WorldWideScience

Sample records for registered users access

  1. 37 CFR 2.99 - Application to register as concurrent user.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Application to register as concurrent user. 2.99 Section 2.99 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND TRADEMARK... Proceedings § 2.99 Application to register as concurrent user. (a) An application for registration as a lawful...

  2. Comparison of trial participants and open access users of a web-based physical activity intervention regarding adherence, attrition, and repeated participation.

    Science.gov (United States)

    Wanner, Miriam; Martin-Diener, Eva; Bauer, Georg; Braun-Fahrländer, Charlotte; Martin, Brian W

    2010-02-10

    Web-based interventions are popular for promoting healthy lifestyles such as physical activity. However, little is known about user characteristics, adherence, attrition, and predictors of repeated participation on open access physical activity websites. The focus of this study was Active-online, a Web-based individually tailored physical activity intervention. The aims were (1) to assess and compare user characteristics and adherence to the website (a) in the open access context over time from 2003 to 2009, and (b) between trial participants and open access users; and (2) to analyze attrition and predictors of repeated use among participants in a randomized controlled trial compared with registered open access users. Data routinely recorded in the Active-online user database were used. Adherence was defined as: the number of pages viewed, the proportion of visits during which a tailored module was begun, the proportion of visits during which tailored feedback was received, and the time spent in the tailored modules. Adherence was analyzed according to six one-year periods (2003-2009) and according to the context (trial or open access) based on first visits and longest visits. Attrition and predictors of repeated participation were compared between trial participants and open access users. The number of recorded visits per year on Active-online decreased from 42,626 in 2003-2004 to 8343 in 2008-2009 (each of six one-year time periods ran from April 23 to April 22 of the following year). The mean age of users was between 38.4 and 43.1 years in all time periods and both contexts. The proportion of women increased from 49.5% in 2003-2004 to 61.3% in 2008-2009 (Popen access users. For open access users, adherence was similar during the first and the longest visits; for trial participants, adherence was lower during the first visits and higher during the longest visits. Of registered open access users and trial participants, 25.8% and 67.3% respectively visited Active

  3. OPACs: The User and Subject Access.

    Science.gov (United States)

    Carson, Elizabeth

    1985-01-01

    This survey of the literature reveals user and professional opinions of changes in subject access features available for online public access catalogs. Highlights include expanded access to fields already incorporated into traditional MARC record, access to context of the record, and design of the user interface. Twenty-four references are cited.…

  4. Workshop AccessibleTV "Accessible User Interfaces for Future TV Applications"

    Science.gov (United States)

    Hahn, Volker; Hamisu, Pascal; Jung, Christopher; Heinrich, Gregor; Duarte, Carlos; Langdon, Pat

    Approximately half of the elderly people over 55 suffer from some type of typically mild visual, auditory, motor or cognitive impairment. For them interaction, especially with PCs and other complex devices is sometimes challenging, although accessible ICT applications could make much of a difference for their living quality. Basically they have the potential to enable or simplify participation and inclusion in their surrounding private and professional communities. However, the availability of accessible user interfaces being capable to adapt to the specific needs and requirements of users with individual impairments is very limited. Although there are a number of APIs [1, 2, 3, 4] available for various platforms that allow developers to provide accessibility features within their applications, today none of them provides features for the automatic adaptation of multimodal interfaces being capable to automatically fit the individual requirements of users with different kinds of impairments. Moreover, the provision of accessible user interfaces is still expensive and risky for application developers, as they need special experience and effort for user tests. Today many implementations simply neglect the needs of elderly people, thus locking out a large portion of their potential users. The workshop is organized as part of the dissemination activity for the European-funded project GUIDE "Gentle user interfaces for elderly people", which aims to address this situation with a comprehensive approach for the realization of multimodal user interfaces being capable to adapt to the needs of users with different kinds of mild impairments. As application platform, GUIDE will mainly target TVs and Set-Top Boxes, such as the emerging Connected-TV or WebTV platforms, as they have the potential to address the needs of the elderly users with applications such as for home automation, communication or continuing education.

  5. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  6. Demand access communications for TDRSS users

    Science.gov (United States)

    Zillig, David; Weinberg, Aaron; Mcomber, Robert

    1994-01-01

    The Tracking and Data Relay Satellite System (TDRSS) has long been used to provide reliable low and high-data rate relay services between user spacecraft in Earth orbit and the ground. To date, these TDRSS services have been implemented via prior scheduling based upon estimates of user needs and mission event timelines. While this approach may be necessary for large users that require greater amounts of TDRSS resources, TDRSS can potentially offer the planned community of smaller science missions (e.g., the small explorer missions), and other emerging users, the unique opportunity for services on demand. In particular, innovative application of the existing TDRSS Multiple Access (MA) subsystem, with its phased array antenna, could be used to implement true demand access services without modification to either the TDRSS satellites or the user transponder, thereby introducing operational and performance benefits to both the user community and the Space Network. In this paper, candidate implementations of demand access service via the TDRSS MA subsystem are examined in detail. Both forward and return link services are addressed and a combination of qualitative and quantitative assessments are provided. The paper also identifies further areas for investigation in this ongoing activity that is being conducted by GSFC/Code 531 under the NASA Code O Advanced Systems Program.

  7. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  8. Regional Disparities in Online Map User Access Volume and Determining Factors

    Science.gov (United States)

    Li, R.; Yang, N.; Li, R.; Huang, W.; Wu, H.

    2017-09-01

    The regional disparities of online map user access volume (use `user access volume' in this paper to indicate briefly) is a topic of growing interest with the increment of popularity in public users, which helps to target the construction of geographic information services for different areas. At first place we statistically analysed the online map user access logs and quantified these regional access disparities on different scales. The results show that the volume of user access is decreasing from east to the west in China as a whole, while East China produces the most access volume; these cities are also the crucial economic and transport centres. Then Principal Component Regression (PCR) is applied to explore the regional disparities of user access volume. A determining model for Online Map access volume is proposed afterwards, which indicates that area scale is the primary determining factor for regional disparities, followed by public transport development level and public service development level. Other factors like user quality index and financial index have very limited influence on the user access volume. According to the study of regional disparities in user access volume, map providers can reasonably dispatch and allocate the data resources and service resources in each area and improve the operational efficiency of the Online Map server cluster.

  9. Implementing Recommendations From Web Accessibility Guidelines: A Comparative Study of Nondisabled Users and Users With Visual Impairments.

