WorldWideScience

Sample records for public access computing

  1. Public access computing in health science libraries.

    Science.gov (United States)

    Kehm, S

    1987-01-01

    Public access computing in health science libraries began with online computer-assisted instruction. Library-based collections and services have expanded with advances in microcomputing hardware and software. This growth presents problems: copyright, quality, instability in the publishing industry, and uncertainty about collection scope; librarians managing the new services require new skills to support their collections. Many find the cooperative efforts of several organizational units are required. Current trends in technology for the purpose of information management indicate that these services will continue to be a significant focus for libraries.

  2. 36 CFR 1254.32 - What rules apply to public access use of the Internet on NARA-supplied computers?

    Science.gov (United States)

    2010-07-01

    ... access use of the Internet on NARA-supplied computers? 1254.32 Section 1254.32 Parks, Forests, and Public... of the Internet on NARA-supplied computers? (a) Public access computers (workstations) are available... use personally owned diskettes on NARA personal computers. You may not load files or any type of...

  3. Public library computer training for older adults to access high-quality Internet health information.

    Science.gov (United States)

    Xie, Bo; Bugg, Julie M

    2009-09-01

    An innovative experiment to develop and evaluate a public library computer training program to teach older adults to access and use high-quality Internet health information involved a productive collaboration among public libraries, the National Institute on Aging and the National Library of Medicine of the National Institutes of Health (NIH), and a Library and Information Science (LIS) academic program at a state university. One hundred and thirty-one older adults aged 54-89 participated in the study between September 2007 and July 2008. Key findings include: a) participants had overwhelmingly positive perceptions of the training program; b) after learning about two NIH websites (http://nihseniorhealth.gov and http://medlineplus.gov) from the training, many participants started using these online resources to find high quality health and medical information and, further, to guide their decision-making regarding a health- or medically-related matter; and c) computer anxiety significantly decreased (p libraries, LIS academic programs, and other organizations interested in providing similar programs in their communities.

  4. An Overview of Public Access Computer Software Management Tools for Libraries

    Science.gov (United States)

    Wayne, Richard

    2004-01-01

    An IT decision maker gives an overview of public access PC software that's useful in controlling session length and scheduling, Internet access, print output, security, and the latest headaches: spyware and adware. In this article, the author describes a representative sample of software tools in several important categories such as setup…

  5. BPO crude oil analysis data base user`s guide: Methods, publications, computer access correlations, uses, availability

    Energy Technology Data Exchange (ETDEWEB)

    Sellers, C.; Fox, B.; Paulz, J.

    1996-03-01

    The Department of Energy (DOE) has one of the largest and most complete collections of information on crude oil composition that is available to the public. The computer program that manages this database of crude oil analyses has recently been rewritten to allow easier access to this information. This report describes how the new system can be accessed and how the information contained in the Crude Oil Analysis Data Bank can be obtained.

  6. Awareness of Accessibility Barriers in Computer-Based Instructional Materials and Faculty Demographics at South Dakota Public Universities

    Science.gov (United States)

    Olson, Christopher

    2013-01-01

    Advances in technology and course delivery methods have enabled persons with disabilities to enroll in higher education at an increasing rate. Federal regulations state persons with disabilities must be granted equal access to the information contained in computer-based instructional materials, but faculty at the six public universities in South…

  7. Public Access Technologies in Public Libraries: Effects and Implications

    Directory of Open Access Journals (Sweden)

    John Carlo Bertot

    2009-06-01

    Full Text Available Public libraries were early adopters of Internet-based technologies and have provided public access to the Internet and computers since the early 1990s. The landscape of public-access Internet and computing was substantially different in the 1990s as the World Wide Web was only in its initial development. At that time, public libraries essentially experimented with publicaccess Internet and computer services, largely absorbing this service into existing service and resource provision without substantial consideration of the management, facilities, staffing, and other implications of public-access technology (PAT services and resources. This article explores the implications for public libraries of the provision of PAT and seeks to look further to review issues and practices associated with PAT provision resources. While much research focuses on the amount of public access that public libraries provide, little offers a view of the effect of public access on libraries. This article provides insights into some of the costs, issues, and challenges associated with public access and concludes with recommendations that require continued exploration.

  8. Public Access Defibrillation

    DEFF Research Database (Denmark)

    Agerskov, Marianne; Nielsen, Anne Møller; Hansen, Carolina Malta

    2015-01-01

    of OHCA-cases where an accessible AED was located within 100 m. In addition, we assessed 30-day survival. METHODS: Using data from the Mobile Emergency Care Unit and the Danish Cardiac Arrest Registry, we identified 521 patients with OHCA between October 1, 2011 and September 31, 2013 in Copenhagen......, Denmark. RESULTS: An AED was applied in 20 cases (3.8%, 95% CI [2.4 to 5.9]). Irrespective of AED accessibility, an AED was located within 100 m of a cardiac arrest in 23.4% (n=102, 95% CI [19.5 to 27.7]) of all OHCAs. However, at the time of OHCA, an AED was located within 100 m and accessible in only 15...... to ambulance arrival, but 15.1% of all OHCAs occurred within 100 m of an accessible AED. This indicates the potential of utilising AED networks by improving strategies for AED accessibility and referring bystanders of OHCA to existing AEDs....

  9. 47 CFR 76.702 - Public access.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Public access. 76.702 Section 76.702... CABLE TELEVISION SERVICE Cable Television Access § 76.702 Public access. A cable operator may refuse to transmit any public access program or portion of a public access program that the operator...

  10. Public Computation & Boundary Play

    CERN Document Server

    Sengupta, Pratim

    2016-01-01

    In this paper, we introduce 'public computation' as a genre of learning environments that can be used to radically broaden public participation in authentic, computation-enabled STEM disciplinary practices. Our paradigmatic approach utilizes open source software designed for professional scientists, engineers and digital artists, and situates them in an undiluted form, alongside live and archived expert support, in a public space. We present a case study of DigiPlay, a prototypical public computation space we designed at the University of Calgary, where users can interact directly with scientific simulations as well as the underlying open source code using an array of massive multi- touch screens. We argue that in such a space, public interactions with the code can be thought of as boundary work and play, through which public participation becomes legitimate scientific act, as the public engages in scientific creation through truly open-ended explorations with the code.

  11. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  12. 37 CFR 251.22 - Public access.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Public access. 251.22 Section... ROYALTY PANEL RULES AND PROCEDURES COPYRIGHT ARBITRATION ROYALTY PANEL RULES OF PROCEDURE Public Access to and Inspection of Records § 251.22 Public access. (a) Location of records. All of the...

  13. 5 CFR 1320.14 - Public access.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Public access. 1320.14 Section 1320.14 Administrative Personnel OFFICE OF MANAGEMENT AND BUDGET OMB DIRECTIVES CONTROLLING PAPERWORK BURDENS ON THE PUBLIC § 1320.14 Public access. (a) In order to enable the public to participate in and provide...

  14. 20 CFR 655.550 - Public access.

    Science.gov (United States)

    2010-04-01

    ... Activities in U.S. Ports Public Access § 655.550 Public access. (a) Public examination at ETA. ETA shall make... this subpart, and for each such employer, a copy of the employer's attestation and accompanying documentation it has received. (b) Notice to public. ETA periodically shall publish a list in the...

  15. Automated Computer Access Request System

    Science.gov (United States)

    Snook, Bryan E.

    2010-01-01

    The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).

  16. 20 CFR 655.350 - Public access.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Public access. 655.350 Section 655.350 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR TEMPORARY EMPLOYMENT OF... Nurses § 655.350 Public access. (a) Public examination at ETA. ETA shall make available for...

  17. True Public Access Defibrillator Coverage is Overestimated

    NARCIS (Netherlands)

    Sun, Christopher L.F.; Demirtas, Derya; Brooks, Steven C.; Morrison, Laurie J.; Chan, Timothy C.Y.

    2015-01-01

    Background: Out-of-hospital cardiac arrests (OHCAs) occur at all times of the day and night. Immediate access to an AED increases survival. However, most public-location AEDs are placed in buildings without 24 hour access. Objective: To measure fixed-location public AED coverage of OHCAs by time

  18. Open Access publicering på Metropol

    DEFF Research Database (Denmark)

    Azbi, Trine; Larsen, Bente; Møbjerg, Anna Christine Meinertz

    2016-01-01

    Resultater af en afdækning og analyse af Open Access (OA) publicering på Professionshøjskolen Metropol......Resultater af en afdækning og analyse af Open Access (OA) publicering på Professionshøjskolen Metropol...

  19. 20 CFR 655.950 - Public access.

    Science.gov (United States)

    2010-04-01

    ....950 Public access. (a) Public examination at ETA. ETA shall compile and maintain a list of employers who filed attestations specifying the occupation(s), geographical location, and wage rate(s) attested to. The list shall be available for public inspection at the ETA office at which the attestation...

  20. Public Access and Open Access: Is There a Difference? | Poster

    Science.gov (United States)

    By Robin Meckley, Contributing Writer, and Tracie Frederick, Guest Writer Open access and public access—are they different concepts or are they the same? What do they mean for the researchers at NCI at Frederick? “Open-access (OA) literature is digital, online, free of charge, and free of most copyright and licensing restrictions. What makes it possible is the Internet and the consent of the author or copyright-holder,” according to an open access website maintained by Peter Suber, director, Harvard Open Access Project.

  1. Public Access and Open Access: Is There a Difference? | Poster

    Science.gov (United States)

    By Robin Meckley, Contributing Writer, and Tracie Frederick, Guest Writer Open access and public access—are they different concepts or are they the same? What do they mean for the researchers at NCI at Frederick? “Open-access (OA) literature is digital, online, free of charge, and free of most copyright and licensing restrictions. What makes it possible is the Internet and the consent of the author or copyright-holder,” according to an open access website maintained by Peter Suber, director, Harvard Open Access Project.

  2. Calculating True Computer Access in Schools.

    Science.gov (United States)

    Slovacek, Simeon P.

    1992-01-01

    Discusses computer access in schools; explains how to determine sufficient quantities of computers; and describes a formula that illustrates the relationship between student access hours, the number of computers in a school, and the number of instructional hours in a typical school week. (six references) (LRW)

  3. Open Access: (Social Sciences as Public Good

    Directory of Open Access Journals (Sweden)

    Katja Mruck

    2004-05-01

    Full Text Available The need to provide open access to articles published in peer-reviewed scholarly journals is becoming apparent to researchers as well as the non-scientific public as a result of "Budapest Open Access Initiative," the "Berlin Declaration on Open Access to Knowledge in the Sciences and Humanities" and other initiatives. The core question that concerns open access is the following: since scientific information is usually financed by public funding, and therefore a public good, shouldn't the access be free of cost to all interested parties. Currently the open access movement is encountering the movement against the "Digital Divide," and therefore it is not surprising that the demand for open access has extended to a political level as reflected in the "WSIS Declaration of Principles" and the "WSIS Plan of Action." This article begins by providing a brief summary of the historical background of the open access movement and its major aims (Section 2. It then lists examples that explain possible links between the open access movement and the initiatives against the "Digital Divide" (Section 3. Section 4 considers some important barriers responsible for the fact that open access publishing is still not part of the everyday scientific publishing practices. This has various consequences. Selected consequences concerning the recent debate on redistribution processes between "information poor" and "information rich" are summarized in Section 5. URN: urn:nbn:de:0114-fqs0402141

  4. Access to scientific publications: the scientist's perspective.

    Directory of Open Access Journals (Sweden)

    Yegor Voronin

    Full Text Available BACKGROUND: Scientific publishing is undergoing significant changes due to the growth of online publications, increases in the number of open access journals, and policies of funders and universities requiring authors to ensure that their publications become publicly accessible. Most studies of the impact of these changes have focused on the growth of articles available through open access or the number of open-access journals. Here, we investigated access to publications at a number of institutes and universities around the world, focusing on publications in HIV vaccine research--an area of biomedical research with special importance to the developing world. METHODS AND FINDINGS: We selected research papers in HIV vaccine research field, creating: 1 a first set of 50 most recently published papers with keywords "HIV vaccine" and 2 a second set of 200 articles randomly selected from those cited in the first set. Access to the majority (80% of the recently published articles required subscription, while cited literature was much more accessible (67% freely available online. Subscriptions at a number of institutions around the world were assessed for providing access to subscription-only articles from the two sets. The access levels varied widely, ranging among institutions from 20% to 90%. Through the WHO-supported HINARI program, institutes in low-income countries had access comparable to that of institutes in the North. Finally, we examined the response rates for reprint requests sent to corresponding authors, a method commonly used before internet access became widespread. Contacting corresponding authors with requests for electronic copies of articles by email resulted in a 55-60% success rate, although in some cases it took up to 1.5 months to get a response. CONCLUSIONS: While research articles are increasingly available on the internet in open access format, institutional subscriptions continue to play an important role. However

  5. Libraries and Accessibility: Istanbul Public Libraries Case

    Directory of Open Access Journals (Sweden)

    Gül Yücel

    2016-12-01

    Full Text Available In the study; the assessment of accessibility has been conducted in Istanbul public libraries within the scope of public area. Public libraries commonly serve with its user of more than 20 million in total, spread to the general of Turkey, having more than one thousand branches in the centrums and having more than one million registered members. The building principles and standards covering the subjects such as the selection of place, historical and architectural specification of the region, distance to the centre of population and design in a way that the disabled people could benefit from the library services fully have been determined with regulations in the construction of new libraries. There are works for the existent libraries such as access for the disabled, fire safety precautions etc. within the scope of the related standards. Easy access by everyone is prioritized in the public libraries having a significant role in life-long learning. The purpose of the study is to develop solution suggestions for the accessibility problems in the public libraries. The study based on the eye inspection and assessments carried out within the scope of accessibility in the public libraries subsidiary to Istanbul Culture and Tourism Provincial Directorate Library and Publications Department within the provincial borders of Istanbul. The arrangements such as reading halls, study areas, book shelves etc. have been examined within the frame of accessible building standards. Building entrances, ramps and staircases, horizontal and vertical circulation of building etc. have been taken into consideration within the scope of accessible building standards. The subjects such as the reading and studying areas and book shelf arrangements for the library have been assessed within the scope of specific buildings. There are a total of 34 public libraries subsidiary to Istanbul Culture and Tourism Provincial Directorate on condition that 20 ea. of them are in the

  6. Accessibility of GI for Public Participation

    DEFF Research Database (Denmark)

    Arleth, Mette; Campagna, Michele

    2005-01-01

    The paper reports an ongoing comparative study on the accessibility of Geographic Information at public authorities’ websites in Denmark and Italy. The purpose of the study is twofold; to give an idea of the latest development and diffusion of GI on public authorities websites, and to identify...

  7. Web accessibility of public universities in Andalusia

    Directory of Open Access Journals (Sweden)

    Luis Alejandro Casasola Balsells

    2017-06-01

    Full Text Available This paper describes an analysis conducted in 2015 to evaluate the accessibility of content on Andalusian public university websites. In order to determinate whether these websites are accessible, an assessment has been carried out to check conformance with the latest Web Content Accessibility Guidelines (WCAG 2.0 established by the World Wide Web Consortium (W3C. For this purpose, we have designed a methodology for analysis that combines the use of three automatic tools (eXaminator, MINHAP web accessibility tool, and TAW with a manual analysis to provide a greater reliability and validity of the results. Although the results are acceptable overall, a detailed analysis shows that more is still needed for achieving full accessibility for the entire university community. In this respect, we suggest several corrections to common accessibility errors for facilitating the design of university web portals.

  8. Authentication and Access: Accommodating Public Users in an Academic World

    Directory of Open Access Journals (Sweden)

    Lynne Weber

    2010-09-01

    Full Text Available In the fall of 2004, the Academic Computing Center, a division of the Information Technology Services Department (ITS at Minnesota State University, Mankato took over responsibility for the computers in the public areas of Memorial Library. For the first time, affiliated Memorial Library users were required to authenticate using a campus username and password, a change that effectively eliminated computer access for anyone not part of the university community. This posed a dilemma for the librarians. Because of its Federal Depository status, the library had a responsibility to provide general access to both print and online government publications for the general public. Furthermore, the library had a long tradition of providing guest access to most library resources, and there was reluctance to abandon the practice. Therefore the librarians worked with ITS to retain a small group of six computers that did not require authentication and were clearly marked for community use, along with several standup, open-access computers on each floor used primarily for searching the library catalog. The additional need to provide computer access to high school students visiting the library for research and instruction led to more discussions with ITS and resulted in a means of generating temporary usernames and passwords through a Web form. These user accommodations were implemented in the library without creating a written policy governing the use of open-access computers.

  9. Publication-quality computer graphics

    Energy Technology Data Exchange (ETDEWEB)

    Slabbekorn, M.H.; Johnston, R.B. Jr.

    1981-01-01

    A user-friendly graphic software package is being used at Oak Ridge National Laboratory to produce publication-quality computer graphics. Close interaction between the graphic designer and computer programmer have helped to create a highly flexible computer graphics system. The programmer-oriented environment of computer graphics has been modified to allow the graphic designer freedom to exercise his expertise with lines, form, typography, and color. The resultant product rivals or surpasses that work previously done by hand. This presentation of computer-generated graphs, charts, diagrams, and line drawings clearly demonstrates the latitude and versatility of the software when directed by a graphic designer.

  10. Open Access Policy for CERN Physics Publications

    CERN Multimedia

    2014-01-01

    CERN is committed to Open Access. It represents one of the values written in our Convention sixty years ago and is increasingly important for our Member States.   In the last edition of the Bulletin, this article described how CERN is doing with regards to open access publishing today. On Thursday this week, the Open Access Policy for CERN Physics Publications* was endorsed by the Scientific Information Policy Board (SIPB) and approved by the Director-General the same day . For any clarifications regarding the policy, please contact the Scientific Information Service library.desk@cern.ch. * A French version of the policy will be made available shortly.

  11. The Internet accessible mathematical computation framework

    Institute of Scientific and Technical Information of China (English)

    Paul S. Wang; Simon Gray; Norbert Kajler; Dongdai Lin; Weidong Liao; Xiao Zou

    2004-01-01

    The Internet Accessible Mathematical Computation (IAMC) framework aims to make it easy to supply mathematical computing powers over the Internet/Web. The protocol-based IAMC framework enables developers to create interoperable clients and servers easily and independently. Presented are conceptual and experimental work on the IAMC framework architecture and major components: the Mathematical Computation Protocol (MCP), a client prototype (Dragonfly), a server prototype (Starfish), a mathematical encoding converter (XMEC), and an open mathematical compute engine interface (OMEI).

  12. Open Access Scholarly Publications as OER

    Directory of Open Access Journals (Sweden)

    Terry Anderson

    2013-06-01

    Full Text Available This paper presents the rationale, common practices, challenges, and some personal anecdotes from a journal editor on the production, use, and re-use of peer-reviewed scholarly articles as open educational resources (OER. The scholarly and professional discourse related to open educational resources has largely focused on open learning objects, courseware, and textbooks. However, especially in graduate education, articles published in scholarly journals are often a major component of the course content in formal education. In addition, open access journal articles are critical to expanding access to knowledge by scholars in the developing world and in fostering citizen science, by which everyone has access to the latest academic information and research results. In this article, I highlight some of the challenges, economic models, and evidence for quality of open access journal content and look at new affordances provided by the Net for enhanced functionality, access, and distribution.In the 17 years since I graduated with a doctorate degree, the climate and acceptance of open access publishing has almost reversed itself. I recall a conversation with my PhD supervisor in which he argued that publishing online was not a viable option as the product would not have permanency, scholarly recognition, or the prestige of a paper publication. His comments reflect the confusion between online resources and those described as open access, but as well illustrate the change in academic acceptance and use of open access products during the past decade. The evolution from paper to online production and consumption is a disruptive technology in which much lower cost and increased accessibility of online work opens the product to a completely new group of potential users. In the case of OER these consumers are primarily students, but certainly access to scholars from all parts of the globe and the availability to support citizen science (Silvertown, 2009

  13. Remote computer access through Android mobiles

    Directory of Open Access Journals (Sweden)

    Jaya Bharathi Chintalapati

    2012-09-01

    Full Text Available In this paper, we will present the process to access the computers with the help of android mobile phones. This process is based on VNC (virtual network computing technique. So to work on this, we must install VNC server on our computer connected with Wi-Fi network. The user can access and perform operation through the range of Wi-Fi platforms like Linux, Mac, windows etc. The image of the desktop is compressed before it is transmitted to the cellular phone. There are several functions provided so as to ease the viewing on cell-phones. There is shortcut function that can be used to quickly access the frequently used area. Current key assignments can be viewed using guidance function. A user can view two areas simultaneously using a twin view function. The prototype is already implemented using java and tested on a java based cellular phone.

  14. Accessibility mapping in cultural public buildings

    Directory of Open Access Journals (Sweden)

    Luciene Gomes

    2016-07-01

    Full Text Available Objective: This study analyzed issues regarding accessibility in cultural facilities and aimed to analyze accessibility in the municipal cultural institutions and two districts of São Paulo state. Method: All cultural buildings were visited and, using a checklist based on the Brazilian Association of Technical Standards (NBR 9050, 2004, the public spaces were classed as adequate or inadequate with respect to their accessibility to people with a visual and physical disability. The data collected was subjected to descriptive analysis by scoring the most common accessibility resources, their adequacy as well as the resources not installed. Results: The results show that all the external and internal areas of the analyzed buildings need for adaptations, installations or the building of equipment that allows the physically or visually disabled to interact with the environment in the chosen cultural spaces. The work showed that the best evaluated item were the ramps and the worst was the tactile map, absent in all buildings. Conclusion: The data show the “state of the art” in the chosen city and discussed the difficulties in the implementation of Brazilian Association of Technical standards, both in construction and in the adaptations, pointing new accessibility concerns on the studied cities.

  15. PUBLIC ACCESS TO PRIVATE LAND IN SCOTLAND

    Directory of Open Access Journals (Sweden)

    David L Carey Miller

    2012-08-01

    Full Text Available This article attempts to understand the radical reform of Scottish land law in its provision for a general right of public access to private land introduced in 2003 as part of land reform legislation, an important aspect of the initial agenda of the Scottish Parliament revived in 1999. The right is to recreational access for a limited period and the right to cross land. Access can be taken only on foot or by horse or bicycle. As a starting point clarification of the misunderstood pre-reform position is attempted. The essential point is that Scots common law does not give civil damages for a simple act of trespass (as English law does but only a right to obtain removal of the trespasser. Under the reforms the longstanding Scottish position of landowners allowing walkers access to the hills and mountains becomes a legal right. A critical aspect of the new right is that it is one of responsible access; provided a landowner co-operates with the spirit and system of the Act access can be denied on the basis that it is not being exercised responsibly. But the onus is on the landowner to show that the exercise of the right is not responsible.Although the right applies to all land a general exception protects the privacy of a domestic dwelling. Early case law suggests that the scope of this limit depends upon particular circumstances although reasonable 'garden ground' is likely to be protected. There are various particular limits such as school land.Compliance with the protection of property under the European Convention on Human Rights is discussed. The article emphasises the latitude, open to nations, for limitations to the right of ownership in land in the public interest. The extent of the Scottish access inroad illustrates this. This leads to the conclusion that 'land governance' – the subject of the Potchefstroom Conference at which the paper was initially presented – largely remains a matter for domestic law; the lex situs concept is alive

  16. Magnetic Random Access Memory for Embedded Computing

    Science.gov (United States)

    2007-10-29

    Nicholas D. Rizzo, John Salter , Mark Durlam, Renu W. Dave, Jason Janesky, Brian Butcher, Ken Smith, 153 and Greg Grynkewich. Magnetoresistive random access...single magnetoresistive element. Nature, 425:485–487, October 2, 2003. [184] A. Ney and J. S. Harris , Jr. Reconfigurable magnetologic computing using the

  17. Path Not Found: Disparities in Access to Computer Science Courses in California High Schools

    Science.gov (United States)

    Martin, Alexis; McAlear, Frieda; Scott, Allison

    2015-01-01

    "Path Not Found: Disparities in Access to Computer Science Courses in California High Schools" exposes one of the foundational causes of underrepresentation in computing: disparities in access to computer science courses in California's public high schools. This report provides new, detailed data on these disparities by student body…

  18. Public Access to NASA's Earth Science Data

    Science.gov (United States)

    Behnke, J.; James, N.

    2013-12-01

    Many steps have been taken over the past 20 years to make NASA's Earth Science data more accessible to the public. The data collected by NASA represent a significant public investment in research. NASA holds these data in a public trust to promote comprehensive, long-term Earth science research. Consequently, NASA developed a free, open and non-discriminatory policy consistent with existing international policies to maximize access to data and to keep user costs as low as possible. These policies apply to all data archived, maintained, distributed or produced by NASA data systems. The Earth Observing System Data and Information System (EOSDIS) is a major core capability within NASA Earth Science Data System Program. EOSDIS is designed to ingest, process, archive, and distribute data from approximately 90 instruments. Today over 6800 data products are available to the public through the EOSDIS. Last year, EOSDIS distributed over 636 million science data products to the user community, serving over 1.5 million distinct users. The system supports a variety of science disciplines including polar processes, land cover change, radiation budget, and most especially global climate change. A core philosophy of EOSDIS is that the general user is best served by providing discipline specific support for the data. To this end, EOSDIS has collocated NASA Earth science data with centers of science discipline expertise, called Distributed Active Archive Centers (DAACs). DAACs are responsible for data management, archive and distribution of data products. There are currently twelve DAACs in the EOSDIS system. The centralized entrance point to the NASA Earth Science data collection can be found at http://earthdata.nasa.gov. Over the years, we have developed several methods for determining needs of the user community including use of the American Customer Satisfaction Index survey and a broad metrics program. Annually, we work with an independent organization (CFI Group) to send this

  19. Computer Science and Technology Publications. NBS Publications List 84.

    Science.gov (United States)

    National Bureau of Standards (DOC), Washington, DC. Inst. for Computer Sciences and Technology.

    This bibliography lists publications of the Institute for Computer Sciences and Technology of the National Bureau of Standards. Publications are listed by subject in the areas of computer security, computer networking, and automation technology. Sections list publications of: (1) current Federal Information Processing Standards; (2) computer…

  20. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  1. 76 FR 80418 - Request for Information: Public Access to Peer-Reviewed Scholarly Publications Resulting From...

    Science.gov (United States)

    2011-12-23

    ... archiving publications and making them publically accessible be used to grow the economy and improve the... cons of centralized and decentralized approaches to managing public access to peer reviewed scholarly...

  2. Flexible And Secure Access To Computing Clusters

    Directory of Open Access Journals (Sweden)

    Jan Meizner

    2010-01-01

    Full Text Available The investigation presented in this paper was prompted by the need to provide a manageablesolution for secure access to computing clusters with a federated authentication framework.This requirement is especially important for scientists who need direct access to computingnodes in order to run their applications (e.g. chemical or medical simulations with proprietary,open-source or custom-developed software packages. Our existing software, whichenables non-Web clients to use Shibboleth-secured services, has been extended to providedirect SSH access to cluster nodes using the Linux Pluggable Authentication Modules mechanism.This allows Shibboleth users to run the required software on clusters. Validationand performance comparison with existing SSH authentication mechanisms confirm that thepresented tools satisfy the stated requirements.

  3. Embedded systems for supporting computer accessibility.

    Science.gov (United States)

    Mulfari, Davide; Celesti, Antonio; Fazio, Maria; Villari, Massimo; Puliafito, Antonio

    2015-01-01

    Nowadays, customized AT software solutions allow their users to interact with various kinds of computer systems. Such tools are generally available on personal devices (e.g., smartphones, laptops and so on) commonly used by a person with a disability. In this paper, we investigate a way of using the aforementioned AT equipments in order to access many different devices without assistive preferences. The solution takes advantage of open source hardware and its core component consists of an affordable Linux embedded system: it grabs data coming from the assistive software, which runs on the user's personal device, then, after processing, it generates native keyboard and mouse HID commands for the target computing device controlled by the end user. This process supports any operating system available on the target machine and it requires no specialized software installation; therefore the user with a disability can rely on a single assistive tool to control a wide range of computing platforms, including conventional computers and many kinds of mobile devices, which receive input commands through the USB HID protocol.

  4. Computation: A New Open Access Journal of Computational Chemistry, Computational Biology and Computational Engineering

    Directory of Open Access Journals (Sweden)

    Karlheinz Schwarz

    2013-09-01

    Full Text Available Computation (ISSN 2079-3197; http://www.mdpi.com/journal/computation is an international scientific open access journal focusing on fundamental work in the field of computational science and engineering. Computational science has become essential in many research areas by contributing to solving complex problems in fundamental science all the way to engineering. The very broad range of application domains suggests structuring this journal into three sections, which are briefly characterized below. In each section a further focusing will be provided by occasionally organizing special issues on topics of high interests, collecting papers on fundamental work in the field. More applied papers should be submitted to their corresponding specialist journals. To help us achieve our goal with this journal, we have an excellent editorial board to advise us on the exciting current and future trends in computation from methodology to application. We very much look forward to hearing all about the research going on across the world. [...

  5. Cable Television and the Promise of Public Access.

    Science.gov (United States)

    Wenner, Lawrence A.

    The Federal Communications Commission (FCC) has made provision for three access channels in new cable television systems: one each for the public, educational authorities, and the local government. The success of these access channels in instituting a two-way relationship between the public and commercial broadcasting is dependent on the presence…

  6. The Impacts of Free Public Internet Access on Public Library Patrons and Communities

    Science.gov (United States)

    Bertot, John Carlo; McClure, Charles R.; Jaeger, Paul T.

    2008-01-01

    Public libraries have evolved into a primary source of Internet access in many communities, generating wide-ranging impacts in the communities that public libraries serve. Based on the findings of the 2007 Public Libraries and the Internet study, this article examines the ways in which the Internet access delivered by public libraries affects…

  7. The Impacts of Free Public Internet Access on Public Library Patrons and Communities

    Science.gov (United States)

    Bertot, John Carlo; McClure, Charles R.; Jaeger, Paul T.

    2008-01-01

    Public libraries have evolved into a primary source of Internet access in many communities, generating wide-ranging impacts in the communities that public libraries serve. Based on the findings of the 2007 Public Libraries and the Internet study, this article examines the ways in which the Internet access delivered by public libraries affects…

  8. Assured Access/Mobile Computing Initiatives on Five University Campuses.

    Science.gov (United States)

    Blurton, Craig; Chee, Yam San; Long, Phillip D.; Resmer, Mark; Runde, Craig

    Mobile computing and assured access are becoming popular terms to describe a growing number of university programs which take advantage of ubiquitous network access points and the portability of notebook computers to ensure all students have access to digital tools and resources. However, the implementation of such programs varies widely from…

  9. Computer-assisted access to the kidney

    CERN Document Server

    Mozer, P; Payan, Yohan; Troccaz, J; Chartier-Kastler, E; Richard, F

    2005-01-01

    OBJECTIVES: The aim of this paper is to introduce the principles of computer-assisted access to the kidney. The system provides the surgeon with a pre-operative 3D planning on computed tomography (CT) images. After a rigid registration with space-localized ultrasound (US) data, preoperative planning can be transferred to the intra-operative conditions and an intuitive man-machine interface allows the user to perform a puncture. MATERIAL AND METHODS: Both CT and US images of informed normal volunteer were obtained to perform calculation on the accuracy of registration and punctures were carried out on a kidney phantom to measure the precision of the whole of the system. RESULTS: We carried out millimetric registrations on real data and guidance experiments on a kidney phantom showed encouraging results of 4.7 mm between planned and reached targets. We noticed that the most significant error was related to the needle deflection during the puncture. CONCLUSION: Preliminary results are encouraging. Further work w...

  10. Public Libraries and Internet Access across the United States: A Comparison by State 2004–2006

    Directory of Open Access Journals (Sweden)

    Paul T. Jaeger

    2007-06-01

    Full Text Available Drawing upon findings from a national survey of U.S. public libraries, this paper examines trends in Internet and public computing access in public libraries across states from 2004 to 2006. Based on library-supplied information about levels and types of Internet and public computing access, the authors offer insights into the network-based content and services that public libraries provide. Examining data from 2004 to 2006 reveals trends and accomplishments in certain states and geographic regions. This paper details and discusses the data, identifies and analyzes issues related to Internet access, and suggests areas for future research.

  11. Enhancing Digital Information Access in Public Libraries

    OpenAIRE

    Ayers, Kathleen; Liu, Yan Quan

    2006-01-01

    To explore the impact of public digital library resources on urban residents, to elucidate the current usage patterns of public digital library resources/services and levels of satisfaction with the resources/content in urban digital libraries and make recommendations as to steps that would improve service to this population.

  12. Public sector information access policies in Europe

    NARCIS (Netherlands)

    Welle Donker, F.M.

    2010-01-01

    In the digital age geo-information has become embedded in our daily lives, such as navigation systems, community platforms, real estate information and weather forecasts. Everybody uses geo-information for their day-to-day decision making. Therefore, access to geo-information is of vital importance

  13. PUBLIC ACCESS TO PRIVATE LAND IN SCOTLAND

    African Journals Online (AJOL)

    David

    A possible example of irresponsible behaviour would be an access taker's .... house or other place" be included "among the factors which go to determine what .... standards of the persons affected in the house i.e. that the test was "person .... accordance with the general interest or to secure the payment of taxes or other.

  14. Public sector information access policies in Europe

    NARCIS (Netherlands)

    Welle Donker, F.M.

    2010-01-01

    In the digital age geo-information has become embedded in our daily lives, such as navigation systems, community platforms, real estate information and weather forecasts. Everybody uses geo-information for their day-to-day decision making. Therefore, access to geo-information is of vital importance

  15. The Association between Access to Public Transportation and Self-Reported Active Commuting

    DEFF Research Database (Denmark)

    Djurhuus, Sune; Hansen, Henning S; Aadahl, Mette

    2014-01-01

    more moderate physical activity than non-users. Understanding how public transportation characteristics are associated with active transportation is thus important from a public health perspective. This study examines the associations between objective measures of access to public transportation...... and self-reported active commuting. Self-reported time spent either walking or cycling commuting each day and the distance to workplace were obtained for adults aged 16 to 65 in the Danish National Health Survey 2010 (n = 28,928). Access to public transportation measures were computed by combining GIS......-based road network distances from home address to public transit stops an integrating their service level. Multilevel logistic regression was used to examine the association between access to public transportation measures and active commuting. Distance to bus stop, density of bus stops, and number...

  16. Public access to Indian geographical data - Guest editorial

    Digital Repository Service at National Institute of Oceanography (India)

    Narasimha, R.; Shetye, S.R.

    very un- happy at the way that the availabil- ity of data generated at public expense is restricted. Even where access is in principle possible, the procedures involved are confusing and cumbersome, and many scien- tists often find it more...

  17. Recommendations concerning energy information model documentation, public access, and evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Wood, D.O.; Mason, M.J.

    1979-10-01

    A review is presented of the Energy Information Administration (EIA) response to Congressional and management concerns, relating specifically to energy information system documentation, public access to EIA systems, and scientific/peer evaluation. The relevant organizational and policy responses of EIA are discussed. An analysis of the model development process and approaches to, and organization of, model evaluation is presented. Included is a survey of model evaluation studies. A more detailed analysis of the origins of the legislated documentation and public access requirements is presented in Appendix A, and the results of an informal survey of other agency approaches to public access and evaluation is presented in Appendix B. Appendix C provides a survey of non-EIA activities relating to model documentation and evaluation. Twelve recommendations to improve EIA's procedures for energy information system documentation, evaluation activities, and public access are determined. These are discussed in detail. (MCW)

  18. Big Oaks National Wildlife Refuge : Interim Public Access Plan : 2000

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This interim plan covers public access for Big Oaks National Wildlife Refuge. Sections include introduction, safety briefing protocols, entry procedure, types of...

  19. 47 CFR 76.1505 - Public, educational and governmental access.

    Science.gov (United States)

    2010-10-01

    ... governmental access requirements for every cable franchise area with which its system overlaps. (b) An open... access channels within the subscribers' franchise area. (c) An open video system operator may negotiate... relating to such public, educational and governmental use. If a franchise agreement previously existed...

  20. The role of CRIS systems in measuring Open Access publications

    NARCIS (Netherlands)

    Scharnhorst, A.M.; Dijk, E.M.S.; Doorn, P.K.; van Berchum, M.

    2016-01-01

    Open Access to scientific results - from publications to data - is high on the agenda of science policy drivers. Since long there is no doubt that making your own research available on the web is the best way to gain visibility and impact (Lawrence 2001). The Open Access movement started with calls

  1. Writing for Publication While in Graduate School: An Accessible Reality

    Science.gov (United States)

    Collins, Joshua C.

    2015-01-01

    The purpose of this Writer's Forum is to share eight tips about writing for publication as a graduate student. These tips demonstrate writing for publication as an accessible reality for students. This Writer's Forum advances ideas, advice, and anecdotes focused on helping graduate students to see themselves as valued experts who are…

  2. The Association between Access to Public Transportation and Self-Reported Active Commuting

    Directory of Open Access Journals (Sweden)

    Sune Djurhuus

    2014-12-01

    Full Text Available Active commuting provides routine-based regular physical activity which can reduce the risk of chronic diseases. Using public transportation involves some walking or cycling to a transit stop, transfers and a walk to the end location and users of public transportation have been found to accumulate more moderate physical activity than non-users. Understanding how public transportation characteristics are associated with active transportation is thus important from a public health perspective. This study examines the associations between objective measures of access to public transportation and self-reported active commuting. Self-reported time spent either walking or cycling commuting each day and the distance to workplace were obtained for adults aged 16 to 65 in the Danish National Health Survey 2010 (n = 28,928. Access to public transportation measures were computed by combining GIS-based road network distances from home address to public transit stops an integrating their service level. Multilevel logistic regression was used to examine the association between access to public transportation measures and active commuting. Distance to bus stop, density of bus stops, and number of transport modes were all positively associated with being an active commuter and with meeting recommendations of physical activity. No significant association was found between bus services at the nearest stop and active commuting. The results highlight the importance of including detailed measurements of access to public transit in order to identify the characteristics that facilitate the use of public transportation and active commuting.

  3. The Use of Public Computing Facilities by Library Patrons: Demography, Motivations, and Barriers

    Science.gov (United States)

    DeMaagd, Kurt; Chew, Han Ei; Huang, Guanxiong; Khan, M. Laeeq; Sreenivasan, Akshaya; LaRose, Robert

    2013-01-01

    Public libraries play an important part in the development of a community. Today, they are seen as more than store houses of books; they are also responsible for the dissemination of online, and offline information. Public access computers are becoming increasingly popular as more and more people understand the need for internet access. Using a…

  4. Open Access And Openly Accessible: A Study Of Scientific Publications Shared Via The Internet

    National Research Council Canada - National Science Library

    Jonathan D. Wren

    2005-01-01

    ... of the article, and to what degree open access publications are shared on non-journal websites. Design The internet was searched using an application programming interface to Google, a popular and freely available search engine...

  5. Bringing computational science to the public.

    Science.gov (United States)

    McDonagh, James L; Barker, Daniel; Alderson, Rosanna G

    2016-01-01

    The increasing use of computers in science allows for the scientific analyses of large datasets at an increasing pace. We provided examples and interactive demonstrations at Dundee Science Centre as part of the 2015 Women in Science festival, to present aspects of computational science to the general public. We used low-cost Raspberry Pi computers to provide hands on experience in computer programming and demonstrated the application of computers to biology. Computer games were used as a means to introduce computers to younger visitors. The success of the event was evaluated by voluntary feedback forms completed by visitors, in conjunction with our own self-evaluation. This work builds on the original work of the 4273π bioinformatics education program of Barker et al. (2013, BMC Bioinform. 14:243). 4273π provides open source education materials in bioinformatics. This work looks at the potential to adapt similar materials for public engagement events. It appears, at least in our small sample of visitors (n = 13), that basic computational science can be conveyed to people of all ages by means of interactive demonstrations. Children as young as five were able to successfully edit simple computer programs with supervision. This was, in many cases, their first experience of computer programming. The feedback is predominantly positive, showing strong support for improving computational science education, but also included suggestions for improvement. Our conclusions are necessarily preliminary. However, feedback forms suggest methods were generally well received among the participants; "Easy to follow. Clear explanation" and "Very easy. Demonstrators were very informative." Our event, held at a local Science Centre in Dundee, demonstrates that computer games and programming activities suitable for young children can be performed alongside a more specialised and applied introduction to computational science for older visitors.

  6. Sign Compute Resolve for Random Access

    DEFF Research Database (Denmark)

    Goseling, Jasper; Stefanovic, Cedomir; Popovski, Petar

    2014-01-01

    users collide. We measure the performance of the proposed method in terms of user resolution rate as well as overall throughput of the system. The results show that our approach significantly increases the performance of the system even compared to coded random access, where collisions are not wasted...

  7. 78 FR 25484 - Public Access to Federally Supported Research and Development Data and Publications: Two Planning...

    Science.gov (United States)

    2013-05-01

    ... From the Federal Register Online via the Government Publishing Office NATIONAL SCIENCE FOUNDATION Public Access to Federally Supported Research and Development Data and Publications: Two Planning... digital scientific data, as part of the planning process called for in the Memorandum on Expanding Public...

  8. Predictive access control for distributed computation

    DEFF Research Database (Denmark)

    Yang, Fan; Hankin, Chris; Nielson, Flemming

    2013-01-01

    We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policies — policies based on the future...... behavior of a program. A novel feature of our approach is that we can define policies concerning secondary use of data....

  9. Assessment method of accessibility conditions: how to make public buildings accessible?

    Science.gov (United States)

    Andrade, Isabela Fernandes; Ely, e Vera Helena Moro Bins

    2012-01-01

    The enforcement of accessibility today has faced several difficulties, such as intervention in historic buildings that now house public services and cultural activities, such as town halls, museums and theaters and should allow access, on equal terms to all people. The paper presents the application of a method for evaluating the spatial accessibility conditions and their results. For this, we sought to support the theoretical foundation about the main issue involved and legislation. From the method used--guided walks--it was possible to identify the main barriers to accessibility in historic buildings. From the identified barriers, possible solutions are presented according to the four components of accessibility: spatial orientation, displacement, use and communication. It is hoped also that the knowledge gained in this research contributes to an improvement of accessibility legislation in relation to the listed items.

  10. Making Apple Computers Accessible to Blind Children.

    Science.gov (United States)

    Renouf, Andrew; Phillips, Susan

    The study examined the feasibility of adapting commercially available educational software to a speech synthesizer compatible with the Apple II for use with 15 visually impaired students 8 to 12 years old. Ss were pre-tested on measures of auditory discrimination, computer literacy, keyboard proficiency, spelling, and language. Ss then received…

  11. Publicly Accessible Art Collections in Copenhagen during the Napoleonic Era

    DEFF Research Database (Denmark)

    Svenningsen, Jesper

    2015-01-01

    This article describes the increasing accessibility of private galleries in Copenhagen during the early years of the nineteenth century, which formed an important prelude to the formation of a formal public art gallery in 1824-25. After a period of gradually increasing openness of a few private c...

  12. Public Access to Government Electronic Information. Policy Framework.

    Science.gov (United States)

    Bulletin of the American Society for Information Science, 1992

    1992-01-01

    This policy framework provides guidelines for federal agencies on public access to government electronic information. Highlights include reasons for disseminating information; defining user groups; which technology to use; pricing flexibility; security and privacy issues; and the private sector and state and local government roles. (LRW)

  13. Legal aspects of open access to publicly funded research

    NARCIS (Netherlands)

    Guibault, L.; Margoni, T.

    2015-01-01

    Internet growth, content digitisation, and expanding "big data" and data analytics capabilities have affected the ways in which publicly funded research results are accessed, disseminated and used. While these technological advances have made sharing and processing information easier, that does not

  14. Government databases and public health research: facilitating access in the public interest.

    Science.gov (United States)

    Adams, Carolyn; Allen, Judy

    2014-06-01

    Access to datasets of personal health information held by government agencies is essential to support public health research and to promote evidence-based public health policy development. Privacy legislation in Australia allows the use and disclosure of such information for public health research. However, access is not always forthcoming in a timely manner and the decision-making process undertaken by government data custodians is not always transparent. Given the public benefit in research using these health information datasets, this article suggests that it is time to recognise a right of access for approved research and that the decisions, and decision-making processes, of government data custodians should be subject to increased scrutiny. The article concludes that researchers should have an avenue of external review where access to information has been denied or unduly delayed.

  15. Does the public deserve free access to climate system science?

    Science.gov (United States)

    Grigorov, Ivo

    2010-05-01

    Some time ago it was the lack of public access to medical research data that really stirred the issue and gave inertia for legislation and a new publishing model that puts tax payer-funded medical research in the hands of those who fund it. In today's age global climate change has become the biggest socio-economic challenge, and the same argument resonates: climate affects us all and the publicly-funded science quantifying it should be freely accessible to all stakeholders beyond academic research. Over the last few years the ‘Open Access' movement to remove as much as possible subscription, and other on-campus barriers to academic research has rapidly gathered pace, but despite significant progress, the climate system sciences are not among the leaders in providing full access to their publications and data. Beyond the ethical argument, there are proven and tangible benefits for the next generation of climate researchers to adapt the way their output is published. Through the means provided by ‘open access', both data and ideas can gain more visibility, use and citations for the authors, but also result in a more rapid exchange of knowledge and ideas, and ultimately progress towards a sought solution. The presentation will aim to stimulate discussion and seek progress on the following questions: Should free access to climate research (& data) be mandatory? What are the career benefits of using ‘open access' for young scientists? What means and methods should, or could, be incorporated into current European graduate training programmes in climate research, and possible ways forward?

  16. Unequal access to public healthcare facilities: theory and measurement revisited

    Directory of Open Access Journals (Sweden)

    Stefano Mainardi

    2007-12-01

    Full Text Available Adequate coverage and efficiency of public health services are high priorities for sustainable growth and development. In many countries, public healthcare continues to fall short of demand, and remains unevenly distributed among the population. As in other areas of project appraisal, studies on social equity and access to public utilities are fraught with theoretical and empirical questions. Based on the concepts of marginal disutility with respect to distance, safety thresholds and `equally distributed equivalent' distance, the paper first reassesses utility theory assumptions supporting the rationale for functional re-specifications. Partly drawing on these theoretical refinements, the analysis formulates a stochastic cost frontier hurdle model with an endogenously determined hospital distance threshold. For illustrative purposes, this model is applied to pooled biennial communal data for Chile. Healthcare accessibility in terms of travel cost/time is proxied by distances of administrative centres from the nearest emergency hospitals over the period 2000-2003.

  17. Public access to community documents: a fundamental human right?

    Directory of Open Access Journals (Sweden)

    Roy W. Davis

    1999-07-01

    Full Text Available There is a marked difference between the culture of open government in some Member States, particularly Sweden, and the culture of secrecy in Britain. Recent calls for a uniform interpretation of the law regarding public access to documents held by the Community Institutions seem to suggest that a Swedish-style right of access should be adopted at EU level, on the grounds that public access to government-held information is a fundamental human right. To date, however, it seems that insufficient arguments have been advanced in order to justify this particular claim. Notable constitutional lawyers remain sceptical, as do some Member State governments. Furthermore, in the absence of a convincing philosophical justification for the claim, a situation may be created in which certain people are said to enjoy a fundamental human right, not because they are human beings, but by virtue of their status as citizens or residents of an EU Member State. This appears to be counter-intuitive, if it is accepted that fundamental human rights should be enjoyed by all and should therefore be justified on the basis of universally-shared fundamental values. It therefore seems that further explanation of the importance of public access to documents is required, and further justification of the claim that this is, or should be regarded as, a fundamental human right.

  18. A Comparative Assessment of Computer Literacy of Private and Public Secondary School Students in Lagos State, Nigeria

    Science.gov (United States)

    Osunwusi, Adeyinka Olumuyiwa; Abifarin, Michael Segun

    2013-01-01

    The aim of this study was to conduct a comparative assessment of computer literacy of private and public secondary school students. Although the definition of computer literacy varies widely, this study treated computer literacy in terms of access to, and use of, computers and the internet, basic knowledge and skills required to use computers and…

  19. Scientific Coolections: Informational - Navigational Portal for Scientific Publications Access.

    Science.gov (United States)

    Bogatencov, Petru; Kozlenco, Ludmila; Ginculova, Silvia; Keradi, Natalia

    At present there is the tendency of uniting efforts of scientific establishments and libraries for using information - communication medium with the purpose of information support of research and pedagogical activity in Moldova. The efficient access to the scientific and technical literature and, first of all, to the new publications, is necessary practically for all scientists and experts irrespective of a field of knowledge, in which they work. Research institutions, knowing how to receive access to the electron information and to use it intellectually, realize that it effects positively the quality and outcomes of the research process. It is obvious, that to ensure maximum utilization of the new information stream by habitual methods is impossible. New non-traditional approaches are necessary for the increase of the level of information provision of scientists and experts. Creation of electron libraries, realizing qualitatively other level of production, storage, organization and distribution of various information is the most effective way to gin this object. The access to the electron versions of scientific journals allows to reduce the acuteness of shortage of scientific literature, the electron information becomes accessible before the publication of paper version of a journal, and taking into account the delivery time of foreign issues into Moldova, this outstripping can reach several months.

  20. Public finance policy strategies to increase access to preconception care.

    Science.gov (United States)

    Johnson, Kay A

    2006-09-01

    Policy and finance barriers reduce access to preconception care and, reportedly, limit professional practice changes that would improve the availability of needed services. Millions of women of childbearing age (15-44) lack adequate health coverage (i.e., uninsured or underinsured), and others live in medically underserved areas. Service delivery fragmentation and lack of professional guidelines are additional barriers. This paper reviews barriers and opportunities for financing preconception care, based on a review and analysis of state and federal policies. We describe states' experiences with and opportunities to improve health coverage, through public programs such as Medicaid, Medicaid waivers, and the State Children's Health Insurance Program (SCHIP). The potential role of Title V and of community health centers in providing primary and preventive care to women also is discussed. In these and other public health and health coverage programs, opportunities exist to finance preconception care for low-income women. Three major policy directions are discussed. To increase access to preconception care among women of childbearing age, the federal and state governments have opportunities to: (1) improve health care coverage, (2) increase the supply of publicly subsidized health clinics, and (3) direct delivery of preconception screening and interventions in the context of public health programs.

  1. Public Websites and Human–computer Interaction

    DEFF Research Database (Denmark)

    Sørum, Hanne; Andersen, Kim Normann; Vatrapu, Ravi

    2012-01-01

    The focus of this paper is to investigate measurement of website quality and user satisfaction. More specifically, the paper reports on a study investigating whether users of high-quality public websites are more satisfied than those of low-quality websites. Adopting a human–computer interaction...... perspective, we have gathered data from the 2009 public website awards in Scandinavia. Our analysis of Norwegian and Danish websites reveals that the use of quality criteria is highly technical compared to the traditional usability testing focus on efficiency, effectiveness and satisfaction of the actual...... system use by representatives. A Pearson correlation analysis of user evaluation from 296 websites that participated in the Danish web award Bedst på Nettet (‘Top of the Web’) showed no significant positive correlation between website quality and user satisfaction. We put forward recommendations...

  2. Visibility, accessibility and quality of Italian public health institutional websites

    Directory of Open Access Journals (Sweden)

    Simone Chiadò Piat

    2010-06-01

    Full Text Available

    Background: Since the large volume of health information available on the Web has the potential to improve health, Public Health institutions must represent a strong Internet presence with accessible and scientific information. The aims of the study were to verify the presence and visibility of Italian Institutions on the Web and to evaluate the accessibility and quality of the information provided.

    Methods: In a focus group setting, 21 keywords were generated, and launched in search-engines Google and MSN. Researchers noted the first 30 results found and determined the position of institutional websites. The accessibility of 303 Public Health websites was assessed in relation to the logo presence and web validation of XHTML, CSS and WAI indicators. Regarding the quality of information, the presence of the HONcode logo in the websites’ homepage was checked.

    Results: A high percentage of the keywords selected did not lead to any institutional website in the first three pages of Google (19.0% and MSN (42.8%. Few institutional websites presented the logo indicator and a full web validation. Considering the XHTML indicator, only for 34.0% of the websites there was concordance between the logo presence/absence and results of direct validation, 50.2% for CSS. The quality level seemed to be extremely low.

