WorldWideScience

Sample records for providing user access

  1. Workshop AccessibleTV "Accessible User Interfaces for Future TV Applications"

    Science.gov (United States)

    Hahn, Volker; Hamisu, Pascal; Jung, Christopher; Heinrich, Gregor; Duarte, Carlos; Langdon, Pat

    Approximately half of the elderly people over 55 suffer from some type of typically mild visual, auditory, motor or cognitive impairment. For them interaction, especially with PCs and other complex devices is sometimes challenging, although accessible ICT applications could make much of a difference for their living quality. Basically they have the potential to enable or simplify participation and inclusion in their surrounding private and professional communities. However, the availability of accessible user interfaces being capable to adapt to the specific needs and requirements of users with individual impairments is very limited. Although there are a number of APIs [1, 2, 3, 4] available for various platforms that allow developers to provide accessibility features within their applications, today none of them provides features for the automatic adaptation of multimodal interfaces being capable to automatically fit the individual requirements of users with different kinds of impairments. Moreover, the provision of accessible user interfaces is still expensive and risky for application developers, as they need special experience and effort for user tests. Today many implementations simply neglect the needs of elderly people, thus locking out a large portion of their potential users. The workshop is organized as part of the dissemination activity for the European-funded project GUIDE "Gentle user interfaces for elderly people", which aims to address this situation with a comprehensive approach for the realization of multimodal user interfaces being capable to adapt to the needs of users with different kinds of mild impairments. As application platform, GUIDE will mainly target TVs and Set-Top Boxes, such as the emerging Connected-TV or WebTV platforms, as they have the potential to address the needs of the elderly users with applications such as for home automation, communication or continuing education.

  2. Demand access communications for TDRSS users

    Science.gov (United States)

    Zillig, David; Weinberg, Aaron; Mcomber, Robert

    1994-01-01

    The Tracking and Data Relay Satellite System (TDRSS) has long been used to provide reliable low and high-data rate relay services between user spacecraft in Earth orbit and the ground. To date, these TDRSS services have been implemented via prior scheduling based upon estimates of user needs and mission event timelines. While this approach may be necessary for large users that require greater amounts of TDRSS resources, TDRSS can potentially offer the planned community of smaller science missions (e.g., the small explorer missions), and other emerging users, the unique opportunity for services on demand. In particular, innovative application of the existing TDRSS Multiple Access (MA) subsystem, with its phased array antenna, could be used to implement true demand access services without modification to either the TDRSS satellites or the user transponder, thereby introducing operational and performance benefits to both the user community and the Space Network. In this paper, candidate implementations of demand access service via the TDRSS MA subsystem are examined in detail. Both forward and return link services are addressed and a combination of qualitative and quantitative assessments are provided. The paper also identifies further areas for investigation in this ongoing activity that is being conducted by GSFC/Code 531 under the NASA Code O Advanced Systems Program.

  3. User's guide for remote access of the Performance Assessment Center

    International Nuclear Information System (INIS)

    Peterson, C.R.; Kostelnik, K.M.

    1991-03-01

    The Performance Assessment Center (PAC) was established by the Department of Energy's National Low-Level Waste Management Program to provide technical assistance to support the development of low-level radioactive waste disposal facilities. This user's manual provides guidance to remote users of the PAC. Information is presented on how remote users may most effectively access and use the systems available at the Performance Assessment Center in Idaho Falls, Idaho. Access requirements and operating procedures are presented to assist the first-time PAC user. This manual also provides brief descriptions of each code available on the system

  4. Rural providers' access to online resources: a randomized controlled trial

    Science.gov (United States)

    Hall, Laura J.; McElfresh, Karen R.; Warner, Teddy D.; Stromberg, Tiffany L.; Trost, Jaren; Jelinek, Devin A.

    2016-01-01

    Objective The research determined the usage and satisfaction levels with one of two point-of-care (PoC) resources among health care providers in a rural state. Methods In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants' attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA), paired t tests, and Cohen's d statistic to compare pre- and post-study effects sizes. Results Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to “about right amounts of information” at the completion of the study. DynaMed users reported a Cohen's d increase of +1.50 compared to AccessMedicine users' reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen's d. Conclusion Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine. PMID:26807050

  5. National Radiobiology Archives Distributed Access User`s Manual, Version 1.1. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Smith, S.K.; Prather, J.C.; Ligotke, E.K.; Watson, C.R.

    1992-06-01

    This supplement to the NRA Distributed Access User`s manual (PNL-7877), November 1991, describes installation and use of Version 1.1 of the software package; this is not a replacement of the previous manual. Version 1.1 of the NRA Distributed Access Package is a maintenance release. It eliminates several bugs, and includes a few new features which are described in this manual. Although the appearance of some menu screens has changed, we are confident that the Version 1.0 User`s Manual will provide an adequate introduction to the system. Users who are unfamiliar with Version 1.0 may wish to experiment with that version before moving on to Version 1.1.

  6. Regional Disparities in Online Map User Access Volume and Determining Factors

    Science.gov (United States)

    Li, R.; Yang, N.; Li, R.; Huang, W.; Wu, H.

    2017-09-01

    The regional disparities of online map user access volume (use `user access volume' in this paper to indicate briefly) is a topic of growing interest with the increment of popularity in public users, which helps to target the construction of geographic information services for different areas. At first place we statistically analysed the online map user access logs and quantified these regional access disparities on different scales. The results show that the volume of user access is decreasing from east to the west in China as a whole, while East China produces the most access volume; these cities are also the crucial economic and transport centres. Then Principal Component Regression (PCR) is applied to explore the regional disparities of user access volume. A determining model for Online Map access volume is proposed afterwards, which indicates that area scale is the primary determining factor for regional disparities, followed by public transport development level and public service development level. Other factors like user quality index and financial index have very limited influence on the user access volume. According to the study of regional disparities in user access volume, map providers can reasonably dispatch and allocate the data resources and service resources in each area and improve the operational efficiency of the Online Map server cluster.

  7. National Radiobiology Archives Distributed Access user's manual

    International Nuclear Information System (INIS)

    Watson, C.; Smith, S.; Prather, J.

    1991-11-01

    This User's Manual describes installation and use of the National Radiobiology Archives (NRA) Distributed Access package. The package consists of a distributed subset of information representative of the NRA databases and database access software which provide an introduction to the scope and style of the NRA Information Systems

  8. Providing the Public with Online Access to Large Bibliographic Data Bases.

    Science.gov (United States)

    Firschein, Oscar; Summit, Roger K.

    DIALOG, an interactive, computer-based information retrieval language, consists of a series of computer programs designed to make use of direct access memory devices in order to provide the user with a rapid means of identifying records within a specific memory bank. Using the system, a library user can be provided access to sixteen distinct and…

  9. OPACs: The User and Subject Access.

    Science.gov (United States)

    Carson, Elizabeth

    1985-01-01

    This survey of the literature reveals user and professional opinions of changes in subject access features available for online public access catalogs. Highlights include expanded access to fields already incorporated into traditional MARC record, access to context of the record, and design of the user interface. Twenty-four references are cited.…

  10. NASA Access Mechanism - Graphical user interface information retrieval system

    Science.gov (United States)

    Hunter, Judy F.; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited by factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  11. NASA access mechanism: Graphical user interface information retrieval system

    Science.gov (United States)

    Hunter, Judy; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited to factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  12. Enabling Accessibility Through Model-Based User Interface Development.

    Science.gov (United States)

    Ziegler, Daniel; Peissner, Matthias

    2017-01-01

    Adaptive user interfaces (AUIs) can increase the accessibility of interactive systems. They provide personalized display and interaction modes to fit individual user needs. Most AUI approaches rely on model-based development, which is considered relatively demanding. This paper explores strategies to make model-based development more attractive for mainstream developers.

  13. Security of social network credentials for accessing course portal: Users' experience

    Science.gov (United States)

    Katuk, Norliza; Fong, Choo Sok; Chun, Koo Lee

    2015-12-01

    Social login (SL) has recently emerged as a solution for single sign-on (SSO) within the web and mobile environments. It allows users to use their existing social network credentials (SNC) to login to third party web applications without the need to create a new identity in the intended applications' database. Although it has been used by many web application providers, its' applicability in accessing learning materials is not yet fully investigated. Hence, this research aims to explore users' (i.e., instructors' and students') perception and experience on the security of SL for accessing learning contents. A course portal was developed for students at a higher learning institution and it provides two types of user authentications (i) traditional user authentication, and (ii) SL facility. Users comprised instructors and students evaluated the login facility of the course portal through a controlled lab experimental study following the within-subject design. The participants provided their feedback in terms of the security of SL for accessing learning contents. The study revealed that users preferred to use SL over the traditional authentication, however, they concerned on the security of SL and their privacy.

  14. Enabling web users and developers to script accessibility with Accessmonkey.

    Science.gov (United States)

    Bigham, Jeffrey P; Brudvik, Jeremy T; Leung, Jessica O; Ladner, Richard E

    2009-07-01

    Efficient web access remains elusive for blind computer users. Previous efforts to improve web accessibility have focused on developer awareness, automated improvement, and legislation, but these approaches have left remaining concerns. First, while many tools can help produce accessible content, most are difficult to integrate into existing developer workflows and rarely offer specific suggestions that developers can implement. Second, tools that automatically improve web content for users generally solve specific problems and are difficult to combine and use on a diversity of existing assistive technology. Finally, although blind web users have proven adept at overcoming the shortcomings of the web and existing tools, they have been only marginally involved in improving the accessibility of their own web experience. In a step toward addressing these concerns, we have developed Accessmonkey, a common scripting framework that web users, web developers and web researchers can use to collaboratively improve accessibility. This framework advances the idea that Javascript and dynamic web content can be used to improve inaccessible content instead of being a cause of it. Using Accessmonkey, web users and developers on different platforms and with potentially different goals can collaboratively make the web more accessible. In this article, we first present the design of the Accessmonkey framework and offer several example scripts that demonstrate the utility of our approach. We conclude by discussing possible future extensions that will provide easy access to scripts as users browse the web and enable non-technical blind users to independently create and share improvements.

  15. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  16. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  17. Providing Access and Visualization to Global Cloud Properties from GEO Satellites

    Science.gov (United States)

    Chee, T.; Nguyen, L.; Minnis, P.; Spangenberg, D.; Palikonda, R.; Ayers, J. K.

    2015-12-01

    Providing public access to cloud macro and microphysical properties is a key concern for the NASA Langley Research Center Cloud and Radiation Group. This work describes a tool and method that allows end users to easily browse and access cloud information that is otherwise difficult to acquire and manipulate. The core of the tool is an application-programming interface that is made available to the public. One goal of the tool is to provide a demonstration to end users so that they can use the dynamically generated imagery as an input into their own work flows for both image generation and cloud product requisition. This project builds upon NASA Langley Cloud and Radiation Group's experience with making real-time and historical satellite cloud product imagery accessible and easily searchable. As we see the increasing use of virtual supply chains that provide additional value at each link there is value in making satellite derived cloud product information available through a simple access method as well as allowing users to browse and view that imagery as they need rather than in a manner most convenient for the data provider. Using the Open Geospatial Consortium's Web Processing Service as our access method, we describe a system that uses a hybrid local and cloud based parallel processing system that can return both satellite imagery and cloud product imagery as well as the binary data used to generate them in multiple formats. The images and cloud products are sourced from multiple satellites and also "merged" datasets created by temporally and spatially matching satellite sensors. Finally, the tool and API allow users to access information that spans the time ranges that our group has information available. In the case of satellite imagery, the temporal range can span the entire lifetime of the sensor.

  18. National Radiobiology Archives Distributed Access user's manual

    Energy Technology Data Exchange (ETDEWEB)

    Watson, C.; Smith, S. (Pacific Northwest Lab., Richland, WA (United States)); Prather, J. (Linfield Coll., McMinnville, OR (United States))

    1991-11-01

    This User's Manual describes installation and use of the National Radiobiology Archives (NRA) Distributed Access package. The package consists of a distributed subset of information representative of the NRA databases and database access software which provide an introduction to the scope and style of the NRA Information Systems.

  19. Design Strategies for Efficient Access to Mobile Device Users via Amazon Mechanical Turk

    OpenAIRE

    Jacques, Jason; Kristensson, Per Ola

    2017-01-01

    It is often challenging to access a pool of mobile device users and instruct them to perform an interactive task. Yet such data is often vital to provide design insight at various stages of the design process of a mobile application, service or system. We propose accessing a pool of mobile device users via the microtask market Amazon Mechanical Turk (MTurk). While mobile device users are still a minority on MTurk, they provide unique opportunities for requesters. Not only does catering to mob...

  20. User Management with LDAP(Light weight Directory Access Protocolfor access to technology and Information Services in Companies

    Directory of Open Access Journals (Sweden)

    José Teodoro Mejía Viteri

    2016-08-01

    Full Text Available This research aims to conduct an analysis of management services information and users with LDAP (Lightweight / Simplified Directory Access Protocol, their interaction with other technology services company, allowing it to be accessed through a single user and password. This study allowed us to collect information through a literature review on the LDAP service and its ability to interact with your user directory Open source technology services; also with Windows Server and Active Directory service is used by companies for their ease of management and access resources on Windows clients; is intended to provide an alternative for the implementation of each of the services required by public and private companies with tools free use and access to services for management and administration can be done by integrating or synchronizing with the directory LDAP.

  1. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  2. Public service providers and users in the information society

    Directory of Open Access Journals (Sweden)

    Bernt Krohn Solvang

    2015-03-01

    Full Text Available The issue to be discussed in this article is to what extent does ICT create new challenges for the relationship between public service providers and users? It is important to recognize the concept of social capital because the concept is vital to the understanding of access to the information society and efficient functioning of government in its service to citizens. In this way we see social capital as a mediating “institution” between public authorities and the citizens (users.

  3. Accessibility of dynamic web applications with emphasis on visually impaired users

    Directory of Open Access Journals (Sweden)

    Kingsley Okoye

    2014-09-01

    Full Text Available As the internet is fast migrating from static web pages to dynamic web pages, the users with visual impairment find it confusing and challenging when accessing the contents on the web. There is evidence that dynamic web applications pose accessibility challenges for the visually impaired users. This study shows that a difference can be made through the basic understanding of the technical requirement of users with visual impairment and addresses a number of issues pertinent to the accessibility needs for such users. We propose that only by designing a framework that is structurally flexible, by removing unnecessary extras and thereby making every bit useful (fit-for-purpose, will visually impaired users be given an increased capacity to intuitively access e-contents. This theory is implemented in a dynamic website for the visually impaired designed in this study. Designers should be aware of how the screen reading software works to enable them make reasonable adjustments or provide alternative content that still corresponds to the objective content to increase the possibility of offering faultless service to such users. The result of our research reveals that materials can be added to a content repository or re-used from existing ones by identifying the content types and then transforming them into a flexible and accessible one that fits the requirements of the visually impaired through our method (no-frill + agile methodology rather than computing in advance or designing according to a given specification.

  4. The Net Neutrality Debate: Analysis of economic implications of net neutrality on internet service providers, content providers and internet users

    OpenAIRE

    Møinichen, Jørgen

    2014-01-01

    This thesis studies the economic implications of a transition from a neutral to a non-neutral network. A mathematical model with an end to end ecosystem is developed, which includes a backbone internet service provider that provides connectivity for the content providers. The model also includes internet users that pay an access internet service provider for connectivity to interact with the content providers, advertisers that pay the content providers, and access internet service providers t...

  5. Sci-Hub provides access to nearly all scholarly literature.

    Science.gov (United States)

    Himmelstein, Daniel S; Romero, Ariel Rodriguez; Levernier, Jacob G; Munro, Thomas Anthony; McLaughlin, Stephen Reid; Greshake Tzovaras, Bastian; Greene, Casey S

    2018-03-01

    The website Sci-Hub enables users to download PDF versions of scholarly articles, including many articles that are paywalled at their journal's site. Sci-Hub has grown rapidly since its creation in 2011, but the extent of its coverage has been unclear. Here we report that, as of March 2017, Sci-Hub's database contains 68.9% of the 81.6 million scholarly articles registered with Crossref and 85.1% of articles published in toll access journals. We find that coverage varies by discipline and publisher, and that Sci-Hub preferentially covers popular, paywalled content. For toll access articles, we find that Sci-Hub provides greater coverage than the University of Pennsylvania, a major research university in the United States. Green open access to toll access articles via licit services, on the other hand, remains quite limited. Our interactive browser at https://greenelab.github.io/scihub allows users to explore these findings in more detail. For the first time, nearly all scholarly literature is available gratis to anyone with an Internet connection, suggesting the toll access business model may become unsustainable. © 2018, Himmelstein et al.

  6. Bring Your Own Device - Providing Reliable Model of Data Access

    Directory of Open Access Journals (Sweden)

    Stąpór Paweł

    2016-10-01

    Full Text Available The article presents a model of Bring Your Own Device (BYOD as a model network, which provides the user reliable access to network resources. BYOD is a model dynamically developing, which can be applied in many areas. Research network has been launched in order to carry out the test, in which as a service of BYOD model Work Folders service was used. This service allows the user to synchronize files between the device and the server. An access to the network is completed through the wireless communication by the 802.11n standard. Obtained results are shown and analyzed in this article.

  7. Effects of accessible website design on nondisabled users: age and device as moderating factors.

    Science.gov (United States)

    Schmutz, Sven; Sonderegger, Andreas; Sauer, Juergen

    2018-05-01

    This study examined how implementing recommendations from Web accessibility guidelines affects nondisabled people in different age groups using different technical devices. While recent research showed positive effects of implementing such recommendations for nondisabled users, it remains unclear whether such effects would apply to different age groups and kind of devices. A 2 × 2 × 2 design was employed with website accessibility (high accessibility vs. very low accessibility), age (younger adults vs. older adults) and type of device (laptop vs. tablet) as independent variables. 110 nondisabled participants took part in a usability test, in which performance and satisfaction were measured as dependent variables. The results showed that higher accessibility increased task completion rate, task completion time and satisfaction ratings of nondisabled users. While user age did not have any effects, users showed faster task completion time under high accessibility when using a tablet rather than a laptop. The findings confirmed previous findings, which showed benefits of accessible websites for nondisabled users. These beneficial effects may now be generalised to a wide age range and across different devices. Practitioner Summary: This work is relevant to the design of websites since it emphasises the need to consider the characteristics of different user groups. Accessible website design (aimed at users with disabilities) leads to benefits for nondisabled users across different ages. These findings provide further encouragement for practitioners to apply WCAG 2.0.

  8. Implementing Recommendations From Web Accessibility Guidelines: A Comparative Study of Nondisabled Users and Users With Visual Impairments.

    Science.gov (United States)

    Schmutz, Sven; Sonderegger, Andreas; Sauer, Juergen

    2017-09-01

    The present study examined whether implementing recommendations of Web accessibility guidelines would have different effects on nondisabled users than on users with visual impairments. The predominant approach for making Web sites accessible for users with disabilities is to apply accessibility guidelines. However, it has been hardly examined whether this approach has side effects for nondisabled users. A comparison of the effects on both user groups would contribute to a better understanding of possible advantages and drawbacks of applying accessibility guidelines. Participants from two matched samples, comprising 55 participants with visual impairments and 55 without impairments, took part in a synchronous remote testing of a Web site. Each participant was randomly assigned to one of three Web sites, which differed in the level of accessibility (very low, low, and high) according to recommendations of the well-established Web Content Accessibility Guidelines 2.0 (WCAG 2.0). Performance (i.e., task completion rate and task completion time) and a range of subjective variables (i.e., perceived usability, positive affect, negative affect, perceived aesthetics, perceived workload, and user experience) were measured. Higher conformance to Web accessibility guidelines resulted in increased performance and more positive user ratings (e.g., perceived usability or aesthetics) for both user groups. There was no interaction between user group and accessibility level. Higher conformance to WCAG 2.0 may result in benefits for nondisabled users and users with visual impairments alike. Practitioners may use the present findings as a basis for deciding on whether and how to implement accessibility best.

  9. Making LibrariesAccessible for Visually Impaired Users: Practical Advice For Librarians

    Directory of Open Access Journals (Sweden)

    Devney Hamilton

    2011-12-01

    Full Text Available This article provides an introduction to making university libraries accessible to visually impaired users. It includes a summary of how visually impaired students access information and how libraries can provide access to materials, devices and software, and staff support to ensure visually impaired students ’ equal opportunity to use the library. The practical advice for librarians are based on interviews with 18 visually impaired university students and professionals who specialize in media, library services and information retrieval.

  10. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  11. Authentication and Access: Accommodating Public Users in an Academic World

    Directory of Open Access Journals (Sweden)

    Lynne Weber

    2010-09-01

    Full Text Available In the fall of 2004, the Academic Computing Center, a division of the Information Technology Services Department (ITS at Minnesota State University, Mankato took over responsibility for the computers in the public areas of Memorial Library. For the first time, affiliated Memorial Library users were required to authenticate using a campus username and password, a change that effectively eliminated computer access for anyone not part of the university community. This posed a dilemma for the librarians. Because of its Federal Depository status, the library had a responsibility to provide general access to both print and online government publications for the general public. Furthermore, the library had a long tradition of providing guest access to most library resources, and there was reluctance to abandon the practice. Therefore the librarians worked with ITS to retain a small group of six computers that did not require authentication and were clearly marked for community use, along with several standup, open-access computers on each floor used primarily for searching the library catalog. The additional need to provide computer access to high school students visiting the library for research and instruction led to more discussions with ITS and resulted in a means of generating temporary usernames and passwords through a Web form. These user accommodations were implemented in the library without creating a written policy governing the use of open-access computers.

  12. Wheelchair users, access and exclusion in South African higher education.

    Science.gov (United States)

    Chiwandire, Desire; Vincent, Louise

    2017-01-01

    South Africa's Constitution guarantees everyone, including persons with disabilities, the right to education. A variety of laws are in place obliging higher education institutions to provide appropriate physical access to education sites for all. In practice, however, many buildings remain inaccessible to people with physical disabilities. To describe what measures South African universities are taking to make their built environments more accessible to students with diverse types of disabilities, and to assess the adequacy of such measures. We conducted semi-structured in-depth face-to-face interviews with disability unit staff members (DUSMs) based at 10 different public universities in South Africa. Challenges with promoting higher education accessibility for wheelchair users include the preservation and heritage justification for failing to modify older buildings, ad hoc approaches to creating accessible environments and failure to address access to toilets, libraries and transport facilities for wheelchair users. South African universities are still not places where all students are equally able to integrate socially. DUSMs know what ought to be done to make campuses more accessible and welcoming to students with disabilities and should be empowered to play a leading role in sensitising non-disabled members of universities, to create greater awareness of, and appreciation for, the multiple ways in which wheelchair user students continue to be excluded from full participation in university life. South African universities need to adopt a systemic approach to inclusion, which fosters an understanding of inclusion as a fundamental right rather than as a luxury.

  13. Unofficial policy: access to housing, housing information and social services among homeless drug users in Hartford, Connecticut

    Directory of Open Access Journals (Sweden)

    Corbett A Michelle

    2007-03-01

    Full Text Available Abstract Background Much research has shown that the homeless have higher rates of substance abuse problems than housed populations and that substance abuse increases individuals' vulnerability to homelessness. However, the effects of housing policies on drug users' access to housing have been understudied to date. This paper will look at the "unofficial" housing policies that affect drug users' access to housing. Methods Qualitative interviews were conducted with 65 active users of heroin and cocaine at baseline, 3 and 6 months. Participants were purposively sampled to reflect a variety of housing statuses including homeless on the streets, in shelters, "doubled-up" with family or friends, or permanently housed in subsidized, unsubsidized or supportive housing. Key informant interviews and two focus group interviews were conducted with 15 housing caseworkers. Data were analyzed to explore the processes by which drug users receive information about different housing subsidies and welfare benefits, and their experiences in applying for these. Results A number of unofficial policy mechanisms limit drug users' access to housing, information and services, including limited outreach to non-shelter using homeless regarding housing programs, service provider priorities, and service provider discretion in processing applications and providing services. Conclusion Unofficial policy, i.e. the mechanisms used by caseworkers to ration scarce housing resources, is as important as official housing policies in limiting drug users' access to housing. Drug users' descriptions of their experiences working with caseworkers to obtain permanent, affordable housing, provide insights as to how access to supportive and subsidized housing can be improved for this population.

  14. National Radiobiology Archives Distributed Access User's Manual, Version 1. 1

    Energy Technology Data Exchange (ETDEWEB)

    Smith, S.K.; Prather, J.C.; Ligotke, E.K.; Watson, C.R.

    1992-06-01

    This supplement to the NRA Distributed Access User's manual (PNL-7877), November 1991, describes installation and use of Version 1.1 of the software package; this is not a replacement of the previous manual. Version 1.1 of the NRA Distributed Access Package is a maintenance release. It eliminates several bugs, and includes a few new features which are described in this manual. Although the appearance of some menu screens has changed, we are confident that the Version 1.0 User's Manual will provide an adequate introduction to the system. Users who are unfamiliar with Version 1.0 may wish to experiment with that version before moving on to Version 1.1.

  15. Support Services for Remote Users of Online Public Access Catalogs.

    Science.gov (United States)

    Kalin, Sally W.

    1991-01-01

    Discusses the needs of remote users of online public access catalogs (OPACs). User expectations are discussed; problems encountered by remote-access users are examined, including technical problems and searching problems; support services are described, including instruction, print guides, and online help; and differences from the needs of…

  16. Making Patron Data Work Harder: User Search Terms as Access Points?

    Directory of Open Access Journals (Sweden)

    Jason A. Clark

    2008-06-01

    Full Text Available Montana State University (MSU Libraries are experimenting with re-using patron-generated data to create browseable access points for the Electronic Theses and Dissertations (ETD collection. A beta QueryCatcher module logs recent search terms and the number of associated hits. These terms are used to create browseable lists and tagclouds which enhance access to the ETD collection. Gathering and reusing information about user behavior is an emerging trend in web application development. This article outlines MSU Libraries' reasoning for moving towards a user-generated model and provides a complete walkthrough of the steps in building the application and example code.

  17. Improving User Access to the Integrated Multi-Satellite Retrievals for GPM (IMERG) Products

    Science.gov (United States)

    Huffman, George; Bolvin, David; Nelkin, Eric; Kidd, Christopher

    2016-04-01

    The U.S. Global Precipitation Measurement mission (GPM) team has developed the Integrated Multi-satellitE Retrievals for GPM (IMERG) algorithm to take advantage of the international constellation of precipitation-relevant satellites and the Global Precipitation Climatology Centre surface precipitation gauge analysis. The goal is to provide a long record of homogeneous, high-resolution quasi-global estimates of precipitation. While expert scientific researchers are major users of the IMERG products, it is clear that many other user communities and disciplines also desire access to the data for wide-ranging applications. Lessons learned during the Tropical Rainfall Measuring Mission, the predecessor to GPM, led to some basic design choices that provided the framework for supporting multiple user bases. For example, two near-real-time "runs" are computed, the Early and Late (currently 5 and 15 hours after observation time, respectively), then the Final Run about 3 months later. The datasets contain multiple fields that provide insight into the computation of the complete precipitation data field, as well as diagnostic (currently) estimates of the precipitation's phase. In parallel with this, the archive sites are working to provide the IMERG data in a variety of formats, and with subsetting and simple interactive analysis to make the data more easily available to non-expert users. The various options for accessing the data are summarized under the pmm.nasa.gov data access page. The talk will end by considering the feasibility of major user requests, including polar coverage, a simplified Data Quality Index, and reduced data latency for the Early Run. In brief, the first two are challenging, but under the team's control. The last requires significant action by some of the satellite data providers.

  18. Tradeoff between User Quality-Of-Experience and Service Provider Profit in 5G Cloud Radio Access Network

    Directory of Open Access Journals (Sweden)

    Mahbuba Afrin

    2017-11-01

    Full Text Available In recent years, the Cloud Radio Access Network (CRAN has become a promising solution for increasing network capacity in terms of high data rates and low latencies for fifth-generation (5G cellular networks. In CRAN, the traditional base stations (BSs are decoupled into remote radio heads (RRHs and base band units (BBUs that are respectively responsible for radio and baseband functionalities. The RRHs are geographically proximated whereas the the BBUs are pooled in a centralized cloud named BBU pool. This virtualized architecture facilitates the system to offer high computation and communication loads from the impetuous rise of mobile devices and applications. Heterogeneous service requests from the devices to different RRHs are now sent to the BBUs to process centrally. Meeting the baseband processing of heterogeneous requests while keeping their Quality-of-Service (QoS requirements with the limited computational resources as well as enhancing service provider profit is a challenging multi-constraint problem. In this work, a multi-objective non-linear programming solution to the Quality-of-Experience (QoE and Profit-aware Resource Allocation problem is developed which makes a trade-off in between the two. Two computationally viable scheduling algorithms, named First Fit Satisfaction and First Fit Profit algorithms, are developed to focus on maximization of user QoE and profit, respectively, while keeping the minimum requirement level for the other one. The simulation environment is built on a relevant simulation toolkit. The experimental results demonstrate that the proposed system outperforms state-of-the-art works well across the requests QoS, average waiting time, user QoE, and service provider profit.

  19. Evaluating accessibility to Bangkok Metro Systems using multi-dimensional criteria across user groups

    Directory of Open Access Journals (Sweden)

    Duangporn Prasertsubpakij

    2012-07-01

    Full Text Available Metro systems act as fast and efficient transport systems for many modern metropolises; however, enhancing higher usage of such systems often conflicts with providing suitable accessibility options. The traditional approach of metro accessibility studies seems to be an ineffective measure to gage sustainable access in which the equal rights of all users are taken into account. Bangkok Metropolitan Region (BMR transportation has increasingly relied on the role of two mass rapid transport systems publicly called “BTS Skytrain” and “MRT Subway”, due to limited availability of land and massive road congestion; however, access to such transit arguably treats some vulnerable groups, especially women, the elderly and disabled people unfairly. This study constructs a multi-dimensional assessment of accessibility considerations to scrutinize how user groups access metro services based on BMR empirical case. 600 individual passengers at various stations were asked to rate the questionnaire that simultaneously considers accessibility aspects of spatial, feeder connectivity, temporal, comfort/safety, psychosocial and other dimensions. It was interestingly found by user disaggregated accessibility model that the lower the accessibility perceptions—related uncomfortable and unsafe environment conditions, the greater the equitable access to services, as illustrated by MRT — Hua Lumphong and MRT — Petchaburi stations. The study suggests that, to balance the access priorities of groups on services, policy actions should emphasize acceptably safe access for individuals, cost efficient feeder services connecting the metro lines, socioeconomic influences and time allocation. Insightful discussions on integrated approach balancing different dimensions of accessibility and recommendations would contribute to accessibility-based knowledge and potential propensity to use the public transits towards transport sustainability.

  20. SoNeUCON_{ABC}Pro: an access control model for social networks with translucent user provenance

    OpenAIRE

    González Manzano, Lorena; Slaymaker, Mark; Fuentes García Romero de Tejada, José María de; Vayenas, Dimitris

    2018-01-01

    Proceedings of: SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017 Web-Based Social Networks (WBSNs) are used by millions of people worldwide. While WBSNs provide many benefits, privacy preservation is a concern. The management of access control can help to assure data is accessed by authorized users. However, it is critical to provide sufficient flexibility so that a rich set of conditions may be imposed by users. In this paper we coi...

  1. Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System

    Institute of Scientific and Technical Information of China (English)

    Wen-Min Li; Xue-Lei Li; Qiao-Yan Wen; Shuo Zhang; Hua Zhang

    2017-01-01

    In hybrid cloud computing, encrypted data access control can provide a fine-grained access method for orga-nizations to enact policies closer to organizational policies. This paper presents an improved CP-ABE (ciphertext-policy attribute-based encryption) scheme to construct an encrypted data access control solution that is suitable for mobile users in hybrid cloud system. In our improvement, we split the original decryption keys into a control key, a secret key and a set of transformation keys. The private cloud managed by the organization administrator takes charge of updating the transformation keys using the control key. It helps to handle the situation of flexible access management and attribute alteration. Meanwhile, the mobile user's single secret key remains unchanged as well as the ciphertext even if the data user's attribute has been revoked. In addition, we modify the access control list through adding the attributes with corresponding control key and transformation keys so as to manage user privileges depending upon the system version. Finally, the analysis shows that our scheme is secure, flexible and efficient to be applied in mobile hybrid cloud computing.

  2. User Collaboration for Improving Access to Historical Texts

    Directory of Open Access Journals (Sweden)

    Clemens Neudecker

    2010-08-01

    Full Text Available The paper will describe how web-based collaboration tools can engage users in the building of historical printed text resources created by mass digitisation projects. The drivers for developing such tools will be presented, identifying the benefits that can be derived for both the user community and cultural heritage institutions. The perceived risks, such as new errors introduced by the users, and the limitations of engaging with users in this way will be set out with the lessons that can be learned from existing activities, such as the National Library of Australia's newspaper website which supports collaborative correction of Optical Character Recognition (OCR output. The paper will present the work of the IMPACT (Improving Access to Text project, a large-scale integrating project funded by the European Commission as part of the Seventh Framework Programme (FP7. One of the aims of the project is to develop tools that help improve OCR results for historical printed texts, specifically those works published before the industrial production of books from the middle of the 19th century. Technological improvements to image processing and OCR engine technology are vital to improving access to historic text, but engaging the user community also has an important role to play. Utilising the intended user can help achieve the levels of accuracy currently found in born-digital materials. Improving OCR results will allow for better resource discovery and enhance performance by text mining and accessibility tools. The IMPACT project will specifically develop a tool that supports collaborative correction and validation of OCR results and a tool to allow user involvement in building historical dictionaries which can be used to validate word recognition. The technologies use the characteristics of human perception as a basis for error detection.

  3. Prediction of users webpage access behaviour using association ...

    Indian Academy of Sciences (India)

    pages mainly depended on the support and lift measure whereas confidence assumed ... Apriori algorithm; association rules; data mining; MSNBC; web usage .... clustering was used in finding the user access patterns from web access log. .... satisfied the minimum support and confidence of 0.6% and 100% respectively.

  4. Switch Based Opportunistic Spectrum Access for General Primary User Traffic Model

    KAUST Repository

    Gaaloul, Fakhreddine

    2012-06-18

    This letter studies cognitive radio transceiver that can opportunistically use the available channels of primary user (PU). Specifically, we investigate and compare two different opportunistic channel access schemes. The first scheme applies when the secondary user (SU) has access to only one channel. The second scheme, based on channel switching mechanism, applies when the SU has access to multiple channels but can at a given time monitor and access only one channel. For these access schemes, we derive the exact analytical results for the novel performance metrics of average access time and average waiting time under general PU traffic models.

  5. Switch Based Opportunistic Spectrum Access for General Primary User Traffic Model

    KAUST Repository

    Gaaloul, Fakhreddine; Alouini, Mohamed-Slim; Radaydeh, Redha M.; Yang, Hong-Chuan

    2012-01-01

    This letter studies cognitive radio transceiver that can opportunistically use the available channels of primary user (PU). Specifically, we investigate and compare two different opportunistic channel access schemes. The first scheme applies when the secondary user (SU) has access to only one channel. The second scheme, based on channel switching mechanism, applies when the SU has access to multiple channels but can at a given time monitor and access only one channel. For these access schemes, we derive the exact analytical results for the novel performance metrics of average access time and average waiting time under general PU traffic models.

  6. Accessibility of hypertensive users to health units and treatment adherence

    Directory of Open Access Journals (Sweden)

    Natasha Marques Frota

    2013-09-01

    Full Text Available We aimed to analyze the accessibility of hypertensive users to the health system with focus on treatment adherence. A cross-sectional study with quantitative approach was conducted in four Family Health Basic Units of Fortaleza-CE, Brazil. The sample consisted of 400 users. Data collection happened through a form applied from May to August 2011. About 97.5% of users were older than 40 years, and 67.2% were female. The accessibility to the referral service occurred in 47.2% of users to secondary care, of which 101 (25.2% were referred to Emergency Units, and 88 (22.0% were admitted to Inpatient Units. Most hypertensive patients adhered to healthy habits, except the use of dietetic sweeteners (36.0% and physical exercise (35.0%. The hypertensive patients had good treatment adherence and difficulty in accessibility regarding counter-referral services to secondary and tertiary care services.

  7. AquaUsers: Improving access to remotely sensed data for non-specialists

    Science.gov (United States)

    Clements, Oliver; Walker, Peter; Calton, Ben; Miller, Peter

    2015-04-01

    In recent years more and more complex remotely sensed data have been made available to the public by national and international agencies. These data are also reprocessed by different organisations to produce secondary products that are of specific need to a community. For instance the production of chlorophyll concentration maps from ocean colour data provided by NASA for the marine community. Providing access to such data has normally been focused on simply making the data available with appropriate metadata so that domain specialists can make use of it. One area that has seen significant investment, both of time and money, has been in the production of web based data portals. Primarily these have focused on spatial data. By providing a web map visualisation users are able to quickly assess both spatial coverage and data values. Data portal improvements have been possible thanks to advancements in back end data servers such as Thredds and ncWMS as well as improvements in front-end libraries for data visualisation including OpenLayers and D3. Data portals that make use of these technological advancements have aimed at improving the access and use of data by trained scientific domain specialists. There is now a push to improve access to these systems by non-scientific domain specialists through several European Commission funded projects, including OPEC and AquaUsers. These projects have improved upon an open source web GIS portal created by Plymouth Marine Laboratory [https://github.com/pmlrsg/GISportal]. We will present the latest version of our GIS portal, discuss the designs steps taken to achieve the latest build and share user stories as to how non-domain specialists are now able to utilise the system and get benefits from remotely sensed data. A first version was produced and disseminated to end users for feedback. At this stage the end users included government advisors, fish farmers and scientific groups with no specific GIS training or knowledge. This

  8. Health Websites: Accessibility and Usability for American Sign Language Users

    Science.gov (United States)

    Kushalnagar, Poorna; Naturale, Joan; Paludneviciene, Raylene; Smith, Scott R.; Werfel, Emily; Doolittle, Richard; Jacobs, Stephen; DeCaro, James

    2015-01-01

    To date, there have been efforts towards creating better health information access for Deaf American Sign Language (ASL) users. However, the usability of websites with access to health information in ASL has not been evaluated. Our paper focuses on the usability of four health websites that include ASL videos. We seek to obtain ASL users’ perspectives on the navigation of these ASL-accessible websites, finding the health information that they needed, and perceived ease of understanding ASL video content. ASL users (N=32) were instructed to find specific information on four ASL-accessible websites, and answered questions related to: 1) navigation to find the task, 2) website usability, and 3) ease of understanding ASL video content for each of the four websites. Participants also gave feedback on what they would like to see in an ASL health library website, including the benefit of added captioning and/or signer model to medical illustration of health videos. Participants who had lower health literacy had greater difficulty in finding information on ASL-accessible health websites. This paper also describes the participants’ preferences for an ideal ASL-accessible health website, and concludes with a discussion on the role of accessible websites in promoting health literacy in ASL users. PMID:24901350

  9. Guidelines for Making Web Content Accessible to All Users

    Science.gov (United States)

    Thompson, Terrill; Primlani, Saroj; Fiedor, Lisa

    2009-01-01

    The main goal of accessibility standards and guidelines is to design websites everyone can use. The "IT Accessibility Constituent Group" developed this set of draft guidelines to help EQ authors, reviewers, and staff and the larger EDUCAUSE community ensure that web content is accessible to all users, including those with disabilities. This…

  10. Considering User's Access Pattern in Multimedia File Systems

    Science.gov (United States)

    Cho, KyoungWoon; Ryu, YeonSeung; Won, Youjip; Koh, Kern

    2002-12-01

    Legacy buffer cache management schemes for multimedia server are grounded at the assumption that the application sequentially accesses the multimedia file. However, user access pattern may not be sequential in some circumstances, for example, in distance learning application, where the user may exploit the VCR-like function(rewind and play) of the system and accesses the particular segments of video repeatedly in the middle of sequential playback. Such a looping reference can cause a significant performance degradation of interval-based caching algorithms. And thus an appropriate buffer cache management scheme is required in order to deliver desirable performance even under the workload that exhibits looping reference behavior. We propose Adaptive Buffer cache Management(ABM) scheme which intelligently adapts to the file access characteristics. For each opened file, ABM applies either the LRU replacement or the interval-based caching depending on the Looping Reference Indicator, which indicates that how strong temporally localized access pattern is. According to our experiment, ABM exhibits better buffer cache miss ratio than interval-based caching or LRU, especially when the workload exhibits not only sequential but also looping reference property.

  11. Providing Internet Access to the Ohio Career Information System for All Residents: A Feasibility Study.

    Science.gov (United States)

    Lewis, Morgan V.

    Expanded Internet access to the Ohio Career Information System (OCIS) would provide adults in Ohio who need to or wish to make career changes with the best available information about occupations, education and training programs, and financial aid. In order to determine the feasibility of improving access without cost to users, an advisory group,…

  12. User experience with a health insurance coverage and benefit-package access: implications for policy implementation towards expansion in Nigeria.

    Science.gov (United States)

    Mohammed, Shafiu; Aji, Budi; Bermejo, Justo Lorenzo; Souares, Aurelia; Dong, Hengjin; Sauerborn, Rainer

    2016-04-01

    Developing countries are devising strategies and mechanisms to expand coverage and benefit-package access for their citizens through national health insurance schemes (NHIS). In Nigeria, the scheme aims to provide affordable healthcare services to insured-persons and their dependants. However, inclusion of dependants is restricted to four biological children and a spouse per user. This study assesses the progress of implementation of the NHIS in Nigeria, relating to coverage and benefit-package access, and examines individual factors associated with the implementation, according to users' perspectives. A retrospective, cross-sectional survey was done between October 2010 and March 2011 in Kaduna state and 796 users were randomly interviewed. Questions regarding coverage of immediate-family members and access to benefit-package for treatment were analysed. Indicators of coverage and benefit-package access were each further aggregated and assessed by unit-weighted composite. The additive-ordinary least square regression model was used to identify user factors that may influence coverage and benefit-package access. With respect to coverage, immediate-dependants were included for 62.3% of the users, and 49.6 rated this inclusion 'good' (49.6%). In contrast, 60.2% supported the abolishment of the policy restriction for non-inclusion of enrolees' additional children and spouses. With respect to benefit-package access, 82.7% of users had received full treatments, and 77.6% of them rated this as 'good'. Also, 14.4% of users had been refused treatments because they could not afford them. The coverage of immediate-dependants was associated with age, sex, educational status, children and enrolment duration. The benefit-package access was associated with types of providers, marital status and duration of enrolment. This study revealed that coverage of family members was relatively poor, while benefit-package access was more adequate. Non-inclusion of family members could

  13. System Design and Cataloging Meet the User: User Interfaces to Online Public Access Catalogs.

    Science.gov (United States)

    Yee, Martha M.

    1991-01-01

    Discusses features of online public access catalogs: (1) demonstration of relationships between records; (2) provision of entry vocabularies; (3) arrangement of multiple entries on the screen; (4) provision of access points; (5) display of single records; and (6) division of catalogs into separate files or indexes. User studies and other research…

  14. Resource Discovery and Universal Access: Understanding Enablers and Barriers from the User Perspective

    OpenAIRE

    Beyene, Wondwossen

    2016-01-01

    Resource discovery tools are keys to explore, find , and retrieve resources from multitudes of collections hosted by library and information systems. Modern resource discovery tools provide facet - rich interfaces that provide multiple alternatives to ex pose resources for their potential users and help them navigate to the resources they need. This paper examines one of those tools from the perspective of universal access, ...

  15. Comparison and Evaluation of End-User Interfaces for Online Public Access Catalogs.

    Science.gov (United States)

    Zumer, Maja

    End-user interfaces for the online public access catalogs (OPACs) of OhioLINK, a system linking major university and research libraries in Ohio, and its 16 member libraries, accessible through the Internet, are compared and evaluated from the user-oriented perspective. A common, systematic framework was used for the scientific observation of the…

  16. Monitoring User-Based Accessibility Assessment in Urban Environments and in Public Buildings

    Directory of Open Access Journals (Sweden)

    Gintaras Stauskis

    2018-04-01

    Full Text Available The research features analysis of user-experience-based accessibility assessment and progress monitoring of buildings and public spaces; this analysis is used as a tool for facilitating the development of humane, socially sustainable and an inclusive urban environment. A group of users representing people with different kinds of disabilities, the elderly and families with children was created to assess the quality of access to various buildings with different functions and locations across Vilnius and in Singapore. A school, two hospitals, a rehab centre and two offices were selected for access monitoring in Vilnius City, while a hotel, a café and two metro stations with public squares were chosen for access assessment in Singapore. As the same method was principally applied to assess accessibility of selected buildings in Vilnius City in 2000 and 2017 and in Singapore in 2012, the article draws a comparative analysis of access levels in these two cities located in different global regions. The results show a definite improvement of access quality over time and also identify the critical aspects in this process. The segment of plot planning represents the lowest quality of access for all assessed building types as compared to the building segment and the external–internal element segments. The paper also draws conclusions that access improvement is a continuous process of implementing advanced urban policy instruments, and city planners can contribute to it by constantly analysing and presenting to public the monitoring data about the progress in access improvement. Comparing the assessment results between Vilnius City and Singapore – cities that are located in different global regions and in different socio-economic environments – provides a practical tool for benchmarking and setting the priorities for this process.

  17. Why can’t users choose their identity providers on the web?

    Directory of Open Access Journals (Sweden)

    Corre Kevin

    2017-07-01

    Full Text Available Authentication delegation is a major function of the modern web. Identity Providers (IdP acquired a central role by providing this function to other web services. By knowing which web services or web applications access its service, an IdP can violate the enduser privacy by discovering information that the user did not want to share with its IdP. For instance, WebRTC introduces a new field of usage as authentication delegation happens during the call session establishment, between two users. As a result, an IdP can easily discover that Bob has a meeting with Alice. A second issue that increases the privacy violation is the lack of choice for the end-user to select its own IdP. Indeed, on many web-applications, the end-user can only select between a subset of IdPs, in most cases Facebook or Google. In this paper, we analyze this phenomena, in particular why the end-user cannot easily select its preferred IdP, though there exists standards in this field such as OpenID Connect and OAuth 2? To lead this analysis, we conduct three investigations. The first one is a field survey on OAuth 2 and OpenID Connect scope usage by web sites to understand if scopes requested by websites could allow for user defined IdPs. The second one tries to understand whether the problem comes from the OAuth 2 protocol or its implementations by IdP. The last one tries to understand if trust relations between websites and IdP could prevent the end user to select its own IdP. Finally, we sketch possible architecture for web browser based identity management, and report on the implementation of a prototype.

  18. On Low-Complexity Full-diversity Detection In Multi-User MIMO Multiple-Access Channels

    KAUST Repository

    Ismail, Amr

    2014-01-28

    Multiple-input multiple-output (MIMO) techniques are becoming commonplace in recent wireless communication standards. This newly introduced dimension (i.e., space) can be efficiently used to mitigate the interference in the multi-user MIMO context. In this paper, we focus on the uplink of a MIMO multiple access channel (MAC) where perfect channel state information (CSI) is only available at the destination. We provide new sufficient conditions for a wide range of space-time block codes (STBC)s to achieve full-diversity under partial interference cancellation group decoding (PICGD) with or without successive interference cancellation (SIC) for completely blind users. Interference cancellation (IC) schemes for two and three users are then provided and shown to satisfy the full-diversity criteria. Beside the complexity reduction due to the fact that PICGD enables separate decoding of distinct users without sacrificing the diversity gain, further reduction of the decoding complexity may be obtained. In fact, thanks to the structure of the proposed schemes, the real and imaginary parts of each user\\'s symbols may be decoupled without any loss of performance. Our new IC scheme is shown to outperform recently proposed two-user IC scheme especially for high spectral efficiency while requiring significantly less decoding complexity.

  19. Single-centre experience with Renal PatientView, a web-based system that provides patients with access to their laboratory results.

    Science.gov (United States)

    Woywodt, Alexander; Vythelingum, Kervina; Rayner, Scott; Anderton, John; Ahmed, Aimun

    2014-10-01

    Renal PatientView (RPV) is a novel, web-based system in the UK that provides patients with access to their laboratory results, in conjunction with patient information. To study how renal patients within our centre access and use RPV. We sent out questionnaires in December 2011 to all 651 RPV users under our care. We collected information on aspects such as the frequency and timing of RPV usage, the parameters viewed by users, and the impact of RPV on their care. A total of 295 (45 %) questionnaires were returned. The predominant users of RPV were transplant patients (42 %) followed by pre-dialysis chronic kidney disease patients (37 %). Forty-two percent of RPV users accessed their results after their clinic appointments, 38 % prior to visiting the clinic. The majority of patients (76 %) had used the system to discuss treatment with their renal physician, while 20 % of patients gave permission to other members of their family to use RPV to monitor results on their behalf. Most users (78 %) reported accessing RPV on average 1-5 times/month. Most patients used RPV to monitor their kidney function, 81 % to check creatinine levels, 57 % to check potassium results. Ninety-two percent of patients found RPV easy to use and 93 % felt that overall the system helps them in taking care of their condition; 53 % of patients reported high satisfaction with RPV. Our results provide interesting insight into use of a system that gives patients web-based access to laboratory results. The fact that 20 % of patients delegate access to relatives also warrants further study. We propose that online access to laboratory results should be offered to all renal patients, although clinicians need to be mindful of the 'digital divide', i.e. part of the population that is not amenable to IT-based strategies for patient empowerment.

  20. SAM: Secure Access of Media Independent Information Service with User Anonymity

    Directory of Open Access Journals (Sweden)

    Li Guangsong

    2010-01-01

    Full Text Available Seamless handover across different access technologies is very important in the future wireless networks. To optimize vertical handover in heterogeneous networks, IEEE 802.21 standard defines Media Independent Handover (MIH services. The MIH services can be a new target to attackers, which will be the main concern for equipment vendors and service providers. In this paper, we focus specifically on security of Media Independent Information Service (MIIS and present a new access authentication scheme with user anonymity for MIIS. The protocol can be used to establish a secure channel between the mobile node and the information server. Security and performance of the protocol are also analyzed in this paper.

  1. What Type of Knowledge Provides Valid Housing Standards Addressing Accessibility?

    DEFF Research Database (Denmark)

    Helle, Tina; Brandt, Åse; Iwarsson, Susanne

    evaluations of task-surface heights in elderly people’s homes. Applied Ergonomics, 31, 109-119. Kohlbacher, F. (2006). The use of qualitative content analysis in case study research. Forum: Qualitative social research sozialforschung (FQS), Open Journal Systems, vol 7, No1. Kozey, J.W. & Das, B. (2004...... accessibility aspects such as either reach, seat height or space requirements • Targeted primarily industrial workstation design and only wheelchair/scooter users • Addressed positions (standing/seated) and sex difference with respect to reach • Was generated in lab-like environments, using methods...... of the validity of housing standards. Therefore, it is reasonable to question what type of knowledge that provides the most valid standards addressing accessibility and explore the consequences of using an alternative approach. The idea was thus to examine the validity of a set of housing standards using a so...

  2. Access to highly active antiretroviral therapy (HAART) for injecting drug users in the WHO European Region 2002-2004

    DEFF Research Database (Denmark)

    Donoghoe, Martin C; Bollerup, Annemarie R; Lazarus, Jeff

    2007-01-01

    Providing equitable access to highly active antiretroviral treatment (HAART) to injecting drug users (IDUs) is both feasible and desirable. Given the evidence that IDUs can adhere to HAART as well as non-IDUs and the imperative to provide universal and equitable access to HIV/AIDS treatment for all...... who need it, here we examine whether IDUs in the 52 countries in the WHO European Region have equitable access to HAART and whether that access has changed over time between 2002 and 2004. We consider regional and country differences in IDU HAART access; examine preliminary data regarding...

  3. The changing face of government information providing access in the twenty-first century

    CERN Document Server

    Kumar, Suhasini L

    2006-01-01

    Learn what innovative changes lie in the future of government information The Changing Face of Government Information comprehensively examines the way government documents' librarians acquire, provide access, and provide reference services in the new electronic environment. Noted experts discuss the impact electronic materials have had on the Government Printing Office (GPO), the reference services within the Federal Depository Library Program (FDLP), and the new opportunities in the transition from paper-based information policy to an electronic e-government. This source reveals the latest changes in the field of government documents librarianship and the knowledge and expertise needed to teach users how to access what they need from this enormous wealth of government information. Major changes have taken place in the way government information is created, disseminated, accessed, and preserved. The Changing Face of Government Information explains in detail the tremendous change taking place in libraries and ...

  4. On Low-Complexity Full-diversity Detection In Multi-User MIMO Multiple-Access Channels

    KAUST Repository

    Ismail, Amr; Alouini, Mohamed-Slim

    2014-01-01

    Multiple-input multiple-output (MIMO) techniques are becoming commonplace in recent wireless communication standards. This newly introduced dimension (i.e., space) can be efficiently used to mitigate the interference in the multi-user MIMO context. In this paper, we focus on the uplink of a MIMO multiple access channel (MAC) where perfect channel state information (CSI) is only available at the destination. We provide new sufficient conditions for a wide range of space-time block codes (STBC)s to achieve full-diversity under partial interference cancellation group decoding (PICGD) with or without successive interference cancellation (SIC) for completely blind users. Interference cancellation (IC) schemes for two and three users are then provided and shown to satisfy the full-diversity criteria. Beside the complexity reduction due to the fact that PICGD enables separate decoding of distinct users without sacrificing the diversity gain, further reduction of the decoding complexity may be obtained. In fact, thanks to the structure of the proposed schemes, the real and imaginary parts of each user's symbols may be decoupled without any loss of performance. Our new IC scheme is shown to outperform recently proposed two-user IC scheme especially for high spectral efficiency while requiring significantly less decoding complexity.

  5. A Trusted Host's Authentication Access and Control Model Faced on User Action

    Institute of Scientific and Technical Information of China (English)

    ZHANG Miao; XU Guoai; HU Zhengming; YANG Yixian

    2006-01-01

    The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.

  6. Complication with Intraosseous Access: Scandinavian Users' Experience

    Directory of Open Access Journals (Sweden)

    Peter Hallas

    2013-09-01

    Full Text Available Introduction: Intraosseous access (IO is indicated if vascular access cannot be quickly established during resuscitation. Complication rates are estimated to be low, based on small patient series, model or cadaver studies, and case reports. However, user experience with IO use in real-life emergency situations might differ from the results in the controlled environment of model studies and small patient series. We performed a survey of IO use in real-life emergency situations to assess users’ experiences of complications.Methods: An online questionnaire was sent to Scandinavian emergency physicians, anesthesiologists and pediatricians.Results: 1,802 clinical cases of IO use was reported by n=386 responders. Commonly reported complications with establishing IO access were patient discomfort/pain (7.1%, difficulties with penetration of periosteum with IO needle (10.3%, difficulties with aspiration of bone marrow (12.3%, and bended/broken needle (4.0%. When using an established IO access the reported complications were difficulties with injection fluid and drugs after IO insertion (7.4%, slow infusion (despite use of pressure bag (8.8%, displacement after insertion (8.5%, and extravasation (3.7%. Compartment syndrome and osteomyelitis occurred in 0.6% and 0.4% of cases respectively.Conclusion: In users’ recollection of real-life IO use, perceived complications were more frequent than usually reported from model studies. The perceived difficulties with using IO could affect the willingness of medical staff to use IO. Therefore, user experience should be addressed both in education of how to use, and research and development of IOs. [West J Emerg Med. 2013;14(5:440–443.

  7. Technology solutions to support supervisory activities and also to provide information access to the society

    Science.gov (United States)

    Paladini, D.; Mello, A. B.

    2016-07-01

    Inmetro's data about the conformity of certificated products, process and services are, usually, displayed at fragmented databases of difficult access for several reasons, for instance, the lack of computational solutions which allow this kind of access to its users. A discussion about some of the technological solutions to support supervisory activities by the appropriate regulatory bodies and also to provide information access to society in general is herein presented, along with a theoretical explanation of the pros and cons of such technologies to the conclusion that a mobile platform seems to be the best tool for the requirements of Inmetro.

  8. Enabling Wireless Cooperation in User Provided Networks

    OpenAIRE

    Rolla, Vitor Guerra

    2015-01-01

    Tese de doutoramento em Ciências e Tecnologias da Informação, apresentada ao Departamento de Engenharia Informática da Faculdade de Ciências e Tecnologia da Universidade de Coimbra This doctoral thesis investigates user provided networks. Such networks have become important research subjects in the field of informatics engineering due to the recent popularity of smart phones. User provided networks are independent from traditional Internet service providers. Communication and informati...

  9. ARM User Survey Report: Data Access, Quality, and Delivery

    Energy Technology Data Exchange (ETDEWEB)

    Mather, JH; Roeder, LR; Sivaraman, C

    2012-06-28

    The objective of this survey was to obtain user feedback to determine how users of the Atmospheric Radiation Measurement (ARM) Climate Research Facility Data Archive interact with the more than 2000 available types of datastreams. The survey also gathered information about data discovery and data quality. The Market and Competitive Analysis group at Pacific Northwest National Laboratory worked with web administrators to develop a landing page from which users could access the survey. A survey invitation was sent by ARM via email to about 6100 users on February 22, 2012. The invitation was also posted on the ARM website and Facebook page. Reminders were sent via e-mail and posted on Facebook while the survey was open, February 22-March 23, 2012.