    Science.gov (United States)

    Schmutz, Sven; Sonderegger, Andreas; Sauer, Juergen

    2017-09-01

    The present study examined whether implementing recommendations of Web accessibility guidelines would have different effects on nondisabled users than on users with visual impairments. The predominant approach for making Web sites accessible for users with disabilities is to apply accessibility guidelines. However, it has been hardly examined whether this approach has side effects for nondisabled users. A comparison of the effects on both user groups would contribute to a better understanding of possible advantages and drawbacks of applying accessibility guidelines. Participants from two matched samples, comprising 55 participants with visual impairments and 55 without impairments, took part in a synchronous remote testing of a Web site. Each participant was randomly assigned to one of three Web sites, which differed in the level of accessibility (very low, low, and high) according to recommendations of the well-established Web Content Accessibility Guidelines 2.0 (WCAG 2.0). Performance (i.e., task completion rate and task completion time) and a range of subjective variables (i.e., perceived usability, positive affect, negative affect, perceived aesthetics, perceived workload, and user experience) were measured. Higher conformance to Web accessibility guidelines resulted in increased performance and more positive user ratings (e.g., perceived usability or aesthetics) for both user groups. There was no interaction between user group and accessibility level. Higher conformance to WCAG 2.0 may result in benefits for nondisabled users and users with visual impairments alike. Practitioners may use the present findings as a basis for deciding on whether and how to implement accessibility best.

  10. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  11. National Radiobiology Archives Distributed Access User`s Manual, Version 1.1. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Smith, S.K.; Prather, J.C.; Ligotke, E.K.; Watson, C.R.

    1992-06-01

    This supplement to the NRA Distributed Access User`s manual (PNL-7877), November 1991, describes installation and use of Version 1.1 of the software package; this is not a replacement of the previous manual. Version 1.1 of the NRA Distributed Access Package is a maintenance release. It eliminates several bugs, and includes a few new features which are described in this manual. Although the appearance of some menu screens has changed, we are confident that the Version 1.0 User`s Manual will provide an adequate introduction to the system. Users who are unfamiliar with Version 1.0 may wish to experiment with that version before moving on to Version 1.1.

  12. Support Services for Remote Users of Online Public Access Catalogs.

    Science.gov (United States)

    Kalin, Sally W.

    1991-01-01

    Discusses the needs of remote users of online public access catalogs (OPACs). User expectations are discussed; problems encountered by remote-access users are examined, including technical problems and searching problems; support services are described, including instruction, print guides, and online help; and differences from the needs of…

  13. Enabling web users and developers to script accessibility with Accessmonkey.

    Science.gov (United States)

    Bigham, Jeffrey P; Brudvik, Jeremy T; Leung, Jessica O; Ladner, Richard E

    2009-07-01

    Efficient web access remains elusive for blind computer users. Previous efforts to improve web accessibility have focused on developer awareness, automated improvement, and legislation, but these approaches have left remaining concerns. First, while many tools can help produce accessible content, most are difficult to integrate into existing developer workflows and rarely offer specific suggestions that developers can implement. Second, tools that automatically improve web content for users generally solve specific problems and are difficult to combine and use on a diversity of existing assistive technology. Finally, although blind web users have proven adept at overcoming the shortcomings of the web and existing tools, they have been only marginally involved in improving the accessibility of their own web experience. In a step toward addressing these concerns, we have developed Accessmonkey, a common scripting framework that web users, web developers and web researchers can use to collaboratively improve accessibility. This framework advances the idea that Javascript and dynamic web content can be used to improve inaccessible content instead of being a cause of it. Using Accessmonkey, web users and developers on different platforms and with potentially different goals can collaboratively make the web more accessible. In this article, we first present the design of the Accessmonkey framework and offer several example scripts that demonstrate the utility of our approach. We conclude by discussing possible future extensions that will provide easy access to scripts as users browse the web and enable non-technical blind users to independently create and share improvements.

  14. National Radiobiology Archives Distributed Access user's manual

    International Nuclear Information System (INIS)

    Watson, C.; Smith, S.; Prather, J.

    1991-11-01

    This User's Manual describes installation and use of the National Radiobiology Archives (NRA) Distributed Access package. The package consists of a distributed subset of information representative of the NRA databases and database access software which provide an introduction to the scope and style of the NRA Information Systems

  15. User's guide for remote access of the Performance Assessment Center

    International Nuclear Information System (INIS)

    Peterson, C.R.; Kostelnik, K.M.

    1991-03-01

    The Performance Assessment Center (PAC) was established by the Department of Energy's National Low-Level Waste Management Program to provide technical assistance to support the development of low-level radioactive waste disposal facilities. This user's manual provides guidance to remote users of the PAC. Information is presented on how remote users may most effectively access and use the systems available at the Performance Assessment Center in Idaho Falls, Idaho. Access requirements and operating procedures are presented to assist the first-time PAC user. This manual also provides brief descriptions of each code available on the system

  16. User Collaboration for Improving Access to Historical Texts

    Directory of Open Access Journals (Sweden)

    Clemens Neudecker

    2010-08-01

    Full Text Available The paper will describe how web-based collaboration tools can engage users in the building of historical printed text resources created by mass digitisation projects. The drivers for developing such tools will be presented, identifying the benefits that can be derived for both the user community and cultural heritage institutions. The perceived risks, such as new errors introduced by the users, and the limitations of engaging with users in this way will be set out with the lessons that can be learned from existing activities, such as the National Library of Australia's newspaper website which supports collaborative correction of Optical Character Recognition (OCR output. The paper will present the work of the IMPACT (Improving Access to Text project, a large-scale integrating project funded by the European Commission as part of the Seventh Framework Programme (FP7. One of the aims of the project is to develop tools that help improve OCR results for historical printed texts, specifically those works published before the industrial production of books from the middle of the 19th century. Technological improvements to image processing and OCR engine technology are vital to improving access to historic text, but engaging the user community also has an important role to play. Utilising the intended user can help achieve the levels of accuracy currently found in born-digital materials. Improving OCR results will allow for better resource discovery and enhance performance by text mining and accessibility tools. The IMPACT project will specifically develop a tool that supports collaborative correction and validation of OCR results and a tool to allow user involvement in building historical dictionaries which can be used to validate word recognition. The technologies use the characteristics of human perception as a basis for error detection.

  17. Experiences of registered nurses with regard to accessing health information at the point-of-care via mobile computing devices

    Directory of Open Access Journals (Sweden)

    Esmeralda Ricks

    2015-11-01

    Full Text Available Background: The volume of health information necessary to provide competent health care today has become overwhelming. Mobile computing devices are fast becoming an essential clinical tool for accessing health information at the point-of-care of patients. Objectives: This study explored and described how registered nurses experienced accessing information at the point-of-care via mobile computing devices (MCDs. Method: A qualitative, exploratory, descriptive and contextual design was used. Ten in–depth interviews were conducted with purposively sampled registered nurses employed by a state hospital in the Nelson Mandela Bay Municipality (NMBM. Interviews were recorded, transcribed verbatim and analysed using Tesch’s data analysis technique. Ethical principles were adhered to throughout the study. Guba’s model of trustworthiness was used to confirm integrity of the study. Results: Four themes emerged which revealed that the registered nurses benefited from the training they received by enabling them to develop, and improve, their computer literacy levels. Emphasis was placed on the benefits that the accessed information had for educational purposes for patients and the public, for colleagues and students. Furthermore the ability to access information at the point-of-care was considered by registered nurses as valuable to improve patient care because of the wide range of accurate and readily accessible information available via the mobile computing device. Conclusion: The registered nurses in this study felt that being able to access information at the point-of-care increased their confidence and facilitated the provision of quality care because it assisted them in being accurate and sure of what they were doing.