    Conclusions:In order to achieve a larger visibility and guarantee accessibility, Public Health websites have to be correctly designed, edited and maintained. Common and strict European laws about health information on the Web have to be arranged, deeply monitored and carefully adjourned in order to guarantee and support the positive role of institutional websites.

  3. Computer Security: When a person leaves - access rights remain!

    CERN Multimedia

    Computer Security Team

    2014-01-01

    We have been contacted recently by an embarrassed project manager who just figured out that a student who left at the end of 2013 still had access rights to read the whole project folder in February 2014: “How can that be?! In any other company, access rights would be purged at the same time as an employment contract terminates." Not so at CERN.   CERN has always been an open site with an open community. Physical access to the site is lightweight and you just need to have your CERN access card at hand. Further restrictions have only been put in place where safety or security really require them, and CERN does not require you to keep your access card on display. The same holds for the digital world. Once registered at CERN - either by contract, via your experiment or through the Users' office - you own a computing account that provides you with access to a wide variety of computing services. For example, last year 9,730 students/technicians/engineers/researchers/sta...

  4. Remote Sensing Open Access Journal: Increasing Impact through Quality Publications

    Directory of Open Access Journals (Sweden)

    Prasad S. Thenkabail

    2014-08-01

    Full Text Available Remote Sensing, an open access journal (http://www.mdpi.com/journal/remotesensing has grown at rapid pace since its first publication five years ago, and has acquired a strong reputation. It is a “pathfinder” being the first open access journal in remote sensing. For those academics who were used to waiting a year or two for their peer-reviewed scientific work to be reviewed, revised, edited, and published, Remote Sensing offers a publication time frame that is unheard of (in most cases, less than four months. However, we do this after multiple peer-reviews, multiple revisions, much editorial scrutiny and decision-making, and professional editing by an editorial office before a paper is published online in our tight time frame, bringing a paradigm shift in scientific publication. As a result, there has been a swift increase in submissions of higher and higher quality manuscripts from the best authors and institutes working on Remote Sensing, Geographic Information Systems (GIS, Global Navigation Satellite System (GNSS, GIScience, and all related geospatial science and technologies from around the world. The purpose of this editorial is to update everyone interested in Remote Sensing on the progress made over the last year, and provide an outline of our vision for the immediate future. [...

  5. Review of Access Control Models for Cloud Computing

    Directory of Open Access Journals (Sweden)

    Natarajan Meghanathan

    2013-05-01

    Full Text Available The relationship between users and resources is dyn amic in the cloud, and service providers and users are typically not in the same security do main. Identity-based security (e.g., discretionary or mandatory access control models c annot be used in an open cloud computing environment, where each resource node may not be fa miliar, or even do not know each other. Users are normally identified by their attributes o r characteristics and not by predefined identities. There is often a need for a dynamic acc ess control mechanism to achieve cross- domain authentication. In this paper, we will focus on the following three broad categories of access control models for cloud computing: (1 Role -based models; (2 Attribute-based encryption models and (3 Multi-tenancy models. We will review the existing literature on each of the above access control models and their varian ts (technical approaches, characteristics, applicability, pros and cons, and identify future research directions for developing access control models for cloud computing environments .

  6. Licensed Shared Access System Possibilities for Public Safety

    Directory of Open Access Journals (Sweden)

    Kalle Lähetkangas

    2016-01-01

    Full Text Available We investigate the licensed shared access (LSA concept based spectrum sharing ideas between public safety (PS and commercial radio systems. While the concept of LSA has been well developed, it has not been thoroughly investigated from the public safety (PS users’ point of view, who have special requirements and also should benefit from the concept. Herein, we discuss the alternatives for spectrum sharing between PS and commercial systems. In particular, we proceed to develop robust solutions for LSA use cases where connections to the LSA system may fail. We simulate the proposed system with different failure models. The results show that the method offers reliable LSA spectrum sharing in various conditions assuming that the system parameters are set properly. The paper gives guidelines to set these parameters.

  7. 76 FR 68518 - Request for Information: Public Access to Peer-Reviewed Scholarly Publications Resulting From...

    Science.gov (United States)

    2011-11-04

    ... Technology Policy (OSTP) on behalf of the National Science and Technology Council (NSTC). SUPPLEMENTARY... science maximize the benefit of public access policies to U.S. taxpayers, and their investment in the peer... From the Federal Register Online via the Government Publishing Office OFFICE OF SCIENCE AND...

  8. Maryland Public Library Services for the Handicapped. A Survey for Handicapped Accessibility to Public Library Facilities.

    Science.gov (United States)

    Maryland State Dept. of Education, Baltimore. Div. of Library Development and Services.

    Prepared as a part of an ongoing effort to make Maryland public libraries readily accessible to the handicapped, this directory identifies equipment, services, and facilities available to library users who are confined to wheel chairs and others who have difficulty with steps or stairs. Supplied by the administrators of Maryland's 24 public…

  9. Access to dental public services by disabled persons.

    Science.gov (United States)

    Leal Rocha, Lyana; Vieira de Lima Saintrain, Maria; Pimentel Gomes Fernandes Vieira-Meyer, Anya

    2015-03-13

    According to the World Health Organization, one in every 10 people has a disability, and more than two-thirds of them do not receive any type of oral dental care. The Brazilian Constitution of 1988 guarantees all civilians including disabled people the right to healthcare, shaping the guidelines of the Brazilian National Health Care System (Sistema Único de Saúde--SUS). However, there is limited information about the true accessibility of dental services. This study evaluated the accessibility of public dental services to persons with disabilities in Fortaleza, Ceará, which has the third highest disability rate in Brazil. A cross-sectional quantitative study using structured questionnaires was administered to dentists (n = 89) and people with disabilities (n = 204) to evaluate the geographical, architectural, and organizational accessibility of health facilities, the communication between professionals and patients with disabilities, the demand for dental services, and factors influencing the use of dental services by people with motor, visual, and hearing impairments. 43.1% of people with disabilities do not recognize their service as a priority of Basic Health Units (BHU), 52.5% do not usually seek dental care, and of those who do (n = 97), 76.3% find it difficult to receive care and 84.5% only seek care on an emergency basis. Forty-five percent are unaware of the services offered in the BHU. Of the dentists, 56.2% reported difficulty in communicating with deaf patients, and 97.8% desired interpreters stationed in the BHU. People with disabilities gave better accessibility ratings than dentists (p = 0.001). 37.3% of the patients and 43.8% of dentists reported inadequate physical access infrastructure (including doors, hallways, waiting rooms, and offices). Dentists (60%) reported unsafe environments and transportation difficulties as geographical barriers, while most people with disabilities did not report noticing these barriers. While access to dental

  10. An Intelligent System Proposal for Improving the Safety and Accessibility of Public Transit by Highway.

    Science.gov (United States)

    García, Carmelo R; Quesada-Arencibia, Alexis; Cristóbal, Teresa; Padrón, Gabino; Pérez, Ricardo; Alayón, Francisco

    2015-08-18

    The development of public transit systems that are accessible and safe for everyone, including people with special needs, is an objective that is justified from the civic and economic points of view. Unfortunately, public transit services are conceived for people who do not have reduced physical or cognitive abilities. In this paper, we present an intelligent public transit system by highway with the goal of facilitating access and improving the safety of public transit for persons with special needs. The system is deployed using components that are commonly available in transport infrastructure, e.g., sensors, mobile communications systems, and positioning systems. In addition, the system can operate in non-urban transport contexts, e.g., isolated rural areas, where the availability of basic infrastructure, such as electricity and communications infrastructures, is not always guaranteed. To construct the system, the principles and techniques of Ubiquitous Computing and Ambient Intelligence have been employed. To illustrate the utility of the system, two cases of services rendered by the system are described: the first case involves a surveillance system to guarantee accessibility at bus stops; the second case involves a route assistant for blind people.

  11. An Intelligent System Proposal for Improving the Safety and Accessibility of Public Transit by Highway

    Directory of Open Access Journals (Sweden)

    Carmelo R. García

    2015-08-01

    Full Text Available The development of public transit systems that are accessible and safe for everyone, including people with special needs, is an objective that is justified from the civic and economic points of view. Unfortunately, public transit services are conceived for people who do not have reduced physical or cognitive abilities. In this paper, we present an intelligent public transit system by highway with the goal of facilitating access and improving the safety of public transit for persons with special needs. The system is deployed using components that are commonly available in transport infrastructure, e.g., sensors, mobile communications systems, and positioning systems. In addition, the system can operate in non-urban transport contexts, e.g., isolated rural areas, where the availability of basic infrastructure, such as electricity and communications infrastructures, is not always guaranteed. To construct the system, the principles and techniques of Ubiquitous Computing and Ambient Intelligence have been employed. To illustrate the utility of the system, two cases of services rendered by the system are described: the first case involves a surveillance system to guarantee accessibility at bus stops; the second case involves a route assistant for blind people.

  12. Math and science technology access and use in South Dakota public schools grades three through five

    Science.gov (United States)

    Schwietert, Debra L.

    The development of K-12 technology standards, soon to be added to state testing of technology proficiency, and the increasing presence of computers in homes and classrooms reflects the growing importance of technology in current society. This study examined math and science teachers' responses on a survey of technology use in grades three through five in South Dakota. A researcher-developed survey instrument was used to collect data from a random sample of 100 public schools throughout the South Dakota. Forced choice and open-ended responses were recorded. Most teachers have access to computers, but they lack resources to purchase software for their content areas, especially in science areas. Three-fourths of teachers in this study reported multiple computers in their classrooms and 67% reported access to labs in other areas of the school building. These numbers are lower than the national average of 84% of teachers with computers in their classrooms and 95% with access to computers elsewhere in the building (USDOE, 2000). Almost eight out of 10 teachers noted time as a barrier to learning more about educational software. Additional barriers included lack of school funds (38%), access to relevant training (32%), personal funds (30%), and poor quality of training (7%). Teachers most often use math and science software as supplemental, with practice tutorials cited as another common use. The most common interest for software was math for both boys and girls. The second most common choice for boys was science and for girls, language arts. Teachers reported that there was no preference for either individual or group work on computers for girls or boys. Most teachers do not systematically evaluate software for gender preferences, but review software over subjectively.

  13. Beyond information access: Support for complex cognitive activities in public health informatics tools.

    Science.gov (United States)

    Sedig, Kamran; Parsons, Paul; Dittmer, Mark; Ola, Oluwakemi

    2012-01-01

    Public health professionals work with a variety of information sources to carry out their everyday activities. In recent years, interactive computational tools have become deeply embedded in such activities. Unlike the early days of computational tool use, the potential of tools nowadays is not limited to simply providing access to information; rather, they can act as powerful mediators of human-information discourse, enabling rich interaction with public health information. If public health informatics tools are designed and used properly, they can facilitate, enhance, and support the performance of complex cognitive activities that are essential to public health informatics, such as problem solving, forecasting, sense-making, and planning. However, the effective design and evaluation of public health informatics tools requires an understanding of the cognitive and perceptual issues pertaining to how humans work and think with information to perform such activities. This paper draws on research that has examined some of the relevant issues, including interaction design, complex cognition, and visual representations, to offer some human-centered design and evaluation considerations for public health informatics tools.

  14. Solar Access to Public Capital (SAPC) Mock Securitization Project

    Energy Technology Data Exchange (ETDEWEB)

    Mendelsohn, Michael [National Renewable Energy Lab. (NREL), Golden, CO (United States); Lowder, Travis [National Renewable Energy Lab. (NREL), Golden, CO (United States); Rottman, Mary [Rottman-Associates, San Francisco, CA (United States); Borod, Ronald [DLA Piper, London (United Kingdom); Gabig, Nathan [KPMG, Knoxville, TN (United States); Henne, Stephen [KPMG, Knoxville, TN (United States); Caplin, Conrad [KPMG, Knoxville, TN (United States); Notte, Quentin [Mercatus, Arlington, VA (United States)

    2015-12-21

    In late 2012, the National Renewable Energy Laboratory (NREL) initiated the Solar Access to Public Capital (SAPC) working group. Backed by a three-year funding facility from the U.S. Department of Energy (DOE), NREL set out to organize the solar, legal, banking, capital markets, engineering, and other relevant stakeholder communities in order to open lower-cost debt investment for solar asset deployment. SAPC engaged its members to standardize contracts, develop best practices, and comprehend how the rating agencies perceive solar project portfolios as an investment asset class. Rating agencies opine on the future creditworthiness of debt obligations. Issuers often seek investment-grade ratings from the rating agencies in order to satisfy the desires of their investors. Therefore, for the solar industry to access larger pools of capital at a favorable cost, it is critical to increase market participants' understanding of solar risk parameters. The process provided valuable information to address rating agency perceptions of risk that, without such information, could require costly credit enhancement or higher yields to attract institutional investors. Two different securities were developed--one for a hypothetical residential solar portfolio and one for a hypothetical commercial solar portfolio. Five rating agencies (Standard and Poor's, Moody's, KBRA, Fitch, and DBRS) participated and provided extensive feedback, some through conversations that extended several months. The findings represented in this report are a composite summary of that feedback and do not indicate any specific feedback from any single rating agency.

  15. Virtual slides in peer reviewed, open access medical publication

    Directory of Open Access Journals (Sweden)

    Kayser Klaus

    2011-12-01

    Full Text Available Abstract Background Application of virtual slides (VS, the digitalization of complete glass slides, is in its infancy to be implemented in routine diagnostic surgical pathology and to issues that are related to tissue-based diagnosis, such as education and scientific publication. Approach Electronic publication in Pathology offers new features of scientific communication in pathology that cannot be obtained by conventional paper based journals. Most of these features are based upon completely open or partly directed interaction between the reader and the system that distributes the article. One of these interactions can be applied to microscopic images allowing the reader to navigate and magnify the presented images. VS and interactive Virtual Microscopy (VM are a tool to increase the scientific value of microscopic images. Technology and Performance The open access journal Diagnostic Pathology http://www.diagnosticpathology.org has existed for about five years. It is a peer reviewed journal that publishes all types of scientific contributions, including original scientific work, case reports and review articles. In addition to digitized still images the authors of appropriate articles are requested to submit the underlying glass slides to an institution (DiagnomX.eu, and Leica.com for digitalization and documentation. The images are stored in a separate image data bank which is adequately linked to the article. The normal review process is not involved. Both processes (peer review and VS acquisition are performed contemporaneously in order to minimize a potential publication delay. VS are not provided with a DOI index (digital object identifier. The first articles that include VS were published in March 2011. Results and Perspectives Several logistic constraints had to be overcome until the first articles including VS could be published. Step by step an automated acquisition and distribution system had to be implemented to the corresponding

  16. 76 FR 37111 - Access to Confidential Business Information by Computer Sciences Corporation and Its Identified...

    Science.gov (United States)

    2011-06-24

    ... From the Federal Register Online via the Government Publishing Office ENVIRONMENTAL PROTECTION AGENCY Access to Confidential Business Information by Computer Sciences Corporation and Its Identified... contractor, Computer Sciences Corporation of Chantilly, VA and Its Identified Subcontractors, to access...

  17. An accessibility solution of cloud computing by solar energy

    Directory of Open Access Journals (Sweden)

    Zuzana Priščáková

    2013-01-01

    Full Text Available Cloud computing is a modern innovative technology of solution of a problem with data storage, data processing, company infrastructure building and so on. Many companies worry over the changes by the implementation of this solution because these changes could have a negative impact on the company, or, in the case of establishment of new companies, this worry results from an unfamiliar environment. Data accessibility, integrity and security belong among basic problems of cloud computing. The aim of this paper is to offer and scientifically confirm a proposal of an accessibility solution of cloud by implementing of solar energy as a primary source. Problems with accessibility rise from power failures when data may be stolen or lost. Since cloud is often started from a server, the server dependence on power is strong. Modern conditions offer us a new, more innovative solution regarding the ecological as well as an economical company solution. The Sun as a steady source of energy offers us a possibility to produce necessary energy by a solar technique – solar panels. The connection of a solar panel as a primary source of energy for a server would remove its power dependence as well as possible failures. The power dependence would stay as a secondary source. Such an ecological solution would influence the economical side of company because the energy consumption would be lower. Besides a proposal of an accessibility solution, this paper involves a physical and mathematical solution to a calculation of solar energy showered on the Earth, a calculation of the panel size by cosines method and a simulation of these calculations in MATLAB conditions.

  18. Exploring the experience of clients with tetraplegia utilizing assistive technology for computer access.

    Science.gov (United States)

    Folan, Alyce; Barclay, Linda; Cooper, Cathy; Robinson, Merren

    2015-01-01

    Assistive technology for computer access can be used to facilitate people with a spinal cord injury to utilize mainstream computer applications, thereby enabling participation in a variety of meaningful occupations. The aim of this study was to gain an understanding of the experiences of clients with tetraplegia trialing assistive technologies for computer access during different stages in a public rehabilitation service. In order to explore the experiences of clients with tetraplegia trialing assistive technologies for computer use, qualitative methodology was selected. Data were collected from seven participants using semi-structured interviews, which were audio-taped, transcribed and analyzed thematically. Three main themes were identified. These were: getting back into life, assisting in adjusting to injury and learning new skills. The findings from this study demonstrated that people with tetraplegia can be assisted to return to previous life roles or engage in new roles, through developing skills in the use of assistive technology for computer access. Being able to use computers for meaningful activities contributed to the participants gaining an enhanced sense of self-efficacy, and thereby quality of life. Implications for Rehabilitation Findings from this pilot study indicate that people with tetraplegia can be assisted to return to previous life roles, and develop new roles that have meaning to them through the use of assistive technologies for computer use. Being able to use the internet to socialize, and complete daily tasks, contributed to the participants gaining a sense of control over their lives. Early introduction to assistive technology is important to ensure sufficient time for newly injured people to feel comfortable enough with the assistive technology to use the computers productively by the time of discharge. Further research into this important and expanding area is indicated.

  19. Heterogeneity of publicly accessible online critical values for therapeutic drugs

    Directory of Open Access Journals (Sweden)

    Colt M McClain

    2011-01-01

    Full Text Available Introduction: Critical values are reported to clinicians when laboratory values are life threatening and require immediate attention. To date no definitive critical value limit recommendations have been produced regarding therapeutic drug monitoring. Some laboratories choose to publish critical value lists online. These publicly available values may be accessed and potentially utilized by laboratory staff, patient care providers, and patients. Materials and Methods: A web-based search of laboratories associated with the Accreditation Council for Graduate Medical Education pathology residency programs was initiated to determine which therapeutic drugs had critical values and to examine the degree of variation in published critical values for these institutions. Results: Of the 107 institutions with university-based pathology training programs, 36 had published critical values online for review. Thirteen therapeutic drugs were investigated and the number of institutions reporting critical value limits for the drug, as well as the median, range, standard deviation, and the coefficient of variation of critical value concentration limits for each drug were determined. A number of the online critical value limits were deemed to be erroneous, most likely due to incorrectly listed units of measurement. Conclusions: There was a large degree of heterogeneity with regard to the chosen critical value limits for therapeutic drugs. This wide variance in critical values appears to be greater than that observed in interassay proficiency testing. Institutions should reexamine the rationale for their current critical value parameters and ensure that critical value limits and associated units are accurately published online.

  20. Public Access for Teaching Genomics, Proteomics, and Bioinformatics

    Science.gov (United States)

    Campbell, A. Malcolm

    2003-01-01

    When the human genome project was conceived, its leaders wanted all researchers to have equal access to the data and associated research tools. Their vision of equal access provides an unprecedented teaching opportunity. Teachers and students have free access to the same databases that researchers are using. Furthermore, the recent movement to…

  1. Public Access for Teaching Genomics, Proteomics, and Bioinformatics

    Science.gov (United States)

    Campbell, A. Malcolm

    2003-01-01

    When the human genome project was conceived, its leaders wanted all researchers to have equal access to the data and associated research tools. Their vision of equal access provides an unprecedented teaching opportunity. Teachers and students have free access to the same databases that researchers are using. Furthermore, the recent movement to…

  2. Young Children's Access to Computers in the Home and at School in 1999 and 2000.

    Science.gov (United States)

    Rathbun, Amy H.; West, Jerry; Hausken, Elvira Germino

    As computers become more prevalent and computer skills more necessary, there continues to be a "digital divide" between those with computer access and skills and those without. These differences are less pronounced in skills where children's access to computers and the Internet are more prevalent. Noting that few studies have focused exclusively…

  3. Extending Access Management to maintain audit logs in cloud computing

    Directory of Open Access Journals (Sweden)

    Ajay Prasad

    2014-01-01

    Full Text Available Considering the most often talked about security risks in cloud computing, like, security and compliance, viability, lack of transparency, reliability and performance issues. Bringing strong auditability in cloud services can reduce these risks to a great extent. Also, auditing, both internally and externally is generally required and sometimes unavoidable looking into the present day competition in the business arena. Auditing in web based and cloud based usage environments focuses mainly on cost of a service which determines the overall expenditure of the user organization. However, the expenditure can be controlled by a collaborative approach between the provider company and the user organization by constantly monitoring the end user access and usage of subscribed cloud services. Though, many cloud providers will claim of having a robust auditable feature, the generic verifiability with sustainable long term recording of usage logs do not exist at all. Certain access management models can be perfectly extended to maintain audit logs for long terms. However, maintaining long term logs certainly has storage implications, especially with larger organizations. The storage implications need to be studied.

  4. "Open Access" Requires Clarification: Medical Journal Publication Models Evolve.

    Science.gov (United States)

    Lubowitz, James H; Brand, Jefferson C; Rossi, Michael J; Provencher, Matthew T

    2017-03-01

    While Arthroscopy journal is a traditional subscription model journal, our companion journal Arthroscopy Techniques is "open access." We used to believe open access simply meant online and free of charge. However, while open-access journals are free to readers, in 2017 authors must make a greater sacrifice in the form of an article-processing charge (APC). Again, while this does not apply to Arthroscopy, the APC will apply to Arthroscopy Techniques.

  5. Individual public transportation accessibility is positively associated with self-reported active commuting

    Directory of Open Access Journals (Sweden)

    Sune eDjurhuus

    2014-11-01

    Full Text Available Background: Active commuters have lower risk of chronic disease. Understanding which of the, to some extent, modifiable characteristics of public transportation that facilitate its use is thus important in a public health perspective. The aim of the study was to examine the association between individual public transportation accessibility and self-reported active commuting, and whether the associations varied with commute distance, age and gender. Methods: 28,928 commuters in the Capital Region of Denmark reported self-reported time spent either walking or cycling to work or study each day and the distance to work or study. Data were obtained from the Danish National Health Survey collected in February to April 2010. Individual accessibility by public transportation was calculated using a multimodal network in a GIS. Multilevel logistic regression was used to analyze the association between accessibility, expressed as access area, and being an active commuter.Results: Public transport accessibility area based on all stops within walking and cycling distance was positively associated with being an active commuter. Distance to work, age and gender modified the associations. Residing within 10 km commuting distance and in areas of high accessibility was associated with being an active commuter and meeting the recommendations of physical activity. For the respondents above 29 years, Individual public transportation accessibility was positively associated with being an active commuter. Women having high accessibility had significantly higher odds of being an active commuter compared to having a low accessibility. For men the associations were insignificant.Conclusions: This study extends the knowledge about the driving forces of using public transportation for commuting by examining the individual public transportation accessibility. Findings suggest that transportation accessibility supports active commuting and planning of improved public transit

  6. Availability, Access, Authenticity, and Persistence: Creating the Environment for Permanent Public Access to Electronic Government Information.

    Science.gov (United States)

    Barnum, George

    2002-01-01

    Discusses efforts by the Federal Depository Library Program to make information accessible more or mostly by electronic means. Topics include Web-based locator tools; collection development; digital archives; bibliographic metadata; and access tools and user interfaces. (Author/LRW)

  7. 22 CFR 214.51 - Administrative review of denial for public access to records.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Administrative review of denial for public access to records. 214.51 Section 214.51 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT ADVISORY COMMITTEE MANAGEMENT Administrative Remedies § 214.51 Administrative review of denial for public access to...

  8. Public Access Cable Television: Extending the Production Laboratory for College Students.

    Science.gov (United States)

    Novak, Glenn D.

    Noting the difficulties communication departments have in providing students with television production opportunities, this paper proposes the use of cable television public access channels as a means of overcoming those difficulties. After defining and differentiating between local origination and public access programing, the paper discusses the…

  9. 48 CFR 504.602-71 - Federal Procurement Data System-Public access to data.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Federal Procurement Data System-Public access to data. 504.602-71 Section 504.602-71 Federal Acquisition Regulations System... Procurement Data System—Public access to data. (a) The FPDS database. The General Services...

  10. Acceptance and Adoption of Open Access Publication (OAP) in University Libraries in South East Nigeria

    Science.gov (United States)

    Sambe, Manasseh Tyungu; Raphael, Gabriel Okplogidi

    2015-01-01

    This study examines the kinds of open access scholarly publication or information resources accepted and adopted by federal university libraries in South East Nigeria. The purpose was to determine the factors that affect open access scholarly publication or information resources acceptance and adoption in university libraries. The study adopted…

  11. The cost of acquiring public hunting access on family forests lands

    Science.gov (United States)

    Michael A. Kilgore; Stephanie A. Snyder; Joesph M. Schertz; Steven J. Taff

    2008-01-01

    To address the issue of declining access to private forest land in the United States for hunting, over 1,000 Minnesota family forest owners were surveyed to estimate the cost of acquiring non-exclusive public hunting access rights. The results indicate landowner interest in selling access rights is extremely modest. Using binary logistic regression, the mean annual...

  12. 75 FR 70672 - Access to Confidential Business Information by Computer Sciences Corporation and Its Identified...

    Science.gov (United States)

    2010-11-18

    ... AGENCY Access to Confidential Business Information by Computer Sciences Corporation and Its Identified... contractor, Computer Sciences Corporation (CSC) of Chantilly, VA and Its Identified Subcontractors, to access... required to support OPPT computer applications; OPPT staff; and their development staff. Specific types of...

  13. Identity based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing

    DEFF Research Database (Denmark)

    Cheng, Hongbing; Rong, Chunming; Tan, Zheng-Hua

    2012-01-01

    access scheme based on identity-based encryption and biometric authentication for cloud computing. Firstly, we describe the security concern of cloud computing and then propose an integrated data access scheme for cloud computing, the procedure of the proposed scheme include parameter setup, key...

  14. 24 CFR 1003.507 - Public access to program records.

    Science.gov (United States)

    2010-04-01

    ... URBAN DEVELOPMENT COMMUNITY DEVELOPMENT BLOCK GRANTS FOR INDIAN TRIBES AND ALASKA NATIVE VILLAGES Grant...), grantees shall provide citizens with reasonable access to records regarding the past use of ICDBG funds...

  15. Open access for operational research publications from low- and middle-income countries: who pays?

    Science.gov (United States)

    Zachariah, R; Kumar, A M V; Reid, A J; Van den Bergh, R; Isaakidis, P; Draguez, B; Delaunois, P; Nagaraja, S B; Ramsay, A; Reeder, J C; Denisiuk, O; Ali, E; Khogali, M; Hinderaker, S G; Kosgei, R J; van Griensven, J; Quaglio, G L; Maher, D; Billo, N E; Terry, R F; Harries, A D

    2014-09-21

    Open-access journal publications aim to ensure that new knowledge is widely disseminated and made freely accessible in a timely manner so that it can be used to improve people's health, particularly those in low- and middle-income countries. In this paper, we briefly explain the differences between closed- and open-access journals, including the evolving idea of the 'open-access spectrum'. We highlight the potential benefits of supporting open access for operational research, and discuss the conundrum and ways forward as regards who pays for open access.

  16. Access and use of the Internet for health information seeking: a survey of local public health professionals in the northwest.

    Science.gov (United States)

    Turner, Anne M; Petrochilos, Deanna; Nelson, David E; Allen, Eileen; Liddy, Elizabeth D

    2009-01-01

    We conducted an on-line survey of 164 local health departments' staff in five Northwestern states in 2006-2007 to assess Internet access and use by staff. Most (96%) respondents had full-time access to their own worksite computer. The most important selection criterion for selecting Web sites was credibility of the sponsoring organization (55%). Accuracy (46%), reputable source (30%), and currency of information (19%) were considered most critical for assessing information quality. Centers for Disease Control and Prevention (80%) and state health department (60%) sites were used most commonly. These findings can be used to improve public health Web sites and support decision making in practice.

  17. Public Civil Action : Access to Environmental Justice in Brazil

    OpenAIRE

    Serra, Tatiana Barreto

    2016-01-01

    The aim of this paper is to trace an overview of the role of the State Public Prosecution Offiece in the protection of the environment, notably through public civil action. Thus, it is important to note that in alignment with the evolution of the International Environmental Law, Brazil experienced, especially from the 80's, a major boost to environmental legislation. At the same extent, the legislation improvement gave functional and administratve autonomy to the Public Prosecution Office, wh...

  18. Privacy with Public Access: Digital Memorials on QR Codes

    DEFF Research Database (Denmark)

    Gotved, Stine

    2015-01-01

    takes the departure in gravestones with QR-codes; objects at once physical and digital, underhandedly putting presumably private content within public reach. A plethora of issues of privacy and publicness are at play within the study's two connected but rather different empirical spaces: the physical...... in the borderland between private and public is exemplified, and with the presentation, we are ensuring a continued discussion on privacy as well as legacy in our digital society....

  19. Computer-Assisted Management of Instruction in Veterinary Public Health

    Science.gov (United States)

    Holt, Elsbeth; And Others

    1975-01-01

    Reviews a course in Food Hygiene and Public Health at the University of Illinois College of Veterinary Medicine in which students are sequenced through a series of computer-based lessons or autotutorial slide-tape lessons, the computer also being used to route, test, and keep records. Since grades indicated mastery of the subject, the course will…

  20. Public Access and Use of Health Research: An Exploratory Study of the National Institutes of Health (NIH) Public Access Policy Using Interviews and Surveys of Health Personnel

    Science.gov (United States)

    Willinsky, John; Maggio, Lauren

    2011-01-01

    Background In 2008, the National Institutes of Health (NIH) Public Access Policy mandated open access for publications resulting from NIH funding (following a 12-month embargo). The large increase in access to research that will take place in the years to come has potential implications for evidence-based practice (EBP) and lifelong learning for health personnel. Objective This study assesses health personnel’s current use of research to establish whether grounds exist for expecting, preparing for, and further measuring the impact of the NIH Public Access Policy on health care quality and outcomes in light of time constraints and existing information resources. Methods In all, 14 interviews and 90 surveys of health personnel were conducted at a community-based clinic and an independent teaching hospital in 2010. Health personnel were asked about the research sources they consulted and the frequency with which they consulted these sources, as well as motivation and search strategies used to locate articles, perceived level of access to research, and knowledge of the NIH Public Access Policy. Results In terms of current access to health information, 65% (57/88) of the health personnel reported being satisfied, while 32% (28/88) reported feeling underserved. Among the sources health personnel reported that they relied upon and consulted weekly, 83% (73/88) reported turning to colleagues, 77% (67/87) reported using synthesized information resources (eg, UpToDate and Cochrane Systematic Reviews), while 32% (28/88) reported that they consulted primary research literature. The dominant resources health personnel consulted when actively searching for health information were Google and Wikipedia, while 27% (24/89) reported using PubMed weekly. The most prevalent reason given for accessing research on a weekly basis, reported by 35% (31/88) of survey respondents, was to help a specific patient, while 31% (26/84) were motivated by general interest in research. Conclusions

  1. Lexical access in sign language: A computational model

    Directory of Open Access Journals (Sweden)

    Naomi Kenney Caselli

    2014-05-01

    Full Text Available Psycholinguistic theories have predominantly been built upon data from spoken language, which leaves open the question: How many of the conclusions truly reflect language-general principles as opposed to modality-specific ones? We take a step toward answering this question in the domain of lexical access in recognition by asking whether a single cognitive architecture might explain diverse behavioral patterns in signed and spoken language. Chen and Mirman (2012 presented a computational model of word processing that unified opposite effects of neighborhood density in speech production, perception, and written word recognition. Neighborhood density effects in sign language also vary depending on whether the neighbors share the same handshape or location. We present a spreading activation architecture that borrows the principles proposed by Chen and Mirman (2012, and show that if this architecture is elaborated to incorporate relatively minor facts about either 1 the time course of sign perception or 2 the frequency of sub-lexical units in sign languages, it produces data that match the experimental findings from sign languages. This work serves as a proof of concept that a single cognitive architecture could underlie both sign and word recognition.

  2. Lexical access in sign language: a computational model.

    Science.gov (United States)

    Caselli, Naomi K; Cohen-Goldberg, Ariel M

    2014-01-01

    PSYCHOLINGUISTIC THEORIES HAVE PREDOMINANTLY BEEN BUILT UPON DATA FROM SPOKEN LANGUAGE, WHICH LEAVES OPEN THE QUESTION: How many of the conclusions truly reflect language-general principles as opposed to modality-specific ones? We take a step toward answering this question in the domain of lexical access in recognition by asking whether a single cognitive architecture might explain diverse behavioral patterns in signed and spoken language. Chen and Mirman (2012) presented a computational model of word processing that unified opposite effects of neighborhood density in speech production, perception, and written word recognition. Neighborhood density effects in sign language also vary depending on whether the neighbors share the same handshape or location. We present a spreading activation architecture that borrows the principles proposed by Chen and Mirman (2012), and show that if this architecture is elaborated to incorporate relatively minor facts about either (1) the time course of sign perception or (2) the frequency of sub-lexical units in sign languages, it produces data that match the experimental findings from sign languages. This work serves as a proof of concept that a single cognitive architecture could underlie both sign and word recognition.

  3. Microsoft's Vista: Guarantees People with Special Needs Access to Computers

    Science.gov (United States)

    Williams, John M.

    2006-01-01

    In this article, the author discusses the accessibility features of Microsoft's Windows Vista. One of the most innovative aspects of Windows Vista is a new accessibility and automated testing model called Microsoft UI Automation, which reduces development costs not only for accessible and assistive technology (AT) developers, but also for…

  4. Wildlife software: procedures for publication of computer software

    Science.gov (United States)

    Samuel, M.D.

    1990-01-01

    Computers and computer software have become an integral part of the practice of wildlife science. Computers now play an important role in teaching, research, and management applications. Because of the specialized nature of wildlife problems, specific computer software is usually required to address a given problem (e.g., home range analysis). This type of software is not usually available from commercial vendors and therefore must be developed by those wildlife professionals with particular skill in computer programming. Current journal publication practices generally prevent a detailed description of computer software associated with new techniques. In addition, peer review of journal articles does not usually include a review of associated computer software. Thus, many wildlife professionals are usually unaware of computer software that would meet their needs or of major improvements in software they commonly use. Indeed most users of wildlife software learn of new programs or important changes only by word of mouth.

  5. Role of public organisations in the creation of new broadband access infrastructures

    NARCIS (Netherlands)

    Burgmeijer, J.W.

    2005-01-01

    Which roles may a public organisation play in the creation of new broadband access infrastructures? The main discussion issues about the roles of public organisations in relation to regulation and market distortion principles are given. Based upon some public policies and principles, the general

  6. Role of public organisations in the creation of new broadband access infrastructures

    NARCIS (Netherlands)

    Burgmeijer, J.W.

    2005-01-01

    Which roles may a public organisation play in the creation of new broadband access infrastructures? The main discussion issues about the roles of public organisations in relation to regulation and market distortion principles are given. Based upon some public policies and principles, the general req

  7. Code and papers: computing publication patterns in the LHC era

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Publications in scholarly journals establish the body of knowledge deriving from scientific research; they also play a fundamental role in the career path of scientists and in the evaluation criteria of funding agencies. This presentation reviews the evolution of computing-oriented publications in HEP following the start of operation of LHC. Quantitative analyses are illustrated, which document the production of scholarly papers on computing-related topics by HEP experiments and core tools projects (including distributed computing R&D), and the citations they receive. Several scientometric indicators are analyzed to characterize the role of computing in HEP literature. Distinctive features of scholarly publication production in the software-oriented and hardware-oriented experimental HEP communities are highlighted. Current patterns and trends are compared to the situation in previous generations' HEP experiments at LEP, Tevatron and B-factories. The results of this scientometric analysis document objec...

  8. Household computer and Internet access: The digital divide in a pediatric clinic population.

    Science.gov (United States)

    Carroll, Aaron E; Rivara, Frederick P; Ebel, Beth; Zimmerman, Frederick J; Christakis, Dimitri A

    2005-01-01

    Past studies have noted a digital divide, or inequality in computer and Internet access related to socio-economic class. This study sought to measure how many households in a pediatric primary care outpatient clinic had household access to computers and the Internet, and whether this access differed by socio-economic status or other demographic information. We conducted a phone survey of a population-based sample of parents with children ages 0 to 11 years old. Analyses assessed predictors of having home access to a computer, the Internet, and high-speed Internet service. Overall, 88.9% of all households owned a personal computer, and 81.4% of all households had Internet access. Among households with Internet access, 48.3% had high speed Internet at home. There were significant associations between home computer ownership or Internet access and parental income or education. There was no relationship these factors and high speed Internet access. Over 60% of families with annual household income of $10,000-$25,000, and nearly 70% of families with only a high-school education had Internet access at home. While income and education remain significant predictors of household computer and internet access, many patients and families at all economic levels have access, and might benefit from health promotion interventions using these modalities.

  9. Privacy with Public Access: Digital Memorials on QR Codes

    DEFF Research Database (Denmark)

    Gotved, Stine

    2015-01-01

    Digital memorials are part of a bigger picture of changing rituals for mourning, remembrance, and legacy. However, the focus of this presentation is how digital memorials perforate the (already uneasy) distinction between private and public, both in physical and emotional space. The ongoing study...... takes the departure in gravestones with QR-codes; objects at once physical and digital, underhandedly putting presumably private content within public reach. A plethora of issues of privacy and publicness are at play within the study's two connected but rather different empirical spaces: the physical...

  10. 75 FR 39135 - Voluntary Public Access and Habitat Incentive Program

    Science.gov (United States)

    2010-07-08

    ... satisfaction from these opportunities. The benefits will be where landowners permit access. VPA-HIP benefits... sales, and increased restaurant and motel expenditures. VPA-HIP is expected to provide $50 million, the... should show how customers will be identified, key personnel to be involved with administration of the...

  11. Identity based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing

    DEFF Research Database (Denmark)

    Cheng, Hongbing; Rong, Chunming; Tan, Zheng-Hua

    2012-01-01

    Cloud computing will be a main information infrastructure in the future; it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for cloud computing platform is a big challenge. In this paper, we propose a secure data...... distribution, feature template creation, cloud data processing and secure data access control. Finally, we compare the proposed scheme with other schemes through comprehensive analysis and simulation. The results show that the proposed data access scheme is feasible and secure for cloud computing....... access scheme based on identity-based encryption and biometric authentication for cloud computing. Firstly, we describe the security concern of cloud computing and then propose an integrated data access scheme for cloud computing, the procedure of the proposed scheme include parameter setup, key...

  12. Access to forest inventory data: towards transparency in public administration?

    Directory of Open Access Journals (Sweden)

    Borghetti M

    2007-01-01

    Full Text Available Transparency in public administration is an important issue in a modern democracy. Thus, we are glad to know the National Forest Service of Italy (Corpo Forestale dello Stato will make soon available on the web the forest inventory data collected in the ongoing National Inventory of Forests and Carbon stocks. We expect all public administrations “storing” important environmental data sets follow this way.

  13. Accessibility of private and public aspects of traits descriptive of oneself and others.

    Science.gov (United States)

    Mrozinski, Blazej; Karylowski, Jerzy J

    2011-12-01

    Previous research has shown that compared to mental representations of others, mental representations of ourselves are characterized by relatively greater accessibility of private, unobservable content, as opposed to content that is public and observable. Are those differences preserved when individuals focus on their own public selves and/or on private selves of others? Participants were asked to make social judgments involving traits that, in their view, were highly descriptive of either public or private selves of themselves, their best friend, or an acquaintance. Results demonstrated that highly self-descriptive traits were more accessible in social judgments involving individuals' private rather than public selves. This was true not only for traits descriptive of one's private self but also for traits descriptive of one's public self. Furthermore, other-descriptive traits, including traits that were highly descriptive of representations of private selves of others, were more accessible in social judgments involving public rather than private selves.

  14. Computational Ecology and Software (http://www.iaees.org/publications/journals/ces/online-version.asp

    Directory of Open Access Journals (Sweden)

    ces@iaees.org

    Full Text Available Computational Ecology and Software ISSN 2220-721X URL: http://www.iaees.org/publications/journals/ces/online-version.asp RSS: http://www.iaees.org/publications/journals/ces/rss.xml E-mail: ces@iaees.org Editor-in-Chief: WenJun Zhang Aims and Scope COMPUTATIONAL ECOLOGY AND SOFTWARE (ISSN 2220-721X is an open access, peer-reviewed online journal that considers scientific articles in all different areas of computational ecology. It is the transactions of the International Society of Computational Ecology. The journal is concerned with the ecological researches, constructions and applications of theories and methods of computational sciences including computational mathematics, computational statistics and computer science. It features the simulation, approximation, prediction, recognition, and classification of ecological issues. Intensive computation is one of the major stresses of the journal. The journal welcomes research articles, short communications, review articles, perspectives, and book reviews. The journal also supports the activities of the International Society of Computational Ecology. The topics to be covered by CES include, but are not limited to: •Computation intensive methods, numerical and optimization methods, differential and difference equation modeling and simulation, prediction, recognition, classification, statistical computation (Bayesian computing, randomization, bootstrapping, Monte Carlo techniques, stochastic process, etc., agent-based modeling, individual-based modeling, artificial neural networks, knowledge based systems, machine learning, genetic algorithms, data exploration, network analysis and computation, databases, ecological modeling and computation using Geographical Information Systems, satellite imagery, and other computation intensive theories and methods. •Artificial ecosystems, artificial life, complexity of ecosystems and virtual reality. •The development, evaluation and validation of software and

  15. Accessibility in Public Buildings: Efficiency of Checklist Protocols.

    Science.gov (United States)

    Andersson, Jonas E; Skehan, Terry

    2016-01-01

    In Sweden, governmental agencies and bodies are required to implement a higher level of accessibility in their buildings than that stipulated by the National Building and Planning Act (PBL). The Swedish Agency for Participation (MFD, Myndigheten för delaktighet) develops holistic guidelines in order to conceptualize this higher level of accessibility. In conjunction to these guidelines, various checklist protocols have been produced. The present study focuses on the efficiency of such checklist protocols. The study revolved around the use of a checklist protocol in assessments of two buildings in Stockholm: the new head office for the National Authority for Social Insurances (ASI) and the School of Architecture at the Royal Institute of Technology (KTH). The study included three groups: Group 1 and Group 2 consisted of 50 real estate managers employed by the ASI, while Group 3 consisted of three participants in a course at the KTH. The results were similar in all of the groups. The use of the checklist protocol generated queries, which related mainly to two factors: (1) the accompanying factsheet consisted of textual explanations with no drawings, photographs or illustrations and (2) the order of the questions in the checklist protocol was difficult to correlate with the two buildings' spatial logic of accessing, egressing and making use of the built space.

  16. The Public Image of Libraries and Librarians as a Potential Barrier to Rural Access.

    Science.gov (United States)

    MacDonald, Brad

    1995-01-01

    Examines stereotypes of the librarian as serious barriers to rural information access, and offers strategies for improving the public image of rural libraries and of the people who keep them functioning. (Author/JKP)

  17. CHORUS – providing a scalable solution for public access to scholarly research

    Directory of Open Access Journals (Sweden)

    Howard Ratner

    2014-03-01

    Full Text Available CHORUS (Clearinghouse for the Open Research of the United States offers an open technology platform in response to the public access requirements of US federal funding agencies, researchers, institutions and the public. It is focused on five principal sets of functions: 'identification', 'preservation', 'discovery', 'access', and 'compliance' . CHORUS facilitates public access to peer-reviewed publications, after a determined embargo period (where applicable, for each discipline and agency. By leveraging existing tools such as CrossRef, FundRef and ORCID, CHORUS allows a greater proportion of funding to remain focused on research. CHORUS identifies articles that report on federally funded research and enables a reader to access the ‘best available version’ free of charge, via the publisher. It is a scalable solution that offers maximum efficiency for all parties by automating as much of the process as is possible. CHORUS launched in pilot phase in September 2013, and the production phase will begin in early 2014.

  18. Comparable Measures of Accessibility to Public Transport Using the General Transit Feed Specification

    Directory of Open Access Journals (Sweden)

    Jinjoo Bok

    2016-03-01

    Full Text Available Public transport plays a critical role in the sustainability of urban settings. The mass mobility and quality of urban lives can be improved by establishing public transport networks that are accessible to pedestrians within a reasonable walking distance. Accessibility to public transport is characterized by the ease with which inhabitants can reach means of transportation such as buses or metros. By measuring the degree of accessibility to public transport networks using a common data format, a comparative study can be conducted between different cities or metropolitan areas with different public transit systems. The General Transit Feed Specification (GTFS by Google Developers allows this by offering a common format based on text files and sharing the data set voluntarily produced and contributed by the public transit agencies of many participating cities around the world. This paper suggests a method to assess and compare public transit accessibility in different urban areas using the GTFS feed and demographic data. To demonstrate the value of the new method, six examples of metropolitan areas and their public transit accessibility are presented and compared.

  19. Who's wired and who's not: children's access to and use of computer technology.

    Science.gov (United States)

    Becker, H J

    2000-01-01

    As computer technology becomes increasingly prevalent throughout society, concerns have been raised about an emerging "digital divide" between those children who are benefitting and those who are being left behind. This article presents results from new analyses of national survey data describing children's differential access to computers in school and at home, and the varying conditions that affect how children experience computers. For example, responses from a nationwide survey of teachers suggest that, as of 1998, more than 75% of students had access to computers at school. In fact, those teaching lower-income students reported weekly use of computers more often than those teaching higher-income students. But the nature of children's experiences using computers in school varied greatly by subject and teacher objectives, and the data suggest that lower-income students use computers more often for repetitive practice, whereas higher-income students use computers more often for more sophisticated, intellectually complex applications. Differences between low-income and high-income children's access to home computers were far less subtle. Survey data indicate that only about 22% of children in families with annual incomes of less than $20,000 had access to a home computer, compared to 91% of those in families with annual incomes of more than $75,000. And among children with access, those in low-income families were reported to use the computer less than those in high-income families, perhaps because most low-income families with computers lacked a connection to the Internet. The two most predictive factors of children's use of home computers were the child's age and the computer's capabilities. The author concludes that home access to computers will be a continued area of inequality in American society, and that schools must play a critical role in ensuring equal opportunity for less-advantaged children to access the benefits of the more intellectually powerful

  20. Maximizing Accessibility of Academic Publications: Applications of Electronic Publishing Technology

    Science.gov (United States)

    Jeffress, Laura; Lyle, Stacey D.

    2012-01-01

    Professors at higher education institutions often feel pressure to "publish or perish" in order to maintain their standing in the academic community, yet a large number of these publications languish in obscure technical journals or are presented only once at a conference or online journal. While these methods achieve the goal of…

  1. Immigrants' Access to Public Assistance: Missed Opportunities following Welfare Reform

    Science.gov (United States)

    Crosby, Danielle A.; Hatfield, Bridget E.

    2008-01-01

    The Personal Responsibility and Work Reconciliation Act of 1996 reformed public assistance programs and reduced the safety net of supports for low-income families. Children living in low-income immigrant families face particular challenges in the current policy environment. In this article, the authors consider what these changes have meant for…

  2. Providing Access to Local Government Information: The Nature of Public Library Activity.

    Science.gov (United States)

    Durrance, Joan C.

    1988-01-01

    Describes a survey of public libraries that examined problems associated with access to local government information. Findings are reported on the nature of requests received, the types of responses given and sources used, and reasons given by librarians for providing access to local government information. (14 notes with references) (CLB)

  3. US Government Information: Selected Current Issues in Public Access vs. Private Competition.

    Science.gov (United States)

    McMullen, Susan

    2000-01-01

    Discussion of the dissemination of government information focuses on the debate concerning public versus private access to government information; efforts of the National Technical Information Service (NTIS); electronic access and the need for printed documents; and joint efforts between government agencies and the private sector to charge for…

  4. Using copyright to promote access to public sector information: a comparative survey

    NARCIS (Netherlands)

    Jasserand, C.; Hugenholtz, P.B.

    2012-01-01

    This study, which is part of a three-part report on Using Copyright to Enhance Access to Information and Creative Content, examines the role that copyright plays in facilitating access to and reuse of public sector information. It briefly describes the laws, national policies and government practice

  5. A National Survey of Public Support for Restrictions on Youth Access to Tobacco.

    Science.gov (United States)

    Bailey, William J.; Crowe, James W.

    1994-01-01

    Reports a national telephone survey that measured public support for seven proposals to restrict youth access to tobacco products. Nearly all respondents believed child and adolescent smoking was a serious problem. Most supported all proposed measures to restrict children's access to tobacco and to increase the cigarette excise tax. (Author/SM)

  6. Perceived Accessibility of Public Transport as a Potential Indicator of Social Inclusion

    Directory of Open Access Journals (Sweden)

    Katrin Lättman

    2016-06-01

    Full Text Available Perceived accessibility has been acknowledged as an important aspect of transport policy since the 70s. Nevertheless, very few empirical studies have been conducted in this field. When aiming to improve social inclusion, by making sustainable transport modes accessible to all, it is important to understand the factors driving perceived accessibility. Unlike conventional accessibility measures, perceived accessibility focuses on the perceived possibilities and ease of engaging in preferred activities using different transport modes. We define perceived accessibility in terms of how easy it is to live a satisfactory life with the help of the transport system, which is not necessarily the same thing as the objective standard of the system. According to previous research, perceived accessibility varies with the subjectively-rated quality of the mode of transport. Thus, improvements in quality (e.g. trip planning, comfort, or safety increase the perceived accessibility and make life easier to live using the chosen mode of transport. This study (n=750 focuses on the perceived accessibility of public transport, captured using the Perceived Accessibility Scale PAC (Lättman, Olsson, & Friman, 2015. More specifically, this study aims to determine how level of quality affects the perceived accessibility in public transport. A Conditional Process Model shows that, in addition to quality, feeling safe and frequency of travel are important predictors of perceived accessibility. Furthermore, elderly and those in their thirties report a lower level of perceived accessibility to their day-to-day activities using public transport. The basic premise of this study is that subjective experiences may be as important as objective indicators when planning and designing for socially inclusive transport systems.

  7. LHC data to be made public via Open Access initiative

    CERN Multimedia

    Achintya Rao

    2013-01-01

    CMS has collected around 64 petabytes of analysable proton-proton data so far. Along with published papers, these data constitute the scientific legacy of the CMS collaboration, and preserving the data for future generations is crucial.   High-school students analysing CMS data. Image: Marzena Lapka. “To preserve not only the data but also the information on how to use them, we intend to make available through open access our data that are no longer under active analysis,” says Kati Lassila-Perini, head of the CMS Data Preservation and Open Access project at the Helsinki Institute of Physics. Although providing open scientific data allows potentially everyone to perform their own analyses, doing so is very difficult. CMS scientists working in groups take many months or even years to perform a single analysis. Each analysis must be scrutinised by the whole collaboration before a scientific paper can be published. CMS therefore decided to launch a pilot project for its ope...

  8. Public access management as an adaptive wildlife management tool

    Science.gov (United States)

    Ouren, Douglas S.; Watts, Raymond D.

    2005-01-01

    Wildlife populations across the United States are benefiting from improved wildlife management techniques. However, these benefits also create new challenges including overpopulation, disease, increased winter kill, and forage degradation. These issues have become the challenges for natural resource managers and landowners. Specifically, elk (Cervus elaphus) populations in the Gunnison River Valley of Colorado are growing and causing increased resource damage on public and private lands. On public lands elk threaten sage grouse habitat and compete with domestic livestock for available forage; on private lands they diminish available livestock forage. Management of elk and elk habitat in this area is a shared responsibility of the NPS (Black Canyon of the Gunnison National Park and Curecanti National Recreation Area), BLM (Uncompahgre Field Office), USFS (Gunnison National Forest), and the CDOW (Colorado Division of Wildlife). All of these agencies participate in this research and adaptive management project.

