic Journals.

    Science.gov (United States)

    McKay, Sharon Cline

    1999-01-01

    Discusses issues librarians need to consider when providing access to electronic journals. Topics include gateways; index and abstract services; validation and pay-per-view; title selection; integration with OPACs (online public access catalogs)or Web sites; paper availability; ownership versus access; usage restrictions; and services offered…

  8. Open access and beyond

    Directory of Open Access Journals (Sweden)

    Das Chhaya

    2006-09-01

    Full Text Available Abstract Uncensored exchange of scientific results hastens progress. Open Access does not stop at the removal of price and permission barriers; still, censorship and reading disabilities, to name a few, hamper access to information. Here, we invite the scientific community and the public to discuss new methods to distribute, store and manage literature in order to achieve unfettered access to literature.

  9. Phlebitis: treatment, care and prevention.

    Science.gov (United States)

    Higginson, Ray; Parry, Andrew

    Peripheral venous catheter-associated phlebitis is caused by inflammation to the vein at a cannula access site. It can have a mechanical, chemical or infectious cause. Good practice when inserting a cannula, including appropriate choice of device and site, can help to prevent phlebitis. Good infection control techniques are also vital in preventing the condition. There are two phlebitis scoring systems, which should be used in routine practice to identify and treat early signs of the Peripheral venous cannulation

  10. Preventative Maintenance.

    Science.gov (United States)

    Migliorino, James

    Boards of education must be convinced that spending money up front for preventive maintenance will, in the long run, save districts' tax dollars. A good program of preventive maintenance can minimize disruption of service; reduce repair costs, energy consumption, and overtime; improve labor productivity and system equipment reliability; handle…

  11. An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function

    Directory of Open Access Journals (Sweden)

    Tejeshwari Thakur

    2016-01-01

    Full Text Available Wireless sensor network (WSN, a type of communication system, is normally deployed into the unattended environment where the intended user can get access to the network. The sensor nodes collect data from this environment. If the data are valuable and confidential, then security measures are needed to protect them from the unauthorized access. This situation requires an access control protocol (ACP in the design of sensor network because of sensor nodes which are vulnerable to various malicious attacks during the authentication and key establishment and the new node addition phase. In this paper, we propose a secured ACP for such WSN. This protocol is based on Elliptic Curve Discrete Log Problem (ECDLP and double trapdoor chameleon hash function which secures the WSN from malicious attacks such as node masquerading attack, replay attack, man-in-the-middle attack, and forgery attacks. Proposed ACP has a special feature known as session key security. Also, the proposed ACP is more efficient as it requires only one modular multiplication during the initialization phase.

  12. Access 2013 for dummies

    CERN Document Server

    Ulrich Fuller, Laurie

    2013-01-01

    The easy guide to Microsoft Access returns with updates on the latest version! Microsoft Access allows you to store, organize, view, analyze, and share data; the new Access 2013 release enables you to build even more powerful, custom database solutions that integrate with the web and enterprise data sources. Access 2013 For Dummies covers all the new features of the latest version of Accessand serves as an ideal reference, combining the latest Access features with the basics of building usable databases. You'll learn how to create an app from the Welcome screen, get support

  13. Pro Access 2010 Development

    CERN Document Server

    Collins, Mark

    2011-01-01

    Pro Access 2010 Development is a fundamental resource for developing business applications that take advantage of the features of Access 2010 and the many sources of data available to your business. In this book, you'll learn how to build database applications, create Web-based databases, develop macros and Visual Basic for Applications (VBA) tools for Access applications, integrate Access with SharePoint and other business systems, and much more. Using a practical, hands-on approach, this book will take you through all the facets of developing Access-based solutions, such as data modeling, co

  14. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  15. Controlling Access to Suicide Means

    Directory of Open Access Journals (Sweden)

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  16. Open Access @ DTU

    DEFF Research Database (Denmark)

    Ekstrøm, Jeannette

    Open Access is high on the agenda in Denmark and internationally. Denmark has announced a national strategy for Open Access that aims to achieve Open Access to 80% in 2017 and 100% in 2022 to peer review research articles. All public Danish funders as well as H2020 requires that all peer review...... articles that is an outcome of their funding will be Open Access. Uploading your full texts (your final author manuscript after review ) to DTU Orbit is a fundamental part of providing Open Access to your research. We are here to answer all your questions with regards to Open Access and related topics...... such as copyright, DTU Orbit, Open Access journals, APCs, Vouchers etc....

  17. The prevention access and risk taking in young people (PARTY) project protocol: a cluster randomised controlled trial of health risk screening and motivational interviewing for young people presenting to general practice.

    Science.gov (United States)

    Sanci, Lena; Grabsch, Brenda; Chondros, Patty; Shiell, Alan; Pirkis, Jane; Sawyer, Susan; Hegarty, Kelsey; Patterson, Elizabeth; Cahill, Helen; Ozer, Elizabeth; Seymour, Janelle; Patton, George

    2012-06-06

    There are growing worldwide concerns about the ability of primary health care systems to manage the major burden of illness in young people. Over two thirds of premature adult deaths result from risks that manifest in adolescence, including injury, neuropsychiatric problems and consequences of risky behaviours. One policy response is to better reorientate primary health services towards prevention and early intervention. Currently, however, there is insufficient evidence to support this recommendation for young people. This paper describes the design and implementation of a trial testing an intervention to promote psychosocial risk screening of all young people attending general practice and to respond to identified risks using motivational interviewing. clinicians' detection of risk-taking and emotional distress, young people's intention to change and reduction of risk taking. pathways to care, trust in the clinician and likelihood of returning for future visits. The design of the economic and process evaluation are not detailed in this protocol. PARTY is a cluster randomised trial recruiting 42 general practices in Victoria, Australia. Baseline measures include: youth friendly practice characteristics; practice staff's self-perceived competency in young people's care and clinicians' detection and response to risk taking behaviours and emotional distress in 14-24 year olds, attending the practice. Practices are then stratified by a social disadvantage index and billing methods and randomised. Intervention practices receive: nine hours of training and tools; feedback of their baseline data and two practice visits over six weeks. Comparison practices receive a three hour seminar in youth friendly practice only. Six weeks post-intervention, 30 consecutive young people are interviewed post-consultation from each practice and followed-up for self-reported risk taking behaviour and emotional distress three and 12 months post consultation. The PARTY trial is the

  18. The prevention access and risk taking in young people (PARTY project protocol: A cluster randomised controlled trial of health risk screening and motivational interviewing for young people presenting to general practice

    Directory of Open Access Journals (Sweden)

    Sanci Lena

    2012-06-01

    Full Text Available Abstract Background There are growing worldwide concerns about the ability of primary health care systems to manage the major burden of illness in young people. Over two thirds of premature adult deaths result from risks that manifest in adolescence, including injury, neuropsychiatric problems and consequences of risky behaviours. One policy response is to better reorientate primary health services towards prevention and early intervention. Currently, however, there is insufficient evidence to support this recommendation for young people. This paper describes the design and implementation of a trial testing an intervention to promote psychosocial risk screening of all young people attending general practice and to respond to identified risks using motivational interviewing. Main outcomes: clinicians’ detection of risk-taking and emotional distress, young people’s intention to change and reduction of risk taking. Secondary outcomes: pathways to care, trust in the clinician and likelihood of returning for future visits. The design of the economic and process evaluation are not detailed in this protocol. Methods PARTY is a cluster randomised trial recruiting 42 general practices in Victoria, Australia. Baseline measures include: youth friendly practice characteristics; practice staff’s self-perceived competency in young people’s care and clinicians’ detection and response to risk taking behaviours and emotional distress in 14–24 year olds, attending the practice. Practices are then stratified by a social disadvantage index and billing methods and randomised. Intervention practices receive: nine hours of training and tools; feedback of their baseline data and two practice visits over six weeks. Comparison practices receive a three hour seminar in youth friendly practice only. Six weeks post-intervention, 30 consecutive young people are interviewed post-consultation from each practice and followed-up for self-reported risk taking

  19. Preventive analgesia

    DEFF Research Database (Denmark)

    Dahl, Jørgen B; Kehlet, Henrik

    2011-01-01

    This paper will discuss the concepts of pre-emptive and preventive analgesia in acute and persistent postsurgical pain, based on the most recent experimental and clinical literature, with a special focus on injury-induced central sensitization and the development from acute to chronic pain. Recent...... of preventive analgesia for persistent postoperative pain are promising. However, clinicians must be aware of the demands for improved design of their clinical studies in order to get more conclusive answers regarding the different avenues for intervention. Summary: The concept of preventive analgesia is still...

  20. Prevention: Exercise

    Medline Plus

    Full Text Available ... Tips for a Healthy Back Smoking Weight Patient Safety Exercise Strengthening Strengthen Your Core! Stretching/Flexibility Aerobic ... Strength Training for the Elderly Other Back Pack Safety Pregnancy and Back Pain Preventing Osteoporosis Back Pain ...

  1. Preventing Rejection

    Science.gov (United States)

    ... After the transplant Preventing rejection Post-transplant medications Types of immunosuppressants Switching immunosuppressants Side effects Other medications Generic and brand name drugs Post-transplant tests Infections and immunity Lifestyle changes Health concerns Back to work or ...

  2. Prevent Cyberbullying

    Science.gov (United States)

    ... Tips for Teachers Report Cyberbullying Print Share Prevent Cyberbullying Be Aware of What Your Kids are Doing ... Signs a Child is Being Cyberbullied or is Cyberbullying Others Many of the warning signs that cyberbullying ...

  3. Preventing Suicide

    Science.gov (United States)

    ... protective factors listed below: Skills in problem solving, conflict resolution, and nonviolent ways of handling disputes Effective ... 2017 Page last updated: August 9, 2017 Content source: National Center for Injury Prevention and Control, Division ...

  4. Prevention: Exercise

    Medline Plus

    Full Text Available ... A SPECIALIST Prevention Strengthening Exercise Committee Exercise Committee Core Strengthening Many popular forms of exercise focus on ... acute pain, you should stop doing it. Transverse Core Strengthening This strengthens the muscles that cross from ...

  5. Prevention: Exercise

    Medline Plus

    Full Text Available ... Training for the Elderly Other Back Pack Safety Pregnancy and Back Pain Preventing Osteoporosis Back Pain Basics ... increases your back pain after five repetitions, or causes acute pain, you should stop doing it. Transverse ...

  6. Preventing accidents

    Science.gov (United States)

    2005-08-01

    As the most effective strategy for improving safety is to prevent accidents from occurring at all, the Volpe Center applies a broad range of research techniques and capabilities to determine causes and consequences of accidents and to identify, asses...

  7. Prevention: Exercise

    Medline Plus

    Full Text Available ... 10 Tips for a Healthy Back Smoking Weight Patient Safety Exercise Strengthening Strengthen Your Core! Stretching/Flexibility ... Pain Preventing Osteoporosis Back Pain Basics Book RESOURCES Patient Information Feature Articles Patient Q&A Success Stories ...

  8. Prevention: Exercise

    Medline Plus

    Full Text Available ... Preventing Osteoporosis Back Pain Basics Book RESOURCES Patient Information Feature Articles Patient Q&A Success Stories Definitions Anatomy of the Spine Definitions A-Z Spine Specialists Videos 9 ...

  9. HIV Prevention

    Centers for Disease Control (CDC) Podcasts

    2012-02-01

    Dr. Kevin Fenton, Director of CDC’s National Center for HIV/AIDS, Viral Hepatitis, STD, and TB Prevention, talks about steps people can take to protect their health from HIV.  Created: 2/1/2012 by National Center for HIV/AIDS, Viral Hepatitis, STD, and TB Prevention (NCHHSTP).   Date Released: 2/1/2012.

  10. Crime Prevention through Environmental Design

    Science.gov (United States)

    Draper, Rick; Cadzow, Emma

    2004-01-01

    Applying CPTED (Crime Prevention Through Environmental Design) strategies to schools can significantly contribute to a safer learning environment by influencing the behaviour of students and visitors. CPTED has three overlapping primary concepts that are intended to reduce opportunities for crime as well as fear of crime: access control,…

  11. Interventions for preventing and managing of skin lesions after radiation.

    Directory of Open Access Journals (Sweden)

    Eleni Bafe

    2017-12-01

    Full Text Available Introduction: Radiotherapy has a pivotal role in the fight against cancer. However 85% of patients, who undergo radiotherapy, will face moderate to severe skin reactions, for the treatment of which various local products, available in the market, are used. Aim: The aim of this systematic literature review was to investigate the prevention and treatment of these skin lesions induced by radiation. Methods: For this purpose 34 articles were collected concerning materials, approved by the FDA, for the prevention and treatment of skin damage due to radiation, preclinical factors tested in animal models, factors involved in the prevention and treatment of moist desquamation and unauthorized agents or with little information about them. Results: According to the study results, the moisturizing and hydrophilic creams, herbal preparations, gels based on hyaluronic acid, and Vitamin E, heparinoid creams and formulations based on oils appear to have a positive effect in preventing dermatitis as well as in providing symptom relief. Patches are suitable for the case of moist desquamation. Vasculotide, agent EUK-207, agent RTA 408, agent ALDH2 and the agent Celecoxib are still in the preclinical stage but may become future therapeutic targets. Conclusion: Skin reactions due to radiation remain a significant problem for patients undergoing radical treatment. However, thanks to the multitude of formulations available in the market and several clinical trials it is possible that early prevention and treatment for actinic dermatitis could be achieved. In conclusion, it is crucial that health professionals are aware of the formulations indicated and contraindicated in case of skin reactions induced by radiation and adjust the treatment for the prevention and management of skin reactions in patients receiving radiation therapy.

  12. Migrants' access to healthcare

    DEFF Research Database (Denmark)

    Norredam, Marie

    2011-01-01

    There are strong pragmatic and moral reasons for receiving societies to address access to healthcare for migrants. Receiving societies have a pragmatic interest in sustaining migrants' health to facilitate integration; they also have a moral obligation to ensure migrants' access to healthcare...... according to international human rights principles. The intention of this thesis is to increase the understanding of migrants' access to healthcare by exploring two study aims: 1) Are there differences in migrants' access to healthcare compared to that of non-migrants? (substudy I and II); and 2) Why...... are there possible differences in migrants' access to healthcare compared to that of non-migrants? (substudy III and IV). The thesis builds on different methodological approaches using both register-based retrospective cohort design, cross-sectional design and survey methods. Two different measures of access were...

  13. Poverty, Access to Health Care Services and Human Capital ...

    African Journals Online (AJOL)

    FIRST LADY

    socio-economic development because it is essential for a virile labour force ... Poverty and access to health care services are major development problems ..... including preventive, curative and palliative intervention, whether directed to.

  14. CDC STATE System E-Cigarette Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2018. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. E-Cigarette Legislation—Youth Access....

  15. CDC STATE System E-Cigarette Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2017. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. E-Cigarette Legislation—Youth Access....

  16. Access Data Analysis Cookbook

    CERN Document Server

    Bluttman, Ken

    2008-01-01

    This book offers practical recipes to solve a variety of common problems that users have with extracting Access data and performing calculations on it. Whether you use Access 2007 or an earlier version, this book will teach you new methods to query data, different ways to move data in and out of Access, how to calculate answers to financial and investment issues, how to jump beyond SQL by manipulating data with VBA, and more.

  17. Strategic Accessibility Competition

    OpenAIRE

    Bacchiega, Emanuele; Randon, Emanuela; Zirulia, Lorenzo

    2010-01-01

    We analyze the effect of competition in market-accessibility enhancement among quality-differentiated firms. Firms are located in regions with different ex-ante transport costs to reach the final market. We characterize the equilibrium of the two-stage game in which firms first invest to improve market accessibility and then compete in prices. Efforts in accessibility improvement crucially depend on the interplay between the willingness to pay for the quality premium of the median consumer an...

  18. Are PDF Documents Accessible?

    Directory of Open Access Journals (Sweden)

    Mireia Ribera Turró

    2008-09-01

    Full Text Available Adobe PDF is one of the most widely used formats in scientific communications and in administrative documents. In its latest versions it has incorporated structural tags and improvements that increase its level of accessibility. This article reviews the concept of accessibility in the reading of digital documents and evaluates the accessibility of PDF according to the most widely established standards.