  18. Experiences of registered nurses with regard to accessing health information at the point-of-care via mobile computing devices.

    Science.gov (United States)

    Ricks, Esmeralda; Benjamin, Valencia; Williams, Margaret

    2015-11-19

    The volume of health information necessary to provide competent health care today has become overwhelming. Mobile computing devices are fast becoming an essential clinical tool for accessing health information at the point-of-care of patients. This study explored and described how registered nurses experienced accessing information at the point-of-care via mobile computing devices (MCDs). A qualitative, exploratory, descriptive and contextual design was used. Ten in-depth interviews were conducted with purposively sampled registered nurses employed by a state hospital in the Nelson Mandela Bay Municipality (NMBM). Interviews were recorded, transcribed verbatim and analysed using Tesch's data analysis technique. Ethical principles were adhered to throughout the study. Guba's model of trustworthiness was used to confirm integrity of the study. Four themes emerged which revealed that the registered nurses benefited from the training they received by enabling them to develop, and improve, their computer literacy levels. Emphasis was placed on the benefits that the accessed information had for educational purposes for patients and the public, for colleagues and students. Furthermore the ability to access information at the point-of-care was considered by registered nurses as valuable to improve patient care because of the wide range of accurate and readily accessible information available via the mobile computing device. The registered nurses in this study felt that being able to access information at the point-of-care increased their confidence and facilitated the provision of quality care because it assisted them in being accurate and sure of what they were doing.

  19. Prediction of users webpage access behaviour using association ...

    Indian Academy of Sciences (India)

    pages mainly depended on the support and lift measure whereas confidence assumed ... Apriori algorithm; association rules; data mining; MSNBC; web usage .... clustering was used in finding the user access patterns from web access log. .... satisfied the minimum support and confidence of 0.6% and 100% respectively.

  20. Enabling Accessibility Through Model-Based User Interface Development.

    Science.gov (United States)

    Ziegler, Daniel; Peissner, Matthias

    2017-01-01

    Adaptive user interfaces (AUIs) can increase the accessibility of interactive systems. They provide personalized display and interaction modes to fit individual user needs. Most AUI approaches rely on model-based development, which is considered relatively demanding. This paper explores strategies to make model-based development more attractive for mainstream developers.

  1. Switch Based Opportunistic Spectrum Access for General Primary User Traffic Model

    KAUST Repository

    Gaaloul, Fakhreddine

    2012-06-18

    This letter studies cognitive radio transceiver that can opportunistically use the available channels of primary user (PU). Specifically, we investigate and compare two different opportunistic channel access schemes. The first scheme applies when the secondary user (SU) has access to only one channel. The second scheme, based on channel switching mechanism, applies when the SU has access to multiple channels but can at a given time monitor and access only one channel. For these access schemes, we derive the exact analytical results for the novel performance metrics of average access time and average waiting time under general PU traffic models.

  2. Switch Based Opportunistic Spectrum Access for General Primary User Traffic Model

    KAUST Repository

    Gaaloul, Fakhreddine; Alouini, Mohamed-Slim; Radaydeh, Redha M.; Yang, Hong-Chuan

    2012-01-01

    This letter studies cognitive radio transceiver that can opportunistically use the available channels of primary user (PU). Specifically, we investigate and compare two different opportunistic channel access schemes. The first scheme applies when the secondary user (SU) has access to only one channel. The second scheme, based on channel switching mechanism, applies when the SU has access to multiple channels but can at a given time monitor and access only one channel. For these access schemes, we derive the exact analytical results for the novel performance metrics of average access time and average waiting time under general PU traffic models.

  3. Accessibility of hypertensive users to health units and treatment adherence

    Directory of Open Access Journals (Sweden)

    Natasha Marques Frota

    2013-09-01

    Full Text Available We aimed to analyze the accessibility of hypertensive users to the health system with focus on treatment adherence. A cross-sectional study with quantitative approach was conducted in four Family Health Basic Units of Fortaleza-CE, Brazil. The sample consisted of 400 users. Data collection happened through a form applied from May to August 2011. About 97.5% of users were older than 40 years, and 67.2% were female. The accessibility to the referral service occurred in 47.2% of users to secondary care, of which 101 (25.2% were referred to Emergency Units, and 88 (22.0% were admitted to Inpatient Units. Most hypertensive patients adhered to healthy habits, except the use of dietetic sweeteners (36.0% and physical exercise (35.0%. The hypertensive patients had good treatment adherence and difficulty in accessibility regarding counter-referral services to secondary and tertiary care services.

  4. Health Websites: Accessibility and Usability for American Sign Language Users

    Science.gov (United States)

    Kushalnagar, Poorna; Naturale, Joan; Paludneviciene, Raylene; Smith, Scott R.; Werfel, Emily; Doolittle, Richard; Jacobs, Stephen; DeCaro, James

    2015-01-01

    To date, there have been efforts towards creating better health information access for Deaf American Sign Language (ASL) users. However, the usability of websites with access to health information in ASL has not been evaluated. Our paper focuses on the usability of four health websites that include ASL videos. We seek to obtain ASL users’ perspectives on the navigation of these ASL-accessible websites, finding the health information that they needed, and perceived ease of understanding ASL video content. ASL users (N=32) were instructed to find specific information on four ASL-accessible websites, and answered questions related to: 1) navigation to find the task, 2) website usability, and 3) ease of understanding ASL video content for each of the four websites. Participants also gave feedback on what they would like to see in an ASL health library website, including the benefit of added captioning and/or signer model to medical illustration of health videos. Participants who had lower health literacy had greater difficulty in finding information on ASL-accessible health websites. This paper also describes the participants’ preferences for an ideal ASL-accessible health website, and concludes with a discussion on the role of accessible websites in promoting health literacy in ASL users. PMID:24901350

  5. Accessibility of dynamic web applications with emphasis on visually impaired users

    Directory of Open Access Journals (Sweden)

    Kingsley Okoye

    2014-09-01

    Full Text Available As the internet is fast migrating from static web pages to dynamic web pages, the users with visual impairment find it confusing and challenging when accessing the contents on the web. There is evidence that dynamic web applications pose accessibility challenges for the visually impaired users. This study shows that a difference can be made through the basic understanding of the technical requirement of users with visual impairment and addresses a number of issues pertinent to the accessibility needs for such users. We propose that only by designing a framework that is structurally flexible, by removing unnecessary extras and thereby making every bit useful (fit-for-purpose, will visually impaired users be given an increased capacity to intuitively access e-contents. This theory is implemented in a dynamic website for the visually impaired designed in this study. Designers should be aware of how the screen reading software works to enable them make reasonable adjustments or provide alternative content that still corresponds to the objective content to increase the possibility of offering faultless service to such users. The result of our research reveals that materials can be added to a content repository or re-used from existing ones by identifying the content types and then transforming them into a flexible and accessible one that fits the requirements of the visually impaired through our method (no-frill + agile methodology rather than computing in advance or designing according to a given specification.