  9. Making Advanced Computer Science Topics More Accessible through Interactive Technologies

    Science.gov (United States)

    Shao, Kun; Maher, Peter

    2012-01-01

    Purpose: Teaching advanced technical concepts in a computer science program to students of different technical backgrounds presents many challenges. The purpose of this paper is to present a detailed experimental pedagogy in teaching advanced computer science topics, such as computer networking, telecommunications and data structures using…

  10. Making Advanced Computer Science Topics More Accessible through Interactive Technologies

    Science.gov (United States)

    Shao, Kun; Maher, Peter

    2012-01-01

    Purpose: Teaching advanced technical concepts in a computer science program to students of different technical backgrounds presents many challenges. The purpose of this paper is to present a detailed experimental pedagogy in teaching advanced computer science topics, such as computer networking, telecommunications and data structures using…

  11. A multimodal end-2-end approach to accessible computing

    CERN Document Server

    Biswas, Pradipta; Langdon, Patrick; Almeida, Luis; Jung, Christoph

    2013-01-01

    This book surveys the phases of delivering accessible products and services through design, development, deployment and maintenance. Examines user models for inclusive design, adaptable multimodal system development for digital TV and ubiquitous devices.

  12. Winter: Public Enemy #1 for Accessibility EXPLORING NEW SOLUTIONS

    Directory of Open Access Journals (Sweden)

    Ernesto Morales

    2014-05-01

    Full Text Available Abstract: Winter is expensive. For countries situated in the northern hemisphere, closer to the north pole, such as Canada, Russia and Scandinavia, winter requires the acquisition of special clothing, car tires, and sports equipment, snow removal or plowing from the streets, and is associated with the presence of ice patches, along with accidents and illnesses associated with cold weather. Fall-related injuries due to winter conditions have been estimated to cost the Canadian health care system $ 2.8 billion a year. However, the greatest cost snow entails every year is the social isolation of seniors as well as wheelchair and walker users. This results from the lack of accessibility, as it is difficult to circulate on snow-covered streets even for the able-bodied. Social isolation has been associated with other negative consequences such as depression and even suicide. This exploratory pilot study aimed at finding possible and feasible design solutions for improving the accessibility of sidewalks during winter conditions. For this project we used a Co-Design methodology. Stakeholders (City of Quebec representatives, designers, urban planners, occupational therapists, and adults with motor, visual and aural disabilities were invited to participate in the design process. In order to meet the objectives, two main steps were carried out: 1. Conception of the design solutions (through Co-design sessions in a Focus-group format with seniors, designers and researchers; and 2. Validation of the design solutions (consultation with experts and stakeholders. The results are a wide variety of possible and feasible solutions, including the reorganisation of the snow-removal procedure and the development of heated curb cuts. This project was funded by the City of Quebec in partnership with the Centre interdisciplinaire de recherche en réadaptation et intégration sociale (CIRRIS. Ultimately, the project sought to explore possible solutions to be implemented

  13. Public access defibrillators and fire extinguishers: are comparisons reasonable?

    Science.gov (United States)

    Mell, Howard K; Sayre, Michael R

    2008-01-01

    Sudden cardiac death is a major cause of mortality in the United States of America (Circulation 2008;117:e25-146) with approximately 310000 deaths related to coronary heart disease occurring in emergency departments or in the prehospital environment annually. Several organizations have directed resources toward the treatment of sudden cardiac arrest through a paradigm that has come to be known as the "chain of survival"-prompt activation of emergency response by telephone 911, early bystander cardiopulmonary resuscitation, early defibrillation, and timely advanced cardiac life support (Circulation 1991;83:1832-1847). The ready availability of automated external defibrillators (AEDs) has been advocated as a key component of this chain. Some authors have suggested a "fire extinguisher model" for AED deployment (Circulation 1998;98:2334-2351; Resuscitation 1995;30:151-156; Ann Intern Med 2001;135:990-998). In this model, AEDs are prominently displayed in public places for use by laypersons, much like fire extinguishers. For example, in Chicago's O'Hare Airport, AEDs are placed alongside fire extinguishers in the public concourse (N Engl J Med 2002;347:1242-1247). Advocates of this model suggest that advancing this practice would be a means to widely disbourse life-saving technology that is easy to use. Several experts have questioned this model, suggesting that the cost-effectiveness of distributing AEDs this widely would be prohibitive (BMJ 2002;325:515; Curr Opin Cardiol 2007;22:5-10; BMJ 2003;326:162; Int J Technol Assess Health Care 2007;23:362-367) and may not be more effective than more targeted distribution of AEDs. This literature review will examine the available data on both AEDs and fire extinguishers to determine if these comparisons are reasonable as a means of guiding public policy.

  14. Funding Public Computing Centers: Balancing Broadband Availability and Expected Demand

    Science.gov (United States)

    Jayakar, Krishna; Park, Eun-A

    2012-01-01

    The National Broadband Plan (NBP) recently announced by the Federal Communication Commission visualizes a significantly enhanced commitment to public computing centers (PCCs) as an element of the Commission's plans for promoting broadband availability. In parallel, the National Telecommunications and Information Administration (NTIA) has…

  15. Paging memory from random access memory to backing storage in a parallel computer

    Science.gov (United States)

    Archer, Charles J; Blocksome, Michael A; Inglett, Todd A; Ratterman, Joseph D; Smith, Brian E

    2013-05-21

    Paging memory from random access memory (`RAM`) to backing storage in a parallel computer that includes a plurality of compute nodes, including: executing a data processing application on a virtual machine operating system in a virtual machine on a first compute node; providing, by a second compute node, backing storage for the contents of RAM on the first compute node; and swapping, by the virtual machine operating system in the virtual machine on the first compute node, a page of memory from RAM on the first compute node to the backing storage on the second compute node.

  16. Role of public organisations in the creation of new broadband access infrastructures

    OpenAIRE

    Burgmeijer, J.W.

    2005-01-01

    Which roles may a public organisation play in the creation of new broadband access infrastructures? The main discussion issues about the roles of public organisations in relation to regulation and market distortion principles are given. Based upon some public policies and principles, the general requirements in making choices related to infrastructure in a specific broadband project are presented. The issues about the way how governments may fulfil the general requirements are presented. Exam...

  17. Role of public organisations in the creation of new broadband access infrastructures

    OpenAIRE

    2005-01-01

    Which roles may a public organisation play in the creation of new broadband access infrastructures? The main discussion issues about the roles of public organisations in relation to regulation and market distortion principles are given. Based upon some public policies and principles, the general requirements in making choices related to infrastructure in a specific broadband project are presented. The issues about the way how governments may fulfil the general requirements are presented. Exam...

  18. ACCESS TO A COMPUTER SYSTEM. BETWEEN LEGAL PROVISIONS AND TECHNICAL REALITY

    Directory of Open Access Journals (Sweden)

    Maxim DOBRINOIU

    2016-05-01

    Full Text Available Nowadays, on a rise of cybersecurity incidents and a very complex IT&C environment, the national legal systems must adapt in order to properly address the new and modern forms of criminality in cyberspace. The illegal access to a computer system remains one of the most important cyber-related crimes due to its popularity but also from the perspective as being a door opened to computer data and sometimes a vehicle for other tech crimes. In the same time, the information society services slightly changed the IT paradigm and represent the new interface between users and systems. Is true that services rely on computer systems, but accessing services goes now beyond the simple accessing computer systems as commonly understood by most of the legislations. The article intends to explain other sides of the access related to computer systems and services, with the purpose to advance possible legal solutions to certain case scenarios.

  19. Scalable Database Access Technologies for ATLAS Distributed Computing

    CERN Document Server

    Vaniachine, A

    2009-01-01

    ATLAS event data processing requires access to non-event data (detector conditions, calibrations, etc.) stored in relational databases. The database-resident data are crucial for the event data reconstruction processing steps and often required for user analysis. A main focus of ATLAS database operations is on the worldwide distribution of the Conditions DB data, which are necessary for every ATLAS data processing job. Since Conditions DB access is critical for operations with real data, we have developed the system where a different technology can be used as a redundant backup. Redundant database operations infrastructure fully satisfies the requirements of ATLAS reprocessing, which has been proven on a scale of one billion database queries during two reprocessing campaigns of 0.5 PB of single-beam and cosmics data on the Grid. To collect experience and provide input for a best choice of technologies, several promising options for efficient database access in user analysis were evaluated successfully. We pre...

  20. Managing the Accessibility on Mass Public Transit: the Case of Hong Kong

    Directory of Open Access Journals (Sweden)

    Siman Tang

    2008-11-01

    Full Text Available Public transit services (PTS improve mobility and accessibility, and reduce car dependence. It is ideal if PTS are financially sustainable, with affordable fares and expedient quality. The success of PTS on accessibility improvement can be reflected by their level of patronage: do travelers choose to use them in lieu of their private cars? PTS in Hong Kong are renowned for their quality and profitability, superbly addressing the accessibility need for the city; they carry over 90% of the 11 million daily trips. A comparison of the per capita train-car and bus-vehicle kilometer run of PTS in Hong Kong with those in London and Singapore, however, suggests that it is not purely the supply that affects the use or accessibility of PTS in Hong Kong. By tracing and analyzing the development of PTS in Hong Kong over the past two decades, we found evidence that the high level of accessibility on mass public transit in the territory can be attributed to the land use policy of developing compact, high-density township, accompanying transport policies of granting high priority to the development of mass transit facilities and providing ways to ensure the financial viability of privately operated PTS, especially the innovative approach of integrating the development of public transport facility and property so as to exploit their synergy. In this paper, we study and highlight elements that contribute to the development of high accessibility on mass public transit in Hong Kong.

  1. Access Control for Agent-based Computing: A Distributed Approach.

    Science.gov (United States)

    Antonopoulos, Nick; Koukoumpetsos, Kyriakos; Shafarenko, Alex

    2001-01-01

    Discusses the mobile software agent paradigm that provides a foundation for the development of high performance distributed applications and presents a simple, distributed access control architecture based on the concept of distributed, active authorization entities (lock cells), any combination of which can be referenced by an agent to provide…

  2. Experiences of registered nurses with regard to accessing health information at the point-of-care via mobile computing devices

    Directory of Open Access Journals (Sweden)

    Esmeralda Ricks

    2015-07-01

    Full Text Available Background: The volume of health information necessary to provide competent health care today has become overwhelming. Mobile computing devices are fast becoming an essential clinical tool for accessing health information at the point-of-care of patients.Objectives: This study explored and described how registered nurses experienced accessing information at the point-of-care via mobile computing devices (MCDs.Method: A qualitative, exploratory, descriptive and contextual design was used. Ten in–depth interviews were conducted with purposively sampled registered nurses employed by a state hospital in the Nelson Mandela Bay Municipality (NMBM. Interviews were recorded, transcribed verbatim and analysed using Tesch’s data analysis technique. Ethical principles were adhered to throughout the study. Guba’s model of trustworthiness was used to confirm integrity of the study.Results: Four themes emerged which revealed that the registered nurses benefited from the training they received by enabling them to develop, and improve, their computer literacy levels. Emphasis was placed on the benefits that the accessed information had for educational purposes for patients and the public, for colleagues and students. Furthermore the ability to access information at the point-of-care was considered by registered nurses as valuable to improve patient care because of the wide range of accurate and readily accessible information available via the mobile computing device.Conclusion: The registered nurses in this study felt that being able to access information at the point-of-care increased their confidence and facilitated the provision of quality care because it assisted them in being accurate and sure of what they were doing.

  3. Computer and internet access for long-term care residents: perceived benefits and barriers.

    Science.gov (United States)

    Tak, Sunghee H; Beck, Cornelia; McMahon, Ed

    2007-05-01

    In this study, the authors examined residents' computer and Internet access, as well as benefits and barriers to access in nursing homes. Administrators of 64 nursing homes in a national chain completed surveys. Fourteen percent of the nursing homes provided computers for residents to use, and 11% had Internet access. Some residents owned personal computers in their rooms. Administrators perceived the benefits of computer and Internet use for residents as facilitating direct communication with family and providing mental exercise, education, and enjoyment. Perceived barriers included cost and space for computer equipment and residents' cognitive and physical impairments. Implications of residents' computer activities were discussed for nursing care. Further research is warranted to examine therapeutic effects of computerized activities and their cost effectiveness.

  4. Restricted access processor - An application of computer security technology

    Science.gov (United States)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  5. AccessMod 3.0: computing geographic coverage and accessibility to health care services using anisotropic movement of patients

    Directory of Open Access Journals (Sweden)

    Ebener Steeve

    2008-12-01

    Full Text Available Abstract Background Access to health care can be described along four dimensions: geographic accessibility, availability, financial accessibility and acceptability. Geographic accessibility measures how physically accessible resources are for the population, while availability reflects what resources are available and in what amount. Combining these two types of measure into a single index provides a measure of geographic (or spatial coverage, which is an important measure for assessing the degree of accessibility of a health care network. Results This paper describes the latest version of AccessMod, an extension to the Geographical Information System ArcView 3.×, and provides an example of application of this tool. AccessMod 3 allows one to compute geographic coverage to health care using terrain information and population distribution. Four major types of analysis are available in AccessMod: (1 modeling the coverage of catchment areas linked to an existing health facility network based on travel time, to provide a measure of physical accessibility to health care; (2 modeling geographic coverage according to the availability of services; (3 projecting the coverage of a scaling-up of an existing network; (4 providing information for cost effectiveness analysis when little information about the existing network is available. In addition to integrating travelling time, population distribution and the population coverage capacity specific to each health facility in the network, AccessMod can incorporate the influence of landscape components (e.g. topography, river and road networks, vegetation that impact travelling time to and from facilities. Topographical constraints can be taken into account through an anisotropic analysis that considers the direction of movement. We provide an example of the application of AccessMod in the southern part of Malawi that shows the influences of the landscape constraints and of the modes of transportation on

  6. Lifelong mobile learning: Increasing accessibility and flexibility with tablet computers and ebooks

    NARCIS (Netherlands)

    Kalz, Marco

    2011-01-01

    Kalz, M. (2011, 1 September). Lifelong mobile learning: Increasing accessibility and flexibility with tablet computers and ebooks. Presentation provided during the opening ceremony of the iPad pilot for schakelzone rechten, Utrecht, The Netherlands.

  7. Lifelong mobile learning: Increasing accessibility and flexibility with tablet computers and ebooks

    NARCIS (Netherlands)

    Kalz, Marco

    2011-01-01

    Kalz, M. (2011, 1 September). Lifelong mobile learning: Increasing accessibility and flexibility with tablet computers and ebooks. Presentation provided during the opening ceremony of the iPad pilot for schakelzone rechten, Utrecht, The Netherlands.

  8. Youth with cerebral palsy with differing upper limb abilities: how do they access computers?

    Science.gov (United States)

    Davies, T Claire; Chau, Tom; Fehlings, Darcy L; Ameratunga, Shanthi; Stott, N Susan

    2010-12-01

    To identify the current level of awareness of different computer access technologies and the choices made regarding mode of access by youth with cerebral palsy (CP) and their families. Survey. Two tertiary-level rehabilitation centers in New Zealand and Canada. Youth (N=60) with CP, Manual Ability Classification Scale (MACS) levels I to V, age 13 to 25 years. Not applicable. Questionnaire. Fifty (83%) of the 60 youth were aware of at least 1 available assistive technology (AT), such as touch screens and joysticks. However, only 34 youth (57%) were familiar with the accessibility options currently available in the most common operating systems. Thirty-three (94%) of 35 youth who were MACS I and II used a standard mouse and keyboard, while few chose to use assistive technology or accessibility options. In contrast, 10 (40%) of 25 youth who were MACS III to V used a variety of assistive technologies such as touch screens, joysticks, trackballs, and scanning technologies. This group also had the highest use of accessibility options, although only 15 (60%) of the 25 were aware of them. Most youth with CP were aware of, and used, assistive technologies to enhance their computer access but were less knowledgeable about accessibility options. Accessibility options allow users to modify their own computer interface and can thus enhance computer access for youth with CP. Clinicians should be knowledgeable enough to give informed advice in this area of computer access, thus ensuring that all youth with CP can benefit from both AT and accessibility options, as required. Copyright © 2010 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  9. LBVS: an online platform for ligand-based virtual screening using publicly accessible databases.

    Science.gov (United States)

    Zheng, Minghao; Liu, Zhihong; Yan, Xin; Ding, Qianzhi; Gu, Qiong; Xu, Jun

    2014-11-01

    Abundant data on compound bioactivity and publicly accessible chemical databases increase opportunities for ligand-based drug discovery. In order to make full use of the data, an online platform for ligand-based virtual screening (LBVS) using publicly accessible databases has been developed. LBVS adopts Bayesian learning approach to create virtual screening models because of its noise tolerance, speed, and efficiency in extracting knowledge from data. LBVS currently includes data derived from BindingDB and ChEMBL. Three validation approaches have been employed to evaluate the virtual screening models created from LBVS. The tenfold cross validation results of twenty different LBVS models demonstrate that LBVS achieves an average AUC value of 0.86. Our internal and external testing results indicate that LBVS is predictive for lead identifications. LBVS can be publicly accessed at http://rcdd.sysu.edu.cn/lbvs.

  10. Impact of the Digital Divide on Computer Use and Internet Access on the Poor in Nigeria

    Science.gov (United States)

    Tayo, Omolara; Thompson, Randall; Thompson, Elizabeth

    2016-01-01

    We recruited 20 community members in Ido Local Government Area, Oyo state and Yewa Local Government Area, Ogun state in Nigeria to explore experiences and perceptions of Internet access and computer use. Face-to-face interviews were conducted using open-ended questions to collect qualitative data regarding accessibility of information and…

  11. 37 CFR 201.26 - Recordation of documents pertaining to computer shareware and donation of public domain computer...

    Science.gov (United States)

    2010-07-01

    ... pertaining to computer shareware and donation of public domain computer software. 201.26 Section 201.26... GENERAL PROVISIONS § 201.26 Recordation of documents pertaining to computer shareware and donation of public domain computer software. (a) General. This section prescribes the procedures for submission of...

  12. 10 CFR 727.5 - What acknowledgment and consent is required for access to information on DOE computers?

    Science.gov (United States)

    2010-01-01

    ... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a DOE...

  13. Location-allocation and accessibility models for improving the spatial planning of public health services.

    Science.gov (United States)

    Polo, Gina; Acosta, C Mera; Ferreira, Fernando; Dias, Ricardo Augusto

    2015-01-01

    This study integrated accessibility and location-allocation models in geographic information systems as a proposed strategy to improve the spatial planning of public health services. To estimate the spatial accessibility, we modified the two-step floating catchment area (2SFCA) model with a different impedance function, a Gaussian weight for competition among service sites, a friction coefficient, distances along a street network based on the Dijkstra's algorithm and by performing a vectorial analysis. To check the accuracy of the strategy, we used the data from the public sterilization program for the dogs and cats of Bogot´a, Colombia. Since the proposed strategy is independent of the service, it could also be applied to any other public intervention when the capacity of the service is known. The results of the accessibility model were consistent with the sterilization program data, revealing that the western, central and northern zones are the most isolated areas under the sterilization program. Spatial accessibility improvement was sought by relocating the sterilization sites using the maximum coverage with finite demand and the p-median models. The relocation proposed by the maximum coverage model more effectively maximized the spatial accessibility to the sterilization service given the non-uniform distribution of the populations of dogs and cats throughout the city. The implementation of the proposed strategy would provide direct benefits by improving the effectiveness of different public health interventions and the use of financial and human resources.

  14. Location-allocation and accessibility models for improving the spatial planning of public health services.

    Directory of Open Access Journals (Sweden)

    Gina Polo

    Full Text Available This study integrated accessibility and location-allocation models in geographic information systems as a proposed strategy to improve the spatial planning of public health services. To estimate the spatial accessibility, we modified the two-step floating catchment area (2SFCA model with a different impedance function, a Gaussian weight for competition among service sites, a friction coefficient, distances along a street network based on the Dijkstra's algorithm and by performing a vectorial analysis. To check the accuracy of the strategy, we used the data from the public sterilization program for the dogs and cats of Bogot´a, Colombia. Since the proposed strategy is independent of the service, it could also be applied to any other public intervention when the capacity of the service is known. The results of the accessibility model were consistent with the sterilization program data, revealing that the western, central and northern zones are the most isolated areas under the sterilization program. Spatial accessibility improvement was sought by relocating the sterilization sites using the maximum coverage with finite demand and the p-median models. The relocation proposed by the maximum coverage model more effectively maximized the spatial accessibility to the sterilization service given the non-uniform distribution of the populations of dogs and cats throughout the city. The implementation of the proposed strategy would provide direct benefits by improving the effectiveness of different public health interventions and the use of financial and human resources.

  15. Essays on the Impacts of Geography and Institutions on Access to Energy and Public Infrastructure Services

    Science.gov (United States)

    Archibong, Belinda

    While previous literature has emphasized the importance of energy and public infrastructure services for economic development, questions surrounding the implications of unequal spatial distribution in access to these resources remain, particularly in the developing country context. This dissertation provides evidence on the nature, origins and implications of this distribution uniting three strands of research from the development and political economy, regional science and energy economics fields. The dissertation unites three papers on the nature of spatial inequality of access to energy and infrastructure with further implications for conflict risk , the historical institutional and biogeographical determinants of current distribution of access to energy and public infrastructure services and the response of households to fuel price changes over time. Chapter 2 uses a novel survey dataset to provide evidence for spatial clustering of public infrastructure non-functionality at schools by geopolitical zone in Nigeria with further implications for armed conflict risk in the region. Chapter 3 investigates the drivers of the results in chapter 2, exploiting variation in the spatial distribution of precolonial institutions and geography in the region, to provide evidence for the long-term impacts of these factors on current heterogeneity of access to public services. Chapter 4 addresses the policy implications of energy access, providing the first multi-year evidence on firewood demand elasticities in India, using the spatial variation in prices for estimation.

  16. Impacts of Public Access to the Internet through Pennsylvania Public Libraries.

    Science.gov (United States)

    Bertot, John Carlo; McClure, Charles R.

    1997-01-01

    Presents an evaluation of the OnLine at PA Libraries (1996-97) Internet-based information services and resources project for Pennsylvania residents. The project provided a statewide demonstration to improve public library services; connect public libraries to the Internet; provide a range of new services and resources to their communities; and…

  17. Digital divide and stability of access in African American women visiting urban public health centers.

    Science.gov (United States)

    Haughton, Lorna Tanya; Kreuter, Matthew; Hall, Jasmine; Holt, Cheryl L; Wheetley, Eric

    2005-05-01

    This exploratory study examines access to communication technologies, its association with health-related variables and study attrition, and its stability over time in a study of lower income African American women visiting urban public health centers. Participants (n = 1,227) provided information about cancer-related behaviors in a baseline questionnaire that also assessed their e-mail and cell phone/pager access. Interviews conducted at 1-, 6-, and 18-month follow up determined attrition, and an e-mail message sent to participants at 6-month follow up determined stability of access. Fewer than 10% of women reported e-mail access; 26% reported cell/phone pager access. At 6-month follow up, 45% of e-mail accounts were inactive; accounts from pay access providers were more likely to be inactive than work- or school-based accounts (58% versus 25%). Cell phone/pager access was positively associated with mammography knowledge. Attrition rates were lower among women with access than among those without access. Priorities for future research based on these preliminary findings are discussed.

  18. [Youth and health: discourse analysis on supply and access to public facilities].

    Science.gov (United States)

    Souza, Cinoélia Leal; Souzas, Raquel

    2012-01-01

    From the standpoint of sociodemographic, teens today represent an important portion of the Brazilian population. In 2005 the Brazilian government published the National Youth Policy. Despite of this, many teens still find difficulties in accessing public services, especially the ones involving health. This study aimed to analyze young students' speeches about the conditions of access to public services and health through qualitative research. The students inquired live in rural and urban areas of the city of Vitória da Conquista - Bahia. The method used was the content analysis proposed by Bardin (1979) and Minayo (2006), and the technique of discussion groups for youth proposed by Weller (2006).

  19. 61 Gender, Computer Access and Use as Predictors of Nigerian ...

    African Journals Online (AJOL)

    Nekky Umera

    constitutes a powerful tool that facilitates instructional process at all levels of education (Saleh .... purposes demonstrate improved scores in reading and mathematics. (Organisation ... succinctly noted that a gender difference towards computer affects ... explored by trial-testing the instrument within two weeks interval on 30.

  20. Restricting access to publications from funded research: Ethical issues and solutions

    Directory of Open Access Journals (Sweden)

    Manikandan S

    2010-01-01

    Full Text Available India is becoming one of the hubs of clinical research. Commensurate with these advances, the government funding for biomedical research in thrust areas is also increasing. The Indian Council of Medical Research (ICMR, Department of Biotechnology (DBT, Department of Science and Technology (DST are some of the government organizations which provide financial support for various research projects. The results of the funded research projects are published in various international journals. Most of these journals have an access to paid subscribers only. Hence it is unethical to use the research grants from government (people′s money and not allow the scientific community free access to the results of the study. To tackle such issues, these agencies should sign the Berlin declaration and create open access repositories. A public access policy should be formulated and listed in JULIET. The funding bodies in India should also join Pubmed Central (PMC to form PMC India so that every investigator who has received grants would submit the full text of the paper published from his study and these can be made freely accessible to everyone. Universities and research institutions should also develop institutional open access repositories. The public access policy has definitive advantages and should be implemented.

  1. Restricting access to publications from funded research: ethical issues and solutions.

    Science.gov (United States)

    Manikandan, S; Vani, N Isai

    2010-01-01

    India is becoming one of the hubs of clinical research. Commensurate with these advances, the government funding for biomedical research in thrust areas is also increasing. The Indian Council of Medical Research (ICMR), Department of Biotechnology (DBT), Department of Science and Technology (DST) are some of the government organizations which provide financial support for various research projects. The results of the funded research projects are published in various international journals. Most of these journals have an access to paid subscribers only. Hence it is unethical to use the research grants from government (people's money) and not allow the scientific community free access to the results of the study. To tackle such issues, these agencies should sign the Berlin declaration and create open access repositories. A public access policy should be formulated and listed in JULIET. The funding bodies in India should also join Pubmed Central (PMC) to form PMC India so that every investigator who has received grants would submit the full text of the paper published from his study and these can be made freely accessible to everyone. Universities and research institutions should also develop institutional open access repositories. The public access policy has definitive advantages and should be implemented.

  2. Leveraging Cloud Computing to Address Public Health Disparities: An Analysis of the SPHPS.

    Science.gov (United States)

    Jalali, Arash; Olabode, Olusegun A; Bell, Christopher M

    2012-01-01

    As the use of certified electronic health record technology (CEHRT) has continued to gain prominence in hospitals and physician practices, public health agencies and health professionals have the ability to access health data through health information exchanges (HIE). With such knowledge health providers are well positioned to positively affect population health, and enhance health status or quality-of-life outcomes in at-risk populations. Through big data analytics, predictive analytics and cloud computing, public health agencies have the opportunity to observe emerging public health threats in real-time and provide more effective interventions addressing health disparities in our communities. The Smarter Public Health Prevention System (SPHPS) provides real-time reporting of potential public health threats to public health leaders through the use of a simple and efficient dashboard and links people with needed personal health services through mobile platforms for smartphones and tablets to promote and encourage healthy behaviors in our communities. The purpose of this working paper is to evaluate how a secure virtual private cloud (VPC) solution could facilitate the implementation of the SPHPS in order to address public health disparities.

  3. Individual public transportation accessibility is positively associated with self-reported active commuting

    DEFF Research Database (Denmark)

    Djurhuus, Sune; Hansen, Henning Sten; Aadahl, Mette;

    2014-01-01

    BACKGROUND: Active commuters have lower risk of chronic disease. Understanding which of the, to some extent, modifiable characteristics of public transportation that facilitate its use is thus important in a public health perspective. The aim of the study was to examine the association between...... individual public transportation accessibility and self-reported active commuting, and whether the associations varied with commute distance, age, and gender. METHODS: Twenty-eight thousand nine hundred twenty-eight commuters in The Capital Region of Denmark reported self-reported time spent either walking...... or cycling to work or study each day and the distance to work or study. Data were obtained from the Danish National Health Survey collected in February to April 2010. Individual accessibility by public transportation was calculated using a multi-modal network in a GIS. Multilevel logistic regression was used...

  4. Patent Law, Antitrust Enforcement, and Public Access to Pharmaceuticals and Medical Technologies

    OpenAIRE

    Sigman, Laura J.

    2003-01-01

    Patent and antitrust laws impact public access to pharmaceuticals and medical technologies. Two instances—one involving Roche’s new class of HIV/AIDS drugs, the other an antitrust action brought against Boston Scientific Corporation for violations of an anticompetitive agreement pertaining to cardiac treatment technology—illustrate the salient effects that medical products can have on public welfare. This paper provides a summary of pat...

  5. The SDSS SkyServer Public Access to the Sloan Digital Sky Server Data

    CERN Document Server

    Szalay, A S; Thakar, A R; Kunszt, Zoltán; Malik, T; Raddick, J; Stoughton, C; Van den Berg, J

    2002-01-01

    The SkyServer provides Internet access to the public Sloan Digi-tal Sky Survey (SDSS) data for both astronomers and for science education. This paper describes the SkyServer goals and archi-tecture. It also describes our experience operating the SkyServer on the Internet. The SDSS data is public and well-documented so it makes a good test platform for research on database algorithms and performance.

  6. Access to the energy system network simulator (ESNS), via remote computer terminals. [BNL CDC 7600/6600 computer facility

    Energy Technology Data Exchange (ETDEWEB)

    Reisman, A W

    1976-08-15

    The Energy System Network Simulator (ESNS) flow model is installed on the Brookhaven National Laboratory (BNL) CDC 7600/6600 computer facility for access by off-site users. The method of access available to outside users is through a system called CDC-INTERCOM, which allows communication between the BNL machines and remote teletype terminals. This write-up gives a brief description of INTERCOM for users unfamiliar with this system and a step-by-step guide to using INTERCOM in order to access ESNS.

  7. The Study of Access Control for Service-Oriented Computing in Internet of Things

    Directory of Open Access Journals (Sweden)

    Guoping Zhang

    2012-06-01

    Full Text Available In Internet of Things, computing and processing of information is the core supporting. In this paper, we introduce “Service-Oriented Computing” to solve the computing and processing of information in IoT. However, a key challenge in service-oriented environment is the design of effective access control schemas.We put forward a model of Workflow -oriented Attributed Based Access Control (WABAC, and an access control framework based on WABAC model. WABAC model grants and adapts permissions to subjects according to subject atttribute, resource attribute, environment attribute and current task, meeting access control request of SOC. Using the approach presented can effectively enhance the access control security for SOC applications, and prevent the abuse of subject permissions.

  8. Task-and-role-based access-control model for computational grid

    Institute of Scientific and Technical Information of China (English)

    LONG Tao; HONG Fan; WU Chi; SUN Ling-li

    2007-01-01

    Access control in a grid environment is a challenging issue because the heterogeneous nature and independent administration of geographically dispersed resources in grid require access control to use fine-grained policies. We established a task-and-role-based access-control model for computational grid (CG-TRBAC model), integrating the concepts of role-based access control (RBAC) and task-based access control (TBAC). In this model, condition restrictions are defined and concepts specifically tailored to Workflow Management System are simplified or omitted so that role assignment and security administration fit computational grid better than traditional models; permissions are mutable with the task status and system variables, and can be dynamically controlled. The CG-TRBAC model is proved flexible and extendible. It can implement different control policies. It embodies the security principle of least privilege and executes active dynamic authorization. A task attribute can be extended to satisfy different requirements in a real grid system.

  9. Development of CONSER Cataloging Policies for Remote Access Computer File Serials.

    Science.gov (United States)

    Anderson, Bill; Hawkins, Les

    1996-01-01

    Describes the development of CONSER (Cooperative Online Serials) policies and practices for cataloging remote access computer file serials. Topics include electronic serials on the Internet, cataloging standards for computer files, OCLC and Internet resources, networked resources as published documents, multiple file formats, sources of…

  10. Researchers' perspectives on open access scholarly communication in Tanzanian public universities

    Directory of Open Access Journals (Sweden)

    F.W. Dulle

    2009-04-01

    Full Text Available This research explored the awareness, usage and perspectives of Tanzanian researchers on open access as a mode of scholarly communication. A survey questionnaire targeted 544 respondents selected through stratified random sampling from a population of 1088 university researchers of the six public universities in Tanzania. With a response rate of 73%, the data were analysed using the Statistical Package for Social Sciences. The study reveals that the majority of the researchers were aware of and were positive towards open access. Findings further indicate that the majority of researchers in Tanzanian public universities used open access outlets more to access scholarly content than to disseminate their own research findings. It seems that most of these researchers would support open access publishing more if issues of recognition, quality and ownership were resolved. Thus many of them supported the idea of establishing institutional repositories at their respective universities as a way of improving the dissemination of local content. The study recommends that public universities and other research institutions in the country should consider establishing institutional repositories, with appropriate quality assurance measures, to improve the dissemination of research output emanating from these institutions.

  11. Multiple core computer processor with globally-accessible local memories

    Energy Technology Data Exchange (ETDEWEB)

    Shalf, John; Donofrio, David; Oliker, Leonid

    2016-09-20

    A multi-core computer processor including a plurality of processor cores interconnected in a Network-on-Chip (NoC) architecture, a plurality of caches, each of the plurality of caches being associated with one and only one of the plurality of processor cores, and a plurality of memories, each of the plurality of memories being associated with a different set of at least one of the plurality of processor cores and each of the plurality of memories being configured to be visible in a global memory address space such that the plurality of memories are visible to two or more of the plurality of processor cores.

  12. COMPUTER AIDED DISTANCE HOUSE AUTOMATION BY TELEPHONE LINE ACCESS

    Directory of Open Access Journals (Sweden)

    İbrahim ÇAYIROĞLU

    2007-03-01

    Full Text Available In this study, control and automation of house instruments have been practiced by using a distance telephone line and a modem. A user can use the buttons of a telephone in distance and he can control the instruments at home. In order to data acquisition from a modem, TAPIEx ActiveX Control 2.6 software has been used. An interface to fulfill the operation provided from the software and controlling the ports has been written. To drive relays from computer output, a relay circuit has been designed. The all instruments at home have been controlled by the relay controlled.

  13. Towards a Methodology for the Design of Multimedia Public Access Interfaces.

    Science.gov (United States)

    Rowley, Jennifer

    1998-01-01

    Discussion of information systems methodologies that can contribute to interface design for public access systems covers: the systems life cycle; advantages of adopting information systems methodologies; soft systems methodologies; task-oriented approaches to user interface design; holistic design, the Star model, and prototyping; the…

  14. 76 FR 80417 - Request for Information: Public Access to Digital Data Resulting From Federally Funded Scientific...

    Science.gov (United States)

    2011-12-23

    ...] [FR Doc No: 2011-32947] OFFICE OF SCIENCE AND TECHNOLOGY POLICY Request for Information: Public Access... Technology Policy (OSTP) on behalf of the National Science and Technology Council (NSTC) SUPPLEMENTARY... costs. Federal science agencies already have some experience with policies to promote long- term...

  15. Towards a Methodology for the Design of Multimedia Public Access Interfaces.

    Science.gov (United States)

    Rowley, Jennifer

    1998-01-01

    Discussion of information systems methodologies that can contribute to interface design for public access systems covers: the systems life cycle; advantages of adopting information systems methodologies; soft systems methodologies; task-oriented approaches to user interface design; holistic design, the Star model, and prototyping; the…

  16. State Challenges to "Plyler v. Doe": Undocumented Immigrant Students and Public School Access

    Science.gov (United States)

    Sutton, Lenford C.; Stewart, Tricia J.

    2013-01-01

    This article presents a review and analysis of selected state laws and initiatives that have attempted to restrict public school access for undocumented immigrant children in the wake of the landmark U.S. Supreme Court decision of "Plyler v. Doe." Sutton and Stewart begin with an overview of the Court's ruling in "Plyler," then…

  17. Documenting Attitudes toward Undocumented Immigrant Access to Public Education: A Multilevel Analysis

    Science.gov (United States)

    Herrera, Felisha A.; Garibay, Juan C.; Garcia, Gina A.; Johnston, Marc P.

    2013-01-01

    This study investigates how students' views toward undocumented immigrants' access to public education change during college. A multilevel analysis among a national sample of 12,388 undergraduates, drawn from the Cooperative Institutional Research Program's (CIRP) Freshman Survey and College Senior Survey, revealed that significant…

  18. Public Internet Access Points (PIAPs) and Their Social Impact: A Case Study from Turkey

    Science.gov (United States)

    Afacan, Gulgun; Er, Erkan; Arifoglu, Ali

    2013-01-01

    Building public Internet access points (PIAPs) is a significant contribution of governments towards achieving an information society. While many developing countries are investing great amounts to establish PIAPs today, people may not use PIAPs effectively. Yet, the successful implementation of PIAPs is the result of citizens' acceptance to use…

  19. Effects of Job Accessibility Improved by Public Transport System: Natural Experimental Evidence from the Copenhagen Metro

    DEFF Research Database (Denmark)

    Pons Rotger, Gabriel Angel; Nielsen, Thomas Alexander Sick

    2015-01-01

    and Metro system resulting from the construction of a new terminal Metro station connecting southern townships to Copenhagen city centre. The results show that public transport based job accessibility has a positive and permanent effect on individual earnings. The increase in earnings is associated...

  20. Effects of Job Accessibility Improved by Public Transport System: Natural Experimental Evidence from the Copenhagen Metro

    DEFF Research Database (Denmark)

    Rotger, Gabriel Pons; Sick Nielsen, Thomas

    2015-01-01

    and Metro system due to the construction of a new terminal Metro station connecting southern townships to the city centre of Copenhagen. The results show that public transport based job accessibility has a positive and permanent effect on individual earnings. The increase in earnings is associated...

  1. Building a multimodal network and determining individual accessibility by public transportation

    DEFF Research Database (Denmark)

    Djurhuus, Sune; Hansen, Henning Sten; Aadahl, Mette

    2016-01-01

    The increased availability of transit schedules from web sites or travel planners as well as more disaggregate data has led to a growing interest in creating individual public transportation accessibility measures. However, used extensively, standard GIS software does not have direct capabilities...

  2. Policy and role of public organisations and their requirements on new broadband access infrastructures

    NARCIS (Netherlands)

    Wolfswinkel, R.N. van; Burgmeijer, J.W.; Beek, S.S. op de; Mioulet, K.

    2004-01-01

    This paper is based on actual experiences of our institute in supporting city councils and public organisations aiming to stimulate the broadband access evolution. It highlights the current situation in the Netherlands and stimulates the discussion of the possible roles of government in modern

  3. Online Public Access Catalog: The Google Maps of the Library World

    Science.gov (United States)

    Bailey, Kieren

    2011-01-01

    What do Google Maps and a library's Online Public Access Catalog (OPAC) have in common? Google Maps provides users with all the information they need for a trip in one place; users can get directions and find out what attractions, hotels, and restaurants are close by. Librarians must find the ultimate OPAC that will provide, in one place, all the…

  4. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing

    Science.gov (United States)

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-01-01

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient. PMID:28737733

  5. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.

    Science.gov (United States)

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-07-24

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.

  6. The purpose of peer review in the case of an open-access publication

    Directory of Open Access Journals (Sweden)

    Alexandrov Georgii A

    2006-09-01

    Full Text Available Abstract First scientific journals were simply a way of informing colleagues about new research findings. In due course, they started filtering out unreasonable claims, and introduced a peer-review system. The purpose of peer reviewing changed with time. Since the middle of the past century, commercial publishers have owned a large number of scientific journals and as a result, the marketable value of a submitted manuscript has become an increasingly important factor in publishing decisions. Recently some publishers have developed business schemes which may stop this tendency. In the case of an open-access publication, the marketable value of a manuscript is not the primary consideration, since access to the research is not being sold. This innovation challenges scientists to re-consider the purpose of peer review. This editorial indicates some of the commonly used criteria for publication that consequently should receive less or little emphasis under the open-access model.

  7. Open Access Data Centers as an Essential Partner to a Data Publication Journal

    Science.gov (United States)

    Carlson, D.; Pfeiffenberger, H.

    2016-12-01

    The success of Earth System Science Data derives in part from key infrastructure: digital object identifiers (doi) and open access data centers. Our concept that a data journal should promote access and exchange through publication of reviewed data descriptions presupposed third parties to hold the data. As minimum criteria for those data centers we expected international reputation for quality of service and an active lifetime extending at least a decade into the future. We also expected modern access interfaces offering geographic, topical and parameter-based browsing - so that users could discover related holdings through an ESSD link or discover ESSD by way of links in data sets revealed through the center's browse tools - and true open access. True open access means one or two clicks from abstract in ESSD to the data itself without barriers. We started with Pangaea and CDIAC. Data providers already used these centers, the staff welcomed the ESSD initiative and all parties cooperated on doi. With this initial support ESSD proved the basic concept of data publication and demonstrated utility to a larger group of data providers, many of whom suggested additional centers. So long as those data centers met expectations for open access and quality and durability of service, ESSD agreed to collaborate. Through back-door collaborations - e.g. service on particular data sets - ESSD developed working partnerships with more than 30 data centers in 13 countries. Data centers ask to join our list. We encourage those centers to stimulate local providers to submit a data set to ESSD, thus preserving our practical data-set by data-set partnership mode. For a few data centers where national policies impose a registration step, center staff and ESSD editors created bypass access routes to facilitate anonymous reviews. For ESSD purposes, open access and doi cooperation leading to reliable curation allows a win, win, win partnership among centers, providers, and journal.

  8. Experience of public procurement of Open Compute servers

    Science.gov (United States)

    Bärring, Olof; Guerri, Marco; Bonfillou, Eric; Valsan, Liviu; Grigore, Alexandru; Dore, Vincent; Gentit, Alain; Clement, Benoît; Grossir, Anthony

    2015-12-01

    The Open Compute Project. OCP (http://www.opencompute.org/). was launched by Facebook in 2011 with the objective of building efficient computing infrastructures at the lowest possible cost. The technologies are released as open hardware. with the goal to develop servers and data centres following the model traditionally associated with open source software projects. In 2013 CERN acquired a few OCP servers in order to compare performance and power consumption with standard hardware. The conclusions were that there are sufficient savings to motivate an attempt to procure a large scale installation. One objective is to evaluate if the OCP market is sufficiently mature and broad enough to meet the constraints of a public procurement. This paper summarizes this procurement. which started in September 2014 and involved the Request for information (RFI) to qualify bidders and Request for Tender (RFT).

  9. Intellectual property rights vs. public access rights: ethical aspects of the DeCSS decryptation program

    Directory of Open Access Journals (Sweden)

    Robert Vaagan

    2005-01-01

    Full Text Available Introduction. In 1999-2000, a Norwegian youth cracked a DVD-access code and published a decryptation program on the Internet. He was sued by the US DVD Copy Control Association (DVD-CCA and the Norwegian Motion Picture Association (MAP, allies of the US Motion Picture Association of America (MPAA, arrested by Norwegian police and charged with data crime. Two Norwegian court rulings in 2003 unanimously ruled that the program did not amount to a breach of Norwegian law, and he was fully acquitted. In the US, there have been related cases, some with other outcomes. Method. Based on a theoretical framework developed by Zwass, the paper discusses these court rulings and the wider issues of intellectual property rights versus public access rights. Analysis. The DVD-Jon case illustrates that intellectual property rights can conflict with public access rights, as the struggle between proprietary software and public domain software, as well as the SPARC and Open Archives Initiative reflect. Results. An assessment of the DVD-Jon case based on the Zwass framework does not give a clear information ethics answer. The analysis depends on whether one ascribes to consequentialist (e.g., utilitarian or de-ontological reflection, and also on which side of the digital gap is to be accorded most weight. Conclusion. While copyright interests are being legally strengthened, there may be ethically- grounded access rights that outweigh property rights.

  10. Open access of evidence-based publications: the case of the orthopedic and musculoskeletal literature.

    Science.gov (United States)

    Yammine, Kaissar

    2015-11-01

    The open access model, where researchers can publish their work and make it freely available to the whole medical community, is gaining ground over the traditional type of publication. However, fees are to be paid by either the authors or their institutions. The purpose of this paper is to assess the proportion and type of open access evidence-based articles in the form of systematic reviews and meta-analyses in the field of musculoskeletal disorders and orthopedic surgery. PubMed database was searched and the results showed a maximal number of hits for low back pain and total hip arthroplasty. We demonstrated that despite a 10-fold increase in the number of evidence-based publications in the past 10 years, the rate of free systematic reviews in the general biomedical literature did not change for the last two decades. In addition, the average percentage of free open access systematic reviews and meta-analyses for the commonest painful musculoskeletal conditions and orthopedic procedures was 20% and 18%, respectively. Those results were significantly lower than those of the systematic reviews and meta-analyses in the remaining biomedical research. Such findings could indicate a divergence between the efforts engaged at promoting evidence-based principles and those at disseminating evidence-based findings in the field of musculoskeletal disease and trauma. The high processing fee is thought to be a major limitation when considering open access model for publication.

  11. Public Access Points, Lake Access point locations, Published in 2007, 1:2400 (1in=200ft) scale, Iredell County GIS.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Public Access Points dataset, published at 1:2400 (1in=200ft) scale, was produced all or in part from Orthoimagery information as of 2007. It is described as...

  12. Public Access Points, not all are accessibly via vehicles, Published in 2013, 1:2400 (1in=200ft) scale, Oneida County Wisconsin.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Public Access Points dataset, published at 1:2400 (1in=200ft) scale, was produced all or in part from Other information as of 2013. It is described as 'not all...

  13. 41 CFR 102-79.65 - May Executive agencies outlease space on major public access levels, courtyards and rooftops of...

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false May Executive agencies outlease space on major public access levels, courtyards and rooftops of public buildings? 102-79.65... Utilization of Space Outleasing § 102-79.65 May Executive agencies outlease space on major public...

  14. Teacher Perspectives on the Current State of Computer Technology Integration into the Public School Classroom

    Science.gov (United States)

    Zuniga, Ramiro

    2009-01-01

    Since the introduction of computers into the public school arena over forty years ago, educators have been convinced that the integration of computer technology into the public school classroom will transform education. Joining educators are state and federal governments. Public schools and others involved in the process of computer technology…

  15. Locks and raspberries: a comparative study of single-board computers for access control

    OpenAIRE

    Romin, Andreas

    2016-01-01

    Over the past decade, there has been a drastic development of the single-board computer market. These computers are now in a position where they can compete with classic embedded hardware. Such fast improvement has led ASSA ABLOY, a well-known lock and security company, to see value in replacing some of their existing access control hardware with an off-the-shelf single-board computer. Therefore, a comparative study of single-board computers was performed for this company. Some of the compare...

  16. A typology of intellectual property management for public health innovation and access: design considerations for policymakers.

    Science.gov (United States)

    Taubman, Antony

    2010-01-19

    This paper seeks to set the practical discipline of public interest intellectual property (IP) management in public health into its broader policy context. The most immediate and direct impact of IP systems on public welfare results not from international standards nor from national legislation - though these norms are fundamentally important - but rather from the accumulated impact of numerous practical choices whether or not to seek IP protection; where and where not; and how any exclusive rights are deployed, by whom, and to what end. IP management is the essentially practical exercise of limited exclusive rights over protected subject matter, the judicious use of those rights to leverage outcomes that advance an institution's or a firm's objectives. Exclusive rights are used to construct and define knowledge-based relationships, to leverage access to technology and other necessary resources, and to enhance market-based incentives. IP management choices range across a broad spectrum, spanning public domain strategies, open or exclusive licensing, and strong exclusivity. The idea of 'exclusive rights', as a specific legal mechanism, can run counter to expectations of greater openness and accessibility, but actual outcomes will depend very much on how these mechanisms are used in practice. For public interest or public sector institutions concerned with health research and development, particularly the development of new medicines, IP management choices can be just as critical as they are for private firms, although a predominant institutional concentration on advancing direct public interest objectives may lead to significantly different approaches in weighing and exercising practical choices for IP management: even so, a private sector approach should not be conflated with exclusivity as an end in itself, nor need public interest IP management eschew all leverage over IP. This paper offers a tentative framework for a richer typology of those choices, to give a

  17. From community outreach to reaching students: using public access television as an educational strategy.

    Science.gov (United States)

    DiBartolo, Mary C; Seldomridge, Lisa A

    2010-01-01

    Nursing faculty are not only charged with educating students in creative and engaging ways but also expected to participate in service activities that benefit the surrounding community. One such initiative was the creation of a television health education series hosted by nursing faculty. The authors describe the evolution of a partnership between a university-based public access television channel and the nursing department that provided community education while enriching both the undergraduate and graduate nursing curricula.

  18. Promoting stair climbing in public-access settings: an audit of intervention opportunities in England.

    Science.gov (United States)

    Webb, Oliver J; Smith, Lee

    2011-10-01

    Introducing message prompts at the 'point-of-choice' (POC) between stairs and escalators increases stair choice in 'public-access' settings (e.g. malls). For nationwide campaigns, plentiful POCs appear needed. We audited the availability of POCs in public-access settings across England. Boundaries for 25 urban areas (population=6,829,874) were verified using Ordinance Survey maps, which showed all airports and train/tram stations. Malls and bus stations were identified from commercial listings and local authority web-pages. From September 2010-March 2011 two investigators visually inspected all venues (N=410), counting 'true' POCs and 'quasi' POCs (i.e. instances where stairs were visible from, but not adjacent to, escalators). 5% of venues had ≥1 true POC (quasi POC=3%). Aggregating across areas, there was a true and quasi POC for every 243,924 and 379,437 people, respectively. There were regional variations; one area had 10 true/quasi POCs, whilst 10/24 remaining areas had none. POCs were more common in airports (4/6 venues) than malls (11/85) and train stations (4/215). Although public-access POCs reach sizeable audiences, their availability in England is sporadic, precluding nationwide campaigns. Interventions should be considered locally, based on available POCs. Work/community venues (e.g. offices, hospitals), where pedestrians choose between stairs and elevators, may provide greater intervention opportunities. Copyright © 2011 Elsevier Inc. All rights reserved.

  19. Genomics and Public Health Research: Can the State Allow Access to Genomic Databases?

    Directory of Open Access Journals (Sweden)

    M Stanton Jean

    2012-04-01

    Full Text Available Because many diseases are multifactorial disorders,the scientific progress in genomics and genetics should be taken into consideration in public health research. In this context, genomic databases will constitute an important source of information. Consequently, it is important to identify and characterize the State's role and authority on matters related to public health,in order to verify whether it has access to such databases while engaging in public health genomic research. We first consider the evolution of the concept of public health, as well as its core functions, using a comparative approach (e.g. WHO, PAHO, CDC and the Canadian province of Quebec. Following an analysis of relevant Quebec legislation, the precautionary principle is examined as a possible avenue to justify State access to and use of genomic databases for research purposes. Finally, we consider the Influenza pandemic plans developed by WHO, Canada, and Quebec,as examples of key tools framing public health decision-making process.We observed that State powers in public health, are not,in Quebec,well adapted to the expansion of genomics research.We propose that the scope of the concept of research in public health should be clear and include the following characteristics:a commitment to the health and well-being of the population and to their determinants; the inclusion of both applied research and basic research; and, an appropriate model of governance (authorization, follow-up,consent, etc..We also suggest that the strategic approach version of the precautionary principle could guide collective choices in these matters.

  20. Computer Access and Use: Understanding the Expectations of Indian Rural Students

    Science.gov (United States)

    Kumar, B. T. Sampath; Basavaraja, M. T.

    2016-01-01

    Purpose: This study aims to understand the expectations of rural students with respect to their computer access and use. It also made an attempt to learn the expectations of rural students from their schools and local government in providing the information and communication technology (ICT) infrastructure. Design/methodology/approach: Interview…

  1. Computational Complexities and Breaches in Authentication Frameworks of Broadband Wireless Access

    CERN Document Server

    Hashmi, Raheel Maqsood; Jabeen, Memoona; Alimgeer, Khurram S; Khan, Shahid A

    2009-01-01

    Secure access of communication networks has become an increasingly important area of consideration for the communication service providers of present day. Broadband Wireless Access (BWA) networks are proving to be an efficient and cost effective solution for the provisioning of high rate wireless traffic links in static and mobile domains. The secure access of these networks is necessary to ensure their superior operation and revenue efficacy. Although authentication process is a key to secure access in BWA networks, the breaches present in them limit the networks performance. In this paper, the vulnerabilities in the authentication frameworks of BWA networks have been unveiled. Moreover, this paper also describes the limitations of these protocols and of the solutions proposed to them due to the involved computational complexities and overheads. The possible attacks on privacy and performance of BWA networks have been discussed and explained in detail.