  10. Model Based User's Access Requirement Analysis of E-Governance Systems

    Science.gov (United States)

    Saha, Shilpi; Jeon, Seung-Hwan; Robles, Rosslin John; Kim, Tai-Hoon; Bandyopadhyay, Samir Kumar

    The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify user's access requirement for the stakeholders and then according to the models of Nath's approach. Based on this analysis, the Govt. can also make standards of security based on the e-governance models. Thus there will be less human errors and bias. This analysis leads to the security architecture of the specific G2C application.

  11. RURAL/URBAN RESIDENCE, ACCESS, AND PERCEIVED NEED FOR TREATMENT AMONG AFRICAN AMERICAN COCAINE USERS

    Science.gov (United States)

    BORDERS, TYRONE F.; BOOTH, BRENDA M.; STEWART, KATHARINE E.; CHENEY, ANN M.; CURRAN, GEOFFREY M.

    2014-01-01

    Objective To examine how rural/urban residence, perceived access, and other factors impede or facilitate perceived need for drug use treatment, a concept closely linked to treatment utilization. Study Design Two hundred rural and 200 urban African American cocaine users who were not receiving treatment were recruited via Respondent-Driven Sampling and completed a structured in-person interview. Bivariate and multivariate analyses were conducted to test the associations between perceived need and rural/urban residence, perceived access, and other predisposing (eg, demographics), enabling (eg, insurance), and health factors (eg, psychiatric distress). Principal Findings In bivariate analyses, rural relative to urban cocaine users reported lower perceived treatment need (37% vs 48%), availability, affordability, overall ease of access, and effectiveness, as well as lower perceived acceptability of residential, outpatient, self-help, and hospital-based services. In multivariate analyses, there was a significant interaction between rural/urban residence and the acceptability of religious counseling. At the highest level of acceptability, rural users had lower odds of perceived need (OR=.23); at the lowest level, rural users had higher odds of perceived need (OR=2.74) than urban users. Among rural users, the acceptability of religious counseling was negatively associated with perceived need (OR=.64). Ease of access was negatively associated (OR=.71) whereas local treatment effectiveness (OR=1.47) and the acceptability of hospital-based treatment (OR=1.29) were positively associated with perceived need among all users. Conclusions Our findings suggest rural/urban disparities in perceived need and access to drug use treatment. Among rural and urban cocaine users, improving perceptions of treatment effectiveness and expanding hospital-based services could promote treatment seeking. PMID:25213603

  12. Accessibility to Specialized Public Oral Health Services from the Perspective of Brazilian Users

    Science.gov (United States)

    de Castro, Ricardo Dias; Rangel, Marianne de Lucena; da Silva, Marcos André Azevedo; de Lucena, Brunna Thaís Lucwu; Cavalcanti, Alessandro Leite; Bonan, Paulo Rogério Ferreti; Oliveira, Julyana de Araújo

    2016-01-01

    The Specialized Dental Clinics (SDCs) represent the first government initiative in Latin America aimed at providing specialized oral health services. This study sought to evaluate the organizational accessibility to specialized oral health care services in Brazil and to understand the factors that may be associated with accessibility from the user’s perspective. This epidemiological, cross-sectional and quantitative study was conducted by means of interviews with individuals who sought specialized public oral health services in the city of João Pessoa, Paraíba, Brazil, and consisted of a sample of 590 individuals. Users expressed a favorable view of the classification and resolutive nature of specialized services offered by Brazilian public health. The binary logistic regression analysis revealed weak points highlighting the difficulty involved in obtaining such treatments leading to unfavorable evaluations. In the resolutive nature item, difficulty in accessing the location, queues and lack of materials and equipment were highlighted as statistically significant unfavorable aspects. While many of the users considered the service to be resolutive, weaknesses were mentioned that need to be detected to promote improvements and to prevent other health models adopted worldwide from reproducing the same flaws. PMID:27775584

  13. Channel access delay and buffer distribution of two-user opportunistic scheduling schemes in wireless networks

    KAUST Repository

    Hossain, Md Jahangir

    2010-07-01

    In our earlier works, we proposed rate adaptive hierarchical modulation-assisted two-best user opportunistic scheduling (TBS) and hybrid two-user scheduling (HTS) schemes. The proposed schemes are innovative in the sense that they include a second user in the transmission opportunistically using hierarchical modulations. As such the frequency of information access of the users increases without any degradation of the system spectral efficiency (SSE) compared to the classical opportunistic scheduling scheme. In this paper, we analyze channel access delay of an incoming packet at the base station (BS) buffer when our proposed TBS and HTS schemes are employed at the BS. Specifically, using a queuing analytic model we derive channel access delay as well as buffer distribution of the packets that wait at BS buffer for down-link (DL) transmission. We compare performance of the TBS and HTS schemes with that of the classical single user opportunistic schemes namely, absolute carrier-to-noise ratio (CNR)-based single user scheduling (ASS) and normalized CNR-based single user scheduling (NSS). For an independent and identically distributed (i.i.d.) fading environment, our proposed scheme can improve packet\\'s access delay performance compared to the ASS. Selected numerical results in an independent but non-identically distributed (i.n.d.) fading environment show that our proposed HTS achieves overall good channel access delay performance. © 2010 IEEE.

  14. Personalisation meets accessibility : towards the design of individual user interfaces for all. Position paper

    NARCIS (Netherlands)

    Cremers, A.H.M.; Neerincx, M.A.

    2004-01-01

    Current accessibility guidelines are composed to allow users with special needs to more easily and comfortably access the Internet. However, most of the guidelines are written with both a 'standard' device and a 'standard' use context in mind, which is the user sitting in front of a desktop

  15. 75 FR 4101 - Enterprise Income Verification (EIV) System User Access Authorization Form and Rules of Behavior...

    Science.gov (United States)

    2010-01-26

    ... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT [Docket No. FR-5376-N-05] Enterprise Income Verification (EIV) System User Access Authorization Form and Rules of Behavior and User Agreement AGENCY... Access, Authorization Form and Rules Of Behavior and User Agreement. OMB Approval Number: 2577-New. Form...

  16. Providing Access to Census-based Interaction Data in the UK: That's WICID!

    Directory of Open Access Journals (Sweden)

    John Stillwell

    2006-08-01

    Full Text Available The Census Interaction Data Service (CIDS is funded by the Economic and Social Research Council in the UK to provide access for social science researchers and students to the detailed migration and journey-to-work statistics that are collected by the national statistical agencies. These interaction data sets are known collectively as the Special Migration Statistics (SMS and the Special Workplace Statistics (SWS. This paper outlines how problems of user access to these data have been tackled through the development of a web-based system known as WICID (Web-based Interface to Census Interaction Data. The paper illustrates various interface features including some of the query building facilities that enable users to extract counts of flows of particular groups of individuals between selected origin and destination areas. New tools are outlined for assisting area selection using digital maps of census geographies, for planning output and for adding value to the data through analysis. Mapping of flows of migrants between London boroughs and the rest of the UK demonstrates the value of the data. The paper begins with a summary of the data sets that are contained within the system and an outline of the system architecture.

  17. PHOTO ENCODING OF ANALOG WATER METER FOR USER ACCESS AND PAYMENT SYSTEM

    OpenAIRE

    GODFREY A. MILLS; MOSES A. ACQUAH; APPAH BREMANG

    2012-01-01

    This paper presents design reconfiguration of analog water meter to provide remote access to user water consumption and billing records, payments, and meter device monitoring using photo-encoding as the detecting method for water consumption, a PIC18F2423 microcontroller for data processing, and SMS (short message service) technology for data transportation. To validate the system design, an analog water meter was converted into a digital equivalent and interfaced to the cellular network to t...

  18. An Accessible Video Player for Older People: Issues from a User Test

    OpenAIRE

    Villena, Johana M. Rosas; Ramos, Bruno C.; Fortes, Renata P.M.; Goularte, Rudinei

    2014-01-01

    There is a huge availability of videos that have been produced in a very fast and wide way, along with the popularity of Internet. This scenario should be carefully considered by the video authors since many users have different needs. It is important to keep in mind the accessibility requirements so that any user can overcome the barriers to access content regardless of their limitations imposed by either impairment or some temporary restriction. The current video players present barriers fo...

  19. The benefit of the European User Community from transnational access to national radiation facilities

    DEFF Research Database (Denmark)

    Barrier, Elise; Manuel Braz Fernandes, Francisco; Bujan, Maya

    2014-01-01

    Transnational access (TNA) to national radiation sources is presently provided via programmes of the European Commission by BIOSTRUCT-X and CALIPSO with a major benefit for scientists from European countries. Entirely based on scientific merit, TNA allows all European scientists to realise synchr...... development of the research infrastructure of photon science. Taking into account the present programme structure of HORIZON2020, the European Synchrotron User Organization (ESUO) sees considerable dangers for the continuation of this successful collaboration in the future....... synchrotron radiation experiments for addressing the Societal Challenges promoted in HORIZON2020. In addition, by TNA all European users directly take part in the development of the research infrastructure of facilities. The mutual interconnection of users and facilities is a strong prerequisite for future...

  20. fNIRS suggests increased effort during executive access in ecstasy polydrug users.

    Science.gov (United States)

    Roberts, C A; Montgomery, C

    2015-05-01

    Ecstasy use is associated with cognitive impairment, believed to result from damage to 5-HT axons. Neuroimaging techniques to investigate executive dysfunction in ecstasy users provide a more sensitive measure of cognitive impairment than behavioural indicators. The present study assessed executive access to semantic memory in ecstasy polydrug users and non-users. Twenty ecstasy polydrug users and 20 non-user controls completed an oral variant of the Chicago Word Fluency Test (CWFT), whilst the haemodynamic response to the task was measured using functional near-infrared spectroscopy (fNIRS). There were no between-group differences in many background measures including measures of sleep and mood state (anxiety, arousal, hedonic tone). No behavioural differences were observed on the CWFT. However, there were significant differences in oxy-Hb level change at several voxels relating to the left dorsolateral prefrontal cortex (DLPFC) and right medial prefrontal cortex (PFC) during the CWFT, indicating increased cognitive effort in ecstasy users relative to controls. Regression analyses showed that frequency of ecstasy use, total lifetime dose and amount used in the last 30 days was significant predictors of oxy-Hb increase at several voxels after controlling for alcohol and cannabis use indices. The results suggest that ecstasy users show increased activation in the PFC as a compensatory mechanism, to achieve equivalent performance to non-users. These findings are in agreement with much of the literature in the area which suggests that ecstasy may be a selective serotonin neurotoxin in humans.

  1. Development of Web-Based Remote Desktop to Provide Adaptive User Interfaces in Cloud Platform

    OpenAIRE

    Shuen-Tai Wang; Hsi-Ya Chang

    2014-01-01

    Cloud virtualization technologies are becoming more and more prevalent, cloud users usually encounter the problem of how to access to the virtualized remote desktops easily over the web without requiring the installation of special clients. To resolve this issue, we took advantage of the HTML5 technology and developed web-based remote desktop. It permits users to access the terminal which running in our cloud platform from anywhere. We implemented a sketch of web interfac...

  2. The Searching Behavior of Remote Users: A Study of One Online Public Access Catalog (OPAC).

    Science.gov (United States)

    Kalin, Sally W.

    1991-01-01

    Describes a study that was conducted to determine whether the searching behavior of remote users of LIAS (Library Information Access System), Pennsylvania State University's online public access catalog (OPAC), differed from those using the OPAC within the library. Differences in search strategies and in user satisfaction are discussed. (eight…

  3. Virtual Mission Operations Center -Explicit Access to Small Satellites by a Net Enabled User Base

    Science.gov (United States)

    Miller, E.; Medina, O.; Paulsen, P.; Hopkins, J.; Long, C.; Holloman, K.

    2008-08-01

    The Office of Naval Research (ON R), The Office of the Secr etary of Defense (OSD) , Th e Operationally Responsive Space Off ice (ORS) , and th e National Aeronautics and Space Administration (NASA) are funding the development and integration of key technologies and new processes that w ill allow users across th e bread th of operations the ab ility to access, task , retr ieve, and collaborate w ith data from various sensors including small satellites v ia the Intern et and the SIPRnet. The V irtual Mission Oper ations Center (VMO C) facilitates the dynamic apportionmen t of space assets, allows scalable mission man agement of mu ltiple types of sensors, and provid es access for non-space savvy users through an intu itive collaborative w eb site. These key technologies are b eing used as experimentation pathfinders fo r th e Do D's Operationally Responsiv e Sp ace (O RS) initiative and NASA's Sensor W eb. The O RS initiative seeks to provide space assets that can b e rapid ly tailored to meet a commander's in telligen ce or commun ication needs. For the DoD and NASA the V MO C provid es ready and scalab le access to space b ased assets. To the commercial space sector the V MO C may provide an analog to the innovativ e fractional ownersh ip approach represen ted by FlexJet. This pap er delves in to the technology, in tegration, and applicability of th e V MO C to th e DoD , NASA , and co mmer cial sectors.

  4. Deaf New Zealand Sign Language users' access to healthcare.

    Science.gov (United States)

    Witko, Joanne; Boyles, Pauline; Smiler, Kirsten; McKee, Rachel

    2017-12-01

    The research described was undertaken as part of a Sub-Regional Disability Strategy 2017-2022 across the Wairarapa, Hutt Valley and Capital and Coast District Health Boards (DHBs). The aim was to investigate deaf New Zealand Sign Language (NZSL) users' quality of access to health services. Findings have formed the basis for developing a 'NZSL plan' for DHBs in the Wellington sub-region. Qualitative data was collected from 56 deaf participants and family members about their experiences of healthcare services via focus group, individual interviews and online survey, which were thematically analysed. Contextual perspective was gained from 57 healthcare professionals at five meetings. Two professionals were interviewed, and 65 staff responded to an online survey. A deaf steering group co-designed the framework and methods, and validated findings. Key issues reported across the health system include: inconsistent interpreter provision; lack of informed consent for treatment via communication in NZSL; limited access to general health information in NZSL and the reduced ability of deaf patients to understand and comply with treatment options. This problematic communication with NZSL users echoes international evidence and other documented local evidence for patients with limited English proficiency. Deaf NZSL users face multiple barriers to equitable healthcare, stemming from linguistic and educational factors and inaccessible service delivery. These need to be addressed through policy and training for healthcare personnel that enable effective systemic responses to NZSL users. Deaf participants emphasise that recognition of their identity as members of a language community is central to improving their healthcare experiences.

  5. Evaluation of perception on environmental movement: accessibility centered in the user

    Directory of Open Access Journals (Sweden)

    Éden Fernando Batista Ferreira

    2013-04-01

    Full Text Available Introduction: The discussion about accessibility in urban environments is observed in several studies,but the vast majority focuses attention on structural elements and not the user. Objective: This study proposes a method of assessing urban environmental movement, from the point of view of its users, to identify the relationship between perceived barriers and facilitators in the environment movement and aspects of the body functions and structures and the users’ participation in activities, which denotes the degree of accessibility of these people in this space. Method: It describes a case study in Belem, Para state, utilizing a method of assessing the perception of users, based on indicators of environmental factors, activity and participation, structure and functions of the body, highlighted by the International Classification of Functioning, Disability and Health – ICF. Results:The main finding of this study indicates that people’s perceptions about their environment directly influences the movement involved in their occupations. Conclusion: Studies with this content are relevant and necessary in our current society, because they reveal how changes in major urban centers influence the accessibility and involvement of people in their occupations, thereby directly interfering with their health, quality of life, and participation in society.

  6. Achievable Rate of a Cognitive MIMO Multiple Access Channel With Multi-Secondary Users

    KAUST Repository

    Sboui, Lokman; Ghazzai, Hakim; Rezki, Zouheir; Alouini, Mohamed-Slim

    2015-01-01

    We study the secondary sum-rate of an underlay cognitive multiple access channel consisting of a primary user and multiple secondary users (SUs) communicating with a common destination. We propose a particular linear precoding and SU selection scheme that maximize the cognitive sum-rate. This scheme is based on space alignment strategy allowing SUs to share the spectrum without interfering with each other. We derive the optimal power allocation for each selected SU after applying perfect or imperfect successive interference cancellation. Numerical results show that the proposed scheme provides a significant sum-rate improvement as the number of SUs increases. In addition, it achieves almost the same performance as an exhaustive search selection, mainly in low and high power ranges. © 1997-2012 IEEE.

  7. Achievable Rate of a Cognitive MIMO Multiple Access Channel With Multi-Secondary Users

    KAUST Repository

    Sboui, Lokman

    2015-03-01

    We study the secondary sum-rate of an underlay cognitive multiple access channel consisting of a primary user and multiple secondary users (SUs) communicating with a common destination. We propose a particular linear precoding and SU selection scheme that maximize the cognitive sum-rate. This scheme is based on space alignment strategy allowing SUs to share the spectrum without interfering with each other. We derive the optimal power allocation for each selected SU after applying perfect or imperfect successive interference cancellation. Numerical results show that the proposed scheme provides a significant sum-rate improvement as the number of SUs increases. In addition, it achieves almost the same performance as an exhaustive search selection, mainly in low and high power ranges. © 1997-2012 IEEE.

  8. An internet tool for creation of cancer survivorship care plans for survivors and health care providers: design, implementation, use and user satisfaction.

    Science.gov (United States)

    Hill-Kayser, Christine E; Vachani, Carolyn; Hampshire, Margaret K; Jacobs, Linda A; Metz, James M

    2009-09-04

    Survivorship care plans have been recommended by the Institute of Medicine for all cancer survivors. We implemented an Internet-based tool for creation of individualized survivorship care plans. To our knowledge, this is the first tool of this type to be designed and made publicly accessible. To investigate patterns of use and satisfaction with an Internet-based tool for creation of survivorship care plans. OncoLife, an Internet-based program for creation of survivorship care plans, was designed by a team of dedicated oncology nurses and physicians at the University of Pennsylvania. The program was designed to provide individualized, comprehensive health care recommendations to users responding to queries regarding demographics, diagnosis, and cancer treatments. After being piloted to test populations, OncoLife was made publicly accessible via Oncolink, a cancer information website based at the University of Pennsylvania which averages 3.9 million page views and over 385,000 unique visits per month. Data entered by anonymous public users was maintained and analyzed. From May 2007 to November 2008, 3343 individuals utilized this tool. Most (63%) identified themselves as survivors, but also health care providers (25%) and friends/family of survivors (12%). Median age at diagnosis was 48 years (18-100+), and median current age 51 (19-100+). Most users were Caucasian (87%), female (71%), and college-educated (82%). Breast cancer was the most common diagnosis (46%), followed by hematologic (12%), gastrointestinal (11%), gynecologic (9%), and genitourinary (8%). Of all users, 84% had undergone surgery, 80% chemotherapy, and 60% radiotherapy. Half of users (53%) reported receiving follow-up care from only an oncologist, 13% only a primary care provider (PCP), and 32% both; 12% reported having received survivorship information previously. Over 90% of users, both survivors and health care providers, reported satisfaction levels of "good" to "excellent" using this tool

  9. Secure access to patient's health records using SpeechXRays a mutli-channel biometrics platform for user authentication.

    Science.gov (United States)

    Spanakis, Emmanouil G; Spanakis, Marios; Karantanas, Apostolos; Marias, Kostas

    2016-08-01

    The most commonly used method for user authentication in ICT services or systems is the application of identification tools such as passwords or personal identification numbers (PINs). The rapid development in ICT technology regarding smart devices (laptops, tablets and smartphones) has allowed also the advance of hardware components that capture several biometric traits such as fingerprints and voice. These components are aiming among others to overcome weaknesses and flaws of password usage under the prism of improved user authentication with higher level of security, privacy and usability. To this respect, the potential application of biometrics for secure user authentication regarding access in systems with sensitive data (i.e. patient's data from electronic health records) shows great potentials. SpeechXRays aims to provide a user recognition platform based on biometrics of voice acoustics analysis and audio-visual identity verification. Among others, the platform aims to be applied as an authentication tool for medical personnel in order to gain specific access to patient's electronic health records. In this work a short description of SpeechXrays implementation tool regarding eHealth is provided and analyzed. This study explores security and privacy issues, and offers a comprehensive overview of biometrics technology applications in addressing the e-Health security challenges. We present and describe the necessary requirement for an eHealth platform concerning biometric security.

  10. Autonomy and Housing Accessibility Among Powered Mobility Device Users

    Science.gov (United States)

    Brandt, Åse; Lexell, Eva Månsson; Iwarsson, Susanne

    2015-01-01

    OBJECTIVE. To describe environmental barriers, accessibility problems, and powered mobility device (PMD) users’ autonomy indoors and outdoors; to determine the home environmental barriers that generated the most housing accessibility problems indoors, at entrances, and in the close exterior surroundings; and to examine personal factors and environmental components and their association with indoor and outdoor autonomy. METHOD. This cross-sectional study was based on data collected from a sample of 48 PMD users with a spinal cord injury (SCI) using the Impact of Participation and Autonomy and the Housing Enabler instruments. Descriptive statistics and logistic regression were used. RESULTS. More years living with SCI predicted less restriction in autonomy indoors, whereas more functional limitations and accessibility problems related to entrance doors predicted more restriction in autonomy outdoors. CONCLUSION. To enable optimized PMD use, practitioners must pay attention to the relationship between client autonomy and housing accessibility problems. PMID:26356666

  11. Louisiana coastal GIS network: Graphical user interface for access to spatial data

    Science.gov (United States)

    Hiland, Matteson; McBride, Randolph A.; Davis, Donald; Braud, Dewitt; Streiffer, Henry; Jones, Farrell; Lewis, Anthony; Williams, S.

    1991-01-01

    Louisiana's coastal wetlands support a large percentage of the nation's seafood and fur industries, vast deposits of oil and natural gas, habitat for thousands of species of plants and animals, winter nesting grounds and migratory paths for numerous waterfowl, and many recreational resources enjoyed by residents and tourists. Louisiana's wetlands also have the highest rates of coastal erosion and wetland loss in the nation. While numerous studies across many disciplines have been conducted on both local and regional scales, no complete inventory exists for this information. The Louisiana Coastal Geographic Information System Network (LCGISN) is currently being developed to facilitate access to existing data for coastal zone planners, managers, and researchers. The Louisiana Geological Survey (LGS), in cooperation with the LSU Department of Geography and Anthropology, the Computer Aided Design and Geographic Information Systems Research Laboratory (CADGIS), and others, is pursuing this project under the terms of a cooperative agreement with the U.S. Geological Survey. LCGISN is an automated system for searching and retrieving geographic, cartographic, and bibliographic data. By linking original programming with an existing GIS software package and an industry standard relational database management system, LCGISN will provide the capability for users to search for data references by interactively defining the area of interest on a displayed map/image reference background. Several agencies will be networked to provide easy access to a wide variety of information. LCGISN, with its headquarters at LGS, will serve as the central node on the network, providing data format conversions, projection and datum transformations, and storage of several of the most commonly used data sets. Thematic mapper data, USGS 7.5-minute quadrangle map boundaries, political and legal boundaries, major transportation routes, and other digital data will provide a base map to aid the user in

  12. MLF user program

    International Nuclear Information System (INIS)

    Kamiyama, Takashi; Ikeda, Yujiro

    2008-01-01

    The user program of J-PARC/MLF is overviewed. Since MLF will be one of the major neutron facilities in the world, an international standard system for the user program is expected. It is also expected to establish a system to promote users from industries. The MLF user program is based on the IUPAP recommendation on the selection of proposals. Both open and closed accesses, biannual, regular, rapid accesses, etc. will be provided. All the features in the system are being introduced to maximize both scientific and engineering outputs from MLF. (author)

  13. Comparison of trial participants and open access users of a web-based physical activity intervention regarding adherence, attrition, and repeated participation.

    Science.gov (United States)

    Wanner, Miriam; Martin-Diener, Eva; Bauer, Georg; Braun-Fahrländer, Charlotte; Martin, Brian W

    2010-02-10

    Web-based interventions are popular for promoting healthy lifestyles such as physical activity. However, little is known about user characteristics, adherence, attrition, and predictors of repeated participation on open access physical activity websites. The focus of this study was Active-online, a Web-based individually tailored physical activity intervention. The aims were (1) to assess and compare user characteristics and adherence to the website (a) in the open access context over time from 2003 to 2009, and (b) between trial participants and open access users; and (2) to analyze attrition and predictors of repeated use among participants in a randomized controlled trial compared with registered open access users. Data routinely recorded in the Active-online user database were used. Adherence was defined as: the number of pages viewed, the proportion of visits during which a tailored module was begun, the proportion of visits during which tailored feedback was received, and the time spent in the tailored modules. Adherence was analyzed according to six one-year periods (2003-2009) and according to the context (trial or open access) based on first visits and longest visits. Attrition and predictors of repeated participation were compared between trial participants and open access users. The number of recorded visits per year on Active-online decreased from 42,626 in 2003-2004 to 8343 in 2008-2009 (each of six one-year time periods ran from April 23 to April 22 of the following year). The mean age of users was between 38.4 and 43.1 years in all time periods and both contexts. The proportion of women increased from 49.5% in 2003-2004 to 61.3% in 2008-2009 (Popen access users. For open access users, adherence was similar during the first and the longest visits; for trial participants, adherence was lower during the first visits and higher during the longest visits. Of registered open access users and trial participants, 25.8% and 67.3% respectively visited Active

  14. Thus Spake the OPAC User.

    Science.gov (United States)

    Markey, Karen

    1983-01-01

    Findings of focused-group interviews conducted for OCLC study of library users and online public access catalogs (OPACs) indicate users like OPACs, have problems finding right subject heading, envision features to improve subject access, want access to more than books, and want OPACs to provide new services. Eight references are listed. (EJS)

  15. End User Evaluations

    Science.gov (United States)

    Jay, Caroline; Lunn, Darren; Michailidou, Eleni

    As new technologies emerge, and Web sites become increasingly sophisticated, ensuring they remain accessible to disabled and small-screen users is a major challenge. While guidelines and automated evaluation tools are useful for informing some aspects of Web site design, numerous studies have demonstrated that they provide no guarantee that the site is genuinely accessible. The only reliable way to evaluate the accessibility of a site is to study the intended users interacting with it. This chapter outlines the processes that can be used throughout the design life cycle to ensure Web accessibility, describing their strengths and weaknesses, and discussing the practical and ethical considerations that they entail. The chapter also considers an important emerging trend in user evaluations: combining data from studies of “standard” Web use with data describing existing accessibility issues, to drive accessibility solutions forward.

  16. User Perception of Facebook App Data Access: A Comparison of Methods and Privacy Concerns

    Directory of Open Access Journals (Sweden)

    Jennifer Golbeck

    2016-03-01

    Full Text Available Users share vast amounts of personal information online, but are they fully aware of what information they are sharing and with whom? In this paper, we focused on Facebook apps and set out to understand how concerned users are about privacy and how well-informed they are about what personal data apps can access. We found that initially, subjects were generally under-informed about what data apps could access from their profiles. After viewing additional information about these permissions, subjects’ concern about privacy on Facebook increased. Subjects’ understanding of what data apps were able to access increased, although even after receiving explicit information on the topic, many subjects still did not fully understand the extent to which apps could access their data.

  17. A New Key-lock Method for User Authentication and Access Control

    Institute of Scientific and Technical Information of China (English)

    JI Dongyao; ZHANG Futai; WANG Yumin

    2001-01-01

    We propose a new key-lock methodfor user authentication and access control based onChinese remainder theorem, the concepts of the ac-cess control matrix, key-lock-pair, time stamp, and the NS public key protocol. Our method is dynamicand needs a minimum amount of computation in thesense that it only updates at most one key/lock foreach access request. We also demonstrate how an au-thentication protocol can be integrated into the ac-cess control method. By applying a time stamp, themethod can not only withstand replay attack, butalso strengthen the authenticating mechanism, whichcould not be achieved simultaneously in previous key-lock methods.

  18. The TJ-II Relational Database Access Library: A User's Guide

    International Nuclear Information System (INIS)

    Sanchez, E.; Portas, A. B.; Vega, J.

    2003-01-01

    A relational database has been developed to store data representing physical values from TJ-II discharges. This new database complements the existing TJ-EI raw data database. This database resides in a host computer running Windows 2000 Server operating system and it is managed by SQL Server. A function library has been developed that permits remote access to these data from user programs running in computers connected to TJ-II local area networks via remote procedure cali. In this document a general description of the database and its organization are provided. Also given are a detailed description of the functions included in the library and examples of how to use these functions in computer programs written in the FORTRAN and C languages. (Author) 8 refs

  19. CaWingz user's guide

    International Nuclear Information System (INIS)

    Cha, Ben-chin.

    1994-01-01

    This document assumes that you have read and understood the Wingz user's manuals. CaWingz is an external Wingz program which, when combined with a set of script files, provides easy-to-use EPICS channel access interface functions for Wingz users. The external function run allows Wingz user to invoke any Unix processor within caWingz. Few additional functions for accessing static database field and monitoring of value change event is available for EPICS users after release 3.11. The functions, script files, and usage are briefly described in this document. The script files supplied here serve as examples only. Users are responsible for generating their own spreadsheet and script files. CaWingz communicates with IOC through channel access function calls

  20. Making Patron Data Work Harder: User Search Terms as Access Points?

    OpenAIRE

    Jason A. Clark

    2008-01-01

    Montana State University (MSU) Libraries are experimenting with re-using patron-generated data to create browseable access points for the Electronic Theses and Dissertations (ETD) collection. A beta QueryCatcher module logs recent search terms and the number of associated hits. These terms are used to create browseable lists and tagclouds which enhance access to the ETD collection. Gathering and reusing information about user behavior is an emerging trend in web application development. This ...

  1. Access Denied! Contrasting Data Access in the United States and Ireland

    Directory of Open Access Journals (Sweden)

    Grogan Samuel

    2016-07-01

    Full Text Available The ability of an Internet user to access data collected about himself as a result of his online activity is a key privacy safeguard. Online, data access has been overshadowed by other protections such as notice and choice. This paper describes attitudes about data access. 873 US and Irish Internet users participated in a survey designed to examine views on data access to information held by online companies and data brokers. We observed low levels of awareness of access mechanisms along with a high desire for access in both participant groups. We tested three proposed access systems in keeping with industry programs and regulatory proposals. User response was positive. We conclude that access remains an important privacy protection that is inadequately manifested in practice. Our study provides insight for lawmakers and policymakers, as well as computer scientists who implement these systems.

  2. User needs in television archive access

    DEFF Research Database (Denmark)

    Kirkegaard Lunn, Brian

    2009-01-01

    This paper presents a methodical approach for generating deep knowledge about users, as a prerequisite for design and construction of digital information access to cultural heritage information objects. We exemplify this methodical approach by reporting on an explorative study of information need...... topic or content; and 4) Muddled topic or content. Fourthly, the interviewees' needs consist of four phases: 1) Getting an overview of transmitted broadcasts; 2) Identification of borderline exemplars; 3) Selection of specific programmes; and 4) Verification of facts. The present paper presents novel...... research on characteristics of information needs in a television broadcast context. We demonstrate how one may go about generating knowledge which is imperative for the design and construction of future broadcast retrieval systems. Udgivelsesdato: 2009...

  3. Open Access Complements Interlibrary Loan Services, but Additional User Education is

    Directory of Open Access Journals (Sweden)

    Richard Hayman

    2016-03-01

    search. Since staff resources are being redirected to fill user requests for materials that are readily available through open access, this use of staff time may have impacts on resource sharing and the library’s ability to fill ILL requests. The author identifies benefits of using OA resources, including an increased ability of staff to fulfill ILL requests, especially when providing grey literature, theses and dissertations, and conference papers and reports. Another identified benefit was the decreased turnaround time for securing materials, with immediate availability via OA saving 1.15 days to deliver materials to the user. Finally, the library estimates cost savings of over $27,000 (USD, based on estimated traditional per unit ILL costs.

  4. Accessing and disclosing protected resources

    DEFF Research Database (Denmark)

    Olesen, Henning; Khajuria, Samant

    2015-01-01

    Today, data is money. Whether it is private users' personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization measures to be deployed. Enabling...... advanced user controlled privacy is essential to realize the visions of 5G applications and services. For service providers and enterprises resources are usually well safeguarded, while private users are often missing the tools and the know-how to protect their own data and preserve their privacy. The user...... the framework of User Managed Access (UMA), can enable users to understand the value of their protected resources and possibly give them control of how their data will be used by service providers....

  5. Designing the OPAC User Interface to Improve Access and Retrieval.

    Science.gov (United States)

    Basista, Thomas; And Others

    1991-01-01

    Discussion of problems with retrieval of records in library online public access catalogs (OPACs) focuses on an ongoing research project at the Indiana University of Pennsylvania (IUP) that has been trying to improve subject retrieval vocabulary control using natural and thesaural language and on the design of a good graphical user interface.…

  6. Subject Access Problems of Different Types of OPAC Users Or, the Double Challenge.

    Science.gov (United States)

    Cochrane, Pauline A.

    1989-01-01

    Reviews the problems of users of online public access catalogs and argues that it is necessary to think of all searching problems as systems problems rather than user failures, and to concentrate research in the area of systems enhancements. A list of improved tools needed for subject searching in online catalogs is identified. (CLB)

  7. Impact of Users Identities and Access Conditions on Downlink Performance in Closed Small-Cell Networks

    KAUST Repository

    Radaydeh, Redha; Gaaloul, Fakhreddine; Alouini, Mohamed-Slim

    2015-01-01

    This paper investigates the effect of various operation parameters on the downlink user performance in overlaid small-cell networks. The case study considers closed-access small cells (e.g., femtocells), wherein only active authorized user

  8. User-oriented information access by information need recontextualisation and articulation. Application in nuclear criticality safety

    International Nuclear Information System (INIS)

    Medini, Lionel

    2001-01-01

    This research thesis addresses the design methodology of a system of access to information which is based on an access to relevant information with respect to user needs. In a first part, the author addresses the various issues related to access to information and to information understanding. The next part addresses the involved methods and tools and presents the operational approach adopted for this research regarding access to information. Different disciplines are addressed (knowledge management, ergonomics and information science) and different technologies are used (W3 and XML, DVP, ActiveX, pdf format and the Adobe suite). In the core chapter, the author reports the design of a LMCE (a multi-user book of electronic knowledge) which allows both hypermedia navigation in knowledge diagrams and a construction of a document query. This design is based on a knowledge-management modelling to define diagrams, on ergonomics modelling for user profile identification, and on information science for a specific indexing of the information system. The prototype can be visualized with a web browser such as Internet Explorer 5. The author reports a first assessment and discusses the contribution of his approach to the problematic of access to information which is to be applied to nuclear criticality safety [fr

  9. Accessibility through user-centred and Inclusive Design processes

    DEFF Research Database (Denmark)

    Herriott, Richard

    2014-01-01

    This PhD dissertation addresses the subject of accessibility through user-centred and Inclusive Design processes (ID). The project takes as its starting point the observation that the concept of Inclusive Design is not adequately delimited. The supporting literature in the field of ID is structured...... around the fact that the needs of individuals with reduced capabilities compared to the norm (referred to for convenience as "the elderly and disabled") have not been properly addressed by standard design processes. In response to this fact, ID is a proposed design method to find more effective means...

  10. Assessing mouse alternatives to access to computer: a case study of a user with cerebral palsy.

    Science.gov (United States)

    Pousada, Thais; Pareira, Javier; Groba, Betania; Nieto, Laura; Pazos, Alejandro

    2014-01-01

    The purpose of this study is to describe the process of assessment of three assistive devices to meet the needs of a woman with cerebral palsy (CP) in order to provide her with computer access and use. The user has quadriplegic CP, with anarthria, using a syllabic keyboard. Devices were evaluated through a three-step approach: (a) use of a questionnaire to preselect potential assistive technologies, (b) use of an eTAO tool to determine the effectiveness of each devised, and (c) a conducting semi-structured interview to obtain qualitative data. Touch screen, joystick, and trackball were the preselected devices. The best device that met the user's needs and priorities was joystick. The finding was corroborated by both the eTAO tool and the semi-structured interview. Computers are a basic form of social participation. It is important to consider the special needs and priorities of users and to try different devices when undertaking a device-selection process. Environmental and personal factors have to be considered, as well. This leads to a need to evaluate new tools in order to provide the appropriate support. The eTAO could be a suitable instrument for this purpose. Additional research is also needed to understand how to better match devices with different user populations and how to comprehensively evaluate emerging technologies relative to users with disabilities.

  11. Accessing and disclosing protected resources

    DEFF Research Database (Denmark)

    Olesen, Henning; Khajuria, Samant

    2014-01-01

    TODAY, DATA IS MONEY. Whether it is private users’ personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization. For service providers and enterpr......TODAY, DATA IS MONEY. Whether it is private users’ personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization. For service providers...... and enterprises resources are usually well safeguarded, while private users are often missing the tools and the know-how to protect their own data and preserve their privacy. The user’s personal data have become an economic asset, not necessarily to the owners of these data, but to the service providers, whose...... business mod- els often includes the use of these data. In this paper we focus on the user – service provider interaction and discuss how recent technological progress, in particular the framework of User Managed Access (UMA), can enable users to understand the value of their protected resources...

  12. Broadband Wireline Provider Service: Optical Carrier - Fiber to the End User; BBRI_fiber12

    Data.gov (United States)

    University of Rhode Island Geospatial Extension Program — This dataset represents the availability of wireline broadband Internet access in Rhode Island via "Optical Carrier - Fiber to the End User" technology. Broadband...

  13. Representing Graphical User Interfaces with Sound: A Review of Approaches

    Science.gov (United States)

    Ratanasit, Dan; Moore, Melody M.

    2005-01-01

    The inability of computer users who are visually impaired to access graphical user interfaces (GUIs) has led researchers to propose approaches for adapting GUIs to auditory interfaces, with the goal of providing access for visually impaired people. This article outlines the issues involved in nonvisual access to graphical user interfaces, reviews…

  14. Creating Accessible Science Museums with User-Activated Environmental Audio Beacons (Ping!)

    Science.gov (United States)

    Landau, Steven; Wiener, William; Naghshineh, Koorosh; Giusti, Ellen

    2005-01-01

    In 2003, Touch Graphics Company carried out research on a new invention that promises to improve accessibility to science museums for visitors who are visually impaired. The system, nicknamed Ping!, allows users to navigate an exhibit area, listen to audio descriptions, and interact with exhibits using a cell phone-based interface. The system…

  15. BlindSense: An Accessibility-inclusive Universal User Interface for Blind People

    Directory of Open Access Journals (Sweden)

    A. Khan

    2018-04-01

    Full Text Available A large number of blind people use smartphone-based assistive technology to perform their common activities. In order to provide a better user experience the existing user interface paradigm needs to be revisited. A new user interface model has been proposed in this paper. A simplified, semantically consistent, and blind-friendly adaptive user interface is provided. The proposed solution is evaluated through an empirical study on 63 blind people leveraging an improved user experience in performing common activities on a smartphone.

  16. An Accessible User Interface for Geoscience and Programming

    Science.gov (United States)

    Sevre, E. O.; Lee, S.

    2012-12-01

    The goal of this research is to develop an interface that will simplify user interaction with software for scientists. The motivating factor of the research is to develop tools that assist scientists with limited motor skills with the efficient generation and use of software tools. Reliance on computers and programming is increasing in the world of geology, and it is increasingly important for geologists and geophysicists to have the computational resources to use advanced software and edit programs for their research. I have developed a prototype of a program to help geophysicists write programs using a simple interface that requires only simple single-mouse-clicks to input code. It is my goal to minimize the amount of typing necessary to create simple programs and scripts to increase accessibility for people with disabilities limiting fine motor skills. This interface can be adapted for various programming and scripting languages. Using this interface will simplify development of code for C/C++, Java, and GMT, and can be expanded to support any other text based programming language. The interface is designed around the concept of maximizing the amount of code that can be written using a minimum number of clicks and typing. The screen is split into two sections: a list of click-commands is on the left hand side, and a text area is on the right hand side. When the user clicks on a command on the left hand side the applicable code is automatically inserted at the insertion point in the text area. Currently in the C/C++ interface, there are commands for common code segments that are often used, such as for loops, comments, print statements, and structured code creation. The primary goal is to provide an interface that will work across many devices for developing code. A simple prototype has been developed for the iPad. Due to the limited number of devices that an iOS application can be used with, the code has been re-written in Java to run on a wider range of devices

  17. DIRAC: Secure web user interface

    International Nuclear Information System (INIS)

    Casajus Ramo, A; Sapunov, M

    2010-01-01

    Traditionally the interaction between users and the Grid is done with command line tools. However, these tools are difficult to use by non-expert users providing minimal help and generating outputs not always easy to understand especially in case of errors. Graphical User Interfaces are typically limited to providing access to the monitoring or accounting information and concentrate on some particular aspects failing to cover the full spectrum of grid control tasks. To make the Grid more user friendly more complete graphical interfaces are needed. Within the DIRAC project we have attempted to construct a Web based User Interface that provides means not only for monitoring the system behavior but also allows to steer the main user activities on the grid. Using DIRAC's web interface a user can easily track jobs and data. It provides access to job information and allows performing actions on jobs such as killing or deleting. Data managers can define and monitor file transfer activity as well as check requests set by jobs. Production managers can define and follow large data productions and react if necessary by stopping or starting them. The Web Portal is build following all the grid security standards and using modern Web 2.0 technologies which allow to achieve the user experience similar to the desktop applications. Details of the DIRAC Web Portal architecture and User Interface will be presented and discussed.

  18. Automated Computer Access Request System

    Science.gov (United States)

    Snook, Bryan E.

    2010-01-01

    The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).

  19. Browsing for the Best Internet Access Provider?

    Science.gov (United States)

    Weil, Marty

    1996-01-01

    Highlights points to consider when choosing an Internet Service Provider. Serial Line Internet Protocol (SLIP) and Point to Point Protocol (PPP) are compared regarding price, performance, bandwidth, speed, and technical support. Obtaining access via local, national, consumer online, and telephone-company providers is discussed. A pricing chart and…

  20. Virtual reality for accessibility assessment of a built environment for a wheelchair user

    OpenAIRE

    MOUSSAOUI, Abdelhak; PRUSKI, Alain; MAAOUI, Choubeila

    2012-01-01

    The aging world population requires more attention to the autonomy of individuals. The impaired physical abilities need changes in the built environment for an optimal use. Due to physical limitations, aged persons frequently become users of a wheelchair which also leads to limitations in accessing their homes. This paper describes a tool for evaluating mobility and grasping, thus allowing housing professionals to assess the needed changes in terms of accessibility. This tool, which uses the ...

  1. Examination of cultural competence in service providers in an early intervention programme for psychosis in Montreal, Quebec: Perspectives of service users and treatment providers.

    Science.gov (United States)

    Venkataraman, Shruthi; Jordan, Gerald; Pope, Megan A; Iyer, Srividya N

    2018-06-01

    To better understand cultural competence in early intervention for psychosis, we compared service users' and service providers' perceptions of the importance of providers being culturally competent and attentive to aspects of culture. At a Canadian early intervention programme, a validated scale was adapted to assess service user (N = 51) and provider (N = 30) perceptions of service providers' cultural competence and the importance accorded thereto. Analyses of variance revealed that the importance of service providers being culturally competent was rated highest by service providers, followed by visible minority service users, followed by white service users. Providers rated themselves as being more interested in knowing about service users' culture than service users perceived them to be. Service users accorded less import to service providers' cultural competence than providers themselves, owing possibly to varied socialization. A mismatch in users' and providers' views on providers' efforts to know their users' cultures may influence mental healthcare outcomes. © 2017 John Wiley & Sons Australia, Ltd.

  2. Overall satisfaction of health care users with the quality of and access to health care services: a cross-sectional study in six Central and Eastern European countries.

    Science.gov (United States)

    Stepurko, Tetiana; Pavlova, Milena; Groot, Wim

    2016-08-02

    The measurement of consumer satisfaction is an essential part of the assessment of health care services in terms of service quality and health care system responsiveness. Studies across Europe have described various strategies health care users employ to secure services with good quality and quick access. In Central and Eastern European countries, such strategies also include informal payments to health care providers. This paper analyzes the satisfaction of health care users with the quality of and access to health care services. The study focuses on six Central and Eastern European countries (Bulgaria, Hungary, Lithuania, Poland, Romania and Ukraine). We use data on past experience with health care use collected in 2010 through uniform national surveys in these countries. Based on these data, we carry out a multi-country analysis to investigate factors associated with the satisfaction of health care users in the six countries. The results indicate that about 10-14 % of the service users are not satisfied with the quality of, or access to health care services they used in the preceding year. However, significant differences across countries and services are observed, e.g. the highest level of dissatisfaction with access to outpatient services (16.4 %) is observed among patients in Lithuania, while in Poland, the level of dissatisfaction with quality of outpatient and inpatient services are much lower than dissatisfaction with access. The study also analyses the association of users' satisfaction with factors such as making informal payments, inability to pay and relative importance of service attributes stated by the service users. These multi-country findings provide evidence for health policy making in the Central and Eastern European countries. Although the average rates of satisfactions per country are relatively high, the results suggest that there is ample room for improvements. Specifically, many service-users still report dissatisfaction especially those

  3. Optical code division multiple access secure communications systems with rapid reconfigurable polarization shift key user code

    Science.gov (United States)

    Gao, Kaiqiang; Wu, Chongqing; Sheng, Xinzhi; Shang, Chao; Liu, Lanlan; Wang, Jian

    2015-09-01

    An optical code division multiple access (OCDMA) secure communications system scheme with rapid reconfigurable polarization shift key (Pol-SK) bipolar user code is proposed and demonstrated. Compared to fix code OCDMA, by constantly changing the user code, the performance of anti-eavesdropping is greatly improved. The Pol-SK OCDMA experiment with a 10 Gchip/s user code and a 1.25 Gb/s user data of payload has been realized, which means this scheme has better tolerance and could be easily realized.

  4. Unifying Water Data Sources: How the CUAHSI Water Data Center is Enabling and Improving Access to a Growing Catalog of over 100 Data Providers

    Science.gov (United States)

    Pollak, J.; Berry, K.; Couch, A.; Arrigo, J.; Hooper, R. P.

    2013-12-01

    Scientific data about water are collected and distributed by numerous sources which can differ tremendously in scale. As competition for water resources increases, increasing access to and understanding of information about water will be critical. The mission of the new CUAHSI Water Data Center (WDC) is to provide those researchers who collect data a medium to publish their datasets and give those wanting to discover data the proper tools to efficiently find the data that they seek. These tools include standards-based data publication, data discovery tools based upon faceted and telescoping search, and a data analysis tool HydroDesktop that downloads and unifies data in standardized formats. The CUAHSI Hydrologic Information System (HIS) is a community developed and open source system for sharing water data. As a federated, web service oriented system it enables data publication for a diverse user population including scientific investigators (Research Coordination Networks, Critical Zone Observatories), government agencies (USGS, NASA, EPA), and citizen scientists (watershed associations). HydroDesktop is an end user application for data consumption in this system that the WDC supports. This application can be used for finding, downloading, and analyzing data from the HIS. It provides a GIS interface that allows users to incorporate spatial data that are not accessible via HIS, simple analysis tools to facilitate graphing and visualization, tools to export data to common file types, and provides an extensible architecture that developers can build upon. HydroDesktop, however, is just one example of a data access client for HIS. The web service oriented architecture enables data access by an unlimited number of clients provided they can consume the web services used in HIS. One such example developed at the WDC is the 'Faceted Search Client', which capitalizes upon exploratory search concepts to improve accuracy and precision during search. We highlight such

  5. The Hydrograph Analyst, an Arcview GIS Extension That Integrates Point, Spatial, and Temporal Data Provides A Graphical User Interface for Hydrograph Analysis

    International Nuclear Information System (INIS)

    Jones, M.L.; O'Brien, G.M.; Jones, M.L.

    2000-01-01

    The Hydrograph Analyst (HA) is an ArcView GIS 3.2 extension developed by the authors to analyze hydrographs from a network of ground-water wells and springs in a regional ground-water flow model. ArcView GIS integrates geographic, hydrologic, and descriptive information and provides the base functionality needed for hydrograph analysis. The HA extends ArcView's base functionality by automating data integration procedures and by adding capabilities to visualize and analyze hydrologic data. Data integration procedures were automated by adding functionality to the View document's Document Graphical User Interface (DocGUI). A menu allows the user to query a relational database and select sites which are displayed as a point theme in a View document. An ''Identify One to Many'' tool is provided within the View DocGUI to retrieve all hydrologic information for a selected site and display it in a simple and concise tabular format. For example, the display could contain various records from many tables storing data for one site. Another HA menu allows the user to generate a hydrograph for sites selected from the point theme. Hydrographs generated by the HA are added as hydrograph documents and accessed by the user with the Hydrograph DocGUI, which contains tools and buttons for hydrograph analysis. The Hydrograph DocGUI has a ''Select By Polygon'' tool used for isolating particular points on the hydrograph inside a user-drawn polygon or the user could isolate the same points by constructing a logical expression with the ArcView GIS ''Query Builder'' dialog that is also accessible in the Hydrograph DocGUI. Other buttons can be selected to alter the query applied to the active hydrograph. The selected points on the active hydrograph can be attributed (or flagged) individually or as a group using the ''Flag'' tool found on the Hydrograph DocGUI. The ''Flag'' tool activates a dialog box that prompts the user to select an attribute and ''methods'' or ''conditions'' that qualify

  6. Capacity bounds for the 2-user Gaussian IM-DD optical multiple-access channel

    KAUST Repository

    Al-Ebraheemy, Omer M. S.

    2016-11-01

    Optical wireless communications (OWC) is a potential solution for coping with the mismatch between the users growing demand for higher data-rates and the wireless network capabilities. In this paper, a multi-user OWC scenario is studied from an in formation-theoretic perspective. The studied network consists of two users communicating simultaneously with one access point using OWC, thus establishing an optical uplink channel. The capacity of this network is an important metric which reflects the highest possible communication rates that can be achieved over this channel. Capacity outer and inner bounds are derived, and are shown to be fairly tight in the high signal-to-noise ratio regime. © 2016 IEEE.

  7. Factors that help injecting drug users to access and benefit from services: A qualitative study

    Directory of Open Access Journals (Sweden)

    sheard Laura

    2007-10-01

    Full Text Available Abstract Background International research shows that injecting drug users (IDUs can encounter many barriers when they try to access drug treatment and other services. However, the existing literature is mostly quantitative and does not consider the kinds of factors that injectors themselves identify as enabling them to access and benefit from services. Responding to this gap in knowledge, our paper explores IDUs' own suggestions for improving service engagement and their reports of other factors enabling them to seek help. Methods Semi-structured qualitative interviews were conducted with 75 current illicit drug injectors in three geographically diverse areas of West Yorkshire, England. Recruitment was through needle exchange programmes, with additional snowball sampling to ensure inclusivity of gender, ethnicity and primary drug injected. Transcribed data were analysed thematically using Framework. Results Although participants were often satisfied with current access to services, they made three broad suggestions for improving engagement. These were: providing more services (more providers and more forms of support; better operation of existing services (including better communication systems and more flexibility around individual needs; and staffing-related improvements (particularly, less judgemental and more understanding staff attitudes. Other factors identified as important enablers of help seeking were: having supporting relationships (particularly with family members; personal circumstances/life events (especially becoming a parent; and an injector's state of mind (such as feeling motivated and positive. Conclusion A range of practical suggestions for improving IDUs' access to drug treatment and other services are identified.

  8. Developing a useful, user-friendly website for cancer patient follow-up: users' perspectives on ease of access and usefulness.

    Science.gov (United States)

    Bartlett, Y K; Selby, D L; Newsham, A; Keding, A; Forman, D; Brown, J; Velikova, G; Wright, P

    2012-11-01

    UK cancer survival has improved, leading to an increase in review patients and pressure on clinics. Use of the Internet for information exchange between patients and healthcare staff may provide a useful adjunct or alternative to traditional follow-up. This study aimed to develop and evaluate a website for use in follow-up cancer care in terms of usability, feasibility and acceptability. A website was developed and underwent iterative amendment following patient usability testing in focus groups. Patients on follow-up completed a Computer and Internet Usage Questionnaire. Internet users consented to a randomised crossover study to complete paper and online questionnaires, browse the website and participate in a website evaluation interview. Patient website use was tracked. Usability: Website changes were made following patient testing (n= 21). Patients would have liked a 'personalized' website with links to their clinical team, out with the scope of this study. Feasibility: The majority of participants (65%) had Internet access. Age remained a differentiating factor. Acceptability: Final evaluation (n= 103) was positive although many would like to maintain face-to-face hospital contact. User involvement in website design can ensure patient needs are met. A website model for follow-up will suit some patients but others will prefer clinical contact. © 2012 Blackwell Publishing Ltd.

  9. Access to finance from different finance provider types

    NARCIS (Netherlands)

    Wulandari, Eliana; Meuwissen, Miranda P.M.; Karmana, Maman H.; Oude Lansink, Alfons G.J.M.

    2017-01-01

    Analysing farmer knowledge of the requirements of finance providers can provide valuable insights to policy makers about ways to improve farmers’ access to finance. This study compares farmer knowledge of the requirements to obtain finance with the actual requirements set by different finance

  10. User Practices in Keyword and Boolean Searching on an Online Public Access Catalog.

    Science.gov (United States)

    Ensor, Pat

    1992-01-01

    Discussion of keyword and Boolean searching techniques in online public access catalogs (OPACs) focuses on a study conducted at Indiana State University that examined users' attitudes toward searching on NOTIS (Northwestern Online Total Integrated System). Relevant literature is reviewed, and implications for library instruction are suggested. (17…

  11. 77 FR 73455 - Transportation Workers Identification Card (TWIC) Removal for Commercial Users To Access...

    Science.gov (United States)

    2012-12-10

    ... Manager at [email protected]us.army.mil . References: Department of Defense Instruction number 8520.2... DEPARTMENT OF DEFENSE Department of the Army Transportation Workers Identification Card (TWIC) Removal for Commercial Users To Access Electronic Transportation Acquisition (ETA) AGENCY: Department of...

  12. Providing comprehensive and consistent access to astronomical observatory archive data: the NASA archive model

    Science.gov (United States)

    McGlynn, Thomas; Fabbiano, Giuseppina; Accomazzi, Alberto; Smale, Alan; White, Richard L.; Donaldson, Thomas; Aloisi, Alessandra; Dower, Theresa; Mazzerella, Joseph M.; Ebert, Rick; Pevunova, Olga; Imel, David; Berriman, Graham B.; Teplitz, Harry I.; Groom, Steve L.; Desai, Vandana R.; Landry, Walter

    2016-07-01

    Since the turn of the millennium a constant concern of astronomical archives have begun providing data to the public through standardized protocols unifying data from disparate physical sources and wavebands across the electromagnetic spectrum into an astronomical virtual observatory (VO). In October 2014, NASA began support for the NASA Astronomical Virtual Observatories (NAVO) program to coordinate the efforts of NASA astronomy archives in providing data to users through implementation of protocols agreed within the International Virtual Observatory Alliance (IVOA). A major goal of the NAVO collaboration has been to step back from a piecemeal implementation of IVOA standards and define what the appropriate presence for the US and NASA astronomy archives in the VO should be. This includes evaluating what optional capabilities in the standards need to be supported, the specific versions of standards that should be used, and returning feedback to the IVOA, to support modifications as needed. We discuss a standard archive model developed by the NAVO for data archive presence in the virtual observatory built upon a consistent framework of standards defined by the IVOA. Our standard model provides for discovery of resources through the VO registries, access to observation and object data, downloads of image and spectral data and general access to archival datasets. It defines specific protocol versions, minimum capabilities, and all dependencies. The model will evolve as the capabilities of the virtual observatory and needs of the community change.

  13. 15 CFR Appendix A to Part 950 - Schedule of User Fees for Access to NOAA Environmental Data

    Science.gov (United States)

    2010-01-01

    ... NOAA Environmental Data A Appendix A to Part 950 Commerce and Foreign Trade Regulations Relating to..., App. A Appendix A to Part 950—Schedule of User Fees for Access to NOAA Environmental Data Name of product/data/publication/information/service Current fee New fee NOAA National Data Centers Standard User...

  14. Inequities in accessibility to and utilisation of maternal health services in Ghana after user-fee exemption: a descriptive study.

    Science.gov (United States)

    Ganle, John K; Parker, Michael; Fitzpatrick, Raymond; Otupiri, Easmon

    2014-11-01

    Inequities in accessibility to, and utilisation of maternal healthcare services impede progress towards attainment of the maternal health-related Millennium Development Goals. The objective of this study is to examine the extent to which maternal health services are utilised in Ghana, and whether inequities in accessibility to and utilization of services have been eliminated following the implementation of a user-fee exemption policy, that aims to reduce financial barriers to access, reduce inequities in access, and improve access to and use of birthing services. We analyzed data from the 2007 Ghana Maternal Health Survey for inequities in access to and utilization of maternal health services. In measuring the inequities, frequency tables and cross-tabulations were used to compare rates of service utilization by region, residence and selected socio-demographic variables. Findings show marginal increases in accessibility to and utilisation of skilled antenatal, delivery and postnatal care services following the policy implementation (2003-2007). However, large gradients of inequities exist between geographic regions, urban and rural areas, and different socio-demographic, religious and ethnic groupings. More urban women (40%) than rural, 53% more women in the highest wealth quintile than women in the lowest, 38% more women in the best performing region (Central Region) than the worst (Upper East Region), and 48% more women with at least secondary education than those with no formal education, accessed and used all components of skilled maternal health services in the five years preceding the survey. Our findings raise questions about the potential equity and distributional benefits of Ghana's user-fee exemption policy, and the role of non-financial barriers or considerations. Exempting user-fees for maternal health services is a promising policy option for improving access to maternal health care, but might be insufficient on its own to secure equitable access to

  15. Cross-National User Priorities for Housing Provision and Accessibility — Findings from the European innovAge Project

    Directory of Open Access Journals (Sweden)

    Maria Haak

    2015-03-01

    Full Text Available To develop an innovative information and communication technology (ICT tool intended to help older people in their search for optimal housing solutions, a first step in the development process is to gain knowledge from the intended users. Thus the aim of this study was to deepen the knowledge about needs and expectations about housing options as expressed and prioritized by older people, people ageing with disabilities and professionals. A participatory design focus was adopted; 26 people with a range of functional limitations representing the user perspective and 15 professionals with a variety of backgrounds, participated in research circles that were conducted in four European countries. An additional 20 experts were invited as guests to the different research circle meetings. Three themes illustrating cross-national user priorities for housing provision and accessibility were identified: “Information barrier: accessible housing”, “Information barrier: housing adaptation benefits”, and “Cost barrier: housing adaptations”. In conclusion, early user involvement and identification of cross-national differences in priorities and housing options will strengthen the development of a user-friendly ICT tool that can empower older people and people with disabilities to be more active consumers regarding housing provision.