  19. Open Access Monitor - DK

    DEFF Research Database (Denmark)

    Svendsen, Michael; Hansen, Lars Asger Juel; Andersen, Dorte

    2017-01-01

    Open Access Monitor - DK (OAM-DK) is a 2-year DEFF funded [DEFF.2016-0018] national project running in 2017-2018 with the aim of collecting, documenting and administrating Open Access publishing costs. OAM-DK is lead by Copenhagen University Library under the Royal Danish Library with participation...... of all Danish University Libraries. This poster presents the first results of Open Access costs related to 2015 publications at the The University of Copenhagen....

  20. Demystifying Open Access

    International Nuclear Information System (INIS)

    Mele, Salvatore

    2007-01-01

    The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

  1. OGIS Access System

    Data.gov (United States)

    National Archives and Records Administration — The OGIS Access System (OAS) provides case management, stakeholder collaboration, and public communications activities including a web presence via a web portal.

  2. Access 2013 bible

    CERN Document Server

    Alexander, Michael

    2013-01-01

    A comprehensive reference to the updated and new features of Access 2013 As the world's most popular database management tool, Access enables you to organize, present, analyze, and share data as well as build powerful database solutions. However, databases can be complex. That's why you need the expert guidance in this comprehensive reference. Access 2013 Bible helps you gain a solid understanding of database purpose, construction, and application so that whether you're new to Access or looking to upgrade to the 2013 version, this well-rounded resource provides you with a th

  3. Web Accessibility and Guidelines

    Science.gov (United States)

    Harper, Simon; Yesilada, Yeliz

    Access to, and movement around, complex online environments, of which the World Wide Web (Web) is the most popular example, has long been considered an important and major issue in the Web design and usability field. The commonly used slang phrase ‘surfing the Web’ implies rapid and free access, pointing to its importance among designers and users alike. It has also been long established that this potentially complex and difficult access is further complicated, and becomes neither rapid nor free, if the user is disabled. There are millions of people who have disabilities that affect their use of the Web. Web accessibility aims to help these people to perceive, understand, navigate, and interact with, as well as contribute to, the Web, and thereby the society in general. This accessibility is, in part, facilitated by the Web Content Accessibility Guidelines (WCAG) currently moving from version one to two. These guidelines are intended to encourage designers to make sure their sites conform to specifications, and in that conformance enable the assistive technologies of disabled users to better interact with the page content. In this way, it was hoped that accessibility could be supported. While this is in part true, guidelines do not solve all problems and the new WCAG version two guidelines are surrounded by controversy and intrigue. This chapter aims to establish the published literature related to Web accessibility and Web accessibility guidelines, and discuss limitations of the current guidelines and future directions.

  4. Family Wellness, Not HIV Prevention

    Science.gov (United States)

    Swendeman, Dallas; Flannery, Diane

    2010-01-01

    HIV exceptionalism (and disease-specific programs generally) garner both unbalanced funding and the most talented personnel, distorting local health priorities. In support of HIV exceptionalism, the successful mobilization of significant global health sector resources was not possible prior to HIV. Both sides of the debate have merits; rather than perpetuating polarization, we suggest that sustained improvements in global health require creating a prevention infrastructure to meet multiple health challenges experienced by local communities. We propose four fundamental shifts in HIV and disease prevention: (1) horizontally integrating prevention at one site locally, with priorities tailored to local health challenges and managed by local community leaders; (2) using a family wellness metaphor for services, not disease prevention; (3) implementing evidence-based prevention programs (EBPP) based on common principles, factors, and processes, rather than replication of specific programs; and (4) utilizing the expertise of private enterprise to re-design EBPP into highly attractive, engaging, and accessible experiences. PMID:19148744

  5. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  6. Cancer prevention.

    Science.gov (United States)

    Tubiana, M

    1999-01-01

    Over 70% of human cancers are associated with lifestyle and about half of cancer deaths could be prevented by relatively simple individual actions: no smoking, moderate consumption of alcohol, increased consumption of fruit and vegetables, avoidance of sunbathing, obesity and a too high consumption of saturated lipids. Most of these efforts would also markedly decrease the incidence of cardiovascular and respiratory diseases. However, the concept of prevention is currently neither well accepted nor understood by the medical community and the general public. It is often felt that it restricts freedom, imposes a choice between pleasure and duty, and that passing judgement on lifestyle is a form of intolerance. The case of tobacco illustrates the difficulties encountered by prevention, notably among adolescents. The fight against smoking requires information, a societal approach (ban on advertising, increase in price), and a reduction of the example given by adult smoking (parents, peers, teachers, physicians, TV presenters, movie stars, have a great influence on adolescents), while tobacco cessation programs must be promoted. The various approaches should be integrated into a global program of health prevention, including health education at school from 5 to 12 years of age. The efficacy of each of the global program's components should be evaluated. Misconceptions such as overestimation of the impact of pollution on health should also be corrected. Health is created and experienced by people within the setting of their daily lives, in particular during childhood. Prevention is the responsibility of individual members of the community but also of the community as a whole.

  7. Accessibility of public services

    NARCIS (Netherlands)

    Poort, J.P.; Groot, I.; Kok, L.; de Graaf, D.; Hof, B.J.F.

    2005-01-01

    The accessibility of certain products and services to all people, irrespective of their income, age, health and geographical location is considered to be of great social importance. Think for instance of health care, education, electricity, and sanitation. Accessibility can be secured in a variety

  8. Market Access and Welfare

    DEFF Research Database (Denmark)

    Raimondos-Møller, Pascalis; Woodland, Alan D.

    2015-01-01

    Well known tariff reform rules that are guaranteed to increase welfare will not necessarily increase market access, while rules that are guaranteed to increase market access will not necessarily increase welfare. The present paper proposes a new set of tariff reforms that can achieve both...

  9. 43 CFR 36.10 - Access to inholdings.

    Science.gov (United States)

    2010-10-01

    ... barriers prevent adequate and feasible access to State or private lands or valid interests in lands except across an area(s). Physical barriers include but are not limited to rugged mountain terrain, extensive... method of access would cause significant adverse impacts on natural or other values of the area and...

  10. A remark on accessibility

    International Nuclear Information System (INIS)

    Wu, Xinxing; Wang, Jianjun

    2016-01-01

    Highlights: • Obtain some characteristics of accessibility and Kato’s chaos. • Answer negatively a question in [Li R, Wang H, Zhao Y. Kato’s chaos in duopoly games. Chaos Solit Fract 2016;84:69–72]. • A dynamical system is indecomposable if and only if it is weakly transitive. - Abstract: This note obtains some characteristics of accessibility and Kato’s chaos. Applying these results, an accessible dynamical system whose product system is not accessible is constructed, giving a negative answer to a question in [Li R, Wang H, Zhao Y. Kato’s chaos in duopoly games. Chaos Solit Fract 2016;84:69–72]. Besides, it is proved that every transitive interval self-map is accessible.

  11. Prevent Pneumonia

    Centers for Disease Control (CDC) Podcasts

    2015-08-06

    CDC’s Matthew Westercamp explains what pneumonia is, its symptoms, and how to prevent it.  Created: 8/6/2015 by National Center for Immunization and Respiratory Diseases (NCIRD), Division of Bacterial Diseases (DBD), Respiratory Diseases Branch (RDB).   Date Released: 8/6/2015.

  12. Prevention: Exercise

    Medline Plus

    Full Text Available ... Information Feature Articles Patient Q&A Success Stories Definitions Anatomy of the Spine Definitions A-Z Spine Specialists Videos 9 for Spine Epidural Steroid Injections Exercise: The Backbone of Spine Treatment Spondylolisthesis BLOG FIND A SPECIALIST Prevention ...

  13. Suicide Prevention

    Science.gov (United States)

    ... corresponding to World Suicide Prevention Day, to celebrate life, hope, and reasons to live. SAMHSA is committed to ... members, and helping people navigate the struggles of life to find a sustainable sense of hope, meaning, and purpose. For information about how you ...

  14. Bullying Prevention

    Science.gov (United States)

    Kemp, Patrice

    2016-01-01

    The focus of the milestone project is to focus on bridging the gap of bullying and classroom instruction methods. There has to be a defined expectations and level of accountability that has to be defined when supporting and implementing a plan linked to bullying prevention. All individuals involved in the student's learning have to be aware of…

  15. Pediatric vascular access

    International Nuclear Information System (INIS)

    Donaldson, James S.

    2006-01-01

    Pediatric interventional radiologists are ideally suited to provide vascular access services to children because of inherent safety advantages and higher success from using image-guided techniques. The performance of vascular access procedures has become routine at many adult interventional radiology practices, but this service is not as widely developed at pediatric institutions. Although interventional radiologists at some children's hospitals offer full-service vascular access, there is little or none at others. Developing and maintaining a pediatric vascular access service is a challenge. Interventionalists skilled in performing such procedures are limited at pediatric institutions, and institutional support from clerical staff, nursing staff, and technologists might not be sufficiently available to fulfill the needs of such a service. There must also be a strong commitment by all members of the team to support such a demanding service. There is a slippery slope of expected services that becomes steeper and steeper as the vascular access service grows. This review is intended primarily as general education for pediatric radiologists learning vascular access techniques. Additionally, the pediatric or adult interventional radiologist seeking to expand services might find helpful tips. The article also provides education for the diagnostic radiologist who routinely interprets radiographs containing vascular access devices. (orig.)

  16. Access 2010 for dummies

    CERN Document Server

    Ulrich Fuller, Laurie

    2010-01-01

    A friendly, step-by-step guide to the Microsoft Office database application Access may be the least understood and most challenging application in the Microsoft Office suite. This guide is designed to help anyone who lacks experience in creating and managing a database learn to use Access 2010 quickly and easily. In the classic For Dummies tradition, the book provides an education in Access, the interface, and the architecture of a database. It explains the process of building a database, linking information, sharing data, generating reports, and much more.As the Micr

  17. Opening Access to Economic Data to Prevent Tobacco and Alcohol ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This infrastructure, usually in national statistical offices, has been ... Tobacco Control Policy Survey -International Alcohol Control Survey Collecting and sharing ... both tobacco and alcohol data, and apply the same data collection processes.

  18. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology Submission Deadline: 1 June 2005 Background With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks

  19. 25 CFR 542.12 - What are the minimum internal control standards for table games?

    Science.gov (United States)

    2010-04-01

    ... this section, if a gaming operation uses plastic cards (not plastic-coated cards), the cards may be... distribution, use, and control. Personnel from the cashier or pit departments shall have no access to the... cards and dice shall be maintained in a secure location to prevent unauthorized access and to reduce the...

  20. Roundabouts and access management.

    Science.gov (United States)

    2014-03-01

    Transportation engineers and planners are becoming more interested in using roundabouts to address access : management and safety concerns in the transportation system. While roundabouts are being used increasingly in a : variety of contexts, existin...

  1. Market Access and Welfare

    DEFF Research Database (Denmark)

    Raimondos-Møller, Pascalis; Woodland, Alan D.

    According to the literature, well known tariff reform rules that are guaranteed to increase welfare will not necessarily increase market access, while rules that are guaranteed to increase market access will not necessarily increase welfare. Such conflict between welfare and market access...... objectives of trade policy is problematic and calls for finding alternative tariff reform rules that can achieve both objectives at the same time. The present paper contributes to this aim by using a new set of tariff reforms that are based on local optimality. Using such reforms it is shown that market...... access and consumer welfare will always be weakly compatible, in the sense that reforms based on each objective have the same signed effect on the other objective. For strong compatibility, whereby both objectives increase as a result of a locally optimal tariff reform, we derive both a necessary...

  2. KAUST Open Access policy

    KAUST Repository

    Baessa, Mohamed A.

    2017-01-01

    The library plays a critical role in facilitating open access for their researchers, from managing a repository to providing support and information on the OA publication process to their authors. Janis Tyhurst and Dr Imad

  3. Access to the city

    DEFF Research Database (Denmark)

    Andreasen, Manja Hoppe; Møller-Jensen, Lasse

    2017-01-01

    This paper is concerned with access to the city for urban residents living in the periphery of Dar es Salaam, Tanzania. The paper presents an analysis of the mobility practices of residents and investigates the mobility constraints they experience in relation to the limited accessibility provided...... mobility and access to the city for residents in the periphery. Regular mobility is an ingrained part of residents' livelihood strategies. The majority of households rely on one or more members regularly travelling to central parts of the city in relation to their livelihood activities. The analysis...... by road and traffic conditions and highlights how accessibility problems of peripheral settlements are not easily understood separately from the general dysfunctions of the overall mobility system of city....

  4. Critical Access Hospitals (CAH)

    Science.gov (United States)

    ... for Success Am I Rural? Evidence-based Toolkits Economic Impact Analysis Tool Community Health Gateway Sustainability Planning ... hospitals and improve access to healthcare by keeping essential services in rural communities. To accomplish this goal, ...

  5. Remote Network Access (RNA)

    National Research Council Canada - National Science Library

    2002-01-01

    .... Remote Network Access (RNA) includes or is associated with all communication devices/software, firewalls, intrusion detection systems and virus protection applications to ensure security of the OIG, DoD, Network from remote...

  6. Access/AML -

    Data.gov (United States)

    Department of Transportation — The AccessAML is a web-based internet single application designed to reduce the vulnerability associated with several accounts assinged to a single users. This is a...

  7. Access road reclamation

    International Nuclear Information System (INIS)

    Manson, T.; Blok, M.

    1997-01-01

    A general review of the measures involved in restoring abandoned access road sites in British Columbia was presented. Permits and licences are needed for the use of crown land for roads used by the petroleum and natural gas industry for exploration activities. However, the regulatory framework for road site reclamation is not well developed. The nature of access road reclamation is very site-specific. Some of the issues that are considered for all reclamation projects include slope stability, water control, revegetation, soil rehabilitation, access management and monitoring. The primary objective of reclaiming access road sites is to return the site to conditions that are equal or better than pre-disturbance conditions. Restoration measures must be approved by BC Environment and by the Department of Fisheries and Oceans where federal fisheries responsibilities are involved. 54 refs., 5 tabs., 3 figs

  8. Time dependent accessibility

    OpenAIRE

    Kaza, Nikhil

    2015-01-01

    Many place based accessibility studies ignore the time component. Relying on theoretical frameworks that treat distance between two fixed points as constant, these methods ignore the diurnal and seasonal changes in accessibility. Network distances between two nodes are dependent on the network structure and weight distribution on the edges. These weights can change quite frequently and the network structure itself is subject to modification because of availability and unavailability of links ...

  9. The universal access handbook

    CERN Document Server

    Stephanidis, Constantine

    2009-01-01

    In recent years, the field of Universal Access has made significant progress in consolidating theoretical approaches, scientific methods and technologies, as well as in exploring new application domains. Increasingly, professionals in this rapidly maturing area require a comprehensive and multidisciplinary resource that addresses current principles, methods, and tools. Written by leading international authorities from academic, research, and industrial organizations and nonmarket institutions, The Universal Access Handbook covers the unfolding scientific, methodological, technological, and pol

  10. Accessible Geoscience - Digital Fieldwork

    Science.gov (United States)

    Meara, Rhian

    2017-04-01

    Accessible Geoscience is a developing field of pedagogic research aimed at widening participation in Geography, Earth and Environmental Science (GEES) subjects. These subjects are often less commonly associated with disabilities, ethnic minorities, low income socio-economic groups and females. While advancements and improvements have been made in the inclusivity of these subject areas in recent years, access and participation of disabled students remains low. While universities are legally obligated to provide reasonable adjustments to ensure accessibility, the assumed incompatibility of GEES subjects and disability often deters students from applying to study these courses at a university level. Instead of making reasonable adjustments if and when they are needed, universities should be aiming to develop teaching materials, spaces and opportunities which are accessible to all, which in turn will allow all groups to participate in the GEES subjects. With this in mind, the Swansea Geography Department wish to enhance the accessibility of our undergraduate degree by developing digital field work opportunities. In the first instance, we intend to digitise three afternoon excursions which are run as part of a 1st year undergraduate module. Each of the field trips will be digitized into English- and Welsh-medium formats. In addition, each field trip will be digitized into British Sign Language (BSL) to allow for accessibility for D/deaf and hard of hearing students. Subtitles will also be made available in each version. While the main focus of this work is to provide accessible fieldwork opportunities for students with disabilities, this work also has additional benefits. Students within the Geography Department will be able to revisit the field trips, to revise and complete associated coursework. The use of digitized field work should not replace opportunities for real field work, but its use by the full cohort of students will begin to "normalize" accessible field

  11. CERN access cards

    CERN Multimedia

    HR Department

    2007-01-01

    Holders of CERN access cards are reminded that the card is an official document. It is important to carry it with you at all times when you are on the site. This applies also to those on standby duty who are called out for emergency interventions. As announced in Weekly Bulletin 13/2006, any loss or theft of access cards must be declared to the competent external authorities.