  2. Introduction: priority setting, equitable access and public involvement in health care.

    Science.gov (United States)

    Weale, Albert; Kieslich, Katharina; Littlejohns, Peter; Tugendhaft, Aviva; Tumilty, Emma; Weerasuriya, Krisantha; Whitty, Jennifer A

    2016-08-15

    Purpose - The purpose of this paper is to introduce the special issue on improving equitable access to health care through increased public and patient involvement (PPI) in prioritization decisions by discussing the conceptualization, scope and rationales of PPI in priority setting that inform the special issue. Design/methodology/approach - The paper employs a mixed-methods approach in that it provides a literature review and a conceptual discussion of the common themes emerging in the field of PPI and health priority setting. Findings - The special issue focuses on public participation that is collective in character, in the sense that the participation relates to a social, not personal, decision and is relevant to whole groups of people and not single individuals. It is aimed at influencing a decision on public policy or legal rules. The rationales for public participation can be found in democratic theory, especially as they relate to the social and political values of legitimacy and representation. Originality/value - The paper builds on previous definitions of public participation by underlining its collective character. In doing so, it develops the work by Parry, Moyser and Day by arguing that, in light of the empirical evidence presented in this issue, public participatory activities such as protests and demonstrations should no longer be labelled unconventional, but should instead be labelled as "contestatory participation". This is to better reflect a situation in which these modes of participation have become more conventional in many parts of the world.

  3. Optimum feedback strategy for access control mechanism modelled as stochastic differential equation in computer network

    Directory of Open Access Journals (Sweden)

    Ahmed N. U.

    2004-01-01

    Full Text Available We consider optimum feedback control strategy for computer communication network, in particular, the access control mechanism. The dynamic model representing the source and the access control system is described by a system of stochastic differential equations developed in our previous works. Simulated annealing (SA was used to optimize the parameters of the control law based on neural network. This technique was found to be computationally intensive. In this paper, we have proposed to use a more powerful algorithm known as recursive random search (RRS. By using this technique, we have been able to reduce the computation time by a factor of five without compromising the optimality. This is very important for optimization of high-dimensional systems serving a large number of aggregate users. The results show that the proposed control law can improve the network performance by improving throughput, reducing multiplexor and TB losses, and relaxing, not avoiding, congestion.

  4. Spin-transfer torque magnetoresistive random-access memory technologies for normally off computing (invited)

    Energy Technology Data Exchange (ETDEWEB)

    Ando, K., E-mail: ando-koji@aist.go.jp; Yuasa, S. [National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba 305-8568 (Japan); Fujita, S.; Ito, J.; Yoda, H. [Toshiba Corporation, Kawasaki 212-8582 (Japan); Suzuki, Y. [Graduate School of Engineering Science, Osaka University, Toyonaka 560-8531 (Japan); Nakatani, Y. [Department of Communication Engineering and Informatics, University of Electro-Communication, Chofu 182-8585 (Japan); Miyazaki, T. [WPI-AIMR, Tohoku University, Sendai 980-8577 (Japan)

    2014-05-07

    Most parts of present computer systems are made of volatile devices, and the power to supply them to avoid information loss causes huge energy losses. We can eliminate this meaningless energy loss by utilizing the non-volatile function of advanced spin-transfer torque magnetoresistive random-access memory (STT-MRAM) technology and create a new type of computer, i.e., normally off computers. Critical tasks to achieve normally off computers are implementations of STT-MRAM technologies in the main memory and low-level cache memories. STT-MRAM technology for applications to the main memory has been successfully developed by using perpendicular STT-MRAMs, and faster STT-MRAM technologies for applications to the cache memory are now being developed. The present status of STT-MRAMs and challenges that remain for normally off computers are discussed.

  5. Access to planetary science for the broad public: a more familiar planetary nomenclature and terminology system

    Science.gov (United States)

    Hargitai, H.

    world), since it can bring planetary sciences closer to public, and this way it can be more easity understable and accessible. REFERENCE: [1] Fábián, Pál: Szaknyelvi helyesírási szabályzataink mérlege Magyar Nyelvor , 117/4, 1993. o t-d e c . pp595-599. (Account of our terminologyk regulations)

  6. Accessibility to Specialized Public Oral Health Services from the Perspective of Brazilian Users

    Science.gov (United States)

    de Castro, Ricardo Dias; Rangel, Marianne de Lucena; da Silva, Marcos André Azevedo; de Lucena, Brunna Thaís Lucwu; Cavalcanti, Alessandro Leite; Bonan, Paulo Rogério Ferreti; Oliveira, Julyana de Araújo

    2016-01-01

    The Specialized Dental Clinics (SDCs) represent the first government initiative in Latin America aimed at providing specialized oral health services. This study sought to evaluate the organizational accessibility to specialized oral health care services in Brazil and to understand the factors that may be associated with accessibility from the user’s perspective. This epidemiological, cross-sectional and quantitative study was conducted by means of interviews with individuals who sought specialized public oral health services in the city of João Pessoa, Paraíba, Brazil, and consisted of a sample of 590 individuals. Users expressed a favorable view of the classification and resolutive nature of specialized services offered by Brazilian public health. The binary logistic regression analysis revealed weak points highlighting the difficulty involved in obtaining such treatments leading to unfavorable evaluations. In the resolutive nature item, difficulty in accessing the location, queues and lack of materials and equipment were highlighted as statistically significant unfavorable aspects. While many of the users considered the service to be resolutive, weaknesses were mentioned that need to be detected to promote improvements and to prevent other health models adopted worldwide from reproducing the same flaws. PMID:27775584

  7. Accessibility to Specialized Public Oral Health Services from the Perspective of Brazilian Users.

    Science.gov (United States)

    de Castro, Ricardo Dias; Rangel, Marianne de Lucena; da Silva, Marcos André Azevedo; de Lucena, Brunna Thaís Lucwu; Cavalcanti, Alessandro Leite; Bonan, Paulo Rogério Ferreti; Oliveira, Julyana de Araújo

    2016-10-19

    The Specialized Dental Clinics (SDCs) represent the first government initiative in Latin America aimed at providing specialized oral health services. This study sought to evaluate the organizational accessibility to specialized oral health care services in Brazil and to understand the factors that may be associated with accessibility from the user's perspective. This epidemiological, cross-sectional and quantitative study was conducted by means of interviews with individuals who sought specialized public oral health services in the city of João Pessoa, Paraíba, Brazil, and consisted of a sample of 590 individuals. Users expressed a favorable view of the classification and resolutive nature of specialized services offered by Brazilian public health. The binary logistic regression analysis revealed weak points highlighting the difficulty involved in obtaining such treatments leading to unfavorable evaluations. In the resolutive nature item, difficulty in accessing the location, queues and lack of materials and equipment were highlighted as statistically significant unfavorable aspects. While many of the users considered the service to be resolutive, weaknesses were mentioned that need to be detected to promote improvements and to prevent other health models adopted worldwide from reproducing the same flaws.

  8. The Making of a Sustainable Wireless City? Mapping Public Wi-Fi Access in Shanghai

    Directory of Open Access Journals (Sweden)

    Mingfeng Wang

    2016-01-01

    Full Text Available In the context of the global information economy, ready access to the Internet is critical to a city’s competitiveness, which has prompted a number of cities to launch plans to establish wireless networks. Most literature on the development of wireless cities focuses on cities in Western countries, and few have discussed how Chinese cities have adopted wireless technologies in their urban infrastructure development efforts. This paper examines recent development and spatial distribution of public Wi-Fi access in Shanghai, a leading business hub in China. We mapped Wi-Fi hotspots through the government sponsored “i-Shanghai” project and China Mobile Communications Corporation (CMCC. We find that while telecommunication providers have been proactively deploying WLAN (wireless local area network,a proxy of public Wi-Fi or wireless access hotspots in Shanghai, neither government sponsored WLAN hotspots nor facilities established by CMCC could cover the old traditional neighborhoods in the central city and sub-districts in remote rural areas. We also address the development of a more sustainable wireless city in Shanghai with a particular focus on digital divide and social equity issues.

  9. Resolving the problem of multiple accessions of the same transcript deposited across various public databases.

    Science.gov (United States)

    Weirick, Tyler; John, David; Uchida, Shizuka

    2017-03-01

    Maintaining the consistency of genomic annotations is an increasingly complex task because of the iterative and dynamic nature of assembly and annotation, growing numbers of biological databases and insufficient integration of annotations across databases. As information exchange among databases is poor, a 'novel' sequence from one reference annotation could be annotated in another. Furthermore, relationships to nearby or overlapping annotated transcripts are even more complicated when using different genome assemblies. To better understand these problems, we surveyed current and previous versions of genomic assemblies and annotations across a number of public databases containing long noncoding RNA. We identified numerous discrepancies of transcripts regarding their genomic locations, transcript lengths and identifiers. Further investigation showed that the positional differences between reference annotations of essentially the same transcript could lead to differences in its measured expression at the RNA level. To aid in resolving these problems, we present the algorithm 'Universal Genomic Accession Hash (UGAHash)' and created an open source web tool to encourage the usage of the UGAHash algorithm. The UGAHash web tool (http://ugahash.uni-frankfurt.de) can be accessed freely without registration. The web tool allows researchers to generate Universal Genomic Accessions for genomic features or to explore annotations deposited in the public databases of the past and present versions. We anticipate that the UGAHash web tool will be a valuable tool to check for the existence of transcripts before judging the newly discovered transcripts as novel. © The Author 2016. Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  10. Improving access to computer-based library and drug information services in patient-care areas.

    Science.gov (United States)

    Tobia, R C; Bierschenk, N F; Knodel, L C; Bowden, V M

    1990-01-01

    A project to increase access to drug and biomedical information through electronic linkage of drug information and library services to three patient-care areas is described. In February 1987, microcomputer work stations were installed in the Bexar County Hospital District's hospital emergency department, medical residents' office, and ambulatory-care clinic, as well as in The University of Texas Health Science Center's library reference area and drug information service office. Drug information was available on compact disk through the Micromedex Computerized Clinical Information System (CCIS) database, which includes DRUGDEX, POISINDEX, EMERGINDEX, and IDENTIDEX. Each work station was also connected to the library's computer via modem, allowing access to the Library Information System, books, journals, audiovisual materials, miniMEDLINE, and an electronic mail system. During the six-month project, the system was used 5487 times by 702 people. The system was successful in providing drug and other information in clinical settings and in introducing clinical staff members to new information technology. To increase access to the system after the project ended, the CD-ROM version was discontinued, and the distributed tape version of CCIS for VAX computers was added to the library's online information system, making drug information more available throughout the campus and teaching hospitals. In 1988-89 an average of 200 people accessed the tape version of CCIS each month. Although it is difficult to replace the convenience of an onsite library, at least some drug and biomedical information needs in the clinical setting can be met through computer networking.

  11. 32 CFR 310.52 - Computer matching publication and review requirements.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Computer matching publication and review... OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Computer Matching Program Procedures § 310.52 Computer matching publication and review requirements. (a) DoD Components shall identify...

  12. Public Access Points, Our current file was compiled from our parcel mapping & locating on records & maps, areas of public access. Areas have been reviewed by the DNR, Published in 2011, Not Applicable scale, Chippewa County.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Public Access Points dataset, published at Not Applicable scale, was produced all or in part from Field Survey/GPS information as of 2011. It is described as...

  13. Experimental realization of an entanglement access network and secure multi-party computation

    Science.gov (United States)

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-07-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  14. Experimental realization of secure multi-party computation in an entanglement access to network

    CERN Document Server

    Chang, X Y; Yuan, X X; Hou, P Y; Huang, Y Y; Duan, L M

    2015-01-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  15. Experimental realization of an entanglement access network and secure multi-party computation

    Science.gov (United States)

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-01-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography. PMID:27404561

  16. Access for All! Neuro-architecture and Equal Enjoyment of Public Facilities

    Directory of Open Access Journals (Sweden)

    Victoria Gillen

    2015-09-01

    Full Text Available Since the enactment of the Americans with Disabilities Act (ADA, 1990, many impaired Americans are no longer disabled by socially condoned conditions in the built environment. However, many people with cognitive and neurological impairments continue to face significant barriers to access, due to disabling environmental hyper-sensitivity and sensory processing disorders. These people are equally protected under the ADA, therefore mitigation is required. Neuroarchitecture, where consideration of the impact of the built environment on the central nervous system informs design paradigms, must complement current ADA compliance guidelines. This paper serves to open the topic to discussion, and is a call for attention, and action, for the removal of these generally unrecognized barriers to access and the equal use and enjoyment of public facilities.

  17. Ethics, big data and computing in epidemiology and public health.

    Science.gov (United States)

    Salerno, Jennifer; Knoppers, Bartha M; Lee, Lisa M; Hlaing, WayWay M; Goodman, Kenneth W

    2017-05-01

    This article reflects on the activities of the Ethics Committee of the American College of Epidemiology (ACE). Members of the Ethics Committee identified an opportunity to elaborate on knowledge gained since the inception of the original Ethics Guidelines published by the ACE Ethics and Standards of Practice Committee in 2000. The ACE Ethics Committee presented a symposium session at the 2016 Epidemiology Congress of the Americas in Miami on the evolving complexities of ethics and epidemiology as it pertains to "big data." This article presents a summary and further discussion of that symposium session. Three topic areas were presented: the policy implications of big data and computing, the fallacy of "secondary" data sources, and the duty of citizens to contribute to big data. A balanced perspective is needed that provides safeguards for individuals but also furthers research to improve population health. Our in-depth review offers next steps for teaching of ethics and epidemiology, as well as for epidemiological research, public health practice, and health policy. To address contemporary topics in the area of ethics and epidemiology, the Ethics Committee hosted a symposium session on the timely topic of big data. Technological advancements in clinical medicine and genetic epidemiology research coupled with rapid advancements in data networks, storage, and computation at a lower cost are resulting in the growth of huge data repositories. Big data increases concerns about data integrity; informed consent; protection of individual privacy, confidentiality, and harm; data reidentification; and the reporting of faulty inferences. Copyright © 2017 Elsevier Inc. All rights reserved.

  18. Extension of research data repository system to support direct compute access to biomedical datasets: enhancing Dataverse to support large datasets.

    Science.gov (United States)

    McKinney, Bill; Meyer, Peter A; Crosas, Mercè; Sliz, Piotr

    2017-01-01

    Access to experimental X-ray diffraction image data is important for validation and reproduction of macromolecular models and indispensable for the development of structural biology processing methods. In response to the evolving needs of the structural biology community, we recently established a diffraction data publication system, the Structural Biology Data Grid (SBDG, data.sbgrid.org), to preserve primary experimental datasets supporting scientific publications. All datasets published through the SBDG are freely available to the research community under a public domain dedication license, with metadata compliant with the DataCite Schema (schema.datacite.org). A proof-of-concept study demonstrated community interest and utility. Publication of large datasets is a challenge shared by several fields, and the SBDG has begun collaborating with the Institute for Quantitative Social Science at Harvard University to extend the Dataverse (dataverse.org) open-source data repository system to structural biology datasets. Several extensions are necessary to support the size and metadata requirements for structural biology datasets. In this paper, we describe one such extension-functionality supporting preservation of file system structure within Dataverse-which is essential for both in-place computation and supporting non-HTTP data transfers.

  19. Intelligent Urban Public Transportation for Accessibility Dedicated to People with Disabilities

    Directory of Open Access Journals (Sweden)

    Jian Li

    2012-08-01

    Full Text Available The traditional urban public transport system generally cannot provide an effective access service for people with disabilities, especially for disabled, wheelchair and blind (DWB passengers. In this paper, based on advanced information & communication technologies (ICT and green technologies (GT concepts, a dedicated public urban transportation service access system named Mobi+ has been introduced, which facilitates the mobility of DWB passengers. The Mobi+ project consists of three subsystems: a wireless communication subsystem, which provides the data exchange and network connection services between buses and stations in the complex urban environments; the bus subsystem, which provides the DWB class detection & bus arrival notification services; and the station subsystem, which implements the urban environmental surveillance & bus auxiliary access services. The Mobi+ card that supports multi-microcontroller multi-transceiver adopts the fault-tolerant component-based hardware architecture, in which the dedicated embedded system software, i.e., operating system micro-kernel and wireless protocol, has been integrated. The dedicated Mobi+ embedded system provides the fault-tolerant resource awareness communication and scheduling mechanism to ensure the reliability in data exchange and service provision. At present, the Mobi+ system has been implemented on the buses and stations of line ‘2’ in the city of Clermont-Ferrand (France. The experiential results show that, on one hand the Mobi+ prototype system reaches the design expectations and provides an effective urban bus access service for people with disabilities; on the other hand the Mobi+ system is easily to deploy in the buses and at bus stations thanks to its low energy consumption and small form factor.

  20. In an Age of Open Access to Research Policies: Physician and Public Health NGO Staff Research Use and Policy Awareness.

    Directory of Open Access Journals (Sweden)

    Laura L Moorhead

    Full Text Available Through funding agency and publisher policies, an increasing proportion of the health sciences literature is being made open access. Such an increase in access raises questions about the awareness and potential utilization of this literature by those working in health fields.A sample of physicians (N=336 and public health non-governmental organization (NGO staff (N=92 were provided with relatively complete access to the research literature indexed in PubMed, as well as access to the point-of-care service UpToDate, for up to one year, with their usage monitored through the tracking of web-log data. The physicians also participated in a one-month trial of relatively complete or limited access.The study found that participants' research interests were not satisfied by article abstracts alone nor, in the case of the physicians, by a clinical summary service such as UpToDate. On average, a third of the physicians viewed research a little more frequently than once a week, while two-thirds of the public health NGO staff viewed more than three articles a week. Those articles were published since the 2008 adoption of the NIH Public Access Policy, as well as prior to 2008 and during the maximum 12-month embargo period. A portion of the articles in each period was already open access, but complete access encouraged a viewing of more research articles.Those working in health fields will utilize more research in the course of their work as a result of (a increasing open access to research, (b improving awareness of and preparation for this access, and (c adjusting public and open access policies to maximize the extent of potential access, through reduction in embargo periods and access to pre-policy literature.

  1. In an Age of Open Access to Research Policies: Physician and Public Health NGO Staff Research Use and Policy Awareness.

    Science.gov (United States)

    Moorhead, Laura L; Holzmeyer, Cheryl; Maggio, Lauren A; Steinberg, Ryan M; Willinsky, John

    2015-01-01

    Through funding agency and publisher policies, an increasing proportion of the health sciences literature is being made open access. Such an increase in access raises questions about the awareness and potential utilization of this literature by those working in health fields. A sample of physicians (N=336) and public health non-governmental organization (NGO) staff (N=92) were provided with relatively complete access to the research literature indexed in PubMed, as well as access to the point-of-care service UpToDate, for up to one year, with their usage monitored through the tracking of web-log data. The physicians also participated in a one-month trial of relatively complete or limited access. The study found that participants' research interests were not satisfied by article abstracts alone nor, in the case of the physicians, by a clinical summary service such as UpToDate. On average, a third of the physicians viewed research a little more frequently than once a week, while two-thirds of the public health NGO staff viewed more than three articles a week. Those articles were published since the 2008 adoption of the NIH Public Access Policy, as well as prior to 2008 and during the maximum 12-month embargo period. A portion of the articles in each period was already open access, but complete access encouraged a viewing of more research articles. Those working in health fields will utilize more research in the course of their work as a result of (a) increasing open access to research, (b) improving awareness of and preparation for this access, and (c) adjusting public and open access policies to maximize the extent of potential access, through reduction in embargo periods and access to pre-policy literature.

  2. Datasets will not be made accessible to the public due to the fact that they include household level data with PII.

    Data.gov (United States)

    U.S. Environmental Protection Agency — Datasets will not be made accessible to the public due to the fact that they include household level data with PII. This dataset is not publicly accessible because:...

  3. Chaining direct memory access data transfer operations for compute nodes in a parallel computer

    Science.gov (United States)

    Archer, Charles J.; Blocksome, Michael A.

    2010-09-28

    Methods, systems, and products are disclosed for chaining DMA data transfer operations for compute nodes in a parallel computer that include: receiving, by an origin DMA engine on an origin node in an origin injection FIFO buffer for the origin DMA engine, a RGET data descriptor specifying a DMA transfer operation data descriptor on the origin node and a second RGET data descriptor on the origin node, the second RGET data descriptor specifying a target RGET data descriptor on the target node, the target RGET data descriptor specifying an additional DMA transfer operation data descriptor on the origin node; creating, by the origin DMA engine, an RGET packet in dependence upon the RGET data descriptor, the RGET packet containing the DMA transfer operation data descriptor and the second RGET data descriptor; and transferring, by the origin DMA engine to a target DMA engine on the target node, the RGET packet.

  4. Public Access Points, Landings, Published in 2008, 1:2400 (1in=200ft) scale, Effingham County Board Of Commissioners.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Public Access Points dataset, published at 1:2400 (1in=200ft) scale, was produced all or in part from Orthoimagery information as of 2008. It is described as...

  5. Barriers to electronic access and delivery of educational information in resource constrained public schools: a case of Greater Tubatse Municipality

    CSIR Research Space (South Africa)

    Pholotho, T

    2016-05-01

    Full Text Available Information and Communication Technologies (ICTs) are capable of expanding access to quality education, educational resources and provide teachers with new skills. Nevertheless, a majority of rural public schools have limited ICTs, mainly due...

  6. The digital divide in public e-health: barriers to accessibility and privacy in state health department websites.

    Science.gov (United States)

    West, Darrell M; Miller, Edward Alan

    2006-08-01

    State health departments have placed a tremendous amount of information, data, and services online in recent years. With the significant increase in online resources at official health sites, though, have come questions concerning equity of access and the confidentiality of electronic medical materials. This paper reports on an examination of public health department websites maintained by the 50 state governments. Using a content analysis of health department sites undertaken each year from 2000 to 2005, we investigate several dimensions of accessibility and privacy: readability levels, disability access, non-English accessibility, and the presence of privacy and security statements. We argue that although progress has been made at improving the accessibility and confidentiality of health department electronic resources, there remains much work to be done to ensure quality access for all Americans in the area of public e-health.

  7. A new public policy to ensure access to scientific information resources: the case of Chile

    Directory of Open Access Journals (Sweden)

    María Soledad Bravo-Marchant

    2012-11-01

    Full Text Available The design and implementation of public policies to grant access to scientific information is now a marked trend among numerous countries of Latin America. The creation of specific instruments, the allocation of an ongoing budget and the accumulation of experience in negotiation and contracting of national licences have all been clear signs of the achievements resulting from recent initiatives in these countries. This article reviews the experience of the Consorcio para el Acceso a la Información Cientifíca Electrónica (CINCEL Corporation, a Chilean consortium created in 2002, the public policy that made it possible and the evaluation experience of its main programme, the Electronic Library of Scientific Information (BEIC.

  8. Developing a personal computer-based data visualization system using public domain software

    Science.gov (United States)

    Chen, Philip C.

    1999-03-01

    The current research will investigate the possibility of developing a computing-visualization system using a public domain software system built on a personal computer. Visualization Toolkit (VTK) is available on UNIX and PC platforms. VTK uses C++ to build an executable. It has abundant programming classes/objects that are contained in the system library. Users can also develop their own classes/objects in addition to those existing in the class library. Users can develop applications with any of the C++, Tcl/Tk, and JAVA environments. The present research will show how a data visualization system can be developed with VTK running on a personal computer. The topics will include: execution efficiency; visual object quality; availability of the user interface design; and exploring the feasibility of the VTK-based World Wide Web data visualization system. The present research will feature a case study showing how to use VTK to visualize meteorological data with techniques including, iso-surface, volume rendering, vector display, and composite analysis. The study also shows how the VTK outline, axes, and two-dimensional annotation text and title are enhancing the data presentation. The present research will also demonstrate how VTK works in an internet environment while accessing an executable with a JAVA application programing in a webpage.

  9. Making tenofovir accessible in the brazilian public health system: patent conflicts and generic production.

    Science.gov (United States)

    Veras, Juliana

    2014-08-01

    In May 2011, the Brazilian Ministry of Health announced the distribution of the first batch of locally produced generic tenofovir disoproxil fumarate (TDF) to support its program of universal and free access for the treatment of HIV/AIDS. The inclusion of TDF in the public health program illustrates what has been considered the 'Brazilian model' of HIV/AIDS response, as it illustrates the current phase of the Brazilian pharmaceutical economy. Brazil is known for having managed to control the expansion of HIV/AIDS through a unique initiative combining the public health and the industrial production of generics. But, if at first local manufacturers could freely copy ARVs and produce cheaper generic versions that were delivered to the Ministry of Health, since the country started to grant patents on drugs in 1996, the sustainability of this policy has been challenged by the high cost of patented second-line HIV/AIDS treatments. In order to assure continuity of the local production of ARVs, and keep the program of public health alive, Brazilians are now forced to deal with conflicts of drugs' intellectual property rights in order to open the path to generic production. This article aims to describe the experiences surrounding TDF in Brazil and the unprecedented conflicts and challenges it has brought for our different interviewees. Blurring the frontier between the public and the private, the TDF case was driven at the same time by an ethic of drug access and regulation of drug quality, which has inspired Brazilians to intervene and transform the world they live in.

  10. Geographically weighted regression for modelling the accessibility to the public hospital network in Concepción Metropolitan Area, Chile

    OpenAIRE

    Marcela Martínez Bascuñán; Carolina Rojas Quezada

    2016-01-01

    Accessibility models in transport geography based on geographic information systems have proven to be an effective method in determining spatial inequalities associated with public health. This work aims to model the spatial accessibility from populated areas within the Concepción metropolitan area (CMA), the second largest city in Chile. The city’s public hospital network is taken into consideration with special reference to socio-regional inequalities. The use of geographically weighted reg...

  11. Public access to the Internet and social change: an experience in El Carmen de Bolivar, between silence and hope

    Directory of Open Access Journals (Sweden)

    Luis Fernando Barón Porras

    2010-07-01

    Full Text Available This paper presents a case study of public access venues to Information and Communication Technologies (ICT in the small municipality of Carmen de Bolívar, a town in Northern Colombia. The case study assesses the contribution of public access to ICT to community development, in a region that has not only a long strong tradition of community organization for social development, but also a long history of violence that has weakened its social fabric

  12. The Research Foci of Computing Research in South Africa as Reflected by Publications in the South African Computer Journal

    Directory of Open Access Journals (Sweden)

    Paula Kotze

    2010-07-01

    Full Text Available The South African Computer Journal, better known as SACJ, has, for the last nineteen years, been one of the most pertinent publications for the computing discipline within the South African milieu. In this paper we reflect on the topics of research articles published in SACJ over its first 40 volumes of the journal using the ACM Computing Classification Scheme as basis. In our analysis we divided the publications into three cycles of more or less six years in order to identify significant trends over the history of the journal. We also used the same classification scheme to analyse the publication trends of various South African tertiary education and research institutions.

  13. Internet Access in U.S. Public Schools and Classrooms: 1994-2005. Highlights. NCES 2007-020

    Science.gov (United States)

    Wells, John; Lewis, Laurie

    2006-01-01

    The National Center for Education Statistics (NCES) has employed its Fast Response Survey System (FRSS) to track access to information technology in schools and classrooms since 1994. This report presents key findings from the 2005 FRSS survey on Internet access in U.S. public schools and selected comparisons with data from previous FRSS…

  14. From access to re-use: a user’s perspective on public sector information availability

    Directory of Open Access Journals (Sweden)

    Frederika Welle Donker

    2016-11-01

    restricting (re-use through licences and licence fees, geo-information can be commercially exploited and used to recover some of the investment costs.Geo-information is considered special for a number of legal reasons. First, as geo-information has a geographic component, e.g. a reference to a location, geoinformation may contain personal data, sensitive company data, environmentally sensitive data, or data that may pose a threat to the national security. Therefore, the dataset may have to be adapted, aggregated or anonymised before it can be made public. Secondly, geo-information may be subject to intellectual property rights. There may be a copyright on cartographic images or database rights on digital information. Such intellectual property rights may be claimed by third parties involved in the information chain, e.g. a private company supplying aerial photography to the National Mapping Authority. The data holder may also claim intellectual property rights to commercially exploit the dataset and recoup some of the vast investment costs made to produce the dataset. Lastly, there may be other (international legislation or agreements that may either impede or promote publishing public sector information, whereby in some cases, these policies may contradict each other.It has been recognised that to deal with national, regional and global challenges, it is essential that geo-information collected by one level of government or government organisation be shared between all levels of government via a so-called Spatial Data Infrastructure (SDI. The main principles governing SDIs are that data are collected once and (re-used many times; that data should be easy to discover, access and use; and that data are harmonised so that it is possible to combine spatial data from different sources seamlessly. In line with the SDI governing principles, this dissertation considers accessibility of information to include all these aspects. Accessibility concerns not only access to data, i.e. to

  15. Towards an anonymous access control and accountability scheme for cloud computing

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schäge, Sven; Schwenk, Jörg

    2010-01-01

    An important aspect of trust in cloud computing consists in preventing the cloud provider from misusing the user's data. In this work-in-progress paper, we propose the approach of data anonymization to solve this problem. As this directly leads to problems of cloud usage accounting, we also propose...... a solution for anonymous yet reliable access control and account-ability based on ring and group signatures....

  16. Public Access to Documents after the entry into force of the Amsterdam Treaty: Much Ado About Nothing?

    Directory of Open Access Journals (Sweden)

    Ulf Öberg

    1998-10-01

    Full Text Available There is a trend towards recognising a general principle of public access to documents held by public authorities, both in national and in Community law. Once such a fundamental principle of Community law is established, the exceptions to public access to documents laid down in the internal rules of the institutions must not be construed or interpreted in a manner which will render it impossible to attain the objective of openness. To this effect, and in the light of the increasing but still marginal judicial review of the institutions refusals of access to documents, the European Ombudsman's inquires into public access to documents and his decisions on individual complaints of maladministration have provided an efficient and cost-effective recourse for European citizens. However, the entry into force of the Amsterdam Treaty and the subsequent adoption of secondary legislation is unlikely to resolve all the inadequacies of the current public access regime in Community law. This calls for a uniform interpretation of the law on public access to documents in the Community legal order.

  17. High-performance parallel computing in the classroom using the public goods game as an example

    Science.gov (United States)

    Perc, Matjaž

    2017-07-01

    The use of computers in statistical physics is common because the sheer number of equations that describe the behaviour of an entire system particle by particle often makes it impossible to solve them exactly. Monte Carlo methods form a particularly important class of numerical methods for solving problems in statistical physics. Although these methods are simple in principle, their proper use requires a good command of statistical mechanics, as well as considerable computational resources. The aim of this paper is to demonstrate how the usage of widely accessible graphics cards on personal computers can elevate the computing power in Monte Carlo simulations by orders of magnitude, thus allowing live classroom demonstration of phenomena that would otherwise be out of reach. As an example, we use the public goods game on a square lattice where two strategies compete for common resources in a social dilemma situation. We show that the second-order phase transition to an absorbing phase in the system belongs to the directed percolation universality class, and we compare the time needed to arrive at this result by means of the main processor and by means of a suitable graphics card. Parallel computing on graphics processing units has been developed actively during the last decade, to the point where today the learning curve for entry is anything but steep for those familiar with programming. The subject is thus ripe for inclusion in graduate and advanced undergraduate curricula, and we hope that this paper will facilitate this process in the realm of physics education. To that end, we provide a documented source code for an easy reproduction of presented results and for further development of Monte Carlo simulations of similar systems.

  18. Do PEV Drivers Park Near Publicly Accessible EVSE in San Diego but Not Use Them?

    Energy Technology Data Exchange (ETDEWEB)

    Francfort, James Edward [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-06-01

    The PEV charging stations deployed as part of The EV Project included both residential and non-residential sites. Non-residential sites included EVSE installed in workplace environments, fleet applications and those that were publicly accessible near retail centers, parking lots, and similar locations. The EV Project utilized its Micro-Climate® planning process to determine potential sites for publicly accessible EVSE in San Diego. This process worked with local stakeholders to target EVSE deployment near areas where significant PEV traffic and parking was expected. This planning process is described in The Micro-Climate deployment Process in San Diego1. The EV Project issued its deployment plan for San Diego in November 2010, prior to the sale of PEVs by Nissan and Chevrolet. The Project deployed residential EVSE concurrent with vehicle delivery starting in December 2010. The installation of non-residential EVSE commenced in April 2011 consistent with the original Project schedule, closely following the adoption of PEVs. The residential participation portion of The EV Project was fully subscribed by January 2013 and the non-residential EVSE deployment was essentially completed by August 2013.

  19. Open access to scientific publications - an analysis of the barriers to change

    Directory of Open Access Journals (Sweden)

    Professor Bo-Christer Björk

    2004-01-01

    Full Text Available One of the effects of the Internet is that the dissemination of scientific publications in a few years has migrated to electronic formats. The basic business practices between libraries and publishers for selling and buying the content have, however, not changed much. Scientists have in protest against the high subscription prices of mainstream publishers started Open Access (OA journals and e-print repositories, which distribute scientific information freely. Despite widespread agreement among academics that OA would be the optimal distribution mode for publicly financed research results, OA channels still constitute only a marginal phenomenon in the global scholarly communication system. This paper discusses, in view of the experiences of the last ten years, the many barriers hindering a rapid proliferation of Open Access. The discussion is structured according to the main OA channels; peer-reviewed journals for primary publishing, subject-specific and institutional repositories for secondary parallel publishing. It also discusses the types of barriers, which can be classified as: legal framework, IT-infrastructure, business models, indexing services and standards, academic reward system, marketing and critical mass.

  20. Technologic advances and program initiatives in public access defibrillation using automated external defibrillators.

    Science.gov (United States)

    White, R D

    2001-06-01

    Widespread provision of early defibrillation following cardiac arrest holds major promise for improved survival from ventricular fibrillation. The critical element in predicting a successful outcome is the rapidity with which defibrillation is achieved. A worldwide awareness of this potential and its advocacy by such organizations as the American Heart Association have been pivotal in the evolution of initiatives to make defibrillation more widely and more rapidly available. The feasibility of this initiative, known as public access defibrillation, is in large measure a direct consequence of major technologic advances in automated external defibrillators (AEDs). New low-energy waveforms with biphasic morphology have been shown to be more effective in terminating ventricular fibrillation and may do so with less myocardial injury. Placement of AEDs in a variety of nontraditional settings such as police cars, aircraft and airport terminals, and gambling casinos has been shown to yield an impressive number of survivors of cardiac arrest in ventricular fibrillation. Questions yet to be answered center on the appropriate disposition of AEDs in public access defibrillation settings, training and retraining issues, device maintenance, and collection of accurate data to document benefit and to identify areas of needed improvement or expansion of AED availability.

  1. Open access of publications by veterinary faculty in the United States and Canada.

    Science.gov (United States)

    Nault, André J

    2011-01-01

    The free availability of full-text veterinary publications in MEDLINE-indexed journals by US and Canadian veterinary faculty from 2006-7 was determined. Additionally, publishing databases were searched to obtain general statistics on veterinary publishing. A survey of institutional initiatives to promote open-access journals and institutional repositories was also performed. Veterinary faculty published a total of 4,872 articles indexed by MEDLINE in 679 different journals. Of these articles, 1,334 (27%) were available as free full text and were published in 245 different journals. Although 51 veterinary-specific journals offering immediate and free full-text access were identified, few articles in this study appeared in these titles. Rather, most free scholarly articles by veterinary faculty appeared in journals with an embargo period. Academic veterinary institutions may want to recommend acceptance of alternate forms of information dissemination (such as open-access journals and journals published only digitally) to encourage greater global dissemination of their research findings. The promotion and use of digital institutional repositories is also an area for future investment and warrants additional research.

  2. Public Sector Education Institution's Analysis: A Way Forward to Curtail Rural-Regional Education Accessibility Problems

    Directory of Open Access Journals (Sweden)

    Mir Aftab Hussain Talpur

    2014-10-01

    Full Text Available The availability of accessible educational facilities is essential for the better rural education. However, because of the huge population, lack of resources and absence of proper policy plans; the distance between educational facilities and rural communities is mounting as time progresses. These sorts of problematic circumstances put damaging effects on education standards and become responsible for the declining literacy rate. Hence, the goal of this research is to investigate the lack of educational institutions with respect to indigenous standards. Therefore, in this study, the dearth of education institutions was determined for the one of the most deprived sub-regions of Pakistan, i.e. Badin. The data were collected through observations, questionnaire survey, and from secondary sources, like census report and other pertinent public sector documents. The outcome of this study can be taken as an input to develop policy plans, targeting the education accessibility issues of backward communities. This research could show a guiding-path to local planning agencies, as these can come-up with the policy plans to trounce the education accessibility issues from the bucolic sub-regions of developing countries

  3. Accessibility of a cadeirante in a public institution of higher education: routes and routines

    Directory of Open Access Journals (Sweden)

    Rita de Cássia Silveira Cambruzzi

    2013-06-01

    Full Text Available The physical disability is group is heterogeneous, even within a “category”, since that covers a diversity, because each has a mechanism to organize in spaces in which attends but all participate of the same challenges. However, due to the challenges encountered by persons with disabilities in establishing routes and routines within a University is that we have developed this research. We chose search access of physically disabled person in your external displacement of student housing to the classroom and the classroom until the Secretariat Department that frequents. Research whose goal is the identification and analysis of routes as its accessibility, on the campus of a public institution of higher education. The survey was submitted to the Ethics Committee that approves their implementation. Direct observations were performed, as well as records via photos and footage, which were authorized by the University. The information collected were analyzed qualitatively as the standards of the Brazilian Association of technical norms and the guiding document for the Regional Council of engineering and architecture, Rio Grande do Sul, titled: Roadmap survey. In data analysis, we see that there are needs for providing accessibility with safety and convenience, as well as establish mechanisms for the community library and the University restaurant part of living as part of the University community and also, in the exercise of their constitutional rights.

  4. Validation of computational fluid dynamics-based analysis to evaluate hemodynamic significance of access stenosis.

    Science.gov (United States)

    Hoganson, David M; Hinkel, Cameron J; Chen, Xiaomin; Agarwal, Ramesh K; Shenoy, Surendra

    2014-01-01

    Stenosis in a vascular access circuit is the predominant cause of access dysfunction. Hemodynamic significance of a stenosis identified by angiography in an access circuit is uncertain. This study utilizes computational fluid dynamics (CFD) to model flow through arteriovenous fistula to predict the functional significance of stenosis in vascular access circuits. Three-dimensional models of fistulas were created with a range of clinically relevant stenoses using SolidWorks. Stenoses diameters ranged from 1.0 to 3.0 mm and lengths from 5 to 60 mm within a fistula diameter of 7 mm. CFD analyses were performed using a blood model over a range of blood pressures. Eight patient-specific stenoses were also modeled and analyzed with CFD and the resulting blood flow calculations were validated by comparison with brachial artery flow measured by duplex ultrasound. Predicted flow rates were derived from CFD analysis of a range of stenoses. These stenoses were modeled by CFD and correlated with the ultrasound measured flow rate through the fistula of eight patients. The calculated flow rate using CFD correlated within 20% of ultrasound measured flow for five of eight patients. The mean difference was 17.2% (ranged from 1.3% to 30.1%). CFD analysis-generated flow rate tables provide valuable information to assess the functional significance of stenosis detected during imaging studies. The CFD study can help in determining the clinical relevance of a stenosis in access dysfunction and guide the need for intervention.

  5. Self-pacing direct memory access data transfer operations for compute nodes in a parallel computer

    Energy Technology Data Exchange (ETDEWEB)

    Blocksome, Michael A

    2015-02-17

    Methods, apparatus, and products are disclosed for self-pacing DMA data transfer operations for nodes in a parallel computer that include: transferring, by an origin DMA on an origin node, a RTS message to a target node, the RTS message specifying an message on the origin node for transfer to the target node; receiving, in an origin injection FIFO for the origin DMA from a target DMA on the target node in response to transferring the RTS message, a target RGET descriptor followed by a DMA transfer operation descriptor, the DMA descriptor for transmitting a message portion to the target node, the target RGET descriptor specifying an origin RGET descriptor on the origin node that specifies an additional DMA descriptor for transmitting an additional message portion to the target node; processing, by the origin DMA, the target RGET descriptor; and processing, by the origin DMA, the DMA transfer operation descriptor.

  6. Computer Access in Higher Education for Students with Disabilities: A Practical Guide to the Selection and Use of Adapted Computer Technology. Second Edition.

    Science.gov (United States)

    Brown, Carl; And Others

    The manual provides a review of trends in adapted computer technology as well as guidelines to the selection and use of computer technology in college programs serving disabled students. Changes in the second edition include a new section dealing with the computer access needs of the severely disabled, an enlarged product guide, a curriculum guide…

  7. Workarounds to computer access in healthcare organizations: you want my password or a dead patient?

    Science.gov (United States)

    Koppel, Ross; Smith, Sean; Blythe, Jim; Kothari, Vijay

    2015-01-01

    Workarounds to computer access in healthcare are sufficiently common that they often go unnoticed. Clinicians focus on patient care, not cybersecurity. We argue and demonstrate that understanding workarounds to healthcare workers' computer access requires not only analyses of computer rules, but also interviews and observations with clinicians. In addition, we illustrate the value of shadowing clinicians and conducing focus groups to understand their motivations and tradeoffs for circumvention. Ethnographic investigation of the medical workplace emerges as a critical method of research because in the inevitable conflict between even well-intended people versus the machines, it's the people who are the more creative, flexible, and motivated. We conducted interviews and observations with hundreds of medical workers and with 19 cybersecurity experts, CIOs, CMIOs, CTO, and IT workers to obtain their perceptions of computer security. We also shadowed clinicians as they worked. We present dozens of ways workers ingeniously circumvent security rules. The clinicians we studied were not "black hat" hackers, but just professionals seeking to accomplish their work despite the security technologies and regulations.

  8. A National Study of the Relationship between Home Access to a Computer and Academic Performance Scores of Grade 12 U.S. Science Students: An Analysis of the 2009 NAEP Data

    Science.gov (United States)

    Coffman, Mitchell Ward

    The purpose of this dissertation was to examine the relationship between student access to a computer at home and academic achievement. The 2009 National Assessment of Educational Progress (NAEP) dataset was probed using the National Data Explorer (NDE) to investigate correlations in the subsets of SES, Parental Education, Race, and Gender as it relates to access of a home computer and improved performance scores for U.S. public school grade 12 science students. A causal-comparative approach was employed seeking clarity on the relationship between home access and performance scores. The influence of home access cannot overcome the challenges students of lower SES face. The achievement gap, or a second digital divide, for underprivileged classes of students, including minorities does not appear to contract via student access to a home computer. Nonetheless, in tests for significance, statistically significant improvement in science performance scores was reported for those having access to a computer at home compared to those not having access. Additionally, regression models reported evidence of correlations between and among subsets of controls for the demographic factors gender, race, and socioeconomic status. Variability in these correlations was high; suggesting influence from unobserved factors may have more impact upon the dependent variable. Having access to a computer at home increases performance scores for grade 12 general science students of all races, genders and socioeconomic levels. However, the performance gap is roughly equivalent to the existing performance gap of the national average for science scores, suggesting little influence from access to a computer on academic achievement. The variability of scores reported in the regression analysis models reflects a moderate to low effect, suggesting an absence of causation. These statistical results are accurate and confirm the literature review, whereby having access to a computer at home and the

  9. The Role of Parliamentary Libraries in Eastern Europe in Ensuring Public Access to Government Information: The Case of Russia.

    Science.gov (United States)

    Andreeva, Irina A.; Kirkwood, Francis T.

    This paper discusses the role of the Parliamentary Library in Russia. The first section provides historical background. The second section addresses two prerequisites of the Parliamentary Library, i.e., the official documents collections and the rule of public law. The third section describes implementing public access to government information…

  10. Geographically weighted regression for modelling the accessibility to the public hospital network in Concepción Metropolitan Area, Chile

    Directory of Open Access Journals (Sweden)

    Marcela Martínez Bascuñán

    2016-11-01

    Full Text Available Accessibility models in transport geography based on geographic information systems have proven to be an effective method in determining spatial inequalities associated with public health. This work aims to model the spatial accessibility from populated areas within the Concepción metropolitan area (CMA, the second largest city in Chile. The city’s public hospital network is taken into consideration with special reference to socio-regional inequalities. The use of geographically weighted regression (GWR and ordinary least squares (OLS for modelling accessibility with socioeconomic and transport variables is proposed. The explanatory variables investigated are: illiterate population, rural housing, alternative housing, homes with a motorised vehicle, public transport routes, and connectivity. Our results identify that approximately 4.1% of the population have unfavourable or very unfavourable accessibility to public hospitals, which correspond to rural areas located south of CMA. Application of a local GWR model (0.87 R2 adjusted helped to improve the settings over the use of traditional OLS methods (multiple regression (0.67 R2 adjusted and to find the spatial distribution of both coefficients of the explanatory variables, demonstrating the local significance of the model. Thus, accessibility studies have enormous potential to contribute to the development of public health and transport policies in turn to achieve equality in spatial accessibility to specialised health care.

  11. Computers in the Teaching of English as a Foreign Language: Access to the Diversity of Textual Genres and Language Skills

    Science.gov (United States)

    Dos Santos, Roberto-Márcio; Sobrinho, Jerônimo Coura

    In the area of language teaching both language skills and textual genres can be worked with simultaneously (thus responding to the Brazilian Curricular Parameters and to the trends in contemporary education, which emphasize contextualized teaching) by means of computers. Computers can make the teaching process dynamic and rich, since they enable the access to the foreign language through virtual environments, which creates a larger number of learning contexts, with all their specific vocabulary and linguistic features in real communication. This study focuses on possible applications of this kind of approach. The computer online is a resource of diverse textual genres and can be an important tool in the language classroom as well as an access to authentic material produced in contextualized practice close to real-life communication. On the other hand, all these materials must be appropriately used without ever worshipping the technology as if it were a miraculous solution. After all, the professional pedagogic skills of the teacher should never be forgotten or taken for granted. In this study, a series of interviews with teachers was carried out - both with Brazilian teachers of the public sector (basic education) and language institutes (private English courses) as well as teacher trainers (university professors), in order to verify if the teachers were prepared to work with informatics in teaching practices, and check the professionals’ views on the subject. The ideas of Maingueneau and Marcuschi about textual genres are a theoretical base in this work, besides the concept of cognitive economy. The text and its typology are focused here as the basic material for teaching English, through digital technologies and hypermedia. The study is also based on Sharma and Barrett’s notion of blended learning as a balanced combination of technological resources and traditional practices in the classroom. Thus, this is an attempt to investigate the relevance of

  12. Public policy and regulatory implications for the implementation of Opportunistic Cloud Computing Services for Enterprises

    DEFF Research Database (Denmark)

    Kuada, Eric; Olesen, Henning; Henten, Anders

    2012-01-01

    Opportunistic Cloud Computing Services (OCCS) is a social network approach to the provisioning and management of cloud computing services for enterprises. This paper discusses how public policy and regulations will impact on OCCS implementation. We rely on documented publicly available government...

  13. Are pediatric Open Access journals promoting good publication practice? An analysis of author instructions

    Directory of Open Access Journals (Sweden)

    Wolff Robert F

    2011-04-01

    Full Text Available Abstract Background Several studies analyzed whether conventional journals in general medicine or specialties such as pediatrics endorse recommendations aiming to improve publication practice. Despite evidence showing benefits of these recommendations, the proportion of endorsing journals has been moderate to low and varied considerably for different recommendations. About half of pediatric journals indexed in the Journal Citation Report referred to the Uniform Requirements for Manuscripts of the International Committee of Medical Journal Editors (ICMJE but only about a quarter recommended registration of trials. We aimed to investigate to what extent pediatric open-access (OA journals endorse these recommendations. We hypothesized that a high proportion of these journals have adopted recommendations on good publication practice since OA electronic publishing has been associated with a number of editorial innovations aiming at improved access and transparency. Methods We identified 41 journals publishing original research in the subject category "Health Sciences, Medicine (General, Pediatrics" of the Directory of Open Access Journals http://www.doaj.org. From the journals' online author instructions we extracted information regarding endorsement of four domains of editorial policy: the Uniform Requirements for Manuscripts, trial registration, disclosure of conflicts of interest and five major reporting guidelines such as the CONSORT (Consolidated Standards of Reporting Trials statement. Two investigators collected data independently. Results The Uniform Requirements were mentioned by 27 (66% pediatric OA journals. Thirteen (32% required or recommended trial registration prior to publication of a trial report. Conflict of interest policies were stated by 25 journals (61%. Advice about reporting guidelines was less frequent: CONSORT was referred to by 12 journals (29% followed by other reporting guidelines (MOOSE, PRISMA or STARD (8 journals, 20

  14. Are pediatric Open Access journals promoting good publication practice? An analysis of author instructions.

    Science.gov (United States)

    Meerpohl, Joerg J; Wolff, Robert F; Antes, Gerd; von Elm, Erik

    2011-04-09

    Several studies analyzed whether conventional journals in general medicine or specialties such as pediatrics endorse recommendations aiming to improve publication practice. Despite evidence showing benefits of these recommendations, the proportion of endorsing journals has been moderate to low and varied considerably for different recommendations. About half of pediatric journals indexed in the Journal Citation Report referred to the Uniform Requirements for Manuscripts of the International Committee of Medical Journal Editors (ICMJE) but only about a quarter recommended registration of trials. We aimed to investigate to what extent pediatric open-access (OA) journals endorse these recommendations. We hypothesized that a high proportion of these journals have adopted recommendations on good publication practice since OA electronic publishing has been associated with a number of editorial innovations aiming at improved access and transparency. We identified 41 journals publishing original research in the subject category "Health Sciences, Medicine (General), Pediatrics" of the Directory of Open Access Journals http://www.doaj.org. From the journals' online author instructions we extracted information regarding endorsement of four domains of editorial policy: the Uniform Requirements for Manuscripts, trial registration, disclosure of conflicts of interest and five major reporting guidelines such as the CONSORT (Consolidated Standards of Reporting Trials) statement. Two investigators collected data independently. The Uniform Requirements were mentioned by 27 (66%) pediatric OA journals. Thirteen (32%) required or recommended trial registration prior to publication of a trial report. Conflict of interest policies were stated by 25 journals (61%). Advice about reporting guidelines was less frequent: CONSORT was referred to by 12 journals (29%) followed by other reporting guidelines (MOOSE, PRISMA or STARD) (8 journals, 20%) and STROBE (3 journals, 7%). The EQUATOR

  15. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment

    Science.gov (United States)

    Xiao, Min; Zhou, Jing; Liu, Xuejiao; Jiang, Mingda

    2017-01-01

    In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment. PMID:28629131

  16. Research foci of computing research in South Africa as reflected by publications in the South African computer journal

    CSIR Research Space (South Africa)

    Kotzé, P

    2009-01-01

    Full Text Available The South African Computer Journal, better known as SACJ, has, for the last nineteen years, been one of the most pertinent publications for the computing discipline within the South African milieu. In this paper the authors reflect on the topics...