  16. Perceptions of users and providers on barriers to utilizing skilled birth care in mid- and far-western Nepal: a qualitative study

    Directory of Open Access Journals (Sweden)

    Sharad Onta

    2014-08-01

    Full Text Available Background: Although skilled birth care contributes significantly to the prevention of maternal and newborn morbidity and mortality, utilization of such care is poor in mid- and far-western Nepal. This study explored the perceptions of service users and providers regarding barriers to skilled birth care. Design: We conducted 24 focus group discussions, 12 each with service users and service providers from different health institutions in mid- and far-western Nepal. All discussions examined the perceptions and experiences of service users and providers regarding barriers to skilled birth care and explored possible solutions to overcoming such barriers. Results: Our results determined that major barriers to skilled birth care include inadequate knowledge of the importance of services offered by skilled birth attendants (SBAs, distance to health facilities, unavailability of transport services, and poor availability of SBAs. Other barriers included poor infrastructure, meager services, inadequate information about services/facilities, cultural practices and beliefs, and low prioritization of birth care. Moreover, the tradition of isolating women during and after childbirth decreased the likelihood that women would utilize delivery care services at health facilities. Conclusions: Service users and providers perceived inadequate availability and accessibility of skilled birth care in remote areas of Nepal, and overall utilization of these services was poor. Therefore, training and recruiting locally available health workers, helping community groups establish transport mechanisms, upgrading physical facilities and services at health institutions, and increasing community awareness of the importance of skilled birth care will help bridge these gaps.

  17. Perceptions of users and providers on barriers to utilizing skilled birth care in mid- and far-western Nepal: a qualitative study.

    Science.gov (United States)

    Onta, Sharad; Choulagai, Bishnu; Shrestha, Binjwala; Subedi, Narayan; Bhandari, Gajananda P; Krettek, Alexandra

    2014-01-01

    Although skilled birth care contributes significantly to the prevention of maternal and newborn morbidity and mortality, utilization of such care is poor in mid- and far-western Nepal. This study explored the perceptions of service users and providers regarding barriers to skilled birth care. We conducted 24 focus group discussions, 12 each with service users and service providers from different health institutions in mid- and far-western Nepal. All discussions examined the perceptions and experiences of service users and providers regarding barriers to skilled birth care and explored possible solutions to overcoming such barriers. Our results determined that major barriers to skilled birth care include inadequate knowledge of the importance of services offered by skilled birth attendants (SBAs), distance to health facilities, unavailability of transport services, and poor availability of SBAs. Other barriers included poor infrastructure, meager services, inadequate information about services/facilities, cultural practices and beliefs, and low prioritization of birth care. Moreover, the tradition of isolating women during and after childbirth decreased the likelihood that women would utilize delivery care services at health facilities. Service users and providers perceived inadequate availability and accessibility of skilled birth care in remote areas of Nepal, and overall utilization of these services was poor. Therefore, training and recruiting locally available health workers, helping community groups establish transport mechanisms, upgrading physical facilities and services at health institutions, and increasing community awareness of the importance of skilled birth care will help bridge these gaps.

  18. Impact of Users Identities and Access Conditions on Downlink Performance in Closed Small-Cell Networks

    KAUST Repository

    Radaydeh, Redha

    2015-05-26

    This paper investigates the effect of various operation parameters on the downlink user performance in overlaid small-cell networks. The case study considers closed-access small cells (e.g., femtocells), wherein only active authorized user equipments (UEs) can be served, and each of which is allocated single downlink channel at a time. On the other hand, the macrocell base station can unconditionally serve macrocell UEs that exist inside its coverage space. The available channels can be shared simultaneously in the macrocell network and the femtocell network. Moreover, a channel can be reused only at the macrocell base station. The analysis provides quantitative approaches to model UEs identities, their likelihoods of being active, and their likelihoods of producing interference, considering UEs classifications, locations, and access capabilities. Moreover, it develops models for various interference sources observed from effective interference femtocells, considering femtocells capacities and operation conditions. The associated formulations to describe a desired UE performance and the impact of the number of available channels as well as the adopted channel assignment approach are thoroughly investigated. The results are generally presented for any channel models of interference sources as well as the desired source of the served UE. Moreover, specific channel models are then adopted, for which generalized closedform analytical results for the desired UE outage probability performance are obtained. Numerical and simulation results are presented to further clarify the main outcomes of the developed analysis.

  19. A Comparison of Mobile and Fixed Device Access on User Engagement Associated With Women, Infants, and Children (WIC) Online Nutrition Education.

    Science.gov (United States)

    Brusk, John J; Bensley, Robert J

    2016-11-15

    Online health education has expanded its reach due to cost-effective implementation and demonstrated effectiveness. However, a limitation exists with the evaluation of online health education implementations and how the impact of the system is attenuated by the extent to which a user engages with it. Moreover, the current online health education research does not consider how this engagement has been affected by the transition from fixed to mobile user access over the last decade. This paper focuses on comparing the impact mobile versus fixed devices have on user engagement key performance indicators (KPI) associated with the wichealth website (.org), an Internet-based parent-child feeding intervention offered to clients associated with the US Department of Agriculture's Special Supplemental Nutrition Program for Women, Infants, and Children (WIC). Data were collected from 612,201 nutrition education lessons completed by 305,735 unique WIC participants in 21 states over a 1-year period. Data consisted of system-collected measures, profile items, and items from an exit survey administered at the conclusion of each lesson. User engagement was defined based on 3 KPIs associated with usage of the wichealth website: number of link views, link view time, and progression in stage of readiness to change. Independent samples t tests were used to compare KPIs between fixed only and mobile only device users and paired samples t tests were used to compare KPIs within users who completed at least one lesson each on both a fixed and mobile device. A logistic regression was performed to estimate the odds of KPI performance thresholds in the independent samples study group given access device type while controlling for confounding of user characteristics associated with these KPIs. Analysis of 8 user characteristics (lessons completed, race, ethnicity, language, state of residence, pregnancy status, beginning stage of change, and preferred nutrition education method) were

  20. Automating testbed documentation and database access using World Wide Web (WWW) tools

    Science.gov (United States)

    Ames, Charles; Auernheimer, Brent; Lee, Young H.

    1994-01-01

    A method for providing uniform transparent access to disparate distributed information systems was demonstrated. A prototype testing interface was developed to access documentation and information using publicly available hypermedia tools. The prototype gives testers a uniform, platform-independent user interface to on-line documentation, user manuals, and mission-specific test and operations data. Mosaic was the common user interface, and HTML (Hypertext Markup Language) provided hypertext capability.

  1. The Effect of Transport Accessibility on the Social Inclusion of Wheelchair Users: A Mixed Method Analysis

    Directory of Open Access Journals (Sweden)

    Raquel Velho

    2016-06-01

    Full Text Available In recent years the accessibility of London buses has improved with the introduction of ramps and wheelchair priority areas. These advances are meant to remove physical barriers to entering the bus, but new conflicts have arisen particularly over the physical space aboard. We aimed to research the barriers faced by wheelchair users in public transport using a mixed methods approach to establish the breadth of issues faced by wheelchair users. To this end we quantified the push-force used alight a bus and a study to understand the coping mechanisms used by people to propel up a ramp. This quantitative approach found push forces which resulted in a load of 2 to 3 times body weight being transferred through people’s shoulders, forces which can be directly linked to shoulder injury. This could disable the user further, preventing them from being able to push their wheelchair. Alongside the quantitative study, we conducted qualitative research comprising of a number of in-depth interviews with wheelchair users about the barriers they face in public transport. Our main claim, highlighted through this interdisciplinary collaboration, is that proposed ‘solutions’ to accessibility, such as ramps, often generate problems of their own. These barriers can affect the life of wheelchair users, impacting on their confidence and causing social isolation. These can be long-term in nature or immediate.

  2. Vote to link: Recovering from misbehaving anonymous users

    NARCIS (Netherlands)

    Lueks, W.; Everts, M.H.; Hoepman, J.H.

    2016-01-01

    Service providers are often reluctant to support anonymous access, because this makes it hard to deal with misbehaving users. Anonymous blacklisting and reputation systems can help prevent misbehaving users from causing more damage. However, by the time the user is blocked or has lost reputation,

  3. Scaffolding the design of accessible eLearning content: a user-centered approach and cognitive perspective.

    Science.gov (United States)

    Catarci, Tiziana; De Giovanni, Loredana; Gabrielli, Silvia; Kimani, Stephen; Mirabella, Valeria

    2008-08-01

    There exist various guidelines for facilitating the design, preparation, and deployment of accessible eLearning applications and contents. However, such guidelines prevalently address accessibility in a rather technical sense, without giving sufficient consideration to the cognitive aspects and issues related to the use of eLearning materials by learners with disabilities. In this paper we describe how a user-centered design process was applied to develop a method and set of guidelines for didactical experts to scaffold their creation of accessible eLearning content, based on a more sound approach to accessibility. The paper also discusses possible design solutions for tools supporting eLearning content authors in the adoption and application of the proposed approach.

  4. Wheelchair users, access and exclusion in South African higher education

    Directory of Open Access Journals (Sweden)

    Desire Chiwandire

    2017-09-01

    Conclusion: South African universities are still not places where all students are equally able to integrate socially. DUSMs know what ought to be done to make campuses more accessible and welcoming to students with disabilities and should be empowered to play a leading role in sensitising non-disabled members of universities, to create greater awareness of, and appreciation for, the multiple ways in which wheelchair user students continue to be excluded from full participation in university life. South African universities need to adopt a systemic approach to inclusion, which fosters an understanding of inclusion as a fundamental right rather than as a luxury.

  5. The AAS Working Group on Accessibility and Disability (WGAD) Year 1 Highlights and Database Access

    Science.gov (United States)

    Knierman, Karen A.; Diaz Merced, Wanda; Aarnio, Alicia; Garcia, Beatriz; Monkiewicz, Jacqueline A.; Murphy, Nicholas Arnold

    2017-06-01

    The AAS Working Group on Accessibility and Disability (WGAD) was formed in January of 2016 with the express purpose of seeking equity of opportunity and building inclusive practices for disabled astronomers at all educational and career stages. In this presentation, we will provide a summary of current activities, focusing on developing best practices for accessibility with respect to astronomical databases, publications, and meetings. Due to the reliance of space sciences on databases, it is important to have user centered design systems for data retrieval. The cognitive overload that may be experienced by users of current databases may be mitigated by use of multi-modal interfaces such as xSonify. Such interfaces would be in parallel or outside the original database and would not require additional software efforts from the original database. WGAD is partnering with the IAU Commission C1 WG Astronomy for Equity and Inclusion to develop such accessibility tools for databases and methods for user testing. To collect data on astronomical conference and meeting accessibility considerations, WGAD solicited feedback from January AAS attendees via a web form. These data, together with upcoming input from the community and analysis of accessibility documents of similar conferences, will be used to create a meeting accessibility document. Additionally, we will update the progress of journal access guidelines and our social media presence via Twitter. We recommend that astronomical journals form committees to evaluate the accessibility of their publications by performing user-centered usability studies.

  6. Phases and Steps in the Access to Data in Information Tools

    DEFF Research Database (Denmark)

    Bergenholtz, Henning; Bothma, Theo; Gouws, Rufus

    2015-01-01

    route and access time, but not access structure. This term is not only ill defined – it is less relevant, because each user has different access routes, and also the same user makes use of different routes in different cases. We describe four experiments in a case study with one test person how...... the different access processes in different user situations take place. This test person is trying to solve different accounting information needs in different user situations. The aim of this paper is to compare and contrast the access process terminology of lexicography and information science, to systematize...... the terms in a logical structure and to show how these disciplines complement one another by providing clearer definitions to describe the different access processes....

  7. Analisis Web Accessibility Pada Perancangan Website Chat

    OpenAIRE

    Yushan, Subhansyah

    2011-01-01

    Chat is a popular application where one user can communicate to another using text. Nowadays in the internet, many websites provide chat applications, such as Instant Messaging, Yahoo Messanger, and etc. Website which provides chat application cannot accomodate users who have any dissabilities, especialy users with visual disabilities. This situation makes communication process more complicated, where accessibility level of sending and receiving information has became low. The ...

  8. Receiving recommendations and providing feedback : the user-experience of a recommender system

    NARCIS (Netherlands)

    Knijnenburg, B.P.; Willemsen, M.C.; Hirtbach, S.; Buccafurri, F.; Semeraro, G.

    2010-01-01

    This paper systematically evaluates the user experience of a recommender system. Using both behavioral data and subjective measures of user experience, we demonstrate that choice satisfaction and system effectiveness increase when a system provides personalized recommendations (compared to the same

  9. Handling of the demilitarized zone using service providers in SAP

    Science.gov (United States)

    Iovan, A.; Robu, R.

    2016-02-01

    External collaboration needs to allow data access from the Internet. In a trusted Internet collaboration scenario where the external user works on the same data like the internal user direct access to the data in the Intranet is required. The paper presents a solution to get access to certain data in the Enterprise Resource Planning system, having the User Interface on a system in the Demilitarized Zone and the database on a system which is located in the trusted area. Using the Service Provider Interface framework, connections between separate systems can be created in different areas of the network. The paper demonstrates how to connect the two systems, one in the Demilitarized Zone and one in the trusted area, using SAP ERP 6.0 with Enhancement Package 7. In order to use the Service Provider Interface SAP Business Suite Foundation component must be installed in both systems. The advantage of using the Service Provider Interface framework is that the external user works on the same data like the internal user (and not on copies). This assures data consistency and less overhead for backup and security systems.

  10. Lexical-Access Ability and Cognitive Predictors of Speech Recognition in Noise in Adult Cochlear Implant Users

    OpenAIRE

    Kaandorp, Marre W.; Smits, Cas; Merkus, Paul; Festen, Joost M.; Goverts, S. Theo

    2017-01-01

    Not all of the variance in speech-recognition performance of cochlear implant (CI) users can be explained by biographic and auditory factors. In normal-hearing listeners, linguistic and cognitive factors determine most of speech-in-noise performance. The current study explored specifically the influence of visually measured lexical-access ability compared with other cognitive factors on speech recognition of 24 postlingually deafened CI users. Speech-recognition performance was measured with ...

  11. Metadata and Providing Access to e-Books

    Science.gov (United States)

    Vasileiou, Magdalini; Rowley, Jennifer; Hartley, Richard

    2013-01-01

    In the very near future, students are likely to expect their universities to provide seamless access to e-books through online library catalogues and virtual learning environments. A paradigm change in terms of the format of books, and especially textbooks, which could have far-reaching impact, is on the horizon. Based on interviews with a number…

  12. A hospital-wide picture archiving and communication system (PACS): the views of users and providers of the radiology service at Hammersmith Hospital

    International Nuclear Information System (INIS)

    Watkins, Jessamy

    1999-01-01

    Objective: To obtain users' views of the new picture archiving and communication system (PACS) from clinical and radiological staff at Hammersmith Hospital, UK. Methods: Semi-structured interviews were used to ascertain the views of staff, following an interview schedule which covered aspects of: (1) their use of PACS, (2) facilities available, (3) the perceived quality of images, (4) reporting, (5) image availability, (6) image accessibility, (7) training, and (8) ease of use of PACS. Results: Interviews were carried out with 34 key users and providers of the radiological service at Hammersmith Hospital. Overall, staff were very satisfied with PACS particularly in terms of image availability. All staff said that they preferred PACS to the previous, conventional radiology service. Conclusions: The key implications of issues raised by staff were: the impact of 'down-time' and the importance of an efficient back-up system, the requirement for sufficient short-term storage to prevent images being off-line during clinical situations, the usefulness of the folder system for management of the images, the need to access images for teaching purposes, the advantage of having a default display protocol to facilitate radiological reporting, and the requirement for flexible, yet effective, training to ensure that the system is utilised to its full potential by users

  13. Guidelines for Accessibility to Microblogging: an Integral Approach

    OpenAIRE

    Martín García, Yod Samuel; Álvarez Alba, Laura; Yelmo Garcia, Juan Carlos

    2011-01-01

    Microblogging is one of the most popular user-generated media, hence its accessibility has a large impact for users. However, the accessibility of this medium is poor in practice, due to the combination of bad practices by different agents ranging from the providers that host microblogging services to prosumers that post contents to them. Here we present an accessibility-oriented model of microblogging services, analyze the impact of its components, and propose guidelines for each of them to ...

  14. Oceanographic Data in Europe: Minimal Effort for Data Providers, Maximal Ease of Use and Access for Data Users

    Science.gov (United States)

    De Bruin, T.

    2017-12-01

    SeaDataCloud/SeaDataNet (SDC/SDN) is both a consortium and a data infrastructure as well as a (series of) European oceanographic data management project(s), allowing data providers to store data at a data centre of their choice (usually a type of National Oceanographic Data Center), while exposing and making the data available for download via a chain of interconnected data portals at local, regional, pan-European and global levels. SDC/SDN as an infrastructure connects over 100 data centers from 35 countries in and around Europe. The infrastructure has been operational since early 2009 and provides the user an overview of all available data as well as the possibility to download the data in an uniform format. This presentation will give a short introduction to the SDC/SDN infrastructure and describe how its development was based on sound data management principles. The emphasis will be on how the system is interconnected with other, non-discipline specific (metadata) portals such as the Group of Earth Observations System of Systems (GEOSS), allowing oceanographic data stored at a local level in a data centre to be exposed at a global level to a wide audience from various disciplines.

  15. Flexible and Transparent User Authentication for Mobile Devices

    Science.gov (United States)

    Clarke, Nathan; Karatzouni, Sevasti; Furnell, Steven

    The mobile device has become a ubiquitous technology that is capable of supporting an increasingly large array of services, applications and information. Given their increasing importance, it is imperative to ensure that such devices are not misused or abused. Unfortunately, a key enabling control to prevent this, user authentication, has not kept up with the advances in device technology. This paper presents the outcomes of a 2 year study that proposes the use of transparent and continuous biometric authentication of the user: providing more comprehensive identity verification; minimizing user inconvenience; and providing security throughout the period of use. A Non-Intrusive and Continuous Authentication (NICA) system is described that maintains a continuous measure of confidence in the identity of the user, removing access to sensitive services and information with low confidence levels and providing automatic access with higher confidence levels. An evaluation of the framework is undertaken from an end-user perspective via a trial involving 27 participants. Whilst the findings raise concerns over education, privacy and intrusiveness, overall 92% of users felt the system offered a more secure environment when compared to existing forms of authentication.

  16. The Graphical User Interface Crisis: Danger and Opportunity.

    Science.gov (United States)

    Boyd, Lawrence H.; And Others

    This paper examines graphic computing environments, identifies potential problems in providing access to blind people, and describes programs and strategies being developed to provide this access. The paper begins with an explanation of how graphic user interfaces differ from character-based systems in their use of pixels, visual metaphors such as…

  17. Providers' Access of Imaging Versus Only Reports: A System Log File Analysis.

    Science.gov (United States)

    Jung, Hye-Young; Gichoya, Judy Wawira; Vest, Joshua R

    2017-02-01

    An increasing number of technologies allow providers to access the results of imaging studies. This study examined differences in access of radiology images compared with text-only reports through a health information exchange system by health care professionals. The study sample included 157,256 historical sessions from a health information exchange system that enabled 1,670 physicians and non-physicians to access text-based reports and imaging over the period 2013 to 2014. The primary outcome was an indicator of access of an imaging study instead of access of a text-only report. Multilevel mixed-effects regression models were used to estimate the association between provider and session characteristics and access of images compared with text-only reports. Compared with primary care physicians, specialists had an 18% higher probability of accessing actual images instead of text-only reports (β = 0.18; P < .001). Compared with primary care practice settings, the probability of accessing images was 4% higher for specialty care practices (P < .05) and 8% lower for emergency departments (P < .05). Radiologists, orthopedists, and neurologists accounted for 79% of all the sessions with actual images accessed. Orthopedists, radiologists, surgeons, and pulmonary disease specialists accessed imaging more often than text-based reports only. Consideration for differences in the need to access images compared with text-only reports based on the type of provider and setting of care are needed to maximize the benefits of image sharing for patient care. Copyright © 2016 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  18. Providing Device Independence to Mobile Services

    OpenAIRE

    Nylander, Stina; Bylund, Markus

    2002-01-01

    People want user interfaces to services that are functional and well suited to the device they choose for access. To provide this, services must be able to offer device specific user interfaces for the wide range of devices available today. We propose to combine the two dominant approaches to platform independence, "Write Once, Run Every-where™" and "different version for each device", to create multiple device specific user interfaces for mobile services. This gives possibilities to minimize...

  19. The NCAR Research Data Archive's Hybrid Approach for Data Discovery and Access

    Science.gov (United States)

    Schuster, D.; Worley, S. J.

    2013-12-01

    The NCAR Research Data Archive (RDA http://rda.ucar.edu) maintains a variety of data discovery and access capabilities for it's 600+ dataset collections to support the varying needs of a diverse user community. In-house developed and standards-based community tools offer services to more than 10,000 users annually. By number of users the largest group is external and access the RDA through web based protocols; the internal NCAR HPC users are fewer in number, but typically access more data volume. This paper will detail the data discovery and access services maintained by the RDA to support both user groups, and show metrics that illustrate how the community is using the services. The distributed search capability enabled by standards-based community tools, such as Geoportal and an OAI-PMH access point that serves multiple metadata standards, provide pathways for external users to initially discover RDA holdings. From here, in-house developed web interfaces leverage primary discovery level metadata databases that support keyword and faceted searches. Internal NCAR HPC users, or those familiar with the RDA, may go directly to the dataset collection of interest and refine their search based on rich file collection metadata. Multiple levels of metadata have proven to be invaluable for discovery within terabyte-sized archives composed of many atmospheric or oceanic levels, hundreds of parameters, and often numerous grid and time resolutions. Once users find the data they want, their access needs may vary as well. A THREDDS data server running on targeted dataset collections enables remote file access through OPENDAP and other web based protocols primarily for external users. In-house developed tools give all users the capability to submit data subset extraction and format conversion requests through scalable, HPC based delayed mode batch processing. Users can monitor their RDA-based data processing progress and receive instructions on how to access the data when it is

  20. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Zhou Yajian; Li Jiandong; Liu Kai

    2002-01-01

    A novel Multiple Access Control (MAC) protocol - User-dependent Perfect-scheduling Multiple Access (UPMA) protocol, which supports joint transmission of voice and data packets,is proposed. By this protocol, the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals (MTs)can be perfectly scheduled by means of polling. Meanwhile, a unique frame structure is designed to guarantee Quality of Service (QoS) in voice traffic supporting. An effective collision resolution algorithm is also proposed to guarantee rapid channel access for activated MTs. Finally, performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  1. Removing user fees for health services: A multi-epistemological perspective on access inequities in Senegal.

    Science.gov (United States)

    Mladovsky, Philipa; Ba, Maymouna

    2017-09-01

    Plan Sésame (PS) is a user fee exemption policy launched in 2006 to provide free access to health services to Senegalese citizens aged 60 and over. Analysis of a large household survey evaluating PS echoes findings of other studies showing that user fee removal can be highly inequitable. 34 semi-structured interviews and 19 focus group discussions with people aged 60 and over were conducted in four regions in Senegal (Dakar, Diourbel, Matam and Tambacounda) over a period of six months during 2012. They were analysed to identify underlying causes of exclusion from/inclusion in PS and triangulated with the household survey. The results point to three steps at which exclusion occurs: (i) not being informed about PS; (ii) not perceiving a need to use health services under PS; and (iii) inability to access health services under PS, despite having the information and perceived need. We identify lay explanations for exclusion at these different steps. Some lay explanations point to social exclusion, defined as unequal power relations. For example, poor access to PS was seen to be caused by corruption, patronage, poverty, lack of social support, internalised discrimination and adverse incorporation. Other lay explanations do not point to social exclusion, for example: poor implementation; inadequate funding; high population demand; incompetent bureaucracy; and PS as a favour or moral obligation to friends or family. Within a critical realist paradigm, we interpret these lay explanations as empirical evidence for the presence of the following hidden underlying causal mechanisms: lacking capabilities; mobilisation of institutional bias; and social closure. However, social constructionist perspectives lead us to critique this paradigm by drawing attention to contested health, wellbeing and corruption discourses. These differences in interpretation lead to subsequent differential policy recommendations. This demonstrates the need for the adoption of a "multi

  2. Editorial: Next Generation Access Networks

    Science.gov (United States)

    Ruffini, Marco; Cincotti, Gabriella; Pizzinat, Anna; Vetter, Peter

    2015-12-01

    Over the past decade we have seen an increasing number of operators deploying Fibre-to-the-home (FTTH) solutions in access networks, in order to provide home users with a much needed network access upgrade, to support higher peak rates, higher sustained rates and a better and more uniform broadband coverage of the territory.

  3. Multiple-User, Multitasking, Virtual-Memory Computer System

    Science.gov (United States)

    Generazio, Edward R.; Roth, Don J.; Stang, David B.

    1993-01-01

    Computer system designed and programmed to serve multiple users in research laboratory. Provides for computer control and monitoring of laboratory instruments, acquisition and anlaysis of data from those instruments, and interaction with users via remote terminals. System provides fast access to shared central processing units and associated large (from megabytes to gigabytes) memories. Underlying concept of system also applicable to monitoring and control of industrial processes.

  4. NESDIS OSPO Data Access Policy and CRM

    Science.gov (United States)

    Seybold, M. G.; Donoho, N. A.; McNamara, D.; Paquette, J.; Renkevens, T.

    2012-12-01

    The Office of Satellite and Product Operations (OSPO) is the NESDIS office responsible for satellite operations, product generation, and product distribution. Access to and distribution of OSPO data was formally established in a Data Access Policy dated February, 2011. An extension of the data access policy is the OSPO Customer Relationship Management (CRM) Database, which has been in development since 2008 and is reaching a critical level of maturity. This presentation will provide a summary of the data access policy and standard operating procedure (SOP) for handling data access requests. The tangential CRM database will be highlighted including the incident tracking system, reporting and notification capabilities, and the first comprehensive portfolio of NESDIS satellites, instruments, servers, applications, products, user organizations, and user contacts. Select examples of CRM data exploitation will show how OSPO is utilizing the CRM database to more closely satisfy the user community's satellite data needs with new product promotions, as well as new data and imagery distribution methods in OSPO's Environmental Satellite Processing Center (ESPC). In addition, user services and outreach initiatives from the Satellite Products and Services Division will be highlighted.

  5. Rural providers’ access to online resources: a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Jonathan D. Eldredge

    2016-01-01

    Full Text Available Objective: The research determined the usage and satisfaction levels with one of two point-of-care (PoC resources among health care providers in a rural state. Methods: In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants’ attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA, paired t tests, and Cohen’s d statistic to compare pre- and post-study effects sizes. Results: Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to ‘‘about right amounts of information’’ at the completion of the study. DynaMed users reported a Cohen’s d increase of þ1.50 compared to AccessMedicine users’ reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen’s d. Conclusion: Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine.

  6. x509-free access to WLCG resources

    OpenAIRE

    Short, H; Manzi, A; De Notaris, V; Keeble, O; Kiryanov, A; Mikkonen, H; Tedesco, P; Wartel, R

    2017-01-01

    Access to WLCG resources is authenticated using an x509 and PKI infrastructure. Even though HEP users have always been exposed to certificates directly, the development of modern Web Applications by the LHC experiments calls for simplified authentication processes keeping the underlying software unmodified. In this work we will show a solution with the goal of providing access to WLCG resources using the user’s home organisations credentials, without the need for user-acquired x509 certificat...

  7. Online Public Access Catalog User Studies: A Review of Research Methodologies, March 1986-November 1989.

    Science.gov (United States)

    Seymour, Sharon

    1991-01-01

    Review of research methodologies used in studies of online public access catalog (OPAC) users finds that a variety of research methodologies--e.g., surveys, transaction log analysis, interviews--have been used with varying degrees of expertise. It is concluded that poor research methodology resulting from limited training and resources limits the…

  8. Interoperable Access to NCAR Research Data Archive Collections

    Science.gov (United States)

    Schuster, D.; Ji, Z.; Worley, S. J.; Manross, K.

    2014-12-01

    The National Center for Atmospheric Research (NCAR) Research Data Archive (RDA) provides free access to 600+ observational and gridded dataset collections. The RDA is designed to support atmospheric and related sciences research, updated frequently where datasets have ongoing production, and serves data to 10,000 unique users annually. The traditional data access options include web-based direct archive file downloads, user selected data subsets and format conversions produced by server-side computations, and client and cURL-based APIs for routine scripted data retrieval. To enhance user experience and utility, the RDA now also offers THREDDS Data Server (TDS) access for many highly valued dataset collections. TDS offered datasets are presented as aggregations, enabling users to access an entire dataset collection, that can be comprised of 1000's of files, through a single virtual file. The OPeNDAP protocol, supported by the TDS, allows compatible tools to open and access these virtual files remotely, and make the native data file format transparent to the end user. The combined functionality (TDS/OPeNDAP) gives users the ability to browse, select, visualize, and download data from a complete dataset collection without having to transfer archive files to a local host. This presentation will review the TDS basics and describe the specific TDS implementation on the RDA's diverse archive of GRIB-1, GRIB-2, and gridded NetCDF formatted dataset collections. Potential future TDS implementation on in-situ observational dataset collections will be discussed. Illustrative sample cases will be used to highlight the end users benefits from this interoperable data access to the RDA.

  9. PubChem Power User Gateway (PUG)

    Data.gov (United States)

    U.S. Department of Health & Human Services — PUG provides access to PubChem services via a programmatic interface. Users may download data, initiate chemical structure searches, standardize chemical structures...

  10. The Graphical User Interface: Crisis, Danger, and Opportunity.

    Science.gov (United States)

    Boyd, L. H.; And Others

    1990-01-01

    This article describes differences between the graphical user interface and traditional character-based interface systems, identifies potential problems posed by graphic computing environments for blind computer users, and describes some programs and strategies that are being developed to provide access to those environments. (Author/JDD)

  11. User Privacy and Empowerment: Trends, Challenges, and Opportunities

    DEFF Research Database (Denmark)

    Dhotre, Prashant Shantaram; Olesen, Henning; Khajuria, Samant

    2018-01-01

    to the service providers. Considering business models that are slanted towards service provid-ers, privacy has become a crucial issue in today’s fast growing digital world. Hence, this paper elaborates personal information flow between users, service providers, and data brokers. We also discussed the significant...... privacy issues like present business models, user awareness about privacy and user control over per-sonal data. To address such issues, this paper also identified challenges that com-prise unavailability of effective privacy awareness or protection tools and the ef-fortless way to study and see the flow...... of personal information and its manage-ment. Thus, empowering users and enhancing awareness are essential to compre-hending the value of secrecy. This paper also introduced latest advances in the domain of privacy issues like User Managed Access (UMA) can state suitable requirements for user empowerment...

  12. Providing open-access online materials and hands-on sessions for GIS exercises

    Science.gov (United States)

    Oguchi, T.; Yamauchi, H.; Hayakawa, Y. S.

    2017-12-01

    Researchers of GIS (Geographical Information Systems/Sciences) in Japan have collaborated to provide materials for GIS lecture classes in universities for the last 20 years. The major outcomes include 1) a GIS core curriculum, 2) a GIS "body of knowledge" explaining the details of the curriculum, 3) a series of PowerPoint presentations, and 4) a comprehensive GIS textbook. However, materials for GIS exercises at university classes using GIS software have been limited in Japan. Therefore, we launched a project to provide such materials which will be available online and accessible by anybody. The materials cover broad basic aspects of GIS including geoscientific applications such as terrain analysis using digital elevation models. The materials utilize public-domain and open-source software packages such as QGIS and GRASS. The data used are also freely available ones such as those from the Geospatial Information Authority of Japan. The use of the GitHub platform to distribute the materials allow easier online interactions by both material producers and users. Selected sets of the materials have been utilized for hands-on activities including both official university classes and public instructions. We have been updating the materials based on the opinions of people who took the hands-on courses for better GIS education. The current materials are in Japanese, but we plan to translate some of them into English.

  13. Sesame IO Library User Manual Version 8

    Energy Technology Data Exchange (ETDEWEB)

    Abhold, Hilary [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Young, Ginger Ann [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-05-15

    This document is a user manual for SES_IO, a low-level library for reading and writing sesame files. The purpose of the SES_IO library is to provide a simple user interface for accessing and creating sesame files that does not change across sesame format type (such as binary, ascii, and xml).

  14. From Web accessibility to Web adaptability.

    Science.gov (United States)

    Kelly, Brian; Nevile, Liddy; Sloan, David; Fanou, Sotiris; Ellison, Ruth; Herrod, Lisa

    2009-07-01

    This article asserts that current approaches to enhance the accessibility of Web resources fail to provide a solid foundation for the development of a robust and future-proofed framework. In particular, they fail to take advantage of new technologies and technological practices. The article introduces a framework for Web adaptability, which encourages the development of Web-based services that can be resilient to the diversity of uses of such services, the target audience, available resources, technical innovations, organisational policies and relevant definitions of 'accessibility'. The article refers to a series of author-focussed approaches to accessibility through which the authors and others have struggled to find ways to promote accessibility for people with disabilities. These approaches depend upon the resource author's determination of the anticipated users' needs and their provision. Through approaches labelled as 1.0, 2.0 and 3.0, the authors have widened their focus to account for contexts and individual differences in target audiences. Now, the authors want to recognise the role of users in determining their engagement with resources (including services). To distinguish this new approach, the term 'adaptability' has been used to replace 'accessibility'; new definitions of accessibility have been adopted, and the authors have reviewed their previous work to clarify how it is relevant to the new approach. Accessibility 1.0 is here characterised as a technical approach in which authors are told how to construct resources for a broadly defined audience. This is known as universal design. Accessibility 2.0 was introduced to point to the need to account for the context in which resources would be used, to help overcome inadequacies identified in the purely technical approach. Accessibility 3.0 moved the focus on users from a homogenised universal definition to recognition of the idiosyncratic needs and preferences of individuals and to cater for them. All of

  15. Perceived efficacy of herbal remedies by users accessing primary healthcare in Trinidad

    Directory of Open Access Journals (Sweden)

    Gomes Natalie

    2007-02-01

    Full Text Available Abstract Background The increasing global popularity of herbal remedies requires further investigation to determine the probable factors driving this burgeoning phenomenon. We propose that the users' perception of efficacy is an important factor and assessed the perceived efficacy of herbal remedies by users accessing primary health facilities throughout Trinidad. Additionally, we determined how these users rated herbal remedies compared to conventional allopathic medicines as being less, equally or more efficacious. Methods A descriptive cross-sectional study was undertaken at 16 randomly selected primary healthcare facilities throughout Trinidad during June-August 2005. A de novo, pilot-tested questionnaire was interviewer-administered to confirmed herbal users (previous or current. Stepwise multiple regression analysis was done to determine the influence of predictor variables on perceived efficacy and comparative efficacy with conventional medicines. Results 265 herbal users entered the study and cited over 100 herbs for the promotion of health/wellness and the management of specific health concerns. Garlic was the most popular herb (in 48.3% of the sample and was used for the common cold, cough, fever, as 'blood cleansers' and carminatives. It was also used in 20% of hypertension patients. 230 users (86.8% indicated that herbs were efficacious and perceived that they had equal or greater efficacy than conventional allopathic medicines. Gender, ethnicity, income and years of formal education did not influence patients' perception of herb efficacy; however, age did (p = 0.036. Concomitant use of herbs and allopathic medicines was relatively high at 30%; and most users did not inform their attending physician. Conclusion Most users perceived that herbs were efficacious, and in some instances, more efficacious than conventional medicines. We suggest that this perception may be a major contributing factor influencing the sustained and increasing

  16. Meth mouth severity in response to drug-use patterns and dental access in methamphetamine users.

    Science.gov (United States)

    Brown, Ronni E; Morisky, Donald E; Silverstein, Steven J

    2013-06-01

    Meth mouth is the rapid development of tooth decay in methamphetamine users. Our study questioned whether drug-use patterns and dental care access are risk factors affecting the severity of meth mouth. Participants received dental examinations, and the number of decayed, missing and filled teeth (DMFT) were counted and used to measure meth mouth severity.

  17. JNC's experience of complementary accesses provided by the additional protocol

    International Nuclear Information System (INIS)

    Miura, Yasushi

    2001-01-01

    JNC (Japan Nuclear Cycle Development Institute) examined problems on implementation of the Additional Protocol to Japan/IAEA Safeguards Agreement with the Government of Japan and International Atomic Energy Agency through trials performed at Oarai Engineering Center before it entered into force. On December 16th 1999, the Additional Protocol entered into force, and in last January JNC provided the first JNC site information to STA. Then our Government provided it of all Japan to IAEA in last June. Also in this January, we sent the additional information changed from old one to MEXT (Ministry of Education, Culture, Sports, Science and Technology). The first Complementary Access of not only JNC but also Japan was implemented on JNC Ningyo-Toge Environmental Engineering Center on the end of last November. Since then, we have had over 10 times experience of Complementary Accesses for about one year especially on Tokai works and Ningyo-Toge. JNC's experience of Complementary Accesses will be introduced. (author)

  18. A University Web Portal redesign applying accessibility patterns. Breaking Down Barriers for Visually Impaired Users

    Directory of Open Access Journals (Sweden)

    Hernán Sosa

    2015-08-01

    Full Text Available Definitely, the WWW and ICTs have become the preferred media for the interaction between society and its citizens, and public and private organizations have today the possibility of deploying their activities through the Web. In particular, university education is a domain where the benefits of these technological resources can strongly contribute in caring for students. However, most university Web portals are inaccessible to their user community (students, professors, and non-teaching staff, between others, since these portals do not take into account the needs of people with different capabilities. In this work, we propose an accessibility pattern driven process to the redesign of university Web portals, aiming to break down barriers for visually impaired users. The approach is implemented to a real case study: the Web portal of Universidad Nacional de la Patagonia Austral (UNPA. The results come from applying accessibility recommendations and evaluation tools (automatic and manual from internationally recognized organizations, to both versions of the Web portal: the original and the redesign one.

  19. User-centered 3D geovisualisation

    DEFF Research Database (Denmark)

    Nielsen, Anette Hougaard

    2004-01-01

    . In a broader perspective, the overall aim is to develop a language in 3D Geovisualisation gained through usability projects and the development of a theoretical background. A conceptual level of user-centered 3D Geovisualisation is introduced by applying a categorisation originating from Virtual Reality...... and shadowing effects or with weather phenomena serving a level of realism and providing depth cues. The rendered objects and scenes are graphically accessible through the interface where immersive or non-immersive monitors in different sizes and shapes are relevant. Through the user interface, users can...

  20. Reduced feedback selective cluster index scheduling with user pre-selection for next-generation multi-input multi-output orthogonal frequency division multiple access system

    OpenAIRE

    Nicolaou, M; Doufexi, A; Armour, SMD; Sun, Y

    2011-01-01

    The joint use of opportunistic scheduling and orthogonal frequency division multiple access (OFDMA) provide significant gains in environments of low mobility and scatter for which channel variations are low. The downside of opportunistic scheduling in multicarrier systems such as OFDMA, lies in the substantial uplink overhead required to feed back by the mobile stations (MSs) describing users' instantaneous link conditions. This study presents a novel approach towards multicarrier opportunist...

  1. Envisioning Advanced User Interfaces for E-Government Applications: A Case Study

    Science.gov (United States)

    Calvary, Gaëlle; Serna, Audrey; Coutaz, Joëlle; Scapin, Dominique; Pontico, Florence; Winckler, Marco

    The increasing use of the Web as a software platform together with the advance of technology has promoted Web applications as a starting point for improving communication between citizens and administration. Currently, several e-government Web portals propose applications for accessing information regarding healthcare, taxation, registration, housing, agriculture, education, and social services, which otherwise may be difficult to obtain. However, the adoption of services provided to citizens depends upon how such applications comply with the users' needs. Unfortunately, building an e-government website doesn't guarantee that all citizens who come to use it can access its contents. These services need to be accessible to all citizens/customers equally to ensure wider reach and subsequent adoption of the e-government services. User disabilities, computer or language illiteracy (e.g., foreign language), flexibility on information access (e.g., user remotely located in rural areas, homeless, mobile users), and ensuring user privacy on sensitive data are some of the barriers that must be taken into account when designing the User Interface (UI) of e-government applications.

  2. Barriers to antiretroviral treatment access for injecting drug users living with HIV in Chennai, South India.

    Science.gov (United States)

    Chakrapani, Venkatesan; Velayudham, Jaikumar; Shunmugam, Murali; Newman, Peter A; Dubrow, Robert

    2014-01-01

    India's National AIDS Control Organization provides free antiretroviral treatment (ART) to people living with HIV (PLHIV), including members of marginalized groups such as injecting drug users (IDUs). To help inform development of interventions to enhance ART access, we explored barriers to free ART access at government ART centers for IDUs living with HIV in Chennai by conducting three focus groups (n = 19 IDUs) and four key informant interviews. Data were explored using framework analysis to identify categories and derive themes. We found interrelated barriers at the family and social, health-care system, and individual levels. Family and social level barriers included lack of family support and fear of societal discrimination, as well as unmet basic needs, including food and shelter. Health-care system barriers included actual or perceived unfriendly hospital environment and procedures such as requiring proof of address and identity from PLHIV, including homeless IDUs; provider perception that IDUs will not adhere to ART, resulting in ART not being initiated; actual or perceived inadequate counseling services and lack of confidentiality; and lack of effective linkages between ART centers, needle/syringe programs, and drug dependence treatment centers. Individual-level barriers included active drug use, lack of self-efficacy in ART adherence, low motivation to initiate ART stemming from a fatalistic attitude, and inadequate knowledge about ART. These findings indicate that to facilitate IDUs gaining access to ART, systemic changes are needed, including steps to make the environment and procedures at government ART centers more IDU-friendly and steps to decrease HIV- and drug use-related stigma and discrimination faced by IDUs from the general public and health-care providers. Housing support for homeless IDUs and linkage of IDUs with drug dependence treatment are also essential.

  3. The ARAC client system: network-based access to ARAC

    International Nuclear Information System (INIS)

    Leach, M J; Sumikawa, D; Webster, C

    1999-01-01

    The ARAC Client System allows users (such as emergency managers and first responders) with commonly available desktop and laptop computers to utilize the central ARAC system over the Internet or any other communications link using Internet protocols. Providing cost-effective fast access to the central ARAC system greatly expands the availability of the ARAC capability. The ARAC Client system consists of (1) local client applications running on the remote user's computer, and (2) ''site servers'' that provide secure access to selected central ARAC system capabilities and run on a scalable number of dedicated workstations residing at the central facility. The remote client applications allow users to describe a real or potential them-bio event, electronically sends this information to the central ARAC system which performs model calculations, and quickly receive and visualize the resulting graphical products. The site servers will support simultaneous access to ARAC capabilities by multiple users. The ARAC Client system is based on object-oriented client/server and distributed computing technologies using CORBA and Java, and consists of a large number of interacting components

  4. Remote access to mathematical software

    International Nuclear Information System (INIS)

    Dolan, E.; Hovland, P.; More, J.; Norris, B.; Smith, B.

    2001-01-01

    The network-oriented application services paradigm is becoming increasingly common for scientific computing. The popularity of this approach can be attributed to the numerous advantages to both user and developer provided by network-enabled mathematical software. The burden of installing and maintaining complex systems is lifted from the user, while enabling developers to provide frequent updates without disrupting service. Access to software with similar functionality can be unified under the same interface. Remote servers can utilize potentially more powerful computing resources than may be available locally. We discuss some of the application services developed by the Mathematics and Computer Science Division at Argonne National Laboratory, including the Network Enabled Optimization System (NEOS) Server and the Automatic Differentiation of C (ADIC) Server, as well as preliminary work on Web access to the Portable Extensible Toolkit for Scientific Computing (PETSc). We also provide a brief survey of related work

  5. Relaxing rdf queries based on user and domain preferences

    DEFF Research Database (Denmark)

    Dolog, Peter; Stueckenschmidt, Heiner; Wache, Holger

    2009-01-01

    Research in cooperative query answering is triggered by the observation that users are often not able to correctly formulate queries to databases such that they return the intended result. Due to lacking knowledge about the contents and the structure of a database, users will often only be able t...... application in the context of e-learning systems....... knowledge and user preferences. We describe a framework for information access that combines query refinement and relaxation in order to provide robust, personalized access to heterogeneous resource description framework data as well as an implementation in terms of rewriting rules and explain its...

  6. Syringe vending machines for injection drug users: an experiment in Marseille, France.

    Science.gov (United States)

    Obadia, Y; Feroni, I; Perrin, V; Vlahov, D; Moatti, J P

    1999-01-01

    OBJECTIVES: This study evaluated the usefulness of vending machines in providing injection drug users with access to sterile syringes in Marseille, France. METHODS: Self-administered questionnaires were offered to 485 injection drug users obtaining syringes from 32 pharmacies, 4 needle exchange programs, and 3 vending machines. RESULTS: Of the 343 respondents (response rate = 70.7%), 21.3% used the vending machines as their primary source of syringes. Primary users of vending machines were more likely than primary users of other sources to be younger than 30 years, to report no history of drug maintenance treatment, and to report no sharing of needles or injection paraphernalia. CONCLUSIONS: Vending machines may be an appropriate strategy for providing access to syringes for younger injection drug users, who have typically avoided needle exchange programs and pharmacies. PMID:10589315

  7. H1DS: A new web-based data access system

    Energy Technology Data Exchange (ETDEWEB)

    Pretty, D.G., E-mail: david.pretty@anu.edu.au; Blackwell, B.D.

    2014-05-15

    Highlights: • We present H1DS, a new RESTful web service for accessing fusion data. • We examine the scalability and extensibility of H1DS. • We present a fast and user friendly web browser client for the H1DS web service. • A summary relational database is presented as an application of the H1DS API. - Abstract: A new data access system, H1DS, has been developed and deployed for the H-1 Heliac at the Australian Plasma Fusion Research Facility. The data system provides access to fusion data via a RESTful web service. With the URL acting as the API to the data system, H1DS provides a scalable and extensible framework which is intuitive to new users, and allows access from any internet connected device. The H1DS framework, originally designed to work with MDSplus, has a modular design which can be extended to provide access to alternative data storage systems.

  8. H1DS: A new web-based data access system

    International Nuclear Information System (INIS)

    Pretty, D.G.; Blackwell, B.D.

    2014-01-01

    Highlights: • We present H1DS, a new RESTful web service for accessing fusion data. • We examine the scalability and extensibility of H1DS. • We present a fast and user friendly web browser client for the H1DS web service. • A summary relational database is presented as an application of the H1DS API. - Abstract: A new data access system, H1DS, has been developed and deployed for the H-1 Heliac at the Australian Plasma Fusion Research Facility. The data system provides access to fusion data via a RESTful web service. With the URL acting as the API to the data system, H1DS provides a scalable and extensible framework which is intuitive to new users, and allows access from any internet connected device. The H1DS framework, originally designed to work with MDSplus, has a modular design which can be extended to provide access to alternative data storage systems

  9. The Philosophy of User Interfaces in HELIO and the Importance of CASSIS

    Science.gov (United States)

    Bonnin, X.; Aboudarham, J.; Renié, C.; Csillaghy, A.; Messerotti, M.; Bentley, R. D.

    2012-09-01

    HELIO is a European project funded under FP7 (Project No. 238969). One of its goals as a Heliospheric Virtual Observatory is to provide an easy access to many datasets scattered all over the world, in the fields of Solar physics, Heliophysics, and Planetary magnetospheres. The efficiency of such a tool is very much related to the quality of the user interface. HELIO infrastructure is based on a Service Oriented Architecture (SOA), regrouping a network of standalone components, which allows four main types of interfaces: - HELIO Front End (HFE) is a browser-based user interface, which offers a centralized access to the HELIO main functionalities. Especially, it provides the possibility to reach data directly, or to refine selection by determination of observing characteristics, such as which instrument was observing at that time, which instrument was at this location, etc. - Many services/components provide their own standalone graphical user interface. While one can directly access individually each of these interfaces, they can also be connected together. - Most services also provide direct access for any tools through a public interface. A small java library, called Java API, simplifies this access by providing client stubs for services and shields the user from security, discovery and failover issues. - Workflows capabilities are available in HELIO, allowing complex combination of queries over several services. We want the user to be able to navigate easily, at his needs, through the various interfaces, and possibly use a specific one in order to make much-dedicated queries. We will also emphasize the importance of the CASSIS project (Coordination Action for the integration of Solar System Infrastructure and Science) in encouraging the interoperability necessary to undertake scientific studies that span disciplinary boundaries. If related projects follow the guidelines being developed by CASSIS then using external resources with HELIO will be greatly simplified.

  10. User-generated online health content: a survey of Internet users in the United Kingdom.

    Science.gov (United States)

    O'Neill, Braden; Ziebland, Sue; Valderas, Jose; Lupiáñez-Villanueva, Francisco

    2014-04-30

    The production of health information has begun to shift from commercial organizations to health care users themselves. People increasingly go online to share their own health and illness experiences and to access information others have posted, but this behavior has not been investigated at a population level in the United Kingdom. This study aims to explore access and production of user-generated health content among UK Internet users and to investigate relationships between frequency of use and other variables. We undertook an online survey of 1000 UK Internet users. Descriptive and multivariate statistical analyses were used to interpret the data. Nearly one-quarter of respondents (23.7%, 237/1000) reported accessing and sharing user-generated health content online, whereas more than 20% (22.2%, 222/1000) were unaware that it was possible to do this. Respondents could be divided into 3 groups based on frequency of use: rare users (78.7%, 612/778) who accessed and shared content less than weekly, users (13.9%, 108/778) who did so weekly, and superusers (7.5%, 58/778) who did so on a daily basis. Superusers were more likely to be male (Puser-generated online health content, only a minority of respondents reported doing so frequently. As this type of content proliferates, superusers are likely to shape the health information that others access. Further research should assess the effect of user-generated online content on health outcomes and use of health services by Internet users.

  11. User-Based Information Retrieval System Interface Evaluation: An Examination of an On-Line Public Access Catalog.

    Science.gov (United States)

    Hert, Carol A.; Nilan, Michael S.

    1991-01-01

    Presents preliminary data that characterizes the relationship between what users say they are trying to accomplish when using an online public access catalog (OPAC) and their perceptions of what input to give the system. Human-machine interaction is discussed, and appropriate methods for evaluating information retrieval systems are considered. (18…

  12. Towards Emulation-as-a-Service: Cloud Services for Versatile Digital Object Access

    Directory of Open Access Journals (Sweden)

    Dirk von Suchodoletz

    2013-06-01

    Full Text Available The changing world of IT services opens the chance to more tightly integrate digital long-term preservation into systems, both for commercial and end users. The emergence of cloud offerings re-centralizes services, and end users interact with them remotely through standardized (web-client applications on their various devices. This offers the chance to use partially the same concepts and methods to access obsolete computer environments and allows for more sustainable business processes. In order to provide a large variety of user-friendly remote emulation services, especially in combination with authentic performance and user experience, a distributed system model and architecture is required, suitable to run as a cloud service, allowing for the specialization both of memory institutions and third party service providers.The shift of the usually non-trivial task of the emulation of obsolete software environments from the end user to specialized providers can help to simplify digital preservation and access strategies. Besides offering their users better access to their holdings, libraries and archives may gain new business opportunities to offer services to a third party, such as businesses requiring authentic reproduction of digital objects and processes for legal reasons. This paper discusses cloud concepts as the next logical step for accessing original digital material. Emulation-as-a-Service (EaaS fills the gap between the successful demonstration of emulation strategies as a long term access strategy and it’s perceived availability and usability. EaaS can build upon the ground of research and prototypical implementations of previous projects, and reuse well established remote access technology.In this article we develop requirements and a system model, suitable for a distributed environment. We will discuss the building blocks of the core services as well as requirements regarding access management. Finally, we will try to present a

  13. Content accessibility of Web documents: Overview of concepts and needed standards

    DEFF Research Database (Denmark)

    Alapetite, A.

    2006-01-01

    The concept of Web accessibility refers to a combined set of measures, namely, how easily and how efficiently different types of users may make use of a given service. While some recommendations for accessibility are focusing on people with variousspecific disabilities, this document seeks...... to broaden the scope to any type of user and any type of use case. The document provides an introduction to some required concepts and technical standards for designing accessible Web sites. A brief review of thelegal requirements in a few countries for Web accessibility complements the recommendations...

  14. Internet health information in the patient-provider dialogue.

    Science.gov (United States)

    Hong, Traci

    2008-10-01

    A patient discussing Internet health information with a health care provider (referred to as "patient-provider communication about Internet health information") can contribute positively to health outcomes. Although research has found that once Internet access is achieved, there are no ethnic differences in Internet health information seeking, it is unclear if there are ethnic differences in patient-provider communication about Internet health information. To help fill this gap in the literature, the National Cancer Institute's Health Information National Trends Survey 2005 was analyzed with Stata 9. Two sets of logistic regression analyses were conducted, one for a subsample of Internet users (n = 3,244) and one for a subsample of Internet users who are first-generation immigrants (n = 563). The dependent variable was patient-provider communication about Internet health information, which assessed whether survey participants had discussed online health information with a health care provider. The predictor variables included trust of health care provider, trust of online health information, Internet use, health care coverage, frequency of visits to health care provider, health status, and demographics. Among all Internet users, Whites had higher levels of patient-provider communication about Internet health information than Blacks and Asians. Similarly, among Internet users who are immigrants, Whites had higher levels of patient-provider communication about Internet health information than Blacks and Asians. While the digital divide is narrowing in terms of Internet access, racial differences in patient-provider communication about Internet health information may undermine the potential benefits of the information age.

  15. The older adult road user : recommendations for driver assistance

    NARCIS (Netherlands)

    Wilschut, E.S.; Kroon, E.C.M.; Goede, M. de; Cremers, A.H.M.; Hoedemaeker, D.M.

    2014-01-01

    The number of older road users is getting increasingly larger in Europe. Therefore policy makers pay more attention to the abilities and limitations of this group of road users. Providing accessible and comfortable assistance and safety functions for mobility is a key challenge in the objective of

  16. Proof-of-Concept System for Opportunistic Spectrum Access in Multi-user Decentralized Networks

    Directory of Open Access Journals (Sweden)

    Sumit J. Darak

    2016-09-01

    Full Text Available Poor utilization of an electromagnetic spectrum and ever increasing demand for spectrum have led to surge of interests in opportunistic spectrum access (OSA based paradigms like cognitive radio and unlicensed LTE. In OSA for decentralized networks, frequency band selection from wideband spectrum is a challenging task since secondary users (SUs do not share any information with each other. In this paper, a new decision making policy (DMP has been proposed for OSA in the multi-user decentralized networks. First contribution is an accurate characterization of frequency bands using Bayes-UCB algorithm. Then, a novel SU orthogonization scheme using Bayes-UCB algorithm is proposed replacing randomization based scheme. At the end, USRP testbed has been developed for analyzing the performance of DMPs using real radio signals. Experimental results show that the proposed DMP offers significant improvement in spectrum utilization, fewer subband switching and collisions compared to other DMPs.

  17. Barriers and facilitators to using NHS Direct: a qualitative study of 'users' and 'non-users'.

    Science.gov (United States)

    Cook, Erica J; Randhawa, Gurch; Large, Shirley; Guppy, Andy; Chater, Angel M; Ali, Nasreen

    2014-10-25

    NHS Direct, introduced in 1998, has provided 24/7 telephone-based healthcare advice and information to the public in England and Wales. National studies have suggested variation in the uptake of this service amongst the UK's diverse population. This study provides the first exploration of the barriers and facilitators that impact upon the uptake of this service from the perspectives of both 'users' and 'non- users'. Focus groups were held with NHS Direct 'users' (N = 2) from Bedfordshire alongside 'non-users' from Manchester (N = 3) and Mendip, Somerset (N = 4). Each focus group had between five to eight participants. A total of eighty one people aged between 21 and 94 years old (M: 58.90, SD: 22.70) took part in this research. Each focus group discussion lasted approximately 90 minutes and was audiotape-recorded with participants' permission. The recordings were transcribed verbatim. A framework approach was used to analyse the transcripts. The findings from this research uncovered a range of barriers and facilitators that impact upon the uptake of NHS Direct. 'Non-users' were unaware of the range of services that NHS Direct provided. Furthermore, 'non-users' highlighted a preference for face-to face communication, identifying a lack of confidence in discussing healthcare over the telephone. This was particularly evident among older people with cognitive difficulties. The cost to telephone a '0845' number from a mobile was also viewed to be a barrier to access NHS Direct, expressed more often by 'non-users' from deprived communities. NHS Direct 'users' identified that awareness, ease of use and convenience were facilitators which influenced their decision to use the service. An understanding of the barriers and facilitators which impact on the access and uptake of telephone-based healthcare is essential to move patients towards the self-care model. This research has highlighted the need for telephone-based healthcare services to increase public awareness; through

  18. Activity Management System user reference manual. Revision 1

    International Nuclear Information System (INIS)

    Gates, T.A.; Burdick, M.B.