  6. Guidelines for Making Web Content Accessible to All Users

    Science.gov (United States)

    Thompson, Terrill; Primlani, Saroj; Fiedor, Lisa

    2009-01-01

    The main goal of accessibility standards and guidelines is to design websites everyone can use. The "IT Accessibility Constituent Group" developed this set of draft guidelines to help EQ authors, reviewers, and staff and the larger EDUCAUSE community ensure that web content is accessible to all users, including those with disabilities. This…

  7. Considering User's Access Pattern in Multimedia File Systems

    Science.gov (United States)

    Cho, KyoungWoon; Ryu, YeonSeung; Won, Youjip; Koh, Kern

    2002-12-01

    Legacy buffer cache management schemes for multimedia server are grounded at the assumption that the application sequentially accesses the multimedia file. However, user access pattern may not be sequential in some circumstances, for example, in distance learning application, where the user may exploit the VCR-like function(rewind and play) of the system and accesses the particular segments of video repeatedly in the middle of sequential playback. Such a looping reference can cause a significant performance degradation of interval-based caching algorithms. And thus an appropriate buffer cache management scheme is required in order to deliver desirable performance even under the workload that exhibits looping reference behavior. We propose Adaptive Buffer cache Management(ABM) scheme which intelligently adapts to the file access characteristics. For each opened file, ABM applies either the LRU replacement or the interval-based caching depending on the Looping Reference Indicator, which indicates that how strong temporally localized access pattern is. According to our experiment, ABM exhibits better buffer cache miss ratio than interval-based caching or LRU, especially when the workload exhibits not only sequential but also looping reference property.

  8. User Management with LDAP(Light weight Directory Access Protocolfor access to technology and Information Services in Companies

    Directory of Open Access Journals (Sweden)

    José Teodoro Mejía Viteri

    2016-08-01

    Full Text Available This research aims to conduct an analysis of management services information and users with LDAP (Lightweight / Simplified Directory Access Protocol, their interaction with other technology services company, allowing it to be accessed through a single user and password. This study allowed us to collect information through a literature review on the LDAP service and its ability to interact with your user directory Open source technology services; also with Windows Server and Active Directory service is used by companies for their ease of management and access resources on Windows clients; is intended to provide an alternative for the implementation of each of the services required by public and private companies with tools free use and access to services for management and administration can be done by integrating or synchronizing with the directory LDAP.

  9. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  10. Effects of accessible website design on nondisabled users: age and device as moderating factors.

    Science.gov (United States)

    Schmutz, Sven; Sonderegger, Andreas; Sauer, Juergen

    2018-05-01

    This study examined how implementing recommendations from Web accessibility guidelines affects nondisabled people in different age groups using different technical devices. While recent research showed positive effects of implementing such recommendations for nondisabled users, it remains unclear whether such effects would apply to different age groups and kind of devices. A 2 × 2 × 2 design was employed with website accessibility (high accessibility vs. very low accessibility), age (younger adults vs. older adults) and type of device (laptop vs. tablet) as independent variables. 110 nondisabled participants took part in a usability test, in which performance and satisfaction were measured as dependent variables. The results showed that higher accessibility increased task completion rate, task completion time and satisfaction ratings of nondisabled users. While user age did not have any effects, users showed faster task completion time under high accessibility when using a tablet rather than a laptop. The findings confirmed previous findings, which showed benefits of accessible websites for nondisabled users. These beneficial effects may now be generalised to a wide age range and across different devices. Practitioner Summary: This work is relevant to the design of websites since it emphasises the need to consider the characteristics of different user groups. Accessible website design (aimed at users with disabilities) leads to benefits for nondisabled users across different ages. These findings provide further encouragement for practitioners to apply WCAG 2.0.

  11. NASA Access Mechanism - Graphical user interface information retrieval system

    Science.gov (United States)

    Hunter, Judy F.; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited by factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  12. NASA access mechanism: Graphical user interface information retrieval system

    Science.gov (United States)

    Hunter, Judy; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited to factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  13. Exploring registered Psychiatric Nurses' responses towards Service Users with a diagnosis of borderline personality disorder.

    LENUS (Irish Health Repository)

    McGrath, Bridget

    2012-01-01

    This study explored registered psychiatric nurses\\' (RPNs\\') interactions and level of empathy towards service users with a diagnosis of borderline personality disorder (BPD). A qualitative approach was used, and 17 RPNs were interviewed using a semistructured interview schedule incorporating the "staff-patient interaction response scale" (SPIRS). Four themes emerged following data analysis: "challenging and difficult," "manipulative, destructive and threatening behaviour," "preying on the vulnerable resulting in splitting staff and other service users," and "boundaries and structure." Additionally, low levels of empathy were evident in the majority of participants\\' responses to the SPIRS. The findings provide further insight on nurses\\' empathy responses and views on caring for service users with BPD and further evidence for the need for training and education for nurses in the care of service users diagnosed with BPD.

  14. System Design and Cataloging Meet the User: User Interfaces to Online Public Access Catalogs.

    Science.gov (United States)

    Yee, Martha M.

    1991-01-01

    Discusses features of online public access catalogs: (1) demonstration of relationships between records; (2) provision of entry vocabularies; (3) arrangement of multiple entries on the screen; (4) provision of access points; (5) display of single records; and (6) division of catalogs into separate files or indexes. User studies and other research…

  15. Security of social network credentials for accessing course portal: Users' experience

    Science.gov (United States)

    Katuk, Norliza; Fong, Choo Sok; Chun, Koo Lee

    2015-12-01

    Social login (SL) has recently emerged as a solution for single sign-on (SSO) within the web and mobile environments. It allows users to use their existing social network credentials (SNC) to login to third party web applications without the need to create a new identity in the intended applications' database. Although it has been used by many web application providers, its' applicability in accessing learning materials is not yet fully investigated. Hence, this research aims to explore users' (i.e., instructors' and students') perception and experience on the security of SL for accessing learning contents. A course portal was developed for students at a higher learning institution and it provides two types of user authentications (i) traditional user authentication, and (ii) SL facility. Users comprised instructors and students evaluated the login facility of the course portal through a controlled lab experimental study following the within-subject design. The participants provided their feedback in terms of the security of SL for accessing learning contents. The study revealed that users preferred to use SL over the traditional authentication, however, they concerned on the security of SL and their privacy.