  17. Evaluation of Public E-Services and Information Technology Accessibility in Different Social Groups

    Directory of Open Access Journals (Sweden)

    Ramutė Naujikienė

    2012-12-01

    Full Text Available The purpose of this study is to develop an approach based on the social quality evaluation square model for evaluation of information technology usage in different social groups. Componential view to the accessibility of e-services including IT means providing the possibility to research the influences of different life conditions to usage of the public e-services. The task of this empirical study is directed towards revealing the differences of e-inclusion and e-services accessibility for social groups of citizens of Lithuania, and to compare this accessibility data with other EU countries.Design/methodology/approach—the approach is based on the square model of social quality evaluation of information technology usage in different social groups. The social division square model includes an assessment of quality according to the evaluation of socioeconomic security, social inclusion, social cohesion, and empowerment. Empowerment can be defined as consisting of individual or collective decisions to act on one’s own life.Findings—the results are demonstrated by the accessibility of public e-services data, which are evaluated by the quality of social group development according to IT applications. The hypothesis was confirmed that the e-government activities can be realized by properly selecting and installing technologies, and using technology facilities. E-services influence the capabilities of state officials to apply modern technology and increase the availability of e-services for social groups. Results consist of individual or collective decisions to act on one’s own life, to implementation of effective information technologies in the e-government activities and using of e-services. An important indicator is the implementation of e-services in the activity of citizens. It is submitted as the index of e-participation in dealing with the activities of citizens and the possibilities of authorities directly related with providing services

  18. Reflection in Russian public opinion accession to the throne of Emperor Alexander II

    Directory of Open Access Journals (Sweden)

    Maxim N. Krot

    2016-03-01

    Full Text Available The article deals with the perception of Russian society coming to the throne of Emperor Alexander II in 1855. The author analyzes the internal and external situation in Russia in this period, identifying the most significant factors that influenced the public's attitude to the new monarch, and the expectations that were associated with his coming to power. The article draws parallels between the initial period of the reign of the two liberal Russian monarchs of the XIX century – Alexander I and Alexander II, most clearly expressed not so much in the circumstances of their accession, but in the public mood that prevailed in the country. It presents a broad picture of the "awakening" of public consciousness and activity after the stagnation and oppression of the preceding reign, which was reflected primarily in an effort to think freely and to discuss pressing issues facing the country, as well as contribute to the supreme power in the modernization of social and political relations, awareness where necessary, at this time it becomes clearly. The author identifies semantic levels of social consciousness of the period, indicating the particular circumstances that have shaped them. Much attention is paid to the influence of Russian society of the Crimean War, which in many ways was the starting point of social upheaval transformed in 1855 from a national-patriotic in the socio-political. The author points out that at this time has unique conditions for overcoming the contradictions between state and society and their successful cooperation in the reform of the country. This suggests a significant, perhaps - the crucial role of the public in the selection of the vector conversion of Russia, which has become a feature of the reign of Alexander II.

  19. Virtual anastylosis of Greek sculpture as museum policy for public outreach and cognitive accessibility

    Science.gov (United States)

    Stanco, Filippo; Tanasi, Davide; Allegra, Dario; Milotta, Filippo Luigi Maria; Lamagna, Gioconda; Monterosso, Giuseppina

    2017-01-01

    This paper deals with a virtual anastylosis of a Greek Archaic statue from ancient Sicily and the development of a public outreach protocol for those with visual impairment or cognitive disabilities through the application of three-dimensional (3-D) printing and haptic technology. The case study consists of the marble head from Leontinoi in southeastern Sicily, acquired in the 18th century and later kept in the collection of the Museum of Castello Ursino in Catania, and a marble torso, retrieved in 1904 and since then displayed in the Archaeological Museum of Siracusa. Due to similar stylistic features, the two pieces can be dated to the end of the sixth century BC. Their association has been an open problem, largely debated by scholars, who have based their hypotheses on comparisons between pictures, but the reassembly of the two artifacts was never attempted. As a result the importance of such an artifact, which could be the only intact Archaic statue of a kouros ever found in Greek Sicily, has not fully been grasped by the public. Consequently, the curatorial dissemination of the knowledge related with such artifacts is purely based on photographic material. As a response to this scenario, the two objects have been 3-D scanned and virtually reassembled. The result has been shared digitally with the public via a web platform and, in order to include increased accessibility for the public with physical or cognitive disabilities, copies of the reassembled statue have been 3-D printed and an interactive test with the 3-D model has been carried out with a haptic device.

  20. Mental health leadership and patient access to care: a public-private initiative in South Africa.

    Science.gov (United States)

    Szabo, Christopher Paul; Fine, Jennifer; Mayers, Pat; Naidoo, Shan; Zabow, Tuviah

    2017-01-01

    Mental health leadership is a critical component of patient access to care. More specifically, the ability of mental health professionals to articulate the needs of patients, formulate strategies and engage meaningfully at the appropriate level in pursuit of resources. This is not a skill set routinely taught to mental health professionals. A public-private mental health leadership initiative, emanating from a patient access to care programme, was developed with the aim of building leadership capacity within the South African public mental health sector. The express aim was to equip health care professionals with the requisite skills to more effectively advocate for their patients. The initiative involved participants from various sites within South Africa. Inclusion was based on the proposal of an ongoing "project", i.e. a clinician-initiated service development with a multidisciplinary focus. The projects were varied in nature but all involved identification of and a plan for addressing an aspect of the participants' daily professional work which negatively impacted on patient care due to unmet needs. Six such projects were included and involved 15 participants, comprising personnel from psychiatry, psychology, occupational therapy and nursing. Each project group was formally mentored as part of the initiative, with mentors being senior professionals with expertise in psychiatry, public health and nursing. The programme design thus provided a unique practical dimension in which skills and learnings were applied to the projects with numerous and diverse outcomes. Benefits were noted by participants but extended beyond the individuals to the health institutions in which they worked and the patients that they served. Participants acquired both the skills and the confidence which enabled them to sustain the changes that they themselves had initiated in their institutions. The initiative gave impetus to the inclusion of public mental health as part of the curriculum

  1. Intangible Capital: Four years of growth as an open-access scientific publication

    Directory of Open Access Journals (Sweden)

    Pep Simo

    2008-01-01

    Full Text Available This issue opens the fourth volume of the Intangible Capital journal, which makes its way towards the fifth year of publication. As usually, we start this volume by evaluating the previous one and tracing new directions. Among the main contributions during the year 2007, we consider important to highlight the following aspects: the renewal of the scientific indexation agreements, the platform change to OJS, the appointment of a new editor, new members included in the editorial board, the board of reviewers, the change towards a bilingual model, the new financing obtained and, the last but not the least, the work undertaken together with many scientific editors of open access Spanish journals for obtaining the positive evaluation of the CNEAI (National Commission for the Evaluation of the Research Activity and thus, being a proof of scientific excellence.

  2. Fencing direct memory access data transfers in a parallel active messaging interface of a parallel computer

    Science.gov (United States)

    Blocksome, Michael A.; Mamidala, Amith R.

    2013-09-03

    Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to segments of shared random access memory through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and a segment of shared memory; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.

  3. Achieving human and machine accessibility of cited data in scholarly publications

    Science.gov (United States)

    Starr, Joan; Castro, Eleni; Crosas, Mercè; Dumontier, Michel; Downs, Robert R.; Duerr, Ruth; Haak, Laurel L.; Haendel, Melissa; Herman, Ivan; Hodson, Simon; Hourclé, Joe; Kratz, John Ernest; Lin, Jennifer; Nielsen, Lars Holm; Nurnberger, Amy; Proell, Stefan; Rauber, Andreas; Sacchi, Simone; Smith, Arthur; Taylor, Mike; Clark, Tim

    2015-01-01

    Reproducibility and reusability of research results is an important concern in scientific communication and science policy. A foundational element of reproducibility and reusability is the open and persistently available presentation of research data. However, many common approaches for primary data publication in use today do not achieve sufficient long-term robustness, openness, accessibility or uniformity. Nor do they permit comprehensive exploitation by modern Web technologies. This has led to several authoritative studies recommending uniform direct citation of data archived in persistent repositories. Data are to be considered as first-class scholarly objects, and treated similarly in many ways to cited and archived scientific and scholarly literature. Here we briefly review the most current and widely agreed set of principle-based recommendations for scholarly data citation, the Joint Declaration of Data Citation Principles (JDDCP). We then present a framework for operationalizing the JDDCP; and a set of initial recommendations on identifier schemes, identifier resolution behavior, required metadata elements, and best practices for realizing programmatic machine actionability of cited data. The main target audience for the common implementation guidelines in this article consists of publishers, scholarly organizations, and persistent data repositories, including technical staff members in these organizations. But ordinary researchers can also benefit from these recommendations. The guidance provided here is intended to help achieve widespread, uniform human and machine accessibility of deposited data, in support of significantly improved verification, validation, reproducibility and re-use of scholarly/scientific data. PMID:26167542

  4. Achieving human and machine accessibility of cited data in scholarly publications

    Directory of Open Access Journals (Sweden)

    Joan Starr

    2015-05-01

    Full Text Available Reproducibility and reusability of research results is an important concern in scientific communication and science policy. A foundational element of reproducibility and reusability is the open and persistently available presentation of research data. However, many common approaches for primary data publication in use today do not achieve sufficient long-term robustness, openness, accessibility or uniformity. Nor do they permit comprehensive exploitation by modern Web technologies. This has led to several authoritative studies recommending uniform direct citation of data archived in persistent repositories. Data are to be considered as first-class scholarly objects, and treated similarly in many ways to cited and archived scientific and scholarly literature. Here we briefly review the most current and widely agreed set of principle-based recommendations for scholarly data citation, the Joint Declaration of Data Citation Principles (JDDCP. We then present a framework for operationalizing the JDDCP; and a set of initial recommendations on identifier schemes, identifier resolution behavior, required metadata elements, and best practices for realizing programmatic machine actionability of cited data. The main target audience for the common implementation guidelines in this article consists of publishers, scholarly organizations, and persistent data repositories, including technical staff members in these organizations. But ordinary researchers can also benefit from these recommendations. The guidance provided here is intended to help achieve widespread, uniform human and machine accessibility of deposited data, in support of significantly improved verification, validation, reproducibility and re-use of scholarly/scientific data.

  5. Achieving human and machine accessibility of cited data in scholarly publications.

    Science.gov (United States)

    Starr, Joan; Castro, Eleni; Crosas, Mercè; Dumontier, Michel; Downs, Robert R; Duerr, Ruth; Haak, Laurel L; Haendel, Melissa; Herman, Ivan; Hodson, Simon; Hourclé, Joe; Kratz, John Ernest; Lin, Jennifer; Nielsen, Lars Holm; Nurnberger, Amy; Proell, Stefan; Rauber, Andreas; Sacchi, Simone; Smith, Arthur; Taylor, Mike; Clark, Tim

    Reproducibility and reusability of research results is an important concern in scientific communication and science policy. A foundational element of reproducibility and reusability is the open and persistently available presentation of research data. However, many common approaches for primary data publication in use today do not achieve sufficient long-term robustness, openness, accessibility or uniformity. Nor do they permit comprehensive exploitation by modern Web technologies. This has led to several authoritative studies recommending uniform direct citation of data archived in persistent repositories. Data are to be considered as first-class scholarly objects, and treated similarly in many ways to cited and archived scientific and scholarly literature. Here we briefly review the most current and widely agreed set of principle-based recommendations for scholarly data citation, the Joint Declaration of Data Citation Principles (JDDCP). We then present a framework for operationalizing the JDDCP; and a set of initial recommendations on identifier schemes, identifier resolution behavior, required metadata elements, and best practices for realizing programmatic machine actionability of cited data. The main target audience for the common implementation guidelines in this article consists of publishers, scholarly organizations, and persistent data repositories, including technical staff members in these organizations. But ordinary researchers can also benefit from these recommendations. The guidance provided here is intended to help achieve widespread, uniform human and machine accessibility of deposited data, in support of significantly improved verification, validation, reproducibility and re-use of scholarly/scientific data.

  6. Digital equity in education: A Multilevel examination of differences in and relationships between computer access, computer use and state-level technology policies.

    Directory of Open Access Journals (Sweden)

    Jonathan D. Becker

    2007-02-01

    Full Text Available Using data from the National Assessment of Educational Progress (NAEP state assessment and a survey of state-level technology policies, this study examined digital equity in education as a multilevel organizational phenomenon with data from 70,382 students in 3,479 schools and 40 states. Students in rural schools or schools with higher percentages of African American students were likely to have less access to computers. With respect to computer use, girls and students eligible for free or reduced-price lunch were more likely to use computers more frequently when computers are available in the classroom. With respect to relationships between computer access and computer use, having computers available in a lab increases the likelihood of higher levels of computer use. The results suggested that no more than 5% of the variance in computer access can be attributed to state factors, and less than 1% of the variance in computer use was between states. The findings suggested that where student technology standards are integrated into subject-area standards, computer use was likely lower than in other states. In states where pre-service teachers must meet technology-related requirements to receive their teaching credential and states where funds earmarked for technology are distributed as competitive grants, computer use was likely to be higher.

  7. 77 FR 74829 - Notice of Public Meeting-Cloud Computing and Big Data Forum and Workshop

    Science.gov (United States)

    2012-12-18

    ... National Institute of Standards and Technology Notice of Public Meeting--Cloud Computing and Big Data Forum...) announces a Cloud Computing and Big Data Forum and Workshop to be held on Tuesday, January 15, Wednesday... workshop. The NIST Cloud Computing and Big Data Forum and Workshop will bring together leaders and...

  8. 77 FR 26509 - Notice of Public Meeting-Cloud Computing Forum & Workshop V

    Science.gov (United States)

    2012-05-04

    ... National Institute of Standards and Technology Notice of Public Meeting--Cloud Computing Forum & Workshop V... announces the Cloud Computing Forum & Workshop V to be held on Tuesday, Wednesday and Thursday, June 5, 6... provide information on the U.S. Government (USG) Cloud Computing Technology Roadmap initiative. This...

  9. 76 FR 62373 - Notice of Public Meeting-Cloud Computing Forum & Workshop IV

    Science.gov (United States)

    2011-10-07

    ... National Institute of Standards and Technology Notice of Public Meeting--Cloud Computing Forum & Workshop...: NIST announces the Cloud Computing Forum & Workshop IV to be held on November 2, 3 and 4, 2011. This workshop will provide information on the U.S. Government (USG) Cloud Computing Technology Roadmap...

  10. Difficulties in accessing and availing of public health care systems among rural population in Chittoor District, Andhra Pradesh

    Directory of Open Access Journals (Sweden)

    Geetha Lakshmi Sreerama

    2015-01-01

    Full Text Available Context: Despite policies to make health care accessible to all, it is not universally accessible. Frequent evaluation of barriers to accessibility of health care services paves path for improvement. Hence, present study is undertaken to evaluate the factors and public health policies influencing health care access to rural people in Chittoor District, Andhra Pradesh, which can be interpolated for other regions. Aims: To assess knowledge, perceptions, availing of public health care services, barriers to health care access in Chittoor District, Andhra Pradesh. Settings and Design: Cross-sectional, hospital-based survey in the Government Maternity Hospital (GMH, Tirupati, a tertiary care center. Materials and Methods: Fifty women delivered normally in GMH through convenient sampling technique. Data collected on standardized pro forma as per IMS Institute of Healthcare Informatics. Statistical Analysis Used: Is done through MS Excel 2007, Epi Info 7 (of Centres for Disease Control and Prevention, Atlanta, USA and frequencies were described. Results: Distance, waiting hours, societal responsibility, nature of the illness, presumed commercialization of Medicare system, attitudes of health care providers, and loss of wages were not barriers for accessing health care. Accredited Social Health Activist (ASHA and availability of ambulance services made great improvements in health care accessibility. Absenteeism of health care providers is a problem. Conclusions: Expanding the ambulance services and ASHA network will be an effective measure for further accessibility to health care. Absenteeism of health care providers needs correction.

  11. Accessible high performance computing solutions for near real-time image processing for time critical applications

    Science.gov (United States)

    Bielski, Conrad; Lemoine, Guido; Syryczynski, Jacek

    2009-09-01

    High Performance Computing (HPC) hardware solutions such as grid computing and General Processing on a Graphics Processing Unit (GPGPU) are now accessible to users with general computing needs. Grid computing infrastructures in the form of computing clusters or blades are becoming common place and GPGPU solutions that leverage the processing power of the video card are quickly being integrated into personal workstations. Our interest in these HPC technologies stems from the need to produce near real-time maps from a combination of pre- and post-event satellite imagery in support of post-disaster management. Faster processing provides a twofold gain in this situation: 1. critical information can be provided faster and 2. more elaborate automated processing can be performed prior to providing the critical information. In our particular case, we test the use of the PANTEX index which is based on analysis of image textural measures extracted using anisotropic, rotation-invariant GLCM statistics. The use of this index, applied in a moving window, has been shown to successfully identify built-up areas in remotely sensed imagery. Built-up index image masks are important input to the structuring of damage assessment interpretation because they help optimise the workload. The performance of computing the PANTEX workflow is compared on two different HPC hardware architectures: (1) a blade server with 4 blades, each having dual quad-core CPUs and (2) a CUDA enabled GPU workstation. The reference platform is a dual CPU-quad core workstation and the PANTEX workflow total computing time is measured. Furthermore, as part of a qualitative evaluation, the differences in setting up and configuring various hardware solutions and the related software coding effort is presented.

  12. Predictors of access to sex education for children with intellectual disabilities in public schools.

    Science.gov (United States)

    Barnard-Brak, Lucy; Schmidt, Marcelo; Chesnut, Steven; Wei, Tianlan; Richman, David

    2014-04-01

    Data from the National Longitudinal Transition Study-2 ( SRI International, 2002 ) were analyzed to identify variables that predicted whether individuals with intellectual disability (ID) received sex education in public schools across the United States. Results suggested that individuals receiving special education services without ID were only slightly more likely to receive sex education than students with mild ID (47.5% and 44.1%, respectively), but the percentage of students with moderate to profound ID that received sex education was significantly lower (16.18%). Analysis of teacher opinions and perceptions of the likelihood of the students benefiting from sex education found that most teachers indicated that students without ID or with mild ID would benefit (60% and 68%, respectively), but the percentage dropped to 25% for students with moderate to profound ID. Finally, across all students, the only significant demographic variable that predicted receipt of sex education was more expressive communication skills. Results are discussed in terms of ensuring equal access to sex education for students with ID in public schools.

  13. Suppression of AC railway power-line interference in ECG signals recorded by public access defibrillators

    Directory of Open Access Journals (Sweden)

    Dotsinsky Ivan

    2005-11-01

    Full Text Available Abstract Background Public access defibrillators (PADs are now available for more efficient and rapid treatment of out-of-hospital sudden cardiac arrest. PADs are used normally by untrained people on the streets and in sports centers, airports, and other public areas. Therefore, automated detection of ventricular fibrillation, or its exclusion, is of high importance. A special case exists at railway stations, where electric power-line frequency interference is significant. Many countries, especially in Europe, use 16.7 Hz AC power, which introduces high level frequency-varying interference that may compromise fibrillation detection. Method Moving signal averaging is often used for 50/60 Hz interference suppression if its effect on the ECG spectrum has little importance (no morphological analysis is performed. This approach may be also applied to the railway situation, if the interference frequency is continuously detected so as to synchronize the analog-to-digital conversion (ADC for introducing variable inter-sample intervals. A better solution consists of rated ADC, software frequency measuring, internal irregular re-sampling according to the interference frequency, and a moving average over a constant sample number, followed by regular back re-sampling. Results The proposed method leads to a total railway interference cancellation, together with suppression of inherent noise, while the peak amplitudes of some sharp complexes are reduced. This reduction has negligible effect on accurate fibrillation detection. Conclusion The method is developed in the MATLAB environment and represents a useful tool for real time railway interference suppression.

  14. The EV Project Price/Fee Models for Publicly Accessible Charging

    Energy Technology Data Exchange (ETDEWEB)

    Francfort, James Edward [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-12-01

    As plug-in electric vehicles (PEVs) are introduced to the market place and gain more consumer acceptance, it is important for a robust and self-sustaining non-residential infrastructure of electric vehicle supply equipment (EVSE) to be established to meet the needs of PEV drivers. While federal and state financial incentives for electric vehicles were in place and remain so today, future incentives are uncertain. In order for PEVs to achieve mainstream adoption, an adequate and sustainable commercial or publicly available charging infrastructure was pursued by The EV Project to encourage increased PEV purchases by alleviating range anxiety, and by removing adoption barriers for consumers without a dedicated overnight parking location to provide a home-base charger. This included determining a business model for publicly accessible charge infrastructure. To establish this business model, The EV Project team created a fee for charge model along with various ancillary offerings related to charging that would generate revenue. And after placing chargers in the field the Project rolled out this fee structure.

  15. EPA National Center for Computational Toxicology UPDATE (ICCVAM public forum)

    Science.gov (United States)

    A presentation to the ICCVAM Public Forum on several new and exciting activities at NCCT, including Chemical library update, Chemistry Dashboard, Retrofitting in vitro assays with metabolic competence and In vitro PK.

  16. Accessibility of e-Learning and Computer and Information Technologies for Students with Visual Impairments in Postsecondary Education

    Science.gov (United States)

    Fichten, Catherine S.; Asuncion, Jennison V.; Barile, Maria; Ferraro, Vittoria; Wolforth, Joan

    2009-01-01

    This article presents the results of two studies on the accessibility of e-learning materials and other information and computer and communication technologies for 143 Canadian college and university students with low vision and 29 who were blind. It offers recommendations for enhancing access, creating new learning opportunities, and eliminating…

  17. Preliminary assessment of Tongue Drive System in medium term usage for computer access and wheelchair control.

    Science.gov (United States)

    Yousefi, Behnaz; Huo, Xueliang; Ghovanloo, Maysam

    2011-01-01

    Tongue Drive System (TDS) is a wireless, wearable assistive technology that enables individuals with severe motor impairments access computers, drive wheelchairs, and control their environments using tongue motion. In this paper, we have evaluated the TDS performance as a computer input device using ISO9241-9 standard tasks for pointing and selecting, based on the well known Fitts' Law, and as a powered wheelchair controller through an obstacle course navigation task. Nine able-bodied subjects who already had tongue piercing participated in this trial over 5 sessions during 5 weeks, allowing us to study the TDS learning process and its current limiting factors. Subjects worn tongue rings made of titanium in the form of a barbell with a small rare earth magnetic tracer hermetically sealed inside the upper ball. Comparing the results between 1(st) and 5(th) sessions showed that subjects' performance improved in all the measures through 5 sessions, demonstrating the effects of learning.

  18. Serving up Access

    Science.gov (United States)

    Rich, Sarah

    2011-01-01

    When low-income students returned to Chicago public schools this fall, many had better access to technology, thanks to a public-private partnership. Chicago families with children enrolled in the National School Lunch Program are eligible for subsidized computers and Internet connections through an agreement between the city and telecom giant…

  19. Excellence in Computational Biology and Informatics — EDRN Public Portal

    Science.gov (United States)

    9th Early Detection Research Network (EDRN) Scientific Workshop. Excellence in Computational Biology and Informatics: Sponsored by the EDRN Data Sharing Subcommittee Moderator: Daniel Crichton, M.S., NASA Jet Propulsion Laboratory

  20. Proposed standards for peer-reviewed publication of computer code

    Science.gov (United States)

    Computer simulation models are mathematical abstractions of physical systems. In the area of natural resources and agriculture, these physical systems encompass selected interacting processes in plants, soils, animals, or watersheds. These models are scientific products and have become important i...

  1. Accessibility of general practitioners and selected specialist physicians by car and by public transport in a rural region of Germany

    OpenAIRE

    Stentzel, Ulrike; Piegsa, Jens; Fredrich, Daniel; Hoffmann, Wolfgang; van den Berg, Neeltje

    2016-01-01

    Background The accessibility of medical care facilities in sparsely populated rural regions is relevant especially for elderly people which often represent a large segment of the population in such regions. Elderly people have higher morbidity risks and a higher demand for medical care. Although travelling with private cars is the dominating traffic mode in rural regions, accessibility by public transport is increasingly important especially because of limited mobility of elderly people. The ...

  2. Ensuring access to public information in Mexico: Proposal for treatment of the information portal of the Ministry of Federal Health

    Directory of Open Access Journals (Sweden)

    José Alfredo Hernández Landeros

    2011-03-01

    Full Text Available Reflect on the need to ensure access to information to everyone as the foundation of a information society. The case of Mexico and its public policy information from the Federal Institute of Access to Information. A proposal to adopt an information management system documentation for the Federal Ministry of Health of Mexico, based on international norms and standards in order to control, organize and retrieve information within your site.

  3. Editors View the Continuous Publication Model as a Satisfactory Alternative for Open Access LIS Journals

    Directory of Open Access Journals (Sweden)

    Richard Hayman

    2014-09-01

    Full Text Available A Review of: Cirasella, J., & Bowdoin, S. (2013. Just roll with it? Rolling volumes vs. discrete issues in open access library and information science journals. Journal of Librarianship and Scholarly Communication, 1(4. http://dx.doi.org/10.7710/2162-3309.1086 Abstract Objective – To understand the prevalence of, motivations for, and satisfaction with using a rolling-volume publishing model, as opposed to publishing discrete issues, across open access academic journals in library and information science. Design – A 12 question survey questionnaire. Setting – English-language, open access library and information science (LIS journals published in the United States of America. Subjects – A total of 21 open access LIS journals identified via the Directory of Open Access Journals that were actively publishing, and that also met the authors’ standard of scholarliness, which they established by identifying a journal’s peer-review process or other evidence of rigorous review. Based on responses, 12 journals published using discrete issues, while 9 published as rolling volumes or as rolling volumes with some discrete issues. Methods – In late 2011, the study’s authors invited lead editors or primary journal contacts to complete the survey. Survey participants were asked to identify whether their journal published in discrete issues, rolling volumes, or rolling volumes with occasional discrete issues, with the latter two categories combined as one for ease of results analysis. Survey logic split respondents into two groups, either discrete-issue or rolling-volume. Respondents in both categories were posed similar sets of questions, with the key difference being that the questions directed at each category accounted for the publication model the journals themselves identified as using. Editors from both groups were asked about the reasons for using the publication model they identified for their journal: within the survey tool, authors

  4. Metal oxide resistive random access memory based synaptic devices for brain-inspired computing

    Science.gov (United States)

    Gao, Bin; Kang, Jinfeng; Zhou, Zheng; Chen, Zhe; Huang, Peng; Liu, Lifeng; Liu, Xiaoyan

    2016-04-01

    The traditional Boolean computing paradigm based on the von Neumann architecture is facing great challenges for future information technology applications such as big data, the Internet of Things (IoT), and wearable devices, due to the limited processing capability issues such as binary data storage and computing, non-parallel data processing, and the buses requirement between memory units and logic units. The brain-inspired neuromorphic computing paradigm is believed to be one of the promising solutions for realizing more complex functions with a lower cost. To perform such brain-inspired computing with a low cost and low power consumption, novel devices for use as electronic synapses are needed. Metal oxide resistive random access memory (ReRAM) devices have emerged as the leading candidate for electronic synapses. This paper comprehensively addresses the recent work on the design and optimization of metal oxide ReRAM-based synaptic devices. A performance enhancement methodology and optimized operation scheme to achieve analog resistive switching and low-energy training behavior are provided. A three-dimensional vertical synapse network architecture is proposed for high-density integration and low-cost fabrication. The impacts of the ReRAM synaptic device features on the performances of neuromorphic systems are also discussed on the basis of a constructed neuromorphic visual system with a pattern recognition function. Possible solutions to achieve the high recognition accuracy and efficiency of neuromorphic systems are presented.

  5. The CT Scanner Facility at Stellenbosch University: An open access X-ray computed tomography laboratory

    Science.gov (United States)

    du Plessis, Anton; le Roux, Stephan Gerhard; Guelpa, Anina

    2016-10-01

    The Stellenbosch University CT Scanner Facility is an open access laboratory providing non-destructive X-ray computed tomography (CT) and a high performance image analysis services as part of the Central Analytical Facilities (CAF) of the university. Based in Stellenbosch, South Africa, this facility offers open access to the general user community, including local researchers, companies and also remote users (both local and international, via sample shipment and data transfer). The laboratory hosts two CT instruments, i.e. a micro-CT system, as well as a nano-CT system. A workstation-based Image Analysis Centre is equipped with numerous computers with data analysis software packages, which are to the disposal of the facility users, along with expert supervision, if required. All research disciplines are accommodated at the X-ray CT laboratory, provided that non-destructive analysis will be beneficial. During its first four years, the facility has accommodated more than 400 unique users (33 in 2012; 86 in 2013; 154 in 2014; 140 in 2015; 75 in first half of 2016), with diverse industrial and research applications using X-ray CT as means. This paper summarises the existence of the laboratory's first four years by way of selected examples, both from published and unpublished projects. In the process a detailed description of the capabilities and facilities available to users is presented.

  6. The CT Scanner Facility at Stellenbosch University: An open access X-ray computed tomography laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Plessis, Anton du, E-mail: anton2@sun.ac.za [CT Scanner Facility, Central Analytical Facilities, Stellenbosch University, Stellenbosch (South Africa); Physics Department, Stellenbosch University, Stellenbosch (South Africa); Roux, Stephan Gerhard le, E-mail: lerouxsg@sun.ac.za [CT Scanner Facility, Central Analytical Facilities, Stellenbosch University, Stellenbosch (South Africa); Guelpa, Anina, E-mail: aninag@sun.ac.za [CT Scanner Facility, Central Analytical Facilities, Stellenbosch University, Stellenbosch (South Africa)

    2016-10-01

    The Stellenbosch University CT Scanner Facility is an open access laboratory providing non-destructive X-ray computed tomography (CT) and a high performance image analysis services as part of the Central Analytical Facilities (CAF) of the university. Based in Stellenbosch, South Africa, this facility offers open access to the general user community, including local researchers, companies and also remote users (both local and international, via sample shipment and data transfer). The laboratory hosts two CT instruments, i.e. a micro-CT system, as well as a nano-CT system. A workstation-based Image Analysis Centre is equipped with numerous computers with data analysis software packages, which are to the disposal of the facility users, along with expert supervision, if required. All research disciplines are accommodated at the X-ray CT laboratory, provided that non-destructive analysis will be beneficial. During its first four years, the facility has accommodated more than 400 unique users (33 in 2012; 86 in 2013; 154 in 2014; 140 in 2015; 75 in first half of 2016), with diverse industrial and research applications using X-ray CT as means. This paper summarises the existence of the laboratory’s first four years by way of selected examples, both from published and unpublished projects. In the process a detailed description of the capabilities and facilities available to users is presented.

  7. Linking People to the Global Networked Society. Evaluation of the Online at PA Libraries Project: Public Access to the Internet through Public Libraries.

    Science.gov (United States)

    McClure, Charles R.; Bertot, John Carlo

    This report provides an evaluation of the Online at PA Libraries project which was initiated in the Fall of 1996 by the Pennsylvania Department of Education's Office of Commonwealth Libraries and the Schuylkill Intermediate Unit. The report documents that the following goals were accomplished: (1) provide public access to the Internet through…

  8. Review of naloxone safety for opioid overdose: practical considerations for new technology and expanded public access.

    Science.gov (United States)

    Wermeling, Daniel P

    2015-02-01

    Opioid overdose and mortality have increased at an alarming rate prompting new public health initiatives to reduce drug poisoning. One initiative is to expand access to the opioid antidote naloxone. Naloxone has a long history of safe and effective use by organized healthcare systems and providers in the treatment of opioid overdose by paramedics/emergency medicine technicians, emergency medicine physicians and anesthesiologists. The safety of naloxone in a prehospital setting administered by nonhealthcare professionals has not been formally established but will likely parallel medically supervised experiences. Naloxone dose and route of administration can produce variable intensity of potential adverse reactions and opioid withdrawal symptoms: intravenous administration and higher doses produce more adverse events and more severe withdrawal symptoms in those individuals who are opioid dependent. More serious adverse reactions after naloxone administration occur rarely and may be confounded by the effects of other co-intoxicants and the effects of prolonged hypoxia. One component of the new opioid harm reduction initiative is to expand naloxone access to high-risk individuals (addicts, abusers, or patients taking high-dose or extended-release opioids for pain) and their close family or household contacts. Patients or their close contacts receive a naloxone prescription to have the medication on their person or in the home for use during an emergency. Contacts are trained on overdose recognition, rescue breathing and administration of naloxone by intramuscular injection or nasal spraying of the injection prior to the arrival of emergency medical personnel. The safety profile of naloxone in traditional medical use must be considered in this new context of outpatient prescribing, dispensing and treatment of overdose prior to paramedic arrival. New naloxone delivery products are being developed for this prehospital application of naloxone in treatment of opioid

  9. Communication and Computation Skills for Blind Students Attending Public Schools.

    Science.gov (United States)

    Suffolk County Board of Cooperative Educational Services 3, Dix Hills, NY.

    Outlined are evaluative and instructional procedures used by itinerant teachers of blind children in public schools to teach readiness for braille reading and writing, as well as braille reading and writing, signature writing, and the Nemeth Code of braille mathematics and scientific notation. Readiness for braille reading and writing is…

  10. Moving toward More Effective Public Internet Access: The 1998 National Survey of Public Library Outlet Internet Connectivity.

    Science.gov (United States)

    Bertot, John Carlo; McClure, Charles R.

    This publication reports on research conducted to follow up on a 1997 survey of public libraries and the Internet, co-sponsored by the National Commission on Libraries and Information Science and the American Library Association. The 1998 survey is based on a sample of 2,500 of the nation's 15,718 public library outlets. The survey found that…

  11. A method for selection of appropriate assistive technology for computer access.

    Science.gov (United States)

    Jenko, Mojca; Matjacic, Zlatko; Vidmar, Gaj; Bester, Janez; Pogacnikb, Matevz; Zupan, Anton

    2010-12-01

    Assistive technologies (ATs) for computer access enable people with disabilities to be included in the information society. Current methods for assessment and selection of the most appropriate AT for each individual are non standardized, lengthy, subjective, and require substantial clinical experience of a multidisciplinary team.This manuscript presents and evaluates an objective approach to test and select an appropriate AT for computer access for people with disabilities. Six user interfaces(standard keyboard, mini and large joystick, mini and large trackball, and head-operated mouse and keyboard) were tested on the control group of 29 people without disabilities and on 63 people with neuromuscular and muscular diseases, using purpose-built software for testing the speed of sentence typing. Different criteria for selecting the optimal AT were tested and compared with the skilled clinician's choice. The learning curves of the people with disabilities proved to follow those of the healthy controls, but with lower performance. Daily computer use was not associated with AT selection, but corresponded nearly perfectly to the level of functional ability of upper limbs. Agreement between clinician's choice and learning-based AT selection was noteworthy,but far from perfect. If partial agreement was taken into account, that is, AT was considered as an ordinal variable based on the corresponding functional ability level, and the second best learning-based choice was taken into account,the agreement was high for highest median typing speed as AT selection criterion. In conclusion, the developed method for AT assessment and selection seems to be an efficient guide for an unskilled clinician to choose an appropriate AT.

  12. Computers in Public Schools: Changing the Image with Image Processing.

    Science.gov (United States)

    Raphael, Jacqueline; Greenberg, Richard

    1995-01-01

    The kinds of educational technologies selected can make the difference between uninspired, rote computer use and challenging learning experiences. University of Arizona's Image Processing for Teaching Project has worked with over 1,000 teachers to develop image-processing techniques that provide students with exciting, open-ended opportunities for…

  13. The ACLS Survey of Scholars: Views on Publications, Computers, Libraries.

    Science.gov (United States)

    Morton, Herbert C.; Price, Anne Jamieson

    1986-01-01

    Reviews results of a survey by the American Council of Learned Societies (ACLS) of 3,835 scholars in the humanities and social sciences who are working both in colleges and universities and outside the academic community. Areas highlighted include professional reading, authorship patterns, computer use, and library use. (LRW)

  14. Moral Progress in the Public Safety Net: Access for Transgender and LGB Patients.

    Science.gov (United States)

    Davis, Stephan; Berlinger, Nancy

    2014-09-01

    As a population, people who self-identify as lesbian, gay, bisexual, or transgender face significant risks to health and difficulty in obtaining medical and behavioral health care, relative to the general public. These issues are especially challenging in safety-net health care institutions, which serve a range of vulnerable populations with limited access, limited options, and significant health disparities. Safety-net hospitals, particularly public hospitals with fewer resources than academic medical centers and other nonprofit hospitals that also serve as safety nets, are under immense financial pressures. However, with the introduction in 2011 of standards for LGBT inclusion by The Joint Commission, showing progress on LGBT health care has become a compliance issue for hospitals. And because the health care community itself has contributed to LGBT health disparities through prejudice, disrespect, or inadequate knowledge that have made it difficult for LGB and especially T people to seek care or to obtain the care they need, there is a moral case for allocating scarce resources to this population: we owe them some investment in righting wrongs that the health care system itself has produced. So, where to begin in the typical safety-net hospital or clinic? Beyond staff training, which is essential and for which good models now exist, what does justice demand from a service-utilization perspective? Given the range of health care services that an LGBT person in the safety net may need or want, how should we set priorities? And what can't we promise to do for this member of our community? © 2014 by The Hastings Center.

  15. Health care access for refugees and immigrants with precarious status: public health and human right challenges.

    Science.gov (United States)

    Rousseau, Cécile; ter Kuile, Sonia; Munoz, Marie; Nadeau, Lucie; Ouimet, Marie-Jo; Kirmayer, Laurence; Crépeau, François

    2008-01-01

    Migration flux is being transformed by globalization, and the number of people with either undocumented or with a precarious status is growing in Canada. There are no epidemiological data on the health and social consequences of this situation, but clinicians working in primary care with migrants and refugees are increasingly worried about the associated morbidity. This commentary summarizes findings from a pilot study with health professionals in the Montreal area and suggests that the uninsured population predicament is a national problem. Although ethical and legal issues associated with data collection by clinicians, institutions and governments need to be examined, estimating the public health consequences and long-term cost associated with problems in access to health care due to migratory status should be a priority. Current regulations and administrative policies appear to be at odds with the principles of equal rights set out by the Canadian Charter of Rights and Freedoms and the UN Convention on the Rights of the Child. Beyond the commitment of individual clinicians, Canadian medical associations should take an advocacy role and scrutinize the ethical and medical implications of the present system.

  16. State Public Policies and the Racial/Ethnic Stratification of College Access and Choice in the State of Maryland

    Science.gov (United States)

    Perna, Laura W.; Steele, Patricia; Woda, Susan; Hibbert, Taifa

    2005-01-01

    This study uses descriptive analyses of data from multiple sources to examine changes during the 1990s in the racial/ethnic stratification of college access and choice in Maryland and to explore state public policies that may have influenced changes in the demand for and supply of higher education for students of different racial/ethnic groups…

  17. Student Search Behaviour in an Online Public Access Catalogue: An Examination of "Searching Mental Models" and "Searcher Self-Concept"

    Science.gov (United States)

    Willson, Rebekah; Given, Lisa M.

    2014-01-01

    Introduction: This paper presents a qualitative exploration of university students' experience of searching an online public access catalogue. The study investigated how students conceptualise their searching process, as well as how students understand themselves as seekers of information. Method: Following a search task, thirty-eight…

  18. Public access to New Hampshire state waters: a comparison of three cohorts of residents across three distinct geographic

    Science.gov (United States)

    Kim Pawlawski; Robert A. Robertson; Laura Pfister

    2003-01-01

    This study was intended to provide New Hampshire agencies with a better understanding of public access-related demand information. Through an analysis of three groups of New Hampshire residents based upon geographic location and length of residency, important issues and attitudes were identified from all over the State. The results of this study will assist in policy-...

  19. Providing access to research data, publications and current research information at Data Archiving and Networked Services - DANS

    NARCIS (Netherlands)

    Dijk, E.M.S.; Doorn, P.K.

    2014-01-01

    Data Archiving and Networked Services (DANS) promotes sustained access to digital research data in the Netherlands. Researchers can deposit their data through the online archiving system EASY. Via the portal NARCIS the research data are shown in context, namely in relation to publications, and other

  20. Public Perception of the Millennium Development Goals on Access to Safe Drinking Water in Cross River State, Nigeria

    Science.gov (United States)

    Eni, David D.; Ojong, William M.

    2014-01-01

    This study evaluated the public perception of Millennium Development Goals (MDGs) of environmental sustainability with focus on the MDG target which has to do with reducing the proportion of people without access to safe drinking water in Cross River State, Nigeria. The stratified and systematic sampling techniques were adopted for the study,…

  1. U.S. Government Publications: Their Value, Online Accessibility for International Information Needs.

    Science.gov (United States)

    Usdane, Bernice S.

    1980-01-01

    Classifies the types of online databases available through System Development Corporation (ORBIT) and Lockheed Information Systems (DIALOG) that access government information; briefly describes those which include access to government sources; and discusses in greater depth five databases which exclusively access U.S. Federal Government Documents.…

  2. Novel Techniques for Secure Use of Public Cloud Computing Resources

    Science.gov (United States)

    2015-09-17

    of a few common standard assumptions presented in this format : Discrete Logarithm (DL)[1]: Let G be a cyclic group with generator g. Let D be the...for the system. AuthoritySetup(GP)→ MS KA, APA Each authority runs the authority setup algorithm with the global parameters GP and produces a master...secret key MS KA and some public authority parameters APA for an authority A. DomainKeyGeneration(GP, MS KA, APA , IDdomain = 〈id1, ..., id`〉, h′)→ DS K

  3. Consumer Satisfaction with Telerehabilitation Service Provision of Alternative Computer Access and Augmentative and Alternative Communication.

    Science.gov (United States)

    Lopresti, Edmund F; Jinks, Andrew; Simpson, Richard C

    2015-01-01

    Telerehabilitation (TR) services for assistive technology evaluation and training have the potential to reduce travel demands for consumers and assistive technology professionals while allowing evaluation in more familiar, salient environments for the consumer. Sixty-five consumers received TR services for augmentative and alternative communication or alternative computer access, and consumer satisfaction was compared with twenty-eight consumers who received exclusively in-person services. TR recipients rated their TR services at a median of 6 on a 6-point Likert scale TR satisfaction questionnaire, although individual responses did indicate room for improvement in the technology. Overall satisfaction with AT services was rated highly by both in-person (100% satisfaction) and TR (99% satisfaction) service recipients.

  4. A Computer-Assisted Instruction in Teaching Abstract Statistics to Public Affairs Undergraduates

    Science.gov (United States)

    Ozturk, Ali Osman

    2012-01-01

    This article attempts to demonstrate the applicability of a computer-assisted instruction supported with simulated data in teaching abstract statistical concepts to political science and public affairs students in an introductory research methods course. The software is called the Elaboration Model Computer Exercise (EMCE) in that it takes a great…

  5. Ethical policies on animal experiments are not compromised by whether a journal is freely accessible or charges for publication.

    Science.gov (United States)

    Rands, S A

    2009-11-01

    The advent of the open access (OA) movement in publishing has been instrumental in causing a shift in the accessibility of research findings published in academic journals. The adoption of OA and other online publication models means that the results of scientific research published in journals using a free access (FA) framework are now available, free of charge, to anyone with access to the Internet. FA journals typically require a payment from the authors of a manuscript, which has raised concerns about the quality of work published in them; accepting payment from an author may compromise a journal's acceptance criteria. This study addresses whether journal policy on the treatment of animals is influenced by whether a journal follows a FA publishing model, and whether a requirement to pay for publication has an influence. A random sample of 332 biomedical journals listed in the ISI Web of Knowledge and Directory of Open Access Journals databases were assessed for whether they had an ethical policy on publishing animal studies, and what form of publication framework they used (103 of the journals followed a FA framework; 101 charged in some way for publication). Only 135 (40.7%) of the journals surveyed demanded that submissions comply with a pre-defined ethical stance. FA journals are just as likely to have an ethical policy on the treatment and presentation of animal studies as 'traditional', non-FA journals (significance of there being a difference: P = 0.98), and there is no relationship between policy and whether an author is required to pay for publication (significance of there being a difference: P = 0.57). Older journals are more likely to have an ethical policy (P = 0.03). There is, therefore, no obvious compromise shown by FA journals in the explicit policies on reporting studies involving animals. However, since anyone can read published FA studies online, FA journals that do not have an explicit policy about publishing animal research are urged to

  6. Can free open access resources strengthen knowledge-based emerging public health priorities, policies and programs in Africa?

    Science.gov (United States)

    Tambo, Ernest; Madjou, Ghislaine; Khayeka-Wandabwa, Christopher; Tekwu, Emmanuel N.; Olalubi, Oluwasogo A.; Midzi, Nicolas; Bengyella, Louis; Adedeji, Ahmed A.; Ngogang, Jeanne Y.

    2016-01-01

    Tackling emerging epidemics and infectious diseases burden in Africa requires increasing unrestricted open access and free use or reuse of regional and global policies reforms as well as timely communication capabilities and strategies. Promoting, scaling up data and information sharing between African researchers and international partners are of vital importance in accelerating open access at no cost. Free Open Access (FOA) health data and information acceptability, uptake tactics and sustainable mechanisms are urgently needed. These are critical in establishing real time and effective knowledge or evidence-based translation, proven and validated approaches, strategies and tools to strengthen and revamp health systems.  As such, early and timely access to needed emerging public health information is meant to be instrumental and valuable for policy-makers, implementers, care providers, researchers, health-related institutions and stakeholders including populations when guiding health financing, and planning contextual programs. PMID:27508058

  7. Can free open access resources strengthen knowledge-based emerging public health priorities, policies and programs in Africa?

    Science.gov (United States)

    Tambo, Ernest; Madjou, Ghislaine; Khayeka-Wandabwa, Christopher; Tekwu, Emmanuel N; Olalubi, Oluwasogo A; Midzi, Nicolas; Bengyella, Louis; Adedeji, Ahmed A; Ngogang, Jeanne Y

    2016-01-01

    Tackling emerging epidemics and infectious diseases burden in Africa requires increasing unrestricted open access and free use or reuse of regional and global policies reforms as well as timely communication capabilities and strategies. Promoting, scaling up data and information sharing between African researchers and international partners are of vital importance in accelerating open access at no cost. Free Open Access (FOA) health data and information acceptability, uptake tactics and sustainable mechanisms are urgently needed. These are critical in establishing real time and effective knowledge or evidence-based translation, proven and validated approaches, strategies and tools to strengthen and revamp health systems.  As such, early and timely access to needed emerging public health information is meant to be instrumental and valuable for policy-makers, implementers, care providers, researchers, health-related institutions and stakeholders including populations when guiding health financing, and planning contextual programs.

  8. Validating the accuracy of GIS-based accessibility analysis in determining public primary health care demand in metropolitan areas: conference presentation

    CSIR Research Space (South Africa)

    Mokgalaka, H

    2014-07-01

    Full Text Available -Based Accessibility Analysis in Determining Public Primary Health Care Demand in Metropolitan Areas Hunadi Mokgalaka July 2014 Contents • Service access planning • GIS-based accessibility analysis • Key challenges to application • Methodology... • Accessibility modelling - improved means of measuring facility access and of identifying poorly served areas and backlogs (spatially) • Inform long term plans • Measure progress w.r.t. service delivery of services • Assist in setting service standards...

  9. Open access to the scientific literature: a peer commons open to the public. [Le libre accès à la littérature scientifique : un bien commun aux chercheurs ouvert au public

    OpenAIRE

    Bosc, Hélène

    2008-01-01

    Communication : Copyright Regulation in Europe ? An Enabling or Disabling Factor for Science Communication. European Workshop, Nov. 14-15, 2008, Berlin, Germany; Ninety percent of research worldwide is publicly funded, hence the results of these research should be made publicly accessible online. Research publications, a common good, created by researchers for researchers, need to be freely accessible to all. Immediate "open access" can be provided through author self-archiving in the growing...

  10. A literature review of neck pain associated with computer use: public health implications

    OpenAIRE

    2008-01-01

    Prolonged use of computers during daily work activities and recreation is often cited as a cause of neck pain. This review of the literature identifies public health aspects of neck pain as associated with computer use. While some retrospective studies support the hypothesis that frequent computer operation is associated with neck pain, few prospective studies reveal causal relationships. Many risk factors are identified in the literature. Primary prevention strategies have largely been confi...

  11. Pred-hERG: A Novel web-Accessible Computational Tool for Predicting Cardiac Toxicity.

    Science.gov (United States)

    Braga, Rodolpho C; Alves, Vinicius M; Silva, Meryck F B; Muratov, Eugene; Fourches, Denis; Lião, Luciano M; Tropsha, Alexander; Andrade, Carolina H

    2015-10-01

    The blockage of the hERG K(+) channels is closely associated with lethal cardiac arrhythmia. The notorious ligand promiscuity of this channel earmarked hERG as one of the most important antitargets to be considered in early stages of drug development process. Herein we report on the development of an innovative and freely accessible web server for early identification of putative hERG blockers and non-blockers in chemical libraries. We have collected the largest publicly available curated hERG dataset of 5,984 compounds. We succeed in developing robust and externally predictive binary (CCR≈0.8) and multiclass models (accuracy≈0.7). These models are available as a web-service freely available for public at http://labmol.farmacia.ufg.br/predherg/. Three following outcomes are available for the users: prediction by binary model, prediction by multi-class model, and the probability maps of atomic contribution. The Pred-hERG will be continuously updated and upgraded as new information became available. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  12. Online medical books: their availability and an assessment of how health sciences libraries provide access on their public Websites.

    Science.gov (United States)

    MacCall, Steven L

    2006-01-01

    The objective of this study was to determine the number and topical range of available online medical books and to assess how health sciences libraries were providing access to these resources on their public Websites. The collection-based evaluative technique of list checking was used to assess the number and topical range of online medical books of the six largest publishers. Publisher inventory lists were downloaded over a two-day period (May 16-17, 2004). Titles were counted and compared with the 2003 Brandon/Hill list. A sample of health sciences libraries was subsequently derived by consulting the 2004 "Top Medical Schools-Research" in U.S. News & World Report. Bibliographic and bibliothecal access methods were evaluated based on an inspection of the publicly available Websites of the sample libraries. Of 318 currently published online medical books, 151 (47%) were Brandon/Hill titles covering 42 of 59 Brandon/Hill topics (71%). These 151 titles represented 22% (N = 672) of the Brandon/Hill list, which further broke down as 52 minimal core, 41 initial purchase, and 58 other recommended Brandon/Hill titles. These numbers represented 50%, 28%, and 12%, respectively, of all Brandon/Hill titles corresponding to those categories. In terms of bibliographic access, 20 of 21 of sampled libraries created catalog records for their online medical books, 1 of which also provided analytical access at the chapter level, and none provided access at the chapter section level. Of the 21 libraries, 19 had library Website search engines that provided title-level access and 4 provided access at the chapter level and none that at the chapter section level. For bibliothecal access, 19 of 21 libraries provided title-level access to medical books, 8 of which provided classified and alphabetic arrangements, 1 provided a classified arrangement only, and 10 provided an alphabetic arrangement only. No library provided a bibliothecal arrangement for medical book chapters or chapter

  13. Testing a bedside personal computer Clinical Care Classification System for nursing students using Microsoft Access.

    Science.gov (United States)

    Feeg, Veronica D; Saba, Virginia K; Feeg, Alan N

    2008-01-01

    This study tested a personal computer-based version of the Sabacare Clinical Care Classification System on students' performance of charting patient care plans. The application was designed as an inexpensive alternative to teach electronic charting for use on any laptop or personal computer with Windows and Microsoft Access. The data-based system was tested in a randomized trial with the control group using a type-in text-based-only system also mounted on a laptop at the bedside in the laboratory. Student care plans were more complete using the data-based system over the type-in text version. Students were more positive but not necessarily more efficient with the data-based system. The results demonstrate that the application is effective for improving student nursing care charting using the nursing process and capturing patient care information with a language that is standardized and ready for integration with other patient electronic health record data. It can be implemented on a bedside stand in the clinical laboratory or used to aggregate care planning over a student's clinical experience.

  14. Assessing mouse alternatives to access to computer: a case study of a user with cerebral palsy.

    Science.gov (United States)

    Pousada, Thais; Pareira, Javier; Groba, Betania; Nieto, Laura; Pazos, Alejandro

    2014-01-01

    The purpose of this study is to describe the process of assessment of three assistive devices to meet the needs of a woman with cerebral palsy (CP) in order to provide her with computer access and use. The user has quadriplegic CP, with anarthria, using a syllabic keyboard. Devices were evaluated through a three-step approach: (a) use of a questionnaire to preselect potential assistive technologies, (b) use of an eTAO tool to determine the effectiveness of each devised, and (c) a conducting semi-structured interview to obtain qualitative data. Touch screen, joystick, and trackball were the preselected devices. The best device that met the user's needs and priorities was joystick. The finding was corroborated by both the eTAO tool and the semi-structured interview. Computers are a basic form of social participation. It is important to consider the special needs and priorities of users and to try different devices when undertaking a device-selection process. Environmental and personal factors have to be considered, as well. This leads to a need to evaluate new tools in order to provide the appropriate support. The eTAO could be a suitable instrument for this purpose. Additional research is also needed to understand how to better match devices with different user populations and how to comprehensively evaluate emerging technologies relative to users with disabilities.

  15. The tobacco industry, researchers, and ethical access to UK Biobank: using the public interest and public good.

    Science.gov (United States)

    Capps, Benjamin James; van der Eijk, Yvette

    2014-10-01

    We have asked whether the strategic purpose of the tobacco industry is something that a public resource, such as UK Biobank, should support. Tobacco industry health research has been known to work irreconcilably with the purposes of such institutions, which can be surmised as for the public good and defined to improve the provision, diagnosis, and treatment of illness and the promotion of health throughout society. We have isolated possible conflicts of interest that underlie vested research agendas of the tobacco industry and that may extend to tobacco industry-funded researchers. With respect to research, we find that the tobacco industry is entirely at odds with the purposes of public biobanking.