    1994-01-01

    The Activity Management System (AMS) was developed in response to the need for a simple-to-use, low-cost, user interface system for collecting and logging Hanford Waste Vitrification Plant Project (HWVP) activities. This system needed to run on user workstations and provide common user access to a database stored on a local network file server. Most important, users wanted a system that provided a management tool that supported their individual process for completing activities. Existing system treated the performer as a tool of the system. All AMS data is maintained in encrypted format. Users can feel confident that any activities they have entered into the database are private and that, as the originator, they retain sole control over who can see them. Once entered into the AMS database, the activities cannot be accessed by anyone other than the originator, the designated agent, or by authorized viewers who have been explicitly granted the right to look at specific activities by the originator. This user guide is intended to assist new AMS users in learning how to use the application and, after the initial learning process, will serve as an ongoing reference for experienced users in performing infrequently used functions. Online help screens provide reference to some of the key information in this manual. Additional help screens, encompassing all the applicable material in this manual, will be incorporated into future AMS revisions. A third, and most important, source of help is the AMS administrator(s). This guide describes the initial production version of AMS, which has been designated Revision 1.0

  19. Characterization and Optimization of LDPC Codes for the 2-User Gaussian Multiple Access Channel

    Directory of Open Access Journals (Sweden)

    Declercq David

    2007-01-01

    Full Text Available We address the problem of designing good LDPC codes for the Gaussian multiple access channel (MAC. The framework we choose is to design multiuser LDPC codes with joint belief propagation decoding on the joint graph of the 2-user case. Our main result compared to existing work is to express analytically EXIT functions of the multiuser decoder with two different approximations of the density evolution. This allows us to propose a very simple linear programming optimization for the complicated problem of LDPC code design with joint multiuser decoding. The stability condition for our case is derived and used in the optimization constraints. The codes that we obtain for the 2-user case are quite good for various rates, especially if we consider the very simple optimization procedure.

  20. ARCAS (ACACIA Regional Climate-data Access System) -- a Web Access System for Climate Model Data Access, Visualization and Comparison

    Science.gov (United States)

    Hakkarinen, C.; Brown, D.; Callahan, J.; hankin, S.; de Koningh, M.; Middleton-Link, D.; Wigley, T.

    2001-05-01

    A Web-based access system to climate model output data sets for intercomparison and analysis has been produced, using the NOAA-PMEL developed Live Access Server software as host server and Ferret as the data serving and visualization engine. Called ARCAS ("ACACIA Regional Climate-data Access System"), and publicly accessible at http://dataserver.ucar.edu/arcas, the site currently serves climate model outputs from runs of the NCAR Climate System Model for the 21st century, for Business as Usual and Stabilization of Greenhouse Gas Emission scenarios. Users can select, download, and graphically display single variables or comparisons of two variables from either or both of the CSM model runs, averaged for monthly, seasonal, or annual time resolutions. The time length of the averaging period, and the geographical domain for download and display, are fully selectable by the user. A variety of arithmetic operations on the data variables can be computed "on-the-fly", as defined by the user. Expansions of the user-selectable options for defining analysis options, and for accessing other DOD-compatible ("Distributed Ocean Data System-compatible") data sets, residing at locations other than the NCAR hardware server on which ARCAS operates, are planned for this year. These expansions are designed to allow users quick and easy-to-operate web-based access to the largest possible selection of climate model output data sets available throughout the world.

  1. LNS users primer for accessing government sites on the ARPA network. [MIT. -->. ANL, BNL, LBL, and New York Univ. Courant Inst

    Energy Technology Data Exchange (ETDEWEB)

    Kannel, M.

    1979-06-01

    This primer was developed as part of the study conducted by the Laboratory for Nuclear Science (LNS) on the feasibility of networks for computer resource sharing. The primer is an instructinal guide for the LNS user who would like to access and use computers at other government sites on the ARPA network. The format is a series of scenarios of actual recorded on-line terminal sessions' showing the novice user how to access the foreign site, obtain help documentation, run a simple program, and transfer files to and from the foreign site. Access to the ARPA network in these scenarios is via Multics or the Massachusetts Institute of Technology Terminal Interface Processor. The foreign government sites accessed are the computing facilities at Argonne National Laboratory, Brookhaven National Laboratory, Lawrence Livermore Laboratory, and New York University Courant Institute. This technique of auditing actual terminal sessions as a teaching aid can be extended to include other computing facilities as well as other networks.

  2. User and Machine Authentication and Authorization Infrastructure for Distributed Wireless Sensor Network Testbeds

    Directory of Open Access Journals (Sweden)

    Gerald Wagenknecht

    2013-03-01

    Full Text Available The intention of an authentication and authorization infrastructure (AAI is to simplify and unify access to different web resources. With a single login, a user can access web applications at multiple organizations. The Shibboleth authentication and authorization infrastructure is a standards-based, open source software package for web single sign-on (SSO across or within organizational boundaries. It allows service providers to make fine-grained authorization decisions for individual access of protected online resources. The Shibboleth system is a widely used AAI, but only supports protection of browser-based web resources. We have implemented a Shibboleth AAI extension to protect web services using Simple Object Access Protocol (SOAP. Besides user authentication for browser-based web resources, this extension also provides user and machine authentication for web service-based resources. Although implemented for a Shibboleth AAI, the architecture can be easily adapted to other AAIs.

  3. Some Programs Should Not Run on Laptops - Providing Programmatic Access to Applications Via Web Services

    Science.gov (United States)

    Gupta, V.; Gupta, N.; Gupta, S.; Field, E.; Maechling, P.

    2003-12-01

    Modern laptop computers, and personal computers, can provide capabilities that are, in many ways, comparable to workstations or departmental servers. However, this doesn't mean we should run all computations on our local computers. We have identified several situations in which it preferable to implement our seismological application programs in a distributed, server-based, computing model. In this model, application programs on the user's laptop, or local computer, invoke programs that run on an organizational server, and the results are returned to the invoking system. Situations in which a server-based architecture may be preferred include: (a) a program is written in a language, or written for an operating environment, that is unsupported on the local computer, (b) software libraries or utilities required to execute a program are not available on the users computer, (c) a computational program is physically too large, or computationally too expensive, to run on a users computer, (d) a user community wants to enforce a consistent method of performing a computation by standardizing on a single implementation of a program, and (e) the computational program may require current information, that is not available to all client computers. Until recently, distributed, server-based, computational capabilities were implemented using client/server architectures. In these architectures, client programs were often written in the same language, and they executed in the same computing environment, as the servers. Recently, a new distributed computational model, called Web Services, has been developed. Web Services are based on Internet standards such as XML, SOAP, WDSL, and UDDI. Web Services offer the promise of platform, and language, independent distributed computing. To investigate this new computational model, and to provide useful services to the SCEC Community, we have implemented several computational and utility programs using a Web Service architecture. We have

  4. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Science.gov (United States)

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  5. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Directory of Open Access Journals (Sweden)

    Seungsoo Baek

    2014-01-01

    Full Text Available There has been an explosive increase in the population of the OSN (online social network in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  6. Developing a Shared Patient-Centered, Web-Based Medication Platform for Type 2 Diabetes Patients and Their Health Care Providers: Qualitative Study on User Requirements.

    Science.gov (United States)

    Bernhard, Gerda; Mahler, Cornelia; Seidling, Hanna Marita; Stützle, Marion; Ose, Dominik; Baudendistel, Ines; Wensing, Michel; Szecsenyi, Joachim

    2018-03-27

    Information technology tools such as shared patient-centered, Web-based medication platforms hold promise to support safe medication use by strengthening patient participation, enhancing patients' knowledge, helping patients to improve self-management of their medications, and improving communication on medications among patients and health care professionals (HCPs). However, the uptake of such platforms remains a challenge also due to inadequate user involvement in the development process. Employing a user-centered design (UCD) approach is therefore critical to ensure that user' adoption is optimal. The purpose of this study was to identify what patients with type 2 diabetes mellitus (T2DM) and their HCPs regard necessary requirements in terms of functionalities and usability of a shared patient-centered, Web-based medication platform for patients with T2DM. This qualitative study included focus groups with purposeful samples of patients with T2DM (n=25), general practitioners (n=13), and health care assistants (n=10) recruited from regional health care settings in southwestern Germany. In total, 8 semistructured focus groups were conducted. Sessions were audio- and video-recorded, transcribed verbatim, and subjected to a computer-aided qualitative content analysis. Appropriate security and access methods, supported data entry, printing, and sending information electronically, and tracking medication history were perceived as the essential functionalities. Although patients wanted automatic interaction checks and safety alerts, HCPs on the contrary were concerned that unspecific alerts confuse patients and lead to nonadherence. Furthermore, HCPs were opposed to patients' ability to withhold or restrict access to information in the platform. To optimize usability, there was consensus among participants to display information in a structured, chronological format, to provide information in lay language, to use visual aids and customize information content, and align

  7. Nurse practitioner perceptions of barriers and facilitators in providing health care for deaf American Sign Language users: A qualitative socio-ecological approach.

    Science.gov (United States)

    Pendergrass, Kathy M; Nemeth, Lynne; Newman, Susan D; Jenkins, Carolyn M; Jones, Elaine G

    2017-06-01

    Nurse practitioners (NPs), as well as all healthcare clinicians, have a legal and ethical responsibility to provide health care for deaf American Sign Language (ASL) users equal to that of other patients, including effective communication, autonomy, and confidentiality. However, very little is known about the feasibility to provide equitable health care. The purpose of this study was to examine NP perceptions of barriers and facilitators in providing health care for deaf ASL users. Semistructured interviews in a qualitative design using a socio-ecological model (SEM). Barriers were identified at all levels of the SEM. NPs preferred interpreters to facilitate the visit, but were unaware of their role in assuring effective communication is achieved. A professional sign language interpreter was considered a last resort when all other means of communication failed. Gesturing, note-writing, lip-reading, and use of a familial interpreter were all considered facilitators. Interventions are needed at all levels of the SEM. Resources are needed to provide awareness of deaf communication issues and legal requirements for caring for deaf signers for practicing and student NPs. Protocols need to be developed and present in all healthcare facilities for hiring interpreters as well as quick access to contact information for these interpreters. ©2017 American Association of Nurse Practitioners.

  8. Extended spectrum SWIR camera with user-accessible Dewar

    Science.gov (United States)

    Benapfl, Brendan; Miller, John Lester; Vemuri, Hari; Grein, Christoph; Sivananthan, Siva

    2017-02-01

    Episensors has developed a series of extended short wavelength infrared (eSWIR) cameras based on high-Cd concentration Hg1-xCdxTe absorbers. The cameras have a bandpass extending to 3 microns cutoff wavelength, opening new applications relative to traditional InGaAs-based cameras. Applications and uses are discussed and examples given. A liquid nitrogen pour-filled version was initially developed. This was followed by a compact Stirling-cooled version with detectors operating at 200 K. Each camera has unique sensitivity and performance characteristics. The cameras' size, weight and power specifications are presented along with images captured with band pass filters and eSWIR sources to demonstrate spectral response beyond 1.7 microns. The soft seal Dewars of the cameras are designed for accessibility, and can be opened and modified in a standard laboratory environment. This modular approach allows user flexibility for swapping internal components such as cold filters and cold stops. The core electronics of the Stirlingcooled camera are based on a single commercial field programmable gate array (FPGA) that also performs on-board non-uniformity corrections, bad pixel replacement, and directly drives any standard HDMI display.

  9. I need to know! Timely accessing of perioperative user manuals.

    Science.gov (United States)

    Landreneau, Raphael

    2010-12-01

    Ready access to equipment or product information is essential for the safe operation of the many items that a perioperative nurse is asked to use, troubleshoot, or maintain. One institution's solution for making manufacturer information available in the practice setting was to create a facility intranet site dedicated to OR equipment manuals. This site provides information access to perioperative nurses and support staff members and, ultimately, helps improve patient care. Published by Elsevier Inc. All rights reserved.

  10. EPOS Seismology services and their users

    Science.gov (United States)

    Haslinger, Florian; Dupont, Aurelien; Michelini, Alberto; Rietbrock, Andreas; Sleeman, Reinoud; Wiemer, Stefan; Basili, Roberto; Bossu, Rémy; Cakti, Eser; Cotton, Fabrice; Crawford, Wayne; Crowley, Helen; Danciu, Laurentiu; Diaz, Jordi; Garth, Tom; Locati, Mario; Luzi, Lucia; Pitilakis, Kyriazis; Roumelioti, Zafeiria; Strollo, Angelo

    2017-04-01

    The construction of seismological community services for the European Plate Observing System Research Infrastructure (EPOS) is by now well under way. A significant number of services are already operational, largely based on those existing at established institutions or collaborations like ORFEUS, EMSC, AHEAD and EFEHR, and more are being added to be ready for internal validation by late 2017. In this presentation we focus on a number of issues related to the interaction of the community of users with the services provided by the seismological part of the EPOS research infrastructure. How users interact with a service (and how satisfied they are with this interaction) is viewed as one important component of the validation of a service within EPOS, and certainly is key to the uptake of a service and from that also it's attributed value. Within EPOS Seismology, the following aspects of user interaction have already surfaced: - user identification (and potential tracking) versus ease-of-access and openness Requesting users to identify themselves when accessing a service provides various advantages to providers and users (e.g. quantifying & qualifying the service use, customization of services and interfaces, handling access rights and quotas), but may impact the ease of access and also shy away users who don't wish to be identified for whatever reason. - service availability versus cost There is a clear and prominent connection between the availability of a service, both regarding uptime and capacity, and its operational cost (IT systems and personnel), and it is often not clear where to draw the line (and based on which considerations). In connection to that, how to best utilize third-party IT infrastructures (either commercial or public), and what the long-term cost implications of that might be, is equally open. - licensing and attribution The issue of intellectual property and associated licensing policies for data, products and services is only recently gaining

  11. Incentive Mechanism for P2P Content Sharing over Heterogenous Access Networks

    Science.gov (United States)

    Sato, Kenichiro; Hashimoto, Ryo; Yoshino, Makoto; Shinkuma, Ryoichi; Takahashi, Tatsuro

    In peer-to-peer (P2P) content sharing, users can share their content by contributing their own resources to one another. However, since there is no incentive for contributing contents or resources to others, users may attempt to obtain content without any contribution. To motivate users to contribute their resources to the service, incentive-rewarding mechanisms have been proposed. On the other hand, emerging wireless technologies, such as IEEE 802.11 wireless local area networks, beyond third generation (B3G) cellular networks and mobile WiMAX, provide high-speed Internet access for wireless users. Using these high-speed wireless access, wireless users can use P2P services and share their content with other wireless users and with fixed users. However, this diversification of access networks makes it difficult to appropriately assign rewards to each user according to their contributions. This is because the cost necessary for contribution is different in different access networks. In this paper, we propose a novel incentive-rewarding mechanism called EMOTIVER that can assign rewards to users appropriately. The proposed mechanism uses an external evaluator and interactive learning agents. We also investigate a way of appropriately controlling rewards based on the system service's quality and managing policy.

  12. Access 2013 all-in-one for dummies

    CERN Document Server

    Barrows, Alison; Taylor, Allen G

    2013-01-01

    Get started with the new Access 2013 with this impressive all-in-one reference! Microsoft Access allows you to store, organize, view, analyze, and share data; the new release enables you to build even more powerful, custom database solutions that integrate with the web and enterprise data sources. This compilation of nine indispensible minibooks is exactly what you need to get up to speed on the latest changes to Access. This easy-to-understand resource provides both new and experienced Access users with invaluable advice for connecting Access to SQL Server, manipulating data local

  13. Availability and accessibility of evidence-based information resources provided by medical libraries in Australia.

    Science.gov (United States)

    Ritchie, A; Sowter, B

    2000-01-01

    This article reports on the results of an exploratory survey of the availability and accessibility of evidence-based information resources provided by medical libraries in Australia. Although barriers impede access to evidence-based information for hospital clinicians, the survey revealed that Medline and Cinahl are available in over 90% of facilities. In most cases they are widely accessible via internal networks and the Internet. The Cochrane Library is available in 69% of cases. The Internet is widely accessible and most libraries provide access to some full-text, electronic journals. Strategies for overcoming restrictions and integrating information resources with clinical workflow are being pursued. State, regional and national public and private consortia are developing agreements utilising on-line technology. These could produce cost savings and more equitable access to a greater range of evidence-based resources.

  14. MedlinePlus® Everywhere: Access from Your Phone, Tablet or Desktop

    Science.gov (United States)

    ... responsivefull.html MedlinePlus® Everywhere: Access from Your Phone, Tablet or Desktop To use the sharing features on ... provide a consistent user experience from a desktop, tablet, or phone. All users, regardless of how they ...

  15. EPRI fuel performance data base: user's manual. Final report

    International Nuclear Information System (INIS)

    Simpson, J.; Lee, S.; Rumble, E.

    1980-10-01

    This user's manual provides instructions for accessing the data in the EPRI fuel performance data base (FPDB) and manipulating that data to solve specific problems that the user wishes to specify. The user interacts with the FPDB through the Relational Information Management System (RIMS) computer program. The structure and format of the FPDB and the general syntax of the data base commands are described. Instructions follow for the use of each command. Appendixes provide more detailed information about the FPDB and its software. The FPDB currently resides on a PRIME-750 computer

  16. Community Impact of Pharmacy-Randomized Intervention to Improve Access to Syringes and Services for Injection Drug Users

    Science.gov (United States)

    Crawford, Natalie D.; Amesty, Silvia; Rivera, Alexis V.; Harripersaud, Katherine; Turner, Alezandria; Fuller, Crystal M.

    2014-01-01

    Objectives: In an effort to reduce HIV transmission among injection drug users (IDUs), New York State deregulated pharmacy syringe sales in 2001 through the Expanded Syringe Access Program by removing the requirement of a prescription. With evidence suggesting pharmacists' ability to expand their public health role, a structural, pharmacy-based…

  17. Space Telescope Control System science user operations

    Science.gov (United States)

    Dougherty, H. J.; Rossini, R.; Simcox, D.; Bennett, N.

    1984-01-01

    The Space Telescope science users will have a flexible and efficient means of accessing the capabilities provided by the ST Pointing Control System, particularly with respect to managing the overal acquisition and pointing functions. To permit user control of these system functions - such as vehicle scanning, tracking, offset pointing, high gain antenna pointing, solar array pointing and momentum management - a set of special instructions called 'constructs' is used in conjuction with command data packets. This paper discusses the user-vehicle interface and introduces typical operational scenarios.

  18. From Demonstration System to Prototype: ShakeAlert Beta Users Provide Feedback to Improve Alert Delivery

    Science.gov (United States)

    Strauss, J. A.; Vinci, M.; Steele, W. P.; Allen, R. M.; Hellweg, M.

    2013-12-01

    Earthquake Early Warning (EEW) is a system that can provide a few to tens of seconds to minutes of warning prior to ground shaking at a given location. The goal and purpose of such a system is to reduce the damage, costs, and casualties resulting from an earthquake. A prototype earthquake early warning system (ShakeAlert) is in development by the UC Berkeley Seismological Laboratory, Caltech, ETH Zurich, University of Washington, and the USGS. Events are published to the UserDisplay--ShakeAlert's Java based graphical interface, which is being tested by a small group of beta users throughout California. The beta users receive earthquake alerts in real-time and are providing feedback on their experiences. For early warning alerts to be useful, people, companies, and institutions must know beforehand what actions they will perform when they receive the information. Beta user interactions allow the ShakeAlert team to discern: which alert delivery options are most effective, what changes would make the UserDisplay more useful in a pre-disaster situation, and most importantly, what actions users plan to take for various scenarios. We also collect feedback detailing costs of implementing actions and challenges within the beta user organizations, as well as anticipated benefits and savings. Thus, creating a blueprint for a fully operational system that will meet the needs of the public. New California users as well as the first group of Pacific Northwest users are slated to join the ShakeAlert beta test group in the fall of 2013.

  19. The climate4impact platform: Providing, tailoring and facilitating climate model data access

    Science.gov (United States)

    Pagé, Christian; Pagani, Andrea; Plieger, Maarten; Som de Cerff, Wim; Mihajlovski, Andrej; de Vreede, Ernst; Spinuso, Alessandro; Hutjes, Ronald; de Jong, Fokke; Bärring, Lars; Vega, Manuel; Cofiño, Antonio; d'Anca, Alessandro; Fiore, Sandro; Kolax, Michael

    2017-04-01

    One of the main objectives of climate4impact is to provide standardized web services and tools that are reusable in other portals. These services include web processing services, web coverage services and web mapping services (WPS, WCS and WMS). Tailored portals can be targeted to specific communities and/or countries/regions while making use of those services. Easier access to climate data is very important for the climate change impact communities. To fulfill this objective, the climate4impact (http://climate4impact.eu/) web portal and services has been developed, targeting climate change impact modellers, impact and adaptation consultants, as well as other experts using climate change data. It provides to users harmonized access to climate model data through tailored services. It features static and dynamic documentation, Use Cases and best practice examples, an advanced search interface, an integrated authentication and authorization system with the Earth System Grid Federation (ESGF), a visualization interface with ADAGUC web mapping tools. In the latest version, statistical downscaling services, provided by the Santander Meteorology Group Downscaling Portal, were integrated. An innovative interface to integrate statistical downscaling services will be released in the upcoming version. The latter will be a big step in bridging the gap between climate scientists and the climate change impact communities. The climate4impact portal builds on the infrastructure of an international distributed database that has been set to disseminate the results from the global climate model results of the Coupled Model Intercomparison project Phase 5 (CMIP5). This database, the ESGF, is an international collaboration that develops, deploys and maintains software infrastructure for the management, dissemination, and analysis of climate model data. The European FP7 project IS-ENES, Infrastructure for the European Network for Earth System modelling, supports the European

  20. Usability evaluation of user interface of thesis title review system

    Science.gov (United States)

    Tri, Y.; Erna, A.; Gellysa, U.

    2018-03-01

    Presentation of programs with user interface that can be accessed online through the website of course greatly provide user benefits. User can easily access the program they need. There are usability values that serve as a benchmark for the success of a user accessible program, ie efficiency, effectiveness, and convenience. These usability values also determine the development of the program for the better use. Therefore, on the review title thesis program that will be implemented in STT Dumai was measured usability evaluation. It aims to see which sides are not yet perfect and need to be improved to improve the performance and utilization of the program. Usability evaluation was measured by using smartPLS software. Database used was the result of respondent questionnaires that include questions about the experience when they used program. The result of a review of thesis title program implemented in STT Dumai has an efficiency value of 22.615, the effectiveness of 20.612, and satisfaction of 33.177.

  1. The upgrade of the J-TEXT experimental data access and management system

    International Nuclear Information System (INIS)

    Yang, C.; Zhang, M.; Zheng, W.; Liu, R.; Zhuang, G.

    2014-01-01

    Highlights: • The J-TEXT DAMS is developed based on B/S model, which makes it conveniently access the system. • The JWeb-Scope adopts segment strategy to read data that improve the speed of reading data. • DAMS have integrated the management and JWeb-Scope and make an easy way for visitors to access the experiment data. • The JWeb-Scope can be visited all over the world, plot experiment data and zoom in or out smoothly. - Abstract: The experimental data of J-TEXT tokamak are stored in the MDSplus database. The old J-TEXT data access system is based on the tools provided by MDSplus. Since the number of signals is huge, the data retrieval for an experiment is difficult. To solve this problem, the J-TEXT experimental data access and management system (DAMS) based on MDSplus has been developed. The DAMS left the old MDSplus system unchanged providing new tools, which can help users to handle all signals as well as to retrieve signals they need thanks to the user information requirements. The DAMS also offers users a way to create their jScope configuration files which can be downloaded to the local computer. In addition, the DAMS provides a JWeb-Scope tool to visualize the signal in a browser. JWeb-Scope adopts segment strategy to read massive data efficiently. Users can plot one or more signals on their own choice and zoom-in, zoom-out smoothly. The whole system is based on B/S model, so that the users only need of the browsers to access the DAMS. The DAMS has been tested and it has a better user experience. It will be integrated into the J-TEXT remote participation system later

  2. Find Ryan White HIV/AIDS Medical Care Providers

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Find Ryan White HIV/AIDS Medical Care Providers tool is a locator that helps people living with HIV/AIDS access medical care and related services. Users can...

  3. User internface for rail traffic control system

    OpenAIRE

    Križaj, Blaž

    2013-01-01

    The thesis represents a solution to the problem of remote access to a server application, its management, and graphical user interface (GUI) build above console application. The TRIS Server operates in the UNIX environment without a graphical user interface as a service. Access to the application, archive files and management without graphical user interface is user unfriendly, as it requires knowledge of UNIX environment and Bash scripting language. Remote access via the internet represen...

  4. Development of RESTful services and map-based user interface tools for access and delivery of data and metadata from the Marine-Geo Digital Library

    Science.gov (United States)

    Morton, J. J.; Ferrini, V. L.

    2015-12-01

    The Marine Geoscience Data System (MGDS, www.marine-geo.org) operates an interactive digital data repository and metadata catalog that provides access to a variety of marine geology and geophysical data from throughout the global oceans. Its Marine-Geo Digital Library includes common marine geophysical data types and supporting data and metadata, as well as complementary long-tail data. The Digital Library also includes community data collections and custom data portals for the GeoPRISMS, MARGINS and Ridge2000 programs, for active source reflection data (Academic Seismic Portal), and for marine data acquired by the US Antarctic Program (Antarctic and Southern Ocean Data Portal). Ensuring that these data are discoverable not only through our own interfaces but also through standards-compliant web services is critical for enabling investigators to find data of interest.Over the past two years, MGDS has developed several new RESTful web services that enable programmatic access to metadata and data holdings. These web services are compliant with the EarthCube GeoWS Building Blocks specifications and are currently used to drive our own user interfaces. New web applications have also been deployed to provide a more intuitive user experience for searching, accessing and browsing metadata and data. Our new map-based search interface combines components of the Google Maps API with our web services for dynamic searching and exploration of geospatially constrained data sets. Direct introspection of nearly all data formats for hundreds of thousands of data files curated in the Marine-Geo Digital Library has allowed for precise geographic bounds, which allow geographic searches to an extent not previously possible. All MGDS map interfaces utilize the web services of the Global Multi-Resolution Topography (GMRT) synthesis for displaying global basemap imagery and for dynamically provide depth values at the cursor location.

  5. Meta-analysis of executive functioning in ecstasy/polydrug users.

    Science.gov (United States)

    Roberts, C A; Jones, A; Montgomery, C

    2016-06-01

    Ecstasy/3,4-methylenedioxymethamphetamine (MDMA) use is proposed to cause damage to serotonergic (5-HT) axons in humans. Therefore, users should show deficits in cognitive processes that rely on serotonin-rich, prefrontal areas of the brain. However, there is inconsistency in findings to support this hypothesis. The aim of the current study was to examine deficits in executive functioning in ecstasy users compared with controls using meta-analysis. We identified k = 39 studies, contributing 89 effect sizes, investigating executive functioning in ecstasy users and polydrug-using controls. We compared function-specific task performance in 1221 current ecstasy users and 1242 drug-using controls, from tasks tapping the executive functions - updating, switching, inhibition and access to long-term memory. The significant main effect demonstrated overall executive dysfunction in ecstasy users [standardized mean difference (SMD) = -0.18, 95% confidence interval (CI) -0.26 to -0.11, Z = 5.05, p Ecstasy users showed significant performance deficits in access (SMD = -0.33, 95% CI -0.46 to -0.19, Z = 4.72, p ecstasy users to date and provides a behavioural correlate of potential serotonergic neurotoxicity.

  6. Channel-aware multi-user uplink transmission scheme for SIMO-OFDM systems

    Institute of Scientific and Technical Information of China (English)

    PAN ChengKang; CAI YueMing; XU YouYun

    2009-01-01

    The problem of medium access control (MAC) in wireless single-Input multiple-output-orthogonal frequency division multiplexing (SIMO-OFOM) systems is addressed.Traditional random access protocols have low overheads and inferior performance.Centralized methods have superior performance and high overheads.To achieve the tradeoff between overhead and performance,we propose a channelaware uplink transmission (CaUT) scheme for SIMO-OFDM systems.In CaUT,users transmit requestto-send (RTS) at some subcarriers whose channel gains are above a predetermined threshold.Using the channel state information provided by RTS,access point performs user selection with receive beamforming to decide which users can access and then broadcasts the selection results via clear-to-send (CTS) to users.We present a distributed power control scheme by using a simple fixed modulation mode.We optimize the modulation order and channel gain thresholds to maximize the separable packets subject to the bit-error-rate (BER) and temporal fairness requirements and the Individual average transmit power constraints.The performance of CaUT scheme is analyzed analytically and evaluated by simulations.Simulation results show that CaUT can achieve more significant throughput performance than traditional random access protocols.

  7. PathwayAccess: CellDesigner plugins for pathway databases.

    Science.gov (United States)

    Van Hemert, John L; Dickerson, Julie A

    2010-09-15

    CellDesigner provides a user-friendly interface for graphical biochemical pathway description. Many pathway databases are not directly exportable to CellDesigner models. PathwayAccess is an extensible suite of CellDesigner plugins, which connect CellDesigner directly to pathway databases using respective Java application programming interfaces. The process is streamlined for creating new PathwayAccess plugins for specific pathway databases. Three PathwayAccess plugins, MetNetAccess, BioCycAccess and ReactomeAccess, directly connect CellDesigner to the pathway databases MetNetDB, BioCyc and Reactome. PathwayAccess plugins enable CellDesigner users to expose pathway data to analytical CellDesigner functions, curate their pathway databases and visually integrate pathway data from different databases using standard Systems Biology Markup Language and Systems Biology Graphical Notation. Implemented in Java, PathwayAccess plugins run with CellDesigner version 4.0.1 and were tested on Ubuntu Linux, Windows XP and 7, and MacOSX. Source code, binaries, documentation and video walkthroughs are freely available at http://vrac.iastate.edu/~jlv.

  8. The web-based user interface for EAST plasma control system

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, R.R., E-mail: rrzhang@ipp.ac.cn [Institute of Plasma Physics, Chinese Academy of Sciences, Anhui (China); Xiao, B.J. [Institute of Plasma Physics, Chinese Academy of Sciences, Anhui (China); School of Nuclear Science and Technology, University of Science and Technology of China, Anhui (China); Yuan, Q.P. [Institute of Plasma Physics, Chinese Academy of Sciences, Anhui (China); Yang, F. [Institute of Plasma Physics, Chinese Academy of Sciences, Anhui (China); Department of Computer Science, Anhui Medical University, Anhui (China); Zhang, Y. [Institute of Plasma Physics, Chinese Academy of Sciences, Anhui (China); Johnson, R.D.; Penaflor, B.G. [General Atomics, DIII-D National Fusion Facility, San Diego, CA (United States)

    2014-05-15

    The plasma control system (PCS) plays a vital role at EAST for fusion science experiments. Its software application consists of two main parts: an IDL graphical user interface for setting a large number of plasma parameters to specify each discharge, several programs for performing the real-time feedback control and managing the whole control system. The PCS user interface can be used from any X11 Windows client with privileged access to the PCS computer system. However, remote access to the PCS system via the IDL user interface becomes an extreme inconvenience due to the high network latency to draw or operate the interfaces. In order to realize lower latency for remote access to the PCS system, a web-based system has been developed for EAST recently. The setup data are retrieved from the PCS system and client-side JavaScript draws the interfaces into the user's browser. The user settings are also sent back to the PCS system for controlling discharges. These technologies allow the web-based user interface to be viewed by authorized users with a web browser and have it communicate with PCS server processes directly. It works together with the IDL interface and provides a new way to aid remote participation.

  9. The web-based user interface for EAST plasma control system

    International Nuclear Information System (INIS)

    Zhang, R.R.; Xiao, B.J.; Yuan, Q.P.; Yang, F.; Zhang, Y.; Johnson, R.D.; Penaflor, B.G.

    2014-01-01

    The plasma control system (PCS) plays a vital role at EAST for fusion science experiments. Its software application consists of two main parts: an IDL graphical user interface for setting a large number of plasma parameters to specify each discharge, several programs for performing the real-time feedback control and managing the whole control system. The PCS user interface can be used from any X11 Windows client with privileged access to the PCS computer system. However, remote access to the PCS system via the IDL user interface becomes an extreme inconvenience due to the high network latency to draw or operate the interfaces. In order to realize lower latency for remote access to the PCS system, a web-based system has been developed for EAST recently. The setup data are retrieved from the PCS system and client-side JavaScript draws the interfaces into the user's browser. The user settings are also sent back to the PCS system for controlling discharges. These technologies allow the web-based user interface to be viewed by authorized users with a web browser and have it communicate with PCS server processes directly. It works together with the IDL interface and provides a new way to aid remote participation

  10. The perspectives of structurally vulnerable people who use drugs on volunteer stipends and work experiences provided through a drug user organization: Opportunities and limitations.

    Science.gov (United States)

    Bardwell, Geoff; Anderson, Solanna; Richardson, Lindsey; Bird, Lorna; Lampkin, Hugh; Small, Will; McNeil, Ryan

    2018-03-01

    While drug user organizations (DUO) have received public health attention as a means to potentially reduce the harms associated with drug use, there is a lack of research on the compensation and structural forces that promote or inhibit participation in DUO. Against the backdrop of structural vulnerability experienced by people who use drugs (PWUD), we examined the impact of monetary 'volunteer stipends' provided through a DUO and explore their role in providing low-threshold employment opportunities and shaping participation in DUO. Participants were purposively sampled to reflect a range of perspectives and experiences volunteering at Vancouver Area Network of Drug Users (VANDU) and receiving stipends. Semi-structured qualitative interviews were conducted with 23 members of VANDU. Interview transcripts were coded in Atlas.ti 7 for key a priori themes and emergent categories from the data and analyzed thematically. Stipends provided participants with symbolic and material recognition of the time, effort, and expertise they contribute to the organization, and functioned to facilitate ongoing participation. Payments that rewarded, skills, labour and drug-related knowledge reduced participant's perception of stigma against PWUD. Paid work in VANDU further provided participants with non-material benefits commonly attributed to regular employment, including social connections and a sense of purpose. Participants also identified the low level of pay as a limitation of VANDU's paid participation program. The daily demands of survival (accessing shelter, food, and drugs) posed more complex structural vulnerabilities to participate in VANDU, as small stipends were not sufficient to address these needs. Low threshold employment opportunities within DUO may provide significant individual and public health benefits. However, these benefits are constrained by the small size of stipends. Therefore, to ensure better inclusion of PWUD, our findings recommend the development and

  11. Black Open Access in Ukraine: Analysis of Downloading Sci-Hub Publications by Ukrainian Internet Users

    OpenAIRE

    Nazarovets, Serhii

    2018-01-01

    Introduction. High subscription fees to scholarly research journals provoke researchers to use illegal channels of access to scientific information. Analysis of statistical data on downloads of scholarly research papers by Ukrainian Internet users from illegal web resource can help to define gaps in information provision at the institutional or the state level for each scientific field. Problem Statement. To conduct an analysis of behavior and geography of downloads of scholarly research p...

  12. Learning and mastery behaviours as risk factors to abandonment in a paediatric user of advanced single-switch access technology.

    Science.gov (United States)

    Brian, Leung; Jessica A, Brian; Tom, Chau

    2013-09-01

    The present descriptive case study documents the behaviours of a child single-switch user in the community setting and draws attention to learning and mastery behaviours as risk factors to single-switch abandonment. Our observations were interpreted in the context of a longer term school-based evaluation of an advanced single-switch access technology with a nine year-old user with severe spastic quadriplegic cerebral palsy. The child completed 25 experiment sessions averaging a rate of three sessions every two weeks. During each session he worked on several blocks of single-switch computer activity using his vocal cord vibration switch. Despite high levels of single-switch sensitivity and specificity that suggested a good fit between the participant and the technology, the participant perceived a lower proficiency level of his own abilities, demonstrated impatience and intolerance to interaction errors, and was apprehensive of making mistakes when using his switch in public. The benefit of gaining some degree of independent physical access might not necessarily enhance resilience to interaction errors or bouts of poor task performance. On the other hand, the participant's behaviours were consistent with those of a typically developing child learning or mastering any new skill or task. Implications for Rehabilitation The attitude and behaviour of a paediatric switch user towards skill development can be risk factors to abandonment of an access technology, despite successful clinical trial with the device. Children with severe disabilities can be associated with the same types of skill development behaviour patterns and achievement motivation as their typically developing peers. Empirical observations of the case participant's switch use behaviours suggest that user training could be adaptive in order to account for individual differences in skill development and achievement motivation.

  13. A Practical Guide for Building a Digital Library: User-Focused Collection

    Science.gov (United States)

    Zhu, Qin; Guevara, Sophia

    2009-01-01

    With changing user expectations, many libraries are moving toward digital content. Accessible from anywhere at any time, digital content provides users with efficient, on-demand information experiences. Accordingly, librarians are presented with challenges and opportunities to build, manage, and implement outreach strategies that promote their…

  14. Barriers to Access to Sterile Syringes as Perceived by Pharmacists and Injecting Drug Users: Implications for Harm Reduction in Lebanon.

    Science.gov (United States)

    Ghaddar, Ali; Nassar, Karine; Elsoury, Ghadier

    2017-09-19

    Access to sterile syringes to injecting drug users (IDU) reduces sharing behavior and prevents the transmission of HIV. To describe the barriers to access to sterile syringes for IDUs in Lebanon from the perspectives of pharmacists and IDUs. in this qualitative study conducted in Lebanon, data were collected from 72 syringe purchase tests at pharmacies, 64 interviewees with pharmacists and 2 focus groups with injecting drug users. Two independent researchers analyzed the verbatim transcripts. Results revealed that pharmacists often deny access to sterile syringes to IDUs who are frequently stigmatized and intimidated at pharmacies. While no large gender differences in pharmacists' attitudes and practices were observed, inequalities in syringe access were noticed with men IDUs more often denied purchase. Pharmacists had several barriers to sell syringes to IDUs including fear of disease spread, increased drug use, inappropriately discarded syringes, staff and customer safety, and business concerns. IDUs had several challenges to purchase syringes including stigmatization, intimidation, physical harassment, concern to reveal identity, fear of arrest and syringe price abuse. Identifying the barriers to and facilitators of access to sterile syringes to IDUs is important to guide the development of efficient policies. Findings implicate the importance of empowering IDUs to purchase syringes at pharmacies through reducing the negative attitude towards IDUs and strengthening pharmacists' role in the promotion of health of IDUs. Findings also suggest that the habit of syringe sharing would decrease if the legal and cultural barriers to access are reduced.

  15. Squidy : a Zoomable Design Environment for Natural User Interfaces

    OpenAIRE

    König, Werner A.; Rädle, Roman; Reiterer, Harald

    2009-01-01

    We introduce the interaction library Squidy, which eases the design of natural user interfaces by unifying relevant frameworks and toolkits in a common library. Squidy provides a central design environment based on high-level visual data flow programming combined with zoomable user interface concepts. The user interface offers a Simple visual language and a collection of ready-to-use devices, filters and interaction techniques. The concept of semantic zooming enables nevertheless access to mo...

  16. Models for QoS-Aware Capacity Management in Cable Access Networks

    NARCIS (Netherlands)

    Attema, T.; van den Berg, Hans Leo; Kempker, P.C.; Worm, D.; van der Vliet-Hameeteman, C.

    In this article, mathematical models are presented that “map‿ measured or predicted network utilisations to user throughputs for given network configurations (segment capacity, subscription speeds etc.). They provide valuable insights into the user experience in cable access networks. The models,

  17. Personal lifelong user model clouds

    DEFF Research Database (Denmark)

    Dolog, Peter; Kay, Judy; Kummerfeld, Bob

    This paper explores an architecture for very long term user modelling, based upon personal user model clouds. These ensure that the individual's applications can access their model whenever it is needed. At the same time, the user can control the use of their user model. So, they can ensure...... which combines both. Finally we discuss implications of our approach for consistency and freshness of the user model information....... it is accessed only when and where they wish, by applications that they wish. We consider the challenges of representing user models so that they can be reused by multiple applications. We indicate potential synergies between distributed and centralised user modelling architectures, proposing an architecture...

  18. TRANSNET -- access to radioactive and hazardous materials transportation codes and databases

    International Nuclear Information System (INIS)

    Cashwell, J.W.

    1992-01-01

    TRANSNET has been developed and maintained by Sandia National Laboratories under the sponsorship of the United States Department of Energy (DOE) Office of Environmental Restoration and Waste Management to permit outside access to computerized routing, risk and systems analysis models, and associated databases. The goal of the TRANSNET system is to enable transfer of transportation analytical methods and data to qualified users by permitting direct, timely access to the up-to-date versions of the codes and data. The TRANSNET facility comprises a dedicated computer with telephone ports on which these codes and databases are adapted, modified, and maintained. To permit the widest spectrum of outside users, TRANSNET is designed to minimize hardware and documentation requirements. The user is thus required to have an IBM-compatible personal computer, Hayes-compatible modem with communications software, and a telephone. Maintenance and operation of the TRANSNET facility are underwritten by the program sponsor(s) as are updates to the respective models and data, thus the only charges to the user of the system are telephone hookup charges. TRANSNET provides access to the most recent versions of the models and data developed by or for Sandia National Laboratories. Code modifications that have been made since the last published documentation are noted to the user on the introductory screens. User friendly interfaces have been developed for each of the codes and databases on TRANSNET. In addition, users are provided with default input data sets for typical problems which can either be used directly or edited. Direct transfers of analytical or data files between codes are provided to permit the user to perform complex analyses with a minimum of input. Recent developments to the TRANSNET system include use of the system to directly pass data files between both national and international users as well as development and integration of graphical depiction techniques

  19. Providing Access to Library Automation Systems for Students with Disabilities.

    Science.gov (United States)

    California Community Colleges, Sacramento. High-Tech Center for the Disabled.

    This document provides information on the integration of assistive computer technologies and library automation systems at California Community Colleges in order to ensure access for students with disabilities. Topics covered include planning, upgrading, purchasing, implementing and using these technologies with library systems. As information…

  20. Improving information access by relevance and topical feedback

    NARCIS (Netherlands)

    Kaptein, R.; Kamps, J.; Hopfgartner, F.

    2008-01-01

    One of the main bottle-necks in providing more effective information access is the poverty of the query end. With an average query length of about two terms, users provide only a highly ambiguous statement of the, often complex, underlying information need. Implicit and explicit feedback can provide

  1. Access to water provides economic relief through enhanced relationships in Kenya.

    Science.gov (United States)

    Zolnikov, Tara Rava; Blodgett-Salafia, Elizabeth

    2017-03-01

    Sub-Saharan Africa is comprised of low- and middle-income countries subject to the residual effects of chronic poverty. Poverty contributes to health disparities and social inequities. Public health strategies and solutions seek to remedy the effects of poverty. Providing access to quality water is one priority public health project that alleviates adverse health effects, but may have additional outcomes. Previous research has not thoroughly reviewed the economic relief and relationship changes from implemented water interventions. A qualitative phenomenological approach used 52 semi-structured interviews to understand relationship experiences among primary water gatherers and their families after implemented water interventions in a community. This study took place throughout the historically semi-arid eastern region in Kitui, Kenya, where community members have been beneficiaries of various water interventions. Prior to the water intervention, relationships were strained because of economic hardships. Households experienced economic difficulties in paying for children's school fees, buying bricks for housing structures, having water for house gardens, trees for shade in the compound, crops and providing water for their animals. After receiving access to water, relationships improved, because families were able to discuss and address economic challenges. Additional financial revenue was gained and used to pay for water to make bricks to sell or use on housing structures, expand on house gardens and agricultural crops, build new businesses, purchase water for animals, and construct local water spouts near the household. Access to water improved relationships, which encouraged economic growth. This information provides a critical component in understanding the interconnected nature between access to water, poverty and family relationships. Ultimately, this research suggests an increased need for access to quality water worldwide to improve both economic situations

  2. User Types in Online Applications

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2011-08-01

    Full Text Available Online applications are presented in the context of information society. Online applications characteristics are analyzed. Quality characteristics are presented in relation to online applications users. Types of users for AVIO application are presented. Use cases for AVIO application are identified. The limitations of AVIO application are defined. Types of users in online applications are identified. The threedimensional matrix of access to the online application resources is built. The user type-oriented database is structured. Access management of the fields related to the database tables is analyzed. The classification of online applications users is done.

  3. The DEDUCE Guided Query tool: providing simplified access to clinical data for research and quality improvement.

    Science.gov (United States)

    Horvath, Monica M; Winfield, Stephanie; Evans, Steve; Slopek, Steve; Shang, Howard; Ferranti, Jeffrey

    2011-04-01

    In many healthcare organizations, comparative effectiveness research and quality improvement (QI) investigations are hampered by a lack of access to data created as a byproduct of patient care. Data collection often hinges upon either manual chart review or ad hoc requests to technical experts who support legacy clinical systems. In order to facilitate this needed capacity for data exploration at our institution (Duke University Health System), we have designed and deployed a robust Web application for cohort identification and data extraction--the Duke Enterprise Data Unified Content Explorer (DEDUCE). DEDUCE is envisioned as a simple, web-based environment that allows investigators access to administrative, financial, and clinical information generated during patient care. By using business intelligence tools to create a view into Duke Medicine's enterprise data warehouse, DEDUCE provides a Guided Query functionality using a wizard-like interface that lets users filter through millions of clinical records, explore aggregate reports, and, export extracts. Researchers and QI specialists can obtain detailed patient- and observation-level extracts without needing to understand structured query language or the underlying database model. Developers designing such tools must devote sufficient training and develop application safeguards to ensure that patient-centered clinical researchers understand when observation-level extracts should be used. This may mitigate the risk of data being misunderstood and consequently used in an improper fashion. Copyright © 2010 Elsevier Inc. All rights reserved.

  4. Interactive SIGHT: textual access to simple bar charts

    Science.gov (United States)

    Demir, Seniz; Oliver, David; Schwartz, Edward; Elzer, Stephanie; Carberry, Sandra; Mccoy, Kathleen F.; Chester, Daniel

    2010-12-01

    Information graphics, such as bar charts and line graphs, are an important component of many articles from popular media. The majority of such graphics have an intention (a high-level message) to communicate to the graph viewer. Since the intended message of a graphic is often not repeated in the accompanying text, graphics together with the textual segments contribute to the overall purpose of an article and cannot be ignored. Unfortunately, these visual displays are provided in a format which is not readily accessible to everyone. For example, individuals with sight impairments who use screen readers to listen to documents have limited access to the graphics. This article presents a new accessibility tool, the Interactive SIGHT (Summarizing Information GrapHics Textually) system, that is intended to enable visually impaired users to access the knowledge that one would gain from viewing information graphics found on the web. The current system, which is implemented as a browser extension that works on simple bar charts, can be invoked by a user via a keystroke combination while navigating the web. Once launched, Interactive SIGHT first provides a brief summary that conveys the underlying intention of a bar chart along with the chart's most significant and salient features, and then produces history-aware follow-up responses to provide further information about the chart upon request from the user. We present two user studies that were conducted with sighted and visually impaired users to determine how effective the initial summary and follow-up responses are in conveying the informational content of bar charts, and to evaluate how easy it is to use the system interface. The evaluation results are promising and indicate that the system responses are well-structured and enable visually impaired users to answer key questions about bar charts in an easy-to-use manner. Post-experimental interviews revealed that visually impaired participants were very satisfied with

  5. Policies to Promote User Innovation

    DEFF Research Database (Denmark)

    Svensson, Peter; Hartmann, Rasmus Koss

    and benefits of such policies. As a first empirical step to understanding such policies, this paper reports on the results of providing hospital clinicians with access to ‘makerspaces’, i.e. staffed facilities with prototyping tools and the expertise in using them. Findings suggest that almost all innovations...... developed in the makerspaces are user innovations; that the potential returns from the first 56 innovations developed in the makerspaces are 30-80 times the required investment; and that most of the innovations would not have been developed without access to makerspaces. Yet owing to lack of diffusion, only...... a limited share of potential returns is realized. This suggests that provision of makerspaces, at least in healthcare contexts, is a tremendously effective form of user-supporting innovation policy both from an organizational and societal perspective, but also that it might need to be supplemented...

  6. Access to digital library databases in higher education: design problems and infrastructural gaps.

    Science.gov (United States)

    Oswal, Sushil K

    2014-01-01

    After defining accessibility and usability, the author offers a broad survey of the research studies on digital content databases which have thus far primarily depended on data drawn from studies conducted by sighted researchers with non-disabled users employing screen readers and low vision devices. This article aims at producing a detailed description of the difficulties confronted by blind screen reader users with online library databases which now hold most of the academic, peer-reviewed journal and periodical content essential for research and teaching in higher education. The approach taken here is borrowed from descriptive ethnography which allows the author to create a complete picture of the accessibility and usability problems faced by an experienced academic user of digital library databases and screen readers. The author provides a detailed analysis of the different aspects of accessibility issues in digital databases under several headers with a special focus on full-text PDF files. The author emphasizes that long-term studies with actual, blind screen reader users employing both qualitative and computerized research tools can yield meaningful data for the designers and developers to improve these databases to a level that they begin to provide an equal access to the blind.

  7. Recommending access control decisions to social media users

    OpenAIRE

    Misra, Gaurav; Such, Jose M.

    2017-01-01

    Social media has become an integral part of the Internet and has revolutionized interpersonal communication. The lines of separation between content creators and content consumers have blurred as normal users have platforms such as social media sites, blogs and microblogs at their disposal on which they can create and consume content as well as have the opportunity to interact with other users. This change has also led to several well documented privacy problems for the users. The privacy pro...

  8. CONTEXT BASED ANDROID APPLICATIONADMINISTRATIVE ACCESS CONTROL (CBAA–AAC) FOR SMART PHONES

    OpenAIRE

    S. Sharavanan; R.M. Balajee

    2016-01-01

    Android applications in smart phones are generally towards provide greater flexibility and convince for users. Considering the fact that the Android applications are having privilege to access data and resources in mobile after it gets installed (one time permission provided by end user on the time installation), these application may also lead to issues in security for the user data as well as issues relate smart phone with peripheral environment. A practical example for an issue which relat...

  9. Financial accessibility and user fee reforms for maternal healthcare in five sub-Saharan countries: a quasi-experimental analysis.

    Science.gov (United States)

    Leone, Tiziana; Cetorelli, Valeria; Neal, Sarah; Matthews, Zoë

    2016-01-28

    Evidence on whether removing fees benefits the poorest is patchy and weak. The aim of this paper is to measure the impact of user fee reforms on the probability of giving birth in an institution or undergoing a caesarean section (CS) in Ghana, Burkina Faso, Zambia, Cameroon and Nigeria for the poorest strata of the population. Women's experience of user fees in 5 African countries. Using quasi-experimental regression analysis we tested the impact of user fee reforms on facilities' births and CS differentiated by wealth, education and residence in Burkina Faso and Ghana. Mapping of the literature followed by key informant interviews are used to verify details of reform implementation and to confirm and support our countries' choice. We analysed data from consecutive surveys in 5 countries: 2 case countries that experienced reforms (Ghana and Burkina Faso) by contrast with 3 that did not experience reforms (Zambia, Cameroon, Nigeria). User fee reforms are associated with a significant percentage of the increase in access to facility births (27 percentage points) and to a much lesser extent to CS (0.7 percentage points). Poor (but not the poorest), and non-educated women, and those in rural areas benefitted the most from the reforms. User fees reforms have had a higher impact in Burkina Faso compared with Ghana. Findings show a clear positive impact on access when user fees are removed, but limited evidence for improved availability of CS for those most in need. More women from rural areas and from lower socioeconomic backgrounds give birth in health facilities after fee reform. Speed and quality of implementation might be the key reason behind the differences between the 2 case countries. This calls for more research into the impact of reforms on quality of care. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  10. Network Performance and Quality of Experience of Remote Access Laboratories

    Directory of Open Access Journals (Sweden)

    Alexander A. Kist

    2012-11-01

    Full Text Available Remote Access Laboratories (RAL have become important learning and teaching tools. This paper presents a performance study that targets a specific remote access architecture implemented within a universities operational environment. This particular RAL system provides globally authenticated and arbitrated remote access to virtualized computers as well as computer controlled hardware experiments. This paper presents system performance results that have been obtained utilizing both a set of automated and human subject tests. Principle objectives of the study were: To gain a better understanding of the nature of network traffic caused by experimental activity usage; to obtain an indication of user expectations of activity performance; and to develop a measure to predict Quality of Experience, based on easily measurable Quality of Service parameters. The study emulates network layer variation of access-bandwidth and round-trip-time of typical usage scenarios and contrasts against user perception results that allow classifying expected user performance. It demonstrates that failure rate is excellent measure of usability, and that round-trip-time predominantly affects user experience. Thin-client and remote desktop architectures are popular to separate the location of users and the actual data processing and use similar structures, hence results of this study to be applied in these application areas as well.

  11. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  12. Evolving provider payment models and patient access to innovative medical technology.

    Science.gov (United States)

    Long, Genia; Mortimer, Richard; Sanzenbacher, Geoffrey

    2014-12-01

    Abstract Objective: To investigate the evolving use and expected impact of pay-for-performance (P4P) and risk-based provider reimbursement on patient access to innovative medical technology. Structured interviews with leading private payers representing over 110 million commercially-insured lives exploring current and planned use of P4P provider payment models, evidence requirements for technology assessment and new technology coverage, and the evolving relationship between the two topics. Respondents reported rapid increases in the use of P4P and risk-sharing programs, with roughly half of commercial lives affected 3 years ago, just under two-thirds today, and an expected three-quarters in 3 years. All reported well-established systems for evaluating new technology coverage. Five of nine reported becoming more selective in the past 3 years in approving new technologies; four anticipated that in the next 3 years there will be a higher evidence requirement for new technology access. Similarly, four expected it will become more difficult for clinically appropriate but costly technologies to gain coverage. All reported planning to rely more on these types of provider payment incentives to control costs, but didn't see them as a substitute for payer technology reviews and coverage limitations; they each have a role to play. Interviews limited to nine leading payers with models in place; self-reported data. Likely implications include a more uncertain payment environment for providers, and indirectly for innovative medical technology and future investment, greater reliance on quality and financial metrics, and increased evidence requirements for favorable coverage and utilization decisions. Increasing provider financial risk may challenge the traditional technology adoption paradigm, where payers assumed a 'gatekeeping' role and providers a countervailing patient advocacy role with regard to access to new technology. Increased provider financial risk may result in an

  13. Free-space optical code-division multiple-access system design

    Science.gov (United States)

    Jeromin, Lori L.; Kaufmann, John E.; Bucher, Edward A.

    1993-08-01

    This paper describes an optical direct-detection multiple access communications system for free-space satellite networks utilizing code-division multiple-access (CDMA) and forward error correction (FEC) coding. System performance is characterized by how many simultaneous users operating at data rate R can be accommodated in a signaling bandwidth W. The performance of two CDMA schemes, optical orthogonal codes (OOC) with FEC and orthogonal convolutional codes (OCC), is calculated and compared to information-theoretic capacity bounds. The calculations include the effects of background and detector noise as well as nonzero transmitter extinction ratio and power imbalance among users. A system design for 10 kbps multiple-access communications between low-earth orbit satellites is given. With near- term receiver technology and representative system losses, a 15 W peak-power transmitter provides 10-6 BER performance with seven interfering users and full moon background in the receiver FOV. The receiver employs an array of discrete wide-area avalanche photodiodes (APD) for wide field of view coverage. Issues of user acquisition and synchronization, implementation technology, and system scalability are also discussed.

  14. Local and Remote Laboratory User Experimentation Access using Digital Programmable Logic

    Directory of Open Access Journals (Sweden)

    Ian A Grout

    2005-06-01

    Full Text Available This paper will discuss the structure and operation of a programmable logic based experimentation arrangement that is suitable for both local and remote teaching and learning scenarios targeting electronic and microelectronic circuit design and test principles. With this experimentation arrangement, the ability to provide both local and Internet based “remote” access for the student and the teacher can provide a number of advantages where physical laboratory accessibility is limited and/or the learning experience must be undertaken with one or more of the parties remotely based. The paper concentrates on the design and example use of a system developed within the University of Limerick.

  15. User Authentication in Smartphones for Telehealth.

    Science.gov (United States)

    Smith, Katherine A; Zhou, Leming; Watzlaf, Valerie J M

    2017-01-01

    Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA) breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed.

  16. XACML to build access control policies for Internet of Things

    OpenAIRE

    Atlam, Hany F.; Alassafi, Madini, Obad; Alenezi, Ahmed; Walters, Robert; Wills, Gary

    2018-01-01

    Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issues. The access control is one of the main elements to address these issues. It provides the access to system resources only to authorized users and ensures that they behave in an authorized manner during their access sessions. One of the significant components of any access control model is access policies. They are used to build the criteria to permit or deny any access request. Building an ef...