  16. Exploring Registered Psychiatric Nurses' Responses towards Service Users with a Diagnosis of Borderline Personality Disorder

    Directory of Open Access Journals (Sweden)

    Bridget McGrath

    2012-01-01

    Full Text Available This study explored registered psychiatric nurses' (RPNs' interactions and level of empathy towards service users with a diagnosis of borderline personality disorder (BPD. A qualitative approach was used, and 17 RPNs were interviewed using a semistructured interview schedule incorporating the “staff-patient interaction response scale” (SPIRS. Four themes emerged following data analysis: “challenging and difficult,” “manipulative, destructive and threatening behaviour,” “preying on the vulnerable resulting in splitting staff and other service users,” and “boundaries and structure.” Additionally, low levels of empathy were evident in the majority of participants' responses to the SPIRS. The findings provide further insight on nurses' empathy responses and views on caring for service users with BPD and further evidence for the need for training and education for nurses in the care of service users diagnosed with BPD.

  17. National Radiobiology Archives Distributed Access user's manual

    Energy Technology Data Exchange (ETDEWEB)

    Watson, C.; Smith, S. (Pacific Northwest Lab., Richland, WA (United States)); Prather, J. (Linfield Coll., McMinnville, OR (United States))

    1991-11-01

    This User's Manual describes installation and use of the National Radiobiology Archives (NRA) Distributed Access package. The package consists of a distributed subset of information representative of the NRA databases and database access software which provide an introduction to the scope and style of the NRA Information Systems.

  18. Wheelchair users, access and exclusion in South African higher education.

    Science.gov (United States)

    Chiwandire, Desire; Vincent, Louise

    2017-01-01

    South Africa's Constitution guarantees everyone, including persons with disabilities, the right to education. A variety of laws are in place obliging higher education institutions to provide appropriate physical access to education sites for all. In practice, however, many buildings remain inaccessible to people with physical disabilities. To describe what measures South African universities are taking to make their built environments more accessible to students with diverse types of disabilities, and to assess the adequacy of such measures. We conducted semi-structured in-depth face-to-face interviews with disability unit staff members (DUSMs) based at 10 different public universities in South Africa. Challenges with promoting higher education accessibility for wheelchair users include the preservation and heritage justification for failing to modify older buildings, ad hoc approaches to creating accessible environments and failure to address access to toilets, libraries and transport facilities for wheelchair users. South African universities are still not places where all students are equally able to integrate socially. DUSMs know what ought to be done to make campuses more accessible and welcoming to students with disabilities and should be empowered to play a leading role in sensitising non-disabled members of universities, to create greater awareness of, and appreciation for, the multiple ways in which wheelchair user students continue to be excluded from full participation in university life. South African universities need to adopt a systemic approach to inclusion, which fosters an understanding of inclusion as a fundamental right rather than as a luxury.

  19. Comparison and Evaluation of End-User Interfaces for Online Public Access Catalogs.

    Science.gov (United States)

    Zumer, Maja

    End-user interfaces for the online public access catalogs (OPACs) of OhioLINK, a system linking major university and research libraries in Ohio, and its 16 member libraries, accessible through the Internet, are compared and evaluated from the user-oriented perspective. A common, systematic framework was used for the scientific observation of the…

  20. A consumer register: an acceptable and cost-effective alternative for accessing patient populations

    Directory of Open Access Journals (Sweden)

    Jamie Bryant

    2016-10-01

    Full Text Available Abstract Background Population-based registries are increasingly used to recruit patient samples for research, however, they have several limitations including low consent and participation rates, and potential selection bias. To improve access to samples for research, the utility of a new model of recruitment termed the ‘Consumer Register’, that allows for direct patient recruitment from hospitals, was examined. This paper reports: (i consent rates onto the register; (ii preferred methods and frequency of contact; and (iii the feasibility of establishing the register, including: (a cost per person recruited to the register; (b the differential cost and consent rates of volunteer versus paid data collectors; and (c participant completion rates. Methods A cross-sectional survey was conducted in five outpatient clinics in Australia. Patients were approached by volunteers or paid data collectors and asked to complete a touch-screen electronic survey. Consenting individuals were asked to indicate their willingness and preferences for enrolment onto a research register. Descriptive statistics were used to examine patient preferences and linear regression used to model the success of volunteer versus paid data collectors. The opportunity and financial costs of establishing the register were calculated. Results A total of 1947 patients (80.6 % consented to complete the survey, of which, 1486 (76.3 % completed the questionnaire. Of the completers, the majority (69.4 %, or 1032 participants were willing to be listed on the register and preferred to be contacted by email (50.3 %. Almost 39 % of completers were willing to be contacted three or more times in a 12 month period. The annual opportunity cost of resources consumed by the register was valued at $37,187, giving an opportunity cost per person recruited to the register of $36. After amortising fixed costs, the annual financial outlay was $23,004 or $22 per person recruited to the

  1. A Trusted Host's Authentication Access and Control Model Faced on User Action

    Institute of Scientific and Technical Information of China (English)

    ZHANG Miao; XU Guoai; HU Zhengming; YANG Yixian

    2006-01-01

    The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.

  2. Complication with Intraosseous Access: Scandinavian Users' Experience

    Directory of Open Access Journals (Sweden)

    Peter Hallas

    2013-09-01

    Full Text Available Introduction: Intraosseous access (IO is indicated if vascular access cannot be quickly established during resuscitation. Complication rates are estimated to be low, based on small patient series, model or cadaver studies, and case reports. However, user experience with IO use in real-life emergency situations might differ from the results in the controlled environment of model studies and small patient series. We performed a survey of IO use in real-life emergency situations to assess users’ experiences of complications.Methods: An online questionnaire was sent to Scandinavian emergency physicians, anesthesiologists and pediatricians.Results: 1,802 clinical cases of IO use was reported by n=386 responders. Commonly reported complications with establishing IO access were patient discomfort/pain (7.1%, difficulties with penetration of periosteum with IO needle (10.3%, difficulties with aspiration of bone marrow (12.3%, and bended/broken needle (4.0%. When using an established IO access the reported complications were difficulties with injection fluid and drugs after IO insertion (7.4%, slow infusion (despite use of pressure bag (8.8%, displacement after insertion (8.5%, and extravasation (3.7%. Compartment syndrome and osteomyelitis occurred in 0.6% and 0.4% of cases respectively.Conclusion: In users’ recollection of real-life IO use, perceived complications were more frequent than usually reported from model studies. The perceived difficulties with using IO could affect the willingness of medical staff to use IO. Therefore, user experience should be addressed both in education of how to use, and research and development of IOs. [West J Emerg Med. 2013;14(5:440–443.