  16. Integrating open-source technologies to build low-cost information systems for improved access to public health data

    Directory of Open Access Journals (Sweden)

    Oberle Mark W

    2008-06-01

    Full Text Available Abstract Effective public health practice relies on the availability of public health data sources and assessment tools to convey information to investigators, practitioners, policy makers, and the general public. Emerging communication technologies on the Internet can deliver all components of the "who, what, when, and where" quartet more quickly than ever with a potentially higher level of quality and assurance, using new analysis and visualization tools. Open-source software provides the opportunity to build low-cost information systems allowing health departments with modest resources access to modern data analysis and visualization tools. In this paper, we integrate open-source technologies and public health data to create a web information system which is accessible to a wide audience through the Internet. Our web application, "EpiVue," was tested using two public health datasets from the Washington State Cancer Registry and Washington State Center for Health Statistics. A third dataset shows the extensibility and scalability of EpiVue in displaying gender-based longevity statistics over a twenty-year interval for 3,143 United States counties. In addition to providing an integrated visualization framework, EpiVue's highly interactive web environment empowers users by allowing them to upload their own geospatial public health data in either comma-separated text files or MS Excel™ spreadsheet files and visualize the geospatial datasets with Google Maps™.

  17. The Importance of Computer Science for Public Health Training: An Opportunity and Call to Action.

    Science.gov (United States)

    Kunkle, Sarah; Christie, Gillian; Yach, Derek; El-Sayed, Abdulrahman M

    2016-01-01

    A century ago, the Welch-Rose Report established a public health education system in the United States. Since then, the system has evolved to address emerging health needs and integrate new technologies. Today, personalized health technologies generate large amounts of data. Emerging computer science techniques, such as machine learning, present an opportunity to extract insights from these data that could help identify high-risk individuals and tailor health interventions and recommendations. As these technologies play a larger role in health promotion, collaboration between the public health and technology communities will become the norm. Offering public health trainees coursework in computer science alongside traditional public health disciplines will facilitate this evolution, improving public health's capacity to harness these technologies to improve population health.

  18. F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2016-01-01

    Full Text Available Current file storage service models for cloud servers assume that users either belong to single layer with different privileges or cannot authorize privileges iteratively. Thus, the access control is not fine-grained and flexible. Besides, most access control methods at cloud servers mainly rely on computationally intensive cryptographic algorithms and, especially, may not be able to support highly dynamic ad hoc groups with addition and removal of group members. In this paper, we propose a scheme called F2AC, which is a lightweight, fine-grained, and flexible access control scheme for file storage in mobile cloud computing. F2AC can not only achieve iterative authorization, authentication with tailored policies, and access control for dynamically changing accessing groups, but also provide access privilege transition and revocation. A new access control model called directed tree with linked leaf model is proposed for further implementations in data structures and algorithms. The extensive analysis is given for justifying the soundness and completeness of F2AC.

  19. Overcoming Spatial and Temporal Barriers to Public Access Defibrillators Via Optimization

    NARCIS (Netherlands)

    Sun, Christopher L.F.; Demirtas, Derya; Brooks, Steven C.; Morrison, Laurie J.; Chan, Timothy C.Y.

    2016-01-01

    Background Immediate access to an automated external defibrillator (AED) increases the chance of survival for out-of-hospital cardiac arrest (OHCA). Current deployment usually considers spatial AED access, assuming AEDs are available 24 h a day. Objectives The goal of this study was to develop an o

  20. The Tobacco Industry, Researchers, and Ethical Access to UK Biobank: Using the Public Interest and Public Good

    Science.gov (United States)

    van der Eijk, Yvette

    2014-01-01

    We have asked whether the strategic purpose of the tobacco industry is something that a public resource, such as UK Biobank, should support. Tobacco industry health research has been known to work irreconcilably with the purposes of such institutions, which can be surmised as for the public good and defined to improve the provision, diagnosis, and treatment of illness and the promotion of health throughout society. We have isolated possible conflicts of interest that underlie vested research agendas of the tobacco industry and that may extend to tobacco industry–funded researchers. With respect to research, we find that the tobacco industry is entirely at odds with the purposes of public biobanking. PMID:25122018

  1. MINEs: open access databases of computationally predicted enzyme promiscuity products for untargeted metabolomics.

    Science.gov (United States)

    Jeffryes, James G; Colastani, Ricardo L; Elbadawi-Sidhu, Mona; Kind, Tobias; Niehaus, Thomas D; Broadbelt, Linda J; Hanson, Andrew D; Fiehn, Oliver; Tyo, Keith E J; Henry, Christopher S

    2015-01-01

    In spite of its great promise, metabolomics has proven difficult to execute in an untargeted and generalizable manner. Liquid chromatography-mass spectrometry (LC-MS) has made it possible to gather data on thousands of cellular metabolites. However, matching metabolites to their spectral features continues to be a bottleneck, meaning that much of the collected information remains uninterpreted and that new metabolites are seldom discovered in untargeted studies. These challenges require new approaches that consider compounds beyond those available in curated biochemistry databases. Here we present Metabolic In silico Network Expansions (MINEs), an extension of known metabolite databases to include molecules that have not been observed, but are likely to occur based on known metabolites and common biochemical reactions. We utilize an algorithm called the Biochemical Network Integrated Computational Explorer (BNICE) and expert-curated reaction rules based on the Enzyme Commission classification system to propose the novel chemical structures and reactions that comprise MINE databases. Starting from the Kyoto Encyclopedia of Genes and Genomes (KEGG) COMPOUND database, the MINE contains over 571,000 compounds, of which 93% are not present in the PubChem database. However, these MINE compounds have on average higher structural similarity to natural products than compounds from KEGG or PubChem. MINE databases were able to propose annotations for 98.6% of a set of 667 MassBank spectra, 14% more than KEGG alone and equivalent to PubChem while returning far fewer candidates per spectra than PubChem (46 vs. 1715 median candidates). Application of MINEs to LC-MS accurate mass data enabled the identity of an unknown peak to be confidently predicted. MINE databases are freely accessible for non-commercial use via user-friendly web-tools at http://minedatabase.mcs.anl.gov and developer-friendly APIs. MINEs improve metabolomics peak identification as compared to general chemical

  2. A Typology of Intellectual Property Management for Public Health Innovation and Access: Design Considerations for Policymakers§

    Science.gov (United States)

    Taubman, Antony

    2010-01-01

    This paper seeks to set the practical discipline of public interest intellectual property (IP) management in public health into its broader policy context. The most immediate and direct impact of IP systems on public welfare results not from international standards nor from national legislation – though these norms are fundamentally important - but rather from the accumulated impact of numerous practical choices whether or not to seek IP protection; where and where not; and how any exclusive rights are deployed, by whom, and to what end. IP management is the essentially practical exercise of limited exclusive rights over protected subject matter, the judicious use of those rights to leverage outcomes that advance an institution's or a firm's objectives. Exclusive rights are used to construct and define knowledge-based relationships, to leverage access to technology and other necessary resources, and to enhance market-based incentives. IP management choices range across a broad spectrum, spanning public domain strategies, open or exclusive licensing, and strong exclusivity. The idea of ‘exclusive rights’, as a specific legal mechanism, can run counter to expectations of greater openness and accessibility, but actual outcomes will depend very much on how these mechanisms are used in practice. For public interest or public sector institutions concerned with health research and development, particularly the development of new medicines, IP management choices can be just as critical as they are for private firms, although a predominant institutional concentration on advancing direct public interest objectives may lead to significantly different approaches in weighing and exercising practical choices for IP management: even so, a private sector approach should not be conflated with exclusivity as an end in itself, nor need public interest IP management eschew all leverage over IP. This paper offers a tentative framework for a richer typology of those choices, to

  3. 76 FR 68517 - Request for Information: Public Access to Digital Data Resulting From Federally Funded Scientific...

    Science.gov (United States)

    2011-11-04

    ... unclassified digital data that result from federally funded scientific research. The public input provided... unclassified digital data that result from federally funded scientific research. The public input provided... to digital data resulting from federally funded research, and a summary of public input...

  4. Transparency in Public Administration: Free Access to Public Information. A Topical Comparative Analysis of Several Jurisdictions from Central and Eastern Europe

    Directory of Open Access Journals (Sweden)

    DRAGOȘ Dacian C.

    2006-06-01

    Full Text Available Many expected freedom of information laws to be among the first priorities of the new governments of countries in transition after the 1989 changes, but instead there was little public pressure to adopt general sunshine laws relating to all categories of information. After adopting the laws, however, there are still many powerful forces that are working against extensive access to information – they can be static - opaque administrative practices, general inaptitude or the lack of sufficient human and material resources - or active – agents that resist openness due to private interests, or agents that use institutional scenarios to prevent public scrutiny over corruption and incompetence. The paper approaches the jurisdictions from Hungary, Poland, Czech Republic and Romania, emphasising aspects like: different models in regulating freedom of information regimes, obstacles in the implementation of the law, public bodies that should apply the law, timeframes, etc.

  5. Wheelchair Users’ Accessibility Problems in Public Transportation-Case of Metro Bus

    Directory of Open Access Journals (Sweden)

    Ayse Nilay Evcil

    2014-06-01

    Full Text Available Every day, in urban areas, the mobility of people and goods forms inner urban transportation. When urban transportation is carried in the form of public transportation, it becomes a public service. The urban public transport is one of the important services for all citizens since it is a public service provision. This service is provided by local government and it has been offered as a service without any distinctions between young, old, children, men, women, disabled, employee or retired or briefly to the society.  Additionally, traffic congestion and the expence of owing and maintaining vehicles increase public transport usage in cities.

  6. MULTILINGUAL PUBLICATION AS A LEGITIMATE TOOL TO INCREASE ACCESS TO SCIENCE (English translated version

    Directory of Open Access Journals (Sweden)

    Luis Fernando Aragón-Vargas

    2014-12-01

    Full Text Available Duplicate publication, including the submission or publication of the same manuscript in two or more languages, is considered scientific misconduct. Meanwhile, properly conducted multilingual publication has been an exception difficult to deal with, rather than part of the normal scientific publishing process. While publication of a manuscript in a second or third language should not receive the same credit as the original publication, it should not be punished. Provided the appropriate disclosures and preliminary steps are taken, it should be highly encouraged instead, as it will enhance scientific communication and may reduce the knowledge gap around the world. Different types of multilingual publications are summarized and some basic guidelines are offered for the sanctioned publication of the same paper in multiple languages. ALSO AVAILABLE IN SPANISH AND PORTUGUESE FROM THIS JOURNAL.

  7. Toward a Computer Vision-based Wayfinding Aid for Blind Persons to Access Unfamiliar Indoor Environments.

    Science.gov (United States)

    Tian, Yingli; Yang, Xiaodong; Yi, Chucai; Arditi, Aries

    2013-04-01

    Independent travel is a well known challenge for blind and visually impaired persons. In this paper, we propose a proof-of-concept computer vision-based wayfinding aid for blind people to independently access unfamiliar indoor environments. In order to find different rooms (e.g. an office, a lab, or a bathroom) and other building amenities (e.g. an exit or an elevator), we incorporate object detection with text recognition. First we develop a robust and efficient algorithm to detect doors, elevators, and cabinets based on their general geometric shape, by combining edges and corners. The algorithm is general enough to handle large intra-class variations of objects with different appearances among different indoor environments, as well as small inter-class differences between different objects such as doors and door-like cabinets. Next, in order to distinguish intra-class objects (e.g. an office door from a bathroom door), we extract and recognize text information associated with the detected objects. For text recognition, we first extract text regions from signs with multiple colors and possibly complex backgrounds, and then apply character localization and topological analysis to filter out background interference. The extracted text is recognized using off-the-shelf optical character recognition (OCR) software products. The object type, orientation, location, and text information are presented to the blind traveler as speech.

  8. Cross-Cultural adaptation of an instrument to computer accessibility evaluation for students with cerebral palsy

    Directory of Open Access Journals (Sweden)

    Gerusa Ferreira Lourenço

    2015-03-01

    Full Text Available The specific literature indicates that the successful education of children with cerebral palsy may require the implementation of appropriate assistive technology resources, allowing students to improve their performance and complete everyday tasks more efficiently and independently. To this end, these resources must be selected properly, emphasizing the importance of an appropriate initial assessment of the child and the possibilities of the resources available. The present study aimed to translate and adapt theoretically an American instrument that evaluates computer accessibility for people with cerebral palsy, in order to contextualize it for applicability to Brazilian students with cerebral palsy. The methodology involved the steps of translation and cross-cultural adaptation of this instrument, as well as the construction of a supplementary script for additional use of that instrument in the educational context. Translation procedures, theoretical and technical adaptation of the American instrument and theoretical analysis (content and semantics were carried out with the participation of professional experts of the special education area as adjudicators. The results pointed to the relevance of the proposal of the translated instrument in conjunction with the script built to the reality of professionals involved with the education of children with cerebral palsy, such as occupational therapists and special educators.

  9. Pervasive access to images and data--the use of computing grids and mobile/wireless devices across healthcare enterprises.

    NARCIS (Netherlands)

    Pohjonen, H.; Ross, P.; Blickman, J.G.; Kamman, R.L

    2007-01-01

    Emerging technologies are transforming the workflows in healthcare enterprises. Computing grids and handheld mobile/wireless devices are providing clinicians with enterprise-wide access to all patient data and analysis tools on a pervasive basis. In this paper, emerging technologies are presented th

  10. Assessment of Computer Technology Availability, Accessibility and Usage by Agricultural Education Student Teachers in Secondary Schools in Botswana

    Science.gov (United States)

    Hulela, K.; Rammolai, M.; Mpatane, W.

    2014-01-01

    This study examines the availability, accessibility and usability of computer as a form of information and communication technologies (ICTs) by student teachers in secondary schools. 44 out of 51 student teachers of Agriculture responded to the questionnaire. Means and percentages were used to analyze the data to establish the availability,…

  11. A Survey of Exemplar Teachers' Perceptions, Use, and Access of Computer-Based Games and Technology for Classroom Instruction

    Science.gov (United States)

    Proctor, Michael D.; Marks, Yaela

    2013-01-01

    This research reports and analyzes for archival purposes surveyed perceptions, use, and access by 259 United States based exemplar Primary and Secondary educators of computer-based games and technology for classroom instruction. Participating respondents were considered exemplary as they each won the Milken Educator Award during the 1996-2009…

  12. Pervasive access to images and data--the use of computing grids and mobile/wireless devices across healthcare enterprises.

    NARCIS (Netherlands)

    Pohjonen, H.; Ross, P.; Blickman, J.G.; Kamman, R.L

    2007-01-01

    Emerging technologies are transforming the workflows in healthcare enterprises. Computing grids and handheld mobile/wireless devices are providing clinicians with enterprise-wide access to all patient data and analysis tools on a pervasive basis. In this paper, emerging technologies are presented th

  13. Funding agency responses to federal requirements for public access to research results

    National Research Council Canada - National Science Library

    Kozlowski, Wendy

    2014-01-01

    .... While each agency has more or less stringent policies in place for preserving data and making it accessible, the mandate expands their application without additional resources or guidance on writing...

  14. Access to Financial Services: A Review of the Issues and Public Policy Objectives

    National Research Council Canada - National Science Library

    Stijn Claessens

    2006-01-01

    .... It provides data on the use of basic financial services by households and firms across a sample of countries, assesses the desirability of universal access, and provides an overview of the macro...

  15. Secure encapsulation and publication of biological services in the cloud computing environment.

    Science.gov (United States)

    Zhang, Weizhe; Wang, Xuehui; Lu, Bo; Kim, Tai-hoon

    2013-01-01

    Secure encapsulation and publication for bioinformatics software products based on web service are presented, and the basic function of biological information is realized in the cloud computing environment. In the encapsulation phase, the workflow and function of bioinformatics software are conducted, the encapsulation interfaces are designed, and the runtime interaction between users and computers is simulated. In the publication phase, the execution and management mechanisms and principles of the GRAM components are analyzed. The functions such as remote user job submission and job status query are implemented by using the GRAM components. The services of bioinformatics software are published to remote users. Finally the basic prototype system of the biological cloud is achieved.

  16. A computer scientist’s evaluation of publically available hardware Trojan benchmarks

    OpenAIRE

    Slayback, Scott M.

    2015-01-01

    Approved for public release; distribution is unlimited Dr. Hassan Salmani and Dr. Mohammed Tehranipoor have developed a collection of publically available hardware Trojans, meant to be used as common benchmarks for the analysis of detection and mitigation techniques. In this thesis, we evaluate a selection of these Trojans from the perspective of a computer scientist with limited electrical engineering background. Note that this thesis is also intended to serve as a supplement to the exist...

  17. Democratizing Computer Science Knowledge: Transforming the Face of Computer Science through Public High School Education

    Science.gov (United States)

    Ryoo, Jean J.; Margolis, Jane; Lee, Clifford H.; Sandoval, Cueponcaxochitl D. M.; Goode, Joanna

    2013-01-01

    Despite the fact that computer science (CS) is the driver of technological innovations across all disciplines and aspects of our lives, including participatory media, high school CS too commonly fails to incorporate the perspectives and concerns of low-income students of color. This article describes a partnership program -- Exploring Computer…

  18. The case for developing publicly-accessible datasets for health services research in the Middle East and North Africa (MENA region

    Directory of Open Access Journals (Sweden)

    El-Jardali Fadi

    2009-10-01

    Full Text Available Abstract Background The existence of publicly-accessible datasets comprised a significant opportunity for health services research to evolve into a science that supports health policy making and evaluation, proper inter- and intra-organizational decisions and optimal clinical interventions. This paper investigated the role of publicly-accessible datasets in the enhancement of health care systems in the developed world and highlighted the importance of their wide existence and use in the Middle East and North Africa (MENA region. Discussion A search was conducted to explore the availability of publicly-accessible datasets in the MENA region. Although datasets were found in most countries in the region, those were limited in terms of their relevance, quality and public-accessibility. With rare exceptions, publicly-accessible datasets - as present in the developed world - were absent. Based on this, we proposed a gradual approach and a set of recommendations to promote the development and use of publicly-accessible datasets in the region. These recommendations target potential actions by governments, researchers, policy makers and international organizations. Summary We argue that the limited number of publicly-accessible datasets in the MENA region represents a lost opportunity for the evidence-based advancement of health systems in the region. The availability and use of publicly-accessible datasets would encourage policy makers in this region to base their decisions on solid representative data and not on estimates or small-scale studies; researchers would be able to exercise their expertise in a meaningful manner to both, policy makers and the public. The population of the MENA countries would exercise the right to benefit from locally- or regionally-based studies, versus imported and in 'best cases' customized ones. Furthermore, on a macro scale, the availability of regionally comparable publicly-accessible datasets would allow for the

  19. The use of automated external defibrillators and public access defibrillators in the mountains: official guidelines of the international commission for mountain emergency medicine ICAR-MEDCOM.

    Science.gov (United States)

    Elsensohn, Fidel; Agazzi, Giancelso; Syme, David; Swangard, Michael; Facchetti, Gianluca; Brugger, Hermann

    2006-01-01

    In this article we propose guidelines for rational use of automated external defibrillators and public access defibrillators in the mountains. In cases of ventricular fibrillation and pulseless ventricular tachycardia, early defibrillation is the most effective therapy. Easy access to mountainous areas permits visitation by persons with high risks for sudden cardiac death, and medical trials show the benefit of exercising in moderate altitude. The introduction of public access defibrillators in popular areas in the mountains may lead to a reduction of fatal outcome of cardiac arrest. Public access defibrillators should be placed with priority in popular ski areas, in busy mountain huts and restaurants, at mass-participation events, and in remote but often-visited locations that do not have medical coverage. Automated external defibrillators should be available to first-responder groups and mountain-rescue teams. It is important that people know how to perform cardiopulmonary resuscitation and how to use public access defibrillators and automated external defibrillators.

  20. Access to contraception by minors in Jamaica: A public health concern

    Directory of Open Access Journals (Sweden)

    Tazhmoye V. Crawford

    2009-10-01

    Full Text Available Background: Access to contraceptive by minors (pre-adolescents and adolescents has spurred policy and legislative debates, part of which is that in an effort to successfully meet government’s objective of a healthy sexual lifestyle among minors. Aims: This study examined factors affecting sexual reproductive health in minors, namely: access to contraceptive advice and treatment, pregnancy, number of sexual partners, sexually transmitted infections (STIs and confidentiality. Materials and Methods: This research involved quantitative and qualitative data. Two hundred and thirty eight sexually active cases were investigated in Jamaica by the researchers, during the period 2006-2007. The age group population was 9-11, 12-14, and 15-17. Results: The study showed that access to contraceptive advice and treatment by minors was more favorable to males than females. The difference in access to contraceptive between male and female was statistically significant (x² = 20.16, p<0.05. Of the 80 male respondents, who are contraceptive users, 11 encountered challenges in legitimately accessing contraceptive methods, while 38 of the 40 female users also encountered challenges. This resulted in unintended pregnancies and impregnation (33.2%, as well as the contracting of STIs (21%. Conclusion: The findings of this study will be important in informing the development of reproductive health services and family life education programs for pre-adolescents and adolescents in Jamaica and other Caribbean countries.

  1. Access to contraception by minors in Jamaica: A public health concern

    Directory of Open Access Journals (Sweden)

    Tazhmoye V Crawford

    2009-01-01

    Full Text Available Background : Access to contraceptive by minors (pre-adolescents and adolescents has spurred policy and legislative debates, part of which is that in an effort to successfully meet government′s objective of a healthy sexual lifestyle among minors. Aims : This study examined factors affecting sexual reproductive health in minors, namely: access to contraceptive advice and treatment, pregnancy, number of sexual partners, sexually transmitted infections (STIs and confidentiality. Materials and Methods: This research involved quantitative and qualitative data. Two hundred and thirty eight sexually active cases were investigated in Jamaica by the researchers, during the period 2006-2007. The age group population was 9-11, 12-14, and 15-17. Results : The study showed that access to contraceptive advice and treatment by minors was more favorable to males than females. The difference in access to contraceptive between male and female was statistically significant (x΂ = 20.16, p<0.05. Of the 80 male respondents, who are contraceptive users, 11 encountered challenges in legitimately accessing contraceptive methods, while 38 of the 40 female users also encountered challenges. This resulted in unintended pregnancies and impregnation (33.2%, as well as the contracting of STIs (21%. Conclusion : The findings of this study will be important in informing the development of reproductive health services and family life education programs for pre-adolescents and adolescents in Jamaica and other Caribbean countries.

  2. Public and private dental services in NSW: a geographic information system analysis of access to care for 7 million Australians.

    Science.gov (United States)

    Willie-Stephens, Jenny; Kruger, Estie; Tennant, Marc

    2014-06-01

    To investigate the distribution of public and private dental practices in NSW in relation to population distribution and socioeconomic status. Dental practices (public and private) were mapped and overlayed with Census data on Collection District population and Socio-Economic Indexes for Areas (SEIFA). Overall, there was an uneven geographic distribution of public and private dental practices across NSW. When the geographic distribution was compared to population socioeconomics it was found that in rural NSW, 12% of the most disadvantaged residents lived further than 50km from a public dental practice, compared to 0% of the least disadvantaged. In Sydney, 9% of the three most disadvantaged groups lived greater than 7.5km from a public dental practice, compared to 21% of the three least disadvantaged groups. The findings of this study can contribute to informing decisions to determine future areas for focus of dental resource development (infrastructure and workforce) and identifying subgroups in the population (who are geographically isolated from accessing care) where public health initiatives focused on amelioration of disease consequences should be a focus.

  3. Modelling public transport route choice, with multiple access and egress modes

    NARCIS (Netherlands)

    Brands, T.; Romph, de E.; Veitch, T.; Cook, J.

    2014-01-01

    Public transport (PT) is important, because the current traffic system faces well known problems like congestion, environmental impact and use of public space. To be able to assess the effects of policy measures properly, it is necessary to model the behavior of the (PT) traveler in a realistic way.

  4. How Public Universities Can Promote Access and Success for All Students

    Science.gov (United States)

    Flores, Antoinette

    2014-01-01

    The nation's public universities--a key vehicle of upward mobility--must do more to even the playing field for all students. As it currently stands, students from the least advantaged populations earn degrees at a lower rate and are burdened with a greater portion of debt than their peers. However, some standout public universities are reversing…

  5. Novel Phenotypic Outcomes Identified for a Public Collection of Approved Drugs from a Publicly Accessible Panel of Assays.

    Directory of Open Access Journals (Sweden)

    Jonathan A Lee

    Full Text Available Phenotypic assays have a proven track record for generating leads that become first-in-class therapies. Whole cell assays that inform on a phenotype or mechanism also possess great potential in drug repositioning studies by illuminating new activities for the existing pharmacopeia. The National Center for Advancing Translational Sciences (NCATS pharmaceutical collection (NPC is the largest reported collection of approved small molecule therapeutics that is available for screening in a high-throughput setting. Via a wide-ranging collaborative effort, this library was analyzed in the Open Innovation Drug Discovery (OIDD phenotypic assay modules publicly offered by Lilly. The results of these tests are publically available online at www.ncats.nih.gov/expertise/preclinical/pd2 and via the PubChem Database (https://pubchem.ncbi.nlm.nih.gov/ (AID 1117321. Phenotypic outcomes for numerous drugs were confirmed, including sulfonylureas as insulin secretagogues and the anti-angiogenesis actions of multikinase inhibitors sorafenib, axitinib and pazopanib. Several novel outcomes were also noted including the Wnt potentiating activities of rotenone and the antifolate class of drugs, and the anti-angiogenic activity of cetaben.

  6. Cybersecurity in radiology: Access of public hot spots and public Wi-Fi and prevention of cybercrimes and HIPAA violations.

    Science.gov (United States)

    Gerard, Perry; Kapadia, Neil; Acharya, Jay; Chang, Patricia T; Lefkovitz, Zvi

    2013-12-01

    The purpose of this article is to review the steps that can be taken to ensure secure transfer of information over public and home networks, given the increasing utilization of mobile devices in radiology. With the rapid technologic developments in radiology, knowledge of various technical aspects is crucial for any practicing radiologist. Utilization of mobile devices, such as laptops, tablets, and even cellular phones, for reading radiologic studies has become increasingly prevalent. With such usage comes a need to ensure that both the user's and the patient's private information is protected. There are several steps that can be taken to protect sensitive information while using public networks. These steps include being diligent in reviewing the networks to which one connects, ensuring encrypted connections to web-sites, using strong passwords, and using a virtual private network and a firewall. As the role of information technology in modern radiology practice becomes more critical, these safety mechanisms must be addressed when viewing studies on any mobile device.

  7. A Comparative Study of Students' Access to and Utilization of Learning Resources in Selected Public and Private Universities in Southwest, Nigeria

    Science.gov (United States)

    Lawal, B. O.; Viatonu, Olumuyiwa

    2017-01-01

    The study investigated students' access to and utilization of some learning resources in selected public and private universities in southwest Nigeria. Stratified random sampling technique was used to select 585 (295 public and 290 private) students from 12 (six public and six private) universities in southwest Nigeria. Two instruments--Cost and…

  8. Is chemical synthetic accessibility computationally predictable for drug and lead-like molecules? A comparative assessment between medicinal and computational chemists.

    Science.gov (United States)

    Bonnet, Pascal

    2012-08-01

    The design of lead and drug-like molecules with expected desired properties and feasible chemical synthesis is one of the main objectives of computational and medicinal chemists. Prediction of synthetic feasibility of de novo molecules is often achieved by the use of in-silico tools or by advices received from medicinal and to a lesser extent from computational chemists. However, the validation of predictive tools is often performed on selection of compounds from external databases. In this study, we compare the synthetic accessibility (SA) score predicted by SYLVIA and the score estimated by medicinal chemists who synthesized the molecules. Therefore, we solicited 11 bench-based medicinal and computational chemists to score 119 lead-like molecules synthesized by same medicinal chemists. Their scores were compared with score calculated from SYLVIA software. Irrespective of the starting material database, we obtained a good agreement between average of medicinal and computational chemist scores for the ensemble of compounds; as well as between all chemists and SYLVIA SA scores with a correlation of 0.7. Furthermore, analysis of the marketed drugs since 1970 shows some consistency in average SYLVIA SA scores. Compounds entered in different phases of clinical trials show some large variation in synthetic accessibility scores due to natural-derived molecular scaffolds. Here, we proposed that the selection of compounds based on synthetically accessibility should not be done solely by one individual chemist to avoid personal gut-feeling appreciation from its experience but by a group of medicinal and computational chemists. By assessing synthetic accessibility of hundreds of compounds synthesized by medicinal chemists, we show that SYLVIA can be used efficiently to rank and prioritize virtual compound libraries in drug discovery processes.

  9. An Exploratory Study of Malaysian Publication Productivity in Computer Science and Information Technology.

    Science.gov (United States)

    Gu, Yinian

    2002-01-01

    Explores the Malaysian computer science and information technology publication productivity as indicated by data collected from three Web-based databases. Relates possible reasons for the amount and pattern of contributions to the size of researcher population, the availability of refereed scholarly journals, and the total expenditure allocated to…

  10. Sustainability and public access to nature: Contesting the right to roam

    Science.gov (United States)

    Daniel R. Williams

    2001-01-01

    This paper discusses the importance of cultural and institutional differences in rights of access to nature for sustainable tourism management. Drawing on the insights from the papers contained in this issue of the Journal of Sustainable Tourism, this introduction highlights two overarching themes. The first is the ambiguous/problematic role of science...

  11. 5 CFR 2634.603 - Custody of and access to public reports.

    Science.gov (United States)

    2010-01-01

    ... financial disclosure reports filed by persons within that agency. The agency personnel director, who does... statement with her agency. The financial institution cannot be given access to the disclosure form for... EXECUTIVE BRANCH FINANCIAL DISCLOSURE, QUALIFIED TRUSTS, AND CERTIFICATES OF DIVESTITURE Procedure §...

  12. Fulfilling an Institutional and Public Good Mission: A Case Study of Access

    Science.gov (United States)

    Batman, Renee F.

    2013-01-01

    Access to higher education has been and remains a critical issue, yet research typically focuses on students and programs which may overlook the role of the faculty. Through an in-depth case study, the perspectives of tenured and tenure-track faculty at a predominately White, Midwestern land-grant, research institution are described as they relate…

  13. On Open Access to Research: The Green, the Gold, and the Public Good

    Science.gov (United States)

    Roach, Audra K.; Gainer, Jesse

    2013-01-01

    In this column the authors discuss barriers to worldwide open access to peer-reviewed journal articles online and how they might be addressed by literacy scholars. They highlight economic and ethical problems associated with the current subscription-based system for distributing articles (which sometimes works against the ideals of research and…

  14. On Open Access to Research: The Green, the Gold, and the Public Good

    Science.gov (United States)

    Roach, Audra K.; Gainer, Jesse

    2013-01-01

    In this column the authors discuss barriers to worldwide open access to peer-reviewed journal articles online and how they might be addressed by literacy scholars. They highlight economic and ethical problems associated with the current subscription-based system for distributing articles (which sometimes works against the ideals of research and…

  15. Increasing Public Access to University Qualifications: Evolution of The University of the West Indies Open Campus

    Science.gov (United States)

    Thomas, Michael L.; Soares, Judith

    2009-01-01

    This paper traces the evolution of The University of the West Indies' Open Campus (UWIOC), which is expected to expand service and increase access to the underserved communities of the Eastern Caribbean. At present, UWI, which caters to the needs of the 16 far flung countries of the Commonwealth Caribbean, has not been able to fully serve these…

  16. Introduction and some Ideas as well as Visions on an Open Access European Psychology Publication Platform

    Directory of Open Access Journals (Sweden)

    GÜNTER KRAMPEN

    2009-06-01

    Full Text Available After a short description of the organization, tasks, and activities of the Institute for Psychology Information (ZPID – Leibniz-Institute/Germany possibilities of enhancing European cooperation on psychology publication issues are stressed upon. Arguments for its necessity refer to some turning points of history in the languages of science and to some problems of Anglo-American dominance in psychology publications, which are illustrated by bibliometric results on authors’ affiliations and publication languages represented in the PsycINFO database. The vision of a European Psychology Publication Platform (EPPP is developed including some considerations about its objectives and scope, principles, submission procedure and guidelines as well as review process and evaluation.

  17. Development of a Selection Measure for Access to Public Employment Assistance Programs.

    Science.gov (United States)

    Peterson, Gary W.

    1986-01-01

    Provides a prototype measure of employability to be used as a tool in public employment programs. Considers political and ethical implications pertaining to the use of such a selection instrument for welfare recipients. (Author/ABB)

  18. Learning From Engineering and Computer Science About Communicating The Field To The Public

    Science.gov (United States)

    Moore, S. L.; Tucek, K.

    2014-12-01

    The engineering and computer science community has taken the lead in actively informing the public about their discipline, including the societal contributions and career opportunities. These efforts have been intensified in regards to informing underrepresented populations in STEM about engineering and computer science. Are there lessons to be learned by the geoscience community in communicating the societal impacts and career opportunities in the geosciences, especially in regards to broadening participation and meeting Next Generation Science Standards? An estimated 35 percent increase in the number of geoscientist jobs in the United States forecasted for the period between 2008 and 2018, combined with majority populations becoming minority populations, make it imperative that we improve how we increase the public's understanding of the geosciences and how we present our message to targeted populations. This talk will look at recommendations from the National Academy of Engineering's Changing the Conversation: Messages for Improving the Public Understanding of Engineering, and communication strategies by organizations such as Code.org, to highlight practices that the geoscience community can adopt to increase public awareness of the societal contributions of the geosciences, the career opportunities in the geosciences, and the importance of the geosciences in the Next Generation Science Standards. An effort to communicate geoscience to the public, Earth is Calling, will be compared and contrasted to these efforts, and used as an example of how geological societies and other organizations can engage the general public and targeted groups about the geosciences.

  19. Data publication and dissemination of interactive keys under the open access model

    Directory of Open Access Journals (Sweden)

    Lyubomir Penev

    2009-09-01

    Full Text Available The concepts of publication, citation and dissemination of interactive keys and other online keys are discussed and illustrated by a sample paper published in the present issue (doi: 10.3897/zookeys.21.271. The present model is based on previous experience with several existing examples of publishing online keys. However, this model also suggests ways to publish, cite, preserve, disseminate and reuse the original data files to the benefit of the authors, future workers, and society in general. To be regarded as a ''formal scientific publication,'' an online key should satisfy the same criteria of peer review, registration, persistence, bibliographic description, etc., as conventional publications. Keys can be published in a form of either ''static'\\''dynamic'' publications. We define a ''static'' publication as a discrete unit of information preserved in a persistent and unchangeable way on the publisher’s Web site and/or on paper and consequently in conventional/electronic libraries and archives. This contrasts with the nature of the Internet, which allows and tends to encourage updating and improvement on a continuing basis. We call ''dynamic'' a publication of an interactive key on a Web site where its contents can be continuously updated. ''Dynamic'' publications meet some of the criteria of a ''formal scientific publication'' (identification, citation and location, while they lack other important features of it (persistence, archiving, indexing, science metric and citation metric services. Dynamic Web-based interactive keys may benefit from publishing the first version of their underlying datasets in a form of “formal scientific publication”. We define here the minimum set of data files to be published for several different platforms (Intkey, Lucid2, Lucid3, MX to ensure both (1 priority, identification, location and citation of the firstly published work and (2 future use and re-use of the keys.

  20. Final Technical Report - Publication and Retrieval of Computational Chemical-Physical Data Via the Semantic Web

    Energy Technology Data Exchange (ETDEWEB)

    Ostlund, Neil [Chemical Semantics, Inc.,Gainesville, FL (United States)

    2017-07-20

    This research showed the feasibility of applying the concepts of the Semantic Web to Computation Chemistry. We have created the first web portal (www.chemsem.com) that allows data created in the calculations of quantum chemistry, and other such chemistry calculations to be placed on the web in a way that makes the data accessible to scientists in a semantic form never before possible. The semantic web nature of the portal allows data to be searched, found, and used as an advance over the usual approach of a relational database. The semantic data on our portal has the nature of a Giant Global Graph (GGG) that can be easily merged with related data and searched globally via a SPARQL Protocol and RDF Query Language (SPARQL) that makes global searches for data easier than with traditional methods. Our Semantic Web Portal requires that the data be understood by a computer and hence defined by an ontology (vocabulary). This ontology is used by the computer in understanding the data. We have created such an ontology for computational chemistry (purl.org/gc) that encapsulates a broad knowledge of the field of computational chemistry. We refer to this ontology as the Gainesville Core. While it is perhaps the first ontology for computational chemistry and is used by our portal, it is only a start of what must be a long multi-partner effort to define computational chemistry. In conjunction with the above efforts we have defined a new potential file standard (Common Standard for eXchange – CSX for computational chemistry data). This CSX file is the precursor of data in the Resource Description Framework (RDF) form that the semantic web requires. Our portal translates CSX files (as well as other computational chemistry data files) into RDF files that are part of the graph database that the semantic web employs. We propose a CSX file as a convenient way to encapsulate computational chemistry data.

  1. Public Funding and Budgetary Challenges To Providing Universal Access To Primary Education in Sub-Saharan Africa

    Science.gov (United States)

    Omwami, Edith Mukudi; Keller, Edmond J.

    2010-02-01

    Budgetary capacity that would allow for the public funding of the provision of universal access to primary education is lacking in many sub-Saharan economies. National revenues significantly lag behind the overall economic productivity measure of GDP. Analysis of data derived from UNESCO and UNDP for 2004 shows that governments in the region spend far less in US dollars per unit cost on primary education than do developed countries. Increasing the unit cost of education in order to enable a government to guarantee universal primary education would take away resources from other tiers of the education system in many countries in the region. The alternative is to universalise access, despite existing budget allocation constraints, and thereby further compound the problems of poor infrastructure and limited human resource capacity that continue to compromise education quality in sub-Saharan Africa.

  2. Increasing the impact of medical image computing using community-based open-access hackathons: The NA-MIC and 3D Slicer experience.

    Science.gov (United States)

    Kapur, Tina; Pieper, Steve; Fedorov, Andriy; Fillion-Robin, J-C; Halle, Michael; O'Donnell, Lauren; Lasso, Andras; Ungi, Tamas; Pinter, Csaba; Finet, Julien; Pujol, Sonia; Jagadeesan, Jayender; Tokuda, Junichi; Norton, Isaiah; Estepar, Raul San Jose; Gering, David; Aerts, Hugo J W L; Jakab, Marianna; Hata, Nobuhiko; Ibanez, Luiz; Blezek, Daniel; Miller, Jim; Aylward, Stephen; Grimson, W Eric L; Fichtinger, Gabor; Wells, William M; Lorensen, William E; Schroeder, Will; Kikinis, Ron

    2016-10-01

    The National Alliance for Medical Image Computing (NA-MIC) was launched in 2004 with the goal of investigating and developing an open source software infrastructure for the extraction of information and knowledge from medical images using computational methods. Several leading research and engineering groups participated in this effort that was funded by the US National Institutes of Health through a variety of infrastructure grants. This effort transformed 3D Slicer from an internal, Boston-based, academic research software application into a professionally maintained, robust, open source platform with an international leadership and developer and user communities. Critical improvements to the widely used underlying open source libraries and tools-VTK, ITK, CMake, CDash, DCMTK-were an additional consequence of this effort. This project has contributed to close to a thousand peer-reviewed publications and a growing portfolio of US and international funded efforts expanding the use of these tools in new medical computing applications every year. In this editorial, we discuss what we believe are gaps in the way medical image computing is pursued today; how a well-executed research platform can enable discovery, innovation and reproducible science ("Open Science"); and how our quest to build such a software platform has evolved into a productive and rewarding social engineering exercise in building an open-access community with a shared vision.

  3. APLIKASI ONLINE PUBLIC ACCESS CATALOQUE (OPAC BERBASIS ANDROID SEBAGAI SARANA TEMU KEMBALI INFORMASI DI PERPUSTAKAAN UNIVERSITAS PENDIDIKAN GANESHA

    Directory of Open Access Journals (Sweden)

    Putu Tika Parmawati

    2016-08-01

    Full Text Available Abstrak Penelitian ini bertujuan untuk mengembangkan perangkat lunak aplikasi Online Public Access Cataloque (OPAC berbasis android. Jenis penelitian ini merupakan Research and Development (R & D dengan metode pengembangan menggunakan model prototyping. Pengembangan sistem informasi layanan audio visual berbasis video streaming dengan enam tahap, yaitu : 1 Tahap pengumpulan kebutuhan dan perbaikan, 2 Tahap perancangan desain cepat (desain awal, 3 Tahap membangun prototipe, 4 Tahap evaluasi prototype, 5 Tahap perbaikan prototype, dan 6 Tahap rekayasa produk. Penentuan tingkat kelayakan aplikasi Online Public Access Cataloque (OPAC berbasis android berdasarkan uji validasi ahli bidang teknologi informasi dan uji coba terbatas pada pengguna. Hasil uji coba sebagai berikut : 1 Pengembangan aplikasi Online Public Access Cataloque (OPAC berbasis android sudah sesuai dengan spesifikasi yang telah ditentukan sebagai aplikasi penelusuran informasi koleksi buku teks umum secara online melalui smartphone. 2 Indikator penilaian dari program ini adalah kebenaran atau ketepatan operasional sistem, ketegaran, keterluasan, keterpakaian ulang, efisiensi atau kinerja, portabilitas, integritas, modularitas, keterbacaan mendapat kualifikasi cukup baik, sedangkan verifikasi mendapat kualifikasi baik. 3 Secara umum dari hasil penilaian tersebut aplikasi OPAC berbasis android ini cukup layak untuk digunakan sebagai alternatif pelengkap pemberian layanan penelusuran informasi koleksi buku teks umum di Perpustakaan Undiksha. Kata Kunci: OPAC, android, dan temu kembali informasi Abstract Aim of this study to develop the software of Online Public Access Cataloque (OPAC based on android. Research and Development (R & D design was applied in this study which was developed through prototyping models. The software was constructed through six stages, namely: 1 needs analysis and repairment, 2 rapid design (preliminary design, 3 prototypes building, 4 prototype evaluation, 5

  4. [Open access to academic scholarship as a public policy resource: a study of the Capes database on Brazilian theses and dissertations].

    Science.gov (United States)

    da Silva Rosa, Teresa; Carneiro, Maria José

    2010-12-01

    Access to scientific knowledge is a valuable resource than can inform and validate positions taken in formulating public policy. But access to this knowledge can be challenging, given the diversity and breadth of available scholarship. Communication between the fields of science and of politics requires the dissemination of scholarship and access to it. We conducted a study using an open-access search tool in order to map existent knowledge on a specific topic: agricultural contributions to the preservation of biodiversity. The present article offers a critical view of access to the information available through the Capes database on Brazilian theses and dissertations.

  5. Assessment inequality in access to public cardiovascular health services in Iran

    Science.gov (United States)

    Meskarpour-Amiri, Mohammad; Dopeykar, Nooredin; Ameryoun, Ahmad; Mehrabi Tavana, Ali

    2016-01-01

    Background: Timely access to cardiovascular health services is necessary to prevent heart damages. The present study examined inequality in geographical distribution of cardiovascular health services in Iran. Methods: Present study is a cross-sectional study conducted using demographic data from all Iranian provinces (31 provinces) from 2012 census by the Statistics Center of Iran (SCI). The Gini coefficients of CCU beds and cardiologists were used to assess equality in access to cardiovascular health services in Iran. MS Excel software was used to calculate Gini coefficients. Results: The proportions of CCU bed and cardiologist per 100,000 population were 4.88 and 1.27, respectively; also the Gini coefficients were 0.129 and 0.045, respectively. Conclusion: Descriptive statistics showed a skewness in distribution of pubic cardiovascular health services in Iran, though Gini coefficient revealed no significant inequality. However, equal distribution of CCU beds and cardiovascular specialists does not mean they are sufficiently available in Iran. PMID:28210585

  6. Open access publishing: A review of publications originating from a medical college in Nigeria

    Directory of Open Access Journals (Sweden)

    Wasiu Lanre Adeyemo

    2014-01-01

    Full Text Available Background: Open Access (OA publishing has gained tremendous acceptance in academic publishing over the last decade. This paper reviews the number and trend of OA publishing of research papers originating from College of Medicine University of Lagos (CMUL, Nigeria. Materials and Methods: A computerized literature search of PubMed for all published articles originating from CMUL between 1976 and 2013 was conducted. The search phrase used was "College of Medicine University of Lagos". The search was conducted on March 30, 2013. All articles tagged "Free article" or "Free PubMed article" were selected. Results: A total of 1255 articles appeared in PubMed between 1976 and 2013 (37 years. At the first level of screening, 162 articles were identified as "Open Access". Second level of screening to eliminate articles not originating from CMUL identified 124 articles. Only 15 OA articles were published between 1976 and 2000 (24 years, 11 articles appeared as "Open Access" journals between 2001 and 2005 (5 years, 44 between 2006 and 2010 (5 years, and 54 articles were published between 2011 and 2013. Twenty-four of these articles were published in Nigerian OA Journals, and the remaining articles (100 in foreign journals. Conclusions: OA publishing is becoming popular among researchers at CMUL. This trend has been observed worldwide. Nigerian researchers are advised that while going along with the worldwide trend, they should however, be aware of predatory OA journals and publishers. The criteria for determining predatory OA publishers can be accessed via: www.scholarlyoa.com/publishers.

  7. World Wide Webs: Crossing the Digital Divide through Promotion of Public Access

    Science.gov (United States)

    Coetzee, Liezl

    “As Bill Gates and Steve Case proclaim the global omnipresence of the Internet, the majority of non-Western nations and 97 per cent of the world's population remain unconnected to the net for lack of money, access, or knowledge. This exclusion of so vast a share of the global population from the Internet sharply contradicts the claims of those who posit the World Wide Web as a ‘universal' medium of egalitarian communication.” (Trend 2001:2)

  8. Project Integration Architecture (PIA) and Computational Analysis Programming Interface (CAPRI) for Accessing Geometry Data from CAD Files

    Science.gov (United States)

    Benyo, Theresa L.

    2002-01-01

    Integration of a supersonic inlet simulation with a computer aided design (CAD) system is demonstrated. The integration is performed using the Project Integration Architecture (PIA). PIA provides a common environment for wrapping many types of applications. Accessing geometry data from CAD files is accomplished by incorporating appropriate function calls from the Computational Analysis Programming Interface (CAPRI). CAPRI is a CAD vendor neutral programming interface that aids in acquiring geometry data directly from CAD files. The benefits of wrapping a supersonic inlet simulation into PIA using CAPRI are; direct access of geometry data, accurate capture of geometry data, automatic conversion of data units, CAD vendor neutral operation, and on-line interactive history capture. This paper describes the PIA and the CAPRI wrapper and details the supersonic inlet simulation demonstration.

  9. Public Access Points, Boat and Canoe Launches, Published in 2006, 1:4800 (1in=400ft) scale, Jefferson County Land Information Office.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Public Access Points dataset, published at 1:4800 (1in=400ft) scale, was produced all or in part from Published Reports/Deeds information as of 2006. It is...

  10. Erotized, AIDS-HIV information on public-access television: a study of obscenity, state censorship and cultural resistance.

    Science.gov (United States)

    Lukenbill, W B

    1998-06-01

    This study analyzes court records of a county-level obscenity trial in Austin, Texas, and the appeal of the guilty verdict beginning with a Texas appellate court up to the U.S. Supreme Court of two individuals who broadcast erotized AIDS and HIV safer sex information on a public-access cable television. The trial and appellate court decisions are reviewed in terms of argument themes, and the nature of sexual value controversy is outlined. Erotic materials often conflict with broad-based sexual and community values, and providing erotized HIV and AIDS information products can be a form of radical political action designed to force societal change. This study raises question as to how this trial and this type of informational product might affect the programs and activities of information resource centers, community-based organizations, libraries, and the overall mission of public health education.

  11. Error control and channel access technique of the computer-based truck dispatching system in the open-pit mine

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, G.; Wang, Y.; Huang, Z. [China University of Mining and Technology (China)

    1994-06-01

    The disposition of hardware and software of a computer-based truck dispatching system for open-pit mine are described in the paper. The advantages of random channel access technique of the CSMA/CA/CD of the SWARQ error control and of encoding of constant proportion code were proved by theoretical analysis. The block diagram of the main communication software is given. 3 refs., 4 figs.

  12. Auditing Access to Outpatient Rehabilitation Services for Children With Traumatic Brain Injury and Public Insurance in Washington State.

    Science.gov (United States)

    Fuentes, Molly M; Thompson, Leah; Quistberg, D Alex; Haaland, Wren L; Rhodes, Karin; Kartin, Deborah; Kerfeld, Cheryl; Apkon, Susan; Rowhani-Rahbar, Ali; Rivara, Frederick P

    2017-09-01

    To identify insurance-based disparities in access to outpatient pediatric neurorehabilitation services. Audit study with paired calls, where callers posed as a mother seeking services for a simulated child with history of severe traumatic brain injury and public or private insurance. Outpatient rehabilitation clinics. Sample of rehabilitation clinics (N=287): 195 physical therapy (PT) clinics, 109 occupational therapy (OT) clinics, 102 speech therapy (ST) clinics, and 11 rehabilitation medicine clinics. Not applicable. Acceptance of public insurance and the number of business days until the next available appointment. Therapy clinics were more likely to accept private insurance than public insurance (relative risk [RR] for PT clinics, 1.33; 95% confidence interval [CI], 1.22-1.44; RR for OT clinics, 1.40; 95% CI, 1.24-1.57; and RR for ST clinics, 1.42; 95% CI, 1.25-1.62), with no significant difference for rehabilitation medicine clinics (RR, 1.10; 95% CI, 0.90-1.34). The difference in median wait time between clinics that accepted public insurance and those accepting only private insurance was 4 business days for PT clinics and 15 days for ST clinics (P≤.001), but the median wait time was not significantly different for OT clinics or rehabilitation medicine clinics. When adjusting for urban and multidisciplinary clinic statuses, the wait time at clinics accepting public insurance was 59% longer for PT (95% CI, 39%-81%), 18% longer for OT (95% CI, 7%-30%), and 107% longer for ST (95% CI, 87%-130%) than that at clinics accepting only private insurance. Distance to clinics varied by discipline and area within the state. Therapy clinics were less likely to accept public insurance than private insurance. Therapy clinics accepting public insurance had longer wait times than did clinics that accepted only private insurance. Rehabilitation professionals should attempt to implement policy and practice changes to promote equitable access to care. Copyright © 2017

  13. Effectiveness and Safety of Computer-controlled Periodontal Ligament Injection System in Endodontic Access to the Mandibular Posterior Teeth

    Institute of Scientific and Technical Information of China (English)

    Quan Jing; Kuo Wan; Xiao-jun Wang; Lin Ma

    2014-01-01

    Objective To evaluate the effectiveness and safety of a computer-controlled periodontal ligament (PDL) injection system to the local soft tissues as the primary technique in endodontic access to mandibular posterior teeth in patients with irreversible pulpitis. Methods A total of 162 Chinese patients who had been diagnosed with irreversible pulpitis in their mandibular posterior teeth without acute infection or inflammation in the periodontal tissues were enrolled in this clinical study. The patients were divided into 3 groups according to the position of the involved tooth:the premolar group (PM, n=38), first molar group (FM, n=66), and second molar group (SM, n=58). All the patients received computer-controlled PDL injection with 4%articaine and 1∶100 000 epinephrine. Immediately after the injection, endodontic access was performed, and the degree of pain during the treatment was evaluated by the patients using Visual Analogue Scale for pain. The success rates were compared among the 3 groups. The responses of local soft tissues were evaluated 3-8 days and 3 weeks after the procedure. Results The overall success rate was 76.5%. There was a significant difference in success rates among the PM, FM, and SM groups (92.1%, 53.0%, 93.1%, respectively;χ2=34.3, P Conclusion The computer-controlled PDL injection system demonstrates both satisfactory anesthetic effects and safety in local soft tissues as primary anesthetic technique in endodontic access to the mandibular posterior teeth in patients with irreversible pulpitis.