  12. Ergonomics and accessibility for people with visual impairment in hotels.

    Science.gov (United States)

    Dos Santos, Larissa Nascimento; de Carvalho, Ricardo José Matos

    2012-01-01

    This article presents a diagnosis of luxury or superior hotels in the city of Natal, located in the state of Rio Grande do Norte, in northeastern Brazil, in what concerns accessibility to the visually impaired. The main objective is to present the guiding principles to design actions and interventions that must be considered in the preparation or revision of technical standards and manuals of good practice in accessibility related to people with visual impairments who are hotel users. The survey showed that the hotels do not meet the normative indications of accessibility, their facilities are in-accessible (have prevented access) or of reduced accessibility and its employees are not prepared to provide adequate hospital services for people with visual impairment. It was concluded that some of the accessibility problems faced by people with visual impairments are also faced by people in general.

  13. Vascular Access in Children

    International Nuclear Information System (INIS)

    Krishnamurthy, Ganesh; Keller, Marc S.

    2011-01-01

    Establishment of stable vascular access is one of the essential and most challenging procedures in a pediatric hospital. Many clinical specialties provide vascular service in a pediatric hospital. At the top of the “expert procedural pyramid” is the pediatric interventional radiologist, who is best suited and trained to deliver this service. Growing awareness regarding the safety and high success rate of vascular access using image guidance has led to increased demand from clinicians to provide around-the-clock vascular access service by pediatric interventional radiologists. Hence, the success of a vascular access program, with the pediatric interventional radiologist as the key provider, is challenging, and a coordinated multidisciplinary team effort is essential for success. However, there are few dedicated pediatric interventional radiologists across the globe, and also only a couple of training programs exist for pediatric interventions. This article gives an overview of the technical aspects of pediatric vascular access and provides useful tips for obtaining vascular access in children safely and successfully using image guidance.

  14. 13 CFR 102.33 - Security of systems of records.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Security of systems of records....33 Security of systems of records. (a) Each Program/Support Office Head or designee shall establish administrative and physical controls to prevent unauthorized access to its systems of records, to prevent...

  15. 49 CFR 1546.205 - Acceptance and screening of cargo.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Acceptance and screening of cargo. 1546.205... SECURITY Operations § 1546.205 Acceptance and screening of cargo. (a) Preventing or deterring the carriage... aircraft. (2) Prevents access by unauthorized persons other than an authorized foreign air carrier employee...

  16. Allergy prevention.

    Science.gov (United States)

    Muche-Borowski, Cathleen; Kopp, Matthias; Reese, Imke; Sitter, Helmut; Werfel, Thomas; Schäfer, Torsten

    2010-09-01

    The further increase of allergies in industrialized countries demands evidence-based measures of primary prevention. The recommendations as published in the guideline of 2004 were updated and consented on the basis of a systematic literature search. Evidence from the period February 2003-May 2008 was searched in the electronic databases Cochrane and MEDLINE as well as in reference lists of recent reviews and by contacting experts. The retrieved citations were screened for relevance first by title and abstract and in a second step as full paper. Levels of evidence were assigned to each included study and the methodological quality of the studies was assessed as high or low. Finally the revised recommendations were formally consented (nominal group process) by representatives of relevant societies and organizations including a self-help group. Of originally 4556 hits, 217 studies (4 Cochrane Reviews, 14 meta-analyses, 19 randomized controlled trials, 135 cohort and 45 case-control studies) were included and critically appraised. Grossly unchanged remained the recommendations on avoiding environmental tobacco smoke, breast-feeding over 4 months (alternatively hypoallergenic formulas for children at risk), avoiding a mold-promoting indoor climate, vaccination according to current recommendations, and avoidance of furry pets (especially cats) in children at risk. The recommendation on reducing the house dust mite allergen exposure as a measure of primary prevention was omitted and the impact of a delayed introduction of supplementary food was reduced. New recommendations were adopted concerning fish consumption (during pregnancy / breast-feeding and as supplementary food in the first year), avoidance of overweight, and reducing the exposure to indoor and outdoor air pollutants. The revision of this guideline on a profound evidence basis led to (1) a confirmation of existing recommendations, (2) substantial revisions, and (3) new recommendations. Thereby it is possible

  17. LANSCE personnel access control system (PACS)

    International Nuclear Information System (INIS)

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  18. [Health services access survey for Colombian households].

    Science.gov (United States)

    Arrivillaga, Marcela; Aristizabal, Juan Carlos; Pérez, Mauricio; Estrada, Victoria Eugenia

    The aim of this study was to design and validate a health services access survey for households in Colombia to provide a methodological tool that allows the country to accumulate evidence of real-life access conditions experienced by the Colombian population. A validation study with experts and a pilot study were performed. It was conducted in the municipality of Jamundi, located in the department of Valle del Cauca, Colombia. Probabilistic, multistage and stratified cluster sampling was carried out. The final sample was 215 households. The survey was composed of 63 questions divided into five modules: socio-demographic profile of the head of the household or adult informant, household socioeconomic profile, access to preventive services, access to curative and rehabilitative services and household out of pocket expenditure. In descriptive terms, the promotion of preventive services only reached 44%; the use of these services was always highest among children younger than one year old and up to the age of ten. The perceived need for emergency medical care and hospitalisation was between 82% and 85%, but 36% perceived the quality of care to be low or very low. Delays were experienced in medical visits with GPs and specialists. The designed survey is valid, relevant and representative of access to health services in Colombia. Empirically, the pilot showed institutional weaknesses in a municipality of the country, indicating that health coverage does not in practice mean real and effective access to health services. Copyright © 2016 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  19. Enterprise Dynamic Access Control (EDAC)

    National Research Council Canada - National Science Library

    Fernandez, Richard

    2005-01-01

    .... Resources can represent software applications, web services and even facility access. An effective access control model should be capable of evaluating resource access based on user characteristics and environmentals...

  20. Counterfeit Parts Prevention Strategy Guide Product Overview

    Science.gov (United States)

    2014-05-08

    avoidance • Develop a risk assessment methodology when using unauthorized or non- franchised suppliers • Identify methods to ensure and verify sub-tier...comments received – Obtain endorsement across team members for product and follow-on recommendations • Workshop Accomplishments – Obtained buy -in

  1. Nuclear information access system

    International Nuclear Information System (INIS)

    Ham, C. H.; Yang, M. H.; Yoon, S. W.

    1998-01-01

    The energy supply in the countries, which have abundant energy resources, may not be affected by accepting the assertion of anti-nuclear and environment groups. Anti-nuclear movements in the countries which have little energy resources may cause serious problem in securing energy supply. Especially, it is distinct in Korea because she heavily depends on nuclear energy in electricity supply(nuclear share in total electricity supply is about 40%).The cause of social trouble surrounding nuclear energy is being involved with various circumstances. However, it is very important that we are not aware of the importance of information access and prepared for such a situation from the early stage of nuclear energy's development. In those matter, this paper analyzes the contents of nuclear information access system in France and Japan which have dynamic nuclear development program and presents the direction of the nuclear access regime through comparing Korean status and referring to progresses of the regime

  2. What Remains on Your Mind After You Are Done?: Flexible Regulation of Knowledge Accessibility

    Science.gov (United States)

    Hedberg, Per H.; Higgins, E. Tory

    2011-01-01

    The accessibility of stored knowledge has been found to decline over time after activation without further stimulation. A special case is goal pursuit; goal-related knowledge remains accessible until goal completion, and then its accessibility declines rapidly. We hypothesized that after goal completion the decline in accessibility of goal-related knowledge would be especially rapid for strong promotion-focused individuals because their motivation to eagerly advance beyond the status quo would make accessibility of this knowledge an irrelevant detriment. We hypothesized an opposite effect for strongly prevention-predominant individuals because their motivation to vigilantly maintain a satisfactory state would make accessibility of this knowledge continually relevant. The results of two studies supported both these predicted moderators of accessibility change. Indeed, we found that for strongly prevention-predominant participants, knowledge accessibility actually increased over time after goal completion. We discuss how even basic cognitive mechanisms, like changes in accessibility, can be affected by general motivational concerns. PMID:21765541

  3. Sprawl and Accessibility

    Directory of Open Access Journals (Sweden)

    Robert Bruegmann

    2008-07-01

    Full Text Available This essay argues that many of the assumptions that have been made about sprawl are misleading or just wrong. Nowhere has this been more the case than in debates about transportation and access. Because of this, it is not surprising that a good many of the policies advocated by proponents of Smart Growth would almost certainly lead to reduced mobility and impaired accessibility for a large part of the population. At very least, the debates over sprawl have pitted private vs. public transportation in a way that has contributed to serious underfunding of transportation infrastructure of all kinds.

  4. Quantum random access memory

    OpenAIRE

    Giovannetti, Vittorio; Lloyd, Seth; Maccone, Lorenzo

    2007-01-01

    A random access memory (RAM) uses n bits to randomly address N=2^n distinct memory cells. A quantum random access memory (qRAM) uses n qubits to address any quantum superposition of N memory cells. We present an architecture that exponentially reduces the requirements for a memory call: O(log N) switches need be thrown instead of the N used in conventional (classical or quantum) RAM designs. This yields a more robust qRAM algorithm, as it in general requires entanglement among exponentially l...

  5. Disruption - Access cards service

    CERN Multimedia

    2014-01-01

    We would like to inform you that between 10 November and 15 December 2014, the access cards service in Building 55 will be disrupted, as the GS Department has decided to improve the facilities for users of this building. During the work, you will find the registration, biometric registration and dosimeter exchange services on the second floor of Building 55 and the vehicle sticker service on the ground floor along with the access cards service. We thank you for your understanding and apologise for any inconvenience caused.

  6. Central Venous Access

    International Nuclear Information System (INIS)

    Ganeshan, Arul; Warakaulle, Dinuke R.; Uberoi, Raman

    2007-01-01

    Central venous access plays an important role in the management of an ever-increasing population of patients ranging from those that are critically ill to patients with difficult clinical access. Interventional radiologists are key in delivering this service and should be familiar with the wide range of techniques and catheters now available to them. A comprehensive description of these catheters with regard to indications, technical aspects of catheterization, success rates, and associated early and late complications, as well as a review of various published guidelines on central venous catheter insertion are given in this article

  7. Editorial - Open Access and accessing openness

    Directory of Open Access Journals (Sweden)

    Yngve Nordkvelle

    2008-12-01

    Full Text Available Seminar.net enters it’s fourth year, and has reached a state of maturity in a number of meanings: it receives manuscripts from all continents, the articles are read from 134 countries, of which India represents the highest number of readers, a number of articles have been read by more than 10 000 interested persons, and the frequency of issues is now three per year, and will reach four by next year. Interested parties now approach us in order to learn about our policies and practices.It takes time to become established and influential in the sense that articles are cited and referred to in prestigious publications. Still, the most prestigious publications are on paper. Many countries now embark on a policy that rewards researchers that publish in international journals, preferably in English. National languages are rendered less significant. In the UK, the research assessment exercise (RAE, and several other countries with a publication or citation based reward system in research, tend to favour quantitative dimensions at the expense of the quality of the publication. International publishing houses are huge profit-making companies that over years have increased their profit rates, charging increasingly economically pressured higher education institution with high subscription rates. With the advent of electronic publishing their position is severely challenged. It has been noted that the most significant publication of the last couple of decades was an electronic publication: Tim Berners Lee published the protocol for the World Wide Web in 1990. It was never refereed, nor was controlled by appointed gatekeepers of the “establishment”. The number of Open Access publications is rising every day, and the number of e-journals for academic publishing is reaching higher and higher numbers. In a recent case The Faculty of Arts and Sciences at Harvard University decided, that Harvard employees must publish all their material simultaneously on the

  8. Rotating preventers

    International Nuclear Information System (INIS)

    Tangedahl, M.J.; Stone, C.R.

    1992-01-01

    This paper reports that recent changes in the oil and gas industry and ongoing developments in horizontal and underbalanced drilling necessitated development of a better rotating head. A new device called the rotating blowout preventer (RBOP) was developed by Seal-Tech. It is designed to replace the conventional rotating control head on top of BOP stacks and allows drilling operations to continue even on live (underbalanced) wells. Its low wear characteristics and high working pressure (1,500 psi) allow drilling rig crews to drill safely in slightly underbalanced conditions or handle severe well control problems during the time required to actuate other BOPs in the stack. Drilling with a RBOP allows wellbores to be completely closed in tat the drill floor rather than open as with conventional BOPs

  9. Complication with intraosseous access

    DEFF Research Database (Denmark)

    Hallas, Peter; Brabrand, Mikkel; Folkestad, Lars

    2013-01-01

    with aspiration of bone marrow (12.3%), and bended/broken needle (4.0%). When using an established IO access the reported complications were difficulties with injection fluid and drugs after IO insertion (7.4%), slow infusion (despite use of pressure bag) (8.8%), displacement after insertion (8...

  10. College Access Marketing

    Science.gov (United States)

    Tremblay, Christopher W.

    2011-01-01

    College Access Marketing (CAM) is a relatively new phenomenon that seeks to positively influence the college-going rate. This report defines CAM, describes CAM examples, and discusses how CAM seeks to counter barriers to college. It explores four main elements of CAM: information, marketing, advocacy, and social mobilization. Further, it…

  11. Funding scientific open access

    International Nuclear Information System (INIS)

    Canessa, E.; Fonda, C.; Zennaro, M.

    2006-11-01

    In order to reduce the knowledge divide, more Open Access Journals (OAJ) are needed in all languages and scholarly subject areas that exercise peer-review or editorial quality control. To finance needed costs, it is discussed why and how to sell target specific advertisement by associating ads to given scientific keywords. (author)

  12. Accessing vs Sourcing Knowledge

    DEFF Research Database (Denmark)

    Awate, Snehal; Larsen, Marcus M.; Mudambi, Ram

    2015-01-01

    to get on par with industry leaders. An in-depth comparison of knowledge flows reveals that within AMNEs, headquarters often serves the primary source of knowledge for R&D subsidiaries. In contrast, within EMNEs, headquarters accesses knowledge from R&D subsidiaries in advanced economies for innovation...

  13. KAUST Open Access policy

    KAUST Repository

    Baessa, Mohamed A.

    2017-03-07

    The transition to open access (OA) is being driven by funders, libraries, researchers and publishers around the world, and is having an impact on us all. It is inevitable that different countries, organisations and disciplines are moving at different rates towards an OA model, and it is this that we will focus on in this session. Drawing on experiences from across Europe and the Middle East we will provide perspectives from both a global publisher and institutions based in the region. Taylor & Francis take a flexible, evidence-based approach to open access, providing a choice of publication routes for our authors, and a choice of agreements for our library customers. Carolyn will outline some of the open access developments, opportunities and challenges at Taylor & Francis. The library plays a critical role in facilitating open access for their researchers, from managing a repository to providing support and information on the OA publication process to their authors. Janis Tyhurst and Dr Imad Bachir will each give an overview of how this is being managed by their institution. There will be an opportunity for questions and discussion with the panel.

  14. Open access to transmission

    International Nuclear Information System (INIS)

    Keith, D.M.

    1996-01-01

    For the past 12 to 15 years, the US electric power and energy industry and its federal regulators have been going through a prolonged exercise leading to opening up the national interconnected transmission grid for all qualified wholesale users to have open and equal access. The debates have been painful in a sense that not all parties - especially some of the transmission system owning utilities - believe that the concept of Open Access is achievable, due to technical constraints on the systems. The present Open Access activity is limited to wholesales transaction under the federal jurisdiction, but several states are either experimenting with or considering retail wheeling. In fact, the FERC - Federal Energy Regulatory Commission - has already expanded its view to embrace retail transmission, if the retail transaction involves the use of the interstate transmission systems which are under FERC's jurisdiction. This paper delves into some of the results of the technical cost and pricing analysis for open access. The statutes and resulting regulations are not addressed herein. (author). 1 fig

  15. The Open Access Dilemma

    Science.gov (United States)

    Pratt, Timothy

    2017-01-01

    Community colleges, with their commitment to open access, admit millions of students each year who are unprepared for college-level work, even though they have earned a high-school diploma. For decades the schools had a built-in base of students attracted to their open doors and relative affordability. But enrollment at public two-year college has…

  16. Access Rights Distribution

    Directory of Open Access Journals (Sweden)

    T. M. Pestunova

    2011-03-01

    Full Text Available The main aspects of the development of the information system, which grants users the rights for access to automated information system resources on the basis of the organization business-processes, are considered. The conceptual, informational, functional models of the system, as well as a model, which allows to realize control while using various formal models (RBAC, DAC, MAC, are described.