  17. Design Optimization Toolkit: Users' Manual

    Energy Technology Data Exchange (ETDEWEB)

    Aguilo Valentin, Miguel Alejandro [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Computational Solid Mechanics and Structural Dynamics

    2014-07-01

    The Design Optimization Toolkit (DOTk) is a stand-alone C++ software package intended to solve complex design optimization problems. DOTk software package provides a range of solution methods that are suited for gradient/nongradient-based optimization, large scale constrained optimization, and topology optimization. DOTk was design to have a flexible user interface to allow easy access to DOTk solution methods from external engineering software packages. This inherent flexibility makes DOTk barely intrusive to other engineering software packages. As part of this inherent flexibility, DOTk software package provides an easy-to-use MATLAB interface that enables users to call DOTk solution methods directly from the MATLAB command window.

  18. Metals Processing Laboratory Users (MPLUS) Facility Annual Report: October 1, 2000 through September 30, 2001

    Energy Technology Data Exchange (ETDEWEB)

    Angelini, P

    2004-04-27

    The Metals Processing Laboratory Users Facility (MPLUS) is a Department of Energy (DOE), Energy Efficiency and Renewable Energy, Industrial Technologies Program user facility designated to assist researchers in key industries, universities, and federal laboratories in improving energy efficiency, improving environmental aspects, and increasing competitiveness. The goal of MPLUS is to provide access to the specialized technical expertise and equipment needed to solve metals processing issues that limit the development and implementation of emerging metals processing technologies. The scope of work can also extend to other types of materials. MPLUS has four primary User Centers including: (1) Processing--casting, powder metallurgy, deformation processing including (extrusion, forging, rolling), melting, thermomechanical processing, high density infrared processing; (2) Joining--welding, monitoring and control, solidification, brazing, bonding; (3) Characterization--corrosion, mechanical properties, fracture mechanics, microstructure, nondestructive examination, computer-controlled dilatometry, and emissivity; (4) Materials/Process Modeling--mathematical design and analyses, high performance computing, process modeling, solidification/deformation, microstructure evolution, thermodynamic and kinetic, and materials data bases. A fully integrated approach provides researchers with unique opportunities to address technologically related issues to solve metals processing problems and probe new technologies. Access is also available to 16 additional Oak Ridge National Laboratory (ORNL) user facilities ranging from state of the art materials characterization capabilities, high performance computing, to manufacturing technologies. MPLUS can be accessed through a standardized User-submitted Proposal and a User Agreement. Nonproprietary (open) or proprietary proposals can be submitted. For open research and development, access to capabilities is provides free of charge while

  19. Understanding reactions to an internet-delivered health-care intervention: accommodating user preferences for information provision

    Directory of Open Access Journals (Sweden)

    Yardley Lucy

    2010-09-01

    Full Text Available Abstract Background It is recognised as good practice to use qualitative methods to elicit users' views of internet-delivered health-care interventions during their development. This paper seeks to illustrate the advantages of combining usability testing with 'theoretical modelling', i.e. analyses that relate the findings of qualitative studies during intervention development to social science theory, in order to gain deeper insights into the reasons and context for how people respond to the intervention. This paper illustrates how usability testing may be enriched by theoretical modelling by means of two qualitative studies of users' views of the delivery of information in an internet-delivered intervention to help users decide whether they needed to seek medical care for their cold or flu symptoms. Methods In Study 1, 21 participants recruited from a city in southern England were asked to 'think aloud' while viewing draft web-pages presented in paper format. In Study 2, views of our prototype website were elicited, again using think aloud methods, in a sample of 26 participants purposively sampled for diversity in education levels. Both data-sets were analysed by thematic analysis. Results Study 1 revealed that although the information provided by the draft web-pages had many of the intended empowering benefits, users often felt overwhelmed by the quantity of information. Relating these findings to theory and research on factors influencing preferences for information-seeking we hypothesised that to meet the needs of different users (especially those with lower literacy levels our website should be designed to provide only essential personalised advice, but with options to access further information. Study 2 showed that our website design did prove accessible to users with different literacy levels. However, some users seemed to want still greater control over how information was accessed. Conclusions Educational level need not be an

  20. Understanding reactions to an internet-delivered health-care intervention: accommodating user preferences for information provision.

    Science.gov (United States)

    Yardley, Lucy; Morrison, Leanne G; Andreou, Panayiota; Joseph, Judith; Little, Paul

    2010-09-17

    It is recognised as good practice to use qualitative methods to elicit users' views of internet-delivered health-care interventions during their development. This paper seeks to illustrate the advantages of combining usability testing with 'theoretical modelling', i.e. analyses that relate the findings of qualitative studies during intervention development to social science theory, in order to gain deeper insights into the reasons and context for how people respond to the intervention. This paper illustrates how usability testing may be enriched by theoretical modelling by means of two qualitative studies of users' views of the delivery of information in an internet-delivered intervention to help users decide whether they needed to seek medical care for their cold or flu symptoms. In Study 1, 21 participants recruited from a city in southern England were asked to 'think aloud' while viewing draft web-pages presented in paper format. In Study 2, views of our prototype website were elicited, again using think aloud methods, in a sample of 26 participants purposively sampled for diversity in education levels. Both data-sets were analysed by thematic analysis. Study 1 revealed that although the information provided by the draft web-pages had many of the intended empowering benefits, users often felt overwhelmed by the quantity of information. Relating these findings to theory and research on factors influencing preferences for information-seeking we hypothesised that to meet the needs of different users (especially those with lower literacy levels) our website should be designed to provide only essential personalised advice, but with options to access further information. Study 2 showed that our website design did prove accessible to users with different literacy levels. However, some users seemed to want still greater control over how information was accessed. Educational level need not be an insuperable barrier to appreciating web-based access to detailed health

  1. Online Public Access Catalog: The Google Maps of the Library World

    Science.gov (United States)

    Bailey, Kieren

    2011-01-01

    What do Google Maps and a library's Online Public Access Catalog (OPAC) have in common? Google Maps provides users with all the information they need for a trip in one place; users can get directions and find out what attractions, hotels, and restaurants are close by. Librarians must find the ultimate OPAC that will provide, in one place, all the…

  2. Advancing MEMS Technology Usage through the MUMPS (Multi-User MEMS Processes) Program

    Science.gov (United States)

    Koester, D. A.; Markus, K. W.; Dhuler, V.; Mahadevan, R.; Cowen, A.

    1995-01-01

    In order to help provide access to advanced micro-electro-mechanical systems (MEMS) technologies and lower the barriers for both industry and academia, the Microelectronic Center of North Carolina (MCNC) and ARPA have developed a program which provides users with access to both MEMS processes and advanced electronic integration techniques. The four distinct aspects of this program, the multi-user MEMS processes (MUMP's), the consolidated micro-mechanical element library, smart MEMS, and the MEMS technology network are described in this paper. MUMP's is an ARPA-supported program created to provide inexpensive access to MEMS technology in a multi-user environment. It is both a proof-of-concept and educational tool that aids in the development of MEMS in the domestic community. MUMP's technologies currently include a 3-layer poly-silicon surface micromachining process and LIGA (lithography, electroforming, and injection molding) processes that provide reasonable design flexibility within set guidelines. The consolidated micromechanical element library (CaMEL) is a library of active and passive MEMS structures that can be downloaded by the MEMS community via the internet. Smart MEMS is the development of advanced electronics integration techniques for MEMS through the application of flip chip technology. The MEMS technology network (TechNet) is a menu of standard substrates and MEMS fabrication processes that can be purchased and combined to create unique process flows. TechNet provides the MEMS community greater flexibility and enhanced technology accessibility.

  3. Novel Virtual User Models of Mild Cognitive Impairment for Simulating Dementia

    Science.gov (United States)

    Segkouli, Sofia; Tzovaras, Dimitrios; Tsakiris, Thanos; Tsolaki, Magda; Karagiannidis, Charalampos

    2015-01-01

    Virtual user modeling research has attempted to address critical issues of human-computer interaction (HCI) such as usability and utility through a large number of analytic, usability-oriented approaches as cognitive models in order to provide users with experiences fitting to their specific needs. However, there is demand for more specific modules embodied in cognitive architecture that will detect abnormal cognitive decline across new synthetic task environments. Also, accessibility evaluation of graphical user interfaces (GUIs) requires considerable effort for enhancing ICT products accessibility for older adults. The main aim of this study is to develop and test virtual user models (VUM) simulating mild cognitive impairment (MCI) through novel specific modules, embodied at cognitive models and defined by estimations of cognitive parameters. Well-established MCI detection tests assessed users' cognition, elaborated their ability to perform multitasks, and monitored the performance of infotainment related tasks to provide more accurate simulation results on existing conceptual frameworks and enhanced predictive validity in interfaces' design supported by increased tasks' complexity to capture a more detailed profile of users' capabilities and limitations. The final outcome is a more robust cognitive prediction model, accurately fitted to human data to be used for more reliable interfaces' evaluation through simulation on the basis of virtual models of MCI users. PMID:26339282

  4. elevatr: Access Elevation Data from Various APIs | Science ...

    Science.gov (United States)

    Several web services are available that provide access to elevation data. This package provides access to several of those services and returns elevation data either as a SpatialPointsDataFrame from point elevation services or as a raster object from raster elevation services. Currently, the package supports access to the Mapzen Elevation Service, Mapzen Terrain Service, and the USGS Elevation Point Query Service. The R language for statistical computing is increasingly used for spatial data analysis . This R package, elevatr, is in response to this and provides access to elevation data from various sources directly in R. The impact of `elevatr` is that it will 1) facilitate spatial analysis in R by providing access to foundational dataset for many types of analyses (e.g. hydrology, limnology) 2) open up a new set of users and uses for APIs widely used outside of R, and 3) provide an excellent example federal open source development as promoted by the Federal Source Code Policy (https://sourcecode.cio.gov/).

  5. Important announcement to INSPEC database users

    CERN Multimedia

    DSU Department

    2008-01-01

    The Library is in the process of transferring CERN’s subscription to the online INSPEC database to a new provider, which involves a new access platform. Users who have saved searches or alerts on the present system should record the details of their search strings as soon as possible whilst the old platform is still available, and manually move them to the new platform which will become available very soon. Access to the older platform will shortly be switched off, after which it will not be possible to access any saved information stored there. Access to the new platform will be available soon from the Library’s INSPEC page: http://library.cern.ch/information_resources/inspec.html

  6. Exploring Working Relationships in Mental Health Care via an E-Recovery Portal: Qualitative Study on the Experiences of Service Users and Health Providers.

    Science.gov (United States)

    Strand, Monica; Gammon, Deede; Eng, Lillian Sofie; Ruland, Cornelia

    2017-11-14

    The quality of working relationships between service users and health providers is fundamental in the processes of recovery in mental health. How Internet-based interventions will influence these relationships for persons with long-term care needs, and the measures that can be taken to maintain and enhance working relationships through Internet, is still not well understood. The aim of this study was to gain insights into how service users and health providers experience their working relationships when they are offered the option of supplementing ongoing collaboration with an e-recovery portal. In this exploratory and descriptive study, an e-recovery portal was used by service users and their health providers in 2 mental health communities in Norway for at least 6 months and at most 12 months (2015-2016). The portal consists of secure messaging, a peer support forum, and a toolbox of resources for working with life domains including status, goals and activities, network map, crisis plan, and exercises. The portal was owned and managed by the service user while health providers could remotely access parts of the service user-generated content. The participants could use the portal in whatever way they wished, to suit their collaboration. Data from 6 focus groups, 17 individual interviews, and an interview with 1 dyad about their experiences of use of the portal over the study period were inductively coded and thematically analyzed. The thematic analysis resulted in 2 main themes: (1) new relational avenues and (2) out of alignment, illustrated by 8 subthemes. The first main theme is about dyads who reported new and enriching ways of working together through the portal, particularly related to written communication and use of the goal module. Illustrative subthemes are ownership, common ground, goals and direction, and sense of presence and availability. The second main theme illuminates the difficulties that arose when service users' and health providers

  7. The web based user interface of RODOS

    International Nuclear Information System (INIS)

    Raskob, W.; Mueller, A.; Munz, E.; Rafat, M.

    2003-01-01

    Full text: The interaction between the RODOS system and its users has three main objectives: (1) operation of the system in its automatic and interactive modes including the processing of meteorological and radiological on-line data, and the choice of module chains for performing the necessary calculations; (2) input of data defining the accident situation, such as source term information, intervention criteria and timing of emergency actions; (3) selection and presentation of results in the form of spatial and temporal distributions of activity concentrations, areas affected by emergency actions and countermeasures, and their radiological and economic consequences. Users of category A have direct access to the RODOS system via local or wide area networks through the client/server protocol Internet/X. Any internet connected X desktop machine, such as Unix workstations from different vendors, X- terminals, Linux PCs, and PCs with X-emulation can be used. A number of X-Windows based graphical user interfaces (GUIs) provide direct access to all functionalities of the RODOS system and allow for handling the various user interactions with the RODOS system described above. Among others, the user can trigger or interrupt the automatic processing mode, execute application programs simultaneously, modify and delete data, import data sets from databases, and change configuration files. As the user interacts directly with in-memory active processes, the system responses immediately after having performed the necessary calculations. For obtaining the requested results, the users must know, which chain of application software has to be selected, how to interact with their interfaces, which sort of initialization data have to be assigned, etc. This flexible interaction with RODOS implies that only experienced and well-trained users are able to operate the system and to obtain correct and sensible information. A new interface has been developed which is based an the commonly used

  8. Uniform access to clinical data in a distributed environment. Radiology

    International Nuclear Information System (INIS)

    Adelhard, K.; Swoboda, N.; Nissen-Meyer, S.; Reiser, M.

    1999-01-01

    Purpose: Providing medical reports on wards and ambulatory settings in electronic form can improve the quality of health care delivery. Radiology was chosen as an example to demonstrate how to implement uniform access to clinical data in a hospital. Method: Medical professionals at the university hospital in Munich, Grosshadern, have access to all radiological reports of their patients. Web browsers are used as a front end. A centralized administration of users and patients is in place. Results: Centralized access control and patient selection guarantee uniform access to all applicable data via intranet and controls access rights. The high acceptance of this service is reflected by the high number of 150 requests per day. Discussion: Access to radiological reports within the Grosshadern University Clinics was enabled via web browsers in a short time. The high acceptance of the system also proves its easy use. Integration of the system in a centralized user and patient identification system supports the unified access to clinical data. (orig.) [de

  9. Spatial Release From Masking in Simulated Cochlear Implant Users With and Without Access to Low-Frequency Acoustic Hearing

    Directory of Open Access Journals (Sweden)

    Ben Williges

    2015-12-01

    Full Text Available For normal-hearing listeners, speech intelligibility improves if speech and noise are spatially separated. While this spatial release from masking has already been quantified in normal-hearing listeners in many studies, it is less clear how spatial release from masking changes in cochlear implant listeners with and without access to low-frequency acoustic hearing. Spatial release from masking depends on differences in access to speech cues due to hearing status and hearing device. To investigate the influence of these factors on speech intelligibility, the present study measured speech reception thresholds in spatially separated speech and noise for 10 different listener types. A vocoder was used to simulate cochlear implant processing and low-frequency filtering was used to simulate residual low-frequency hearing. These forms of processing were combined to simulate cochlear implant listening, listening based on low-frequency residual hearing, and combinations thereof. Simulated cochlear implant users with additional low-frequency acoustic hearing showed better speech intelligibility in noise than simulated cochlear implant users without acoustic hearing and had access to more spatial speech cues (e.g., higher binaural squelch. Cochlear implant listener types showed higher spatial release from masking with bilateral access to low-frequency acoustic hearing than without. A binaural speech intelligibility model with normal binaural processing showed overall good agreement with measured speech reception thresholds, spatial release from masking, and spatial speech cues. This indicates that differences in speech cues available to listener types are sufficient to explain the changes of spatial release from masking across these simulated listener types.

  10. Waste assay measurement integration system user interface

    International Nuclear Information System (INIS)

    Mousseau, K.C.; Hempstead, A.R.; Becker, G.K.

    1995-01-01

    The Waste Assay Measurement Integration System (WAMIS) is being developed to improve confidence in and lower the uncertainty of waste characterization data. There are two major components to the WAMIS: a data access and visualization component and a data interpretation component. The intent of the access and visualization software is to provide simultaneous access to all data sources that describe the contents of any particular container of waste. The visualization software also allows the user to display data at any level from raw to reduced output. Depending on user type, the software displays a menuing hierarchy, related to level of access, that allows the user to observe only those data sources s/he has been authorized to view. Access levels include system administrator, physicist, QA representative, shift operations supervisor, and data entry. Data sources are displayed in separate windows and presently include (1) real-time radiography video, (2) gamma spectra, (3) passive and active neutron, (4) radionuclide mass estimates, (5) total alpha activity (Ci), (6) container attributes, (7) thermal power (w), and (8) mass ratio estimates for americium, plutonium, and uranium isotopes. The data interpretation component is in the early phases of design, but will include artificial intelligence, expert system, and neural network techniques. The system is being developed on a Pentium PC using Microsoft Visual C++. Future generations of WAMIS will be UNIX based and will incorporate more generically radiographic/tomographic, gamma spectroscopic/tomographics, neutron, and prompt gamma measurements

  11. Providing Data Access for Interdisciplinary Research

    Science.gov (United States)

    Hooper, R. P.; Couch, A.

    2012-12-01

    Developing an interdisciplinary understanding of human and environmental interactions with water requires access to a variety of data kinds collected by various organizations. The CUAHSI Hydrologic Information System (HIS) is a standards-based, services-oriented architecture designed for time-series data. Such data represents an important type of data in water studies. Through the efforts of HIS, a standard transmission language, WaterML2, has been adopted by the Open Geospatial Consortium and is under consideration by the World Meteorologic Organization as an international standards. Web services have also been developed to retrieve data and metadata. HIS is completed with a metadata catalog, hosted by San Diego Supercomputing Center, which indexes more than 20 million time series provided from over 90 different services. This catalog is supported through a hierarchically organized controlled vocabulary that is open for community input and mediation. Data publishers include federal agencies, universities, state agencies, and non-profit organizations such as watershed associations. Accessing data from such a broad spectrum of sources through a uniform service standard promises to truly transform the way in which hydrologic research is done. CUAHSI HIS is a large-scale prototype at this time, but a proposal is under consideration by the National Science Foundation to operationalize HIS through a data facility, tentatively called the CUAHSI Water Data Center. Establishing HIS is an important step to enable research into human-environment interactions with water, but it is only one step. Other data structures will need to be made accessible and interoperable to support this research. Some data—such as two-dimensional GIS coverages—already have widely used standards for transmission and sharing. The US Federal government has long operated a clearinghouse for federal geographic data that is now being augmented with other services such as ArcGIS OnLine. Other data

  12. Policies to promote user innovation

    DEFF Research Database (Denmark)

    Svensson, Peter O.; Hartmann, Rasmus Koss

    2018-01-01

    of such policies. It is also not clear whether there is a problem for user-directed policy to solve, or what that problem is. As a first empirical step to answering these questions, we report the results of providing hospital clinicians with access to ‘makerspaces’, i.e. staffed facilities with prototyping tools...... and the expertise in using them. Findings suggest that almost all innovations developed in the makerspaces are user innovations; that the potential returns from the innovations developed in the makerspaces’ first year of operation are more than tenfold the required investment; and that most of the innovations would...... not have been developed without access to makerspaces. Due to lack of diffusion, only a limited share of potential returns is realized. This suggests not only that there are problems of non-development and under-development that policy can solve and that doing so supports social welfare. It also suggests...

  13. Emulation of Equal Open Access and Competition Creation in the Wireline Telecommunications Local and Last Mile Market Segments

    Science.gov (United States)

    Van Epps, Daniel L.

    2013-01-01

    Expanded telecommunications was deemed a serious need for end users. The "Local Market" and "Last Mile" market segments have largely consolidated into "natural utilities". Competition and access problems occur if new providers enter the local market and desire competitive access and service to end users. Local and…

  14. Seamless user experiences in a brand new library

    KAUST Repository

    Vijayakumar, J.K.

    2012-01-01

    In order to provide seamless user experiences, the brand new libraries are far better positioned. They do not have to manage much in print, at least for the journal section, but huge electronic collection accessible via Internet. They do not worry

  15. Does User Fee Removal Policy Provide Financial Protection from Catastrophic Health Care Payments? Evidence from Zambia.

    Directory of Open Access Journals (Sweden)

    Felix Masiye

    Full Text Available Out-of-pocket payments in health care have been shown to impose significant burden on households in Sub-Saharan Africa, leading to constrained access to health care and impoverishment. In an effort to reduce the financial burden imposed on households by user fees, some countries in Sub-Saharan Africa have abolished user fees in the health sector. Zambia is one of few countries in Sub-Saharan Africa to abolish user fees in primary health care facilities with a view to alleviating financial burden of out-of-pocket payments among the poor. The main aim of this paper was to examine the extent and patterns of financial protection from fees following the decision to abolish user fees in public primary health facilities.Our analysis is based on a nationally representative health expenditure and utilization survey conducted in 2014. We calculated the incidence and intensity of catastrophic health expenditure based on households' out-of-pocket payments during a visit as a percentage of total household consumption expenditure. We further show the intensity of the problem of catastrophic health expenditure (CHE experienced by households.Our analysis show that following the removal of user fees, a majority of patients who visited public health facilities benefitted from free care at the point of use. Further, seeking care at public primary health facilities is associated with a reduced likelihood of incurring CHE after controlling for economic wellbeing and other covariates. However, 10% of households are shown to suffer financial catastrophe as a result of out-of-pocket payments. Further, there is considerable inequality in the incidence of CHE whereby the poorest expenditure quintile experienced a much higher incidence.Despite the removal of user fees at primary health care level, CHE is high among the poorest sections of the population. This study also shows that cost of transportation is mainly responsible for limiting the protective effectiveness of

  16. Keeley's journey: from service user to service provider.

    Science.gov (United States)

    Cassinello, Keeley; Bramley, Sally

    2012-01-01

    This paper presents the vocational journey of a young British woman, Keeley, who changed her career aspirations to become a mental health worker following an episode of significant mental health difficulties. Keeley's story illustrates the application of the locally developed WORKS framework in conceptualising and supporting Keeley's vocational recovery. A narrative approach highlights the partnerships that developed between Keeley, the Occupational Therapist, Sally, and the User Support and Employment Service. The WORKS framework supported Keeley and Sally to collaboratively develop a successful employment pathway. Strategies, including attention to Keeley's view of her capabilities and aspirations, volunteer placements, support of peers, employer engagement and planning for sustainable employment, assisted Keeley to establish her chosen career. Keeley's journey highlights the leadership role that mental health services can assume by providing paid work for people with experience of mental health difficulties.

  17. Metals Processing Laboratory Users (MPLUS) Facility Annual Report FY 2002 (October 1, 2001-September 30, 2002)

    Energy Technology Data Exchange (ETDEWEB)

    Angelini, P

    2004-04-27

    The Metals Processing Laboratory Users Facility (MPLUS) is a Department of Energy (DOE), Energy Efficiency and Renewable Energy, Industrial Technologies Program, user facility designated to assist researchers in key industries, universities, and federal laboratories in improving energy efficiency, improving environmental aspects, and increasing competitiveness. The goal of MPLUS is to provide access to the specialized technical expertise and equipment needed to solve metals processing issues that limit the development and implementation of emerging metals processing technologies. The scope of work can also extend to other types of materials. MPLUS has four primary user centers: (1) Processing--casting, powder metallurgy, deformation processing (including extrusion, forging, rolling), melting, thermomechanical processing, and high-density infrared processing; (2) Joining--welding, monitoring and control, solidification, brazing, and bonding; (3) Characterization--corrosion, mechanical properties, fracture mechanics, microstructure, nondestructive examination, computer-controlled dilatometry, and emissivity; and (4) Materials/Process Modeling--mathematical design and analyses, high-performance computing, process modeling, solidification/deformation, microstructure evolution, thermodynamic and kinetic, and materials databases A fully integrated approach provides researchers with unique opportunities to address technologically related issues to solve metals processing problems and probe new technologies. Access is also available to 16 additional Oak Ridge National Laboratory (ORNL) user facilities ranging from state-of-the-art materials characterization capabilities, and high-performance computing to manufacturing technologies. MPLUS can be accessed through a standardized user-submitted proposal and a user agreement. Nonproprietary (open) or proprietary proposals can be submitted. For open research and development, access to capabilities is provided free of charge

  18. SVC-based Multi-user Streamloading for Wireless Networks

    OpenAIRE

    Hosseini, S. Amir; Lu, Zheng; de Veciana, Gustavo; Panwar, Shivendra S.

    2015-01-01

    In this paper, we present an approach for joint rate allocation and quality selection for a novel video streaming scheme called streamloading. Streamloading is a recently developed method for delivering high quality video without violating copyright enforced restrictions on content access for video streaming. In regular streaming services, content providers restrict the amount of viewable video that users can download prior to playback. This approach can cause inferior user experience due to ...

  19. Robust Query Processing for Personalized Information Access on the Semantic Web

    DEFF Research Database (Denmark)

    Dolog, Peter; Stuckenschmidt, Heiner; Wache, Holger

    and user preferences. We describe a framework for information access that combines query refinement and relaxation in order to provide robust, personalized access to heterogeneous RDF data as well as an implementation in terms of rewriting rules and explain its application in the context of e-learning...

  20. Lexical-Access Ability and Cognitive Predictors of Speech Recognition in Noise in Adult Cochlear Implant Users.

    Science.gov (United States)

    Kaandorp, Marre W; Smits, Cas; Merkus, Paul; Festen, Joost M; Goverts, S Theo

    2017-01-01

    Not all of the variance in speech-recognition performance of cochlear implant (CI) users can be explained by biographic and auditory factors. In normal-hearing listeners, linguistic and cognitive factors determine most of speech-in-noise performance. The current study explored specifically the influence of visually measured lexical-access ability compared with other cognitive factors on speech recognition of 24 postlingually deafened CI users. Speech-recognition performance was measured with monosyllables in quiet (consonant-vowel-consonant [CVC]), sentences-in-noise (SIN), and digit-triplets in noise (DIN). In addition to a composite variable of lexical-access ability (LA), measured with a lexical-decision test (LDT) and word-naming task, vocabulary size, working-memory capacity (Reading Span test [RSpan]), and a visual analogue of the SIN test (text reception threshold test) were measured. The DIN test was used to correct for auditory factors in SIN thresholds by taking the difference between SIN and DIN: SRT diff . Correlation analyses revealed that duration of hearing loss (dHL) was related to SIN thresholds. Better working-memory capacity was related to SIN and SRT diff scores. LDT reaction time was positively correlated with SRT diff scores. No significant relationships were found for CVC or DIN scores with the predictor variables. Regression analyses showed that together with dHL, RSpan explained 55% of the variance in SIN thresholds. When controlling for auditory performance, LA, LDT, and RSpan separately explained, together with dHL, respectively 37%, 36%, and 46% of the variance in SRT diff outcome. The results suggest that poor verbal working-memory capacity and to a lesser extent poor lexical-access ability limit speech-recognition ability in listeners with a CI.

  1. Accessibility and inclusion informational

    Directory of Open Access Journals (Sweden)

    Mônica Sena de Souza

    2013-06-01

    Full Text Available Introduction: Discusses the role of information professionals in meeting the informational demands of people with disabilities in the information society. The librarian is crucial for the effectiveness and success in the informational inclusion of people with disabilities, considering also continuing education for their professional qualification.Objective: To provide reflections on the role of the librarian in serving users with disabilities, highlighting the need for improvement in information units, identified in the scientific literature with regard to accessibility.Methodology: Literature search, based on a review of literature in books and scientific papers, highlighting the main authors: Adams (2000, Mazzoni (2001 and Sassaki (1997, 2002, 2005.Results: The lack of informational access for people with disabilities hampers their social and political participation, hence, reduces its condition of citizenship.Conclusion: The librarian responsible for seeking continuing education, greater involvement in the events of the area and the constant search for job training, which will reflect on the best service the information needs of users with disabilities.

  2. 34 CFR 364.37 - What access to records must be provided?

    Science.gov (United States)

    2010-07-01

    ... SPECIAL EDUCATION AND REHABILITATIVE SERVICES, DEPARTMENT OF EDUCATION STATE INDEPENDENT LIVING SERVICES... Requirements? § 364.37 What access to records must be provided? For the purpose of conducting audits, examinations, and compliance reviews, the State plan must include satisfactory assurances that all recipients...

  3. Office of Science User Facilities Summary Report, Fiscal Year 2015

    Energy Technology Data Exchange (ETDEWEB)

    None

    2015-01-01

    The U.S. Department of Energy Office of Science provides the Nation’s researchers with worldclass scientific user facilities to propel the U.S. to the forefront of science and innovation. A user facility is a federally sponsored research facility available for external use to advance scientific or technical knowledge under the following conditions: open, accessible, free, collaborative, competitive, and unique.

  4. Does the edge effect impact on the measure of spatial accessibility to healthcare providers?

    Science.gov (United States)

    Gao, Fei; Kihal, Wahida; Le Meur, Nolwenn; Souris, Marc; Deguen, Séverine

    2017-12-11

    Spatial accessibility indices are increasingly applied when investigating inequalities in health. Although most studies are making mentions of potential errors caused by the edge effect, many acknowledge having neglected to consider this concern by establishing spatial analyses within a finite region, settling for hypothesizing that accessibility to facilities will be under-reported. Our study seeks to assess the effect of edge on the accuracy of defining healthcare provider access by comparing healthcare provider accessibility accounting or not for the edge effect, in a real-world application. This study was carried out in the department of Nord, France. The statistical unit we use is the French census block known as 'IRIS' (Ilot Regroupé pour l'Information Statistique), defined by the National Institute of Statistics and Economic Studies. The geographical accessibility indicator used is the "Index of Spatial Accessibility" (ISA), based on the E2SFCA algorithm. We calculated ISA for the pregnant women population by selecting three types of healthcare providers: general practitioners, gynecologists and midwives. We compared ISA variation when accounting or not edge effect in urban and rural zones. The GIS method was then employed to determine global and local autocorrelation. Lastly, we compared the relationship between socioeconomic distress index and ISA, when accounting or not for the edge effect, to fully evaluate its impact. The results revealed that on average ISA when offer and demand beyond the boundary were included is slightly below ISA when not accounting for the edge effect, and we found that the IRIS value was more likely to deteriorate than improve. Moreover, edge effect impact can vary widely by health provider type. There is greater variability within the rural IRIS group than within the urban IRIS group. We found a positive correlation between socioeconomic distress variables and composite ISA. Spatial analysis results (such as Moran's spatial

  5. Accessibility observations of visually impaired users using the South African National Accessibility Portal

    CSIR Research Space (South Africa)

    Coetzee, L

    2008-05-01

    Full Text Available . Improving web site accessibility has proven to be a challenging task with a myriad of standards, accessibility testing tools and few technical guides for implementation. This paper presents the South African National Accessibility Portal (NAP), which is used...

  6. INTERMARS: User-controlled international management system

    Science.gov (United States)

    Schmitt, Harrison H.

    1986-01-01

    Existing international space law as well as the best interest of all nations are consistent with the establishment of a user-based international organization, herein called INTERMARS. INTERMARS would provide access to facilities and services at a Martian base which would be of high functional potential, quality, safety, and reliability. These opportunities would be available on an open and nondiscriminatory basis to all peaceful users and investors. INTERMARS is a model organization concept tailored to provide cooperative international management of a Martian base for the benefit of its members, users, and investors. Most importantly, INTERMARS would provide such management through a sharing of both sovereignty and opportunity rather then unilateral control by any one nation or set of competing nations. Through an Assembly of Parties, a Board of Governors, a Board of Users and Investors, and a Director General, INTERMARS would meet its primary goal as it would be in the self-interest of all members, users, and investors to do so. The internal structure and philosophy of INTERMARS would provide not only for all participants to have representation in decisions affecting its activities, but also would insure effective and responsive management. Surely this is the precedent wished for, to establish for mankind at the now not-so-distant shores of the new ocean of space.

  7. Graphical User Interfaces and Library Systems: End-User Reactions.

    Science.gov (United States)

    Zorn, Margaret; Marshall, Lucy

    1995-01-01

    Describes a study by Parke-Davis Pharmaceutical Research Library to determine user satisfaction with the graphical user interface-based (GUI) Dynix Marquis compared with the text-based Dynix Classic Online Public Access Catalog (OPAC). Results show that the GUI-based OPAC was preferred by endusers over the text-based OPAC. (eight references) (DGM)

  8. The STEP database through the end-users eyes--USABILITY STUDY.

    Science.gov (United States)

    Salunke, Smita; Tuleu, Catherine

    2015-08-15

    The user-designed database of Safety and Toxicity of Excipients for Paediatrics ("STEP") is created to address the shared need of drug development community to access the relevant information of excipients effortlessly. Usability testing was performed to validate if the database satisfies the need of the end-users. Evaluation framework was developed to assess the usability. The participants performed scenario based tasks and provided feedback and post-session usability ratings. Failure Mode Effect Analysis (FMEA) was performed to prioritize the problems and improvements to the STEP database design and functionalities. The study revealed several design vulnerabilities. Tasks such as limiting the results, running complex queries, location of data and registering to access the database were challenging. The three critical attributes identified to have impact on the usability of the STEP database included (1) content and presentation (2) the navigation and search features (3) potential end-users. Evaluation framework proved to be an effective method for evaluating database effectiveness and user satisfaction. This study provides strong initial support for the usability of the STEP database. Recommendations would be incorporated into the refinement of the database to improve its usability and increase user participation towards the advancement of the database. Copyright © 2015 Elsevier B.V. All rights reserved.

  9. KML-Based Access and Visualization of High Resolution LiDAR Topography

    Science.gov (United States)

    Crosby, C. J.; Blair, J. L.; Nandigam, V.; Memon, A.; Baru, C.; Arrowsmith, J. R.

    2008-12-01

    Over the past decade, there has been dramatic growth in the acquisition of LiDAR (Light Detection And Ranging) high-resolution topographic data for earth science studies. Capable of providing digital elevation models (DEMs) more than an order of magnitude higher resolution than those currently available, LiDAR data allow earth scientists to study the processes that contribute to landscape evolution at resolutions not previously possible yet essential for their appropriate representation. These datasets also have significant implications for earth science education and outreach because they provide an accurate representation of landforms and geologic hazards. Unfortunately, the massive volume of data produced by LiDAR mapping technology can be a barrier to their use. To make these data available to a larger user community, we have been exploring the use of Keyhole Markup Language (KML) and Google Earth to provide access to LiDAR data products and visualizations. LiDAR digital elevation models are typically delivered in a tiled format that lends itself well to a KML-based distribution system. For LiDAR datasets hosted in the GEON OpenTopography Portal (www.opentopography.org) we have developed KML files that show the extent of available LiDAR DEMs and provide direct access to the data products. Users interact with these KML files to explore the extent of the available data and are able to select DEMs that correspond to their area of interest. Selection of a tile loads a download that the user can then save locally for analysis in their software of choice. The GEON topography system also has tools available that allow users to generate custom DEMs from LiDAR point cloud data. This system is powerful because it enables users to access massive volumes of raw LiDAR data and to produce DEM products that are optimized to their science applications. We have developed a web service that converts the custom DEM models produced by the system to a hillshade that is delivered to

  10. CONTEXT BASED ANDROID APPLICATIONADMINISTRATIVE ACCESS CONTROL (CBAA–AAC FOR SMART PHONES

    Directory of Open Access Journals (Sweden)

    S. Sharavanan

    2016-07-01

    Full Text Available Android applications in smart phones are generally towards provide greater flexibility and convince for users. Considering the fact that the Android applications are having privilege to access data and resources in mobile after it gets installed (one time permission provided by end user on the time installation, these application may also lead to issues in security for the user data as well as issues relate smart phone with peripheral environment. A practical example for an issue which relates smart phone with peripheral environment can be even an Android smart phone application of a college student use camera resource to capture photos of R&D cell and transfer without user or organization permission. The security of the organization and user should be prevented by providing an adoptable solution. The proposed concept of CBAA-AAC (Context Based Android Application Administrative Access Control is used to control the privileges of any Android application over a corresponding longitude and latitude by the organization administrator. In this way, administrator is able to block malicious application of every individual smart phone which can have activity towards utilizing services and resources that may affect the security of the organization, such an move is must for assuring security of any organization and educational institutions while they allow users to “bring their own smart phones/mobile devices” into the campus.

  11. 9 CFR 130.19 - User fees for other veterinary diagnostic services or materials provided at NVSL (excluding FADDL).

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false User fees for other veterinary... User fees for other veterinary diagnostic services or materials provided at NVSL (excluding FADDL). (a) User fees for other veterinary diagnostic services or materials available from NVSL (excluding FADDL...

  12. Reference and access innovative practices for archives and special collections

    CERN Document Server

    Theimer, Kate

    2014-01-01

    Reference and Access: Innovative Practices for Archives and Special Collections explores how archives of different sizes and types are increasing their effectiveness in serving the public and meeting internal needs. The book features twelve case studies that demonstrate new ways to interact with users to answer their questions, provide access to materials, support patrons in the research room, and manage reference and access processes. This volume will be useful to those working in archives and special collections as well as other cultural heritage organizations, and provides ideas ranging fro

  13. Way to increase the user access at the LCLS baseline

    Energy Technology Data Exchange (ETDEWEB)

    Geloni, Gianluca [European XFEL GmbH, Hamburg; Kocharyan, Vitali; Saldin, Evgeni [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2010-10-15

    Although the LCLS photon beam is meant for a single user, the baseline undulator is long enough to serve two users simultaneously. To this end, we propose a setup composed of two simple elements: an X-ray mirror pair for X-ray beam deflection, and a short (4 m-long) magnetic chicane, which creates an offset for mirror pair installation in the middle of the baseline undulator. The insertable mirror pair can be used for spatial separation of the X-ray beams generated in the first and in the second half of the baseline undulator. The method of deactivating one half and activating another half of the undulator is based on the rapid switching of the FEL amplification process. As proposed elsewhere, using a kicker installed upstream of the LCLS baseline undulator and an already existing corrector in the first half of the undulator, it is possible to rapidly switch the X-ray beam from one user to another, thus providing two active beamlines at any time. We present simulation results dealing with the LCLS baseline, and show that it is possible to generate two saturated SASE X-ray beams in the whole 0.8-8 keV photon energy range in the same baseline undulator. These can be exploited to serve two users. Implementation of the proposed technique does not perturb the baseline mode of operation of the LCLS undulator. Moreover, the magnetic chicane setup is very flexible, and can be used as a self-seeding setup too. We present simulation results for the LCLS baseline undulator with SHAB (second harmonic afterburner) and show that one can produce monochromatic radiation at the 2nd harmonic as well as at the 1st. We describe an efficient way for obtaining multi-user operation at the LCLS hard X-ray FEL. To this end, a photon beam distribution system based on the use of crystals in the Bragg reflection geometry is proposed. The reflectivity of crystal deflectors can be switched fast enough by flipping the crystals with piezoelectric devices similar to those for X-ray phase retarders

  14. A Framework for Federated Two-Factor Authentication Enabling Cost-Effective Secure Access to Distributed Cyberinfrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ezell, Matthew A [ORNL; Rogers, Gary L [University of Tennessee, Knoxville (UTK); Peterson, Gregory D. [University of Tennessee, Knoxville (UTK)

    2012-01-01

    As cyber attacks become increasingly sophisticated, the security measures used to mitigate the risks must also increase in sophistication. One time password (OTP) systems provide strong authentication because security credentials are not reusable, thus thwarting credential replay attacks. The credential changes regularly, making brute-force attacks significantly more difficult. In high performance computing, end users may require access to resources housed at several different service provider locations. The ability to share a strong token between multiple computing resources reduces cost and complexity. The National Science Foundation (NSF) Extreme Science and Engineering Discovery Environment (XSEDE) provides access to digital resources, including supercomputers, data resources, and software tools. XSEDE will offer centralized strong authentication for services amongst service providers that leverage their own user databases and security profiles. This work implements a scalable framework built on standards to provide federated secure access to distributed cyberinfrastructure.

  15. A novel clustering and supervising users' profiles method

    Institute of Scientific and Technical Information of China (English)

    Zhu Mingfu; Zhang Hongbin; Song Fangyun

    2005-01-01

    To better understand different users' accessing intentions, a novel clustering and supervising method based on accessing path is presented. This method divides users' interest space to express the distribution of users' interests, and directly to instruct the constructing process of web pages indexing for advanced performance.

  16. Gromita: a fully integrated graphical user interface to gromacs 4.

    Science.gov (United States)

    Sellis, Diamantis; Vlachakis, Dimitrios; Vlassi, Metaxia

    2009-09-07

    Gromita is a fully integrated and efficient graphical user interface (GUI) to the recently updated molecular dynamics suite Gromacs, version 4. Gromita is a cross-platform, perl/tcl-tk based, interactive front end designed to break the command line barrier and introduce a new user-friendly environment to run molecular dynamics simulations through Gromacs. Our GUI features a novel workflow interface that guides the user through each logical step of the molecular dynamics setup process, making it accessible to both advanced and novice users. This tool provides a seamless interface to the Gromacs package, while providing enhanced functionality by speeding up and simplifying the task of setting up molecular dynamics simulations of biological systems. Gromita can be freely downloaded from http://bio.demokritos.gr/gromita/.

  17. Hanford Environmental Information System (HEIS). Volume 1, User`s guide

    Energy Technology Data Exchange (ETDEWEB)

    1994-01-14

    The Hanford Environmental Information System (HEIS) is a consolidated set of automated resources that effectively manage the data gathered during environmental monitoring and restoration of the Hanford Site. HEIS includes an integrated database that provides consistent and current data to all users and promotes sharing of data by the entire user community. HEIS is an information system with an inclusive database. Although the database is the nucleus of the system, HEIS also provides user access software: query-by-form data entry, extraction, and browsing facilities; menu-driven reporting facilities; an ad hoc query facility; and a geographic information system (GIS). These features, with the exception of the GIS, are described in this manual set. Because HEIS contains data from the entire Hanford Site, many varieties of data are included and have.been divided into subject areas. Related subject areas comprise several volumes of the manual set. The manual set includes a data dictionary that lists all of the fields in the HEIS database, with their definitions and a cross reference of their locations in the database; definitions of data qualifiers for analytical results; and a mapping between the HEIS software functions and the keyboard keys for each of the supported terminals or terminal emulators.

  18. Performance analysis of quantum access network using code division multiple access model

    International Nuclear Information System (INIS)

    Hu Linxi; Yang Can; He Guangqiang

    2017-01-01

    A quantum access network has been implemented by frequency division multiple access and time division multiple access, while code division multiple access is limited for its difficulty to realize the orthogonality of the code. Recently, the chaotic phase shifters were proposed to guarantee the orthogonality by different chaotic signals and spread the spectral content of the quantum states. In this letter, we propose to implement the code division multiple access quantum network by using chaotic phase shifters and synchronization. Due to the orthogonality of the different chaotic phase shifter, every pair of users can faithfully transmit quantum information through a common channel and have little crosstalk between different users. Meanwhile, the broadband spectra of chaotic signals efficiently help the quantum states to defend against channel loss and noise. (paper)

  19. Selecting the Best Mobile Information Service with Natural Language User Input

    Science.gov (United States)

    Feng, Qiangze; Qi, Hongwei; Fukushima, Toshikazu

    Information services accessed via mobile phones provide information directly relevant to subscribers’ daily lives and are an area of dynamic market growth worldwide. Although many information services are currently offered by mobile operators, many of the existing solutions require a unique gateway for each service, and it is inconvenient for users to have to remember a large number of such gateways. Furthermore, the Short Message Service (SMS) is very popular in China and Chinese users would prefer to access these services in natural language via SMS. This chapter describes a Natural Language Based Service Selection System (NL3S) for use with a large number of mobile information services. The system can accept user queries in natural language and navigate it to the required service. Since it is difficult for existing methods to achieve high accuracy and high coverage and anticipate which other services a user might want to query, the NL3S is developed based on a Multi-service Ontology (MO) and Multi-service Query Language (MQL). The MO and MQL provide semantic and linguistic knowledge, respectively, to facilitate service selection for a user query and to provide adaptive service recommendations. Experiments show that the NL3S can achieve 75-95% accuracies and 85-95% satisfactions for processing various styles of natural language queries. A trial involving navigation of 30 different mobile services shows that the NL3S can provide a viable commercial solution for mobile operators.

  20. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.

    Science.gov (United States)

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.

  1. Access to Microsoft Windows 95 for Persons with Low Vision: An Overview.

    Science.gov (United States)

    Shragai, Y.

    1995-01-01

    This article examines Windows 95, pointing out differences and improvements from Windows 3.1 for persons with low vision. Windows 95 is seen as providing substantially greater accessibility than Windows 3.1, though the graphical user interface may still pose serious problems for some users with low vision. (DB)

  2. A PRELIMINARY STUDY FOR DEVELOPING ACCESSIBLE MOOC SERVICES

    Directory of Open Access Journals (Sweden)

    Francisco Iniesto

    2016-11-01

    Full Text Available The flexibility of the MOOC service allows students to learn at their own time, place and pace, enhancing continuous communication and interaction between all participants in knowledge and community building. This model especially benefits people with disabilities, which can improve therefore their level of employability and social inclusion, reaching a better quality of life. Unfortunately the access to MOOC platforms present severe barriers: there is a lack of accessibility on the learning resources, the communicating tools and personalized user interfaces. All these issues add extra difficulties such as the need to develop specific digital or even social skills for students with functional diversity. In this context, MOOCs are leading a revolutionary computer and mobile-based scenario along with social technologies that will emerge new kinds of learning applications that enhance communication and collaboration processes. For that reason, this paper describes the need for designing an information model and related specifications to support a new strategy for delivering accessible MOOC courses to learners with special needs, in terms of their preferences and context of use based on a particular application profile. This user profile’s design is based on standard metadata schemas, data that provides information about other data, regarding the achievement of accessibility from content to user preferences.

  3. CAPTCHA: Impact on User Experience of Users with Learning Disabilities

    Directory of Open Access Journals (Sweden)

    Ruti Gafni

    2016-12-01

    Full Text Available CAPTCHA is one of the most common solutions to check if the user trying to enter a Website is a real person or an automated piece of software. This challenge-response test, implemented in many Internet Websites, emphasizes the gaps between accessibility and security on the Internet, as it poses an obstacle for the learning-impaired in the reading and comprehension of what is presented in the test. Various types of CAPTCHA tests have been developed in order to address accessibility and security issues. The objective of this study is to investigate how the differences between various CAPTCHA tests affect user experience among populations with and without learning disabilities. A questionnaire accompanied by experiencing five different tests was administered to 212 users, 60 of them with learning disabilities. Response rates for each test and levels of success were collected automatically. Findings suggest that users with learning disabilities have more difficulties in solving the tests, especially those with distorted texts, have more negative attitudes towards the CAPTCHA tests, but the response time has no statistical difference from users without learning disabilities. These insights can help to develop and implement solutions suitable for many users and especially for population with learning disabilities.

  4. Unidata's Vision for Providing Comprehensive and End-to-end Data Services

    Science.gov (United States)

    Ramamurthy, M. K.

    2009-05-01

    This paper presents Unidata's vision for providing comprehensive, well-integrated, and end-to-end data services for the geosciences. These include an array of functions for collecting, finding, and accessing data; data management tools for generating, cataloging, and exchanging metadata; and submitting or publishing, sharing, analyzing, visualizing, and integrating data. When this vision is realized, users no matter where they are or how they are connected to the Internetwill be able to find and access a plethora of geosciences data and use Unidata-provided tools and services both productively and creatively in their research and education. What that vision means for the Unidata community is elucidated by drawing a simple analogy. Most of users are familiar with Amazon and eBay e-commerce sites and content sharing sites like YouTube and Flickr. On the eBay marketplace, people can sell practically anything at any time and buyers can share their experience of purchasing a product or the reputation of a seller. Likewise, at Amazon, thousands of merchants sell their goods and millions of customers not only buy those goods, but provide a review or opinion of the products they buy and share their experiences as purchasers. Similarly, YouTube and Flickr are sites tailored to video- and photo-sharing, respectively, where users can upload their own content and share it with millions of other users, including family and friends. What all these sites, together with social-networking applications like MySpace and Facebook, have enabled is a sense of a virtual community in which users can search and browse products or content, comment and rate those products from anywhere, at any time, and via any Internet- enabled device like an iPhone, laptop, or a desktop computer. In essence, these enterprises have fundamentally altered people's buying modes and behavior toward purchases. Unidata believes that similar approaches, appropriately tailored to meet the needs of the scientific

  5. Web Accessibility and Guidelines

    Science.gov (United States)

    Harper, Simon; Yesilada, Yeliz

    Access to, and movement around, complex online environments, of which the World Wide Web (Web) is the most popular example, has long been considered an important and major issue in the Web design and usability field. The commonly used slang phrase ‘surfing the Web’ implies rapid and free access, pointing to its importance among designers and users alike. It has also been long established that this potentially complex and difficult access is further complicated, and becomes neither rapid nor free, if the user is disabled. There are millions of people who have disabilities that affect their use of the Web. Web accessibility aims to help these people to perceive, understand, navigate, and interact with, as well as contribute to, the Web, and thereby the society in general. This accessibility is, in part, facilitated by the Web Content Accessibility Guidelines (WCAG) currently moving from version one to two. These guidelines are intended to encourage designers to make sure their sites conform to specifications, and in that conformance enable the assistive technologies of disabled users to better interact with the page content. In this way, it was hoped that accessibility could be supported. While this is in part true, guidelines do not solve all problems and the new WCAG version two guidelines are surrounded by controversy and intrigue. This chapter aims to establish the published literature related to Web accessibility and Web accessibility guidelines, and discuss limitations of the current guidelines and future directions.

  6. x509-free access to WLCG resources

    Science.gov (United States)

    Short, H.; Manzi, A.; De Notaris, V.; Keeble, O.; Kiryanov, A.; Mikkonen, H.; Tedesco, P.; Wartel, R.

    2017-10-01

    Access to WLCG resources is authenticated using an x509 and PKI infrastructure. Even though HEP users have always been exposed to certificates directly, the development of modern Web Applications by the LHC experiments calls for simplified authentication processes keeping the underlying software unmodified. In this work we will show a solution with the goal of providing access to WLCG resources using the user’s home organisations credentials, without the need for user-acquired x509 certificates. In particular, we focus on identity providers within eduGAIN, which interconnects research and education organisations worldwide, and enables the trustworthy exchange of identity-related information. eduGAIN has been integrated at CERN in the SSO infrastructure so that users can authenticate without the need of a CERN account. This solution achieves x509-free access to Grid resources with the help of two services: STS and an online CA. The STS (Security Token Service) allows credential translation from the SAML2 format used by Identity Federations to the VOMS-enabled x509 used by most of the Grid. The IOTA CA (Identifier-Only Trust Assurance Certification Authority) is responsible for the automatic issuing of short-lived x509 certificates. The IOTA CA deployed at CERN has been accepted by EUGridPMA as the CERN LCG IOTA CA, included in the IGTF trust anchor distribution and installed by the sites in WLCG. We will also describe the first pilot projects which are integrating the solution.

  7. Secret Shoppers Find Access To Providers And Network Accuracy Lacking For Those In Marketplace And Commercial Plans.

    Science.gov (United States)

    Haeder, Simon F; Weimer, David L; Mukamel, Dana B

    2016-07-01

    The adequacy of provider networks for plans sold through insurance Marketplaces established under the Affordable Care Act has received much scrutiny recently. Various studies have established that networks are generally narrow. To learn more about network adequacy and access to care, we investigated two questions. First, no matter the nominal size of a network, can patients gain access to primary care services from providers of their choice in a timely manner? Second, how does access compare to plans sold outside insurance Marketplaces? We conducted a "secret shopper" survey of 743 primary care providers from five of California's nineteen insurance Marketplace pricing regions in the summer of 2015. Our findings indicate that obtaining access to primary care providers was generally equally challenging both inside and outside insurance Marketplaces. In less than 30 percent of cases were consumers able to schedule an appointment with an initially selected physician provider. Information about provider networks was often inaccurate. Problems accessing services for patients with acute conditions were particularly troubling. Effectively addressing issues of network adequacy requires more accurate provider information. Project HOPE—The People-to-People Health Foundation, Inc.

  8. The IRIS Education and Outreach Program: Providing access to data and equipment for educational and public use

    Science.gov (United States)

    Taber, J.; Toigo, M.; Bravo, T. K.; Hubenthal, M.; McQuillan, P. J.; Welti, R.

    2009-12-01

    The IRIS Education and Outreach Program has been an integral part of IRIS for the past 10 years and during that time has worked to advance awareness and understanding of seismology and earth science while inspiring careers in geophysics. The focus on seismology and the use of seismic data has allowed the IRIS E&O program to develop and disseminate a unique suite of products and services for a wide range of audiences. One result of that effort has been increased access to the IRIS Data Management System by non-specialist audiences and simplified use of location and waveform data. The Seismic Monitor was one of the first Web-based tools for observing near-real-time seismicity. It continues to be the most popular IRIS web page, and thus it presents aspects of seismology to a very wide audience. For individuals interested in more detailed ground motion information, waveforms can be easily viewed using the Rapid Earthquake Viewer, developed by the University of South Carolina in collaboration with IRIS E&O. The Seismographs in Schools program gives schools the opportunity to apply for a low-cost educational seismograph and to receive training for its use in the classroom. To provide better service to the community, a new Seismographs in Schools website was developed in the past year with enhanced functions to help teachers improve their teaching of seismology. The site encourages schools to make use of seismic data and communicate with other educational seismology users throughout the world. Users can view near-real-time displays of other participating schools, upload and download data, and use the “find a teacher” tool to contact nearby schools that also may be operating seismographs. In order to promote and maintain program participation and communication, the site features a discussion forum to encourage and support the growing global community of educational seismograph users. Any data that is submitted to the Seismographs in Schools Website is also accessible

  9. Scientific user requirements for a herbarium data portal.

    Science.gov (United States)

    Vissers, Jorick; den Bosch, Frederik Van; Bogaerts, Ann; Cocquyt, Christine; Degreef, Jérôme; Diagre, Denis; de Haan, Myriam; Smedt, Sofie De; Henry Engledow; Ertz, Damien; Fabri, Régine; Godefroid, Sandrine; Nicole Hanquart; Mergen, Patricia; Ronse, Anne; Sosef, Marc; Stévart, Tariq; Stoffelen, Piet; Vanderhoeven, Sonia; Groom, Quentin

    2017-01-01

    The digitization of herbaria and their online access will greatly facilitate access to plant collections around the world. This will improve the efficiency of taxonomy and help reduce inequalities between scientists. The Botanic Garden Meise, Belgium, is currently digitizing 1.2 million specimens including label data. In this paper we describe the user requirements analysis conducted for a new herbarium web portal. The aim was to identify the required functionality, but also to assist in the prioritization of software development and data acquisition. The Garden conducted the analysis in cooperation with Clockwork, the digital engagement agency of Ordina. Using a series of interactive interviews, potential users were consulted from universities, research institutions, science-policy initiatives and the Botanic Garden Meise. Although digital herbarium data have many potential stakeholders, we focused on the needs of taxonomists, ecologists and historians, who are currently the primary users of the Meise herbarium data portal. The three categories of user have similar needs, all wanted as much specimen data as possible, and for those data, to be interlinked with other digital resources within and outside the Garden. Many users wanted an interactive system that they could comment on, or correct online, particularly if such corrections and annotations could be used to rank the reliability of data. Many requirements depend on the quality of the digitized data associated with each specimen. The essential data fields are the taxonomic name; geographic location; country; collection date; collector name and collection number. Also all researchers valued linkage between biodiversity literature and specimens. Nevertheless, to verify digitized data the researchers still want access to high quality images, even if fully transcribed label information is provided. The only major point of disagreement is the level of access users should have and what they should be allowed to do

  10. User Authentication in Smartphones for Telehealth

    Directory of Open Access Journals (Sweden)

    Katherine A. Smith

    2017-11-01

    Full Text Available Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity.  When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed.  Keywords: Authentication, Biometrics, HIPAA, Mobile security, Telehealth

  11. Remote direct memory access over datagrams

    Science.gov (United States)

    Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

    2014-12-02

    A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

  12. Enterprise Dynamic Access Control (EDAC)

    National Research Council Canada - National Science Library

    Fernandez, Richard

    2005-01-01

    .... Resources can represent software applications, web services and even facility access. An effective access control model should be capable of evaluating resource access based on user characteristics and environmentals...

  13. Content sensitivity based access control framework for Hadoop

    Directory of Open Access Journals (Sweden)

    T.K. Ashwin Kumar

    2017-11-01

    Full Text Available Big data technologies have seen tremendous growth in recent years. They are widely used in both industry and academia. In spite of such exponential growth, these technologies lack adequate measures to protect data from misuse/abuse. Corporations that collect data from multiple sources are at risk of liabilities due to the exposure of sensitive information. In the current implementation of Hadoop, only file-level access control is feasible. Providing users with the ability to access data based on the attributes in a dataset or the user’s role is complicated because of the sheer volume and multiple formats (structured, unstructured and semi-structured of data. In this paper, we propose an access control framework, which enforces access control policies dynamically based on the sensitivity of the data. This framework enforces access control policies by harnessing the data context, usage patterns and information sensitivity. Information sensitivity changes over time with the addition and removal of datasets, which can lead to modifications in access control decisions. The proposed framework accommodates these changes. The proposed framework is automated to a large extent as the data itself determines the sensitivity with minimal user intervention. Our experimental results show that the proposed framework is capable of enforcing access control policies on non-multimedia datasets with minimal overhead.