  14. Franchise Fees and Public, Educational and Government (PEG) Access. Report to the Minnesota Legislature.

    Science.gov (United States)

    Minnesota State Dept. of Public Service, St. Paul. Energy Div.

    Franchise fees are a tax imposed on a private entity to compensate a municipality for use of a public property for private gain. The Telecommunications Act of 1996 grants municipalities the right to assess a 5% franchise fee to both cable companies and competitors of cable companies, such as operators of open video systems. The Minnesota State…

  15. 77 FR 197 - Federal Acquisition Regulation; Public Access to the Federal Awardee Performance and Integrity...

    Science.gov (United States)

    2012-01-03

    ... will soon be able to evaluate the business ethics and quality of potential contractor clients... public the data in FAPIIS will benefit contractors with records of business integrity and performance... and authorized users performing business on behalf of the Government will be able to view the...

  16. 76 FR 4188 - Federal Acquisition Regulation; Public Access to the Federal Awardee Performance and Integrity...

    Science.gov (United States)

    2011-01-24

    ... business ethics and quality of prospective contractors competing for Federal contracts. That rulemaking... personal and/or business confidential information provided. FOR FURTHER INFORMATION CONTACT: Mr. Edward... business integrity, but lacks the functionality to make information immediately available to the public as...

  17. Predictors of Access to Sex Education for Children with Intellectual Disabilities in Public Schools

    Science.gov (United States)

    Barnard-Brak, Lucy; Schmidt, Marcelo; Chesnut, Steven; Wei, Tianlan; Richman, David

    2014-01-01

    Data from the National Longitudinal Transition Study-2 (SRI International, 2002) were analyzed to identify variables that predicted whether individuals with intellectual disability (ID) received sex education in public schools across the United States. Results suggested that individuals receiving special education services without ID were only…

  18. Accessing and Using Public Educational Data Sources for School and Leadership Research. Implications from UCEA

    Science.gov (United States)

    Baker, Bruce

    2008-01-01

    Much educational policy research can be conducted with existing data sources, either created for research purposes or for managing and maintaining information on public schooling systems. These often under-used resources offer rich research opportunities on the relationship between teacher and principal careers, school and district differences and…

  19. Data publication and dissemination of interactive keys under the open access model

    Science.gov (United States)

    The concepts of publication, citation and dissemination of interactive keys and other online keys are discussed and illustrated by a sample paper published in the present issue (doi: 10.3897/zookeys.21.271). The present model is based on previous experience with several existing examples of publishi...

  20. Predictors of Access to Sex Education for Children with Intellectual Disabilities in Public Schools

    Science.gov (United States)

    Barnard-Brak, Lucy; Schmidt, Marcelo; Chesnut, Steven; Wei, Tianlan; Richman, David

    2014-01-01

    Data from the National Longitudinal Transition Study-2 (SRI International, 2002) were analyzed to identify variables that predicted whether individuals with intellectual disability (ID) received sex education in public schools across the United States. Results suggested that individuals receiving special education services without ID were only…

  1. Identifying strategies to improve access to credible and relevant information for public health professionals: a qualitative study

    Directory of Open Access Journals (Sweden)

    Simpson E Hatheway

    2006-04-01

    Full Text Available Abstract Background Movement towards evidence-based practices in many fields suggests that public health (PH challenges may be better addressed if credible information about health risks and effective PH practices is readily available. However, research has shown that many PH information needs are unmet. In addition to reviewing relevant literature, this study performed a comprehensive review of existing information resources and collected data from two representative PH groups, focusing on identifying current practices, expressed information needs, and ideal systems for information access. Methods Nineteen individual interviews were conducted among employees of two domains in a state health department – communicable disease control and community health promotion. Subsequent focus groups gathered additional data on preferences for methods of information access and delivery as well as information format and content. Qualitative methods were used to identify themes in the interview and focus group transcripts. Results Informants expressed similar needs for improved information access including single portal access with a good search engine; automatic notification regarding newly available information; access to best practice information in many areas of interest that extend beyond biomedical subject matter; improved access to grey literature as well as to more systematic reviews, summaries, and full-text articles; better methods for indexing, filtering, and searching for information; and effective ways to archive information accessed. Informants expressed a preference for improving systems with which they were already familiar such as PubMed and listservs rather than introducing new systems of information organization and delivery. A hypothetical ideal model for information organization and delivery was developed based on informants' stated information needs and preferred means of delivery. Features of the model were endorsed by the subjects who

  2. Identifying strategies to improve access to credible and relevant information for public health professionals: a qualitative study.

    Science.gov (United States)

    LaPelle, Nancy R; Luckmann, Roger; Simpson, E Hatheway; Martin, Elaine R

    2006-04-05

    Movement towards evidence-based practices in many fields suggests that public health (PH) challenges may be better addressed if credible information about health risks and effective PH practices is readily available. However, research has shown that many PH information needs are unmet. In addition to reviewing relevant literature, this study performed a comprehensive review of existing information resources and collected data from two representative PH groups, focusing on identifying current practices, expressed information needs, and ideal systems for information access. Nineteen individual interviews were conducted among employees of two domains in a state health department--communicable disease control and community health promotion. Subsequent focus groups gathered additional data on preferences for methods of information access and delivery as well as information format and content. Qualitative methods were used to identify themes in the interview and focus group transcripts. Informants expressed similar needs for improved information access including single portal access with a good search engine; automatic notification regarding newly available information; access to best practice information in many areas of interest that extend beyond biomedical subject matter; improved access to grey literature as well as to more systematic reviews, summaries, and full-text articles; better methods for indexing, filtering, and searching for information; and effective ways to archive information accessed. Informants expressed a preference for improving systems with which they were already familiar such as PubMed and listservs rather than introducing new systems of information organization and delivery. A hypothetical ideal model for information organization and delivery was developed based on informants' stated information needs and preferred means of delivery. Features of the model were endorsed by the subjects who reviewed it. Many critical information needs of PH

  3. Open-access public-private partnerships to enable drug discovery--new approaches.

    Science.gov (United States)

    Müller, Susanne; Weigelt, Johan

    2010-03-01

    The productivity of the pharmaceutical industry, as assessed by the number of NMEs produced per US dollar spent in R&D, has been in steady decline during the past 40 years. This decline in productivity not only poses a significant challenge to the pharmaceutical industry, but also to society because of the importance of developing drugs for the treatment of unmet medical needs. The major challenge in progressing a new drug to the market is the successful completion of clinical trials. However, the failure rate of drugs entering trials has not decreased, despite various technological and scientific breakthroughs in recent decades, and despite intense target validation efforts. This lack of success suggests limitations in the fundamental understanding of target biology and human pharmacology. One contributing factor may be the traditional secrecy of the pharmaceutical sector, a characteristic that does not promote scientific discovery in an optimal manner. Access to broader knowledge relating to target biology and human pharmacology is difficult to obtain because interactions between researchers in industry and academia are typically restricted to closed collaborations in which the knowledge gained is confidential.However, open-access collaborative partnerships are gaining momentum in industry, and are also favored by funding agencies. Such open-access collaborations may be a powerful alternative to closed collaborations; the sharing of early-stage research data is expected to enable scientific discovery by engaging a broader section of the scientific community in the exploration of new findings. Potentially, the sharing of data could contribute to an increased understanding of biological processes and a decrease in the attrition of clinical programs.

  4. Impact of the information age on residency training: communication, access to public information, and clinical care.

    Science.gov (United States)

    Hilty, Donald M; Belitsky, Richard; Cohen, Mitchell B; Cabaniss, Deborah L; Dickstein, Leah J; Bernstein, Carol A; Kaplan, Allan S; Scheiber, Stephen C; Crisp-Han, Holly D; Wrzosek, Marika I; Silberman, Edward K

    2015-02-01

    Access to technology in practice helps physicians manage information, communicate, and research topics; however, those in training receive almost no formal preparation for integrating web-based technologies into practice. One reason for this is that many faculty-aside from junior faculty or those in recent generations-did not grow up using Internet communication, may use it minimally, if at all, in their own practices, and may know little about its forms and varieties. This report presents a case to illustrate how these disparities may play out in the supervisory situation and makes suggestions about helping supervisors integrate technology-awareness into their teaching.

  5. Retention in a public health care system with free access to treatment

    DEFF Research Database (Denmark)

    Helleberg, Marie; Engsig, Frederik N; Kronborg, Gitte;

    2012-01-01

    OBJECTIVE:: We aimed to assess retention of HIV infected individuals in the Danish health care system over a 15-year period. METHODS:: Loss to follow-up (LTFU) was defined as 365 days without contact to the HIV care system. Data were obtained from the nationwide Danish HIV Cohort study, The Danis......, especially after initiation of HAART. Absence from HIV care is associated with increased mortality. We conclude that high rates of retention can be achieved in a health care system with free access to treatment and is associated with a favorable outcome....

  6. Research on Quantum Authentication Methods for the Secure Access Control Among Three Elements of Cloud Computing

    Science.gov (United States)

    Dong, Yumin; Xiao, Shufen; Ma, Hongyang; Chen, Libo

    2016-12-01

    Cloud computing and big data have become the developing engine of current information technology (IT) as a result of the rapid development of IT. However, security protection has become increasingly important for cloud computing and big data, and has become a problem that must be solved to develop cloud computing. The theft of identity authentication information remains a serious threat to the security of cloud computing. In this process, attackers intrude into cloud computing services through identity authentication information, thereby threatening the security of data from multiple perspectives. Therefore, this study proposes a model for cloud computing protection and management based on quantum authentication, introduces the principle of quantum authentication, and deduces the quantum authentication process. In theory, quantum authentication technology can be applied in cloud computing for security protection. This technology cannot be cloned; thus, it is more secure and reliable than classical methods.

  7. Research on Quantum Authentication Methods for the Secure Access Control Among Three Elements of Cloud Computing

    Science.gov (United States)

    Dong, Yumin; Xiao, Shufen; Ma, Hongyang; Chen, Libo

    2016-08-01

    Cloud computing and big data have become the developing engine of current information technology (IT) as a result of the rapid development of IT. However, security protection has become increasingly important for cloud computing and big data, and has become a problem that must be solved to develop cloud computing. The theft of identity authentication information remains a serious threat to the security of cloud computing. In this process, attackers intrude into cloud computing services through identity authentication information, thereby threatening the security of data from multiple perspectives. Therefore, this study proposes a model for cloud computing protection and management based on quantum authentication, introduces the principle of quantum authentication, and deduces the quantum authentication process. In theory, quantum authentication technology can be applied in cloud computing for security protection. This technology cannot be cloned; thus, it is more secure and reliable than classical methods.

  8. Increasing Public Access to University Qualifications: Evolution of The University of the West Indies Open Campus

    Directory of Open Access Journals (Sweden)

    Michael L. Thomas

    2009-02-01

    Full Text Available This paper traces the evolution of The University of the West Indies’ Open Campus (UWIOC, which is expected to expand service and increase access to the underserved communities of the Eastern Caribbean. At present, UWI, which caters to the needs of the 16 far flung countries of the Commonwealth Caribbean, has not been able to fully serve these countries, the UWI-12, in a way that is commensurate with their developmental needs. Historically, the institution has been dominated by campus-based education, and its three campuses have been poles of attraction for scholars and scholarship to the significant advantage of the countries in which they are located: Jamaica, Trinidad and Tobago, and Barbados. The University’s creation of an open campus, a fourth campus, enables it to expand its scope, enhance its appeal, and improve the efficiency of its services to individuals, communities, and countries. This new campus, a merger of UWI’s Outreach sector, which comprises the School of Continuing Studies, the Tertiary Level Institute Unit, and The UWI Distance Education Centre, will have a physical presence in each contributing country and will function as a network of real and virtual modes to deliver education and training to anyone with access to Internet facilities.

  9. Soft-error tolerance and energy consumption evaluation of embedded computer with magnetic random access memory in practical systems using computer simulations

    Science.gov (United States)

    Nebashi, Ryusuke; Sakimura, Noboru; Sugibayashi, Tadahiko

    2017-08-01

    We evaluated the soft-error tolerance and energy consumption of an embedded computer with magnetic random access memory (MRAM) using two computer simulators. One is a central processing unit (CPU) simulator of a typical embedded computer system. We simulated the radiation-induced single-event-upset (SEU) probability in a spin-transfer-torque MRAM cell and also the failure rate of a typical embedded computer due to its main memory SEU error. The other is a delay tolerant network (DTN) system simulator. It simulates the power dissipation of wireless sensor network nodes of the system using a revised CPU simulator and a network simulator. We demonstrated that the SEU effect on the embedded computer with 1 Gbit MRAM-based working memory is less than 1 failure in time (FIT). We also demonstrated that the energy consumption of the DTN sensor node with MRAM-based working memory can be reduced to 1/11. These results indicate that MRAM-based working memory enhances the disaster tolerance of embedded computers.

  10. Taking the High Ground: A Case for Department of Defense Application of Public Cloud Computing

    Science.gov (United States)

    2011-06-01

    IT cannot be sustained in a declining budget environment with users demanding better services. Wyld captures the essence of much of the problem for...the DoD laboratory data centers into model versions of public providers. An open source project, called Eucalyptus (http://www.eucalyptus.com), would...be an excellent starting point for such a project. Eucalyptus is a software plat- form for implementing private cloud computing solutions on top of

  11. MOVING THE SIGNPOST: GOOD GOVERNANCE AND DEVELOPMENT IN THE CONTEXT OF PUBLIC ACCESS TO INFORMATION

    Directory of Open Access Journals (Sweden)

    Corneliu Bjola

    2002-07-01

    Full Text Available In both economic and political terms, Romania lags behind most of the CEE developing countries. This situation deteriorates on a constant basis and is largely accounted for by very poor governance practices. The solution proposed by this study consists of recommending the implementation of a reformist agenda of e-governance based on two pillars: robust development of public sector information and large-scale application of Information and Communication Technologies. In conceptual terms, this strategy is assumed to produce a gradual shift from the citizen-as-customer to the more participative citizen-as-shareholder model of governance. In concrete terms, the medium-term benefits of this policy are political (enhancing the democratization process, increasing political accountability, and improving the tattered government-citizen relationship, economic (combating corruption, creating a transparent and competitive economic environment, and speeding up standard administrative processes for citizens and business, and social (restoring public trust, rebuilding social capital, and increasing the transparency, quality and efficiency of public services.

  12. Informed public choices for low-carbon electricity portfolios using a computer decision tool.

    Science.gov (United States)

    Mayer, Lauren A Fleishman; Bruine de Bruin, Wändi; Morgan, M Granger

    2014-04-01

    Reducing CO2 emissions from the electricity sector will likely require policies that encourage the widespread deployment of a diverse mix of low-carbon electricity generation technologies. Public discourse informs such policies. To make informed decisions and to productively engage in public discourse, citizens need to understand the trade-offs between electricity technologies proposed for widespread deployment. Building on previous paper-and-pencil studies, we developed a computer tool that aimed to help nonexperts make informed decisions about the challenges faced in achieving a low-carbon energy future. We report on an initial usability study of this interactive computer tool. After providing participants with comparative and balanced information about 10 electricity technologies, we asked them to design a low-carbon electricity portfolio. Participants used the interactive computer tool, which constrained portfolio designs to be realistic and yield low CO2 emissions. As they changed their portfolios, the tool updated information about projected CO2 emissions, electricity costs, and specific environmental impacts. As in the previous paper-and-pencil studies, most participants designed diverse portfolios that included energy efficiency, nuclear, coal with carbon capture and sequestration, natural gas, and wind. Our results suggest that participants understood the tool and used it consistently. The tool may be downloaded from http://cedmcenter.org/tools-for-cedm/informing-the-public-about-low-carbon-technologies/ .

  13. 6th International Workshop on Computer-Aided Scheduling of Public Transport

    CERN Document Server

    Branco, Isabel; Paixão, José

    1995-01-01

    This proceedings volume consists of papers presented at the Sixth International Workshop on Computer-Aided Scheduling of Public Transpon, which was held at the Fund~lio Calouste Gulbenkian in Lisbon from July 6th to 9th, 1993. In the tradition of alternating Workshops between North America and Europe - Chicago (1975), Leeds (1980), Montreal (1983), Hamburg (1987) and again Montreal (1990), the European city of Lisbon was selected as the venue for the Workshop in 1993. As in earlier Workshops, the central theme dealt with vehicle and duty scheduling problems and the employment of operations-research-based software systems for operational planning in public transport. However, as was initiated in Hamburg in 1987, the scope of this Workshop was broadened to include topics in related fields. This fundamental alteration was an inevitable consequence of the growing demand over the last decade for solutions to the complete planning process in public transport through integrated systems. Therefore, the program of thi...

  14. Advances in Navy pharmacy information technology: accessing Micromedex via the Composite Healthcare Computer System and local area networks.

    Science.gov (United States)

    Koerner, S D; Becker, F

    1999-07-01

    The pharmacy profession has long used technology to more effectively bring health care to the patient. Navy pharmacy has embraced technology advances in its daily operations, from computers to dispensing robots. Evolving from the traditional role of compounding and dispensing specialists, pharmacists are establishing themselves as vital team members in direct patient care: on the ward, in ambulatory clinics, in specialty clinics, and in other specialty patient care programs (e.g., smoking cessation). An important part of the evolution is the timely access to the most up-to-date information available. Micromedex, Inc. (Denver, Colorado), has developed a number of computer CD-ROM-based full-text pharmacy, toxicology, emergency medicine, and patient education products. Micromedex is a recognized leader with regard to total pharmaceutical information availability. This article discusses the implementation of Micromedex products within the established Composite Healthcare Computer System and the subsequent use by and effect on the international Navy pharmacy community.

  15. EPUB as publication format in Open Access journals: Tools and workflow

    Directory of Open Access Journals (Sweden)

    Trude Eikebrokk

    2014-04-01

    Full Text Available In this article, we present a case study of how the main publishing format of an Open Access journal was changed from PDF to EPUB by designing a new workflow using JATS as the basic XML source format. We state the reasons and discuss advantages for doing this, how we did it, and the costs of changing an established Microsoft Word workflow. As an example, we use one typical sociology article with tables, illustrations and references. We then follow the article from JATS markup through different transformations resulting in XHTML, EPUB and MOBI versions. In the end, we put everything together in an automated XProc pipeline. The process has been developed on free and open source tools, and we describe and evaluate these tools in the article. The workflow is suitable for non-professional publishers, and all code is attached and free for reuse by others.

  16. Radiological Protection in Cone Beam Computed Tomography (CBCT). ICRP Publication 129.

    Science.gov (United States)

    Rehani, M M; Gupta, R; Bartling, S; Sharp, G C; Pauwels, R; Berris, T; Boone, J M

    2015-07-01

    The objective of this publication is to provide guidance on radiological protection in the new technology of cone beam computed tomography (CBCT). Publications 87 and 102 dealt with patient dose management in computed tomography (CT) and multi-detector CT. The new applications of CBCT and the associated radiological protection issues are substantially different from those of conventional CT. The perception that CBCT involves lower doses was only true in initial applications. CBCT is now used widely by specialists who have little or no training in radiological protection. This publication provides recommendations on radiation dose management directed at different stakeholders, and covers principles of radiological protection, training, and quality assurance aspects. Advice on appropriate use of CBCT needs to be made widely available. Advice on optimisation of protection when using CBCT equipment needs to be strengthened, particularly with respect to the use of newer features of the equipment. Manufacturers should standardise radiation dose displays on CBCT equipment to assist users in optimisation of protection and comparisons of performance. Additional challenges to radiological protection are introduced when CBCT-capable equipment is used for both fluoroscopy and tomography during the same procedure. Standardised methods need to be established for tracking and reporting of patient radiation doses from these procedures. The recommendations provided in this publication may evolve in the future as CBCT equipment and applications evolve. As with previous ICRP publications, the Commission hopes that imaging professionals, medical physicists, and manufacturers will use the guidelines and recommendations provided in this publication for implementation of the Commission's principle of optimisation of protection of patients and medical workers, with the objective of keeping exposures as low as reasonably achievable, taking into account economic and societal factors, and

  17. THE USE OF COMPUTER APPLICATIONS IN THE STUDY OF ROMANIA'S PUBLIC DEBT

    Directory of Open Access Journals (Sweden)

    Popeanga Vasile

    2011-07-01

    Full Text Available Total public debt represents all monetary obligations of the state (government, public institutions, financial, administrative-territorial units at a time, resulting from internal and external loans (in lei and foreign currencies contracted on short, medium and long term, and the state treasury and its own obligations for the amounts advanced temporarily to cover the budget deficit. Loans may be contracted by the state through the Ministry of Finance, in his own name or guaranteed by it. Public debt is expressed in local currency or foreign currency, depending on where the contracts and loan conditions. In order to evaluate Romania's public debt, obligations denominated in another currency than the national currency is calculated using the exchange rate of National Bank of Romania. Also, total public debt of a country can be expressed in absolute values (to know the load on that country's economy which is subject to its creditors, the relative values as a percentage of GDP (to allow comparison over time and between countries and the average size per capita (to allow comparisons and analysis in time and space. Total public debt is calculated and separately manages its two forms, namely domestic public debt and external public debt. Ministry of Finance shall prepare and submit annually to the Government for approval and to Parliament for information, report on public debt, which contains information on government debt portfolio, debt service, public indebtedness indicators and information about primary and secondary market securities state and how to implement the medium-term strategy in managing government debt for the previous year. In order to make comparisons quick and effective on public debt dynamics in Romania, Excel 2010 has new features such as charts and sparkline slicers features which can help discover trends and statistics in accordance with existing data. The aim of this article is accurate assessment of Romania's public debt and its

  18. 78 FR 54453 - Notice of Public Meeting-Intersection of Cloud Computing and Mobility Forum and Workshop

    Science.gov (United States)

    2013-09-04

    ... National Institute of Standards and Technology Notice of Public Meeting--Intersection of Cloud Computing...-mobility.cfm . SUPPLEMENTARY INFORMATION: NIST hosted six prior Cloud Computing Forum & Workshop events in..., portability, and security, discuss the Federal Government's experience with cloud computing, report on...

  19. Free Access to Public Information: Enforcement, Appeals and Judicial Review. A Comparative Perspective from Cee Countries

    Directory of Open Access Journals (Sweden)

    Bianca V. COBÂRZAN

    2008-10-01

    Full Text Available FOIAs were adopted in Central and EasternEurope rather late after the regime changes. Afteradopting the laws, however, there are still manypowerful forces that are working against extensiveaccess to information – they can be static - opaqueadministrative practices, general inaptitudeor the lack of sufficient human and materialresources – or active – agents that resist opennessdue to private interests, or agents that useinstitutional scenarios to prevent public scrutinyover corruption and incompetence. The paperapproaches the jurisdictions from Hungary, Poland,Czech Republic and Romania, emphasizing thetopic of enforcement mechanisms provided by theFOIAs. It is a follow up of an article published twoyears ago in the same journal.

  20. Addressing Rural Library Technology Budgets with Single Board Computers: Testing the APC 8950 Rock Circuit Board Computer for Patron Access

    Directory of Open Access Journals (Sweden)

    Michael D. Wells

    2014-04-01

    Full Text Available Over the last decade, libraries have faced enormous budgetary challenges when it comes to implementing new technologies. These challenges are very pronounced in rural areas where libraries struggle to develop and define a path for purchasing and replacing systems that have become outdated. The author attempted to create a unit to replace aging OPAC terminals and to provide a low cost computing option for budget constrained rural libraries. The initial attempt detailed in this paper involved purchasing and configuring an APC 8950 Rock single board computer. Unfortunately, due to limitations of this APC unit’s existing Android based operating system, the initial effort failed to yield a computer that could be used in a library by average patrons. Future plans are outlined for the development of a second system using the more broadly accepted Raspberry Pi platform. The success of this technological endeavor may empower libraries and patrons in their communities to have more control of the technology they develop and use in the future.

  1. A Project to Make Apple Computers Accessible to Blind Children. August 1, 1983-July 31, 1984.

    Science.gov (United States)

    Sensory Aids Foundation, Palo Alto, CA.

    The report describes a project designed to test the feasibility of adapting off-the-shelf educational software to a speech synthesizer compatible with Apple personal computers for visually impaired students. Fifteen visually impaired children were administered pretests and posttests for auditory discrimination, computer literacy, keyboard…

  2. Providing disabled persons in developing countries access to computer games through a novel gaming input device

    CSIR Research Space (South Africa)

    Smith, Andrew C

    2011-01-01

    Full Text Available A novel input device is presented for use with a personal computer by persons with physical disabilities who would otherwise not be able to enjoy computer gaming. This device is simple to manufacture and low in cost. A gaming application...

  3. Open access high throughput drug discovery in the public domain: a Mount Everest in the making.

    Science.gov (United States)

    Roy, Anuradha; McDonald, Peter R; Sittampalam, Sitta; Chaguturu, Rathnam

    2010-11-01

    High throughput screening (HTS) facilitates screening large numbers of compounds against a biochemical target of interest using validated biological or biophysical assays. In recent years, a significant number of drugs in clinical trails originated from HTS campaigns, validating HTS as a bona fide mechanism for hit finding. In the current drug discovery landscape, the pharmaceutical industry is embracing open innovation strategies with academia to maximize their research capabilities and to feed their drug discovery pipeline. The goals of academic research have therefore expanded from target identification and validation to probe discovery, chemical genomics, and compound library screening. This trend is reflected in the emergence of HTS centers in the public domain over the past decade, ranging in size from modestly equipped academic screening centers to well endowed Molecular Libraries Probe Centers Network (MLPCN) centers funded by the NIH Roadmap initiative. These centers facilitate a comprehensive approach to probe discovery in academia and utilize both classical and cutting-edge assay technologies for executing primary and secondary screening campaigns. The various facets of academic HTS centers as well as their implications on technology transfer and drug discovery are discussed, and a roadmap for successful drug discovery in the public domain is presented. New lead discovery against therapeutic targets, especially those involving the rare and neglected diseases, is indeed a Mount Everestonian size task, and requires diligent implementation of pharmaceutical industry's best practices for a successful outcome.

  4. Effectiveness and safety of computer-controlled periodontal ligament injection system in endodontic access to the mandibular posterior teeth.

    Science.gov (United States)

    Jing, Quan; Wan, Kuo; Wang, Xiao-jun; Ma, Lin

    2014-03-01

    To evaluate the effectiveness and safety of a computer-controlled periodontal ligament (PDL) injection system to the local soft tissues as the primary technique in endodontic access to mandibular posterior teeth in patients with irreversible pulpitis. A total of 162 Chinese patients who had been diagnosed with irreversible pulpitis in their mandibular posterior teeth without acute infection or inflammation in the periodontal tissues were enrolled in this clinical study. The patients were divided into 3 groups according to the position of the involved tooth: the premolar group (PM, n=38), first molar group (FM, n=66), and second molar group (SM, n=58). All the patients received computer-controlled PDL injection with 4% articaine and 1:100 000 epinephrine. Immediately after the injection, endodontic access was performed, and the degree of pain during the treatment was evaluated by the patients using Visual Analogue Scale for pain. The success rates were compared among the 3 groups. The responses of local soft tissues were evaluated 3-8 days and 3 weeks after the procedure. The overall success rate was 76.5%. There was a significant difference in success rates among the PM, FM, and SM groups (92.1%, 53.0%, 93.1%, respectively; χ² = 34.3, Pcomputer-controlled PDL injection system demonstrates both satisfactory anesthetic effects and safety in local soft tissues as primary anesthetic technique in endodontic access to the mandibular posterior teeth in patients with irreversible pulpitis.

  5. A surveillance system for monitoring, public reporting, and improving minority access to cancer clinical trials.

    Science.gov (United States)

    Carpenter, William R; Tyree, Seth; Wu, Yang; Meyer, Anne-Marie; DiMartino, Lisa; Zullig, Leah; Godley, Paul A

    2012-08-01

    The Institute of Medicine (IOM) has recommended that each person with cancer should have access to clinical trials, which have been associated with improving care quality and disparities. With no effective enrollment monitoring system, patterns of trial enrollment remain unclear. We developed a population-based, statewide system designed to facilitate monitoring of cancer trial enrollment and targeting of future interventions to improve it. Person-level cancer incidence data from the North Carolina Central Cancer Registry (NCCCR), person-level treatment trial accrual data from the National Cancer Institute (NCI), and county-level Area Resource Files (ARF) measures for 12 years, 1996-2007, were studied. Deidentified person-level data necessitated county-level analysis. Enrollment rates were estimated as the ratio of trial enrollment to cancer incidence for each race, gender, year, and county combination. Multivariable analysis examined factors associated with trial accrual. Sensitivity analyses examined spurious fluctuations and temporal discordance of incidence and enrollment. The NCI treatment trial enrollment rate was 2.39% for whites and 2.20% for minorities from 1996 to 2007, and 2.88% and 2.47%, respectively, from 2005 to 2007. Numerous counties had no minority enrollment. The 2005-2007 enrollment rates for white and minority females was 4.04% and 3.59%, respectively, and for white and minority males was 1.74% and 1.36%, respectively. Counties with a medical school or NCI Community Clinical Oncology Program (CCOP)-affiliated practice had higher trial enrollment. We examined NCI trial accrual only - industry-sponsored and investigator-initiated trials were excluded; however, studies comprise the majority of all clinical trial participants. Delays in data availability may hinder the immediacy of population-based analyses. Model stability and consistency suggest that this system is effective for population-based enrollment surveillance. For North Carolina, it

  6. Public service or commodity goods? Electricity reforms, access, and the politics of development in Tanzania

    Science.gov (United States)

    Ghanadan, Rebecca Hansing

    Since the 1990s, power sector reforms have become paramount in energy policy, catalyzing a debate in Africa about market-based service provision and the effects of reforms on access. My research seeks to move beyond the conceptual divide by grounding attention not in abstract 'market forces' but rather in how development institutions shape energy services and actually practice policy on the ground. Using the case of Tanzania, a country known for having instituted some of the most extensive reforms and a 'success story' in Africa, I find that reforms are creating large burdens and barriers for access and use of services, including: increasing costs, enforcement pressures, and measures to impose 'market' discipline. However, I also find that many of the most significant outcomes are not found in direct 'market' changes, but rather how reforms are selective, partial, and shaped by the wider needs and claims of the institutions driving reforms, so that questions of how reforms are implemented, how they are measured, and who tells the story become as important as the policies themselves. Using a multiple-arenas framework, including (i) a household and community level study of urban energy conditions, (ii) a study of service and management conditions at the national electric utility, (iii) an examination of the international policy process, and (iv) a study of the history of electricity services across colonial, post-independence, and reform periods, I show that African energy reforms are a technical and political project connecting energy to international investments, donor aid programs, and elite interests within national governments. Energy reforms also involve fundamental service changes that are reorganizing how the costs and benefits of energy systems are distributed, allocated, and managed. The effects of reform extend beyond formal services to have wide-reaching repercussions within natural resources, and uneven social dynamics on the ground. These features point

  7. Use of herbal medicine during pregnancy among women with access to public healthcare in Nairobi, Kenya: a cross-sectional survey

    OpenAIRE

    Mothupi, Mamothena Carol

    2014-01-01

    Background Maternal health is a public health priority in many African countries, but little is known about herbal medicine use in pregnancy. This study aimed to determine the pattern of use of herbal medicine in an urban setting, where women have relatively high access to public healthcare. Methods This cross-sectional study included 333 women attending a childcare clinic in a district public health hospital in Nairobi, Kenya, during January and February, 2012, and who had delivered a baby w...

  8. Problems of preservation and accessibility of cartographic publications in the National Libraries of Russia

    Directory of Open Access Journals (Sweden)

    Ludmilla Kildushevskaya

    2003-03-01

    Full Text Available The preservation of cartographic publications are considered in the context of the National Program of Preservation of the Library Collections of the Russian Federation approved by the government of the Russian Federation in 2000. This Program is the first goal_oriented national library programme in the history of the country. The Program is planned for ten years and includes a number of subprogrammes: 1. Collection conservation. 2. Creation of the insurance stock of library documents and information preservation. 3. Book Monuments of the Russian Federation. 4. Library collection safety. 5. Collection preservation through specifying usage conditions. 6. Registration of library stocks. 7. Personnel ensuring the collection preservation processes. It is impossible to describe in one report all the ranges of work reflected in this extensive programme. Therefore, I will dwell on the special measures carried out by the divisions of cartography within the first three subprogrammes and the fifth one.

  9. Line and Form: linear, areal, inclusive and accessible public spaces. Hoofbogen in Rotterdam

    Directory of Open Access Journals (Sweden)

    Maurizio Francesco Errigo

    2013-06-01

    Full Text Available In the contemporary city places more and more lose their character of physical stock and became space of flow; the city isn’t characterized by its immobile uniqueness, but is modified and reassembled at the rate of circulation in it comes to life. Today the city is presented as a set of discontinuous fragments, which return an image of plural spaces, places and non-places, past and present. Disappearing borders, perimeters, which marked the places, neighborhoods are uncommon spaces, undefined areas between built and unbuilt. The square is the gap in the building density; it has lost its significance as a place of socialization. The recent planning instruments (plans and programs that belong to the city of Rotterdam are geared to transform the city into a “child-friendly city" (city suitable for children, the city attracts young couples and middle-class families just for the fact that the city is distancing itself from the modernist planning based on the zoning and is encouraging the mix of urban functions; particular emphasis in this phase of planning and urban design is given by the statement of the urban Vision Rotterdam 2030. The case dealt with in the article is related to the area of ​​Bergpolder, in the north of Rotterdam, an area affected by a strong identity disposed element, a railway viaduct, and is characterized by a strong strategic value for the location and proximity with the urban center and is affected by both social and economic problem due to the insufficiency of public spaces, the use of spaces and public facilities, to the social mixité, characterized by the mixture of different ethnic groups.

  10. Design and Analysis of an Attack Resilient and Adaptive Medium access Control Protocol for Computer Networks

    CERN Document Server

    Shukla, Piyush Kumar; Bhadoria, Dr Sarita Singh

    2009-01-01

    The challenge of designing an efficient Medium Access Control (MAC) protocol and analyzing it has been an important research topic for over 30 years. This paper focuses on the performance analysis (through simulation) and modification of a well known MAC protocol CSMA/CD. The existing protocol does not consider the wastage of bandwidth due to unutilized periods of the channel. By considering this fact, performance of MAC protocol can be enhanced. The purpose of this work is to modify the existing protocol by enabling it to adapt according to state of the network. The modified protocol takes appropriate action whenever unutilized periods detected. In this way, to increase the effective bandwidth utilization and determine how it behaves under increasing load, and varying packet sizes. It will also include effects of attacks i.e. Denial of service attacks, Replay Attack, Continuous Channel Access or Exhaustion attack, Flooding attack, Jamming (Radio interference) attack, Selective forwarding attack which degrade...

  11. Es ist das Einfache, das schwer zu machen ist – Open Access im wissenschaftlichen Publikationsprozess / It is the simple things that are hard to do: Open Access and scholarly publications

    Directory of Open Access Journals (Sweden)

    Böske, Julia

    2010-11-01

    Full Text Available In the last years the scientific system of publication was challenged increasingly. Open Access – the free access to scientific information – has contributed a lot to it. Therefore is a profound discussion with the phenomenon Open Access worthwhile. In this context the business model of traditional publishing is compared to that of the Open Access. This comparison should give the impulse to think over the interpretation of the Open Access referring to the Berlin Declaration and to open to new forms of the Open Access. However, for this purpose existing enemy images must be destroyed which were aroused since the last years above all between commercial publishing companies and the science. In this respect the following implementations are not only a dialogue help, but they also refresh the legitimization of commercial publishing companies in the publication process and offer them a new action basis. Because Open Access should be understood not only as a danger – above all it is a challenge and chance for the continuity of commercial scientific publishing companies. The point is that it is possible to break into electronic markets of tomorrow.

  12. The exclusion of the right to access public policy determined by the adopted

    Directory of Open Access Journals (Sweden)

    Leandro Roberto Feitoza

    2014-12-01

    Full Text Available The municipality of Vargem Alta requested Ministry of Agriculture, Livestock and Food Supply (MAPA for their inclusion in the conilon coffee zoning. The discontent of local farmers with this exclusion was the first indication that the information used in the zoning by MAPA was insufficient to reveal the appropriate ecosystems for the cultivation of this species. The Natural Zones employed to define the suitable environments for conilon cultivation and the field crop checks to confirm the species, were the basis of this study which was used by MAPA to review the decision to include Vargem Alta in the conilon coffee zoning. MAPA published this addition in the Official Gazette of 04/10/2012 giving the local farmers the right to benefit from public policies that are related to this subject. It is suggested that alterations are applied to the legal documents concerning agricultural zoning, with the aim of authorising the inclusion of those beneficiaries who are excluded due to limitations of the zoning method used.

  13. Effect of high up front charges on access to surgery for poor patients at a public hospital in New Mexico

    Directory of Open Access Journals (Sweden)

    Skipper Betty

    2006-06-01

    Full Text Available Abstract Background A public hospital in New Mexico required collection of 50% of estimated costs prior to elective surgeries for self-pay patients. This study assesses the impact of this policy on access to elective surgical procedures. Methods Chi-square tests determined if there was a statistically significant difference between the number of self-pay and insured patient cancellations for financial reasons. A multivariate binomial regression model was used to calculate risk ratios and confidence limits for effects of race/ethnicity, and insurance status, controlling for gender, on these cancellations. Results Of the 667 cancellations, there were 99 self-pay and 568 insured patients. Cancellations for financial reasons occurred in 55.6% of self-pay and 9.3% of insured patients (p Conclusion Self-pay patients, regardless of race/ethnicity, have elective surgical procedures cancelled for financial reasons significantly more often than insured patients. The hospital's 50% up-front payment policy represents a significant financial barrier to accessing elective surgical procedures for self-pay patients.

  14. Efficient Priority Access to the Shared Commercial Radio with Offloading for Public Safety in LTE Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Chafika Tata

    2014-01-01

    Full Text Available This paper presents the algorithm Courteous Priority Access to the shared commercial radio with offloading (CPAwO, for public safety network (PSN over LTE heterogeneous networks (HetNets. We propose a solution for prioritization of PSN users with access to the commercial radio network resources. Our model offers additional radio resources to the PSN. Furthermore, it ensures a certain priority for commercial users by assigning quantities of additional radio resources through the courteous scheme. This allows delaying preemption and blocking bearers when the radio resources are limited. The other part of CPAwO model is to apply the principle of offloading in order to reduce the impact of the macrocell congestion. This technique is to switch the new bearers arriving at the LTE macrocells to small cells, in order to decrease the number of the blocked and interrupted bearers in the network. The results of the simulation showed that the allocation of radio resources via the courteous mechanism with offloading of new bearers to small cells reduces the rate of blocking bearers and delays the preemption of active bearers present in the LTE HetNets. It also reduces the cost of the end-to-end communications, thanks to the reallocation of free frequencies.

  15. Computer

    CERN Document Server

    Atkinson, Paul

    2011-01-01

    The pixelated rectangle we spend most of our day staring at in silence is not the television as many long feared, but the computer-the ubiquitous portal of work and personal lives. At this point, the computer is almost so common we don't notice it in our view. It's difficult to envision that not that long ago it was a gigantic, room-sized structure only to be accessed by a few inspiring as much awe and respect as fear and mystery. Now that the machine has decreased in size and increased in popular use, the computer has become a prosaic appliance, little-more noted than a toaster. These dramati

  16. [Design and study of parallel computing environment of Monte Carlo simulation for particle therapy planning using a public cloud-computing infrastructure].

    Science.gov (United States)

    Yokohama, Noriya

    2013-07-01

    This report was aimed at structuring the design of architectures and studying performance measurement of a parallel computing environment using a Monte Carlo simulation for particle therapy using a high performance computing (HPC) instance within a public cloud-computing infrastructure. Performance measurements showed an approximately 28 times faster speed than seen with single-thread architecture, combined with improved stability. A study of methods of optimizing the system operations also indicated lower cost.

  17. Public Funding and Open Access to Research: A Review of Canadian Multiple Sclerosis Research

    Science.gov (United States)

    Stephenson, Carol; Stephenson, Erin; Chaves, Debbie

    2017-01-01

    Background Multiple sclerosis (MS), a progressive demyelinating disease of the brain and spinal cord, is the leading cause of nontraumatic neurological damage in young adults. Canada has one of the highest reported incidents of MS, with estimates between 55 and 240 per 100,000 individuals. Between 2009 and 2014, the MS Society of Canada provided over Can $90 million to researchers and, since 2013, has encouraged researchers to make both current and previous research products openly available. Objective The goal of the study was to determine the open access (OA) cost implications and repository policies of journals frequently used by a sample of MS researchers. This study benchmarked current publishing preferences by MS Society of Canada researchers by examining the OA full-text availability of journal articles written by researchers funded between 2009 and 2014. Methods Researchers were identified from the 2009 to 2014 annual MS Society of Canada Research Summaries. Articles were identified through searches in Web of Science, Scopus, Medline and Embase (both via OVID). Journal level analysis included comparison of OA policies, including article processing charges (APCs) and repository policies. Data were analyzed using descriptive statistics. Results There were 758 articles analyzed in this study, of which 288 (38.0%) were OA articles. The majority of authors were still relying on journal policies for deposit in PubMed Central or availability on publisher websites for OA. Gold OA journals accounted for 10.2% of the journals in this study and were associated with significantly lower APCs (US $1900) than in hybrid journals (US $3000). Review of the journal self-archiving options highlighted the complexity of stipulations that authors would have to navigate to legally deposit a version of their article. Conclusions This study found that there are currently researcher- and publisher-imposed barriers to both the gold and green roads to OA. These results provide a

  18. Public Funding and Open Access to Research: A Review of Canadian Multiple Sclerosis Research.

    Science.gov (United States)

    Bakker, Caitlin; Stephenson, Carol; Stephenson, Erin; Chaves, Debbie

    2017-02-27

    Multiple sclerosis (MS), a progressive demyelinating disease of the brain and spinal cord, is the leading cause of nontraumatic neurological damage in young adults. Canada has one of the highest reported incidents of MS, with estimates between 55 and 240 per 100,000 individuals. Between 2009 and 2014, the MS Society of Canada provided over Can $90 million to researchers and, since 2013, has encouraged researchers to make both current and previous research products openly available. The goal of the study was to determine the open access (OA) cost implications and repository policies of journals frequently used by a sample of MS researchers. This study benchmarked current publishing preferences by MS Society of Canada researchers by examining the OA full-text availability of journal articles written by researchers funded between 2009 and 2014. Researchers were identified from the 2009 to 2014 annual MS Society of Canada Research Summaries. Articles were identified through searches in Web of Science, Scopus, Medline and Embase (both via OVID). Journal level analysis included comparison of OA policies, including article processing charges (APCs) and repository policies. Data were analyzed using descriptive statistics. There were 758 articles analyzed in this study, of which 288 (38.0%) were OA articles. The majority of authors were still relying on journal policies for deposit in PubMed Central or availability on publisher websites for OA. Gold OA journals accounted for 10.2% of the journals in this study and were associated with significantly lower APCs (US $1900) than in hybrid journals (US $3000). Review of the journal self-archiving options highlighted the complexity of stipulations that authors would have to navigate to legally deposit a version of their article. This study found that there are currently researcher- and publisher-imposed barriers to both the gold and green roads to OA. These results provide a current benchmark against which efforts to enhance

  19. Accessing evidence to inform public health policy: a study to enhance advocacy.

    Science.gov (United States)

    Tabak, R G; Eyler, A A; Dodson, E A; Brownson, R C

    2015-06-01

    evidence-based policy change. Copyright © 2015 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.

  20. An Overview of a Decade of Journal Publications about Culture and Human-Computer Interaction (HCI)

    Science.gov (United States)

    Clemmensen, Torkil; Roese, Kerstin

    In this paper, we analyze the concept of human-computer interaction in cultural and national contexts. Building and extending upon the framework for understanding research in usability and culture by Honold [3], we give an overview of publications in culture and HCI between 1998 and 2008, with a narrow focus on high-level journal publications only. The purpose is to review current practice in how cultural HCI issues are studied, and to analyse problems with the measures and interpretation of this studies. We find that Hofstede's cultural dimensions has been the dominating model of culture, participants have been picked because they could speak English, and most studies have been large scale quantitative studies. In order to balance this situation, we recommend that more researchers and practitioners do qualitative, empirical work studies.

  1. Development traumatic brain injury computer user interface for disaster area in Indonesia supported by emergency broadband access network.

    Science.gov (United States)

    Sutiono, Agung Budi; Suwa, Hirohiko; Ohta, Toshizumi; Arifin, Muh Zafrullah; Kitamura, Yohei; Yoshida, Kazunari; Merdika, Daduk; Qiantori, Andri; Iskandar

    2012-12-01

    Disasters bring consequences of negative impacts on the environment and human life. One of the common cause of critical condition is traumatic brain injury (TBI), namely, epidural (EDH) and subdural hematoma (SDH), due to downfall hard things during earthquake. We proposed and analyzed the user response, namely neurosurgeon, general doctor/surgeon and nurse when they interacted with TBI computer interface. The communication systems was supported by TBI web based applications using emergency broadband access network with tethered balloon and simulated in the field trial to evaluate the coverage area. The interface consisted of demography data and multi tabs for anamnesis, treatment, follow up and teleconference interfaces. The interface allows neurosurgeon, surgeon/general doctors and nurses to entry the EDH and SDH patient's data during referring them on the emergency simulation and evaluated based on time needs and their understanding. The average time needed was obtained after simulated by Lenovo T500 notebook using mouse; 8-10 min for neurosurgeons, 12-15 min for surgeons/general doctors and 15-19 min for nurses. By using Think Pad X201 Tablet, the time needed for entry data was 5-7 min for neurosurgeon, 7-10 min for surgeons/general doctors and 12-16 min for nurses. We observed that the time difference was depending on the computer type and user literacy qualification as well as their understanding on traumatic brain injury, particularly for the nurses. In conclusion, there are five data classification for simply TBI GUI, namely, 1) demography, 2) specific anamnesis for EDH and SDH, 3) treatment action and medicine of TBI, 4) follow up data display and 5) teleneurosurgery for streaming video consultation. The type of computer, particularly tablet PC was more convenient and faster for entry data, compare to that computer mouse touched pad. Emergency broadband access network using tethered balloon is possible to be employed to cover the communications systems in

  2. A Web-based computer system supporting information access, exchange and management during building processes

    DEFF Research Database (Denmark)

    Sørensen, Lars Schiøtt

    1998-01-01

    During the last two decades, a number of research efforts have been made in the field of computing systmes related to the building construction industry. Most of the projects have focused on a part of the entire design process and have typically been limited to a specific domain. This paper prese...... presents a newly developed computer system based on the World Wide Web on the Internet. The focus is on the simplicity of the systems structure and on an intuitive and user friendly interface...

  3. Public-Resource Computing: Un nuevo paradigma para la computación y la ciencia

    OpenAIRE

    2006-01-01

    En este artículo se explora el concepto de Computación de Recursos Públicos (Public-Resource Computing), una idea que se ha venido desarrollando con gran éxito desde hace algunos años en la comunidad científica y que consiste en el aprovechamiento de los recursos de computación que se encuentran disponibles en los millones de PC que existen en el mundo conectados a internet. Se discute el proyecto SETI@home, el más exitoso representante de este concepto, y se describe la plataforma BOINC (Ber...

  4. Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review

    Directory of Open Access Journals (Sweden)

    Sumit Goyal

    2014-02-01

    Full Text Available These days cloud computing is booming like no other technology. Every organization whether it's small, mid-sized or big, wants to adapt this cutting edge technology for its business. As cloud technology becomes immensely popular among these businesses, the question arises: Which cloud model to consider for your business? There are four types of cloud models available in the market: Public, Private, Hybrid and Community. This review paper answers the question, which model would be most beneficial for your business. All the four models are defined, discussed and compared with the benefits and pitfalls, thus giving you a clear idea, which model to adopt for your organization.

  5. Does small equal predatory? Analysis of publication charges and transparency of editorial policies in Croatian open access journals.

    Science.gov (United States)

    Stojanovski, Jadranka; Marušić, Ana

    2017-06-15

    We approach the problem of "predatory" journals and publishers from the perspective of small scientific communities and small journals that may sometimes be perceived as "predatory". Among other characteristics of "predatory" journals two most relevant are their business model and the quality of the editorial work. We analysed 444 Croatian open access (OA) journals in the Hrčak (portal of Croatian scientific journals) digital journal repository for the presence of article processing charges as a business model and the transparency of editorial policies. The majority of journals do not charge authors or require submission or article processing charges, which clearly distinguishes them from "predatory" journals. Almost all Hrčak OA journals have publicly available information on editorial boards, including full names and affiliations, and detailed contact information for the editorial office at the Hrčak website. The journal names are unique and cannot be easily confused with another journal or intend to mislead about the journal's origin. While most journals provide information on peer review process, many do not provide guidelines for reviewers or other editorial and publication ethics standards. In order to clearly differentiate themselves from predatory journals, it is not enough for journals from small research communities to operate on non-commercial bases, but also to have transparent editorial policies.

  6. Drug discovery and beyond: the role of public-private partnerships in improving access to new malaria medicines.

    Science.gov (United States)

    Nwaka, Solomon

    2005-10-01

    Traditional pharmaceutical research and development (R&D) strategy has failed to address the desperate need for new antimalarial drugs. The populations affected are too poor to attract commercially-driven R&D. Over the last few years, a new model, the public-private partnership for product development, has radically changed the antimalarial R&D landscape. The partnerships bring together academic and industry expertise with funding from governmental, philanthropic and charitable sources. The Medicines for Malaria Venture, a not-for-profit foundation based in Geneva, aims to develop new antimalarials for developing countries through public-private partnership. It is currently managing a portfolio of around 20 projects at various stages of development. However, as in all drug R&D, some of these projects will fail. The portfolio approach helps to maximize the chances of success, but there are obvious challenges, including financial and managerial ones. Proactive management of the two vital interfaces in the drug supply chain is important for success. Upstream, basic research must be aligned with translational research in order to ensure a continuous supply of leads into the development pipeline. Meanwhile, downstream, drug discovery and development must be aligned with access to ensure optimal health impact. All stages require partnership, sustainable financing and the engagement of disease-endemic countries. The recent G8 report on Africa has lent support to mechanisms aimed at improving health and achieving the Millenium Development Goals.

  7. Increasing Public Awareness of Direct-to-Consumer Genetic Tests: Health Care Access, Internet Use, and Population Density Correlates

    Directory of Open Access Journals (Sweden)

    Lila J. Finney Rutten

    2012-01-01

    Full Text Available Uncertainty around the value of and appropriate regulatory models for direct-to-consumer (DTC genetic testing underscores the importance of tracking public awareness of these services. We analyzed nationally representative, cross-sectional data from the Health Information National Trends Survey in 2008 (n=7,674 and 2011 (n=3,959 to assess population-level changes in awareness of DTC genetic testing in the U.S. and to explore sociodemographic, health care, Internet use, and population density correlates. Overall, awareness increased significantly from 29% in 2008 to 37% in 2011. The observed increase in awareness from 2008 to 2011 remained significant (OR=1.39 even when adjusted for sociodemographic variables, health care access, Internet use, and population density. Independent of survey year, the odds of awareness of DTC genetic tests were significantly higher for those aged 50–64 (OR=1.64, and 65–74 (OR=1.60; college graduates (OR=2.02; those with a regular source of health care (OR=1.27; those with a prior cancer diagnosis (OR=1.24; those who use the Internet (OR=1.27; and those living in urban areas (OR=1.25. Surveillance of awareness—along with empirical data on use of and response to genetic risk information—can inform public health and policy efforts to maximize benefits and minimize risks of DTC genetic testing.

  8. Data Publication: Addressing the Issues of Provenance, Attribution, Citation, and Accessibility

    Science.gov (United States)

    Raymond, L. M.; Chandler, C. L.; Lowry, R. K.; Urban, E. R.; Moncoiffe, G.; Pissierssens, P.; Norton, C.

    2010-12-01

    technology. We will report on the successful implementation of the e-repository model for publication of data associated with the pilot projects and summarize the strategies for meeting the cultural and technical challenges.