  17. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi

    2015-01-01

    The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered as ...

  18. Planning for Accessibility.

    Science.gov (United States)

    Spoor, Dana L.

    1997-01-01

    Argues that barrier-free designs should be incorporated in the first steps of school facility planning to avoid the difficulties in meeting Americans with Disabilities Act (ADA) guidelines during renovations. Explains why not all barriers need be removed to make a facility accessible to everyone. Discusses issues involving ADA guidelines and child…

  19. ACCESS Project: Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Weller, Heiko [Robert Bosch, LLC, Farmington Hills, MI (United States)

    2015-04-01

    The ACCESS project addressed the development, testing, and demonstration of the proposed advanced technologies and the associated emission and fuel economy improvement at an engine dynamometer and on a full-scale vehicle. Improve fuel economy by 25% with minimum performance penalties Achieve SULEV level emissions with gasoline Demonstrate multi-mode combustion engine management system

  20. Multiple Access Communications

    DEFF Research Database (Denmark)

    This book constitutes the proceedings of the 9th International Workshop on Multiple Access Communications, MACOM 2016, held in Aalborg, Denmark, in November 2016. The 10 full papers presented in this volume were carefully reviewed and selected from 12 submissions. They were organized in topical...

  1. Kinds of Access

    DEFF Research Database (Denmark)

    Overgaard, Morten; Sandberg, Kristian

    2014-01-01

    that there is not only a theoretical, but also an empirical difference between different methods of reporting. We hypothesise that differences in the sensitivity of different scales may reveal that different types of access are used to issue direct reports about experiences and metacognitive reports about...

  2. Fixed Access Network Sharing

    Science.gov (United States)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  3. Sunburn: Treatment and Prevention

    Science.gov (United States)

    ... Healthy Living Healthy Living Healthy Living Nutrition Fitness Sports Oral Health Emotional Wellness Growing Healthy Sleep Safety & Prevention Safety & Prevention Safety and Prevention Immunizations ...

  4. Digital Scholarship and Open Access

    Science.gov (United States)

    Losoff, Barbara; Pence, Harry E.

    2010-01-01

    Open access publications provide scholars with unrestricted access to the "conversation" that is the basis for the advancement of knowledge. The large number of open access journals, archives, and depositories already in existence demonstrates the technical and economic viability of providing unrestricted access to the literature that is the…

  5. Cholera - management and prevention.

    Science.gov (United States)

    Davies, Hannah G; Bowman, Conor; Luby, Stephen P

    2017-06-01

    Cholera is an acute secretory diarrhoeal infection caused by the bacterium Vibrio cholerae. It is likely to have originated in the Indian sub-continent; however, it spread to cause six worldwide pandemics between 1817-1923. The ongoing seventh worldwide pandemic of cholera began in 1961. The intensity, duration and severity of cholera epidemics have been increasing, signaling the need for more effective control and prevention measures. The response to the cholera pandemics of the 19th century led to the development of safe and effective sanitation and water systems which have effectively removed the risk of cholera in many settings. However, such systems are not in place to protect billions of people worldwide. Although some progress has been made in expanding access to water in recent years, achieving optimal infrastructure will, in the most optimistic scenario, take decades. Climate change, extreme weather events and rapid urbanisation suggests that alternatives to the current paradigm of providing large centralised water and sanitation systems should be considered, including smaller decentralised systems. The aim of this review paper is to provide an overview of current knowledge regarding management of cholera with a focus on prevention measures including vaccination and water and sanitation interventions. © 2017 The British Infection Association. Published by Elsevier Ltd. All rights reserved.

  6. Support open access publishing

    DEFF Research Database (Denmark)

    Ekstrøm, Jeannette

    2013-01-01

    Projektet Support Open Access Publishing har til mål at få opdateret Sherpa/Romeo databasen (www.sherpa.ac.uk/romeo) med fagligt relevante, danske tidsskrifter. Projektet skal endvidere undersøge mulighederne for at få udviklet en database, hvor forskere på tværs af relevante tidsskriftsinformati......Projektet Support Open Access Publishing har til mål at få opdateret Sherpa/Romeo databasen (www.sherpa.ac.uk/romeo) med fagligt relevante, danske tidsskrifter. Projektet skal endvidere undersøge mulighederne for at få udviklet en database, hvor forskere på tværs af relevante...

  7. Analysing Access Control Specifications

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof

    2009-01-01

    When prosecuting crimes, the main question to answer is often who had a motive and the possibility to commit the crime. When investigating cyber crimes, the question of possibility is often hard to answer, as in a networked system almost any location can be accessed from almost anywhere. The most...... common tool to answer this question, analysis of log files, faces the problem that the amount of logged data may be overwhelming. This problems gets even worse in the case of insider attacks, where the attacker’s actions usually will be logged as permissible, standard actions—if they are logged at all....... Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set...

  8. Access to Research Inputs

    DEFF Research Database (Denmark)

    Czarnitzki, Dirk; Grimpe, Christoph; Pellens, Maikel

    2015-01-01

    The viability of modern open science norms and practices depends on public disclosure of new knowledge, methods, and materials. However, increasing industry funding of research can restrict the dissemination of results and materials. We show, through a survey sample of 837 German scientists in life...... sciences, natural sciences, engineering, and social sciences, that scientists who receive industry funding are twice as likely to deny requests for research inputs as those who do not. Receiving external funding in general does not affect denying others access. Scientists who receive external funding...... of any kind are, however, 50 % more likely to be denied access to research materials by others, but this is not affected by being funded specifically by industry...

  9. Access to Research Inputs

    DEFF Research Database (Denmark)

    Czarnitzki, Dirk; Grimpe, Christoph; Pellens, Maikel

    The viability of modern open science norms and practices depend on public disclosure of new knowledge, methods, and materials. However, increasing industry funding of research can restrict the dissemination of results and materials. We show, through a survey sample of 837 German scientists in life...... sciences, natural sciences, engineering, and social sciences, that scientists who receive industry funding are twice as likely to deny requests for research inputs as those who do not. Receiving external funding in general does not affect denying others access. Scientists who receive external funding...... of any kind are, however, 50% more likely to be denied access to research materials by others, but this is not affected by being funded specifically by industry....

  10. Telecommunication access to INIS

    International Nuclear Information System (INIS)

    Scheel, H.; Breitfeld, B.; Huebner, B.

    1983-01-01

    Proceeding from the features of on-line retrieval from the INIS data base, a description is given of the technical and organizational conditions established by the national INIS Centre of the GDR in using the INIS direct access service. Data are presented on the structure of search queries, retrieval precision, and connect time to the computer. Experience has shown that efficient dialogue searching necessitates the searcher's skill and familiarity with the system. (author)

  11. Diabetes Prevention Program (DPP)

    Science.gov (United States)

    ... Recruiting Patients & Families Consortia, Networks & Centers Reports & Planning Diabetes Prevention Program (DPP) The NIDDK-sponsored Diabetes Prevention ... Diabetes Prevention Program for those who are eligible. Diabetes Prevention Program (DPP) DPP Goal The DPP looked ...

  12. Cholera Prevention and Control

    Science.gov (United States)

    ... name=”commit” type=”submit” value=”Submit” /> Prevention & Control Recommend on Facebook Tweet Share Compartir Prevention of ... of cholera and other diarrheal disease prevention. Prevention & Control Topics Ending Cholera: The Global Roadmap to 2030 ...

  13. Direct access to INIS

    International Nuclear Information System (INIS)

    Zheludev, I.S.; Romanenko, A.G.

    1981-01-01

    Librarians, researchers, and information specialists throughout the world now have the opportunity for direct access to coverage of almost 95% of the world's literature dealing with the peaceful uses of atomic energy and nuclear science. This opportunity has been provided by the International Nuclear Information System (INIS) of the IAEA. INIS, with the voluntary collaboration of more than 60 of the Agency's Member States, maintains a comprehensive, computer-resident data-base, containing the bibliographic details plus informative abstracts of the bulk of the world's literature on nuclear science and technology. Since this data-base is growing at a rate of 75,000 items per year, and already contains more than 500,000 items, it is obviously important to be able to search this collection conveniently and efficiently. The usefulness of this ability is enhanced when other data-bases on related subjects are made available on an information network. During the early 1970s, on-line interrogation of large bibliographic data-bases became the accepted method for searching this type of information resource. Direct interaction between the searcher and the data-base provides quick feed-back resulting in improved literature listings for launching research and development projects. On-line access enables organizations which cannot store a large data-base on their own computer to expand the information resources at their command. Because of these advantages, INIS undertook to extend to interested Member States on-line access to its data-base in Vienna

  14. ADOPT Open Access

    CERN Multimedia

    2007-01-01

    Are you writing a theoretical paper? An experimental one? Or one about instrumentation? You can publish it in Open Access. Now. Read how... You might have heard about Open Access, the next big thing in scientific publishing. The idea is to make the results of your (publicly funded) research free to read for everyone out there ... not only those lucky ones who work in places where libraries can afford to purchase the expensive subscriptions to scientific journals. CERN, DESY and other particle physics institutes have accepted an offer by one of the leading journals in High Energy Physics, JHEP: our libraries will pay a special subscription fee, and, in exchange, all articles with at least one author from our institutes will be published in Open Access. Anyone, anywhere and anytime will be able to read them, without any financial barrier! If you are writing an instrumentation paper, you can submit it to JINST and benefit from the same offer. This is a major step forward in the planned conversion of existi...

  15. Open-Access Publishing

    Directory of Open Access Journals (Sweden)

    Nedjeljko Frančula

    2013-06-01

    Full Text Available Nature, one of the most prominent scientific journals dedicated one of its issues to recent changes in scientific publishing (Vol. 495, Issue 7442, 27 March 2013. Its editors stressed that words technology and revolution are closely related when it comes to scientific publishing. In addition, the transformation of research publishing is not as much a revolution than an attrition war in which all sides are buried. The most important change they refer to is the open-access model in which an author or an institution pays in advance for publishing a paper in a journal, and the paper is then available to users on the Internet free of charge.According to preliminary results of a survey conducted among 23 000 scientists by the publisher of Nature, 45% of them believes all papers should be published in open access, but at the same time 22% of them would not allow the use of papers for commercial purposes. Attitudes toward open access vary according to scientific disciplines, leading the editors to conclude the revolution still does not suit everyone.

  16. Pediatric central venous access devices: nursing interventions

    Directory of Open Access Journals (Sweden)

    Duffy EA

    2017-05-01

    Full Text Available Elizabeth A Duffy, Kathryn N Nelson Department of Health Behavior and Biological Sciences, The University of Michigan School of Nursing, Ann Arbor, MI, USA Abstract: A central venous catheter (CVC is an indwelling catheter that provides permanent or temporary stable venous access for both acute and chronically ill pediatric patients. These catheters provide stable venous access that can be used for a variety of medical purposes including drawing blood, hemodynamic monitoring, infusion of intravenous medications, infusion of intravenous fluids, chemotherapy, blood products, and parenteral nutrition. Each day, nurses access and care for CVCs in infants, children, and adolescents; the precision of this care can prevent life-threatening complications. The purpose of this review and the case study is to highlight the importance and components of evidence-based nursing practice in pediatric CVC care. A historical perspective of CVC care is provided in conjunction with current national initiatives to improve patient outcomes for children with CVCs. Infection prevention, clinical practice guidelines, quality improvement, and evidence-based care bundles are discussed. Keywords: pediatric nursing, central venous catheters, central line-associated bloodstream infection, care bundles, pediatric case study 

  17. ACOG Committee Opinion Number 542: Access to emergency contraception.

    Science.gov (United States)

    2012-11-01

    Emergency contraception includes contraceptive methods used to prevent pregnancy in the first few days after unprotected intercourse, sexual assault, or contraceptive failure. Although the U.S. Food and Drug Administration approved the first dedicated product for emergency contraception in 1998, numerous barriers to access to emergency contraception remain. The purpose of this Committee Opinion is to examine the barriers to the use of oral emergency contraception methods and to highlight the importance of increasing access.

  18. HEALTH INFORMATION TECHNOLOGY IN EXCHANGE OF HEALTH INFORMATION

    Directory of Open Access Journals (Sweden)

    Jordan Deliversky

    2016-06-01

    Full Text Available Health information technology involves the exchange of health information in an electronic environment. Data protection is comprised of many elements, including where the data resides, how it is used, and who has access to it. Individually identifiable health information should be protected with reasonable administrative, technical, and physical safeguards to ensure its confidentiality, integrity, and availability and to prevent unauthorized access, use, or disclosure. Health records are among the most sensitive records available containing information concerning an individual. The unauthorized disclosure of a medical condition or diagnosis could negatively impact an individual’s personal and professional life.

  19. Web accessibility standards and disability: developing critical perspectives on accessibility.

    Science.gov (United States)

    Lewthwaite, Sarah

    2014-01-01

    Currently, dominant web accessibility standards do not respect disability as a complex and culturally contingent interaction; recognizing that disability is a variable, contrary and political power relation, rather than a biological limit. Against this background there is clear scope to broaden the ways in which accessibility standards are understood, developed and applied. Commentary. The values that shape and are shaped by legislation promote universal, statistical and automated approaches to web accessibility. This results in web accessibility standards conveying powerful norms fixing the relationship between technology and disability, irrespective of geographical, social, technological or cultural diversity. Web accessibility standards are designed to enact universal principles; however, they express partial and biopolitical understandings of the relation between disability and technology. These values can be limiting, and potentially counter-productive, for example, for the majority of disabled people in the "Global South" where different contexts constitute different disabilities and different experiences of web access. To create more robust, accessible outcomes for disabled people, research and standards practice should diversify to embrace more interactional accounts of disability in different settings. Implications for Rehabilitation Creating accessible experiences is an essential aspect of rehabilitation. Web standards promote universal accessibility as a property of an online resource or service. This undervalues the importance of the user's intentions, expertize, their context, and the complex social and cultural nature of disability. Standardized, universal approaches to web accessibility may lead to counterproductive outcomes for disabled people whose impairments and circumstances do not meet Western disability and accessibility norms. Accessible experiences for rehabilitation can be enhanced through an additional focus on holistic approaches to

  20. An electronically controlled automatic security access gate

    Directory of Open Access Journals (Sweden)

    Jonathan A. ENOKELA

    2014-11-01

    Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.

  1. Safety testing for LHC access system

    CERN Document Server

    Valentini, F; Ninin, P; Scibile, S

    2008-01-01

    In the domain of Safety Real-Time Systems the problem of testing represents always a big effort in terms of time, costs and efficiency to guarantee an adequate coverage degree. Exhaustive tests may, in fact, not be practicable for large and distributed systems. This paper describes the testing process followed during the validation of the CERN's LHC Access System [1], responsible for monitoring and preventing physical risks for the personnel accessing the underground areas. In the paper we also present a novel strategy for the testing problem, intended to drastically reduce the time for the test patterns generation and execution. In particular, we propose a methodology for blackbox testing that relies on the application of Model Checking techniques. Model Checking is a formal method from computer science, commonly adopted to prove correctness of system’s models through an automatic system’s state space exploration against some property formulas.

  2. Increasing Access to Farmers Markets for Beneficiaries of Nutrition Assistance

    Centers for Disease Control (CDC) Podcasts

    2013-10-22

    In this audio podcast, listen to author Kate Cole, MPH talk about her article on farmers markets and how acceptance of nutrition assistance could increase access to fruits and vegetables to those in low-income communities.  Created: 10/22/2013 by Preventing Chronic Disease (PCD), National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 10/22/2013.