  14. Interoperable and accessible census and survey data from IPUMS.

    Science.gov (United States)

    Kugler, Tracy A; Fitch, Catherine A

    2018-02-27

    The first version of the Integrated Public Use Microdata Series (IPUMS) was released to users in 1993, and since that time IPUMS has come to stand for interoperable and accessible census and survey data. Initially created to harmonize U.S. census microdata over time, IPUMS now includes microdata from the U.S. and international censuses and from surveys on health, employment, and other topics. IPUMS also provides geo-spatial data, aggregate population data, and environmental data. IPUMS supports ten data products, each disseminating an integrated data collection with a set of tools that make complex data easy to find, access, and use. Key features are record-level integration to create interoperable datasets, user-friendly interfaces, and comprehensive metadata and documentation. The IPUMS philosophy aligns closely with the FAIR principles of findability, accessibility, interoperability, and re-usability. IPUMS data have catalyzed knowledge generation across a wide range of social science and other disciplines, as evidenced by the large volume of publications and other products created by the vast IPUMS user community.

  15. StarTrax --- The Next Generation User Interface

    Science.gov (United States)

    Richmond, Alan; White, Nick

    StarTrax is a software package to be distributed to end users for installation on their local computing infrastructure. It will provide access to many services of the HEASARC, i.e. bulletins, catalogs, proposal and analysis tools, initially for the ROSAT MIPS (Mission Information and Planning System), later for the Next Generation Browse. A user activating the GUI will reach all HEASARC capabilities through a uniform view of the system, independent of the local computing environment and of the networking method of accessing StarTrax. Use it if you prefer the point-and-click metaphor of modern GUI technology, to the classical command-line interfaces (CLI). Notable strengths include: easy to use; excellent portability; very robust server support; feedback button on every dialog; painstakingly crafted User Guide. It is designed to support a large number of input devices including terminals, workstations and personal computers. XVT's Portability Toolkit is used to build the GUI in C/C++ to run on: OSF/Motif (UNIX or VMS), OPEN LOOK (UNIX), or Macintosh, or MS-Windows (DOS), or character systems.

  16. Choice in maternity care: associations with unit supply, geographic accessibility and user characteristics

    Science.gov (United States)

    2012-01-01

    and second maternity unit is greater than 30 km can provide a simple measure of choice to complement indicators of geographic accessibility in evaluations of the impact of maternity unit closures. PMID:22905951

  17. Novel Virtual User Models of Mild Cognitive Impairment for Simulating Dementia

    Directory of Open Access Journals (Sweden)

    Sofia Segkouli

    2015-01-01

    Full Text Available Virtual user modeling research has attempted to address critical issues of human-computer interaction (HCI such as usability and utility through a large number of analytic, usability-oriented approaches as cognitive models in order to provide users with experiences fitting to their specific needs. However, there is demand for more specific modules embodied in cognitive architecture that will detect abnormal cognitive decline across new synthetic task environments. Also, accessibility evaluation of graphical user interfaces (GUIs requires considerable effort for enhancing ICT products accessibility for older adults. The main aim of this study is to develop and test virtual user models (VUM simulating mild cognitive impairment (MCI through novel specific modules, embodied at cognitive models and defined by estimations of cognitive parameters. Well-established MCI detection tests assessed users’ cognition, elaborated their ability to perform multitasks, and monitored the performance of infotainment related tasks to provide more accurate simulation results on existing conceptual frameworks and enhanced predictive validity in interfaces’ design supported by increased tasks’ complexity to capture a more detailed profile of users’ capabilities and limitations. The final outcome is a more robust cognitive prediction model, accurately fitted to human data to be used for more reliable interfaces’ evaluation through simulation on the basis of virtual models of MCI users.

  18. Health care access and quality for persons with disability: Patient and provider recommendations.

    Science.gov (United States)

    McClintock, Heather F; Kurichi, Jibby E; Barg, Frances K; Krueger, Alice; Colletti, Patrice M; Wearing, Krizia A; Bogner, Hillary R

    2018-07-01

    Significant disparities in health care access and quality persist between persons with disabilities (PWD) and persons without disabilities (PWOD). Little research has examined recommendations of patients and providers to improve health care for PWD. We sought to explore patient and health care provider recommendations to improve health care access and quality for PWD through focus groups in the physical world in a community center and in the virtual world in an online community. In all, 17 PWD, 4 PWOD, and 6 health care providers participated in 1 of 5 focus groups. Focus groups were conducted in the virtual world in Second Life ® with Virtual Ability, an online community, and in the physical world at Agape Community Center in Milwaukee, WI. Focus group data were analyzed using a grounded theory methodology. Themes that emerged in focus groups among PWD and PWOD as well as health care providers to improve health care access and quality for PWD were: promoting advocacy, increasing awareness and knowledge, improving communication, addressing assumptions, as well as modifying and creating policy. Many participants discussed political empowerment and engagement as central to health care reform. Both PWD and PWOD as well as health care providers identified common themes potentially important for improving health care for PWD. Patient and health care provider recommendations highlight a need for modification of current paradigms, practices, and approaches to improve the quality of health care provision for PWD. Participants emphasized the need for greater advocacy and political engagement. Copyright © 2018 Elsevier Inc. All rights reserved.

  19. A Systematic Scheme for Multiple Access in Ethernet Passive Optical Access Networks

    Science.gov (United States)

    Ma, Maode; Zhu, Yongqing; Hiang Cheng, Tee

    2005-11-01

    While backbone networks have experienced substantial changes in the last decade, access networks have not changed much. Recently, passive optical networks (PONs) seem to be ready for commercial deployment as access networks, due to the maturity of a number of enabling technologies. Among the PON technologies, Ethernet PON (EPON) standardized by the IEEE 802.3ah Ethernet in the First Mile (EFM) Task Force is the most attractive one because of its high speed, low cost, familiarity, interoperability, and low overhead. In this paper, we consider the issue of upstream channel sharing in the EPONs. We propose a novel multiple-access control scheme to provide bandwidth-guaranteed service for high-demand customers, while providing best effort service to low-demand customers according to the service level agreement (SLA). The analytical and simulation results prove that the proposed scheme performs best in what it is designed to do compared to another well-known scheme that has not considered providing differentiated services. With business customers preferring premium services with guaranteed bandwidth and residential users preferring low-cost best effort services, our scheme could benefit both groups of subscribers, as well as the operators.

  20. The Role of Social Media User Experience as a Mediator for Understanding Social Media User Behavior in Indonesia’s Museum Industry: Literature Review

    Science.gov (United States)

    Sundjaja, A. M.; LumanGaol, F.; Budiarti, T.; Abbas, B. S.; Abdinagoro, S. B.; Ongowarsito, H.

    2017-01-01

    Social media has changed the interaction between the customer and the business, social media has proven to provide new opportunities in facilitating access to information, efficiency and ease of interaction between customers and businesses that are distributed geographically dispersed. Ease of interaction to improve access to information about products, services, and prices have proven to have a positive impact for consumers. The purpose of this article is to develop a conceptual model to test the effect of user motivation, user expectations, and online community involvement to the intention of behavior that is mediated by the use of social media museum experience. This article is a literature study on exploration of social media user experiences museum in Indonesia. Authors searched and examined 85 articles from google scholar with the following keywords: motivation, expectations, online communities, user experience, social media, Technology Acceptance Model, Experiential Marketing, Uses and Gratification Theory. Proposed data collection techniques are literature study, survey and observation. The sample used in this research is 400 respondents of social media users that follow the social media managed by Indonesia’s museum. The sampling technique are systematic sampling. We use Structural Equation Model with AMOS for analyze the data.

  1. What drives Users' Website Registration?

    NARCIS (Netherlands)

    T. Li (Ting); P.A. Pavlou (Paul)

    2013-01-01

    textabstractUser registration is an important prerequisite for the success of many websites by enabling users to gain access to domain information and personalized content. It is not always desirable for users, however, because they need to disclose personal information. This paper examines what

  2. Teenagers’ access to contraception in Mexico City

    Directory of Open Access Journals (Sweden)

    Sofía Gómez-Inclán

    2017-05-01

    Full Text Available Objective. To study and understand the phenomenon of access to contraceptive methods in Mexican teenages, through the use of the Levesque model, which allows for the observation of both the system and the system and the user´s participation in the access process. Materials and methods. A qualitative study was conducted with focus groups technique in a middle and high school of Mexico City. Results. The perception of ability to access to health care is limited, teenagers do not know the mechanisms of care or supply of contraceptive methods. Prejudices of service providers provoke a negative reaction. The family is a source of information for adolescents to make decisions. Conclusions. The model allowed the assessment of access to contraceptive methods in teenagers. It were identified dif­ferent aspects that act as barriers to access and may inform health care providers about this population in their sexual and reproductive health.

  3. Full-Text Linking: Affiliated versus Nonaffiliated Access in a Free Database.

    Science.gov (United States)

    Grogg, Jill E.; Andreadis, Debra K.; Kirk, Rachel A.

    2002-01-01

    Presents a comparison of access to full-text articles from a free bibliographic database (PubSCIENCE) for affiliated and unaffiliated users. Found that affiliated users had access to more full-text articles than unaffiliated users had, and that both types of users could increase their level of access through additional searching and greater…

  4. Connecting Satellite-Based Precipitation Estimates to Users

    Science.gov (United States)

    Huffman, George J.; Bolvin, David T.; Nelkin, Eric

    2018-01-01

    Beginning in 1997, the Merged Precipitation Group at NASA Goddard has distributed gridded global precipitation products built by combining satellite and surface gauge data. This started with the Global Precipitation Climatology Project (GPCP), then the Tropical Rainfall Measuring Mission (TRMM) Multi-satellite Precipitation Analysis (TMPA), and recently the Integrated Multi-satellitE Retrievals for the Global Precipitation Measurement (GPM) mission (IMERG). This 20+-year (and on-going) activity has yielded an important set of insights and lessons learned for making state-of-the-art precipitation data accessible to the diverse communities of users. Merged-data products critically depend on the input sensors and the retrieval algorithms providing accurate, reliable estimates, but it is also important to provide ancillary information that helps users determine suitability for their application. We typically provide fields of estimated random error, and recently reintroduced the quality index concept at user request. Also at user request we have added a (diagnostic) field of estimated precipitation phase. Over time, increasingly more ancillary fields have been introduced for intermediate products that give expert users insight into the detailed performance of the combination algorithm, such as individual merged microwave and microwave-calibrated infrared estimates, the contributing microwave sensor types, and the relative influence of the infrared estimate.

  5. National Geothermal Data System: Open Access to Geoscience Data, Maps, and Documents

    Science.gov (United States)

    Caudill, C. M.; Richard, S. M.; Musil, L.; Sonnenschein, A.; Good, J.

    2014-12-01

    The U.S. National Geothermal Data System (NGDS) provides free open access to millions of geoscience data records, publications, maps, and reports via distributed web services to propel geothermal research, development, and production. NGDS is built on the US Geoscience Information Network (USGIN) data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG), and is compliant with international standards and protocols. NGDS currently serves geoscience information from 60+ data providers in all 50 states. Free and open source software is used in this federated system where data owners maintain control of their data. This interactive online system makes geoscience data easily discoverable, accessible, and interoperable at no cost to users. The dynamic project site http://geothermaldata.org serves as the information source and gateway to the system, allowing data and applications discovery and availability of the system's data feed. It also provides access to NGDS specifications and the free and open source code base (on GitHub), a map-centric and library style search interface, other software applications utilizing NGDS services, NGDS tutorials (via YouTube and USGIN site), and user-created tools and scripts. The user-friendly map-centric web-based application has been created to support finding, visualizing, mapping, and acquisition of data based on topic, location, time, provider, or key words. Geographic datasets visualized through the map interface also allow users to inspect the details of individual GIS data points (e.g. wells, geologic units, etc.). In addition, the interface provides the information necessary for users to access the GIS data from third party software applications such as GoogleEarth, UDig, and ArcGIS. A redistributable, free and open source software package called GINstack (USGIN software stack) was also created to give data providers a simple way to release data using

  6. An Ambient Intelligence Framework for the Provision of Geographically Distributed Multimedia Content to Mobility Impaired Users

    Science.gov (United States)

    Kehagias, Dionysios D.; Giakoumis, Dimitris; Tzovaras, Dimitrios; Bekiaris, Evangelos; Wiethoff, Marion

    This chapter presents an ambient intelligence framework whose goal is to facilitate the information needs of mobility impaired users on the move. This framework couples users with geographically distributed services and the corresponding multimedia content, enabling access to context-sensitive information based on user geographic location and the use case under consideration. It provides a multi-modal facility that is realized through a set of mobile devices and user interfaces that address the needs of ten different types of user impairments. The overall ambient intelligence framework enables users who are equipped with mobile devices to access multimedia content in order to undertake activities relevant to one or more of the following domains: transportation, tourism and leisure, personal support services, work, business, education, social relations and community building. User experience is being explored against those activities through a specific usage scenario.

  7. AccessMedicine – eine perfekte Lernunterlage für das Medizinstudium / AccessMedicine – a perfect learning aid for the medical curriculum (Product Review

    Directory of Open Access Journals (Sweden)

    Schmalstieg, Burhard

    2008-09-01

    Full Text Available AccessMedicine (http://www.accessmedicine.com/features.aspx is an innovative online resource that provides students, residents, clinicians, researchers, and other health professionals with access to more than 50 medical book titles, updated content, thousands of photos and illustrations, interactive self-assessment, case files, diagnostic tools, a comprehensive search platform, and the possibility to download content to mobile devices. Updated frequently and expanded continuously, AccessMedicine provides fast and direct access to the information necessary for completing evaluations, diagnoses and case management decisions, as well as pursuing research or medical education. The newly designed homepage reflects the diversity of AccessMedicine users, allowing individuals to customize their own view of the site through their personal profile. Now users can decide whether they prefer a rich view of available features, a comprehensive list of McGraw-Hill's leading medical textbooks or a powerful advanced search interface as their homepage with a top-level tabbed navigation, semantic search engine, and recent updates and enhancements available on all views. Following an interview with university professor Dr. Richard März from the Medical University Vienna, department for Research and International Relations and Special Unit for Medical Education. Interview was carried out by Mr. Burkhard Schmalstieg, Senior Sales Executive for McGraw-Hill.

  8. Charliecloud: Unprivileged containers for user-defined software stacks in HPC

    Energy Technology Data Exchange (ETDEWEB)

    Priedhorsky, Reid [Los Alamos National Laboratory; Randles, Timothy C. [Los Alamos National Laboratory

    2016-08-09

    Supercomputing centers are seeing increasing demand for user-defined software stacks (UDSS), instead of or in addition to the stack provided by the center. These UDSS support user needs such as complex dependencies or build requirements, externally required configurations, portability, and consistency. The challenge for centers is to provide these services in a usable manner while minimizing the risks: security, support burden, missing functionality, and performance. We present Charliecloud, which uses the Linux user and mount namespaces to run industry-standard Docker containers with no privileged operations or daemons on center resources. Our simple approach avoids most security risks while maintaining access to the performance and functionality already on offer, doing so in less than 500 lines of code. Charliecloud promises to bring an industry-standard UDSS user workflow to existing, minimally altered HPC resources.

  9. Public Access to Government Electronic Information. Policy Framework.

    Science.gov (United States)

    Bulletin of the American Society for Information Science, 1992

    1992-01-01

    This policy framework provides guidelines for federal agencies on public access to government electronic information. Highlights include reasons for disseminating information; defining user groups; which technology to use; pricing flexibility; security and privacy issues; and the private sector and state and local government roles. (LRW)

  10. Multi-tool accessibility assessment of government department websites:a case-study with JKGAD.

    Science.gov (United States)

    Ismail, Abid; Kuppusamy, K S; Nengroo, Ab Shakoor

    2017-08-02

    Nature of being accessible to all categories of users is one of the primary factors for enabling the wider reach of the resources published through World Wide Web. The accessibility of websites has been analyzed through W3C guidelines with the help of various tools. This paper presents a multi-tool accessibility assessment of government department websites belonging to the Indian state of Jammu and Kashmir. A comparative analysis of six accessibility tools is also presented with 14 different parameters. The accessibility analysis tools used in this study for analysis are aChecker, Cynthia Says, Tenon, wave, Mauve, and Hera. These tools provide us the results of selected websites accessibility status on Web Content Accessibility Guidelines (WCAG) 1.0 and 2.0. It was found that there are variations in accessibility analysis results when using different accessibility metrics to measure the accessibility of websites. In addition to this, we have identified the guidelines which have frequently been violated. It was observed that there is a need for incorporating the accessibility component features among the selected websites. This paper presents a set of suggestions to improve the accessibility status of these sites so that the information and services provided by these sites shall reach a wider spectrum of audience without any barrier. Implications for rehabilitation The following points indicates that this case study of JKGAD websites comes under Rehabilitation focused on Visually Impaired users. Due to the universal nature of web, it should be accessible to all according to WCAG guidelines framed by World Wide Web Consortium. In this paper we have identified multiple accessibility barriers for persons with visual impairment while browsing the Jammu and Kashmir Government websites. Multi-tool analysis has been done to pin-point the potential barriers for persons with visually Impaired. Usability analysis has been performed to check whether these websites are suitable

  11. Impact of an online medical internet site on knowledge and practice of health care providers: a mixed methods study of the Spinal Cord Injury Rehabilitation Evidence project.

    Science.gov (United States)

    Eng, Janice J; Noonan, Vanessa K; Townson, Andrea F; Higgins, Caroline E; Rogers, Jess; Wolfe, Dalton L

    2014-12-23

    It is not known whether ongoing access to a broad-based Internet knowledge resource can influence the practice of health care providers. We undertook a study to evaluate the impact of a Web-based knowledge resource on increasing access to evidence and facilitating best practice of health care providers. The objective of this study was to evaluate (1) the impact of the Spinal Cord Injury Rehabilitation Evidence (SCIRE) project on access to information for health care providers and researchers and (2) how SCIRE influenced health care providers' management of clients. A 4-part mixed methods evaluation was undertaken: (1) monitoring website traffic and utilization using Google Analytics, (2) online survey of users who accessed the SCIRE website, (3) online survey of targeted end-users, that is, rehabilitation health care providers known to work with spinal cord injury (SCI) clients, as well as researchers, and (4) focus groups with health care providers who had previously accessed SCIRE. The online format allowed the content for a relatively specialized field to have far reach (eg, 26 countries and over 6500 users per month). The website survey and targeted end-user survey confirmed that health care providers, as well as researchers perceived that the website increased their access to SCI evidence. Access to SCIRE not only improved knowledge of SCI evidence but helped inform changes to the health providers' clinical practice and improved their confidence in treating SCI clients. The SCIRE information directly influenced the health providers' clinical decision making, in terms of choice of intervention, equipment needs, or assessment tool. A Web-based knowledge resource may be a relatively inexpensive method to increase access to evidence-based information, increase knowledge of the evidence, inform changes to the health providers' practice, and influence their clinical decision making.

  12. Easing Internet access of health information for elderly users

    NARCIS (Netherlands)

    Alpay, L.L.; Toussaint, P.J.; Ezendam, N.P.M.; Rövekamp, T.A.J.M.; Graafmans, W.C.; Westendorp, R.G.J.

    2004-01-01

    Elderly users are increasingly becoming active consumers of Internet technologies. Developing websites dedicated to this user group presents several design issues (such as that of 'design for all', participatory design, patient empowerment and cognitive usability assessment methods). SeniorGezond is

  13. SDN Based User-Centric Framework for Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Zhaoming Lu

    2016-01-01

    Full Text Available Due to the rapid growth of mobile data traffic, more and more basestations and access points (APs have been densely deployed to provide users with ubiquitous network access, which make current wireless network a complex heterogeneous network (HetNet. However, traditional wireless networks are designed with network-centric approaches where different networks have different quality of service (QoS strategies and cannot easily cooperate with each other to serve network users. Massive network infrastructures could not assure users perceived network and service quality, which is an indisputable fact. To address this issue, we design a new framework for heterogeneous wireless networks with the principle of user-centricity, refactoring the network from users’ perspective to suffice their requirements and preferences. Different from network-centric approaches, the proposed framework takes advantage of Software Defined Networking (SDN and virtualization technology, which will bring better perceived services quality for wireless network users. In the proposed user-centric framework, control plane and data plane are decoupled to manage the HetNets in a flexible and coadjutant way, and resource virtualization technology is introduced to abstract physical resources of HetNets into unified virtualized resources. Hence, ubiquitous and undifferentiated network connectivity and QoE (quality of experience driven fine-grained resource management could be achieved for wireless network users.

  14. CYBERSECURITY AND USER ACCOUNTABILITY IN THE C-AD CONTROL SYSTEM

    International Nuclear Information System (INIS)

    MORRIS, J.T.; BINELLO, S.; D OTTAVIO, T.; KATZ, R.A.

    2007-01-01

    A heightened awareness of cybersecurity has led to a review of the procedures that ensure user accountability for actions performed on the computers of the Collider-Accelerator Department (C-AD) Control System. Control system consoles are shared by multiple users in control rooms throughout the C-AD complex. A significant challenge has been the establishment of procedures that securely control and monitor access to these shared consoles without impeding accelerator operations. This paper provides an overview of C-AD cybersecurity strategies with an emphasis on recent enhancements in user authentication and tracking methods

  15. CYBERSECURITY AND USER ACCOUNTABILITY IN THE C-AD CONTROL SYSTEM

    Energy Technology Data Exchange (ETDEWEB)

    MORRIS,J.T.; BINELLO, S.; D OTTAVIO, T.; KATZ, R.A.

    2007-10-15

    A heightened awareness of cybersecurity has led to a review of the procedures that ensure user accountability for actions performed on the computers of the Collider-Accelerator Department (C-AD) Control System. Control system consoles are shared by multiple users in control rooms throughout the C-AD complex. A significant challenge has been the establishment of procedures that securely control and monitor access to these shared consoles without impeding accelerator operations. This paper provides an overview of C-AD cybersecurity strategies with an emphasis on recent enhancements in user authentication and tracking methods.

  16. A Model for Trust-based Access Control and Delegation in Mobile Clouds (Post Print)

    Science.gov (United States)

    2013-10-01

    the access-granter knowing the identity of access requester beforehand and authenticating the requester, can no longer be applied. Mobile Wallet Cloud...TktC) for a reservation and con- tacts the user’s mobile wallet provider (MobWC) to purchase the ticket from TktC. For accessing different services...receiving regular services. For example, the human user in our scenario can be an elite member with the mobile wallet service provider that

  17. Enterprise wide transparent information access

    International Nuclear Information System (INIS)

    Brown, J.

    1995-05-01

    The information management needs of the Department of Energy (DOE) represents a fertile domain for the development of highly sophisticated yet intuitive enterprise-wide computing solutions. These solutions must support business operations, research agendas, technology development efforts, decision support, and other application areas with a user base ranging from technical staff to the highest levels of management. One area of primary interest is in the Environmental Restoration and Waste Management Branch of DOE. In this arena, the issue of tracking and managing nuclear waste related to the long legacy of prior defense production and research programs is one of high visibility and great concern. The Tank Waste Information Network System (TWINS) application has been created by the Pacific Northwest Laboratory (PNL) for the DOE to assist in managing and accessing the information related to this mission. The TWINS solution addresses many of the technical issues faced by other efforts to provide integrated information access to a wide variety of stakeholders. TWINS provides secure transparent access to distributed heterogeneous multimedia information sources from around the DOE complex. The users interact with the information through a consistent user interface that presents the desired data in a common format regardless of the structure of the source information. The solutions developed by the TWINS project represent an integration of several technologies and products that can be applied to other mission areas within DOE and other government agencies. These solutions are now being applied to public and private sector problem domains as well. The successful integration and inter-operation of both commercial and custom modules into a flexible and extensible information architecture will help ensure that new problems facing DOE and other clients can be addressed more rapidly in the future by re-use of existing tools and techniques proven viable through the TWINS efforts

  18. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    to be the property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover......Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered......, the hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  19. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered...... to be the property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover......, the hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  20. Comparing Accessibility Auditing Methods for Ebooks: Crowdsourced, Functionality-Led Versus Web Content Methodologies.

    Science.gov (United States)

    James, Abi; Draffan, E A; Wald, Mike

    2017-01-01

    This paper presents a gap analysis between crowdsourced functional accessibility evaluations of ebooks conducted by non-experts and the technical accessibility standards employed by developers. It also illustrates how combining these approaches can provide more appropriate information for a wider group of users with print impairments.

  1. Mobile user experience for voice services: A theoretical framework

    CSIR Research Space (South Africa)

    Botha, Adèle

    2012-02-01

    Full Text Available The purpose of this paper is to provide a “Mobile User Experience Framework for Voice services.” The rapid spread of mobile cellular technology within Africa has made it a prime vehicle for accessing services and content. The challenge remains...

  2. Free access to INIS database provides a gateway to nuclear energy research results

    International Nuclear Information System (INIS)

    Tolonen, E.; Malmgren, M.

    2009-01-01

    Free access to INIS database was opened to all the Internet users around the world on May, 2009. The article reviews the history of INIS (the International Nuclear Information System), data aquisition process, database content and search possibilities. INIS is focused on the worldwide literature of the peaceful uses of nuclear energy and the database is produced in close collaboration with the IEA/ETDE World Energy Base (ETDEWEB), a database focusing on all aspects of energy. Nuclear Science Abstracts database (NSA), which is a comprehensive collection of international nuclear science and technology literature for the period 1948 through 1976, is also briefly discussed in the article. In Finland, the recently formed Aalto University is responsible for collecting and disseminating information (literature) and for the preparation of input to the INIS and IEA/ETDE Databases on the national level

  3. Barriers to accessing ATLS provider course for junior doctors at a ...

    African Journals Online (AJOL)

    Barriers to accessing ATLS provider course for junior doctors at a major university hospital in South Africa. ... South African Journal of Surgery ... Subgroup analysis comparing the reasons for PGY1s vs PGY2s demonstrated that not being able to secure a place on course was more common among PGY2s [19% vs 33%, ...

  4. Virtual Library: Providing Accessible Online Resources.

    Science.gov (United States)

    Kelly, Rob

    2001-01-01

    Describes e-global library, a virtual library based on the Jones International University's library that organizes Internet resources to make them more accessible to students at all skill levels. Highlights include online tutorials; research guides; financial aid and career development information; and possible partnerships with other digital…

  5. Mining Social Tagging Data for Enhanced Subject Access for Readers and Researchers

    Science.gov (United States)

    Lawson, Karen G.

    2009-01-01

    Social tagging enables librarians to partner with users to provide enhanced subject access. This paper quantifies and compares LC subject headings from each of 31 different subject divisions with user tags from Amazon.com and LibraryThing assigned to the same titles. The intersection and integration of these schemas is described and evaluated.…

  6. An Introduction to Web Accessibility, Web Standards, and Web Standards Makers

    Science.gov (United States)

    McHale, Nina

    2011-01-01

    Librarians and libraries have long been committed to providing equitable access to information. In the past decade and a half, the growth of the Internet and the rapid increase in the number of online library resources and tools have added a new dimension to this core duty of the profession: ensuring accessibility of online resources to users with…

  7. Providing Social Enterprises with Better Access to Public Procurement : The Development of Supportive Legal Frameworks

    NARCIS (Netherlands)

    Argyrou, A.

    2017-01-01

    This article discusses the issue of social enterprises gaining access to public procurement processes and contracts at the EU and national level. It primarily examines the opportunities for social enterprises to access public procurement contracts provided for in the Public Procurement Directive

  8. An Intelligent Terminal for Access to a Medical Database

    Science.gov (United States)

    Womble, M. E.; Wilson, S. D.; Keiser, H. N.; Tworek, M. L.

    1978-01-01

    Very powerful data base management systems (DBMS) now exist which allow medical personnel access to patient record data bases. DBMS's make it easy to retrieve either complete or abbreviated records of patients with similar characteristics. In addition, statistics on data base records are immediately accessible. However, the price of this power is a large computer with the inherent problems of access, response time, and reliability. If a general purpose, time-shared computer is used to get this power, the response time to a request can be either rapid or slow, depending upon loading by other users. Furthermore, if the computer is accessed via dial-up telephone lines, there is competition with other users for telephone ports. If either the DBMS or the host machine is replaced, the medical users, who are typically not sophisticated in computer usage, are forced to learn the new system. Microcomputers, because of their low cost and adaptability, lend themselves to a solution of these problems. A microprocessor-based intelligent terminal has been designed and implemented at the USAF School of Aerospace Medicine to provide a transparent interface between the user and his data base. The intelligent terminal system includes multiple microprocessors, floppy disks, a CRT terminal, and a printer. Users interact with the system at the CRT terminal using menu selection (framing). The system translates the menu selection into the query language of the DBMS and handles all actual communication with the DBMS and its host computer, including telephone dialing and sign on procedures, as well as the actual data base query and response. Retrieved information is stored locally for CRT display, hard copy production, and/or permanent retention. Microprocessor-based communication units provide security for sensitive medical data through encryption/decryption algorithms and high reliability error detection transmission schemes. Highly modular software design permits adapation to a

  9. User interface design principles for the SSM/PMAD automated power system

    Science.gov (United States)

    Jakstas, Laura M.; Myers, Chris J.

    1991-01-01

    Martin Marietta has developed a user interface for the space station module power management and distribution (SSM/PMAD) automated power system testbed which provides human access to the functionality of the power system, as well as exemplifying current techniques in user interface design. The testbed user interface was designed to enable an engineer to operate the system easily without having significant knowledge of computer systems, as well as provide an environment in which the engineer can monitor and interact with the SSM/PMAD system hardware. The design of the interface supports a global view of the most important data from the various hardware and software components, as well as enabling the user to obtain additional or more detailed data when needed. The components and representations of the SSM/PMAD testbed user interface are examined. An engineer's interactions with the system are also described.

  10. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology Submission Deadline: 1 June 2005 Background With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks

  11. A Comparative Study on Java Technologies for Focus and Cursor Handling in Accessible Dynamic Interactions.

    Science.gov (United States)

    Jitngernmadan, Prajaks; Miesenberger, Klaus

    2015-01-01

    For an interactive application, supporting and guiding the user in fulfilling tasks is most important. The behavior of the application that will guide users through the procedures until they finish the task has to be designed intuitively and well guiding, especially if the users has only restricted or no access to the visual and spatial arrangement on the screen. Therefore, the focus/cursor management plays an important role for orientation and navigating through the interaction. In the frame of ongoing research on a software tool supporting blind people in more efficiently doing mathematical calculations, we researched how Java technologies support implementing an accessible Graphical User Interface (GUI) with an additional focus on usable accessibility in terms of guiding blind users through the process of solving mathematical calculations. We used Java Swing [1] and Eclipse SWT [2] APIs for creating a series of prototypes. We tested a) accessibility and usability of the prototypes for blind people when using screen reader software and refreshable Braille display and b) the implementation support to developers provided by both technologies. It turned out that Eclipse SWT API delivered best results under Windows operating system.

  12. [Access to health care in Dakar (Senegal): frequency, type of provider, and non-communicable chronic diseases].

    Science.gov (United States)

    Duboz, P; Gueye, L; Boetsch, G; Macia, E

    2015-01-01

    (1) To describe access to health care in the population of Dakar; (2) to analyze the influence of socioeconomic and demographic characteristics on access to health care; (3) and to describe the fraction of consultations accounted for by chronic non-communicable diseases. These data come from a 2009 survey of 600 individuals aged 20 years and over. Socioeconomic and demographic characteristics and information about access to health care were collected. Chi-square tests and binary logistic regressions were used for the statistical analyses. Men, people with no schooling, and poor people were underrepresented among users of health care services. Moreover, the majority of Dakar residents who sought health care during the year preceding the survey went to see a doctor (as opposed to a traditional healer, pharmacist, nurse, midwife, or dentist). Finally, chronic diseases accounted for the smallest fraction of reasons for medical consultations; they were mentioned most often by those aged 50 years or older who consult more than 5 times a year. Dakar residents have an access to health care similar to that of people in other African countries, but this conclusion hides major inequalities. Moreover, at the same time that Senegal is undergoing an epidemiological transition, chronic non-communicable diseases are not a major reason for consultations. The epidemiological projections made for Africa for the next 15 years indicate that the development of strategies to avert the development of these diseases in Senegal must be a priority objective.

  13. Artificial intelligence techniques for modeling database user behavior

    Science.gov (United States)

    Tanner, Steve; Graves, Sara J.

    1990-01-01

    The design and development of the adaptive modeling system is described. This system models how a user accesses a relational database management system in order to improve its performance by discovering use access patterns. In the current system, these patterns are used to improve the user interface and may be used to speed data retrieval, support query optimization and support a more flexible data representation. The system models both syntactic and semantic information about the user's access and employs both procedural and rule-based logic to manipulate the model.

  14. 78 FR 36478 - Accessibility of User Interfaces, and Video Programming Guides and Menus

    Science.gov (United States)

    2013-06-18

    ... the functional requirements needed to carry out those sections. Among other things, the VPAAC Second... of the associated functional requirement.'' The VPAAC Second Report: User Interfaces also lists... operable in accordance with each of the following, assessed independently: Operable without vision. Provide...

  15. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).

  16. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    Full Text Available A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000 model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks.

  17. 47 CFR 64.613 - Numbering directory for internet-based TRS users.

    Science.gov (United States)

    2010-10-01

    ... Uniform Resource Identifier (URI). (2) For each record associated with a VRS user, the URI shall contain.... (3) Only the TRS Numbering Administrator and Internet-based TRS providers may access the TRS...-governmental entity that is impartial and not an affiliate of any Internet-based TRS provider. (ii) Neither the...

  18. NASA EOSDIS Enabling Science by Improving User Knowledge

    Science.gov (United States)

    Lindsay, F. E.; Brennan, J.; Blumenfeld, J.

    2016-12-01

    NASA's Earth Observing System Data and Information System (EOSDIS) has been a central component of the NASA Earth observation program since the 1990's. The data collected by NASA's remote sensing instruments, airborne platforms and field campaigns represent a significant public investment in Earth science research. EOSDIS provides free and open access of these data to a diverse end-user community worldwide. Over time the EOSDIS data user community has grown substantially in both number and in the diversity of their needs. Commensurate with this growth, there also have been substantial changes in internet-based technologies and the expectation of users demanding more sophisticated EOSDIS information products describing, highlighting and providing insight to our vast data collections. To meet these increased expectations and to more fully engage our users, EOSDIS is evolving our use of traditional forms of purely static methods of public engagement such as stand-alone text and imagery toward more immersive and interactive forms of communications. This paper highlights and elucidates the methods and forms used by EOSDIS in this emerging world of dynamic and interactive media. Lessons learned and the impacts of applying these newer methods are explained and include several examples from our current efforts. These examples include interactive, on-line webinars focusing on data discovery and access (including tool usage), informal and informative `data chats' with data experts across our EOSDIS community, and profiles of scientists, researchers, and managers actively using EOSDIS data. Our efforts also include improved conference and meeting interactions with data users through the ability to use EOSDIS data interactively during hyperwall talks and the EOSDIS Worldview data visualization and exploration client. The suite of internet-based, interactive capabilities and technologies has allowed EOSDIS to expand our user community by making the data and applications from

  19. Web accessibility standards and disability: developing critical perspectives on accessibility.

    Science.gov (United States)

    Lewthwaite, Sarah

    2014-01-01

    Currently, dominant web accessibility standards do not respect disability as a complex and culturally contingent interaction; recognizing that disability is a variable, contrary and political power relation, rather than a biological limit. Against this background there is clear scope to broaden the ways in which accessibility standards are understood, developed and applied. Commentary. The values that shape and are shaped by legislation promote universal, statistical and automated approaches to web accessibility. This results in web accessibility standards conveying powerful norms fixing the relationship between technology and disability, irrespective of geographical, social, technological or cultural diversity. Web accessibility standards are designed to enact universal principles; however, they express partial and biopolitical understandings of the relation between disability and technology. These values can be limiting, and potentially counter-productive, for example, for the majority of disabled people in the "Global South" where different contexts constitute different disabilities and different experiences of web access. To create more robust, accessible outcomes for disabled people, research and standards practice should diversify to embrace more interactional accounts of disability in different settings. Implications for Rehabilitation Creating accessible experiences is an essential aspect of rehabilitation. Web standards promote universal accessibility as a property of an online resource or service. This undervalues the importance of the user's intentions, expertize, their context, and the complex social and cultural nature of disability. Standardized, universal approaches to web accessibility may lead to counterproductive outcomes for disabled people whose impairments and circumstances do not meet Western disability and accessibility norms. Accessible experiences for rehabilitation can be enhanced through an additional focus on holistic approaches to

  20. Association of mandated language access programming and quality of care provided by mental health agencies.

    Science.gov (United States)

    McClellan, Sean R; Snowden, Lonnie

    2015-01-01

    This study examined the association between language access programming and quality of psychiatric care received by persons with limited English proficiency (LEP). In 1999, the California Department of Mental Health required county Medicaid agencies to implement a "threshold language access policy" to meet the state's Title VI obligations. This policy required Medi-Cal agencies to provide language access programming, including access to interpreters and translated written material, to speakers of languages other than English if the language was spoken by at least 3,000, or 5%, of the county's Medicaid population. Using a longitudinal study design with a nonequivalent control group, this study examined the quality of care provided to Spanish speakers with LEP and a severe mental illness before and after implementation of mandatory language access programming. Quality was measured by receipt of at least two follow-up medication visits within 90 days or three visits within 180 days of an initial medication visit over a period of 38 quarter-years. On average, only 40% of Spanish-speaking clients received at least three medication follow-up visits within 180 days. In multivariate analyses, language access programming was not associated with receipt of at least two medication follow-up visits within 90 days or at least three visits within 180 days. This study found no evidence that language access programming led to increased rates of follow-up medication visits for clients with LEP.

  1. Beyond the Letter of the Law: Accessibility, Universal Design, and Human-Centered Design in Video Tutorials

    Directory of Open Access Journals (Sweden)

    Amanda S. Clossen

    2014-05-01

    Full Text Available This article demonstrates how Universal and Human-Centered Design approaches can be applied to the process of library video tutorial creation in order to enhance accessibility. A series of questions that creators should consider in order to focus their design process is discussed. These questions break down various physical and cognitive limitations that users encounter, providing a framework for future video creation that is not dependent on specific software. By approaching accommodations more holistically, videos are created with accessibility in mind from their conception. Working toward the ideal of a video tutorial that is accessible to every user leads to the creation of more clearly worded, effective learning objects that are much more inclusive, making instructional concepts available to users of all abilities.

  2. Challenges in Cultivating EOSDIS User Survey Participation

    Science.gov (United States)

    Boquist, C. L.; Sofinowski, E. J.; Walter, S.

    2011-12-01

    Since 2004 NASA has surveyed users of its Earth Observing System Data and Information System (EOSDIS) to determine user satisfaction with its services. The surveys have been conducted by CFI Group under contract with the Federal Consulting Group, Executive Agent in government for the American Customer Satisfaction Index (ACSI). The purpose of these annual surveys is to help EOSDIS and the data centers assess current status and improve future services. The survey questions include demographic and experiential questions in addition to the ACSI and EOSDIS specific rating questions. In addition to customer satisfaction, analysis of each year's results has provided insight into the survey process. Although specific questions have been added, modified, or deleted to reflect changes to the EOSDIS system and processes, the model rating questions have remained the same to ensure consistency for evaluating cross year trends. Working with the CFI Group, we have refined the invitation and questions to increase clarity and address the different ways diverse groups of users access services at EOSDIS data centers. We present challenges in preparing a single set of questions that go to users with backgrounds in many Earth science disciplines. These users may have contacted any of the 12 EOSDIS data centers for information or may have accessed data or data products from many kinds of aircraft and satellite instruments. We discuss lessons learned in preparing the invitation and survey questions and the steps taken to make the survey easier to complete and to encourage increased participation.

  3. High Availability Applications for NOMADS at the NOAA Web Operations Center Aimed at Providing Reliable Real Time Access to Operational Model Data

    Science.gov (United States)

    Alpert, J. C.; Rutledge, G.; Wang, J.; Freeman, P.; Kang, C. Y.

    2009-05-01

    The NOAA Operational Modeling Archive Distribution System (NOMADS) is now delivering high availability services as part of NOAA's official real time data dissemination at its Web Operations Center (WOC). The WOC is a web service used by all organizational units in NOAA and acts as a data repository where public information can be posted to a secure and scalable content server. A goal is to foster collaborations among the research and education communities, value added retailers, and public access for science and development efforts aimed at advancing modeling and GEO-related tasks. The services used to access the operational model data output are the Open-source Project for a Network Data Access Protocol (OPeNDAP), implemented with the Grid Analysis and Display System (GrADS) Data Server (GDS), and applications for slicing, dicing and area sub-setting the large matrix of real time model data holdings. This approach insures an efficient use of computer resources because users transmit/receive only the data necessary for their tasks including metadata. Data sets served in this way with a high availability server offer vast possibilities for the creation of new products for value added retailers and the scientific community. New applications to access data and observations for verification of gridded model output, and progress toward integration with access to conventional and non-conventional observations will be discussed. We will demonstrate how users can use NOMADS services to repackage area subsets either using repackaging of GRIB2 files, or values selected by ensemble component, (forecast) time, vertical levels, global horizontal location, and by variable, virtually a 6- Dimensional analysis services across the internet.

  4. The SPAN cookbook: A practical guide to accessing SPAN

    Science.gov (United States)

    Mason, Stephanie; Tencati, Ronald D.; Stern, David M.; Capps, Kimberly D.; Dorman, Gary; Peters, David J.

    1990-01-01

    This is a manual for remote users who wish to send electronic mail messages from the Space Physics Analysis Network (SPAN) to scientific colleagues on other computer networks and vice versa. In several instances more than one gateway has been included for the same network. Users are provided with an introduction to each network listed with helpful details about accessing the system and mail syntax examples. Also included is information on file transfers, remote logins, and help telephone numbers.

  5. Autonomous Information Unit for Fine-Grain Data Access Control and Information Protection in a Net-Centric System

    Science.gov (United States)

    Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.

    2012-01-01

    As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are

  6. Decision Analysis of Dynamic Spectrum Access Rules

    Energy Technology Data Exchange (ETDEWEB)

    Juan D. Deaton; Luiz A. DaSilva; Christian Wernz

    2011-12-01

    A current trend in spectrum regulation is to incorporate spectrum sharing through the design of spectrum access rules that support Dynamic Spectrum Access (DSA). This paper develops a decision-theoretic framework for regulators to assess the impacts of different decision rules on both primary and secondary operators. We analyze access rules based on sensing and exclusion areas, which in practice can be enforced through geolocation databases. Our results show that receiver-only sensing provides insufficient protection for primary and co-existing secondary users and overall low social welfare. On the other hand, using sensing information between the transmitter and receiver of a communication link, provides dramatic increases in system performance. The performance of using these link end points is relatively close to that of using many cooperative sensing nodes associated to the same access point and large link exclusion areas. These results are useful to regulators and network developers in understanding in developing rules for future DSA regulation.

  7. Do Your School Policies Provide Equal Access to Computers? Are You Sure?

    Science.gov (United States)

    DuBois, Phyllis A.; Schubert, Jane G.

    1986-01-01

    Outlines how school policies can unintentionally perpetuate gender discrimination in student computer use and access. Describes four areas of administrative policies that can cause inequities and provides ways for administrators to counteract these policies. Includes discussion of a program to balance computer use, and an abstract of an article…

  8. International Reactor Physics Handbook Database and Analysis Tool (IDAT) - IDAT user manual

    International Nuclear Information System (INIS)

    2013-01-01

    The IRPhEP Database and Analysis Tool (IDAT) was first released in 2013 and is included on the DVD. This database and corresponding user interface allows easy access to handbook information. Selected information from each configuration was entered into IDAT, such as the measurements performed, benchmark values, calculated values and materials specifications of the benchmark. In many cases this is supplemented with calculated data such as neutron balance data, spectra data, k-eff nuclear data sensitivities, and spatial reaction rate plots. IDAT accomplishes two main objectives: 1. Allow users to search the handbook for experimental configurations that satisfy their input criteria. 2. Allow users to trend results and identify suitable benchmarks experiments for their application. IDAT provides the user with access to several categories of calculated data, including: - 1-group neutron balance data for each configuration with individual isotope contributions in the reactor system. - Flux and other reaction rates spectra in a 299-group energy scheme. Plotting capabilities were implemented into IDAT allowing the user to compare the spectra of selected configurations in the original fine energy structure or on any user-defined broader energy structure. - Sensitivity coefficients (percent changes of k-effective due to elementary change of basic nuclear data) for the major nuclides and nuclear processes in a 238-group energy structure. IDAT is actively being developed. Those approved to access the online version of the handbook will also have access to an online version of IDAT. As May 2013 marks the first release, IDAT may contain data entry errors and omissions. The handbook remains the primary source of reactor physics benchmark data. A copy of IDAT user's manual is attached to this document. A copy of the IRPhE Handbook can be obtained on request at http://www.oecd-nea.org/science/wprs/irphe/irphe-handbook/form.html

  9. A comparison of Frequency Domain Multiple Access (FDMA) and Time Domain Multiple Access (TDMA) approaches to satellite service for low data rate Earth stations

    Science.gov (United States)

    Stevens, G.

    1983-01-01

    A technological and economic assessment is made of providing low data rate service to small earth stations by satellite at Ka-band. Various Frequency Domain Multiple Access (FDMA) and Time Domain Multiple Access (TDMA) scenarios are examined and compared on the basis of cost to the end user. Very small stations (1 to 2 meters in diameter) are found not to be viable alternatives to available terrestrial services. However, medium size (3 to 5 meters) earth stations appear to be very competitive if a minimum throughput of about 1.5 Mbs is maintained. This constrains the use of such terminals to large users and shared use by smaller users. No advantage was found to the use of FDMA. TDMA had a slight advantage from a total system viewpoint and a very significant advantage in the space segment (about 1/3 the required payload weight for an equivalent capacity).

  10. A Global User-Driven Model for Tile Prefetching in Web Geographical Information Systems.

    Science.gov (United States)

    Pan, Shaoming; Chong, Yanwen; Zhang, Hang; Tan, Xicheng

    2017-01-01

    A web geographical information system is a typical service-intensive application. Tile prefetching and cache replacement can improve cache hit ratios by proactively fetching tiles from storage and replacing the appropriate tiles from the high-speed cache buffer without waiting for a client's requests, which reduces disk latency and improves system access performance. Most popular prefetching strategies consider only the relative tile popularities to predict which tile should be prefetched or consider only a single individual user's access behavior to determine which neighbor tiles need to be prefetched. Some studies show that comprehensively considering all users' access behaviors and all tiles' relationships in the prediction process can achieve more significant improvements. Thus, this work proposes a new global user-driven model for tile prefetching and cache replacement. First, based on all users' access behaviors, a type of expression method for tile correlation is designed and implemented. Then, a conditional prefetching probability can be computed based on the proposed correlation expression mode. Thus, some tiles to be prefetched can be found by computing and comparing the conditional prefetching probability from the uncached tiles set and, similarly, some replacement tiles can be found in the cache buffer according to multi-step prefetching. Finally, some experiments are provided comparing the proposed model with other global user-driven models, other single user-driven models, and other client-side prefetching strategies. The results show that the proposed model can achieve a prefetching hit rate in approximately 10.6% ~ 110.5% higher than the compared methods.

  11. User and virtual organisation support in EGEE

    CERN Document Server

    Donno, Flavia

    2006-01-01

    User and virtual organisation support in EGEE Providing adequate user support in a grid environment is a very challenging task due to the distributed nature of the grid. The variety of users and the variety of Virtual Organizations (VO) with a wide range of applications in use add further to the challenge. The people asking for support are of various kinds. They can be generic grid beginners, users belonging to a given Virtual Organization and dealing with a specific set of applications, site administrators operating grid services and local computing infrastructures, grid monitoring operators who check the status of the grid and need to contact the specific site to report problems; to this list can be added network specialists and others. Wherever a user is located and whatever the problem experienced is, a user expects from a support infrastructure a given set of services. A non-exhaustive list is the following: a) a single access point for support; b) a portal with a well structured sources of information a...

  12. The Live Access Server Scientific Product Generation Through Workflow Orchestration

    Science.gov (United States)

    Hankin, S.; Calahan, J.; Li, J.; Manke, A.; O'Brien, K.; Schweitzer, R.

    2006-12-01

    The Live Access Server (LAS) is a well-established Web-application for display and analysis of geo-science data sets. The software, which can be downloaded and installed by anyone, gives data providers an easy way to establish services for their on-line data holdings, so their users can make plots; create and download data sub-sets; compare (difference) fields; and perform simple analyses. Now at version 7.0, LAS has been in operation since 1994. The current "Armstrong" release of LAS V7 consists of three components in a tiered architecture: user interface, workflow orchestration and Web Services. The LAS user interface (UI) communicates with the LAS Product Server via an XML protocol embedded in an HTTP "get" URL. Libraries (APIs) have been developed in Java, JavaScript and perl that can readily generate this URL. As a result of this flexibility it is common to find LAS user interfaces of radically different character, tailored to the nature of specific datasets or the mindset of specific users. When a request is received by the LAS Product Server (LPS -- the workflow orchestration component), business logic converts this request into a series of Web Service requests invoked via SOAP. These "back- end" Web services perform data access and generate products (visualizations, data subsets, analyses, etc.). LPS then packages these outputs into final products (typically HTML pages) via Jakarta Velocity templates for delivery to the end user. "Fine grained" data access is performed by back-end services that may utilize JDBC for data base access; the OPeNDAP "DAPPER" protocol; or (in principle) the OGC WFS protocol. Back-end visualization services are commonly legacy science applications wrapped in Java or Python (or perl) classes and deployed as Web Services accessible via SOAP. Ferret is the default visualization application used by LAS, though other applications such as Matlab, CDAT, and GrADS can also be used. Other back-end services may include generation of Google

  13. A User-Customized Virtual Network Platform for NaaS Cloud

    Directory of Open Access Journals (Sweden)

    Lei Xiao

    2016-01-01

    Full Text Available Now all kinds of public cloud providers take computing and storage resources as the user’s main demand, making it difficult for users to deploy complex network in the public cloud. This paper proposes a virtual cloud platform with network as the core demand of the user, which can provide the user with the capacity of free network architecture as well as all kinds of virtual resources. The network is isolated by port groups of the virtual distributed switch and the data forwarding and access control between different network segments are implemented by virtual machines loading a soft-routing system. This paper also studies the management interface of network architecture and the uniform way to connect the remote desktop of virtual resources on the web, hoping to provide some new ideas for the Network as a Service model.

  14. Advanced Test Reactor National Scientific User Facility Partnerships

    International Nuclear Information System (INIS)

    Marshall, Frances M.; Allen, Todd R.; Benson, Jeff B.; Cole, James I.; Thelen, Mary Catherine

    2012-01-01

    In 2007, the United States Department of Energy designated the Advanced Test Reactor (ATR), located at Idaho National Laboratory, as a National Scientific User Facility (NSUF). This designation made test space within the ATR and post-irradiation examination (PIE) equipment at INL available for use by researchers via a proposal and peer review process. The goal of the ATR NSUF is to provide researchers with the best ideas access to the most advanced test capability, regardless of the proposer's physical location. Since 2007, the ATR NSUF has expanded its available reactor test space, and obtained access to additional PIE equipment. Recognizing that INL may not have all the desired PIE equipment, or that some equipment may become oversubscribed, the ATR NSUF established a Partnership Program. This program enables and facilitates user access to several university and national laboratories. So far, seven universities and one national laboratory have been added to the ATR NSUF with capability that includes reactor-testing space, PIE equipment, and ion beam irradiation facilities. With the addition of these universities, irradiation can occur in multiple reactors and post-irradiation exams can be performed at multiple universities. In each case, the choice of facilities is based on the user's technical needs. Universities and laboratories included in the ATR NSUF partnership program are as follows: (1) Nuclear Services Laboratories at North Carolina State University; (2) PULSTAR Reactor Facility at North Carolina State University; (3) Michigan Ion Beam Laboratory (1.7 MV Tandetron accelerator) at the University of Michigan; (4) Irradiated Materials at the University of Michigan; (5) Harry Reid Center Radiochemistry Laboratories at University of Nevada, Las Vegas; (6) Characterization Laboratory for Irradiated Materials at the University of Wisconsin-Madison; (7) Tandem Accelerator Ion Beam. (1.7 MV terminal voltage tandem ion accelerator) at the University of Wisconsin

  15. Signature-based User Authentication

    OpenAIRE

    Hámorník, Juraj

    2015-01-01

    This work aims on missing handwritten signature authentication in Windows. Result of this work is standalone software that allow users to log into Windows by writing signature. We focus on security of signature authentification and best overall user experience. We implemented signature authentification service that accept signature and return user access token if signature is genuine. Signature authentification is done by comparing given signature to signature patterns by their similarity. Si...

  16. Streamlining On-Demand Access to Joint Polar Satellite System (JPSS) Data Products for Weather Forecasting

    Science.gov (United States)

    Evans, J. D.; Tislin, D.

    2017-12-01

    Observations from the Joint Polar Satellite System (JPSS) support National Weather Service (NWS) forecasters, whose Advanced Weather Interactive Processing System (AWIPS) Data Delivery (DD) will access JPSS data products on demand from the National Environmental Satellite, Data, and Information Service (NESDIS) Product Distribution and Access (PDA) service. Based on the Open Geospatial Consortium (OGC) Web Coverage Service, this on-demand service promises broad interoperability and frugal use of data networks by serving only the data that a user needs. But the volume, velocity, and variety of JPSS data products impose several challenges to such a service. It must be efficient to handle large volumes of complex, frequently updated data, and to fulfill many concurrent requests. It must offer flexible data handling and delivery, to work with a diverse and changing collection of data, and to tailor its outputs into products that users need, with minimal coordination between provider and user communities. It must support 24x7 operation, with no pauses in incoming data or user demand; and it must scale to rapid changes in data volume, variety, and demand as new satellites launch, more products come online, and users rely increasingly on the service. We are addressing these challenges in order to build an efficient and effective on-demand JPSS data service. For example, on-demand subsetting by many users at once may overload a server's processing capacity or its disk bandwidth - unless alleviated by spatial indexing, geolocation transforms, or pre-tiling and caching. Filtering by variable (/ band / layer) may also alleviate network loads, and provide fine-grained variable selection; to that end we are investigating how best to provide random access into the variety of spatiotemporal JPSS data products. Finally, producing tailored products (derivatives, aggregations) can boost flexibility for end users; but some tailoring operations may impose significant server loads

  17. Access to finance from different finance provider types: Farmer knowledge of the requirements

    OpenAIRE

    Wulandari, Eliana; Meuwissen, Miranda P. M.; Karmana, Maman H.; Oude Lansink, Alfons G. J. M.

    2017-01-01

    Analysing farmer knowledge of the requirements of finance providers can provide valuable insights to policy makers about ways to improve farmers' access to finance. This study compares farmer knowledge of the requirements to obtain finance with the actual requirements set by different finance provider types, and investigates the relation between demographic and socioeconomic factors and farmer knowledge of finance requirements. We use a structured questionnaire to collect data from a sample o...

  18. Accessible Website Content Guidelines for Users with Intellectual Disabilities

    NARCIS (Netherlands)

    Karreman, Joyce; van der Geest, Thea; Buursink, Esmee

    2007-01-01

    Background: The W3C Web Accessibility Initiative has issued guidelines for making websites better and easier to access for people with various disabilities (W3C Web Accessibility Initiative guidelines 1999). - Method: The usability of two versions of a website (a non-adapted site and a site that was

  19. Improved Interference-Free Channel Allocation in Coordinated Multiuser Multi-Antenna Open-Access Small Cells

    KAUST Repository

    Radaydeh, Redha; Zafar, Ammar; Al-Qahtani, Fawaz; Alouini, Mohamed-Slim

    2016-01-01

    This paper investigates low-complexity joint interference avoidance and desired link improvement for single channel allocation in multiuser multi-antenna access points (APs) for open-access small cells. It is considered that an active user is equipped with an atenna array that can be used to suppress interference sources but not to provide spatial diversity. On the other hand, the operation of APs can be coordinated to meet design requirements, and each of which can unconditionally utilize assigned physical channels. Moreover, each AP is equipped with uncorrelated antennas that can be reused simultaneously to serve many active users. The analysis provides new approaches to exploit physical channels, transmit antennas, and APs to mitigate interference, while providing the best possible link gain to an active user through the most suitable interference-free channel. The event of concurrent service requests placed by active users on a specific interference-free channel is discussed for either interference avoidance through identifying unshared channels or desired link improvement via multiuser scheduling. The applicability of the approaches to balance downlink loads is explained, and practical scenarios due to imperfect identification of interference-free channels and/or scheduled user are thoroughly investigated. The developed results are applicable for any statistical and geometric models of the allocated channel to an active user as well as channel conditions of interference users. They can be used to study various performance measures. Numerical and simulation results are presented to explain some outcomes of this work.