  3. Design Strategies for Efficient Access to Mobile Device Users via Amazon Mechanical Turk

    OpenAIRE

    Jacques, Jason; Kristensson, Per Ola

    2017-01-01

    It is often challenging to access a pool of mobile device users and instruct them to perform an interactive task. Yet such data is often vital to provide design insight at various stages of the design process of a mobile application, service or system. We propose accessing a pool of mobile device users via the microtask market Amazon Mechanical Turk (MTurk). While mobile device users are still a minority on MTurk, they provide unique opportunities for requesters. Not only does catering to mob...

  4. ARM User Survey Report: Data Access, Quality, and Delivery

    Energy Technology Data Exchange (ETDEWEB)

    Mather, JH; Roeder, LR; Sivaraman, C

    2012-06-28

    The objective of this survey was to obtain user feedback to determine how users of the Atmospheric Radiation Measurement (ARM) Climate Research Facility Data Archive interact with the more than 2000 available types of datastreams. The survey also gathered information about data discovery and data quality. The Market and Competitive Analysis group at Pacific Northwest National Laboratory worked with web administrators to develop a landing page from which users could access the survey. A survey invitation was sent by ARM via email to about 6100 users on February 22, 2012. The invitation was also posted on the ARM website and Facebook page. Reminders were sent via e-mail and posted on Facebook while the survey was open, February 22-March 23, 2012.

  5. RURAL/URBAN RESIDENCE, ACCESS, AND PERCEIVED NEED FOR TREATMENT AMONG AFRICAN AMERICAN COCAINE USERS

    Science.gov (United States)

    BORDERS, TYRONE F.; BOOTH, BRENDA M.; STEWART, KATHARINE E.; CHENEY, ANN M.; CURRAN, GEOFFREY M.

    2014-01-01

    Objective To examine how rural/urban residence, perceived access, and other factors impede or facilitate perceived need for drug use treatment, a concept closely linked to treatment utilization. Study Design Two hundred rural and 200 urban African American cocaine users who were not receiving treatment were recruited via Respondent-Driven Sampling and completed a structured in-person interview. Bivariate and multivariate analyses were conducted to test the associations between perceived need and rural/urban residence, perceived access, and other predisposing (eg, demographics), enabling (eg, insurance), and health factors (eg, psychiatric distress). Principal Findings In bivariate analyses, rural relative to urban cocaine users reported lower perceived treatment need (37% vs 48%), availability, affordability, overall ease of access, and effectiveness, as well as lower perceived acceptability of residential, outpatient, self-help, and hospital-based services. In multivariate analyses, there was a significant interaction between rural/urban residence and the acceptability of religious counseling. At the highest level of acceptability, rural users had lower odds of perceived need (OR=.23); at the lowest level, rural users had higher odds of perceived need (OR=2.74) than urban users. Among rural users, the acceptability of religious counseling was negatively associated with perceived need (OR=.64). Ease of access was negatively associated (OR=.71) whereas local treatment effectiveness (OR=1.47) and the acceptability of hospital-based treatment (OR=1.29) were positively associated with perceived need among all users. Conclusions Our findings suggest rural/urban disparities in perceived need and access to drug use treatment. Among rural and urban cocaine users, improving perceptions of treatment effectiveness and expanding hospital-based services could promote treatment seeking. PMID:25213603

  6. Optimizing Instruction Scheduling and Register Allocation for Register-File-Connected Clustered VLIW Architectures

    Science.gov (United States)

    Tang, Haijing; Wang, Siye; Zhang, Yanjun

    2013-01-01

    Clustering has become a common trend in very long instruction words (VLIW) architecture to solve the problem of area, energy consumption, and design complexity. Register-file-connected clustered (RFCC) VLIW architecture uses the mechanism of global register file to accomplish the inter-cluster data communications, thus eliminating the performance and energy consumption penalty caused by explicit inter-cluster data move operations in traditional bus-connected clustered (BCC) VLIW architecture. However, the limit number of access ports to the global register file has become an issue which must be well addressed; otherwise the performance and energy consumption would be harmed. In this paper, we presented compiler optimization techniques for an RFCC VLIW architecture called Lily, which is designed for encryption systems. These techniques aim at optimizing performance and energy consumption for Lily architecture, through appropriate manipulation of the code generation process to maintain a better management of the accesses to the global register file. All the techniques have been implemented and evaluated. The result shows that our techniques can significantly reduce the penalty of performance and energy consumption due to access port limitation of global register file. PMID:23970841

  7. Optimizing Instruction Scheduling and Register Allocation for Register-File-Connected Clustered VLIW Architectures

    Directory of Open Access Journals (Sweden)

    Haijing Tang

    2013-01-01

    Full Text Available Clustering has become a common trend in very long instruction words (VLIW architecture to solve the problem of area, energy consumption, and design complexity. Register-file-connected clustered (RFCC VLIW architecture uses the mechanism of global register file to accomplish the inter-cluster data communications, thus eliminating the performance and energy consumption penalty caused by explicit inter-cluster data move operations in traditional bus-connected clustered (BCC VLIW architecture. However, the limit number of access ports to the global register file has become an issue which must be well addressed; otherwise the performance and energy consumption would be harmed. In this paper, we presented compiler optimization techniques for an RFCC VLIW architecture called Lily, which is designed for encryption systems. These techniques aim at optimizing performance and energy consumption for Lily architecture, through appropriate manipulation of the code generation process to maintain a better management of the accesses to the global register file. All the techniques have been implemented and evaluated. The result shows that our techniques can significantly reduce the penalty of performance and energy consumption due to access port limitation of global register file.

  8. An open-access mobile compatible electronic patient register for rheumatic heart disease (‘eRegister’) based on the World Heart Federation’s framework for patient registers

    Science.gov (United States)

    van Dam, Joris; Tadmor, Brigitta; Spector, Jonathan; Musuku, John; Zühlke, Liesl J; Zühlke, Liesl J; Engel, Mark E; Mayosi, Bongani M; Nestle, Nick

    2015-01-01

    Summary Background Rheumatic heart disease (RHD) remains a major disease burden in low-resource settings globally. Patient registers have long been recognised to be an essential instrument in RHD control and elimination programmes, yet to date rely heavily on paper-based data collection and non-networked data-management systems, which limit their functionality. Objectives To assess the feasibility and potential benefits of producing an electronic RHD patient register. Methods We developed an eRegister based on the World Heart Federation’s framework for RHD patient registers using CommCare, an open-source, cloud-based software for health programmes that supports the development of customised data capture using mobile devices. Results The resulting eRegistry application allows for simultaneous data collection and entry by field workers using mobile devices, and by providers using computer terminals in clinics and hospitals. Data are extracted from CommCare and are securely uploaded into a cloud-based database that matches the criteria established by the WHF framework. The application can easily be tailored to local needs by modifying existing variables or adding new ones. Compared with traditional paper-based data-collection systems, the eRegister reduces the risk of data error, synchronises in real-time, improves clinical operations and supports management of field team operations. Conclusions The user-friendly eRegister is a low-cost, mobile, compatible platform for RHD treatment and prevention programmes based on materials sanctioned by the World Heart Federation. Readily adaptable to local needs, this paperless RHD patient register program presents many practical benefits. PMID:26444995