  3. Accessibility and inclusion informational

    Directory of Open Access Journals (Sweden)

    Mônica Sena de Souza

    2013-06-01

    Full Text Available Introduction: Discusses the role of information professionals in meeting the informational demands of people with disabilities in the information society. The librarian is crucial for the effectiveness and success in the informational inclusion of people with disabilities, considering also continuing education for their professional qualification.Objective: To provide reflections on the role of the librarian in serving users with disabilities, highlighting the need for improvement in information units, identified in the scientific literature with regard to accessibility.Methodology: Literature search, based on a review of literature in books and scientific papers, highlighting the main authors: Adams (2000, Mazzoni (2001 and Sassaki (1997, 2002, 2005.Results: The lack of informational access for people with disabilities hampers their social and political participation, hence, reduces its condition of citizenship.Conclusion: The librarian responsible for seeking continuing education, greater involvement in the events of the area and the constant search for job training, which will reflect on the best service the information needs of users with disabilities.

  4. Art : accessible, renewable technology

    International Nuclear Information System (INIS)

    Middleton, C.D.

    2004-01-01

    This paper focuses on the role of non-governmental organization (NGO) citizen groups in Ontario in the use and production of electricity. NGOs have the potential to act both directly on their own accord, and indirectly by pressuring government and others. Current demand for electricity is divided between industrial, commercial and residential users. Citizens have an important role to play in reducing energy demand. On the supply side, there is a revival of interest in renewable energy based on wind, photovoltaic and local-hydro technologies as a result of the escalating environmental and economic costs of coal and nuclear generation. However, citizen groups have greater interest and enthusiasm than technical expertise, creating a mismatch between technological solutions and human need or use of them. This paper discusses how this mismatch applies to renewable-energy technologies, many of which are not especially user-friendly, or accessible. While alternative technologies are increasingly welcomed by government, industry is developing a large and growing array of technological devices. In between this is the citizen, who, despite keen interest, can be overwhelmed by the complexity of the situation. This paper links the theoretical perspective to the real world with a discussion of the dynamics between people and renewable energy in citizen groups and makes particular reference to one group, Citizens for Renewable Energy, that has been making renewable energy technology more accessible to its members for over a decade

  5. EPICS: Channel Access security design

    International Nuclear Information System (INIS)

    Kraimer, M.; Hill, J.

    1994-05-01

    This document presents the design for implementing the requirements specified in: EPICS -- Channel Access Security -- functional requirements, Ned. D. Arnold, 03/09/92. Use of the access security system is described along with a summary of the functional requirements. The programmer's interface is given. Security protocol is described and finally aids for reading the access security code are provided

  6. NLM Emergency Access Initiative: FAQs

    Science.gov (United States)

    Facebook Visit us on Twitter Visit us on Youtube Emergency Access Initiative Home | Journals | Books | Online Databases | FAQs Take Short Survey FAQ What is the Emergency Access Initiative? The Emergency Access Initiative (EAI) is a collaborative partnership between NLM and participating publishers to

  7. Suicide Prevention Strategies for Improving Population Health.

    Science.gov (United States)

    Wilcox, Holly C; Wyman, Peter A

    2016-04-01

    Suicide is a public health problem that accounts for more than 1 million deaths annually worldwide. This article addresses evidence-based and promising youth suicide prevention approaches at the primary, secondary, and tertiary levels. Coordinated, developmentally timed, evidence-based suicide prevention approaches at all intervention levels are likely to reduce youth suicide. For most youth who die by suicide, there are opportunities for intervention before imminent risk develops. Current research in suicide prevention points to the value of investing in "upstream" universal interventions that build skills and resilience as well as policies that enable access to care and protection from lethal means. Copyright © 2016 Elsevier Inc. All rights reserved.

  8. Barriers and facilitators to intraosseous access in adult resuscitations when peripheral intravenous access is not achievable.

    Science.gov (United States)

    James Cheung, Warren; Rosenberg, Hans; Vaillancourt, Christian

    2014-03-01

    Studies suggest that intraosseous (IO) access is underutilized in adult resuscitations, despite recommendations from advanced trauma and cardiac life support guidelines. The objective was to determine factors associated with IO access use by physicians during adult resuscitations when intravenous (IV) access is not immediately achievable. This study was an online survey among physicians purposefully recruited from various clinical care areas at three teaching hospitals. Questions were generated from the qualitative results of 20 iterative interviews, verified for internal validity, and piloted. The interview guide was based on the constructs of the Theory of Planned Behavior (TPB), which elicits salient attitudes, social influences, and control beliefs that potentially influence intention to use IO access. Recruitment took place in September 2012 until reaching more than 100% of the required sample size (n = 200). Internal consistency was measured using Cronbach's alpha, and the effect of TPB constructs and specific beliefs were assessed with regression analyses. For the 205 respondents, the mean age was 35 years (range = 20 to 66 years), and 53.3% were male. Participants' departmental affiliations were 50.3% emergency medicine (EM), 16.9% internal medicine, 14.9% anesthesia, 10.8% general surgery, and 7.2% critical care. Residents comprised 60.7% of the sample, and 39.3% were attending physicians. Median intention to use IO access when IV is not immediately achievable was 4.67 (interquartile range [IQR] = 4 to 5) out of 5 (5 highest) and predicted by the following TPB constructs: attitudes (AdjCoefficients = 0.504; 95% confidence interval [CI] = 0.334 to 0.673), social influences (AdjCoefficients = 0.285; 95% CI = 0.172 to 0.398), and control beliefs (AdjCoefficients 0.217; 95% CI = 0.113 to 0.320). Physicians were more likely to use IO access if they believed that it provided rapid vascular access for delivering large volumes of fluids, could prevent delays in

  9. Access to Health Care

    Centers for Disease Control (CDC) Podcasts

    2010-11-09

    This podcast is based on the November, 2010 CDC Vital Signs report which indicates that more than one in four adults 18-64 years old (about 50 million) report being uninsured for at least part of the past 12 months, and focuses on the growing number of middle-income adults and those with a chronic illness or disability who have no health insurance.  Created: 11/9/2010 by Centers for Disease Control and Prevention (CDC).   Date Released: 11/9/2010.

  10. 49 CFR 176.130 - Magazine stowage Type A.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Magazine stowage Type A. 176.130 Section 176.130... Requirements for Class 1 (Explosive) Materials Stowage § 176.130 Magazine stowage Type A. (a) In addition to protecting the Class 1 (explosive) materials and preventing unauthorized access, magazine stowage type A...

  11. 78 FR 15006 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-08

    ... experience in DA&M, total years of work experience, job level, job competencies, and competency level), education (e.g., degrees, training, coursework), job title, pay plan, job series, job grade, feedback on... and PIN prevents unauthorized access. Retention and disposal: Destroy three (3) years after...

  12. MIP-based enhanced mid-session macro-mobility for IMS-controlled state-full applications

    DEFF Research Database (Denmark)

    Renier, Thibault Julien; Fathi, Hanane; Schwefel, Hans-Peter

    2007-01-01

    , e.g., block unauthorized visiting users. The 3GPP IP Multimedia Subsystem (IMS) is a platform standardized towards network-independent access and session control. The current IMS specifications do not allow for any change of the user's current IP address during an ongoing session, which prevents...

  13. 21 CFR 1311.120 - Electronic prescription application requirements.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Electronic prescription application requirements. 1311.120 Section 1311.120 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE... application must clear the plain text password from the application memory to prevent the unauthorized access...

  14. Staffing and Technology Maximize Dorm Security.

    Science.gov (United States)

    George, Stephen C.

    1996-01-01

    Loyola University of Chicago uses uniformed guards and electronic monitoring to prevent unauthorized entry into its 11 residence halls. Access to all residence halls is regulated by bar-code readers. Student ID cards also have color-coded stickers corresponding to specific residence halls. (MLF)

  15. Single access laparoscopic nephrectomy

    Directory of Open Access Journals (Sweden)

    Jay D Raman

    2008-01-01

    Full Text Available Laparoscopic nephrectomy has assumed a central role in the management of benign and malignant kidney diseases. While laparoscopy is less morbid than open surgery, it still requires several incisions each at least 1-2 cm in length. Each incision carries morbidity risks of bleeding, hernia and/or internal organ damage, and incrementally decreases cosmesis. An alternative to conventional laparoscopy is single access or keyhole surgery, which utilizes magnetic anchoring and guidance system (MAGS technology or articulating laparoscopic instruments. These technical innovations obviate the need to externally space trocars for triangulation, thus allowing for the creation of a small, solitary portal of entry into the abdomen. Laboratory and early clinical series demonstrate feasibility as well as safe and successful completion of keyhole nephrectomy. Future work is necessary to improve existing instrumentation, increase clinical experience, assess benefits of this surgical approach, and explore other potential applications for this technique.

  16. Accessibility Long Term Perspectives

    Directory of Open Access Journals (Sweden)

    Kay Axhausen

    2008-11-01

    Full Text Available Improved accessibility and its correlate lower generalized cost of contact, travel and transport have been sought by dynamic human societies for their economic and social benefits through- out recorded history. The paper will reflect about this process at a number of different spatial and temporal scales based on a conceptual model. Looking back at European history, it will trace the interaction between Christaller's logic of local market areas and the idea of (low contact cost network cities. Focusing on Switzerland since 1950 it will show how network investment changed the relative distribution of population and employment and how this interacted with changes in the preferences of the travelers. Using a recent snapshot of how a substantial sample of Swiss maintain their social networks over often very large areas, it will try to answer the question of what will happen in the future, if the current trend of ever lower costs of contact will persist.

  17. AccessCulture

    DEFF Research Database (Denmark)

    Valtysson, Bjarki

    of the European Union, and how its cultural policy responds to the changes that the digital paradigm has brought upon the field. The self-publishing features of various Web 2.0 platforms, along with the interactive and distributional potentials that the Internet offers, have given rise to what is referred to here...... in cultural production and consumption. The first part of this works looks at how these changes respond to the field of cultural policy, as well as suggesting a possible culturepolitical reaction in a model which I refer to as access culture. In terms of theoretical approach, the notion of digital cultural...... of YouTube, MySpace, Facebook and Flickr, along with lesser known platforms such as the animated short film Elephants Dream, the BBC's Creative Archive, various Internet artworks and the Internet Archive. I furthermore introduce the copyright system Creative Commons in order to suggest legal, widely...

  18. Access For All

    DEFF Research Database (Denmark)

    Andersen, Ove Kjeld; Hjulmand, Christian

    2005-01-01

    Approximately 30% of the Danish population has severe problems in reading everyday text. In the light of the increasing amount of text available on the Internet this poses a democratic challenge to ensure “equal access” to information. The Talking Internet service - Access For All (AFA) - offers...... a free Internet-based tool for reading aloud any marked text with a synthetic voice. The only requirements are a standard equipped PC running a recent Windows OS and an Internet connection. Experiences gathered from running the service for more than 28 months underline the viability of the concept....... There is a clear need for a free internet based Danish text-to-speech synthesizer. Furthermore, the current state of technology i.e. internet bandwidth, response time and server technology is sufficient for setting up an online automatic reading service that is used by steadily growing number of individuals...

  19. Chemists, Access, Statistics

    Science.gov (United States)

    Holmes, Jon L.

    2000-06-01

    New JCE Internet Feature at JCE Online Biographical Snapshots of Famous Chemists is a new JCE Internet feature on JCE Online. Edited by Barbara Burke, this feature provides biographical information on leading chemists, especially women and minority chemists, fostering the attitude that the practitioners of chemistry are as human as those who endeavor to learn about it. Currently, the column features biographical "snapshots" of 30 chemists. Each snapshot includes keywords and bibliography and several contain links to additional online information about the chemist. More biographical snapshots will appear in future installments. In addition, a database listing over 140 women and minority chemists is being compiled and will be made available online with the snapshots in the near future. The database includes the years of birth and death, gender and ethnicity, major and minor discipline, keywords to facilitate searching, and references to additional biographical information. We welcome your input into what we think is a very worthwhile resource. If you would like to provide additional biographical snapshots, see additional chemists added to the database, or know of additional references for those that are already in the database, please contact JCE Online or the feature editor. Your feedback is welcome and appreciated. You can find Biographical Snapshots of Famous Chemists starting from the JCE Online home page-- click the Features item under JCE Internet and then the Chemist Bios item. Access JCE Online without Name and Password We have recently been swamped by libraries requesting IP-number access to JCE Online. With the great benefit IP-number authentication gives to librarians (no user names and passwords to administer) and to their patrons (no need to remember and enter valid names and passwords) this is not surprising. If you would like access to JCE Online without the need to remember and enter a user name and password, you should tell your librarian about our

  20. Under Lock and Key: Preventing Campus Theft of Electronic Equipment.

    Science.gov (United States)

    Harrison, J. Phil

    1996-01-01

    A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…

  1. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro

    2006-01-01

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori

  2. Chronic diseases risk factors and access to health exams among ...

    African Journals Online (AJOL)

    Using data from the World Health Survey (WHS) carried out in South Africa in 2003, the aim of this study is to establish chronic diseases risk factors and access to preventive exams for cervical and breast cancer among South African women. The sample included in this analysis included 1236 women 18 years and above.

  3. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; Gadducci, F.

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e.before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori

  4. 49 CFR 38.125 - Mobility aid accessibility.

    Science.gov (United States)

    2010-10-01

    ... Transportation Office of the Secretary of Transportation AMERICANS WITH DISABILITIES ACT (ADA) ACCESSIBILITY... fold or retract into the stowed position. (ii) Exception. Where physical or safety constraints prevent... a lift design of this type if the stowed position is within the passenger compartment and the lift...

  5. 36 CFR 1192.125 - Mobility aid accessibility.

    Science.gov (United States)

    2010-07-01

    ... COMPLIANCE BOARD AMERICANS WITH DISABILITIES ACT (ADA) ACCESSIBILITY GUIDELINES FOR TRANSPORTATION VEHICLES... fold or retract into the stowed position. (ii) Exception. Where physical or safety constraints prevent... a lift design of this type if the stowed position is within the passenger compartment and the lift...

  6. 50 CFR 660.312 - Open access fishery-prohibitions.

    Science.gov (United States)

    2010-10-01

    ... ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE (CONTINUED) FISHERIES OFF WEST COAST STATES West Coast... for the Prevention of Pollution From Ships, 1973 (Annex V of MARPOL 73/78). (2) Fish with dredge gear..., possess, or land groundfish in excess of the landing limit for the open access fishery without having a...

  7. Pharmacy Access to Emergency Contraception in Rural and Frontier Communities

    Science.gov (United States)

    Bigbee, Jeri L.; Abood, Richard; Landau, Sharon Cohen; Maderas, Nicole Monastersky; Foster, Diana Greene; Ravnan, Susan

    2007-01-01

    Context: Timely access to emergency contraception (EC) has emerged as a major public health effort in the prevention of unintended pregnancies. The recent FDA decision to allow over-the-counter availability of emergency contraception for adult women presents important rural health implications. American women, especially those living in rural and…

  8. Polio and Prevention

    Science.gov (United States)

    ... Essays Photo Collections Videos Polio Today → Polio + Prevention Polio + Prevention Polio and prevention Polio is a crippling ... for poliovirus within 48 hours of onset. Bulbar polio More extensive paralysis, involving the trunk and muscles ...

  9. Prevent Child Abuse America

    Science.gov (United States)

    ... the Week Parenting Tip of the Week – Preventing Child Sexual Abuse Parenting Tip of the Week Parenting Tip of the Week – Talking to Teens about Healthy Relationships ... of child abuse prevention through our Pinwheels for Prevention campaign. ...

  10. National Suicide Prevention Lifeline

    Science.gov (United States)

    ... Initiatives Best Practices Our Network Media Resources National Suicide Prevention Lifeline We can all help prevent suicide. The ... Call The Lifeline Everyone Plays A Role In Suicide Prevention Here are some helpful links: GET HELP NOW ...

  11. Prevention Research Matters

    Centers for Disease Control (CDC) Podcasts

    Prevention Research Matters is a series of one-on-one interviews with researchers from 26 university prevention research centers across the country. Their work focuses on preventing and controlling chronic diseases like obesity, cancer, and heart disease.

  12. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  13. Scabies: Prevention and Control

    Science.gov (United States)

    ... Information Scabies FAQs Workplace FAQs Epidemiology & Risk Factors Biology Disease Diagnosis Treatment Prevention & Control Resources for Health Professionals Medications Institutional Settings Prevention ...