  20. Improved Interference-Free Channel Allocation in Coordinated Multiuser Multi-Antenna Open-Access Small Cells

    KAUST Repository

    Radaydeh, Redha

    2016-02-16

    This paper investigates low-complexity joint interference avoidance and desired link improvement for single channel allocation in multiuser multi-antenna access points (APs) for open-access small cells. It is considered that an active user is equipped with an atenna array that can be used to suppress interference sources but not to provide spatial diversity. On the other hand, the operation of APs can be coordinated to meet design requirements, and each of which can unconditionally utilize assigned physical channels. Moreover, each AP is equipped with uncorrelated antennas that can be reused simultaneously to serve many active users. The analysis provides new approaches to exploit physical channels, transmit antennas, and APs to mitigate interference, while providing the best possible link gain to an active user through the most suitable interference-free channel. The event of concurrent service requests placed by active users on a specific interference-free channel is discussed for either interference avoidance through identifying unshared channels or desired link improvement via multiuser scheduling. The applicability of the approaches to balance downlink loads is explained, and practical scenarios due to imperfect identification of interference-free channels and/or scheduled user are thoroughly investigated. The developed results are applicable for any statistical and geometric models of the allocated channel to an active user as well as channel conditions of interference users. They can be used to study various performance measures. Numerical and simulation results are presented to explain some outcomes of this work.

  1. RCSB PDB Mobile: iOS and Android mobile apps to provide data access and visualization to the RCSB Protein Data Bank.

    Science.gov (United States)

    Quinn, Gregory B; Bi, Chunxiao; Christie, Cole H; Pang, Kyle; Prlić, Andreas; Nakane, Takanori; Zardecki, Christine; Voigt, Maria; Berman, Helen M; Bourne, Philip E; Rose, Peter W

    2015-01-01

    The Research Collaboratory for Structural Bioinformatics Protein Data Bank (RCSB PDB) resource provides tools for query, analysis and visualization of the 3D structures in the PDB archive. As the mobile Web is starting to surpass desktop and laptop usage, scientists and educators are beginning to integrate mobile devices into their research and teaching. In response, we have developed the RCSB PDB Mobile app for the iOS and Android mobile platforms to enable fast and convenient access to RCSB PDB data and services. Using the app, users from the general public to expert researchers can quickly search and visualize biomolecules, and add personal annotations via the RCSB PDB's integrated MyPDB service. RCSB PDB Mobile is freely available from the Apple App Store and Google Play (http://www.rcsb.org). © The Author 2014. Published by Oxford University Press.

  2. Accessing northern California earthquake data via Internet

    Science.gov (United States)

    Romanowicz, Barbara; Neuhauser, Douglas; Bogaert, Barbara; Oppenheimer, David

    The Northern California Earthquake Data Center (NCEDC) provides easy access to central and northern California digital earthquake data. It is located at the University of California, Berkeley, and is operated jointly with the U.S. Geological Survey (USGS) in Menlo Park, Calif., and funded by the University of California and the National Earthquake Hazard Reduction Program. It has been accessible to users in the scientific community through Internet since mid-1992.The data center provides an on-line archive for parametric and waveform data from two regional networks: the Northern California Seismic Network (NCSN) operated by the USGS and the Berkeley Digital Seismic Network (BDSN) operated by the Seismographic Station at the University of California, Berkeley.

  3. Developing a Graphical User Interface for the ALSS Crop Planning Tool

    Science.gov (United States)

    Koehlert, Erik

    1997-01-01

    The goal of my project was to create a graphical user interface for a prototype crop scheduler. The crop scheduler was developed by Dr. Jorge Leon and Laura Whitaker for the ALSS (Advanced Life Support System) program. The addition of a system-independent graphical user interface to the crop planning tool will make the application more accessible to a wider range of users and enhance its value as an analysis, design, and planning tool. My presentation will demonstrate the form and functionality of this interface. This graphical user interface allows users to edit system parameters stored in the file system. Data on the interaction of the crew, crops, and waste processing system with the available system resources is organized and labeled. Program output, which is stored in the file system, is also presented to the user in performance-time plots and organized charts. The menu system is designed to guide the user through analysis and decision making tasks, providing some help if necessary. The Java programming language was used to develop this interface in hopes of providing portability and remote operation.

  4. A System for Web-based Access to the HSOS Database

    Science.gov (United States)

    Lin, G.

    Huairou Solar Observing Station's (HSOS) magnetogram and dopplergram are world-class instruments. Access to their data has opened to the world. Web-based access to the data will provide a powerful, convenient tool for data searching and solar physics. It is necessary that our data be provided to users via the Web when it is opened to the world. In this presentation, the author describes general design and programming construction of the system. The system will be generated by PHP and MySQL. The author also introduces basic feature of PHP and MySQL.

  5. Perspectives on access to in vitro fertilization in Portugal

    Directory of Open Access Journals (Sweden)

    S. Silva

    2012-04-01

    Full Text Available OBJECTIVE: To analyze users' reasons for choosing in vitro fertilization treatment in public or private services and to identify their suggestions for improving fertility treatment. METHODS: A qualitative study using an interpretative approach was conducted. Fifteen semi-structured interviews were conducted with patients undergoing in vitro fertilization treatment (nine women, one man and five couples at home or at their workplace in the districts of Viana do Castelo, Braga, Porto and Lisbon, Portugal, between July 2005 and February 2006. RESULTS: Users evaluated access to in vitro fertilization treatment in public and private services based mainly on their individual experiences and called for more access to less costly, faster and friendlier care with suitable facilities, appropriate time management and caring medical providers. These perceptions were also associated with views on the need for fighting stigmatization of infertility, protecting children's rights and guaranteeing sustainability of health care system. Interviewees sought to balance reduced waiting time and more attentive care with costs involved. The choice of services depended on the users' purchase power and place of residence and availability of attentive care. CONCLUSIONS: Current national policies on in vitro fertilization treatment meet user's demands of promoting access to, and quality, availability and affordability of in vitro fertilization treatment. However, their focus on legal regulation and technical-scientific aspects contrasts with the users' emphasis on reimbursement, insurance coverage and focus on emotional aspects of the treatment. The study showed these policies should ensure insurance coverage, participation of user representatives in the National Council for Assisted Reproductive Technology, promotion of infertility research and certification of fertility laboratories.

  6. Providing Music Notation Services over Internet

    OpenAIRE

    Solomon , Mike; Fober , Dominique; Orlarey , Yann; Letz , Stéphane

    2014-01-01

    International audience; The GUIDO project gathers a textual format for music representation, a rendering engine operating on this format, and a library providing a high level support for all the services related to the GUIDO format and it's graphic rendering. The project includes now an HTTP server that allows users to access the musical-score-related functions in the API of the GUIDOEngine library via uniform resource identifiers (URIs). This article resumes the core tenants of the REST arch...

  7. PROVIDING PLANT DATA ANALYTICS THROUGH A SEAMLESS DIGITAL ENVIRONMENT

    Energy Technology Data Exchange (ETDEWEB)

    Bly, Aaron; Oxstrand, Johanna

    2017-06-01

    As technology continues to evolve and become more integrated into a worker’s daily routine in the Nuclear Power industry the need for easy access to data becomes a priority. Not only does the need for data increase but the amount of data collected increases. In most cases the data is collected and stored in various software applications, many of which are legacy systems, which do not offer any other option to access the data except through the application’s user interface. Furthermore the data gets grouped in “silos” according to work function and not necessarily by subject. Hence, in order to access all the information needed for a particular task or analysis one may have to access multiple applications to gather all the data needed. The industry and the research community have identified the need for a digital architecture and more importantly the need for a Seamless Digital Environment. An SDE provides a means to access multiple applications, gather the data points needed, conduct the analysis requested, and present the result to the user with minimal or no effort by the user. In addition, the nuclear utilities have identified the need for research focused on data analytics. The effort should develop and evaluate use cases for data mining and analytics for employing information from plant sensors and database for use in developing improved business analytics. Idaho National Laboratory is leading such effort, which is conducted in close collaboration with vendors, nuclear utilities, Institute of Nuclear Power Operations, and Electric Power Research Institute. The goal of the study is to research potential approaches to building an analytics solution for equipment reliability, on a small scale, focusing on either a single piece of equipment or a single system. The analytics solution will likely consist of a data integration layer, predictive and machine learning layer and the user interface layer that will display the output of the analysis in a straight

  8. Biometrics: Accessibility challenge or opportunity?

    Science.gov (United States)

    Blanco-Gonzalo, Ramon; Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael

    2018-01-01

    Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products.

  9. Biometrics: Accessibility challenge or opportunity?

    Science.gov (United States)

    Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael

    2018-01-01

    Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products. PMID:29565989

  10. The NASA Regional Planetary Image Facility (RPIF) Network: A Key Resource for Accessing and Using Planetary Spatial Data

    Science.gov (United States)

    Hagerty, J. J.

    2017-12-01

    The role of the NASA Regional Planetary Image Facility (RPIF) Network is evolving as new science-ready spatial data products continue to be created and as key historical planetary data sets are digitized. Specifically, the RPIF Network is poised to serve specialized knowledge and services in a user-friendly manner that removes most barriers to locating, accessing, and exploiting planetary spatial data, thus providing a critical data access role within a spatial data infrastructure. The goal of the Network is to provide support and training to a broad audience of planetary spatial data users. In an effort to meet the planetary science community's evolving needs, we are focusing on the following objectives: Maintain and improve the delivery of historical data accumulated over the past four decades so as not to lose critical, historical information. This is being achieved by systematically digitizing fragile materials, allowing increased access and preserving them at the same time. Help users locate, access, visualize, and exploit planetary science data. Many of the facilities have begun to establish Guest User Facilities that allow researchers to use and/or be trained on GIS equipment and other specialized tools like Socet Set/GXP photogrammetry workstations for generating digital elevation maps. Improve the connection between the Network nodes while also leveraging the unique resources of each node. To achieve this goal, each facility is developing and sharing searchable databases of their collections, including robust metadata in a standards compliant way. Communicate more effectively and regularly with the planetary science community in an effort to make potential users aware of resources and services provided by the Network, while also engaging community members in discussions about community needs. Provide a regional resource for the science community, colleges, universities, museums, media, and the public to access planetary data. Introduce new strategies for

  11. Online medical books: their availability and an assessment of how health sciences libraries provide access on their public Websites.

    Science.gov (United States)

    MacCall, Steven L

    2006-01-01

    The objective of this study was to determine the number and topical range of available online medical books and to assess how health sciences libraries were providing access to these resources on their public Websites. The collection-based evaluative technique of list checking was used to assess the number and topical range of online medical books of the six largest publishers. Publisher inventory lists were downloaded over a two-day period (May 16-17, 2004). Titles were counted and compared with the 2003 Brandon/Hill list. A sample of health sciences libraries was subsequently derived by consulting the 2004 "Top Medical Schools-Research" in U.S. News & World Report. Bibliographic and bibliothecal access methods were evaluated based on an inspection of the publicly available Websites of the sample libraries. Of 318 currently published online medical books, 151 (47%) were Brandon/Hill titles covering 42 of 59 Brandon/Hill topics (71%). These 151 titles represented 22% (N = 672) of the Brandon/Hill list, which further broke down as 52 minimal core, 41 initial purchase, and 58 other recommended Brandon/Hill titles. These numbers represented 50%, 28%, and 12%, respectively, of all Brandon/Hill titles corresponding to those categories. In terms of bibliographic access, 20 of 21 of sampled libraries created catalog records for their online medical books, 1 of which also provided analytical access at the chapter level, and none provided access at the chapter section level. Of the 21 libraries, 19 had library Website search engines that provided title-level access and 4 provided access at the chapter level and none that at the chapter section level. For bibliothecal access, 19 of 21 libraries provided title-level access to medical books, 8 of which provided classified and alphabetic arrangements, 1 provided a classified arrangement only, and 10 provided an alphabetic arrangement only. No library provided a bibliothecal arrangement for medical book chapters or chapter

  12. Virtual Hubs for facilitating access to Open Data

    Science.gov (United States)

    Mazzetti, Paolo; Latre, Miguel Á.; Ernst, Julia; Brumana, Raffaella; Brauman, Stefan; Nativi, Stefano

    2015-04-01

    In October 2014 the ENERGIC-OD (European NEtwork for Redistributing Geospatial Information to user Communities - Open Data) project, funded by the European Union under the Competitiveness and Innovation framework Programme (CIP), has started. In response to the EU call, the general objective of the project is to "facilitate the use of open (freely available) geographic data from different sources for the creation of innovative applications and services through the creation of Virtual Hubs". In ENERGIC-OD, Virtual Hubs are conceived as information systems supporting the full life cycle of Open Data: publishing, discovery and access. They facilitate the use of Open Data by lowering and possibly removing the main barriers which hampers geo-information (GI) usage by end-users and application developers. Data and data services heterogeneity is recognized as one of the major barriers to Open Data (re-)use. It imposes end-users and developers to spend a lot of effort in accessing different infrastructures and harmonizing datasets. Such heterogeneity cannot be completely removed through the adoption of standard specifications for service interfaces, metadata and data models, since different infrastructures adopt different standards to answer to specific challenges and to address specific use-cases. Thus, beyond a certain extent, heterogeneity is irreducible especially in interdisciplinary contexts. ENERGIC-OD Virtual Hubs address heterogeneity adopting a mediation and brokering approach: specific components (brokers) are dedicated to harmonize service interfaces, metadata and data models, enabling seamless discovery and access to heterogeneous infrastructures and datasets. As an innovation project, ENERGIC-OD will integrate several existing technologies to implement Virtual Hubs as single points of access to geospatial datasets provided by new or existing platforms and infrastructures, including INSPIRE-compliant systems and Copernicus services. ENERGIC OD will deploy a

  13. Overview of Graphical User Interfaces.

    Science.gov (United States)

    Hulser, Richard P.

    1993-01-01

    Discussion of graphical user interfaces for online public access catalogs (OPACs) covers the history of OPACs; OPAC front-end design, including examples from Indiana University and the University of Illinois; and planning and implementation of a user interface. (10 references) (EA)

  14. Which Users Should Be the Focus of Mobile Personal Health Records? Analysis of User Characteristics Influencing Usage of a Tethered Mobile Personal Health Record.

    Science.gov (United States)

    Lee, Guna; Park, Joong Yeol; Shin, Soo-Yong; Hwang, Jong Su; Ryu, Hyeon Jeong; Lee, Jae Ho; Bates, David W

    2016-05-01

    This study was conducted to analyze the usage pattern of a hospital-tethered mobile personal health records (m-PHRs) application named My Chart in My Hand (MCMH) and to identify user characteristics that influence m-PHR usage. Access logs to MCMH and its menus were collected for a total of 18 months, from August 2011 to January 2013. Usage patterns between users without a patient identification number (ID) and users with a patient ID were compared. Users with a patient ID were divided into light and heavy user groups by the median number of monthly access. Multiple linear regression models were used to assess MCMH usage pattern by characteristics of MCMH user with a patient ID. The total number of MCMH logins was 105,603, and the median number of accesses was 15 times. Users (n = 7,096) mostly accessed the "My Chart" menu, but "OPD [outpatient department] Service Support" and "Health Management" menus were also frequently used. Patients with chronic diseases, experience of hospital visits including emergency room and OPD, and age group of 0-19 years were more frequently found among users with a patient ID (n = 2,186) (p < 0.001). A similar trend was found in the heavy user group (n = 1,123). Submenus of laboratory result, online appointment, and medication lists that were accessed mostly by users with a patient ID were associated with OPD visit and chronic diseases. This study showed that focuses on patients with chronic disease and more hospital visits and empowerment functions in a tethered m-PHR would be helpful to pursue the extensive use.

  15. Primary user localisation and uplink resource allocation in orthogonal frequency division multiple access cognitive radio systems

    KAUST Repository

    Nam, Haewoon

    2015-05-21

    In cognitive radio networks, secondary users (SUs) can share spectrum with primary users (PUs) under the condition that no interference is caused to the PUs. To evaluate the interference imposed to the PUs, the cognitive systems discussed in the literature usually assume that the channel state information (CSI) of the link from a secondary transmitter to a primary receiver (interference link) is known at the secondary transmitter. However, this assumption may often be impractical in cognitive radio systems, since the PUs need to be oblivious to the presence of the SUs. The authors first discuss PU localisation and then introduce an uplink resource allocation algorithm for orthogonal frequency division multiple access-based cognitive radio systems, where relative location information between primary and SUs is used instead of CSI of the interference link to estimate the interference. Numerical and simulation results show that it is indeed effective to use location information as a part of resource allocation and thus a near-optimal capacity is achieved. © The Institution of Engineering and Technology 2015.

  16. Access/AML -

    Data.gov (United States)

    Department of Transportation — The AccessAML is a web-based internet single application designed to reduce the vulnerability associated with several accounts assinged to a single users. This is a...

  17. User Matching with Relation to the Stable Marriage Problem in Cognitive Radio Networks

    KAUST Repository

    Hamza, Doha R.

    2017-03-20

    We consider a network comprised of multiple primary users (PUs) and multiple secondary users (SUs), where the SUs seek access to a set of orthogonal channels each occupied by one PU. Only one SU is allowed to coexist with a given PU. We propose a distributed matching algorithm to pair the network users, where a Stackelberg game model is assumed for the interaction between the paired PU and SU. The selected secondary is given access in exchange for monetary compensation to the primary. The PU optimizes the interference price it charges to a given SU and the power allocation to maintain communication. The SU optimizes its power demand so as to maximize its utility. Our algorithm provides a unique stable matching. Numerical results indicate the advantage of the proposed algorithm over other reference schemes.

  18. A novel asynchronous access method with binary interfaces

    Directory of Open Access Journals (Sweden)

    Torres-Solis Jorge

    2008-10-01

    Full Text Available Abstract Background Traditionally synchronous access strategies require users to comply with one or more time constraints in order to communicate intent with a binary human-machine interface (e.g., mechanical, gestural or neural switches. Asynchronous access methods are preferable, but have not been used with binary interfaces in the control of devices that require more than two commands to be successfully operated. Methods We present the mathematical development and evaluation of a novel asynchronous access method that may be used to translate sporadic activations of binary interfaces into distinct outcomes for the control of devices requiring an arbitrary number of commands to be controlled. With this method, users are required to activate their interfaces only when the device under control behaves erroneously. Then, a recursive algorithm, incorporating contextual assumptions relevant to all possible outcomes, is used to obtain an informed estimate of user intention. We evaluate this method by simulating a control task requiring a series of target commands to be tracked by a model user. Results When compared to a random selection, the proposed asynchronous access method offers a significant reduction in the number of interface activations required from the user. Conclusion This novel access method offers a variety of advantages over traditionally synchronous access strategies and may be adapted to a wide variety of contexts, with primary relevance to applications involving direct object manipulation.

  19. Access control based on attribute certificates for medical intranet applications.

    Science.gov (United States)

    Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M

    2001-01-01

    Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.

  20. CSTEM User Manual

    Science.gov (United States)

    Hartle, M.; McKnight, R. L.

    2000-01-01

    This manual is a combination of a user manual, theory manual, and programmer manual. The reader is assumed to have some previous exposure to the finite element method. This manual is written with the idea that the CSTEM (Coupled Structural Thermal Electromagnetic-Computer Code) user needs to have a basic understanding of what the code is actually doing in order to properly use the code. For that reason, the underlying theory and methods used in the code are described to a basic level of detail. The manual gives an overview of the CSTEM code: how the code came into existence, a basic description of what the code does, and the order in which it happens (a flowchart). Appendices provide a listing and very brief description of every file used by the CSTEM code, including the type of file it is, what routine regularly accesses the file, and what routine opens the file, as well as special features included in CSTEM.

  1. ODISEES: A New Paradigm in Data Access

    Science.gov (United States)

    Huffer, E.; Little, M. M.; Kusterer, J.

    2013-12-01

    As part of its ongoing efforts to improve access to data, the Atmospheric Science Data Center has developed a high-precision Earth Science domain ontology (the 'ES Ontology') implemented in a graph database ('the Semantic Metadata Repository') that is used to store detailed, semantically-enhanced, parameter-level metadata for ASDC data products. The ES Ontology provides the semantic infrastructure needed to drive the ASDC's Ontology-Driven Interactive Search Environment for Earth Science ('ODISEES'), a data discovery and access tool, and will support additional data services such as analytics and visualization. The ES ontology is designed on the premise that naming conventions alone are not adequate to provide the information needed by prospective data consumers to assess the suitability of a given dataset for their research requirements; nor are current metadata conventions adequate to support seamless machine-to-machine interactions between file servers and end-user applications. Data consumers need information not only about what two data elements have in common, but also about how they are different. End-user applications need consistent, detailed metadata to support real-time data interoperability. The ES ontology is a highly precise, bottom-up, queriable model of the Earth Science domain that focuses on critical details about the measurable phenomena, instrument techniques, data processing methods, and data file structures. Earth Science parameters are described in detail in the ES Ontology and mapped to the corresponding variables that occur in ASDC datasets. Variables are in turn mapped to well-annotated representations of the datasets that they occur in, the instrument(s) used to create them, the instrument platforms, the processing methods, etc., creating a linked-data structure that allows both human and machine users to access a wealth of information critical to understanding and manipulating the data. The mappings are recorded in the Semantic Metadata

  2. Towards a standard licensing scheme for the access and use of satellite earth observation data for disaster management

    Science.gov (United States)

    Clark, Nathan E.

    2017-10-01

    This paper explores from the view of the data recipient and user the complexities of creating a common licensing scheme for the access and use of satellite earth observation (EO) data in international disaster management (DM) activities. EO data contributions in major disaster events often involve numerous data providers with separate licensing mechanisms for controlling the access, uses, and distribution of data by the end users. A lack of standardization among the terminology, wording, and conditions within these licenses creates a complex legal environment for users, and often prevents them from using, sharing and combining datasets in an effective and timely manner. It also creates uncertainty among data providers as to the types of licensing controls that should be applied in disaster scenarios. This paper builds from an ongoing comparative analysis of the common and conflicting conditions among data licenses that must be addressed in order to facilitate easier access and use of EO data within the DM sector and offers recommendations towards the alignment of the structural and technical aspects of licenses among data providers.

  3. Free Access to Point of Care Resource Results in Increased Use and Satisfaction by Rural Healthcare Providers

    Directory of Open Access Journals (Sweden)

    Lindsay Alcock

    2016-12-01

    Full Text Available A Review of: Eldredge, J. D., Hall, L. J., McElfresh, K. R., Warner, T. D., Stromberg, T. L., Trost, J. T., & Jelinek, D. A. (2016. Rural providers’ access to online resources: A randomized controlled trial. Journal of the Medical Library Association, 104(1, 33-41. http://dx.doi.org/10.3163/1536-5050.104.1.005 Objective – To determine whether free access to the point of care (PoC resource Dynamed or the electronic book collection AccessMedicine was more useful to rural health care providers in answering clinical questions in terms of usage and satisfaction. Design – Randomized controlled trial. Setting – Rural New Mexico. Subjects – Twenty-eight health care providers (physicians, nurses, physician assistants, and pharmacists with no reported access to PoC resources, (specifically Dynamed and AccessMedicine or electronic textbook collections prior to enrollment.

  4. Data Access System for Hydrology

    Science.gov (United States)

    Whitenack, T.; Zaslavsky, I.; Valentine, D.; Djokic, D.

    2007-12-01

    As part of the CUAHSI HIS (Consortium of Universities for the Advancement of Hydrologic Science, Inc., Hydrologic Information System), the CUAHSI HIS team has developed Data Access System for Hydrology or DASH. DASH is based on commercial off the shelf technology, which has been developed in conjunction with a commercial partner, ESRI. DASH is a web-based user interface, developed in ASP.NET developed using ESRI ArcGIS Server 9.2 that represents a mapping, querying and data retrieval interface over observation and GIS databases, and web services. This is the front end application for the CUAHSI Hydrologic Information System Server. The HIS Server is a software stack that organizes observation databases, geographic data layers, data importing and management tools, and online user interfaces such as the DASH application, into a flexible multi- tier application for serving both national-level and locally-maintained observation data. The user interface of the DASH web application allows online users to query observation networks by location and attributes, selecting stations in a user-specified area where a particular variable was measured during a given time interval. Once one or more stations and variables are selected, the user can retrieve and download the observation data for further off-line analysis. The DASH application is highly configurable. The mapping interface can be configured to display map services from multiple sources in multiple formats, including ArcGIS Server, ArcIMS, and WMS. The observation network data is configured in an XML file where you specify the network's web service location and its corresponding map layer. Upon initial deployment, two national level observation networks (USGS NWIS daily values and USGS NWIS Instantaneous values) are already pre-configured. There is also an optional login page which can be used to restrict access as well as providing a alternative to immediate downloads. For large request, users would be notified via

  5. Accessing the SEED genome databases via Web services API: tools for programmers.

    Science.gov (United States)

    Disz, Terry; Akhter, Sajia; Cuevas, Daniel; Olson, Robert; Overbeek, Ross; Vonstein, Veronika; Stevens, Rick; Edwards, Robert A

    2010-06-14

    The SEED integrates many publicly available genome sequences into a single resource. The database contains accurate and up-to-date annotations based on the subsystems concept that leverages clustering between genomes and other clues to accurately and efficiently annotate microbial genomes. The backend is used as the foundation for many genome annotation tools, such as the Rapid Annotation using Subsystems Technology (RAST) server for whole genome annotation, the metagenomics RAST server for random community genome annotations, and the annotation clearinghouse for exchanging annotations from different resources. In addition to a web user interface, the SEED also provides Web services based API for programmatic access to the data in the SEED, allowing the development of third-party tools and mash-ups. The currently exposed Web services encompass over forty different methods for accessing data related to microbial genome annotations. The Web services provide comprehensive access to the database back end, allowing any programmer access to the most consistent and accurate genome annotations available. The Web services are deployed using a platform independent service-oriented approach that allows the user to choose the most suitable programming platform for their application. Example code demonstrate that Web services can be used to access the SEED using common bioinformatics programming languages such as Perl, Python, and Java. We present a novel approach to access the SEED database. Using Web services, a robust API for access to genomics data is provided, without requiring large volume downloads all at once. The API ensures timely access to the most current datasets available, including the new genomes as soon as they come online.

  6. Nuclear power plant control room crew task analysis database: SEEK system. Users manual

    International Nuclear Information System (INIS)

    Burgy, D.; Schroeder, L.

    1984-05-01

    The Crew Task Analysis SEEK Users Manual was prepared for the Office of Nuclear Regulatory Research of the US Nuclear Regulatory Commission. It is designed for use with the existing computerized Control Room Crew Task Analysis Database. The SEEK system consists of a PR1ME computer with its associated peripherals and software augmented by General Physics Corporation SEEK database management software. The SEEK software programs provide the Crew Task Database user with rapid access to any number of records desired. The software uses English-like sentences to allow the user to construct logical sorts and outputs of the task data. Given the multiple-associative nature of the database, users can directly access the data at the plant, operating sequence, task or element level - or any combination of these levels. A complete description of the crew task data contained in the database is presented in NUREG/CR-3371, Task Analysis of Nuclear Power Plant Control Room Crews (Volumes 1 and 2)

  7. Mining User spatiotemporal Behavior in Geospatial Cyberinfrastructure --using GEOSS Clearinghouse as an example

    Science.gov (United States)

    XIA, J.; Yang, C.; Liu, K.; Huang, Q.; Li, Z.

    2013-12-01

    Big Data becomes increasingly important in almost all scientific domains, especially in geoscience where hundreds to millions of sensors are collecting data of the Earth continuously (Whitehouse News 2012). With the explosive growth of data, various Geospatial Cyberinfrastructure (GCI) (Yang et al. 2010) components are developed to manage geospatial resources and provide data access for the public. These GCIs are accessed by different users intensively on a daily basis. However, little research has been done to analyze the spatiotemporal patterns of user behavior, which could be critical to the management of Big Data and the operation of GCIs (Yang et al. 2011). For example, the spatiotemporal distribution of end users helps us better arrange and locate GCI computing facilities. A better indexing and caching mechanism could be developed based on the spatiotemporal pattern of user queries. In this paper, we use GEOSS Clearinghouse as an example to investigate spatiotemporal patterns of user behavior in GCIs. The investigation results show that user behaviors are heterogeneous but with patterns across space and time. Identified patterns include (1) the high access frequency regions; (2) local interests; (3) periodical accesses and rush hours; (4) spiking access. Based on identified patterns, this presentation reports several solutions to better support the operation of the GEOSS Clearinghouse and other GCIs. Keywords: Big Data, EarthCube, CyberGIS, Spatiotemporal Thinking and Computing, Data Mining, User Behavior Reference: Fayyad, U. M., Piatetsky-Shapiro, G., Smyth, P., & Uthurusamy, R. 1996. Advances in knowledge discovery and data mining. Whitehouse. 2012. Obama administration unveils 'BIG DATA' initiative: announces $200 million in new R&D investments. Whitehouse. Retrieved from http://www.whitehouse.gov/sites/default/files/microsites/ostp/big_data_press_release_final_2.pdf [Accessed 14 June 2013] Yang, C., Wu, H., Huang, Q., Li, Z., & Li, J. 2011. Using spatial

  8. Auditing the Accessibility of Massive Open Online Courses (MOOCs).

    Science.gov (United States)

    Iniesto, Francisco; McAndrew, Patrick; Minocha, Shailey; Coughlan, Tim

    2017-01-01

    The outcome from the research being reported in this paper is the design of an accessibility audit to evaluate Massive Open Online Courses (MOOCs) for accessibility and to arrive at solutions and adaptations that can meet user needs. This accessibility audit includes expert-based heuristic evaluations and user-based evaluations of the MOOC platforms and individual courses.

  9. An approach towards context-sensitive and user-adapted access to heterogeneous data sources, illustrated in the television domain

    NARCIS (Netherlands)

    Bellekens, P.A.E.

    2010-01-01

    In a variety of domains, developers nowadays are struggling with the dilemma of how they can provide a more personal service to their users. A more personal service can for example be facilitated by offering user-adapted search, generating recommendations, personalized content navigation,

  10. Provider Perspectives on School-Based Mental Health for Urban Minority Youth: Access and Services

    Science.gov (United States)

    Gamble, Brandon E.; Lambros, Katina M.

    2014-01-01

    This article provides results from a qualitative study on the efforts of school-based mental health providers (SBMHPs) who serve students in urban, suburban, and ethnically diverse settings to help families access quality mental health services. School-based mental health plays a key role in the provision of direct and indirect intervention…

  11. TRENDS: A flight test relational database user's guide and reference manual

    Science.gov (United States)

    Bondi, M. J.; Bjorkman, W. S.; Cross, J. L.

    1994-01-01

    This report is designed to be a user's guide and reference manual for users intending to access rotocraft test data via TRENDS, the relational database system which was developed as a tool for the aeronautical engineer with no programming background. This report has been written to assist novice and experienced TRENDS users. TRENDS is a complete system for retrieving, searching, and analyzing both numerical and narrative data, and for displaying time history and statistical data in graphical and numerical formats. This manual provides a 'guided tour' and a 'user's guide' for the new and intermediate-skilled users. Examples for the use of each menu item within TRENDS is provided in the Menu Reference section of the manual, including full coverage for TIMEHIST, one of the key tools. This manual is written around the XV-15 Tilt Rotor database, but does include an appendix on the UH-60 Blackhawk database. This user's guide and reference manual establishes a referrable source for the research community and augments NASA TM-101025, TRENDS: The Aeronautical Post-Test, Database Management System, Jan. 1990, written by the same authors.

  12. Non-professional user`s understanding of Geographic Information

    DEFF Research Database (Denmark)

    Arleth, Mette

    2003-01-01

    of digital media, including online access to a variety of GI-based services; maps, online Geographic information systems, interactive 3D models etc. However, can we expect that a citizen, who has no relevant professional basis for understanding the concept geographic information, be able to use GI......-based online services and comprehend the information contents? Using the Gi-based online services qualitatively in the participatory process obviously requires knowledge of the non-professional user`s understanding and use of GI. This paper discusses the needs for research into this field as well as relevant...

  13. Advancing nuclear technology and research. The advanced test reactor national scientific user facility

    Energy Technology Data Exchange (ETDEWEB)

    Benson, Jeff B; Marshall, Frances M [Idaho National Laboratory, Idaho Falls, ID (United States); Allen, Todd R [Univ. of Wisconsin, Madison, WI (United States)

    2012-03-15

    The Advanced Test Reactor (ATR), at the Idaho National Laboratory (INL), is one of the world's premier test reactors for providing the capability for studying the effects of intense neutron and gamma radiation on reactor materials and fuels. The INL also has several hot cells and other laboratories in which irradiated material can be examined to study material radiation effects. In 2007 the US Department of Energy (DOE) designated the ATR as a National Scientific User Facility (NSUF) to facilitate greater access to the ATR and the associated INL laboratories for material testing research. The mission of the ATR NSUF is to provide access to world-class facilities, thereby facilitating the advancement of nuclear science and technology. Cost free access to the ATR, INL post irradiation examination facilities, and partner facilities is granted based on technical merit to U.S. university-led experiment teams conducting non-proprietary research. Proposals are selected via independent technical peer review and relevance to United States Department of Energy. To increase overall research capability, ATR NSUF seeks to form strategic partnerships with university facilities that add significant nuclear research capability to the ATR NSUF and are accessible to all ATR NSUF users. (author)

  14. Characteristics of spent fuel, high-level waste, and other radioactive wastes which may require long-term isolation: Appendix 2B, User's guide to the LWR assemblies data base, Appendix 2C, User's guide to the LWR radiological data base, Appendix 2D, User's guide to the LWR quantities data base

    International Nuclear Information System (INIS)

    1987-12-01

    This User's Guide for the LWR Assemblies data base system is part of the Characteristics Data Base being developed under the Waste Systems Data Development Program. The objective of the LWR Assemblies data base is to provide access at the personal computer level to information about fuel assemblies used in light-water reactors. The information available is physical descriptions of intact fuel assemblies and radiological descriptions of spent fuel disassembly hardware. The LWR Assemblies data base is a user-oriented menu driven system. Each menu is instructive about its use. Section 5 of this guide provides a sample session with the data base to assist the user

  15. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: A privacy-protecting remote access system for health-related research and evaluation☆

    Science.gov (United States)

    Jones, Kerina H.; Ford, David V.; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J.; Heaven, Martin L.; Thayer, Daniel S.; McNerney, Cynthia L.; Lyons, Ronan A.

    2014-01-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. PMID:24440148

  16. Monitoring Accessibility Services in Digital Television

    Directory of Open Access Journals (Sweden)

    Francisco Utray

    2012-01-01

    Full Text Available This paper addresses methodology and tools applied to the monitoring of accessibility services in digital television at a time when the principles of accessibility and design are being considered in all new audiovisual media communication services. The main objective of this research is to measure the quality and quantity of existing accessibility services offered by digital terrestrial television (DTT. The preliminary results, presented here, offer the development of a prototype for automatic monitoring and a methodology for obtaining quality measurements, along with the conclusions drawn by initial studies carried out in Spain. The recent approval of the UN Convention on the Rights of Persons with Disabilities gives special relevance to this research because it provides valuable guidelines to help set the priorities to improve services currently available to users.

  17. A RESTful API for accessing microbial community data for MG-RAST.

    Directory of Open Access Journals (Sweden)

    Andreas Wilke

    2015-01-01

    Full Text Available Metagenomic sequencing has produced significant amounts of data in recent years. For example, as of summer 2013, MG-RAST has been used to annotate over 110,000 data sets totaling over 43 Terabases. With metagenomic sequencing finding even wider adoption in the scientific community, the existing web-based analysis tools and infrastructure in MG-RAST provide limited capability for data retrieval and analysis, such as comparative analysis between multiple data sets. Moreover, although the system provides many analysis tools, it is not comprehensive. By opening MG-RAST up via a web services API (application programmers interface we have greatly expanded access to MG-RAST data, as well as provided a mechanism for the use of third-party analysis tools with MG-RAST data. This RESTful API makes all data and data objects created by the MG-RAST pipeline accessible as JSON objects. As part of the DOE Systems Biology Knowledgebase project (KBase, http://kbase.us we have implemented a web services API for MG-RAST. This API complements the existing MG-RAST web interface and constitutes the basis of KBase's microbial community capabilities. In addition, the API exposes a comprehensive collection of data to programmers. This API, which uses a RESTful (Representational State Transfer implementation, is compatible with most programming environments and should be easy to use for end users and third parties. It provides comprehensive access to sequence data, quality control results, annotations, and many other data types. Where feasible, we have used standards to expose data and metadata. Code examples are provided in a number of languages both to show the versatility of the API and to provide a starting point for users. We present an API that exposes the data in MG-RAST for consumption by our users, greatly enhancing the utility of the MG-RAST service.

  18. A RESTful API for accessing microbial community data for MG-RAST.

    Science.gov (United States)

    Wilke, Andreas; Bischof, Jared; Harrison, Travis; Brettin, Tom; D'Souza, Mark; Gerlach, Wolfgang; Matthews, Hunter; Paczian, Tobias; Wilkening, Jared; Glass, Elizabeth M; Desai, Narayan; Meyer, Folker

    2015-01-01

    Metagenomic sequencing has produced significant amounts of data in recent years. For example, as of summer 2013, MG-RAST has been used to annotate over 110,000 data sets totaling over 43 Terabases. With metagenomic sequencing finding even wider adoption in the scientific community, the existing web-based analysis tools and infrastructure in MG-RAST provide limited capability for data retrieval and analysis, such as comparative analysis between multiple data sets. Moreover, although the system provides many analysis tools, it is not comprehensive. By opening MG-RAST up via a web services API (application programmers interface) we have greatly expanded access to MG-RAST data, as well as provided a mechanism for the use of third-party analysis tools with MG-RAST data. This RESTful API makes all data and data objects created by the MG-RAST pipeline accessible as JSON objects. As part of the DOE Systems Biology Knowledgebase project (KBase, http://kbase.us) we have implemented a web services API for MG-RAST. This API complements the existing MG-RAST web interface and constitutes the basis of KBase's microbial community capabilities. In addition, the API exposes a comprehensive collection of data to programmers. This API, which uses a RESTful (Representational State Transfer) implementation, is compatible with most programming environments and should be easy to use for end users and third parties. It provides comprehensive access to sequence data, quality control results, annotations, and many other data types. Where feasible, we have used standards to expose data and metadata. Code examples are provided in a number of languages both to show the versatility of the API and to provide a starting point for users. We present an API that exposes the data in MG-RAST for consumption by our users, greatly enhancing the utility of the MG-RAST service.

  19. CameraCast: flexible access to remote video sensors

    Science.gov (United States)

    Kong, Jiantao; Ganev, Ivan; Schwan, Karsten; Widener, Patrick

    2007-01-01

    New applications like remote surveillance and online environmental or traffic monitoring are making it increasingly important to provide flexible and protected access to remote video sensor devices. Current systems use application-level codes like web-based solutions to provide such access. This requires adherence to user-level APIs provided by such services, access to remote video information through given application-specific service and server topologies, and that the data being captured and distributed is manipulated by third party service codes. CameraCast is a simple, easily used system-level solution to remote video access. It provides a logical device API so that an application can identically operate on local vs. remote video sensor devices, using its own service and server topologies. In addition, the application can take advantage of API enhancements to protect remote video information, using a capability-based model for differential data protection that offers fine grain control over the information made available to specific codes or machines, thereby limiting their ability to violate privacy or security constraints. Experimental evaluations of CameraCast show that the performance of accessing remote video information approximates that of accesses to local devices, given sufficient networking resources. High performance is also attained when protection restrictions are enforced, due to an efficient kernel-level realization of differential data protection.

  20. Public Access to NASA's Earth Science Data

    Science.gov (United States)

    Behnke, J.; James, N.

    2013-12-01

    Many steps have been taken over the past 20 years to make NASA's Earth Science data more accessible to the public. The data collected by NASA represent a significant public investment in research. NASA holds these data in a public trust to promote comprehensive, long-term Earth science research. Consequently, NASA developed a free, open and non-discriminatory policy consistent with existing international policies to maximize access to data and to keep user costs as low as possible. These policies apply to all data archived, maintained, distributed or produced by NASA data systems. The Earth Observing System Data and Information System (EOSDIS) is a major core capability within NASA Earth Science Data System Program. EOSDIS is designed to ingest, process, archive, and distribute data from approximately 90 instruments. Today over 6800 data products are available to the public through the EOSDIS. Last year, EOSDIS distributed over 636 million science data products to the user community, serving over 1.5 million distinct users. The system supports a variety of science disciplines including polar processes, land cover change, radiation budget, and most especially global climate change. A core philosophy of EOSDIS is that the general user is best served by providing discipline specific support for the data. To this end, EOSDIS has collocated NASA Earth science data with centers of science discipline expertise, called Distributed Active Archive Centers (DAACs). DAACs are responsible for data management, archive and distribution of data products. There are currently twelve DAACs in the EOSDIS system. The centralized entrance point to the NASA Earth Science data collection can be found at http://earthdata.nasa.gov. Over the years, we have developed several methods for determining needs of the user community including use of the American Customer Satisfaction Index survey and a broad metrics program. Annually, we work with an independent organization (CFI Group) to send this

  1. Changing access to mental health care and social support when people living with HIV/AIDS become service providers.

    Science.gov (United States)

    Li, Alan Tai-Wai; Wales, Joshua; Wong, Josephine Pui-Hing; Owino, Maureen; Perreault, Yvette; Miao, Andrew; Maseko, Precious; Guiang, Charlie

    2015-01-01

    As people living with HIV/AIDS (PHAs) achieve more stable health, many have taken on active peer support and professional roles within AIDS service organizations. Although the increased engagement has been associated with many improved health outcomes, emerging program and research evidence have identified new challenges associated with such transition. This paper reports on the results of a qualitative interpretive study that explored the effect of this role transition on PHA service providers' access to mental health support and self care. A total of 27 PHA service providers of diverse ethno-racial backgrounds took part in the study. Results show that while role transition often improves access to financial and health-care benefits, it also leads to new stress from workload demands, emotional triggers from client's narratives, feeling of burnout from over-immersion in HIV at both personal and professional levels, and diminished self care. Barriers to seeking support included: concerns regarding confidentiality; self-imposed and enacted stigma associated with accessing mental health services; and boundary issues resulting from changes in relationships with peers and other service providers. Evolving support mechanisms included: new formal and informal peer support networks amongst colleagues or other PHA service providers to address both personal and professional challenges, and having access to professional support offered through the workplace. The findings suggest the need for increased organizational recognition of HIV support work as a form of emotional labor that places complex demands on PHA service providers. Increased access to employer-provided mental health services, supportive workplace policies, and adequate job-specific training will contribute to reduced work-related stress. Community level strategies that support expansion of social networks amongst PHA service providers would reduce isolation. Systemic policies to increase access to insurance

  2. Receiver Operator Characteristic Tools Graphic User Interface Extension for R Commander

    Directory of Open Access Journals (Sweden)

    Daniel Corneliu LEUCUŢA

    2015-12-01

    Full Text Available Background: Receiver Operator Characteristic (ROC curve, is a graphical plot which presents the performance of a binary classifier when the discrimination cutoff is varied. The aim of this work was to create an extension for R Commander that offers a graphical user interface for Receiver Operator Characteristic tools provided by several existing command line accessible packages like pROC and ROCR. Material and Methods: The extension was built and tested with R version 3.2.0 and R Commander 2.1-7. Results: We built an extension called RcmdrPlugin.ROC that we uploaded on the CRAN servers. The extension adds a new menu called ROC, along with two submenus pROC and ROCR that broadly corresponds to commands available to access the functions of these packages. The pROC menu offers several commands: to plot a ROC curve for a dataset or for a logistic regression model, to compare paired and unpaired ROC curves, each providing the following tabs: General (to select the variables for the analysis, and options for switching cases with controls; Smoothing (allowing the user to select different types of smoothing – binominal, density, distributions like normal, lognormal, ...; AUC (to specify the partial area under the curve (AUC options, CI (to select the options of confidence intervals (CI – the level, computing method: DeLong, bootstrap, ...; Plot (for the plotting options. The ROCR dialogue window offers more options in choosing the performance measures for the plot. Conclusion: The RcmdrPlugin.ROC extension helps less advanced users of R accessing ROC tools in a friendly graphical user interface.

  3. A Secure and Efficient Communications Architecture for Global Information Grid Users Via Cooperating Space Assets

    National Research Council Canada - National Science Library

    Hubenko, Jr, Victor P

    2008-01-01

    With the Information Age in full and rapid development, users expect to have global, seamless, ubiquitous, secure, and efficient communications capable of providing access to real-time applications and collaboration...

  4. To retain or remove user fees?: reflections on the current debate in low- and middle-income countries.

    Science.gov (United States)

    James, Chris D; Hanson, Kara; McPake, Barbara; Balabanova, Dina; Gwatkin, Davidson; Hopwood, Ian; Kirunga, Christina; Knippenberg, Rudolph; Meessen, Bruno; Morris, Saul S; Preker, Alexander; Souteyrand, Yves; Tibouti, Abdelmajid; Villeneuve, Pascal; Xu, Ke

    2006-01-01

    Many low- and middle-income countries continue to search for better ways of financing their health systems. Common to many of these systems are problems of inadequate resource mobilisation, as well as inefficient and inequitable use of existing resources. The poor and other vulnerable groups who need healthcare the most are also the most affected by these shortcomings. In particular, these groups have a high reliance on user fees and other out-of-pocket expenditures on health which are both impoverishing and provide a financial barrier to care. It is within this context, and in light of recent policy initiatives on user fee removal, that a debate on the role of user fees in health financing systems has recently returned. This paper provides some reflections on the recent user fees debate, drawing from the evidence presented and subsequent discussions at a recent UNICEF consultation on user fees in the health sector, and relates the debate to the wider issue of access to adequate healthcare. It is argued that, from the wealth of evidence on user fees and other health system reforms, a broad consensus is emerging. First, user fees are an important barrier to accessing health services, especially for poor people. They also negatively impact on adherence to long-term expensive treatments. However, this is offset to some extent by potentially positive impacts on quality. Secondly, user fees are not the only barrier that the poor face. As well as other cost barriers, a number of quality, information and cultural barriers must also be overcome before the poor can access adequate health services. Thirdly, initial evidence on fee abolition in Uganda suggests that this policy has improved access to outpatient services for the poor. For this to be sustainable and effective in reaching the poor, fee removal needs to be part of a broader package of reforms that includes increased budgets to offset lost fee revenue (as was the case in Uganda). Fourthly, implementation matters

  5. Information and communication technology and user knowledge-driven innovation in services

    Directory of Open Access Journals (Sweden)

    Hong Y. Park

    2015-12-01

    Full Text Available User knowledge has been an important source of novel product development and innovation, but gathering accurate user knowledge has been time consuming and difficult because user knowledge is tacit and globally dispersed. However, information and communication technology can expand the boundaries by making user knowledge easier and less expensive to access. Structures and organizations are emerging to perform the task of user information gathering. This paper examines the nature of user knowledge and the emergence of a new system/structure for user knowledge gathering and user involvement in innovation. Three case studies of business innovation in three different organizations illustrate the ways that the organization matches the type of innovation with the characteristics of user knowledge. User involvement can occur either through direct input or via feedback provided after customers received services. User input can also be either proactive or reactive. User knowledge is often employed to monitor service workers also, which has significantly contributed to recent improvement in service quality. The cases presented support our proposition.

  6. Efficient User Authentication and Key Management for Peer-to-Peer Live Streaming Systems

    Institute of Scientific and Technical Information of China (English)

    LIU Xuening; YIN Hao; LIN Chuang; DU Changlai

    2009-01-01

    Recent development of the peer-to-peer (P2P) live streaming technique has brought unprece-dented new momentum to the Internet with the characters of effective, scalable, and low cost. However, be-fore these applications can be successfully deployed as commercial applications, efficient access control mechanisms are needed. This work based on earlier research of the secure streaming architecture in Trust-Stream, analyzes how to ensure that only authorized users can access the original media in the P2P live streaming system by adopting a user authentication and key management scheme. The major features of this system include (1) the management server issues each authorized user a unique public key certificate,(2) the one-way hash chain extends the certificate's lifetime, (3) the original media is encrypted by the ses-sion key and delivered to the communication group, and (4) the session key is periodically updated and dis-tributed with the media. Finally, analyses and test results show that scheme provides a secure, scalable, re-liable, and efficient access control solution for P2P live streaming systems.

  7. U-Access: a web-based system for routing pedestrians of differing abilities

    Science.gov (United States)

    Sobek, Adam D.; Miller, Harvey J.

    2006-09-01

    For most people, traveling through urban and built environments is straightforward. However, for people with physical disabilities, even a short trip can be difficult and perhaps impossible. This paper provides the design and implementation of a web-based system for the routing and prescriptive analysis of pedestrians with different physical abilities within built environments. U-Access, as a routing tool, provides pedestrians with the shortest feasible route with respect to one of three differing ability levels, namely, peripatetic (unaided mobility), aided mobility (mobility with the help of a cane, walker or crutches) and wheelchair users. U-Access is also an analytical tool that can help identify obstacles in built environments that create routing discrepancies among pedestrians with different physical abilities. This paper discusses the system design, including database, algorithm and interface specifications, and technologies for efficiently delivering results through the World Wide Web (WWW). This paper also provides an illustrative example of a routing problem and an analytical evaluation of the existing infrastructure which identifies the obstacles that pose the greatest discrepancies between physical ability levels. U-Access was evaluated by wheelchair users and route experts from the Center for Disability Services at The University of Utah, USA.

  8. Employing optical code division multiple access technology in the all fiber loop vibration sensor system

    Science.gov (United States)

    Tseng, Shin-Pin; Yen, Chih-Ta; Syu, Rong-Shun; Cheng, Hsu-Chih

    2013-12-01

    This study proposes a spectral amplitude coding-optical code division multiple access (SAC-OCDMA) framework to access the vibration frequency of a test object on the all fiber loop vibration sensor (AFLVS). Each user possesses an individual SAC, and fiber Bragg grating (FBG) encoders/decoders using multiple FBG arrays were adopted, providing excellent orthogonal properties in the frequency domain. The system also mitigates multiple access interference (MAI) among users. When an optical fiber is bent to a point exceeding the critical radius, the fiber loop sensor becomes sensitive to external physical parameters (e.g., temperature, strain, and vibration). The AFLVS involves placing a fiber loop with a specific radius on a designed vibration platform.

  9. RUASN: A Robust User Authentication Framework for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hoon-Jae Lee

    2011-05-01

    Full Text Available In recent years, wireless sensor networks (WSNs have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost.

  10. Hanford inventory program user's manual

    International Nuclear Information System (INIS)

    Hinkelman, K.C.

    1994-01-01

    Provides users with instructions and information about accessing and operating the Hanford Inventory Program (HIP) system. The Hanford Inventory Program is an integrated control system that provides a single source for the management and control of equipment, parts, and material warehoused by Westinghouse Hanford Company in various site-wide locations. The inventory is comprised of spare parts and equipment, shop stock, special tools, essential materials, and convenience storage items. The HIP replaced the following systems; ACA, ASP, PICS, FSP, WSR, STP, and RBO. In addition, HIP manages the catalog maintenance function for the General Supplies inventory stocked in the 1164 building and managed by WIMS

  11. A General Attribute and Rule Based Role-Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource. This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments.

  12. Do NHS walk-in centres in England provide a model of integrated care?

    Directory of Open Access Journals (Sweden)

    C. Salisbury

    2003-08-01

    Full Text Available Purpose: To undertake a comprehensive evaluation of NHS walk-in centres against criteria of improved access, quality, user satisfaction and efficiency. Context: Forty NHS walk-in centres have been opened in England, as part of the UK governments agenda to modernise the NHS. They are intended to improve access to primary care, provide high quality treatment at convenient times, and reduce inappropriate demand on other NHS providers. Care is provided by nurses rather than doctors, using computerised algorithms, and nurses use protocols to supply treatments previously only available from doctors. Data sources: Several linked studies were conducted using different sources of data and methodologies. These included routinely collected data, site visits, patient interviews, a survey of users of walk-in centres, a study using simulated patients to assess quality of care, analysis of consultation rates in NHS services near to walk-in centres, and audit of compliance with protocols. Conclusion & discussion: The findings illustrate many of the issues described in a recent WHO reflective paper on Integrated Care, including tensions between professional judgement and use of protocols, problems with incompatible IT systems, balancing users' demands and needs, the importance of understanding health professionals' roles and issues of technical versus allocative efficiency.

  13. Medium-sized Universities Connect to Their Libraries: Links on University Home Pages and User Group Pages

    Directory of Open Access Journals (Sweden)

    Pamela Harpel-Burk

    2006-03-01

    Full Text Available From major tasks—such as recruitment of new students and staff—to the more mundane but equally important tasks—such as providing directions to campus—college and university Web sites perform a wide range of tasks for a varied assortment of users. Overlapping functions and user needs meld to create the need for a Web site with three major functions: promotion and marketing, access to online services, and providing a means of communication between individuals and groups. In turn, college and university Web sites that provide links to their library home page can be valuable assets for recruitment, public relations, and for helping users locate online services.

  14. Digital Library Services: Perceptions and Expectations of User Communities and Librarians in a New Zealand Academic Library.

    Science.gov (United States)

    Xia, Wei

    2003-01-01

    Provides an overview of research conducted at Victoria University of Wellington regarding differing perceptions and expectations of user communities and librarians related to the usability of digital services. Considers access to services, currency of information on the Web site, the online public access catalog, databases, electronic journals,…

  15. Scrambling for access: availability, accessibility, acceptability and quality of healthcare for lesbian, gay, bisexual and transgender people in South Africa.

    Science.gov (United States)

    Müller, Alex

    2017-05-30

    Sexual orientation and gender identity are social determinants of health for people identifying as lesbian, gay, bisexual and transgender (LGBT), and health disparities among sexual and gender minority populations are increasingly well understood. Although the South African constitution guarantees sexual and gender minority people the right to non-discrimination and the right to access to healthcare, homo- and transphobia in society abound. Little is known about LGBT people's healthcare experiences in South Africa, but anecdotal evidence suggests significant barriers to accessing care. Using the framework of the UN International Covenant on Economic, Social and Cultural Rights General Comment 14, this study analyses the experiences of LGBT health service users using South African public sector healthcare, including access to HIV counselling, testing and treatment. A qualitative study comprised of 16 semi-structured interviews and two focus group discussions with LGBT health service users, and 14 individual interviews with representatives of LGBT organisations. Data were thematically analysed within the framework of the UN International Covenant on Economic, Social and Cultural Rights General Comment 14, focusing on availability, accessibility, acceptability and quality of care. All interviewees reported experiences of discrimination by healthcare providers based on their sexual orientation and/or gender identity. Participants recounted violations of all four elements of the UN General Comment 14: 1) Availability: Lack of public health facilities and services, both for general and LGBT-specific concerns; 2) Accessibility: Healthcare providers' refusal to provide care to LGBT patients; 3) Acceptability: Articulation of moral judgment and disapproval of LGBT patients' identity, and forced subjection of patients to religious practices; 4) Quality: Lack of knowledge about LGBT identities and health needs, leading to poor-quality care. Participants had delayed or

  16. [The treatment received by public health services users in Mexico].

    Science.gov (United States)

    Puentes Rosas, Esteban; Gómez Dantés, Octavio; Garrido Latorre, Francisco

    2006-06-01

    To document the fact that differences in the treatment received by health services users in Mexico are mainly dependent on the type of provider, regardless of the users' socioeconomic status. The data were obtained by means of a survey of 18 018 users who visited 73 health services in 13 states within Mexico. They were asked to grade the way the institution had performed in seven of the eight domains that define appropriate user treatment (autonomy, confidentiality, communication, respectful manner, condition of basic facilities, access to social assistance networks, and free user choice). The questionnaire included some vignettes to help determine user expectations. A composite ordinal probit model was applied; the perception of quality in connection with each of the appropriate treatment domains was the independent variable, whereas gender, educational level, age, type of provider, and user expectations were used as control variables. The type of provider was the main factor that determined users' perceptions regarding the treatment they received when visiting health services in Mexico. Institutions belonging to the social security system performed the worst, while the services provided under the program targeting the rural population (IMSS Oportunidades) received the highest scores. Overall, the domain that was most highly ranked was respectful manner, whereas the lowest score was given to the ability to choose the provider. Men felt they had been able to communicate better than women, while respectful manner, communication, and social support showed a significant negative association with educational level (P < 0.05). Differences were noted in the way different public health service providers in Mexico treat their users, regardless of the latter's socioeconomic status. Social security system providers showed the greatest deficiencies in this respect. Respectful manner was the domain that received the highest scores in the case of all providers. Organizational

  17. What Can Nature Teach Us About Improving Earth Science Data Access?

    Science.gov (United States)

    Young, S.

    2012-12-01

    Humans have collected earth observations data for centuries, helping us understand present conditions, allowing us to forecast the future, and giving us a window billions of years into the past. In the last 40 years the collection of earth observations data has increased on a truly massive and accelerating scale. Our abilities to collect new data have outpaced our abilities to access and use the data in all the ways users may expect. Mobile technology is a prime example. Smart telephones and tablet devices are proliferating rapidly; by 2016 there likely will be more smartphones than PCs on the planet. Earth data providers need to plan for and evolve to meet the needs, expectations, and capabilities of vast new numbers of mobile users. These users will not only consume data; many of them will also want to provide data via crowdsourcing or "citizen science" efforts. Can we channel the desire to provide citizen data in ways that help to ground-truth other observations, enrich the observations base, and improve data quality? Innovation will be key to meeting such challenges. Is it possible to innovate by studying the past? Does the earth system itself hold lessons that we can apply? We will examine what nature can teach us to foster sustainable innovation in our information technologies. Simplicity enables complexity; understanding complexity requires a return to simplicity. This presentation describes several user scenarios and examples of simplicity-complexity interactions to illustrate the connections with earth science data access.

  18. Biometrics: Accessibility challenge or opportunity?

    Directory of Open Access Journals (Sweden)

    Ramon Blanco-Gonzalo

    Full Text Available Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products.