  9. Channel access delay and buffer distribution of two-user opportunistic scheduling schemes in wireless networks

    KAUST Repository

    Hossain, Md Jahangir

    2010-07-01

    In our earlier works, we proposed rate adaptive hierarchical modulation-assisted two-best user opportunistic scheduling (TBS) and hybrid two-user scheduling (HTS) schemes. The proposed schemes are innovative in the sense that they include a second user in the transmission opportunistically using hierarchical modulations. As such the frequency of information access of the users increases without any degradation of the system spectral efficiency (SSE) compared to the classical opportunistic scheduling scheme. In this paper, we analyze channel access delay of an incoming packet at the base station (BS) buffer when our proposed TBS and HTS schemes are employed at the BS. Specifically, using a queuing analytic model we derive channel access delay as well as buffer distribution of the packets that wait at BS buffer for down-link (DL) transmission. We compare performance of the TBS and HTS schemes with that of the classical single user opportunistic schemes namely, absolute carrier-to-noise ratio (CNR)-based single user scheduling (ASS) and normalized CNR-based single user scheduling (NSS). For an independent and identically distributed (i.i.d.) fading environment, our proposed scheme can improve packet\\'s access delay performance compared to the ASS. Selected numerical results in an independent but non-identically distributed (i.n.d.) fading environment show that our proposed HTS achieves overall good channel access delay performance. © 2010 IEEE.

  10. Personalisation meets accessibility : towards the design of individual user interfaces for all. Position paper

    NARCIS (Netherlands)

    Cremers, A.H.M.; Neerincx, M.A.

    2004-01-01

    Current accessibility guidelines are composed to allow users with special needs to more easily and comfortably access the Internet. However, most of the guidelines are written with both a 'standard' device and a 'standard' use context in mind, which is the user sitting in front of a desktop

  11. Evaluating accessibility to Bangkok Metro Systems using multi-dimensional criteria across user groups

    Directory of Open Access Journals (Sweden)

    Duangporn Prasertsubpakij

    2012-07-01

    Full Text Available Metro systems act as fast and efficient transport systems for many modern metropolises; however, enhancing higher usage of such systems often conflicts with providing suitable accessibility options. The traditional approach of metro accessibility studies seems to be an ineffective measure to gage sustainable access in which the equal rights of all users are taken into account. Bangkok Metropolitan Region (BMR transportation has increasingly relied on the role of two mass rapid transport systems publicly called “BTS Skytrain” and “MRT Subway”, due to limited availability of land and massive road congestion; however, access to such transit arguably treats some vulnerable groups, especially women, the elderly and disabled people unfairly. This study constructs a multi-dimensional assessment of accessibility considerations to scrutinize how user groups access metro services based on BMR empirical case. 600 individual passengers at various stations were asked to rate the questionnaire that simultaneously considers accessibility aspects of spatial, feeder connectivity, temporal, comfort/safety, psychosocial and other dimensions. It was interestingly found by user disaggregated accessibility model that the lower the accessibility perceptions—related uncomfortable and unsafe environment conditions, the greater the equitable access to services, as illustrated by MRT — Hua Lumphong and MRT — Petchaburi stations. The study suggests that, to balance the access priorities of groups on services, policy actions should emphasize acceptably safe access for individuals, cost efficient feeder services connecting the metro lines, socioeconomic influences and time allocation. Insightful discussions on integrated approach balancing different dimensions of accessibility and recommendations would contribute to accessibility-based knowledge and potential propensity to use the public transits towards transport sustainability.

  12. 75 FR 4101 - Enterprise Income Verification (EIV) System User Access Authorization Form and Rules of Behavior...

    Science.gov (United States)

    2010-01-26

    ... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT [Docket No. FR-5376-N-05] Enterprise Income Verification (EIV) System User Access Authorization Form and Rules of Behavior and User Agreement AGENCY... Access, Authorization Form and Rules Of Behavior and User Agreement. OMB Approval Number: 2577-New. Form...

  13. An Accessible Video Player for Older People: Issues from a User Test

    OpenAIRE

    Villena, Johana M. Rosas; Ramos, Bruno C.; Fortes, Renata P.M.; Goularte, Rudinei

    2014-01-01

    There is a huge availability of videos that have been produced in a very fast and wide way, along with the popularity of Internet. This scenario should be carefully considered by the video authors since many users have different needs. It is important to keep in mind the accessibility requirements so that any user can overcome the barriers to access content regardless of their limitations imposed by either impairment or some temporary restriction. The current video players present barriers fo...

  14. National Radiobiology Archives Distributed Access User's Manual, Version 1. 1

    Energy Technology Data Exchange (ETDEWEB)

    Smith, S.K.; Prather, J.C.; Ligotke, E.K.; Watson, C.R.

    1992-06-01

    This supplement to the NRA Distributed Access User's manual (PNL-7877), November 1991, describes installation and use of Version 1.1 of the software package; this is not a replacement of the previous manual. Version 1.1 of the NRA Distributed Access Package is a maintenance release. It eliminates several bugs, and includes a few new features which are described in this manual. Although the appearance of some menu screens has changed, we are confident that the Version 1.0 User's Manual will provide an adequate introduction to the system. Users who are unfamiliar with Version 1.0 may wish to experiment with that version before moving on to Version 1.1.

  15. Securing optical code-division multiple-access networks with a postswitching coding scheme of signature reconfiguration

    Science.gov (United States)

    Huang, Jen-Fa; Meng, Sheng-Hui; Lin, Ying-Chen

    2014-11-01

    The optical code-division multiple-access (OCDMA) technique is considered a good candidate for providing optical layer security. An enhanced OCDMA network security mechanism with a pseudonoise (PN) random digital signals type of maximal-length sequence (M-sequence) code switching to protect against eavesdropping is presented. Signature codes unique to individual OCDMA-network users are reconfigured according to the register state of the controlling electrical shift registers. Examples of signature reconfiguration following state switching of the controlling shift register for both the network user and the eavesdropper are numerically illustrated. Dynamically changing the PN state of the shift register to reconfigure the user signature sequence is shown; this hinders eavesdroppers' efforts to decode correct data sequences. The proposed scheme increases the probability of eavesdroppers committing errors in decoding and thereby substantially enhances the degree of an OCDMA network's confidentiality.