  14. Reasons to temper enthusiasm about open access nursing journals.

    Science.gov (United States)

    de Jong, Gideon

    2017-04-01

    Open access is a relatively new phenomenon within nursing science. Several papers from various nursing journals have been published recently on the disadvantages of the traditional model of purchasing proprietary fee-based databases to access scholarly information. Just few nursing scholars are less optimistic about the possible benefits of open access nursing journals. A critical reflection on the merits and pitfalls of open access journals along insights from the literature and personal opinion. Two arguments are discussed, providing justification for tempering enthusiasm about open access journals. First, only research groups with sufficient financial resources can publish in open access journals. Second, open access has conflicting incentives, where the aim is to expand production at the expense of publishing quality articles; a business model that fits well into a neoliberal discourse. There are valid reasons to criticise the traditional publishers for the excessive costs of a single article, therefore preventing the dissemination of scholarly nursing information. On the contrary, the business model of open access publishers is no less imbued with the neoliberal tendency of lining the pockets.

  15. A Solution of Data-Level Security Access Control%一种数据级安全访问控制方案①

    Institute of Scientific and Technical Information of China (English)

    唐建; 徐罡; 许舒人

    2013-01-01

    To protect sensitive data in Web applications from unauthorized access, a data access strategy consisting of user set and data access authority is proposed, which is based on traditional role based access control model. The data access strategy is related to function. After parsing the original business SQL, row-level-rules are applied to filter the data records in row level, and column-level-rules are applied to mask the corresponding attributes of the data records. A data security access control framework is designed. Finally, this strategy is implemented in the Agricultural Products Supply Chain Management System of Xinfadi, and the validity and effectiveness of the presented strategy is demonstrated.%为了更好地保护 Web 应用系统中敏感数据不被非法访问。在传统的基于角色的访问控制模型基础上提出了由用户集合和数据访问权限构成的数据访问策略,并将数据访问策略关联到功能,通过对原有业务 SQL 解析,使用行级访问权限对数据记录进行行级过滤,再根据列级访问权限对数据记录相应属性进行屏蔽处理来进行数据安全访问控制,并设计了数据安全访问控制的框架。最后将该方案应用到新发地农产品供应链管理平台中,验证了该方案的可行性和有效性。

  16. Public Access and Open Access: Is There a Difference? | Poster

    Science.gov (United States)

    By Robin Meckley, Contributing Writer, and Tracie Frederick, Guest Writer Open access and public access—are they different concepts or are they the same? What do they mean for the researchers at NCI at Frederick? “Open-access (OA) literature is digital, online, free of charge, and free of most copyright and licensing restrictions. What makes it possible is the Internet and the consent of the author or copyright-holder,” according to an open access website maintained by Peter Suber, director, Harvard Open Access Project.

  17. Making Astronomy Accessible

    Science.gov (United States)

    Grice, Noreen A.

    2011-05-01

    A new semester begins, and your students enter the classroom for the first time. You notice a student sitting in a wheelchair or walking with assistance from a cane. Maybe you see a student with a guide dog or carrying a Braille computer. Another student gestures "hello” but then continues hand motions, and you realize the person is actually signing. You wonder why another student is using an electronic device to speak. Think this can't happen in your class? According to the U.S. Census, one out of every five Americans has a disability. And some disabilities, such as autism, dyslexia and arthritis, are considered "invisible” disabilities. This means you have a high probability that one of your students will have a disability. As an astronomy instructor, you have the opportunity to reach a wide variety of learners by using creative teaching strategies. I will share some suggestions on how to make astronomy and your part of the universe more accessible for everyone.

  18. Monographs and Open Access

    Directory of Open Access Journals (Sweden)

    Geoffrey Crossick

    2016-03-01

    Full Text Available This article presents the project that I led for HEFCE on the implications of OA (open access for monographs and other long-form research publications. The likely requirement that books should be OA if submitted to the REF (Research Excellence Framework after next means that OA development must be based on an understanding of the importance of the monograph in the AHSS (arts, humanities and social sciences as well as the challenges involved in making the transition to online OA. The project focused on three issues and each is summarized in turn in the article: What is the place of the monograph and other long-form publications in AHSS disciplines that makes it so important? What is happening to the monograph and is there a crisis as some suggest? What are the issues involved in moving monographs into a digital and OA environment – not just the challenge of effective business models but also many other aspects of sustaining and enhancing the qualities of the monograph? These include third-party rights, technical challenges, licences and the need for international collaboration.

  19. Remote direct memory access

    Science.gov (United States)

    Archer, Charles J.; Blocksome, Michael A.

    2012-12-11

    Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

  20. Atomic memory access hardware implementations

    Science.gov (United States)

    Ahn, Jung Ho; Erez, Mattan; Dally, William J

    2015-02-17

    Atomic memory access requests are handled using a variety of systems and methods. According to one example method, a data-processing circuit having an address-request generator that issues requests to a common memory implements a method of processing the requests using a memory-access intervention circuit coupled between the generator and the common memory. The method identifies a current atomic-memory access request from a plurality of memory access requests. A data set is stored that corresponds to the current atomic-memory access request in a data storage circuit within the intervention circuit. It is determined whether the current atomic-memory access request corresponds to at least one previously-stored atomic-memory access request. In response to determining correspondence, the current request is implemented by retrieving data from the common memory. The data is modified in response to the current request and at least one other access request in the memory-access intervention circuit.

  1. Barriers to accessing urethroplasty.

    Science.gov (United States)

    Consolo, Michael J; Syed, Kirin K; Robison, Christopher; McFadden, Jacob; Shalowitz, David I; Brown, Gordon A; Sussman, David O; Figler, Bradley D

    2016-01-01

    Urethroplasty is an effective treatment for men with anterior urethral strictures, but is utilized less frequently than ineffective treatments such as internal urethrotomy. We sought to identify provider-level barriers to urethroplasty. An anonymous online survey was emailed to all Mid-Atlantic American Urological Association members. Six scenarios in which urethroplasty was the most appropriate treatment were presented. Primary outcome was recommendation for urethroplasty in ≥ three clinical scenarios. Other factors measured include practice zip code, urethroplasty training, and proximity to a urethroplasty surgeon. Multivariate logistic regression identified factors associated with increased likelihood of urethroplasty recommendation. Of 670 members emailed, 109 (16%) completed the survey. Final analysis included 88 respondents. Mean years in practice was 17.2. Most respondents received formal training in urethroplasty: 43 (49%) in residency, 5 (6%) in fellowship, and 10 (11%) in both; 48 respondents (55%) had a urethroplasty surgeon in their practice, whereas 18 (20%) had a urethroplasty surgeon within 45 minutes of his or her primary practice location. The only covariate that was associated with an increased likelihood of recommending urethroplasty in ≥ three scenarios was formal urethroplasty training. Most members (68%) reported no barriers to referring patients for urethroplasty; the most common barriers cited were long distance to urethroplasty surgeon (n 5 13, 15%) and concern about complications (n 5 8, 9%). Urethroplasty continues to be underutilized in men with anterior urethral strictures, potentially due to lack of knowledge dissemination and access to a urethroplasty surgeon. Appropriate urethroplasty utilization may increase with greater exposure to urethroplasty in training.

  2. Moving toward a universally accessible web: Web accessibility and education.

    Science.gov (United States)

    Kurt, Serhat

    2017-12-08

    The World Wide Web is an extremely powerful source of information, inspiration, ideas, and opportunities. As such, it has become an integral part of daily life for a great majority of people. Yet, for a significant number of others, the internet offers only limited value due to the existence of barriers which make accessing the Web difficult, if not impossible. This article illustrates some of the reasons that achieving equality of access to the online world of education is so critical, explores the current status of Web accessibility, discusses evaluative tools and methods that can help identify accessibility issues in educational websites, and provides practical recommendations and guidelines for resolving some of the obstacles that currently hinder the achievability of the goal of universal Web access.

  3. Accelerating access to energy services: Way forward

    Directory of Open Access Journals (Sweden)

    Ibrahim Hafeezur Rehman

    2017-03-01

    Full Text Available As nearly a fifth of the world's population still lives without access to electricity and double that number with no access to modern cooking technologies, both public and private sector players have invested resources in developing infrastructure to address this energy gap. While there have been exceptional cases like China, Vietnam and Brazil, where the public sector led grid expansion achieved incredible gains in expanding access as to electricity, the general trend over the years in most developing countries has demonstrated that both public and private led approaches have been unsuccessful in independently yielding the desired acceleration and continuity to deliver universal energy access. Despite the inherent benefits of both public and private sector led initiatives, typical systemic inefficiencies and inadequate capacities in both approaches prevent them from fully addressing the principal objective of facilitating energy access for the poor in the long term. Also, even if required investments were adequately capitalized, with the current population growth rate continually outpacing the rate of interventions, the number of people who remained energy poor 15 years hence, would still be the same. Thus, not only is there is a need for providing energy access to the existing population mass, but an equal need to do it fast enough to truly reduce the number of energy poor across the globe. An alternative approach therefore needs to be explored that juxtaposes the social welfare objectives of public sector led initiatives with the enterprise development and growth objectives of the private sector, to support the creation of an enabling ecosystem and a viable value chain that successfully and effectively delivers energy solutions to the last mile. Such a pro-poor hybrid model will essentially address the inefficiencies and inadequacies of both public and private approaches and capitalize on their strengths through a complementary mix of social

  4. Preventive psychiatry: Current status in contemporary psychiatry

    Directory of Open Access Journals (Sweden)

    Rakesh Kumar Chadda

    2017-01-01

    Full Text Available Preventive psychiatry is one of the most ignored subdiscipline of psychiatry, which has got important role to play in the contemporary psychiatry. Mental disorders are very common with lifetime prevalence of about 25%, and tend to be chronic. Due to the stigma associated with mental disorders, lack of awareness, and also lack of adequate mental health resources, nearly 60%–80% of the persons suffering from mental disorders do not access mental health care services. Mental and substance use disorders have been identified as one of the major contributors to the disease-related burden and disability-adjusted life years. In this background, preventive psychiatry has an important role to play in public health sector. Since etiology of most of the mental disorders is not known, it is not possible to follow here the standard model of primary, secondary, and tertiary prevention of public health. A concept of universal, selective, and indicated prevention has been proposed in primary prevention. Preventive approaches in psychiatry focus on evidence-based risk and protective factors, promoting quality of life, reducing stressors, and improving resilience. Such interventions, when planned targeting at specific mental disorders, have a potential to prevent mental disorders. Thus, preventive psychiatry has a crucial role to play in mental health, considering the high prevalence of mental disorders, the associated disability and burden, and a great drain on human resources.

  5. Funding and Implementing Universal Access

    International Development Research Centre (IDRC) Digital Library (Canada)

    The principles for the subsidy awards are based not only on the experience of ... the best-practice model for special funding to support access to communications .... Malaysia, Russia, Mongolia and elsewhere).5 The Ugandan model uses the ...... services or serve additional areas, access to radio spectrum and lower taxes.

  6. IV access in dental practice.

    LENUS (Irish Health Repository)

    Fitzpatrick, J J

    2009-04-01

    Intravenous (IV) access is a valuable skill for dental practitioners in emergency situations and in IV sedation. However, many people feel some apprehension about performing this procedure. This article explains the basic principles behind IV access, and the relevant anatomy and physiology, as well as giving a step-by-step guide to placing an IV cannula.

  7. Research Issues in Information Access.

    Science.gov (United States)

    Molholt, Pat

    1989-01-01

    Discusses traditional library approaches to access to information and the possible impact of information technologies, library automation, and artificial intelligence. Access issues raised by these technologies are identified and a research agenda to explore these issues is outlined. (31 references) (CLB)

  8. Editorial: Next Generation Access Networks

    Science.gov (United States)

    Ruffini, Marco; Cincotti, Gabriella; Pizzinat, Anna; Vetter, Peter

    2015-12-01

    Over the past decade we have seen an increasing number of operators deploying Fibre-to-the-home (FTTH) solutions in access networks, in order to provide home users with a much needed network access upgrade, to support higher peak rates, higher sustained rates and a better and more uniform broadband coverage of the territory.

  9. Achieving universal access to broadband

    DEFF Research Database (Denmark)

    Falch, Morten; Henten, Anders

    2009-01-01

    The paper discusses appropriate policy measures for achieving universal access to broadband services in Europe. Access can be delivered by means of many different technology solutions described in the paper. This means a greater degree of competition and affects the kind of policy measures...

  10. Guidelines for Outsourcing Remote Access.

    Science.gov (United States)

    Hassler, Ardoth; Neuman, Michael

    1996-01-01

    Discusses the advantages and disadvantages of outsourcing remote access to campus computer networks and the Internet, focusing on improved service, cost-sharing, partnerships with vendors, supported protocols, bandwidth, scope of access, implementation, support, network security, and pricing. Includes a checklist for a request for proposals on…

  11. 33 CFR 326.3 - Unauthorized activities.

    Science.gov (United States)

    2010-07-01

    ... requiring permits, district engineers should make the best use of all available resources. Corps employees... required, the district engineer should consider whether serious jeopardy to life, property, or important... detrimental impacts to the satisfaction of the district engineer. (ii) No permit application will be accepted...

  12. Wearables for all : development of guidelines to stimulate accessible wearable technology design

    NARCIS (Netherlands)

    Wentzel, Jobke; Velleman, Eric; van der Geest, Thea

    2016-01-01

    In this paper, we present the rationale and approach for establishing guidelines for the development of accessible wearables. Wearable technology is increasingly integrated in our everyday lives. Therefore, ensuring accessibility is pivotal to prevent a digital divide between persons who have and

  13. Turkish-German Access to Higher Education: An Historical and Democratic Theory Analysis, 1960-2010

    Science.gov (United States)

    Gonzalez, Roger Geertz

    2012-01-01

    This article looks at access to higher education in Germany. For a number of reasons, explained in this article, higher education is presently an elite system that privileges ethnic Germans while preventing Turkish-Germans from gaining sufficient access into academe. If Germany is to become a fully functioning multicultural democracy with equal…

  14. 40 CFR 264.34 - Access to communications or alarm system.

    Science.gov (United States)

    2010-07-01

    ... FACILITIES Preparedness and Prevention § 264.34 Access to communications or alarm system. (a) Whenever... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Access to communications or alarm system. 264.34 Section 264.34 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID...

  15. 40 CFR 265.34 - Access to communications or alarm system.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Access to communications or alarm system. 265.34 Section 265.34 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID..., STORAGE, AND DISPOSAL FACILITIES Preparedness and Prevention § 265.34 Access to communications or alarm...

  16. Barriers to Accessing Good Eye Care Services in Nigeria: A Focus ...

    African Journals Online (AJOL)

    Certain forms of blindness can be prevented if the right steps and treatments are applied at the right times, but this is not always possible due to the challenges patients face in accessing eye care services. The aim of this study was to explore and identify the barriers in accessing good eye care services in Anambra State ...

  17. Access control within military C4ISR systems

    Science.gov (United States)

    Maschino, Mike

    2003-07-01

    Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) tactical battlefield systems must provide the right information and resources to the right individuals at the right time. At the same time, the C4ISR system must enforce access controls to prevent the wrong individuals from obtaining sensitive information, or consuming scarce resources. Because lives, missions and property depend upon them, these access control mechanisms must be effective, reliable, efficient and flexible. The mechanisms employed must suit the nature of the items that are to be protected, as well as the varieties of access policies that must be enforced, and the types of access that will be made to these items. Some access control technologies are inherently centralized, while others are suitable for distributed implementation. The C4ISR architect must select from among the available technologies a combination of mechanisms that eases the burden of policy administration, but is inherently survivable, accurate, resource efficient, and which provides low latency. This paper explores various alternative access enforcement mechanisms, and assesses their effectiveness in managing policy-driven access control within the battlespace.

  18. [How do Prevention Projects Reach their Target Groups? Results of a Survey with Prevention Projects].

    Science.gov (United States)

    Brand, T; Böttcher, S; Jahn, I

    2015-12-01

     The aim of this study was to assess methods used to access target groups in prevention projects funded within the prevention research framework by the German Federal Ministry of Education and Research.  A survey with prevention projects was conducted. Access strategies, communication channels, incentives, programme reach, and successful practical recruitment strategies were explored.  38 out of 60 projects took part in the survey. Most projects accessed their target group within structured settings (e. g., child day-care centers, schools, workplaces). Multiple communication channels and incentives were used, with written information and monetary incentives being used most frequently. Only few projects were able to report their programme reach adequately; programme reach was highest for programmes accessing the target groups in structured settings. The respondents viewed active recruitment via personal communication with the target group and key persons in the settings as the most successful strategy.  The paper provides an overview on recruitment strategies used in current preven-tion projects. More systematic research on programme reach is necessary. © Georg Thieme Verlag KG Stuttgart · New York.