  19. Hidden costs: the direct and indirect impact of user fees on access to malaria treatment and primary care in Mali.

    Science.gov (United States)

    Johnson, Ari; Goss, Adeline; Beckerman, Jessica; Castro, Arachu

    2012-11-01

    About 20 years after initial calls for the introduction of user fees in health systems in sub-Saharan Africa, a growing coalition is advocating for their removal. Several African countries have abolished user fees for health care for some or all of their citizens. However, fee-for-service health care delivery remains a primary health care funding model in many countries in sub-Saharan Africa. Although the impact of user fees on utilization of health services and household finances has been studied extensively, further research is needed to characterize the multi-faceted health and social problems associated with charging user fees. This ethnographic study aims to identify consequences of user fees on gender inequality, food insecurity, and household decision-making for a group of women living in poverty. Ethnographic life history interviews were conducted with 24 women in Yirimadjo, Mali in 2007. Purposive sampling selected participants across a broad socio-economic spectrum. Semi-structured interviews addressed participants' past medical history, socio-economic status, social and family history, and access to health care. Interview transcripts were coded using the guiding analytical framework of structural violence. Interviews revealed that user fees for health care not only decreased utilization of health services, but also resulted in delayed presentation for care, incomplete or inadequate care, compromised food security and household financial security, and reduced agency for women in health care decision making. The effects of user fees were amplified by conditions of poverty, as well as gender and health inequality; user fees in turn reinforced the inequalities created by those very conditions. The qualitative data reveal multi-faceted health and socioeconomic effects of user fees, and illustrate that user fees for health care may impact quality of care, health outcomes, food insecurity, and gender inequality, in addition to impacting health care utilization

  20. Remote Internet access to advanced analytical facilities: a new approach with Web-based services.

    Science.gov (United States)

    Sherry, N; Qin, J; Fuller, M Suominen; Xie, Y; Mola, O; Bauer, M; McIntyre, N S; Maxwell, D; Liu, D; Matias, E; Armstrong, C

    2012-09-04

    Over the past decade, the increasing availability of the World Wide Web has held out the possibility that the efficiency of scientific measurements could be enhanced in cases where experiments were being conducted at distant facilities. Examples of early successes have included X-ray diffraction (XRD) experimental measurements of protein crystal structures at synchrotrons and access to scanning electron microscopy (SEM) and NMR facilities by users from institutions that do not possess such advanced capabilities. Experimental control, visual contact, and receipt of results has used some form of X forwarding and/or VNC (virtual network computing) software that transfers the screen image of a server at the experimental site to that of the users' home site. A more recent development is a web services platform called Science Studio that provides teams of scientists with secure links to experiments at one or more advanced research facilities. The software provides a widely distributed team with a set of controls and screens to operate, observe, and record essential parts of the experiment. As well, Science Studio provides high speed network access to computing resources to process the large data sets that are often involved in complex experiments. The simple web browser and the rapid transfer of experimental data to a processing site allow efficient use of the facility and assist decision making during the acquisition of the experimental results. The software provides users with a comprehensive overview and record of all parts of the experimental process. A prototype network is described involving X-ray beamlines at two different synchrotrons and an SEM facility. An online parallel processing facility has been developed that analyzes the data in near-real time using stream processing. Science Studio and can be expanded to include many other analytical applications, providing teams of users with rapid access to processed results along with the means for detailed

  1. On Web User Tracking: How Third-Party Http Requests Track Users' Browsing Patterns for Personalised Advertising

    OpenAIRE

    Puglisi, Silvia; Rebollo-Monedero, David; Forné, Jordi

    2016-01-01

    On today's Web, users trade access to their private data for content and services. Advertising sustains the business model of many websites and applications. Efficient and successful advertising relies on predicting users' actions and tastes to suggest a range of products to buy. It follows that, while surfing the Web users leave traces regarding their identity in the form of activity patterns and unstructured data. We analyse how advertising networks build user footprints and how the sugg...

  2. Seamless user experiences in a brand new library

    KAUST Repository

    Vijayakumar, J.K.

    2012-10-30

    In order to provide seamless user experiences, the brand new libraries are far better positioned. They do not have to manage much in print, at least for the journal section, but huge electronic collection accessible via Internet. They do not worry about migrating to new systems or technology; they just start with whatever the latest available in the market, whether it is new generation ILMS, discovery tools, content management systems, mobile technologies, cloud computing etc. Patrons\\' expectations for seamless experience are met - regardless of their location, device and service they opted for. The story of the two and half years old, Saudi Arabia\\'s brand new King Abdullah University of Science and Technology\\'s Library is not different. Huge amount of electronic resources also provide ever increasing challenges to the new generation libraries in collecting, organizing and delivering the right information, to the right person at the right time. Implementation of a good ILMS supported with better electronic resource management features will help in setting the house right. Well-designed user interfaces, supported with the web scale discovery tools will help the users to have a better search experience. Availability of library collection through the campus mobile applications, latest proxy technologies for out-campus access and integrating the resources to the campus e-learning platform are the main features of the library’s seamless experiences. Libguide platform is used for the first time in Saudi Arabia, to create online research guides by subject librarians. An institutional repository, based on D-Space platform is about to release. Ninety percent of our collection is online; they are purchased, organized and accessed online, like any other brand new academic research libraries. Analysis of usage statistics of different resources show that they are highly used and usage is increased over two years, as the technology improved and implemented.

  3. Optical label-controlled transparent metro-access network interface

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich

    This thesis presents results obtained during the course of my PhD research on optical signal routing and interfacing between the metropolitan and access segments of optical networks. Due to both increasing capacity demands and variety of emerging services types, new technological challenges...... control. Highlights of my research include my proposal and experimental proof of principle of an optical coherent detection based optical access network architecture providing support for a large number of users over a single distribution fiber; a spectral amplitude encoded label detection technique...... are arising for seamlessly interfacing metropolitan and access networks. Therefore, in this PhD project, I have analyzed those technological challenges and identified the key aspects to be addressed. I have also proposed and experimentally verified a number of solutions to metropolitan and access networks...

  4. Developing a middleware to support HDF data access in ArcGIS

    Science.gov (United States)

    Sun, M.; Jiang, Y.; Yang, C. P.

    2014-12-01

    Hierarchical Data Format (HDF) is the standard data format for the NASA Earth Observing System (EOS) data products, like the MODIS level-3 data. These data have been widely used in long-term study of the land surface, biosphere, atmosphere, and oceans of the Earth. Several toolkits have been developed to access HDF data, such as the HDF viewer and Geospatial Data Abstraction Library (GDAL), etc. ArcGIS integrated the GDAL providing data user a Graphical User Interface (GUI) to read HDF data. However, there are still some problems when using the toolkits:for example, 1) the projection information is not recognized correctly, 2) the image is dispalyed inverted, and 3) the tool lacks of capability to read the third dimension information stored in the data subsets, etc. Accordingly, in this study we attempt to improve the current HDF toolkits to address the aformentioned issues. Considering the wide-usage of ArcGIS, we develop a middleware for ArcGIS based on GDAL to solve the particular data access problems happening in ArcGIS, so that data users can access HDF data successfully and perform further data analysis with the ArcGIS geoprocessing tools.

  5. The unbearable lightness of user consent

    Directory of Open Access Journals (Sweden)

    Rikke Frank Joergensen

    2014-10-01

    Full Text Available The article discusses challenges to privacy protection in social media platforms, focusing in particular on the principle of user consent. Based on a Danish study, the article argues that in relation to Facebook, user consent de facto served as the price for participating and for gaining access to a social infrastructure. The article opens with a brief introduction to privacy as a human right, followed by a discussion of some of the critique that has been raised towards social media platforms vis-à-vis the right to privacy. Second, it presents the findings from a study conducted amongst 68 Danish high school students in October 2013 concerning their privacy perceptions and practices when using social media platforms. Thirdly, it discusses the implications of these findings in relation to the principle of user consent as a means of providing individuals with control over their personal information in the context of social media platforms.

  6. User-Centered Design, Experience, and Usability of an Electronic Consent User Interface to Facilitate Informed Decision-Making in an HIV Clinic.

    Science.gov (United States)

    Ramos, S Raquel

    2017-11-01

    Health information exchange is the electronic accessibility and transferability of patient medical records across various healthcare settings and providers. In some states, patients have to formally give consent to allow their medical records to be electronically shared. The purpose of this study was to apply a novel user-centered, multistep, multiframework approach to design and test an electronic consent user interface, so patients with HIV can make more informed decisions about electronically sharing their health information. This study consisted of two steps. Step 1 was a cross-sectional, descriptive, qualitative study that used user-centric design interviews to create the user interface. This informed Step 2. Step 2 consisted of a one group posttest to examine perceptions of usefulness, ease of use, preference, and comprehension of a health information exchange electronic consent user interface. More than half of the study population had college experience, but challenges remained with overall comprehension regarding consent. The user interface was not independently successful, suggesting that in addition to an electronic consent user interface, human interaction may also be necessary to address the complexities associated with consenting to electronically share health information. Comprehension is key factor in the ability to make informed decisions.

  7. Proceedings of the first energy research power supercomputer users symposium

    International Nuclear Information System (INIS)

    1991-01-01

    The Energy Research Power Supercomputer Users Symposium was arranged to showcase the richness of science that has been pursued and accomplished in this program through the use of supercomputers and now high performance parallel computers over the last year: this report is the collection of the presentations given at the Symposium. ''Power users'' were invited by the ER Supercomputer Access Committee to show that the use of these computational tools and the associated data communications network, ESNet, go beyond merely speeding up computations. Today the work often directly contributes to the advancement of the conceptual developments in their fields and the computational and network resources form the very infrastructure of today's science. The Symposium also provided an opportunity, which is rare in this day of network access to computing resources, for the invited users to compare and discuss their techniques and approaches with those used in other ER disciplines. The significance of new parallel architectures was highlighted by the interesting evening talk given by Dr. Stephen Orszag of Princeton University

  8. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: a privacy-protecting remote access system for health-related research and evaluation.

    Science.gov (United States)

    Jones, Kerina H; Ford, David V; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J; Heaven, Martin L; Thayer, Daniel S; McNerney, Cynthia L; Lyons, Ronan A

    2014-08-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. Copyright © 2014 The Aurthors. Published by Elsevier Inc. All rights reserved.

  9. Accessibility information in New Delhi for "EasenAccess" Android-based app for persons with disability: an observational study.

    Science.gov (United States)

    Agarwal, Yashovardhan

    2018-06-14

    vehicle or developing an injury over time due to the demand of pushing/cycling the mobility device. EasenAccess can be a synergistic platform for all such future community based rehabilitation approaches. It can also help compile and collate data for accessibility gaps and rehabilitation issues encountered. EasenAccess app can thus help create an emerging framework, which puts the experience of the wheelchair user at the center but with a clear connection to people who can implement policy change on a broad scale.One that includes local people who will be advocates for creation of accessible maps, and local NGOs to provide hubs of training. These can be linked to a series of YouTube videos and supported via a messaging service, for example, local WhatsApp groups or social media groups, for example, a Facebook Page. With infinite possibilities, as illustrated above, EasenAccess app can create a new technological paradigm for convergence of Accessibility and Rehabilitation.

  10. Perceived barriers to accessing mental health services among black and minority ethnic (BME) communities: a qualitative study in Southeast England.

    Science.gov (United States)

    Memon, Anjum; Taylor, Katie; Mohebati, Lisa M; Sundin, Josefin; Cooper, Max; Scanlon, Thomas; de Visser, Richard

    2016-11-16

    In most developed countries, substantial disparities exist in access to mental health services for black and minority ethnic (BME) populations. We sought to determine perceived barriers to accessing mental health services among people from these backgrounds to inform the development of effective and culturally acceptable services to improve equity in healthcare. Qualitative study in Southeast England. 26 adults from BME backgrounds (13 men, 13 women; aged >18 years) were recruited to 2 focus groups. Participants were identified through the registers of the Black and Minority Ethnic Community Partnership centre and by visits to local community gatherings and were invited to take part by community development workers. Thematic analysis was conducted to identify key themes about perceived barriers to accessing mental health services. Participants identified 2 broad themes that influenced access to mental health services. First, personal and environmental factors included inability to recognise and accept mental health problems, positive impact of social networks, reluctance to discuss psychological distress and seek help among men, cultural identity, negative perception of and social stigma against mental health and financial factors. Second, factors affecting the relationship between service user and healthcare provider included the impact of long waiting times for initial assessment, language barriers, poor communication between service users and providers, inadequate recognition or response to mental health needs, imbalance of power and authority between service users and providers, cultural naivety, insensitivity and discrimination towards the needs of BME service users and lack of awareness of different services among service users and providers. People from BME backgrounds require considerable mental health literacy and practical support to raise awareness of mental health conditions and combat stigma. There is a need for improving information about services

  11. Access Control of Web- and Java-Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  12. An End User Development Approach for Mobile Web Augmentation

    Directory of Open Access Journals (Sweden)

    Gabriela Bosetti

    2017-01-01

    Full Text Available The trend towards mobile devices usage has made it possible for the Web to be conceived not only as an information space but also as a ubiquitous platform where users perform all kinds of tasks. In some cases, users access the Web with native mobile applications developed for well-known sites, such as, LinkedIn, Facebook, and Twitter. These native applications might offer further (e.g., location-based functionalities to their users in comparison with their corresponding Web sites because they were developed with mobile features in mind. However, many Web applications have no native counterpart and users access them using a mobile Web browser. Although the access to context information is not a complex issue nowadays, not all Web applications adapt themselves according to it or diversely improve the user experience by listening to a wide range of sensors. At some point, users might want to add mobile features to these Web sites, even if those features were not originally supported. In this paper, we present a novel approach to allow end users to augment their preferred Web sites with mobile features. We support our claims by presenting a framework for mobile Web augmentation, an authoring tool, and an evaluation with 21 end users.

  13. A Flexible Component based Access Control Architecture for OPeNDAP Services

    Science.gov (United States)

    Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank

    2010-05-01

    Network data access services such as OPeNDAP enable widespread access to data across user communities. However, without ready means to restrict access to data for such services, data providers and data owners are constrained from making their data more widely available. Even with such capability, the range of different security technologies available can make interoperability between services and user client tools a challenge. OPeNDAP is a key data access service in the infrastructure under development to support the CMIP5 (Couple Model Intercomparison Project Phase 5). The work is being carried out as part of an international collaboration including the US Earth System Grid and Curator projects and the EU funded IS-ENES and Metafor projects. This infrastructure will bring together Petabytes of climate model data and associated metadata from over twenty modelling centres around the world in a federation with a core archive mirrored at three data centres. A security system is needed to meet the requirements of organisations responsible for model data including the ability to restrict data access to registered users, keep them up to date with changes to data and services, audit access and protect finite computing resources. Individual organisations have existing tools and services such as OPeNDAP with which users in the climate research community are already familiar. The security system should overlay access control in a way which maintains the usability and ease of access to these services. The BADC (British Atmospheric Data Centre) has been working in collaboration with the Earth System Grid development team and partner organisations to develop the security architecture. OpenID and MyProxy were selected at an early stage in the ESG project to provide single sign-on capability across the federation of participating organisations. Building on the existing OPeNDAP specification an architecture based on pluggable server side components has been developed at the BADC

  14. Ergonomics and accessibility for people with visual impairment in hotels.

    Science.gov (United States)

    Dos Santos, Larissa Nascimento; de Carvalho, Ricardo José Matos

    2012-01-01

    This article presents a diagnosis of luxury or superior hotels in the city of Natal, located in the state of Rio Grande do Norte, in northeastern Brazil, in what concerns accessibility to the visually impaired. The main objective is to present the guiding principles to design actions and interventions that must be considered in the preparation or revision of technical standards and manuals of good practice in accessibility related to people with visual impairments who are hotel users. The survey showed that the hotels do not meet the normative indications of accessibility, their facilities are in-accessible (have prevented access) or of reduced accessibility and its employees are not prepared to provide adequate hospital services for people with visual impairment. It was concluded that some of the accessibility problems faced by people with visual impairments are also faced by people in general.

  15. Flexible Access Control for Dynamic Collaborative Environments

    NARCIS (Netherlands)

    Dekker, M.A.C.

    2009-01-01

    Access control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect

  16. Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing

    Science.gov (United States)

    Ehatisham-ul-Haq, Muhammad; Azam, Muhammad Awais; Loo, Jonathan; Shuang, Kai; Islam, Syed; Naeem, Usman; Amin, Yasar

    2017-01-01

    Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing and assist users in accomplishing many of their routine tasks anytime and anywhere, such as sending and receiving emails. The nature of tasks conducted with these devices has evolved with the exponential increase in the sensing and computing capabilities of a smartphone. Due to the ease of use and convenience, many users tend to store their private data, such as personal identifiers and bank account details, on their smartphone. However, this sensitive data can be vulnerable if the device gets stolen or lost. A traditional approach for protecting this type of data on mobile devices is to authenticate users with mechanisms such as PINs, passwords, and fingerprint recognition. However, these techniques are vulnerable to user compliance and a plethora of attacks, such as smudge attacks. The work in this paper addresses these challenges by proposing a novel authentication framework, which is based on recognizing the behavioral traits of smartphone users using the embedded sensors of smartphone, such as Accelerometer, Gyroscope and Magnetometer. The proposed framework also provides a platform for carrying out multi-class smart user authentication, which provides different levels of access to a wide range of smartphone users. This work has been validated with a series of experiments, which demonstrate the effectiveness of the proposed framework. PMID:28878177

  17. Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing.

    Science.gov (United States)

    Ehatisham-Ul-Haq, Muhammad; Azam, Muhammad Awais; Loo, Jonathan; Shuang, Kai; Islam, Syed; Naeem, Usman; Amin, Yasar

    2017-09-06

    Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing and assist users in accomplishing many of their routine tasks anytime and anywhere, such as sending and receiving emails. The nature of tasks conducted with these devices has evolved with the exponential increase in the sensing and computing capabilities of a smartphone. Due to the ease of use and convenience, many users tend to store their private data, such as personal identifiers and bank account details, on their smartphone. However, this sensitive data can be vulnerable if the device gets stolen or lost. A traditional approach for protecting this type of data on mobile devices is to authenticate users with mechanisms such as PINs, passwords, and fingerprint recognition. However, these techniques are vulnerable to user compliance and a plethora of attacks, such as smudge attacks. The work in this paper addresses these challenges by proposing a novel authentication framework, which is based on recognizing the behavioral traits of smartphone users using the embedded sensors of smartphone, such as Accelerometer, Gyroscope and Magnetometer. The proposed framework also provides a platform for carrying out multi-class smart user authentication, which provides different levels of access to a wide range of smartphone users. This work has been validated with a series of experiments, which demonstrate the effectiveness of the proposed framework.

  18. Providing India with Internet access anywhere there is electricity - and Canada with commercial opportunity

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    Access to high-speed Internet service is booming all over the world but the cost of optic cable installation and other related broadband delivery technology is still too high for many developing countries to afford. A Canada-India R & D group is working on a broadband technology delivered over the power line in order to provide internet access wherever there is electricity. Moreover, the application of such a technology in rural India could also improve the distribution and management of India's national electrical grid, as the risk of electricity theft can be monitored by power assumption tracking. Since the required infrastructure is already in place across the country, this project could be deployed rapidly and in a cost-efficient manner, providing thousands of potential opportunities for rural dwellers as well as for Indian and international companies.

  19. Accessing VA Healthcare During Large-Scale Natural Disasters.

    Science.gov (United States)

    Der-Martirosian, Claudia; Pinnock, Laura; Dobalian, Aram

    2017-01-01

    Natural disasters can lead to the closure of medical facilities including the Veterans Affairs (VA), thus impacting access to healthcare for U.S. military veteran VA users. We examined the characteristics of VA patients who reported having difficulty accessing care if their usual source of VA care was closed because of natural disasters. A total of 2,264 veteran VA users living in the U.S. northeast region participated in a 2015 cross-sectional representative survey. The study used VA administrative data in a complex stratified survey design with a multimode approach. A total of 36% of veteran VA users reported having difficulty accessing care elsewhere, negatively impacting the functionally impaired and lower income VA patients.

  20. User-centered development and testing of a monitoring system that provides feedback regarding physical functioning to elderly people

    Science.gov (United States)

    Vermeulen, Joan; Neyens, Jacques CL; Spreeuwenberg, Marieke D; van Rossum, Erik; Sipers, Walther; Habets, Herbert; Hewson, David J; de Witte, Luc P

    2013-01-01

    Purpose To involve elderly people during the development of a mobile interface of a monitoring system that provides feedback to them regarding changes in physical functioning and to test the system in a pilot study. Methods and participants The iterative user-centered development process consisted of the following phases: (1) selection of user representatives; (2) analysis of users and their context; (3) identification of user requirements; (4) development of the interface; and (5) evaluation of the interface in the lab. Subsequently, the monitoring and feedback system was tested in a pilot study by five patients who were recruited via a geriatric outpatient clinic. Participants used a bathroom scale to monitor weight and balance, and a mobile phone to monitor physical activity on a daily basis for six weeks. Personalized feedback was provided via the interface of the mobile phone. Usability was evaluated on a scale from 1 to 7 using a modified version of the Post-Study System Usability Questionnaire (PSSUQ); higher scores indicated better usability. Interviews were conducted to gain insight into the experiences of the participants with the system. Results The developed interface uses colors, emoticons, and written and/or spoken text messages to provide daily feedback regarding (changes in) weight, balance, and physical activity. The participants rated the usability of the monitoring and feedback system with a mean score of 5.2 (standard deviation 0.90) on the modified PSSUQ. The interviews revealed that most participants liked using the system and appreciated that it signaled changes in their physical functioning. However, usability was negatively influenced by a few technical errors. Conclusion Involvement of elderly users during the development process resulted in an interface with good usability. However, the technical functioning of the monitoring system needs to be optimized before it can be used to support elderly people in their self-management. PMID

  1. Access to finance from different finance provider types: Farmer knowledge of the requirements.

    Science.gov (United States)

    Wulandari, Eliana; Meuwissen, Miranda P M; Karmana, Maman H; Oude Lansink, Alfons G J M

    2017-01-01

    Analysing farmer knowledge of the requirements of finance providers can provide valuable insights to policy makers about ways to improve farmers' access to finance. This study compares farmer knowledge of the requirements to obtain finance with the actual requirements set by different finance provider types, and investigates the relation between demographic and socioeconomic factors and farmer knowledge of finance requirements. We use a structured questionnaire to collect data from a sample of finance providers and farmers in Java Island, Indonesia. We find that the most important requirements to acquire finance vary among different finance provider types. We also find that farmers generally have little knowledge of the requirements, which are important to each type of finance provider. Awareness campaigns are needed to increase farmer knowledge of the diversity of requirements among the finance provider types.

  2. Digital Watermarks Enabling E-Commerce Strategies: Conditional and User Specific Access to Services and Resources

    Science.gov (United States)

    Dittmann, Jana; Steinebach, Martin; Wohlmacher, Petra; Ackermann, Ralf

    2002-12-01

    Digital watermarking is well known as enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multimedia data and analyze the spread spectrum of the data over networks and servers. Research has shown that data hiding techniques can be applied successfully to other application areas like manipulations recognition. In this paper, we show our innovative approach for integrating watermark and cryptography based methods within a framework of new application scenarios spanning a wide range from dedicated and user specific services, "Try&Buy" mechanisms to general means for long-term customer relationships. The tremendous recent efforts to develop and deploy ubiquitous mobile communication possibilities are changing the demands but also possibilities for establishing new business and commerce relationships. Especially we motivate annotation watermarks and aspects of M-Commerce to show important scenarios for access control. Based on a description of the challenges of the application domain and our latest work we discuss, which methods can be used for establishing services in a fast convenient and secure way for conditional access services based on digital watermarking combined with cryptographic techniques. We introduce an example scenario for digital audio and an overview of steps in order to establish these concepts practically.

  3. Automatic figure ranking and user interfacing for intelligent figure search.

    Directory of Open Access Journals (Sweden)

    Hong Yu

    2010-10-01

    interfacing as we reported in this study can be fully implemented in online publishing. The novel user interface integrated with the automatic figure ranking system provides a more efficient and robust way to access scientific information in the biomedical domain, which will further enhance our existing figure search engine to better facilitate accessing figures of interest for bioscientists.

  4. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.

    Science.gov (United States)

    Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia

    2018-05-17

    Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional "encrypt-then-sign" or "sign-then-encrypt" strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation.

  5. Incarcerated intravenous heroin users: predictors of post-release utilization of methadone maintenance treatment.

    Science.gov (United States)

    Lin, Huang-Chi; Wang, Peng-Wei; Yang, Yi-Hsin; Tsai, Jih-Jin; Yen, Cheng-Fang

    2016-01-01

    Incarcerated intravenous heroin users have more problematic patterns of heroin use, but are less likely to access methadone maintenance treatment by their own initiative than heroin users in the community. The present study examined predictors for receiving methadone maintenance treatment post-release among incarcerated intravenous heroin users within a 24-month period. This cohort study recruited 315 incarcerated intravenous heroin users detained in 4 prisons in southern Taiwan and followed up within the 24-month period post-release. Cox proportional hazards regression analysis was applied to determine the predictive effects of sociodemographic and drug-use characteristics, attitude toward methadone maintenance treatment, human immunodeficiency virus serostatus, perceived family support, and depression for access to methadone maintenance treatment after release. There were 295 (93.7%) incarcerated intravenous heroin users released that entered the follow-up phase of the study. During the 24-month follow-up period, 50.8% of them received methadone maintenance treatment. After controlling for the effects of the detainment period before and after recruitment by Cox proportional hazards regression analysis, incarcerated intravenous heroin users who had positive human immunodeficiency virus serostatus (HR = 2.85, 95% CI = 1.80-4.52, p maintenance treatment before committal (HR = 1.94, 95% CI = 1.23-3.05, p maintenance treatment within the 24-month follow-up period. Positive human immunodeficiency virus serostatus with fully subsidized treatment and previous methadone maintenance treatment experiences predicted access of methadone maintenance treatment post-release. Strategies for getting familiar with methadone maintenance treatment during detainment, including providing methadone maintenance treatment prior to release and lowering the economic burden of receiving treatment, may facilitate entry of methadone maintenance treatment for incarcerated intravenous heroin

  6. Challenges of user-centred assistive technology provision in Australia: shopping without a prescription.

    Science.gov (United States)

    Steel, Emily J; Layton, Natasha Ann; Foster, Michele M; Bennett, Sally

    2016-01-01

    People with disability have a right to assistive technology devices and services, to support their inclusion and participation in society. User-centred approaches aim to address consumer dissatisfaction and sub-optimal outcomes from assistive technology (AT) provision, but make assumptions of consumer literacy and empowerment. Policy discourses about consumer choice prompt careful reflection, and this paper aims to provide a critical perspective on user involvement in assistive technology provision. User-centred approaches are considered, using literature to critically reflect on what user involvement means in AT provision. Challenges at the level of interactions between practitioners and consumers, and also the level of markets and policies are discussed, using examples from Australia. There is no unanimous conceptual framework for user-centred practice. Power imbalances and differing perspectives between practitioners and consumers make it difficult for consumers to feel empowered. Online access to information and international suppliers has not surmounted information asymmetries for consumers or lifted the regulation of publicly funded AT devices. Ensuring access and equity in the public provision of AT is challenging in an expanding market with diverse stakeholders. Consumers require personalised information and support to facilitate their involvement and choice in AT provision. Implications for Rehabilitation Variations in approaches informing AT provision practices have a profound impact on equity of access and outcomes for consumers. An internationalised and online market for AT devices is increasing the need for effective information provision strategies and services. Power imbalances between practitioners and consumers present barriers to the realisation of user-centred practice.

  7. ALOHA Random Access that Operates as a Rateless Code

    DEFF Research Database (Denmark)

    Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    Various applications of wireless Machine-to-Machine (M2M) communications have rekindled the research interest in random access protocols, suitable to support a large number of connected devices. Slotted ALOHA and its derivatives represent a simple solution for distributed random access in wireless...... the contention when the instantaneous throughput is maximized. The paper presents the related analysis, providing heuristic criteria for terminating the contention period and showing that very high throughputs can be achieved, even for a low number for contending users. The demonstrated results potentially have...

  8. Conviviality-driven access control policy

    NARCIS (Netherlands)

    El Kateb, Donia; Zannone, N.; Moawad, Assaad; Caire, Patrice; Nain, Grégory; Mouelhi, Tejeddine; Le Traon, Yves

    2015-01-01

    Nowadays many organizations experience security incidents due to unauthorized access to information. To reduce the risk of such incidents, security policies are often employed to regulate access to information. Such policies, however, are often too restrictive, and users do not have the rights

  9. Revocable Anonymous Access to the Internet?

    Science.gov (United States)

    Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos

    2003-01-01

    Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…

  10. Access and control of information and intellectual property

    Science.gov (United States)

    Lang, Gerald S.

    1996-03-01

    This paper introduces the technology of two pioneering patents for the secure distribution of information and intellectual property. The seminal technology has been used in the control of sensitive material such as medical records and imagery in distributed networks. It lends itself to the implementation of an open architecture access control system that provides local or remote user selective access to digital information stored on any computer system or storage medium, down to the data element, pixel, and sub-pixel levels. Use of this technology is especially suited for electronic publishing, health care records, MIS, and auditing.

  11. Livestock Fadama users' access to information on selected livestock ...

    African Journals Online (AJOL)

    The FUGs members never had access to information on key livestock technologies like artificial insemination, automated feeding, feed formulation and creep feeding. Farmers' number of years of formal education (r = -0.09) and family size (r= 0.09) had no significant relationships with respondents' access to information on ...

  12. A clickstream data analysis of Chinese academic library OPAC users' information behavior

    NARCIS (Netherlands)

    Jiang, Tingting; Chi, Yu; Gao, Huiqin

    2017-01-01

    Chinese academic libraries have been devoting great effort into introducing next-generation online public access catalogs (OPACs) in order to provide a better user experience. However, there is a lack of empirical research on their usage. In this study, a transaction log file from a typical

  13. Cell Deployment Optimization for Cloud Radio Access Networks using Teletraffic Theory

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Christiansen, Henrik Lehrmann; Iversen, Villy Bæk

    2015-01-01

    Cloud Radio Access Network (C-RAN) is a new mobile radio access network design based on centralized and pooled processing. It offers potential cost savings by utilizing the so-called tidal effect due to user mobility in cellular networks. This paper provides a quantitative analysis...... to dynamically re-assign cells to a pool of baseband units. The re-assignment is based on the cell load and traffic characteristics such that effective utilization of the baseband resources is assured....

  14. Access Control Based on Trail Inference

    Directory of Open Access Journals (Sweden)

    ALBARELO, P. C.

    2015-06-01

    Full Text Available Professionals are constantly seeking qualification and consequently increasing their knowledge in their area of expertise. Thus, it is interesting to develop a computer system that knows its users and their work history. Using this information, even in the case of professional role change, the system could allow the renewed authorization for activities, based on previously authorized use. This article proposes a model for user access control that is embedded in a context-aware environment. The model applies the concept of trails to manage access control, recording activities usage in contexts and applying this history as a criterion to grant new accesses. Despite the fact that previous related research works consider contexts, none of them uses the concept of trails. Hence, the main contribution of this work is the use of a new access control criterion, namely, the history of previous accesses (trails. A prototype was implemented and applied in an evaluation based on scenarios. The results demonstrate the feasibility of the proposal, allowing for access control systems to use an alternative way to support access rights.

  15. The EBI Search engine: providing search and retrieval functionality for biological data from EMBL-EBI.

    Science.gov (United States)

    Squizzato, Silvano; Park, Young Mi; Buso, Nicola; Gur, Tamer; Cowley, Andrew; Li, Weizhong; Uludag, Mahmut; Pundir, Sangya; Cham, Jennifer A; McWilliam, Hamish; Lopez, Rodrigo

    2015-07-01

    The European Bioinformatics Institute (EMBL-EBI-https://www.ebi.ac.uk) provides free and unrestricted access to data across all major areas of biology and biomedicine. Searching and extracting knowledge across these domains requires a fast and scalable solution that addresses the requirements of domain experts as well as casual users. We present the EBI Search engine, referred to here as 'EBI Search', an easy-to-use fast text search and indexing system with powerful data navigation and retrieval capabilities. API integration provides access to analytical tools, allowing users to further investigate the results of their search. The interconnectivity that exists between data resources at EMBL-EBI provides easy, quick and precise navigation and a better understanding of the relationship between different data types including sequences, genes, gene products, proteins, protein domains, protein families, enzymes and macromolecular structures, together with relevant life science literature. © The Author(s) 2015. Published by Oxford University Press on behalf of Nucleic Acids Research.

  16. Access Data Analysis Cookbook

    CERN Document Server

    Bluttman, Ken

    2008-01-01

    This book offers practical recipes to solve a variety of common problems that users have with extracting Access data and performing calculations on it. Whether you use Access 2007 or an earlier version, this book will teach you new methods to query data, different ways to move data in and out of Access, how to calculate answers to financial and investment issues, how to jump beyond SQL by manipulating data with VBA, and more.

  17. The Encyclopedia of Life v2: Providing Global Access to Knowledge About Life on Earth

    Science.gov (United States)

    2014-01-01

    Abstract The Encyclopedia of Life (EOL, http://eol.org) aims to provide unprecedented global access to a broad range of information about life on Earth. It currently contains 3.5 million distinct pages for taxa and provides content for 1.3 million of those pages. The content is primarily contributed by EOL content partners (providers) that have a more limited geographic, taxonomic or topical scope. EOL aggregates these data and automatically integrates them based on associated scientific names and other classification information. EOL also provides interfaces for curation and direct content addition. All materials in EOL are either in the public domain or licensed under a Creative Commons license. In addition to the web interface, EOL is also accessible through an Application Programming Interface. In this paper, we review recent developments added for Version 2 of the web site and subsequent releases through Version 2.2, which have made EOL more engaging, personal, accessible and internationalizable. We outline the core features and technical architecture of the system. We summarize milestones achieved so far by EOL to present results of the current system implementation and establish benchmarks upon which to judge future improvements. We have shown that it is possible to successfully integrate large amounts of descriptive biodiversity data from diverse sources into a robust, standards-based, dynamic, and scalable infrastructure. Increasing global participation and the emergence of EOL-powered applications demonstrate that EOL is becoming a significant resource for anyone interested in biological diversity. PMID:24891832

  18. VA OpenNotes: exploring the experiences of early patient adopters with access to clinical notes.

    Science.gov (United States)

    Nazi, Kim M; Turvey, Carolyn L; Klein, Dawn M; Hogan, Timothy P; Woods, Susan S

    2015-03-01

    To explore the experience of early patient adopters who accessed their clinical notes online using the Blue Button feature of the My HealtheVet portal. A web-based survey of VA patient portal users from June 22 to September 15, 2013. 33.5% of respondents knew that clinical notes could be viewed, and nearly one in four (23.5%) said that they had viewed their notes at least once. The majority of VA Notes users agreed that accessing their notes will help them to do a better job of taking medications as prescribed (80.1%) and be better prepared for clinic visits (88.6%). Nine out of 10 users agreed that use of visit notes will help them understand their conditions better (91.8%), and better remember the plan for their care (91.9%). In contrast, 87% disagreed that VA Notes will make them worry more, and 88.4% disagreed that access to VA Notes will be more confusing than helpful. Users who had either contacted their provider or healthcare team (11.9%) or planned to (13.5%) primarily wanted to learn more about a health issue, medication, or test results (53.7%). Initial assessment of the patient experience within the first 9 months of availability provides evidence that patients both value and benefit from online access to clinical notes. These findings are congruent with OpenNotes study findings on a broader scale. Additional outreach and education is needed to enhance patient awareness. Healthcare professionals should author notes keeping in mind the opportunity patient access presents for enhanced communication. © The Author 2014. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  19. Users, uses, and value of Landsat satellite imagery: results from the 2012 survey of users

    Science.gov (United States)

    Miller, Holly M.; Richardson, Leslie A.; Koontz, Stephen R.; Loomis, John; Koontz, Lynne

    2013-01-01

    Landsat satellites have been operating since 1972, providing a continuous global record of the Earth’s land surface. The imagery is currently available at no cost through the U.S. Geological Survey (USGS). Social scientists at the USGS Fort Collins Science Center conducted an extensive survey in early 2012 to explore who uses Landsat imagery, how they use the imagery, and what the value of the imagery is to them. The survey was sent to all users registered with USGS who had accessed Landsat imagery in the year prior to the survey and over 11,000 current Landsat imagery users responded. The results of the survey revealed that respondents from many sectors use Landsat imagery in myriad project locations and scales, as well as application areas. The value of Landsat imagery to these users was demonstrated by the high importance of and dependence on the imagery, the numerous environmental and societal benefits observed from projects using Landsat imagery, the potential negative impacts on users’ work if Landsat imagery was no longer available, and the substantial aggregated annual economic benefit from the imagery. These results represent only the value of Landsat to users registered with USGS; further research would help to determine what the value of the imagery is to a greater segment of the population, such as downstream users of the imagery and imagery-derived products.

  20. Algorithmic PON/P2P FTTH Access Network Design for CAPEX Minimization

    DEFF Research Database (Denmark)

    Papaefthimiou, Kostantinos; Tefera, Yonas; Mihylov, Dimitar

    2013-01-01

    one. It provides an obvious advantage for the end users in terms of high achievable data rates. On the other hand, the high initial deployment cost required exists as the heaviest impediment. The main goal of this paper is to study different approaches when designing a fiber access network. More......Due to the emergence of high bandwidth-requiring services, telecommunication operators (telcos) are called to upgrade their fixed access network. In order to keep up with the competition, they must consider different optical access network solutions with Fiber To The Home (FTTH) as the prevailing...

  1. On the performance of shared access control strategy for femtocells

    KAUST Repository

    Magableh, Amer M.

    2013-02-18

    Femtocells can be employed in cellular systems to enhance the indoor coverage, especially in the areas with high capacity growing demands and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named as shared access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to improve and enhance the system performance. The system model considers a femtocell that is equipped with a total of N separated antennas or channels to multiplex independent traffic. Then, a set of N1 channels is used for closed access only by the authorized users, and the remaining set of channel resources can be used for open access by either authorized or unauthorized users upon their demands and spatial locations. For this system model, we obtain the signal-to-interference ratio characteristics, such as the distribution and the moment generating function, in closed forms for two fading models of indoor and outdoor environments. The signal-tointerference ratio statistics are then used to derive some important performance measures of the proposed SAP in closed form, such as the average bit error rate, outage probability, and average channel capacity for the two fading models under consideration. Numerical results for the obtained expressions are provided and supported by Monte Carlo simulations to validate the analytical development and study the effectiveness of the proposed SAP under different conditions. Copyright © 2012 John Wiley and Sons, Ltd.

  2. Tag, You're It: Enhancing Access to Graphic Novels

    Science.gov (United States)

    West, Wendy

    2013-01-01

    Current users of academic libraries are avid readers of graphic novels. These thought-provoking materials are used for leisure reading, in instruction, and for research purposes. Libraries need to take care in providing access to these resources. This study analyzed the cataloging practices and social tagging of a specific list of graphic novel…

  3. Viability of a New Road Infrastructure with Heterogeneous Users in Madrid Access

    OpenAIRE

    Pedro Cantos-Sanchez; Rafael Moner-Colonques; Jose J. Sempere-Monerris; Oscar Alvarez

    2008-01-01

    This paper explores the importance of heterogeneity in value of time when assessing the viability of a new road infrastructure to alleviate congestion problems. The Spanish government has developed a congestion pricing demonstration entering Madrid city centre, where road users have to choose between a free but highly congested road and a priced free-flowing road. We consider a continuum of users who differ in their value of time. Users dislike congestion and this is more so the more a user v...

  4. User Interface Technology for Formal Specification Development

    Science.gov (United States)

    Lowry, Michael; Philpot, Andrew; Pressburger, Thomas; Underwood, Ian; Lum, Henry, Jr. (Technical Monitor)

    1994-01-01

    Formal specification development and modification are an essential component of the knowledge-based software life cycle. User interface technology is needed to empower end-users to create their own formal specifications. This paper describes the advanced user interface for AMPHION1 a knowledge-based software engineering system that targets scientific subroutine libraries. AMPHION is a generic, domain-independent architecture that is specialized to an application domain through a declarative domain theory. Formal specification development and reuse is made accessible to end-users through an intuitive graphical interface that provides semantic guidance in creating diagrams denoting formal specifications in an application domain. The diagrams also serve to document the specifications. Automatic deductive program synthesis ensures that end-user specifications are correctly implemented. The tables that drive AMPHION's user interface are automatically compiled from a domain theory; portions of the interface can be customized by the end-user. The user interface facilitates formal specification development by hiding syntactic details, such as logical notation. It also turns some of the barriers for end-user specification development associated with strongly typed formal languages into active sources of guidance, without restricting advanced users. The interface is especially suited for specification modification. AMPHION has been applied to the domain of solar system kinematics through the development of a declarative domain theory. Testing over six months with planetary scientists indicates that AMPHION's interactive specification acquisition paradigm enables users to develop, modify, and reuse specifications at least an order of magnitude more rapidly than manual program development.

  5. Wheelchair accessibility to public buildings in Istanbul.

    Science.gov (United States)

    Evcil, A Nilay

    2009-03-01

    Accessibility to public environment is the human right and basic need of each citizen and is one of the fundamental considerations for urban planning. The aim of this study is to determine the compliance of public buildings in central business districts (CBD) of Istanbul, Turkey, to wheelchair accessibility to the guidelines of the instrument and identify architectural barriers faced by wheelchair users. This is a descriptive study of 26 public buildings in CBD of Istanbul. The instrument used is the adapted Useh, Moyo and Munyonga questionnaire to collect the data from direct observation and measurement. Descriptive statistics of simple percentages and means are used to explain the compliance to the guidelines of the instrument and wheelchair accessibility. The descriptive survey results indicate that wheelchair users experience many accessibility problems in public environment of the most urbanised city (cultural capital of Europe in 2010) in a developing country. It is found that the major architectural barrier is the public transportation items with the lowest mean compliance (25%). Beside this, the most compliant to the instrument is entrance to building items with 79% as mean percentage. It is also found that there is an intention to improve accessibility when building construction period is investigated. This article describes the example of the compliance of public buildings accessibility when the country has legislation, but lacking regulations about accessibility for the wheelchair users.

  6. Email based remote access and surveillance system for smart home infrastructure

    Directory of Open Access Journals (Sweden)

    Pooshkar Rajiv

    2016-09-01

    Full Text Available With the rapid rise of Internet of Things in public domain, people expect fast, reliable and on-demand home security via the Internet. However, existing remote home surveillance systems place a very rigid constraint on authentication and require customized hardware and software. In this paper we have proposed an ingenious and reliable internet based, home access system for smart homes that can be easily deployed on generic hardware. The proposed architecture uses popular email service providers to notify and update the user about the home access. It sends an email to the owner with the attached picture of the person who is at the door. It also incorporates a protected mechanism to give access of the door to a remote user by responding to that email. It essentially means that we can view and give access to the person at our door via sending and receiving an email. Furthermore, an image processing based mechanism has also been incorporated to provide access without email, to few selected personnel who are trusted by the owner. It works by capturing and comparing the visitor's image with the stored images in the database. Perceptual hashing or fingerprint matching algorithm is used for comparison purposes. Similarity percentage based on hamming distance was evaluated, and the similarity threshold for providing access was set. The simulations were performed in rigorous environment. The efficiency of the hashing algorithm was found to be 97% at the similarity threshold of 95%. The results validate that the average latency is only 155 ms with low standard deviation. The CPU utilization remained quite low with a minimum value of 10 MHz and a maximum value of 30 MHz when the payload size of the sent mail was increased to 1500 kB. Thus, the proposed system can be used for developing a larger low power infrastructure.

  7. A Key Establishment Protocol for RFID User in IPTV Environment

    Science.gov (United States)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  8. Nencki Genomics Database--Ensembl funcgen enhanced with intersections, user data and genome-wide TFBS motifs.

    Science.gov (United States)

    Krystkowiak, Izabella; Lenart, Jakub; Debski, Konrad; Kuterba, Piotr; Petas, Michal; Kaminska, Bozena; Dabrowski, Michal

    2013-01-01

    We present the Nencki Genomics Database, which extends the functionality of Ensembl Regulatory Build (funcgen) for the three species: human, mouse and rat. The key enhancements over Ensembl funcgen include the following: (i) a user can add private data, analyze them alongside the public data and manage access rights; (ii) inside the database, we provide efficient procedures for computing intersections between regulatory features and for mapping them to the genes. To Ensembl funcgen-derived data, which include data from ENCODE, we add information on conserved non-coding (putative regulatory) sequences, and on genome-wide occurrence of transcription factor binding site motifs from the current versions of two major motif libraries, namely, Jaspar and Transfac. The intersections and mapping to the genes are pre-computed for the public data, and the result of any procedure run on the data added by the users is stored back into the database, thus incrementally increasing the body of pre-computed data. As the Ensembl funcgen schema for the rat is currently not populated, our database is the first database of regulatory features for this frequently used laboratory animal. The database is accessible without registration using the mysql client: mysql -h database.nencki-genomics.org -u public. Registration is required only to add or access private data. A WSDL webservice provides access to the database from any SOAP client, including the Taverna Workbench with a graphical user interface.

  9. Integration of EGA secure data access into Galaxy.

    Science.gov (United States)

    Hoogstrate, Youri; Zhang, Chao; Senf, Alexander; Bijlard, Jochem; Hiltemann, Saskia; van Enckevort, David; Repo, Susanna; Heringa, Jaap; Jenster, Guido; J A Fijneman, Remond; Boiten, Jan-Willem; A Meijer, Gerrit; Stubbs, Andrew; Rambla, Jordi; Spalding, Dylan; Abeln, Sanne

    2016-01-01

    High-throughput molecular profiling techniques are routinely generating vast amounts of data for translational medicine studies. Secure access controlled systems are needed to manage, store, transfer and distribute these data due to its personally identifiable nature. The European Genome-phenome Archive (EGA) was created to facilitate access and management to long-term archival of bio-molecular data. Each data provider is responsible for ensuring a Data Access Committee is in place to grant access to data stored in the EGA. Moreover, the transfer of data during upload and download is encrypted. ELIXIR, a European research infrastructure for life-science data, initiated a project (2016 Human Data Implementation Study) to understand and document the ELIXIR requirements for secure management of controlled-access data. As part of this project, a full ecosystem was designed to connect archived raw experimental molecular profiling data with interpreted data and the computational workflows, using the CTMM Translational Research IT (CTMM-TraIT) infrastructure http://www.ctmm-trait.nl as an example. Here we present the first outcomes of this project, a framework to enable the download of EGA data to a Galaxy server in a secure way. Galaxy provides an intuitive user interface for molecular biologists and bioinformaticians to run and design data analysis workflows. More specifically, we developed a tool -- ega_download_streamer - that can download data securely from EGA into a Galaxy server, which can subsequently be further processed. This tool will allow a user within the browser to run an entire analysis containing sensitive data from EGA, and to make this analysis available for other researchers in a reproducible manner, as shown with a proof of concept study.  The tool ega_download_streamer is available in the Galaxy tool shed: https://toolshed.g2.bx.psu.edu/view/yhoogstrate/ega_download_streamer.

  10. Reported Design Processes for Accessibility in Rail Transport

    DEFF Research Database (Denmark)

    Herriott, Richard; Cook, Sharon

    2014-01-01

    Accessibility is a fundamental requirement in public transport (PT) yet there exists little research on design for accessibility or inclusive design (ID) in this area. This paper sets out to discover what methods are used in the rail sector to achieve accessibility goals and to examine how far...... these methods deviate from user-centred and ID norms. Semi-structured interviews were conducted with nine rolling stock producers, operators and design consultancies. The purpose was to determine if ID design methods are used explicitly and the extent to which the processes used conformed to ID (if at all......). The research found that the role of users in the design process of manufacturers was limited and that compliance with industry standards was the dominant means to achieving accessibility goals. Design consultancies were willing to apply more user-centred design if the client requested it. Where operators were...

  11. Design and simulations of a spectral efficient optical code division multiple access scheme using alternated energy differentiation and single-user soft-decision demodulation

    Science.gov (United States)

    A. Garba, Aminata

    2017-01-01

    This paper presents a new approach to optical Code Division Multiple Access (CDMA) network transmission scheme using alternated amplitude sequences and energy differentiation at the transmitters to allow concurrent and secure transmission of several signals. The proposed system uses error control encoding and soft-decision demodulation to reduce the multi-user interference at the receivers. The design of the proposed alternated amplitude sequences, the OCDMA energy modulators and the soft decision, single-user demodulators are also presented. Simulation results show that the proposed scheme allows achieving spectral efficiencies higher than several reported results for optical CDMA and much higher than the Gaussian CDMA capacity limit.

  12. Interfaces for End-User Information Seeking.

    Science.gov (United States)

    Marchionini, Gary

    1992-01-01

    Discusses essential features of interfaces to support end-user information seeking. Highlights include cognitive engineering; task models and task analysis; the problem-solving nature of information seeking; examples of systems for end-users, including online public access catalogs (OPACs), hypertext, and help systems; and suggested research…

  13. Designing Broadband Access Networks with Triple Redundancy

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Riaz, Muhammad Tahir; Knudsen, Thomas Phillip

    2005-01-01

    An architecture is proposed for designing broadband access networks, which offer triple redundancy to the end users, resulting in networks providing connectivity even in case of any two independent node or line failures. Two physically independent connections are offered by fiber, and the last...... provided by some wireless solution. Based on experience with planning Fiber To The Home, the architecture is designed to meet a number of demands, making it practicable and useful in realworld network planning. The proposed wired topology is planar, and suitable for being fitted onto the road network...

  14. Instant messaging: The way to improve access for young people to their school nurse.

    Science.gov (United States)

    Schuller, Lynne; Thaker, Kelly

    2015-12-01

    Children and young people require ease of access to their school nurse. Alongside this, school nurses are charged with the need to work smarter, being cost-effective and timely in response. School nursing teams across the country provide access through text messaging, however, there is presently no access provided to young people to have a consultation as a web-based chat facility. Using digital media, Doncaster school nurses have worked closely with young people to redesign and launch a totally interactive web- based clinic facility. This allows for improved access, reduction in travel costs and consultations to take place outside of the traditional times for accessing school nurses. This paper discusses a pilot project around the establishment of an e-clinic connecting young people and school nurses. It outlines the journey towards providing this innovative service in an attempt to provide cost-effective, timely services while reducing the barriers for service users.

  15. Apollo: giving application developers a single point of access to public health models using structured vocabularies and Web services.

    Science.gov (United States)

    Wagner, Michael M; Levander, John D; Brown, Shawn; Hogan, William R; Millett, Nicholas; Hanna, Josh

    2013-01-01

    This paper describes the Apollo Web Services and Apollo-SV, its related ontology. The Apollo Web Services give an end-user application a single point of access to multiple epidemic simulators. An end user can specify an analytic problem-which we define as a configuration and a query of results-exactly once and submit it to multiple epidemic simulators. The end user represents the analytic problem using a standard syntax and vocabulary, not the native languages of the simulators. We have demonstrated the feasibility of this design by implementing a set of Apollo services that provide access to two epidemic simulators and two visualizer services.

  16. Service on demand for ISS users

    Science.gov (United States)

    Hüser, Detlev; Berg, Marco; Körtge, Nicole; Mildner, Wolfgang; Salmen, Frank; Strauch, Karsten

    2002-07-01

    Since the ISS started its operational phase, the need of logistics scenarios and solutions, supporting the utilisation of the station and its facilities, becomes increasingly important. Our contribution to this challenge is a SERVICE On DEMAND for ISS users, which offers a business friendly engineering and logistics support for the resupply of the station. Especially the utilisation by commercial and industrial users is supported and simplified by this service. Our industrial team, consisting of OHB-System and BEOS, provides experience and development support for space dedicated hard- and software elements, their transportation and operation. Furthermore, we operate as the interface between customer and the envisaged space authorities. Due to a variety of tailored service elements and the ongoing servicing, customers can concentrate on their payload content or mission objectives and don't have to deal with space-specific techniques and regulations. The SERVICE On DEMAND includes the following elements: ITR is our in-orbit platform service. ITR is a transport rack, used in the SPACEHAB logistics double module, for active and passive payloads on subrack- and drawer level of different standards. Due to its unique late access and early retrieval capability, ITR increases the flexibility concerning transport capabilities to and from the ISS. RIST is our multi-functional test facility for ISPR-based experiment drawer and locker payloads. The test program concentrates on physical and functional interface and performance testing at the payload developers site prior to the shipment to the integration and launch. The RIST service program comprises consulting, planning and engineering as well. The RIST test suitcase is planned to be available for lease or rent to users, too. AMTSS is an advanced multimedia terminal consulting service for communication with the space station scientific facilities, as part of the user home-base. This unique ISS multimedia kit combines

  17. 'Surfing the Silk Road': a study of users' experiences.

    Science.gov (United States)

    Van Hout, Marie Claire; Bingham, Tim

    2013-11-01

    The online drug marketplace called 'Silk Road' has operated anonymously on the 'Deep Web' since 2011. It is accessible through computer encrypting software (Tor) and is supported by online transactions using peer to peer anonymous and untraceable crypto-currency (Bit Coins). The study aimed to describe user motives and realities of accessing, navigating and purchasing on the 'Silk Road' marketplace. Systematic online observations, monitoring of discussion threads on the site during four months of fieldwork and analysis of anonymous online interviews (n=20) with a convenience sample of adult 'Silk Road' users was conducted. The majority of participants were male, in professional employment or in tertiary education. Drug trajectories ranged from 18 months to 25 years, with favourite drugs including MDMA, 2C-B, mephedrone, nitrous oxide, ketamine, cannabis and cocaine. Few reported prior experience of online drug sourcing. Reasons for utilizing 'Silk Road' included curiosity, concerns for street drug quality and personal safety, variety of products, anonymous transactioning, and ease of product delivery. Vendor selection appeared to be based on trust, speed of transaction, stealth modes and quality of product. Forums on the site provided user advice, trip reports, product and transaction reviews. Some users reported solitary drug use for psychonautic and introspective purposes. A minority reported customs seizures, and in general a displacement away from traditional drug sourcing (street and closed markets) was described. Several reported intentions to commence vending on the site. The study provides an insight into 'Silk Road' purchasing motives and processes, the interplay between traditional and 'Silk Road' drug markets, the 'Silk Road' online community and its communication networks. Copyright © 2013 Elsevier B.V. All rights reserved.

  18. Power adaptive multi-filter carrierless amplitude and phase access scheme for visible light communication network

    Science.gov (United States)

    Li, Wei; Huang, Zhitong; Li, Haoyue; Ji, Yuefeng

    2018-04-01

    Visible light communication (VLC) is a promising candidate for short-range broadband access due to its integration of advantages for both optical communication and wireless communication, whereas multi-user access is a key problem because of the intra-cell and inter-cell interferences. In addition, the non-flat channel effect results in higher losses for users in high frequency bands, which leads to unfair qualities. To solve those issues, we propose a power adaptive multi-filter carrierless amplitude and phase access (PA-MF-CAPA) scheme, and in the first step of this scheme, the MF-CAPA scheme utilizing multiple filters as different CAP dimensions is used to realize multi-user access. The character of orthogonality among the filters in different dimensions can mitigate the effect of intra-cell and inter-cell interferences. Moreover, the MF-CAPA scheme provides different channels modulated on the same frequency bands, which further increases the transmission rate. Then, the power adaptive procedure based on MF-CAPA scheme is presented to realize quality fairness. As demonstrated in our experiments, the MF-CAPA scheme yields an improved throughput compared with multi-band CAP access scheme, and the PA-MF-CAPA scheme enhances the quality fairness and further improves the throughput compared with the MF-CAPA scheme.

  19. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  20. Experiences of Fast Queue health care users in primary health care facilities in eThekwini district, South AfricaExperiences of Fast Queue health care users in primary health care facilities in eThekwini district, South Africa

    Directory of Open Access Journals (Sweden)

    Dudu G. Sokhela

    2013-07-01

    Full Text Available Background: Comprehensive Primary Health Care (PHC, based on the principles of accessibility, availability, affordability, equity and acceptability, was introduced in South Africa to address inequalities in health service provision. Whilst the Fast Queue was instrumental in the promotion of access to health care, a major goal of the PHC approach, facilities were not prepared for the sudden influx of clients. Increased access resulted in long waiting times and queues contributing to dissatisfaction with the service which could lead to missed appointments and non-compliance with established treatment plans.Objectives: Firstly to describe the experiences of clients using the Fast Queue strategy to access routine healthcare services and secondly, to determine how the clients’ experiences led to satisfaction or dissatisfaction with the Fast Queue service.Method: A descriptive qualitative survey using content analysis explored the experiences of the Fast Queue users in a PHC setting. Setting was first identified based on greatest number using the Fast Queue and geographic diversity and then a convenience sample of health care users of the Fast Queue were sampled individually along with one focus group of users who accessed the Queue monthly for medication refills. The same interview guide questions were used for both individual interviews and the one focus group discussion. Five clinics with the highest number of attendees during a three month period and a total of 83 health care users of the Fast Queue were interviewed. The average participant was female, 31 years old, single and unemployed.Results: Two themes with sub-themes emerged: health care user flow and communication, which highlights both satisfaction and dissatisfaction with the fast queue and queue marshals, could assist in directing users to the respective queues, reduce waiting time and keep users satisfied with the use of sign posts where there is a lack of human resources