  9. Compute-and-forward on a line network with random access

    NARCIS (Netherlands)

    Ren, Zhijie; Goseling, Jasper; Weber, Jos; Gastpar, Michael

    2013-01-01

    Signal superposition and broadcast are important features of the wireless medium. Compute-and-Forward, also known as Physical Layer Network Coding (PLNC), is a technique exploiting these features in order to improve performance of wireless networks. More precisely, it allows wireless terminals to re

  10. Towards an anonymous access control and accountability scheme for cloud computing

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schäge, Sven; Schwenk, Jörg

    2010-01-01

    An important aspect of trust in cloud computing consists in preventing the cloud provider from misusing the user's data. In this work-in-progress paper, we propose the approach of data anonymization to solve this problem. As this directly leads to problems of cloud usage accounting, we also propose...

  11. An Algorithm to Compute the Character Access Count Distribution for Pattern Matching Algorithms

    NARCIS (Netherlands)

    Marschall, T.; Rahmann, S.

    2011-01-01

    We propose a framework for the exact probabilistic analysis of window-based pattern matching algorithms, such as Boyer--Moore, Horspool, Backward DAWG Matching, Backward Oracle Matching, and more. In particular, we develop an algorithm that efficiently computes the distribution of a pattern matching

  12. Computers for All Students: A Strategy for Universal Access to Information Resources.

    Science.gov (United States)

    Resmer, Mark; And Others

    This report proposes a strategy of putting networked computing devices into the hands of all students at institutions of higher education. It outlines the rationale for such a strategy, the options for financing, the required institutional support structure needed, and various implementation approaches. The report concludes that the resultant…

  13. South African sign language human-computer interface in the context of the national accessibility portal

    CSIR Research Space (South Africa)

    Olivrin, GJ

    2006-02-01

    Full Text Available Barker, “South African Sign Language Machine Translation System”, ACM, 2002 2. M del Puy Carretero and D Oyarzun et al, “Virtual characters facial and body animation through the edition and interpretation of mark-up languages”, Science Direct Computers...

  14. A Web-based computer system supporting information access, exchange and management during building processes

    DEFF Research Database (Denmark)

    Sørensen, Lars Schiøtt

    1998-01-01

    During the last two decades, a number of research efforts have been made in the field of computing systmes related to the building construction industry. Most of the projects have focused on a part of the entire design process and have typically been limited to a specific domain. This paper...

  15. Alternatives to project-specific consent for access to personal information for health research: insights from a public dialogue.

    Science.gov (United States)

    Willison, Donald J; Swinton, Marilyn; Schwartz, Lisa; Abelson, Julia; Charles, Cathy; Northrup, David; Cheng, Ji; Thabane, Lehana

    2008-11-19

    The role of consent for research use of health information is contentious. Most discussion has focused on when project-specific consent may be waived but, recently, a broader range of consent options has been entertained, including broad opt-in for multiple studies with restrictions and notification with opt-out. We sought to elicit public values in this matter and to work toward an agreement about a common approach to consent for use of personal information for health research through deliberative public dialogues. We conducted seven day-long public dialogues, involving 98 participants across Canada. Immediately before and after each dialogue, participants completed a fixed-response questionnaire rating individuals' support for 3 approaches to consent in the abstract and their consent choices for 5 health research scenarios using personal information. They also rated how confident different safeguards made them feel that their information was being used responsibly. Broad opt-in consent for use of personal information garnered the greatest support in the abstract. When presented with specific research scenarios, no one approach to consent predominated. When profit was introduced into the scenarios, consent choices shifted toward greater control over use. Despite lively and constructive dialogues, and considerable shifting in opinion at the individual level, at the end of the day, there was no substantive aggregate movement in opinion. Personal controls were among the most commonly cited approaches to improving people's confidence in the responsible use of their information for research. Because no one approach to consent satisfied even a simple majority of dialogue participants and the importance placed on personal controls, a mechanism should be developed for documenting consent choice for different types of research, including ways for individuals to check who has accessed their medical record for purposes other than clinical care. This could be done, for

  16. Alternatives to project-specific consent for access to personal information for health research: Insights from a public dialogue

    Directory of Open Access Journals (Sweden)

    Abelson Julia

    2008-11-01

    Full Text Available Abstract Background The role of consent for research use of health information is contentious. Most discussion has focused on when project-specific consent may be waived but, recently, a broader range of consent options has been entertained, including broad opt-in for multiple studies with restrictions and notification with opt-out. We sought to elicit public values in this matter and to work toward an agreement about a common approach to consent for use of personal information for health research through deliberative public dialogues. Methods We conducted seven day-long public dialogues, involving 98 participants across Canada. Immediately before and after each dialogue, participants completed a fixed-response questionnaire rating individuals' support for 3 approaches to consent in the abstract and their consent choices for 5 health research scenarios using personal information. They also rated how confident different safeguards made them feel that their information was being used responsibly. Results Broad opt-in consent for use of personal information garnered the greatest support in the abstract. When presented with specific research scenarios, no one approach to consent predominated. When profit was introduced into the scenarios, consent choices shifted toward greater control over use. Despite lively and constructive dialogues, and considerable shifting in opinion at the individual level, at the end of the day, there was no substantive aggregate movement in opinion. Personal controls were among the most commonly cited approaches to improving people's confidence in the responsible use of their information for research. Conclusion Because no one approach to consent satisfied even a simple majority of dialogue participants and the importance placed on personal controls, a mechanism should be developed for documenting consent choice for different types of research, including ways for individuals to check who has accessed their medical record

  17. Experiences and Perceptions of Adults Accessing Publicly Available Nutrition Behavior-Change Mobile Apps for Weight Management.

    Science.gov (United States)

    Lieffers, Jessica R L; Arocha, Jose F; Grindrod, Kelly; Hanning, Rhona M

    2017-06-15

    Nutrition mobile apps have become accessible and popular weight-management tools available to the general public. To date, much of the research has focused on quantitative outcomes with these tools (eg, weight loss); little is known about user experiences and perceptions of these tools when used outside of a research trial environment. Our aim was to understand the experiences and perceptions of adult volunteers who have used publicly available mobile apps to support nutrition behavior change for weight management. We conducted one-on-one semi-structured interviews with individuals who reported using nutrition mobile apps for weight management outside of a research setting. Twenty-four healthy adults (n=19 females, n=5 males) who had used publicly available nutrition mobile apps for weight management for ≥1 week within the past 3 to 4 months were recruited from the community in southern Ontario and Edmonton, Canada, using different methods (eg, social media, posters, and word of mouth). Interviews were audiorecorded, transcribed verbatim, and transcripts were verified against recordings. Data were coded inductively and organized into categories using NVivo, version 10 (QSR International). Participants used nutrition apps for various amounts of time (mean=approximately 14 months). Varied nutrition apps were used; however, MyFitnessPal was the most common. In the interviews, the following four categories of experiences with nutrition apps became apparent: food data entry (database, data entry methods, portion size, and complex foods); accountability, feedback, and progress (goal setting, accountability, monitoring, and feedback); technical and app-related factors; and personal factors (self-motivation, privacy, knowledge, and obsession). Most participants used apps without professional or dietitian support. This work reveals that numerous factors affect use and ongoing adherence to use of nutrition mobile apps. These data are relevant to professionals looking to

  18. CUAHSI-HIS: an Internet based system to facilitate public discovery, access, and exploration of different water science data sources

    Science.gov (United States)

    Arrigo, J. S.; Hooper, R. P.; Choi, Y.; Ames, D. P.; Kadlec, J.; Whiteaker, T.

    2011-12-01

    "Water is everywhere." This sentiment underscores the importance of instilling hydrologic and earth science literacy in educators, students, and the general public, but also presents challenges for water scientists and educators. Scientific data about water is collected and distributed by several different sources, from federal agencies to scientific investigators to citizen scientists. As competition for limited water resources increase, increasing access to and understanding of the wealth of information about the nation's and the world's water will be critical. The CUAHSI-HIS system is a web based system for sharing hydrologic data that can help address this need. HydroDesktop is a free, open source application for finding, getting, analyzing and using hydrologic data from the CUAHSI-HIS system. It works with HydroCatalog which indexes the data to find out what data exists and where it is, and then it retrieves the data from HydroServers where it is stored communicating using WaterOneFlow web services. Currently, there are over 65 services registered in HydroCatalog providing central discovery of water data from several federal and state agencies, university projects, and other sources. HydroDesktop provides a simplified GIS that allows users to incorporate spatial data, and simple analysis tools to facilitate graphing and visualization. HydroDesktop is designed to be useful for a number of different groups of users with a wide variety of needs and skill levels including university faculty, graduate and undergraduate students, K-12 students, engineering and scientific consultants, and others. This presentation will highlight some of the features of HydroDesktop and the CUAHSI-HIS system that make it particularly appropriate for use in educational and public outreach settings, and will present examples of educational use. The incorporation of "real data," localization to an area of interest, and problem-based learning are all recognized as effective strategies for

  19. Enabling dynamic access to dynamic petascale Earth Systems and Environmental data collections is easy: citing and reproducing the actual data extracts used in research publications is NOT

    Science.gov (United States)

    Wyborn, L. A.; Wang, J.; Si, W.; Druken, K. A.; Evans, B. J. K.; Klump, J. F.; Car, N. J.; Trenham, C.

    2015-12-01

    The National Computational Infrastructure (NCI) at the Australian National University (ANU) has collocated over 10 PB of national and international Earth Systems and Environmental data assets within a HPC facility to create the National Environmental Research Data Interoperability Platform (NERDIP). Data are replicated to, or are produced at, NCI: in many cases they are processed to higher-level data products. Individual data sets within these collections can range from multi-petabyte climate models and large volume raster arrays, down to gigabyte size, ultra-high resolution data sets. All data are quality assured to being 'published' and made accessible as services. Persistent identifiers are assigned during publishing at both the collection and data set level: the granularity and version control on persistent identifiers depend on the dataset. However, most NERDIP collections are dynamic: either new data is being appended, or else models/derivative products are being revised with new data, or changed as processing methods are improved. Further, because the data are accessible as services, researchers can log in and dynamically create user-defined subsets for specific research projects: inevitably such extracts underpin traditional 'publications'. Being able to reproduce these exact data extracts can be difficult and for the very larger data sets preserving a copy of large data extracts is out of the question. A solution is for the researcher to use provenance workflows that at a minimum capture the version of the data set used, the query and the time of extraction. In parallel, the data provider needs to implement version controls on the data and deploy tracking systems that time stamp when new data are appended, or when modifications are made to existing data and record what these changes are. Where, when and how persistent identifiers are minted on these large and dynamically changing data sets is still open to debate.

  20. Accurate guidance for percutaneous access to a specific target in soft tissues: preclinical study of computer-assisted pericardiocentesis.

    Science.gov (United States)

    Chavanon, O; Barbe, C; Troccaz, J; Carrat, L; Ribuot, C; Noirclerc, M; Maitrasse, B; Blin, D

    1999-06-01

    In the field of percutaneous access to soft tissues, our project was to improve classical pericardiocentesis by performing accurate guidance to a selected target, according to a model of the pericardial effusion acquired through three-dimensional (3D) data recording. Required hardware is an echocardiographic device and a needle, both linked to a 3D localizer, and a computer. After acquiring echographic data, a modeling procedure allows definition of the optimal puncture strategy, taking into consideration the mobility of the heart, by determining a stable region, whatever the period of the cardiac cycle. A passive guidance system is then used to reach the planned target accurately, generally a site in the middle of the stable region. After validation on a dynamic phantom and a feasibility study in dogs, an accuracy and reliability analysis protocol was realized on pigs with experimental pericardial effusion. Ten consecutive successful punctures using various trajectories were performed on eight pigs. Nonbloody liquid was collected from pericardial effusions in the stable region (5 to 9 mm wide) within 10 to 15 minutes from echographic acquisition to drainage. Accuracy of at least 2.5 mm was demonstrated. This study demonstrates the feasibility of computer-assisted pericardiocentesis. Beyond the simple improvement of the current technique, this method could be a new way to reach the heart or a new tool for percutaneous access and image-guided puncture of soft tissues. Further investigation will be necessary before routine human application.

  1. FCJ-133 The Scripted Spaces of Urban Ubiquitous Computing: The experience, poetics, and politics of public scripted space

    Directory of Open Access Journals (Sweden)

    Christian Ulrik Andersen

    2011-12-01

    Full Text Available This article proposes and introduces the concept of ‘scripted space’ as a new perspective on ubiquitous computing in urban environments. Drawing on urban history, computer games, and a workshop study of the city of Lund the article discusses the experience of digitally scripted spaces, and their relation to the history of public spaces. In conclusion, the article discusses the potential for employing scripted spaces as a reinvigoration of urban public space.

  2. Big Data solutions on a small scale: Evaluating accessible high-performance computing for social research

    Directory of Open Access Journals (Sweden)

    Dhiraj Murthy

    2014-11-01

    Full Text Available Though full of promise, Big Data research success is often contingent on access to the newest, most advanced, and often expensive hardware systems and the expertise needed to build and implement such systems. As a result, the accessibility of the growing number of Big Data-capable technology solutions has often been the preserve of business analytics. Pay as you store/process services like Amazon Web Services have opened up possibilities for smaller scale Big Data projects. There is high demand for this type of research in the digital humanities and digital sociology, for example. However, scholars are increasingly finding themselves at a disadvantage as available data sets of interest continue to grow in size and complexity. Without a large amount of funding or the ability to form interdisciplinary partnerships, only a select few find themselves in the position to successfully engage Big Data. This article identifies several notable and popular Big Data technologies typically implemented using large and extremely powerful cloud-based systems and investigates the feasibility and utility of development of Big Data analytics systems implemented using low-cost commodity hardware in basic and easily maintainable configurations for use within academic social research. Through our investigation and experimental case study (in the growing field of social Twitter analytics, we found that not only are solutions like Cloudera’s Hadoop feasible, but that they can also enable robust, deep, and fruitful research outcomes in a variety of use-case scenarios across the disciplines.

  3. Big Data solutions on a small scale: Evaluating accessible high-performance computing for social research

    Directory of Open Access Journals (Sweden)

    Dhiraj Murthy

    2014-11-01

    Full Text Available Though full of promise, Big Data research success is often contingent on access to the newest, most advanced, and often expensive hardware systems and the expertise needed to build and implement such systems. As a result, the accessibility of the growing number of Big Data-capable technology solutions has often been the preserve of business analytics. Pay as you store/process services like Amazon Web Services have opened up possibilities for smaller scale Big Data projects. There is high demand for this type of research in the digital humanities and digital sociology, for example. However, scholars are increasingly finding themselves at a disadvantage as available data sets of interest continue to grow in size and complexity. Without a large amount of funding or the ability to form interdisciplinary partnerships, only a select few find themselves in the position to successfully engage Big Data. This article identifies several notable and popular Big Data technologies typically implemented using large and extremely powerful cloud-based systems and investigates the feasibility and utility of development of Big Data analytics systems implemented using low-cost commodity hardware in basic and easily maintainable configurations for use within academic social research. Through our investigation and experimental case study (in the growing field of social Twitter analytics, we found that not only are solutions like Cloudera’s Hadoop feasible, but that they can also enable robust, deep, and fruitful research outcomes in a variety of use-case scenarios across the disciplines.

  4. BindingDB in 2015: A public database for medicinal chemistry, computational chemistry and systems pharmacology.

    Science.gov (United States)

    Gilson, Michael K; Liu, Tiqing; Baitaluk, Michael; Nicola, George; Hwang, Linda; Chong, Jenny

    2016-01-04

    BindingDB, www.bindingdb.org, is a publicly accessible database of experimental protein-small molecule interaction data. Its collection of over a million data entries derives primarily from scientific articles and, increasingly, US patents. BindingDB provides many ways to browse and search for data of interest, including an advanced search tool, which can cross searches of multiple query types, including text, chemical structure, protein sequence and numerical affinities. The PDB and PubMed provide links to data in BindingDB, and vice versa; and BindingDB provides links to pathway information, the ZINC catalog of available compounds, and other resources. The BindingDB website offers specialized tools that take advantage of its large data collection, including ones to generate hypotheses for the protein targets bound by a bioactive compound, and for the compounds bound by a new protein of known sequence; and virtual compound screening by maximal chemical similarity, binary kernel discrimination, and support vector machine methods. Specialized data sets are also available, such as binding data for hundreds of congeneric series of ligands, drawn from BindingDB and organized for use in validating drug design methods. BindingDB offers several forms of programmatic access, and comes with extensive background material and documentation. Here, we provide the first update of BindingDB since 2007, focusing on new and unique features and highlighting directions of importance to the field as a whole.

  5. COMPUTING

    CERN Multimedia

    I. Fisk

    2013-01-01

    Computing activity had ramped down after the completion of the reprocessing of the 2012 data and parked data, but is increasing with new simulation samples for analysis and upgrade studies. Much of the Computing effort is currently involved in activities to improve the computing system in preparation for 2015. Operations Office Since the beginning of 2013, the Computing Operations team successfully re-processed the 2012 data in record time, not only by using opportunistic resources like the San Diego Supercomputer Center which was accessible, to re-process the primary datasets HTMHT and MultiJet in Run2012D much earlier than planned. The Heavy-Ion data-taking period was successfully concluded in February collecting almost 500 T. Figure 3: Number of events per month (data) In LS1, our emphasis is to increase efficiency and flexibility of the infrastructure and operation. Computing Operations is working on separating disk and tape at the Tier-1 sites and the full implementation of the xrootd federation ...

  6. Accessibility of Water-Related Cultural Ecosystem Services through Public Transport—A Model for Planning Support in the Stockholm Region

    Directory of Open Access Journals (Sweden)

    Zahra Kalantari

    2017-02-01

    Full Text Available Planning for sustainable cities involves supporting compact, energy-efficient urban form as well as maintaining attractive and liveable urban landscapes. Attractive cities depend highly on services provided by ecosystems, especially cultural ecosystem services (ES, which give direct benefits to urban citizens. Therefore, access to a diversity of urban functions and publicly available ES by walking and public transport should be considered when planning for sustainable cities. This could be facilitated by user-friendly planning support models. The aim of this study was to develop a GIS-based model for assessing accessibility to ES, more specifically, water-related cultural ecosystem services (WCES, via walking and public transport, with input from stakeholders. The model was applied to the Stockholm region in Sweden. Travel times and census data were used to derive measures and maps of accessibility to prioritised WCES in the region, today and in urbanisation scenarios for 2050. The results showed how access to WCES varied spatially within the region. The number of potential visitors to different WCES sites now and in the future urbanisation scenarios was estimated, and areas in need for future development of the public transport system as well as WCES were identified. The GIS-based accessibility model has potential to be used as planning support in urban planning.

  7. Large-Scale 1:1 Computing Initiatives: An Open Access Database

    Science.gov (United States)

    Richardson, Jayson W.; McLeod, Scott; Flora, Kevin; Sauers, Nick J.; Kannan, Sathiamoorthy; Sincar, Mehmet

    2013-01-01

    This article details the spread and scope of large-scale 1:1 computing initiatives around the world. What follows is a review of the existing literature around 1:1 programs followed by a description of the large-scale 1:1 database. Main findings include: 1) the XO and the Classmate PC dominate large-scale 1:1 initiatives; 2) if professional…

  8. Parallel Oblivious Array Access for Secure Multiparty Computation and Privacy-Preserving Minimum Spanning Trees

    Directory of Open Access Journals (Sweden)

    Laud Peeter

    2015-06-01

    Full Text Available In this paper, we describe efficient protocols to perform in parallel many reads and writes in private arrays according to private indices. The protocol is implemented on top of the Arithmetic Black Box (ABB and can be freely composed to build larger privacypreserving applications. For a large class of secure multiparty computation (SMC protocols, our technique has better practical and asymptotic performance than any previous ORAM technique that has been adapted for use in SMC.

  9. The Impact and Challenges of Cloud Computing Adoption on Public Universities in Southwestern Nigeria

    Directory of Open Access Journals (Sweden)

    Oyeleye Christopher Akin

    2014-08-01

    Full Text Available This study investigates the impact and challenges of the adoption of cloud computing by public universities in the Southwestern part of Nigeria. A sample size of 100 IT staff, 50 para-IT staff and 50 students were selected in each university using stratified sampling techniques with the aid of well-structured questionnaires. Microsoft excel was used to capture the data while frequency and percentage distributions were used to analyze it. In all, 2, 000 copies of the questionnaire were administered to the ten (10 public universities in the southwestern part of Nigeria while 1742 copies were returned which represents a respondent rate of 87.1%. The result of the findings revealed that the adoption of cloud computing has a significant impact on cost effectiveness, enhanced availability, low environmental impact, reduced IT complexities, mobility, scalability, increased operability and reduced investment in physical asset However, the major challenges confronting the adoption of cloud are data insecurity, regulatory compliance concerns, lock-in and privacy concerns. This paper concludes by recommending strategies to manage the identified challenges in the study area.

  10. Cardea: Providing Support for Dynamic Resource Access in a Distributed Computing Environment

    Science.gov (United States)

    Lepro, Rebekah

    2003-01-01

    The environment framing the modem authorization process span domains of administration, relies on many different authentication sources, and manages complex attributes as part of the authorization process. Cardea facilitates dynamic access control within this environment as a central function of an inter-operable authorization framework. The system departs from the traditional authorization model by separating the authentication and authorization processes, distributing the responsibility for authorization data and allowing collaborating domains to retain control over their implementation mechanisms. Critical features of the system architecture and its handling of the authorization process differentiate the system from existing authorization components by addressing common needs not adequately addressed by existing systems. Continuing system research seeks to enhance the implementation of the current authorization model employed in Cardea, increase the robustness of current features, further the framework for establishing trust and promote interoperability with existing security mechanisms.

  11. Optical interconnection network for parallel access to multi-rank memory in future computing systems.

    Science.gov (United States)

    Wang, Kang; Gu, Huaxi; Yang, Yintang; Wang, Kun

    2015-08-10

    With the number of cores increasing, there is an emerging need for a high-bandwidth low-latency interconnection network, serving core-to-memory communication. In this paper, aiming at the goal of simultaneous access to multi-rank memory, we propose an optical interconnection network for core-to-memory communication. In the proposed network, the wavelength usage is delicately arranged so that cores can communicate with different ranks at the same time and broadcast for flow control can be achieved. A distributed memory controller architecture that works in a pipeline mode is also designed for efficient optical communication and transaction address processes. The scaling method and wavelength assignment for the proposed network are investigated. Compared with traditional electronic bus-based core-to-memory communication, the simulation results based on the PARSEC benchmark show that the bandwidth enhancement and latency reduction are apparent.

  12. Digital utopias and real cities—computer-generated images in re-design of public space

    Directory of Open Access Journals (Sweden)

    Marianna Michałowska

    2015-12-01

    Full Text Available Virtual environments are seen nowadays as extensions of our physical activities in the city. Are people, however, aware what the digitally mediated cities they live in are? The starting point of my paper is a question of how computer-generated images (CGIs influence human perception of real space. I am interested in the conflict between a vision and reality, which occurs when an architectural project materialises in a public space and is subsequently rejected by the inhabitants. To explain this conflict, I will use the notion of digital utopias and compare CGIs with the great tradition of “paper” architecture. I will analyse two case studies from a medium-sized Polish city—Poznań. The first case is a redevelopment of the Main Railway Station; the second is a re-design of a local square in Poznań. The analysis focuses on the ambiguity of CGIs used to advertise new investments. The Station in the phase of digital visualisation was appreciated by the Poznań inhabitants but when the project was finally realised, strong criticism of its users followed. The second one provoked public protests already in the phase of visualisation. In conclusion, I state that the concept of agonistic public spaces should be expanded and its virtual dimension should be taken into consideration as well. When dealing with hyper-realistic CGIs, we experience a certain utopia. Confronted with their material execution, we often experience dystopian disillusion which stirs us into action.

  13. Fishing Access Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — The Vermont Fish & Wildlife Department maintains developed fishing access areas. These sites provide public access to waters in Vermont for shore fishing...

  14. Computing what the public wants: some issues in road safety cost-benefit analysis.

    Science.gov (United States)

    Hauer, Ezra

    2011-01-01

    In road safety, as in other fields, cost-benefit analysis (CBA) is used to justify the investment of public money and to establish priority between projects. It amounts to a computation by which 'few' - the CB analysts - aim to determine what the 'many' - those on behalf of which the choice is to be made - would choose. The question is whether there are grounds to believe that the tool fits the aim. I argue that the CBA tool is deficient. First, because estimates of the value of statistical life and injury on which the CBA computation rests are all over the place, inconsistent with the value of time estimates, and government guidance on the matter appears to be arbitrary. Second, because the premises of New Welfare Economics on which the CBA is founded apply only in circumstances which, in road safety, are rare. Third, because the CBA requires the computation of present values which must be questioned when the discounting is of future lives and of time. Because time savings are valued too highly when compared to life and because discounting tends to unjustifiably diminish the value of lives saved in the future, the CBA tends to bias decisions against investment in road safety.

  15. A comparison of data-access platforms for BaBar and ALICE analysis computing model at the Italian Tier1

    Energy Technology Data Exchange (ETDEWEB)

    Fella, A; Li Gioi, L; Noferini, F; Cavalli, A; Chierici, A; Dell' Agnello, L; Gregori, D; Italiano, A; Martelli, B; Prosperini, A; Ricci, P; Ronchieri, E; Salomoni, D; Sapunenko, V; Vitlacil, D [INFN-CNAF Bologna (Italy); Furano, F [Conseil Europeen Recherche Nucl. (CERN) (Switzerland); Steinke, M [Ruhr Universitaet, Bochum (Germany); Andreotti, D; Luppi, E, E-mail: armando.fella@cnaf.infn.i, E-mail: luigi.ligioi@cnaf.infn.i, E-mail: francesco.noferini@bo.infn.i [INFN Ferrara, Ferrara (Italy)

    2010-04-01

    Performance, reliability and scalability in data access are key issues in the context of Grid computing and High Energy Physics (HEP) data analysis. We present the technical details and the results of a large scale validation and performance measurement achieved at the CNAF Tier1, the central computing facility of the Italian National Institute for Nuclear Research (INFN). The aim of this work is the evaluation of data access activity during analysis tasks within BaBar and ALICE computing models against two of the most used data handling systems in HEP scenario: GPFS and Scalla/Xrootd.

  16. Determinants of sexual risk behavior among men who have sex with men accessing public sex environments in Chennai, India.

    Science.gov (United States)

    Newman, P A; Chakrapani, V; Cook, C; Shunmugam, M; Kakinami, L

    2008-01-01

    We conducted structured interviews with 200 men who have sex with men (MSM) recruited using time-space sampling from public sex environments (PSEs) in Chennai, India. Predictors of sexual risk behavior were assessed with chi2 tests and multiple logistic regression. One-third reported unprotected receptive anal sex (URAS) last time and 36% inconsistent condom use in the past month. URAS was associated with younger age, less than high school education, low income, and low HIV transmission knowledge (adjusted odds ratio [AOR] = 2.1, 2.5, 3.7 and 2.5, respectively). Inconsistent condom use was associated with less than high school education (AOR = 3.2) and low HIV transmission knowledge (AOR = 3.5). Multilevel HIV prevention strategies tailored for low socioeconomic kothis and other MSM in PSEs in Chennai should include peer interventions to increase knowledge of HIV transmission risks and sexually transmitted infections (STIs), and structural interventions to expand economic and educational opportunities, and accessible STI testing and treatment.

  17. Access to nutritious food, socioeconomic individualism and public health ethics in the USA: a common good approach.

    Science.gov (United States)

    Azétsop, Jacquineau; Joy, Tisha R

    2013-10-29

    Good nutrition plays an important role in the optimal growth, development, health and well-being of individuals in all stages of life. Healthy eating can reduce the risk of chronic diseases, such as heart disease, stroke, diabetes and some types of cancer. However, the capitalist mindset that shapes the food environment has led to the commoditization of food. Food is not just a marketable commodity like any other commodity. Food is different from other commodities on the market in that it is explicitly and intrinsically linked to our human existence. While possessing another commodity allows for social benefits, food ensures survival. Millions of people in United States of America are either malnourished or food insecure. The purpose of this paper is to present a critique of the current food system using four meanings of the common good--as a framework, rhetorical device, ethical concept and practical tool for social justice. The first section of this paper provides a general overview of the notion of the common good. The second section outlines how each of the four meanings of the common good helps us understand public practices, social policies and market values that shape the distal causal factors of nutritious food inaccessibility. We then outline policy and empowerment initiatives for nutritious food access.

  18. USE OF THE BLOG AT A PUBLIC SCHOOL MUNICIPAL AS A TOOL FOR ACCESS TO REALITY SCHOOL

    Directory of Open Access Journals (Sweden)

    Maurícia Simões dos Santos Palácio

    2013-07-01

    Full Text Available This research, related to the Post- graduate Program in Education and its search line “Education´s Practices and Formative processes”, from Universidade Estadual Paulista "Júlio de Mesquita Filho", Campus of Presidente Prudente, contemplated a case study of a blog´s content from a municipal public school located in the interior of São Paulo State. Still, talks about this school blog which configures itself as an access´ tool to the school reality and that serves as a reflection point for the school manager. From the analysis of published texts on, this work had as general objective to analyze whether the use of the blog can be an information space and a way to manage the institutional and pedagogical/ administrative profile, capable to unleash the participation of all the school within the vision of democratic management. The use of Blogs by schools is still a recent habit and there is much to be found out. In this perspective, this study proposed to unravel some resources that will contribute somehow with the school manager's role in relation to Information and Communication Technology (ICT, specially concerning the use of the blog and the establishment of an integrative and interactionist process with the school community.

  19. ICRP Publication 116—the first ICRP/ICRU application of the male and female adult reference computational phantoms

    CERN Document Server

    Petoussi-Henss, Nina; Eckerman, Keith F; Endo, Akira; Hertel, Nolan; Hunt, John; Menzel, Hans G; Pelliccioni, Maurizio; Schlattl, Helmut; Zankl, Maria

    2014-01-01

    ICRP Publication 116 on `Conversion coefficients for radiological protection quantities for external radiation exposures', provides fluence-to-dose conversion coefficients for organ-absorbed doses and effective dose for various types of external exposures (ICRP 2010 ICRP Publication 116). The publication supersedes the ICRP Publication 74 (ICRP 1996 ICRP Publication 74, ICRU 1998 ICRU Report 57), including new particle types and expanding the energy ranges considered. The coefficients were calculated using the ICRP/ICRU computational phantoms (ICRP 2009 ICRP Publication 110) representing the reference adult male and reference adult female (ICRP 2002 ICRP Publication 89), together with a variety of Monte Carlo codes simulating the radiation transport in the body. Idealized whole-body irradiation from unidirectional and rotational parallel beams as well as isotropic irradiation was considered for a large variety of incident radiations and energy ranges. Comparison of the effective doses with operational quantit...

  20. Accessible tourism in Brazil: an exploratory study about the public policies and the process of inclusion of persons with disabilities

    Directory of Open Access Journals (Sweden)

    Donária Coelho Duarte

    2015-12-01

    Full Text Available One of the biggest challenges of society Brazilian is confronting the issue of equality and social exclusion. It is estimated that there are approximately 45 million people with disabilities in Brazil (IBGE, 2010, many of them still unable to enjoy leisure and tourism activities due to their physical limitations and lack of adaptation of the environment. The purpose of this article is to verify if public policy focused tourism for people with disabilities (PWD have been able to meet demands for inclusion these  segment, also seeks the perception of these people as to the inclusion process. The focus of this study, therefore, refers to people who were born or have acquired some kind of permanent limitation, not being object of this survey people who have had temporary physical limitations and/or sporadic or who have reduced mobility. In terms of methodology, a exploratory and qualitative research was made with interviews of semi-structured scripts.  The participants of study were nine managers chosen from representatives of government, of representatives of the tourist trade and of associations of people with disabilities. From the interviews with the public, given the diversity of actions and their characteristics, it proposed the classification of programs/government actions. As result, the research shows that the government has to attack the problem and sought to create and implement policies directed to this segment. However, people with disabilities consider that what has been done is not enough to include them really in tourist activities and say they are not being heard enough. All disabled associations mentions that the limitations/difficult environment hamper achievement of tourism. It was noticed also that the private sector does not consider the disabled person as a consumer public and that are not done research to understand the profile and the needs of this segment. Both the private sector as PWD associations, showed little

  1. A Computational Method based on Radio Frequency Technologies for the Analysis of Accessibility of Disabled People in Sustainable Cities

    Directory of Open Access Journals (Sweden)

    Virgilio Gilart-Iglesias

    2015-11-01

    Full Text Available The sustainability strategy in urban spaces arises from reflecting on how to achieve a more habitable city and is materialized in a series of sustainable transformations aimed at humanizing different environments so that they can be used and enjoyed by everyone without exception and regardless of their ability. Modern communication technologies allow new opportunities to analyze efficiency in the use of urban spaces from several points of view: adequacy of facilities, usability, and social integration capabilities. The research presented in this paper proposes a method to perform an analysis of movement accessibility in sustainable cities based on radio frequency technologies and the ubiquitous computing possibilities of the new Internet of Things paradigm. The proposal can be deployed in both indoor and outdoor environments to check specific locations of a city. Finally, a case study in a controlled context has been simulated to validate the proposal as a pre-deployment step in urban environments.

  2. Fencing network direct memory access data transfers in a parallel active messaging interface of a parallel computer

    Energy Technology Data Exchange (ETDEWEB)

    Blocksome, Michael A.; Mamidala, Amith R.

    2015-07-14

    Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to a deterministic data communications network through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and the deterministic data communications network; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.

  3. Fencing network direct memory access data transfers in a parallel active messaging interface of a parallel computer

    Energy Technology Data Exchange (ETDEWEB)

    Blocksome, Michael A.; Mamidala, Amith R.

    2015-07-07

    Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to a deterministic data communications network through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and the deterministic data communications network; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.

  4. Intelligent computer aided training systems in the real world: Making the technology accessible to the educational mainstream

    Science.gov (United States)

    Kovarik, Madeline

    1993-01-01

    Intelligent computer aided training systems hold great promise for the application of this technology to mainstream education and training. Yet, this technology, which holds such a vast potential impact for the future of education and training, has had little impact beyond the enclaves of government research labs. This is largely due to the inaccessibility of the technology to those individuals in whose hands it can have the greatest impact, teachers and educators. Simply throwing technology at an educator and expecting them to use it as an effective tool is not the answer. This paper provides a background into the use of technology as a training tool. MindLink, developed by HyperTech Systems, provides trainers with a powerful rule-based tool that can be integrated directly into a Windows application. By embedding expert systems technology it becomes more accessible and easier to master.

  5. Open For Business? An Historical, Comparative Study of Public Access to Information about Two Controversial Coastal Developments in North-East Scotland

    Science.gov (United States)

    Baxter, Graeme

    2014-01-01

    Introduction: This paper compares public access to information about two controversial coastal developments in North-east Scotland: the construction of a gas terminal by the British Gas Council and Total in the 1970s, and the current development of "the world's greatest golf course" by the tycoon Donald Trump. Method: Data has been…

  6. Layers of Influence: Exploring Institutional- and State-Level Effects on College Student Views toward Access to Public Education for Undocumented Immigrants

    Science.gov (United States)

    Garibay, Juan C.; Herrera, Felisha A.; Johnston-Guerrero, Marc P.; Garcia, Gina A.

    2016-01-01

    Providing undocumented immigrants access to public education remains a pertinent issue facing both institutions of higher education and state governments. While instate resident tuition (ISRT) has remained a contentious policy, little is known about how such policies, as well as other state contexts, influence college students' attitudes toward…

  7. A Post-September 11th Balancing Act: Public Access to U.S. Government Information versus Protection of Sensitive Data

    Science.gov (United States)

    Herman, E.

    2004-01-01

    The purpose of this paper is to suggest realistic guidelines that balance public access to government information and the need to protect sensitive data. Emphasis is on lessons learned from a 1979 case where the government attempted to prohibit the Progressive Magazine from publishing an article about making a hydrogen bomb and government…

  8. A Post-September 11th Balancing Act: Public Access to U.S. Government Information versus Protection of Sensitive Data

    Science.gov (United States)

    Herman, E.

    2004-01-01

    The purpose of this paper is to suggest realistic guidelines that balance public access to government information and the need to protect sensitive data. Emphasis is on lessons learned from a 1979 case where the government attempted to prohibit the Progressive Magazine from publishing an article about making a hydrogen bomb and government…

  9. The benefit of non contrast-enhanced magnetic resonance angiography for predicting vascular access surgery outcome: a computer model perspective.

    Directory of Open Access Journals (Sweden)

    Maarten A G Merkx

    Full Text Available INTRODUCTION: Vascular access (VA surgery, a prerequisite for hemodialysis treatment of end-stage renal-disease (ESRD patients, is hampered by complication rates, which are frequently related to flow enhancement. To assist in VA surgery planning, a patient-specific computer model for postoperative flow enhancement was developed. The purpose of this study is to assess the benefit of non contrast-enhanced magnetic resonance angiography (NCE-MRA data as patient-specific geometrical input for the model-based prediction of surgery outcome. METHODS: 25 ESRD patients were included in this study. All patients received a NCE-MRA examination of the upper extremity blood vessels in addition to routine ultrasound (US. Local arterial radii were assessed from NCE-MRA and converted to model input using a linear fit per artery. Venous radii were determined with US. The effect of radius measurement uncertainty on model predictions was accounted for by performing Monte-Carlo simulations. The resulting flow prediction interval of the computer model was compared with the postoperative flow obtained from US. Patients with no overlap between model-based prediction and postoperative measurement were further analyzed to determine whether an increase in geometrical detail improved computer model prediction. RESULTS: Overlap between postoperative flows and model-based predictions was obtained for 71% of patients. Detailed inspection of non-overlapping cases revealed that the geometrical details that could be assessed from NCE-MRA explained most of the differences, and moreover, upon addition of these details in the computer model the flow predictions improved. CONCLUSIONS: The results demonstrate clearly that NCE-MRA does provide valuable geometrical information for VA surgery planning. Therefore, it is recommended to use this modality, at least for patients at risk for local or global narrowing of the blood vessels as well as for patients for whom an US-based model

  10. RESEARCH ON PROBLEMS WITH PROJECTS AND PARTNERSHIPS THAT PUBLIC INSTITUTIONS IN THE CENTRE REGION FACED IN ACCESSING EUROPEAN FUNDS

    Directory of Open Access Journals (Sweden)

    DUMITRASCU DANUT

    2012-12-01

    Full Text Available European project management is the main filed of the article. Assuming a connection between the degree of absorption of European funds and the degree of maturity of the Romanian society in terms of project management, the article seeks to identify the negative factors on accessing and carrying out European projects. The identified problem is a low degree of absorption of European funds in Romania, and the main objective of the research is to identify the problems faced by the public institutions in the Centre Region in accessing European funds and also the causes that led to the low absorption of European funds. This article’s research is based on a preliminary analysis performed by the authors on the rate of accessing of European funds published in the article called “The current state of European funds absorption through funding programmes – measure of the Romanian performances in the project management practice”. The conclusion of this article was a low rate of absorption of European funds in Romania, a fact that reveals a poor practice of the theory on project management. This article identifies part of the causes of this situation by identifying a part of the problems that stood in the way of beneficiaries of European funds The qualitative and quantitative research methods are used in combination in the research. The investigation has however a highly quantitative character, the purpose of the qualitative research being to provide the prerequisites for achieving the quantitative research. The interview-based qualitative research enabled the researcher to get acquainted with the subjects’ problems related to the theme of investigation, the causes that have generated these problems. This preliminary investigation to the questionnaire-based research aims to provide information that would help the researcher prepare the questionnaire, so that the questions allow getting the most comprehensive information to

  11. Energy Efficiency in Public Buildings through Context-Aware Social Computing

    Science.gov (United States)

    García, Óscar; Alonso, Ricardo S.; Prieto, Javier; Corchado, Juan M.

    2017-01-01

    The challenge of promoting behavioral changes in users that leads to energy savings in public buildings has become a complex task requiring the involvement of multiple technologies. Wireless sensor networks have a great potential for the development of tools, such as serious games, that encourage acquiring good energy and healthy habits among users in the workplace. This paper presents the development of a serious game using CAFCLA, a framework that allows for integrating multiple technologies, which provide both context-awareness and social computing. Game development has shown that the data provided by sensor networks encourage users to reduce energy consumption in their workplace and that social interactions and competitiveness allow for accelerating the achievement of good results and behavioral changes that favor energy savings. PMID:28398237

  12. Computed Tomography-guided Pericardiocentesis: An alternative approach for accessing the pericardium.

    Science.gov (United States)

    Melvan, John Nicholas; Madden, David; Vasquez, Julio C; DeLaRosa, Jacob

    2016-07-01

    Pericardial effusions compress the heart, decrease cardiac output, and lead to haemodynamic collapse. Ultrasound (US)-guided pericardiocentesis is the gold standard for treating pericardial effusions. Recently, the incorporation of computed tomography (CT) guidance has increased patient safety while entering the pericardium. Despite the superior performance of CT-guided pericardiocentesis in smaller, complex effusions, this procedure is not routinely performed by cardiologists and surgeons. Unlike those with an intact pericardium, patients with mediastinal trauma, pericardial adhesions, temporary pacing wires, and vascular conduits are high risk for pericardiocentesis. Tamponade physiology also increases patient susceptibility to the hypotensive effects of anaesthesia during surgical drainage. Here we illustrate the technique of CT-guided pericardiocentesis and demonstrate its application in specific clinical scenarios. We conclude that CT-guided pericardiocentesis provides a useful, alternative strategy for treating cardiac tamponade in high risk patients. Copyright © 2016 Australian and New Zealand Society of Cardiac and Thoracic Surgeons (ANZSCTS) and the Cardiac Society of Australia and New Zealand (CSANZ). Published by Elsevier B.V. All rights reserved.

  13. A Calculation Method of Area Public Transit Accessibility Based on GIS%基于GIS的区域公交可达性计算方法0

    Institute of Scientific and Technical Information of China (English)

    陈艳艳; 魏攀一; 赖见辉; 张伟伟; 冯国臣

    2015-01-01

    为计算城市内部特定区域对周边其他区域的公交可达性,更加直观地得到不同区域公交可达性差异程度,提出区域公交可达性概念。借助GIS空间分析功能,提出基于公交站点权重和公交线路辐射范围权重的区域公交可达性计算方法。以北京市朝阳区为例,计算朝阳区30个交通小区的区域公交可达性值。结果表明,区域公交可达性值,可以更加直观地展现城市内部不同区域对周边其他区域的公交可达性水平,这为选址分析、公交优化等提供了定量化的公交可达性信息。%To calculate the public transit accessibility between a specific area and its surrounding areas, and to show the differences of the public transit accessibility more intuitive, a new concept is raised, this is area public transit accessibility (APTA). Using the GIS spatial analysis, a method is introduced to calculate the APTA based on bus station and the boundary of the bus routes. Finally, a case study of Beijing Chaoyang district is conducted. The results show that the APTA can give us a clearly description, about the different levels of the public transit accessibility between a specific area and its surrounding areas. This provides quantitative information of public transit accessibility for location analysis and transit network optimizing.

  14. Can free open access resources strengthen knowledge-based emerging public health priorities, policies and programs in Africa? [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Ernest Tambo

    2016-05-01

    Full Text Available Tackling emerging epidemics and infectious diseases burden in Africa requires increasing unrestricted open access and free use or reuse of regional and global policies reforms as well as timely communication capabilities and strategies. Promoting, scaling up data and information sharing between African researchers and international partners are of vital importance in accelerating open access at no cost. Free Open Access (FOA health data and information acceptability, uptake tactics and sustainable mechanisms are urgently needed. These are critical in establishing real time and effective knowledge or evidence-based translation, proven and validated approaches, strategies and tools to strengthen and revamp health systems.  As such, early and timely access to needed emerging public health information is meant to be instrumental and valuable for policy-makers, implementers, care providers, researchers, health-related institutions and stakeholders including populations when guiding health financing, and planning contextual programs.

  15. Associations between neck musculoskeletal complaints and work related factors among public service computer workers in Kaunas

    Directory of Open Access Journals (Sweden)

    Gintaré Kaliniene

    2013-10-01

    Full Text Available Objectives:Information technologies have been developing very rapidly, also in the case of occupational activities. Epidemiological studies have shown that employees, who work with computers, are more likely to complain of musculoskeletal disorders (MSD. The aim of this study was to evaluate associations between neck MSD and individual and work related factors. Materials and Methods: The investigation which consisted of two parts - a questionnaire study (using Nordic Musculoskeletal questionnaire and Copenhagen Psychosocial Questionnaire and a direct observation (to evaluate ergonomic work environment using RULA method was carried out in three randomly selected public sector companies of Kaunas. The study population consisted of 513 public service office workers. Results: The survey showed that neck MSDs were very common in the investigated population. The prevalence rate amounted to 65.7%. According to our survey neck MSDs were significantly associated with older age, bigger work experience, high quantitative and cognitive job demands, working for longer than 2 h without taking a break as well as with higher ergonomic risk score. The fully adjusted model working for longer than 2 h without taking a break had the strongest associations with neck complaints. Conclusion: It was confirmed, that neck MSDs were significantly associated with individual factors as well as conditions of work, therefore, preventive acions against neck complaints should be oriented at psychosocial and ergonomic work environment as well as at individual factors.

  16. Integrating Publicly Available Data to Generate Computationally Predicted Adverse Outcome Pathways for Fatty Liver.

    Science.gov (United States)

    Bell, Shannon M; Angrish, Michelle M; Wood, Charles E; Edwards, Stephen W

    2016-04-01

    Newin vitrotesting strategies make it possible to design testing batteries for large numbers of environmental chemicals. Full utilization of the results requires knowledge of the underlying biological networks and the adverse outcome pathways (AOPs) that describe the route from early molecular perturbations to an adverse outcome. Curation of a formal AOP is a time-intensive process and a rate-limiting step to designing these test batteries. Here, we describe a method for integrating publicly available data in order to generate computationally predicted AOP (cpAOP) scaffolds, which can be leveraged by domain experts to shorten the time for formal AOP development. A network-based workflow was used to facilitate the integration of multiple data types to generate cpAOPs. Edges between graph entities were identified through direct experimental or literature information, or computationally inferred using frequent itemset mining. Data from the TG-GATEs and ToxCast programs were used to channel large-scale toxicogenomics information into a cpAOP network (cpAOPnet) of over 20 000 relationships describing connections between chemical treatments, phenotypes, and perturbed pathways as measured by differential gene expression and high-throughput screening targets. The resulting fatty liver cpAOPnet is available as a resource to the community. Subnetworks of cpAOPs for a reference chemical (carbon tetrachloride, CCl4) and outcome (fatty liver) were compared with published mechanistic descriptions. In both cases, the computational approaches approximated the manually curated AOPs. The cpAOPnet can be used for accelerating expert-curated AOP development and to identify pathway targets that lack genomic markers or high-throughput screening tests. It can also facilitate identification of key events for designing test batteries and for classification and grouping of chemicals for follow up testing.

  17. Length Calculation for Vehicle Access of Large Public Buildings%大型公共建筑机动车出入口长度计算

    Institute of Scientific and Technical Information of China (English)

    卓曦; 钱振东; 胡亮

    2012-01-01

    为提高出入口通行能力与城市道路交通安全水平,分析大型公共建筑机动车出入口长度影响因素,考虑大型公共建筑用地出行生成率与城市道路车辆反应视距,建立出入口长度模型.该模型利用建筑交通生成计算出入口道路排队长度,并利用视距三角形计算出入口车辆安全距离,取其中较大值为出入口长度.最后以某市公交枢纽站为例进行试算与仿真.仿真结果表明:应用模型所得出入口长度后,公交站出入口道路与临近城市道路的单车平均延误分别减少5.05s与6.37s,平均车速分别提高5.1 km/h与4.81 km/h.可见研究成果有利于大型公建机动车出入口交通渠化与线形改善.%To increase the access capacity and heighten the urban street traffic safety level, impact factors of the vehicle access length of large public buildings are analyzed. Then considering the land trip generation rate of large public buildings and vehicle decision sight distance of urban streets, the access length model is put forward. The model uses the building trip generation for calculating the access queue length and adopts the sight triangle to calculate the vehicle safety distance in the access, the larger one of which is considered as the access length. Finally, one urban public traffic transfer hub is taken as the example for calculating and simulating. The simulation result indicates that, after applying the access length from the model, the delay per vehicle of the public traffic station driveway and the adjacent urban street separately decreases 5. 05 s and 6. 37 s, while the average speed increases 5. 1 km/h and 4. 81 km/h. It can be seen that, research results are beneficial to improving the vehicle access traffic channelization and alignment of large public buildings.

  18. COMPUTING

    CERN Multimedia

    M. Kasemann

    Introduction During the past six months, Computing participated in the STEP09 exercise, had a major involvement in the October exercise and has been working with CMS sites on improving open issues relevant for data taking. At the same time operations for MC production, real data reconstruction and re-reconstructions and data transfers at large scales were performed. STEP09 was successfully conducted in June as a joint exercise with ATLAS and the other experiments. It gave good indication about the readiness of the WLCG infrastructure with the two major LHC experiments stressing the reading, writing and processing of physics data. The October Exercise, in contrast, was conducted as an all-CMS exercise, where Physics, Computing and Offline worked on a common plan to exercise all steps to efficiently access and analyze data. As one of the major results, the CMS Tier-2s demonstrated to be fully capable for performing data analysis. In recent weeks, efforts were devoted to CMS Computing readiness. All th...

  19. Difficulties in access and estimates of public beds in intensive care units in the state of Rio de Janeiro

    Directory of Open Access Journals (Sweden)

    Rosane Sonia Goldwasser

    2016-01-01

    Full Text Available ABSTRACT OBJECTIVE To estimate the required number of public beds for adults in intensive care units in the state of Rio de Janeiro to meet the existing demand and compare results with recommendations by the Brazilian Ministry of Health. METHODS The study uses a hybrid model combining time series and queuing theory to predict the demand and estimate the number of required beds. Four patient flow scenarios were considered according to bed requests, percentage of abandonments and average length of stay in intensive care unit beds. The results were plotted against Ministry of Health parameters. Data were obtained from the State Regulation Center from 2010 to 2011. RESULTS There were 33,101 medical requests for 268 regulated intensive care unit beds in Rio de Janeiro. With an average length of stay in regulated ICUs of 11.3 days, there would be a need for 595 active beds to ensure system stability and 628 beds to ensure a maximum waiting time of six hours. Deducting current abandonment rates due to clinical improvement (25.8%, these figures fall to 441 and 417. With an average length of stay of 6.5 days, the number of required beds would be 342 and 366, respectively; deducting abandonment rates, 254 and 275. The Brazilian Ministry of Health establishes a parameter of 118 to 353 beds. Although the number of regulated beds is within the recommended range, an increase in beds of 122.0% is required to guarantee system stability and of 134.0% for a maximum waiting time of six hours. CONCLUSIONS Adequate bed estimation must consider reasons for limited timely access and patient flow management in a scenario that associates prioritization of requests with the lowest average length of stay.

  20. Difficulties in access and estimates of public beds in intensive care units in the state of Rio de Janeiro.

    Science.gov (United States)

    Goldwasser, Rosane Sonia; Lobo, Maria Stella de Castro; de Arruda, Edilson Fernandes; Angelo, Simone Aldrey; Lapa e Silva, José Roberto; de Salles, André Assis; David, Cid Marcos

    2016-01-01

    To estimate the required number of public beds for adults in intensive care units in the state of Rio de Janeiro to meet the existing demand and compare results with recommendations by the Brazilian Ministry of Health. The study uses a hybrid model combining time series and queuing theory to predict the demand and estimate the number of required beds. Four patient flow scenarios were considered according to bed requests, percentage of abandonments and average length of stay in intensive care unit beds. The results were plotted against Ministry of Health parameters. Data were obtained from the State Regulation Center from 2010 to 2011. There were 33,101 medical requests for 268 regulated intensive care unit beds in Rio de Janeiro. With an average length of stay in regulated ICUs of 11.3 days, there would be a need for 595 active beds to ensure system stability and 628 beds to ensure a maximum waiting time of six hours. Deducting current abandonment rates due to clinical improvement (25.8%), these figures fall to 441 and 417. With an average length of stay of 6.5 days, the number of required beds would be 342 and 366, respectively; deducting abandonment rates, 254 and 275. The Brazilian Ministry of Health establishes a parameter of 118 to 353 beds. Although the number of regulated beds is within the recommended range, an increase in beds of 122.0% is required to guarantee system stability and of 134.0% for a maximum waiting time of six hours. Adequate bed estimation must consider reasons for limited timely access and patient flow management in a scenario that associates prioritization of requests with the lowest average length of stay.