  19. Get the right access rights!

    CERN Multimedia

    Rosaria Marraffino

    2015-01-01

    On 11 May, a major change concerning the requirements to access the CERN beam facilities was put in place and implemented in ADaMS in order to reduce the number of courses that people who need access to multiple installations have to follow. This revision includes dedicated safety training courses that replace, in particular, the “Safety during LS1” e-learning course, which is now to be considered obsolete.   CERN’s Access Distribution and Management System (ADaMS). As of 11 May, an important improvement was implemented in ADaMS (CERN’s Access Distribution and Management System) regarding the requisites to access safety zones. This change is closely related to the introduction of a generic e-learning course ("CERN Beam Facilities") covering the common risks and systems present in CERN's beam facilities. Two e-learning courses are no longer valid, nor available on the SIR (Safety Information Registration) catalogue: the &ld...

  20. Obesogenic environments: environmental approaches to obesity prevention.

    Science.gov (United States)

    Lipek, Tobias; Igel, Ulrike; Gausche, Ruth; Kiess, Wieland; Grande, Gesine

    2015-05-01

    Childhood obesity is a major concern for public health. There are multiple factors (e.g., genetic, social, and environmental) that contribute to unhealthy weight gain. Drawing from findings on "obesogenic environments" and core principles of preventive strategies to reduce health inequalities, this paper gives an overview of recent childhood prevention programs that target aspects of the physical environment ("environmental changes"). Out of the ten reviews we screened (including more than 300 studies), we identified very few that addressed aspects of the environment. We focus here on 14 programs that follow different approaches to environmental changes (e.g., access to/quality of playgrounds, changes in school cafeterias). Altering the environment offers opportunities for healthier behaviors and seems to be an effective strategy to prevent childhood obesity. However, the evaluation of those (mostly) multidimensional interventions does not allow drawing firm conclusions about the single effect of environmental changes. We conclude that obesity prevention programs should combine person-based and environmental approaches.

  1. Theory of perceived access to breast health care in African American women.

    Science.gov (United States)

    Garmon, Sandra C

    2012-01-01

    The theory presented in this article proposes an alternative view of access to care on the basis of an African American woman's perception of the necessity, availability, and appropriateness of breast health care. The theory of perceived access to breast health care in African American women may also be useful in framing future research studies exploring the relationship between access to care and utilization of primary, secondary, and tertiary clinical preventive services related to breast health care.

  2. Designing a Physical Security System for Risk Reduction in a Hypothetical Nuclear Facility

    International Nuclear Information System (INIS)

    Saleh, A.A.; Abd Elaziz, M.

    2017-01-01

    Physical security in a nuclear facility means detection, prevention and response to threat, the ft, sabotage, unauthorized access and illegal transfer involving radioactive and nuclear material. This paper proposes a physical security system designing concepts to reduce the risk associated with variant threats to a nuclear facility. This paper presents a study of the unauthorized removal and sabotage in a hypothetical nuclear facility considering deter, delay and response layers. More over, the study involves performing any required upgrading to the security system by investigating the nuclear facility layout and considering all physical security layers design to enhance the weakness for risk reduction

  3. Reflections on preventive medicine.

    Science.gov (United States)

    Miettinen, Olli S

    2014-10-01

    Having thought much about medicine in my career-long effort to understand it and the research for its advancement, I have come to views rather different form the now-prevailing ones in respect to what preventive medicine is about; what epidemiology is in relation to preventive medicine; what distinguishes preventive medicine in preventive healthcare at large; the relation of preventive medicine to public health; the concept of health promotion; and also the core principles of preventive medicine. All of these views I set forth in this article, for the readers' critical reflection. Copyright © 2014 Elsevier Inc. All rights reserved.

  4. DOE's Pollution Prevention Information Clearinghouse (EPIC)

    International Nuclear Information System (INIS)

    Otis, P.T.

    1994-05-01

    The US Department of Energy's (DOE's) Pollution Prevention Information Clearinghouse (EPIC) is a computer system intended for the exchange of pollution prevention information DOE-wide. EPIC is being developed as a distributed system that will allow access to other databases and applications. The first prototype of EPIC (Prototype I) was put on-line in January 1994. Prototype I contains information on EM-funded pollution prevention projects; relevant laws, regulations, guidance, and policy; facility and DOE contacts; and meetings and conferences. Prototype I also gives users access to the INEL Hazardous Solvent Substitution Data System (HSSDS) and to information contained on the US Environmental Protection Agency's (EPNS) Pollution Prevention Infbrmation Exchange System (PIES) as a test of the distributed system concept. An initial user group of about 35 is testing and providing feedback on Prototype I. Prototype II, with a Graphical User Interface (GUI), is planned for the end of CY94. This paper describes the current state of EPIC in terms of architecture, user interface, and information content. Plans for Prototype II and the final system are then discussed. The EPIC development effort is being coordinated with EPA and US Department of Defense (DoD) efforts to develop or upgrade their pollution prevention information exchange systems

  5. Data access performance through parallelization and vectored access. Some results

    International Nuclear Information System (INIS)

    Furano, F; Hanushevsky, A

    2008-01-01

    High Energy Physics data processing and analysis applications typically deal with the problem of accessing and processing data at high speed. Recent studies, development and test work have shown that the latencies due to data access can often be hidden by parallelizing them with the data processing, thus giving the ability to have applications which process remote data with a high level of efficiency. Techniques and algorithms able to reach this result have been implemented in the client side of the Scalla/xrootd system, and in this contribution we describe the results of some tests done in order to compare their performance and characteristics. These techniques, if used together with multiple streams data access, can also be effective in allowing to efficiently and transparently deal with data repositories accessible via a Wide Area Network

  6. Biometrics: Accessibility challenge or opportunity?

    Science.gov (United States)

    Blanco-Gonzalo, Ramon; Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael

    2018-01-01

    Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products.

  7. Biometrics: Accessibility challenge or opportunity?

    Science.gov (United States)

    Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael

    2018-01-01

    Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products. PMID:29565989

  8. Biometrics: Accessibility challenge or opportunity?

    Directory of Open Access Journals (Sweden)

    Ramon Blanco-Gonzalo

    Full Text Available Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products.

  9. Equal Access Initiative HIV/AIDS Information Resources from NLM

    Energy Technology Data Exchange (ETDEWEB)

    Templin-Branner W. and N. Dancy

    2010-09-11

    The Equal Access Initiative: HIV/AIDS Information Resources from the National Library of Medicine training is designed specifically for the National Minority AIDS Council 2010 Equal Access Initiative (EAI) Computer Grants Program awardees to provide valuable health information resources from the National Library of Medicine and other reliable sources to increase awareness of the wealth of treatment information and educational materials that are available on the Internet and to improve prevention and treatment education for their clients. These resources will also meet the needs of community-based

  10. SM18 Visits and Access

    CERN Multimedia

    2012-01-01

      VISITS The rules and conditions to be followed for visits in the SM18 Hall are laid out in the EDMS 1205328 document. No visit is allowed without prior reservation.   ACCESS Special access right is needed ONLY from 7 p.m. to 7 a.m. and during week-ends. From 1 December, the current SM18 access database will be closed and a new one “SM18-OWH outside normal hours” started from scratch. Requests, via EDH SM18-OWH, will have to be duly justified.   For further information, please contact Evelyne Delucinge.

  11. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  12. Access control system for ISABELLE

    International Nuclear Information System (INIS)

    Potter, K.; Littenberg, L.

    1977-01-01

    An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release

  13. Increasing Access to Special Collections

    Directory of Open Access Journals (Sweden)

    Ricky Erway

    2012-01-01

    Full Text Available In an environment where we increasingly have access to a collective collection of digitized books, special collections will become increasingly invisible if they are not accessible online. In an era of increasing expectations and decreasing budgets, finding ways to streamline some of our processes is the best way to enable us to do more with less. This report details a number of investigations into how access to special collections can be increased. It includes guidance running the gamut from digitization and rights management to policies and procedures.

  14. Traditional preventive treatment options

    DEFF Research Database (Denmark)

    Longbottom, C; Ekstrand, K; Zero, D

    2009-01-01

    Preventive treatment options can be divided into primary, secondary and tertiary prevention techniques, which can involve patient- or professionally applied methods. These include: oral hygiene (instruction), pit and fissure sealants ('temporary' or 'permanent'), fluoride applications (patient...... options....

  15. Preventing Pressure Sores

    Medline Plus

    Full Text Available ... L Sarah Harrison, OT Anne Bryden, OT The Role of the Social Worker after Spinal Cord Injury ... do to prevent pressure sores? play_arrow What role does diet and hydration play in preventing pressure ...

  16. Colorectal Cancer Prevention

    Science.gov (United States)

    ... Genetics of Colorectal Cancer Colorectal Cancer Screening Research Colorectal Cancer Prevention (PDQ®)–Patient Version What is prevention? Go ... to keep cancer from starting. General Information About Colorectal Cancer Key Points Colorectal cancer is a disease in ...

  17. Cancer treatment - preventing infection

    Science.gov (United States)

    ... Radiation - preventing infection; Bone marrow transplant - preventing infection; Cancer treatment - immunosuppression ... this is a short-lived side effect of cancer treatment. Your provider may give you medicines to help ...

  18. Research Areas: Prevention

    Science.gov (United States)

    NCI’s prevention research has a broad focus, from identifying environmental and lifestyle factors that influence cancer risk to studying the biology of how cancer develops and studying ways to disseminate prevention interventions.

  19. Preventing Type 2 Diabetes

    Science.gov (United States)

    ... Sexual, & Bladder Problems Clinical Trials Preventing Type 2 Diabetes Perhaps you have learned that you have a ... I lower my chances of developing type 2 diabetes? Research such as the Diabetes Prevention Program shows ...

  20. Preventing Pressure Sores

    Medline Plus

    Full Text Available ... Injury Medical Expert Videos Topics menu Topics Preventing Pressure Sores Adult Injuries Spinal Cord Injury 101 David Chen, MD Preventing Pressure Sores Mary Zeigler, MS Transition from Hospital to Home ...

  1. Prevention of gravitational collapse

    International Nuclear Information System (INIS)

    Moffat, J.W.; Taylor, J.G.

    1981-01-01

    We apply a new theory of gravitation to the question of gravitational collapse to show that collapse is prevented in this theory under very reasonable conditions. This result also extends to prevent ultimate collapse of the Universe. (orig.)

  2. Marine Pollution Prevention Act

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Marine Pollution Prevention Act of 2008 implements the International Convention for the Prevention of Pollution from Ships, including related Protocols (MARPOL)...

  3. Risk Factors and Prevention

    Science.gov (United States)

    ... Resources Risk Factors & Prevention Back to Patient Resources Risk Factors & Prevention Even people who look healthy and ... Blood Pressure , high cholesterol, diabetes, and thyroid disease. Risk Factors For Arrhythmias and Heart Disease The following ...

  4. Preventing Weight Gain

    Science.gov (United States)

    ... Local Programs Related Topics Diabetes Nutrition Preventing Weight Gain Language: English (US) Español (Spanish) Recommend on Facebook ... cancer. Choosing an Eating Plan to Prevent Weight Gain So, how do you choose a healthful eating ...

  5. Breast Cancer Prevention

    Science.gov (United States)

    ... of Breast & Gynecologic Cancers Breast Cancer Screening Research Breast Cancer Prevention (PDQ®)–Patient Version What is prevention? Go ... from starting. Risk-reducing surgery . General Information About Breast Cancer Key Points Breast cancer is a disease in ...

  6. Settings for Suicide Prevention

    Science.gov (United States)

    ... Suicide Populations Racial/Ethnic Groups Older Adults Adolescents LGBT Military/Veterans Men Effective Prevention Comprehensive Approach Identify ... Based Prevention Settings American Indian/Alaska Native Settings Schools Colleges and Universities Primary Care Emergency Departments Behavioral ...

  7. Prevent Cervical Cancer

    Science.gov (United States)

    ... professional printing [PDF-1.5MB] Cancer Home “Prevent Cervical Cancer” Infographic Language: English Español (Spanish) Recommend on Facebook Tweet Share Compartir Prevent Cervical Cancer with the Right Test at the Right Time ...

  8. Fall Prevention: Simple Tips to Prevent Falls

    Science.gov (United States)

    ... a gentle exercise that involves slow and graceful dance-like movements. Such activities reduce the risk of ... healthy-lifestyle/healthy-aging/in-depth/fall-prevention/art-20047358 . Mayo Clinic Footer Legal Conditions and Terms ...

  9. Open Access von A bis Z

    OpenAIRE

    Stieg, Kerstin; Pavlovic, Karlo

    2012-01-01

    The glossary „Open Access from A to Z“ comprises essential key terms on Open Access such as arXiv, The Berlin Declaration on Open Access to Knowledge in the Sciences and Humanities, the Budapest Open Access Initiative (BOAI), Creative Commons (CC), the Directory of Open Access Books (DOAB), the Directory of Open Access Journals (DOAJ), the Directory of Open Access Repositories (OpenDOAR), the EU project Digital Repository Infrastructure Vision for European Research (DRIVER), the Finch Report,...

  10. Cancer risks and prevention

    International Nuclear Information System (INIS)

    Vessey, M.P.; Gray, M.

    1985-01-01

    A series of essays in honour of Sir Richard Doll is presented. Chapters cover the preventability of cancer, geography, smoking, diet, occupation, radiation, infections and immune impairment, exogenous and endogenous hormones, other drugs, prevention through legislation and by education and cancer risks and prevention in the Third World. The chapter on radiation has been indexed separately. (UK)

  11. Statewide Suicide Prevention Council

    Science.gov (United States)

    State Employees Statewide Suicide Prevention Council DHSS State of Alaska Home Divisions and Agencies National Suicide Prevention Lifeline Alaska Community Mental Health Centers National Survivors of Suicide Meetings Presentations 2010 Alaska Statewide Suicide Prevention Summit: Mending the Net Connect with us on

  12. Prevention IS Care

    Centers for Disease Control (CDC) Podcasts

    2009-03-26

    This podcast provides an overview of the Prevention IS Care campaign, which provides HIV prevention tools for medical care providers to use on a daily basis with patients who are living with HIV.  Created: 3/26/2009 by National Center for HIV/AIDS, Viral Hepatitis, STD, and TB Prevention (NCHHSTP).   Date Released: 3/26/2009.

  13. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  14. Perceptual integration without conscious access.

    Science.gov (United States)

    Fahrenfort, Johannes J; van Leeuwen, Jonathan; Olivers, Christian N L; Hogendoorn, Hinze

    2017-04-04

    The visual system has the remarkable ability to integrate fragmentary visual input into a perceptually organized collection of surfaces and objects, a process we refer to as perceptual integration. Despite a long tradition of perception research, it is not known whether access to consciousness is required to complete perceptual integration. To investigate this question, we manipulated access to consciousness using the attentional blink. We show that, behaviorally, the attentional blink impairs conscious decisions about the presence of integrated surface structure from fragmented input. However, despite conscious access being impaired, the ability to decode the presence of integrated percepts remains intact, as shown through multivariate classification analyses of electroencephalogram (EEG) data. In contrast, when disrupting perception through masking, decisions about integrated percepts and decoding of integrated percepts are impaired in tandem, while leaving feedforward representations intact. Together, these data show that access consciousness and perceptual integration can be dissociated.

  15. Benin - Access to Land - Urban

    Data.gov (United States)

    Millennium Challenge Corporation — This is not a performance evaluation by an independent evaluator, but rather a review by the MCC former Benin Access to Land Project Lead of project implementation,...

  16. Electric Energy Access in Bangladesh

    Directory of Open Access Journals (Sweden)

    Muhammad Taheruzzaman

    2016-07-01

    Full Text Available This paper represents the overall electrical energy profile and access in Bangladesh. In the recent past Bangladesh has been experiencing shortage of electricity, and about 42 % of population no access to the electricity. The electricity consumption has rapidly increased over last decade. The demand and consumption will intensify in the remote future as overall development and future growth. To set “vision 2021” of Bangladesh; government of Bangladesh has devoted to ensuring access of affordable and reliable electricity for all by 2021. In the modern time, energy is the vital ingredient for socioeconomic growth in the developing country i.e., alleviating poverty. Along with electricity access in Bangladesh strived to become middle income country by 2021. Bangladesh has experienced that energy consumption inclines to increase rapidly when per capita income researches between US$ 1,000 and US$ 10,000, and a country’s

  17. Open Access Myths and Realities

    Directory of Open Access Journals (Sweden)

    Francisco José GARCÍA-PEÑALVO

    2017-04-01

    Full Text Available The first editorial of EKS volume 18 retakes a recurrent theme in this journal: the Open Access, in this case to reflect on some of the myths that are still very ingrained in the scientific community.

  18. Charter Halibut Limited Access Program

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This limited access system limits the number of charter vessels that may participate in the guided sport fishery for halibut in area 2C and 3A. NMFS issues a charter...

  19. Water Access Sites in Minnesota

    Data.gov (United States)

    Minnesota Department of Natural Resources — This data shows the approximate locations of boat accesses in the state. This is not a comprehensive list but one that was generated through a cooperative effort....

  20. Accessible Electronic and Information Technology

    Science.gov (United States)

    This Policy establishes EPA's responsibilities and procedures for making its Electronic and Information Technology (EIT) products accessible to all people, including people with disabilities, in accordance with Section 508 of the Rehabilitation Act.

  1. Assuring Access to Affordable Coverage

    Data.gov (United States)

    U.S. Department of Health & Human Services — Under the Affordable Care Act, millions of uninsured Americans will gain access to affordable coverage through Affordable Insurance Exchanges and improvements in...

  2. MCBS Access to Care PUF

    Data.gov (United States)

    U.S. Department of Health & Human Services — The MCBS 2013 Access to Care public use file (MCBS PUF) provides the first publically available MCBS file for researchers interested in the health, health care use,...

  3. 77 FR 38467 - Special Conditions: Gulfstream Aerospace LP (GALP), Model Gulfstream G280 Airplane; Isolation or...

    Science.gov (United States)

    2012-06-28

    ... Gulfstream G280 Airplane; Isolation or Aircraft Electronic System Security Protection From Unauthorized... airplane systems and the passenger entertainment services. Applicability As discussed above, these special... Aircraft Electronic System Security Protection from Unauthorized Internal Access. The applicant must ensure...

  4. Improving Reliability of Information Leakage Detection and Prevention Systems

    Directory of Open Access Journals (Sweden)

    A. V. Mamaev

    2011-03-01

    Full Text Available The problem of protection from deliberate leaks of information is one of the most difficult. Integrated systems of information protection against insider have a serious drawback. Using this disadvantage the offender receives the possibility of unauthorized theft of information from working machine.

  5. [Online gaming. Potential risk and prevention programs].

    Science.gov (United States)

    Malischnig, Doris

    2014-12-01

    Online gaming is more and more common and increasingly accessible. Due to a lack of social control the participation could be a potential risk for certain customers. The given article focuses on prevention measures that are provided by the Austrian online gaming operator, the Austrian Lotteries, provider of the online gaming platform win2day, in the light of the specifics of Internet gaming in order to avoid problems with gaming.

  6. Minimum Release of Tributyltin to Prevent Macrofouling

    Science.gov (United States)

    1990-10-01

    Thain, J.E., M.J. Waldock, and M.E. Wait, Toxicity and degradation studies of Tributyltin ( TBT ) and Dibutyltin (DBT) in the aquatic environment, in...MATERIALS AND METHODS The test system used was designed to pump a known volume of a tributyltin ( TBT ) solution of known concentration through a porous...ELEMENT NO NO NO ACCESSION NO 11 TITLE (Include Security Classification) nimum Release of Tributyltin to Prevent Macrofoulinq 12 PERSONAL AUTHOR(S

  7. Textual information access statistical models

    CERN Document Server

    Gaussier, Eric

    2013-01-01

    This book presents statistical models that have recently been developed within several research communities to access information contained in text collections. The problems considered are linked to applications aiming at facilitating information access:- information extraction and retrieval;- text classification and clustering;- opinion mining;- comprehension aids (automatic summarization, machine translation, visualization).In order to give the reader as complete a description as possible, the focus is placed on the probability models used in the applications

  8. Global Web Accessibility Analysis of National Government Portals and Ministry Web Sites

    DEFF Research Database (Denmark)

    Goodwin, Morten; Susar, Deniz; Nietzio, Annika

    2011-01-01

    Equal access to public information and services for all is an essential part of the United Nations (UN) Declaration of Human Rights. Today, the Web plays an important role in providing information and services to citizens. Unfortunately, many government Web sites are poorly designed and have...... accessibility barriers that prevent people with disabilities from using them. This article combines current Web accessibility benchmarking methodologies with a sound strategy for comparing Web accessibility among countries and continents. Furthermore, the article presents the first global analysis of the Web...... accessibility of 192 United Nation Member States made publically available. The article also identifies common properties of Member States that have accessible and inaccessible Web sites and shows that implementing antidisability discrimination laws is highly beneficial for the accessibility of Web sites, while...

  9. Improving access to emergency contraceptive pills.

    Science.gov (United States)

    1999-09-01

    This article focuses on the accessibility of emergency contraceptive pills (ECPs). The ECPs are safe, simple, and effective contraceptive agent that can reduce a woman's chance of becoming pregnant by 75%. It works by preventing or delaying ovulation, interfering with fertilization, or blocking implantation of a fertilized egg, depending on when in the menstrual cycle the pills are taken. The Population Council takes a multifaceted approach to expanding access to and knowledge on emergency contraception. Studies on innovations in service delivery are being conducted. In Mexico, one-tenth of women aged 13-55 who reported being raped during the 9-month study were counseled about ECPs. Results showed that pregnancies from reported rapes declined from 9.8% to 7.4% during the study. In Ho Chi Minh City, Vietnam, practitioners approved of the use of emergency contraception and desired more accurate knowledge so that they could provide it effectively. Moreover, in Zambia, researchers found out that giving women packages of ECPs in advance greatly reduced the length of time between having unprotected intercourse and beginning ECP treatment. Council researchers have also addressed the safety of offering ECPs without prescription. They have collaborated with leaders in the health care industry to increase method availability.

  10. [Prevention of mental disorders].

    Science.gov (United States)

    Riedel-Heller, Steffi; Gühne, Uta

    2013-12-01

    Investment in prevention is a major public health requirement. Mental disorders are common and are associated with severe consequences. They are a major target for prevention. Based on vulnerabilitiy-stress-models the theoretical background for prevention in mental disorders is outlined. Effective strategies for children, adolescents, adults and individuals in old age do exist. Results regarding the prevention of depres-sion and psychoses are outlined and risk groups which require current actions are determined. Current activities towards a national prevention strategy in Germany are discussed. © Georg Thieme Verlag KG Stuttgart · New York.

  11. Raising Awareness of Cybercrime--The Use of Education as a Means of Prevention and Protection

    Science.gov (United States)

    Bele, Julija Lapuh; Dimc, Maja; Rozman, David; Jemec, Andreja Sladoje

    2014-01-01

    The widespread use of mobile devices that enable Internet access increases the exposure of both individuals and organizations to cybercrime. This article addresses the issue of strategic prevention of cybercrime with the key focus on the measures to prevent cybercrime related to children and teenagers. The primary tool for such prevention is…

  12. 77 FR 4561 - Meeting of the Community Preventive Services Task Force

    Science.gov (United States)

    2012-01-30

    ... Disease, Mental Health, and Alcohol. Meeting Accessibility: This meeting is open to the public, limited... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Meeting of the Community Preventive Services Task Force AGENCY: Centers for Disease Control and Prevention (CDC...

  13. Prevention Of Stroke

    Directory of Open Access Journals (Sweden)

    Nagaraja D

    2005-01-01

    Full Text Available Stroke is an important cause for neurological morbidity and mortality. Prevention of ischemic stroke involves identification and prevention of risk factors and optimal use of pharmacotherapy. Risk factors have been classified as modifiable and non-modifiable; control of modifiable factors should prevent stroke occurrence. Stroke prevention has been described at three levels: primary, secondary and tertiary. Prolonged hypertension increases an individual′s risk for developing fatal or nonfatal stroke by three times and its control has been shown to prevent stroke. Diabetes mellitus is an important cause for microangiopathy and predisposes to stroke. Statin trials have shown significant reduction in stroke in those who were treated with statins. Stroke risk can be reduced by avoiding tobacco use, control of obesity and avoiding sedentary life style. Anti platelet medications are effective for secondary prevention of stroke. Educating society regarding modifiable risk factors and optimal use of pharmacotherapy form the cornerstone for the prevention of stroke.

  14. Accessing patient-centered care using the advanced access model.

    Science.gov (United States)

    Tantau, Catherine

    2009-01-01

    Waits and delays for healthcare are legendary. These delays are not only frustrating and potentially hazardous for patients and providers but also represent significant cost to office practices. The traditional medical model that defines urgent care versus routine care is a vain and futile attempt to sort demand. This approach is at constant odds with patients' definition of urgency. Trusting patients to determine when and how they want to access care makes sense from a customer service perspective. If approached systematically using the principles of Advanced Access, patient demand patterns can be tracked to forecast demand. These demand patterns become the template for deploying the resources necessary to meet patients' needs. Although not a simple journey, the transformation to Advanced Access provides an entree to patient-centered care where patients can say, "I get exactly the care I want and need, when I want and need it."

  15. HIV/AIDS programmes should focus on improved access.

    Science.gov (United States)

    Manning, A

    2000-10-14

    This paper discusses the need for HIV/AIDS programs in sub-Saharan countries to focus more on improved access to information to empower poor people living in remote areas. It is noted that despite Glaxo Wellcome's move to reduce the cost of antiretroviral therapy, it is unlikely to have an impact on most of those infected with or affected by HIV/AIDS, since concerns regarding lack of sustainability, bureaucratic administration, and communication difficulties predominate in the country. In this regard, it is therefore recommended that national HIV/AIDS programs be balanced with the needs of both the community and the individual and in prevention and care. Health workers should be explicit in confronting traditional beliefs, such as those about gender roles and traditional medicine, in prevention campaigns. Moreover, there is also an urgent need to improve access to condoms; strengthen health programs such as directly observed treatment short-term (DOTS) courses for tuberculosis and the syndromic approach to sexually transmitted disease treatment; and improve practical support to communities caring for those who are sick and the orphans. Lastly, all partners working with prevention programs should use the more positive community attitudes towards HIV/AIDS issues seen in many sub-Saharan countries to develop evidence-based programs that focus more on improved access and less on sustainability.

  16. [Gender inequity in the access to health care in Chile].

    Science.gov (United States)

    Vega, Jeanette; Bedregal, Paula; Jadue, Liliana; Delgado, Iris

    2003-06-01

    In the last two decades, Chile has experienced advances in economical development and global health indicators. However, gender inequities persist in particular related to access to health services and financing of health insurance. To examine gender inequities in the access to health care in Chile. An analysis of data obtained from a serial national survey applied to assess social policies (CASEN) carried out by the Ministry of Planning. During the survey 45,379 and 48,107 dwellings were interviewed in 1994 and in 1998, respectively. Women use health services 1.5 times more often, their salaries are 30% lower in all socioeconomic strata. Besides, in the private health sector, women pay higher insurance premiums than men. Men of less than two years of age have 2.5 times more preventive consultations than girls. This difference, although of lesser magnitude, is also observed in people over 60 years. Women of high income quintiles and users of private health insurance have a better access to preventive consultations but not to specialized care. An improvement in equitable access of women to health care and financing is recommended. Also, monitoring systems to survey these indicators for women should improve their efficiency.

  17. Vascular access for home haemodialysis.

    Science.gov (United States)

    Al Shakarchi, Julien; Day, C; Inston, N

    2018-03-01

    Home haemodialysis has been advocated due to improved quality of life. However, there are very little data on the optimum vascular access for it. A retrospective cohort study was carried on all patients who initiated home haemodialysis between 2011 and 2016 at a large university hospital. Access-related hospital admissions and interventions were used as primary outcome measures. Our cohort consisted of 74 patients. On initiation of home haemodialysis, 62 individuals were using an arteriovenous fistula as vascular access, while the remaining were on a tunnelled dialysis catheter. Of the 12 patients who started on a tunnelled dialysis catheter, 5 were subsequently converted to either an arteriovenous fistula ( n = 4) or an arteriovenous graft ( n = 1). During the period of home haemodialysis use, four arteriovenous fistula failed or thrombosed with patients continuing on home haemodialysis using an arteriovenous graft ( n = 3) or a tunnelled dialysis catheter ( n = 1). To maintain uninterrupted home haemodialysis, interventional rates were 0.32 per arteriovenous fistula/arteriovenous graft access-year and 0.4 per tunnelled dialysis catheter access-year. Hospital admission rates for patients on home haemodialysis were 0.33 per patient-year. Our study has shown that home haemodialysis can be safely and independently performed at home within a closely managed home haemodialysis programme. The authors also advocate the use of arteriovenous fistulas for this cohort of patients due to both low complication and intervention rates.

  18. Pressure ulcer prevention in care home settings.

    Science.gov (United States)

    Ellis, Michael

    2017-03-31

    Pressure ulcer prevention in the care home setting can be challenging and is often compromised by a lack of access to education and resources. There are measures that have been shown to consistently improve outcomes in pressure ulcer prevention including assessment of the patient and their individual risks, delivery of a consistent plan of care that meets patients' needs, and regular evaluation to identify shortfalls. In addition, there should be a robust approach to investigating events that lead to a person developing a pressure ulcer and that information should be used to improve future practice. Pressure ulcer prevention in care homes is achievable and nurses should all be aware of the necessary measures detailed in this article.

  19. Three essays on access pricing

    Science.gov (United States)

    Sydee, Ahmed Nasim

    In the first essay, a theoretical model is developed to determine the time path of optimal access price in the telecommunications industry. Determining the optimal access price is an important issue in the economics of telecommunications. Setting a high access price discourages potential entrants; a low access price, on the other hand, amounts to confiscation of private property because the infrastructure already built by the incumbent is sunk. Furthermore, a low access price does not give the incumbent incentives to maintain the current network and to invest in new infrastructures. Much of the existing literature on access pricing suffers either from the limitations of a static framework or from the assumption that all costs are avoidable. The telecommunications industry is subject to high stranded costs and, therefore, to address this issue a dynamic model is imperative. This essay presents a dynamic model of one-way access pricing in which the compensation involved in deregulatory taking is formalized and then analyzed. The short run adjustment after deregulatory taking has occurred is carried out and discussed. The long run equilibrium is also analyzed. A time path for the Ramsey price is shown as the correct dynamic price of access. In the second essay, a theoretical model is developed to determine the time path of optimal access price for an infrastructure that is characterized by congestion and lumpy investment. Much of the theoretical literature on access pricing of infrastructure prescribes that the access price be set at the marginal cost of the infrastructure. In proposing this rule of access pricing, the conventional analysis assumes that infrastructure investments are infinitely divisible so that it makes sense to talk about the marginal cost of investment. Often it is the case that investments in infrastructure are lumpy and can only be made in large chunks, and this renders the marginal cost concept meaningless. In this essay, we formalize a model of

  20. Preventing dance injuries: current perspectives

    Directory of Open Access Journals (Sweden)

    Russell JA

    2013-09-01

    Full Text Available Jeffrey A Russell Division of Athletic Training, School of Applied Health Sciences and Wellness, Ohio University, Athens, OH, USA Abstract: Dancers are clearly athletes in the degree to which sophisticated physical capacities are required to perform at a high level. The standard complement of athletic attributes – muscular strength and endurance, anaerobic and aerobic energy utilization, speed, agility, coordination, motor control, and psychological readiness – all are essential to dance performance. In dance, as in any athletic activity, injuries are prevalent. This paper presents the research background of dance injuries, characteristics that distinguish dance and dancers from traditional sports and athletes, and research-based perspectives into how dance injuries can be reduced or prevented, including the factors of physical training, nutrition and rest, flooring, dancing en pointe, and specialized health care access for dancers. The review concludes by offering five essential components for those involved with caring for dancers that, when properly applied, will assist them in decreasing the likelihood of dance-related injury and ensuring that dancers receive optimum attention from the health care profession: (1 screening; (2 physical training; (3 nutrition and rest; (4 specialized dance health care; and (5 becoming acquainted with the nature of dance and dancers. Keywords: dance, injuries, injury prevention, fitness, wellness, health