  16. Mapping Norway - a Method to Register and Survey the Status of Accessibility

    Science.gov (United States)

    Michaelis, Sven; Bögelsack, Kathrin

    2018-05-01

    The Norwegian mapping authority has developed a standard method for mapping accessibility mostly for people with limited or no walking abilities in urban and recreational areas. We choose an object-orientated approach where points, lines and polygons represents objects in the environment. All data are stored in a geospatial database, so they can be presented as web map and analyzed using GIS software. By the end of 2016 more than 160 municipalities are mapped using that method. The aim of this project is to establish a national standard for mapping and to provide a geodatabase that shows the status of accessibility throughout Norway. The data provide a useful tool for national statistics, local planning authorities and private users. First results show that accessibility is low and Norway still faces many challenges to meet the government's goals for Universal Design.

  17. Making Patron Data Work Harder: User Search Terms as Access Points?

    Directory of Open Access Journals (Sweden)

    Jason A. Clark

    2008-06-01

    Full Text Available Montana State University (MSU Libraries are experimenting with re-using patron-generated data to create browseable access points for the Electronic Theses and Dissertations (ETD collection. A beta QueryCatcher module logs recent search terms and the number of associated hits. These terms are used to create browseable lists and tagclouds which enhance access to the ETD collection. Gathering and reusing information about user behavior is an emerging trend in web application development. This article outlines MSU Libraries' reasoning for moving towards a user-generated model and provides a complete walkthrough of the steps in building the application and example code.

  18. The Searching Behavior of Remote Users: A Study of One Online Public Access Catalog (OPAC).

    Science.gov (United States)

    Kalin, Sally W.

    1991-01-01

    Describes a study that was conducted to determine whether the searching behavior of remote users of LIAS (Library Information Access System), Pennsylvania State University's online public access catalog (OPAC), differed from those using the OPAC within the library. Differences in search strategies and in user satisfaction are discussed. (eight…

  19. Authentication and Access: Accommodating Public Users in an Academic World

    Directory of Open Access Journals (Sweden)

    Lynne Weber

    2010-09-01

    Full Text Available In the fall of 2004, the Academic Computing Center, a division of the Information Technology Services Department (ITS at Minnesota State University, Mankato took over responsibility for the computers in the public areas of Memorial Library. For the first time, affiliated Memorial Library users were required to authenticate using a campus username and password, a change that effectively eliminated computer access for anyone not part of the university community. This posed a dilemma for the librarians. Because of its Federal Depository status, the library had a responsibility to provide general access to both print and online government publications for the general public. Furthermore, the library had a long tradition of providing guest access to most library resources, and there was reluctance to abandon the practice. Therefore the librarians worked with ITS to retain a small group of six computers that did not require authentication and were clearly marked for community use, along with several standup, open-access computers on each floor used primarily for searching the library catalog. The additional need to provide computer access to high school students visiting the library for research and instruction led to more discussions with ITS and resulted in a means of generating temporary usernames and passwords through a Web form. These user accommodations were implemented in the library without creating a written policy governing the use of open-access computers.

  20. Deaf New Zealand Sign Language users' access to healthcare.

    Science.gov (United States)

    Witko, Joanne; Boyles, Pauline; Smiler, Kirsten; McKee, Rachel

    2017-12-01

    The research described was undertaken as part of a Sub-Regional Disability Strategy 2017-2022 across the Wairarapa, Hutt Valley and Capital and Coast District Health Boards (DHBs). The aim was to investigate deaf New Zealand Sign Language (NZSL) users' quality of access to health services. Findings have formed the basis for developing a 'NZSL plan' for DHBs in the Wellington sub-region. Qualitative data was collected from 56 deaf participants and family members about their experiences of healthcare services via focus group, individual interviews and online survey, which were thematically analysed. Contextual perspective was gained from 57 healthcare professionals at five meetings. Two professionals were interviewed, and 65 staff responded to an online survey. A deaf steering group co-designed the framework and methods, and validated findings. Key issues reported across the health system include: inconsistent interpreter provision; lack of informed consent for treatment via communication in NZSL; limited access to general health information in NZSL and the reduced ability of deaf patients to understand and comply with treatment options. This problematic communication with NZSL users echoes international evidence and other documented local evidence for patients with limited English proficiency. Deaf NZSL users face multiple barriers to equitable healthcare, stemming from linguistic and educational factors and inaccessible service delivery. These need to be addressed through policy and training for healthcare personnel that enable effective systemic responses to NZSL users. Deaf participants emphasise that recognition of their identity as members of a language community is central to improving their healthcare experiences.

  1. Evaluation of perception on environmental movement: accessibility centered in the user

    Directory of Open Access Journals (Sweden)

    Éden Fernando Batista Ferreira

    2013-04-01

    Full Text Available Introduction: The discussion about accessibility in urban environments is observed in several studies,but the vast majority focuses attention on structural elements and not the user. Objective: This study proposes a method of assessing urban environmental movement, from the point of view of its users, to identify the relationship between perceived barriers and facilitators in the environment movement and aspects of the body functions and structures and the users’ participation in activities, which denotes the degree of accessibility of these people in this space. Method: It describes a case study in Belem, Para state, utilizing a method of assessing the perception of users, based on indicators of environmental factors, activity and participation, structure and functions of the body, highlighted by the International Classification of Functioning, Disability and Health – ICF. Results:The main finding of this study indicates that people’s perceptions about their environment directly influences the movement involved in their occupations. Conclusion: Studies with this content are relevant and necessary in our current society, because they reveal how changes in major urban centers influence the accessibility and involvement of people in their occupations, thereby directly interfering with their health, quality of life, and participation in society.

  2. Users, uses, and value of Landsat satellite imagery: results from the 2012 survey of users

    Science.gov (United States)

    Miller, Holly M.; Richardson, Leslie A.; Koontz, Stephen R.; Loomis, John; Koontz, Lynne

    2013-01-01

    Landsat satellites have been operating since 1972, providing a continuous global record of the Earth’s land surface. The imagery is currently available at no cost through the U.S. Geological Survey (USGS). Social scientists at the USGS Fort Collins Science Center conducted an extensive survey in early 2012 to explore who uses Landsat imagery, how they use the imagery, and what the value of the imagery is to them. The survey was sent to all users registered with USGS who had accessed Landsat imagery in the year prior to the survey and over 11,000 current Landsat imagery users responded. The results of the survey revealed that respondents from many sectors use Landsat imagery in myriad project locations and scales, as well as application areas. The value of Landsat imagery to these users was demonstrated by the high importance of and dependence on the imagery, the numerous environmental and societal benefits observed from projects using Landsat imagery, the potential negative impacts on users’ work if Landsat imagery was no longer available, and the substantial aggregated annual economic benefit from the imagery. These results represent only the value of Landsat to users registered with USGS; further research would help to determine what the value of the imagery is to a greater segment of the population, such as downstream users of the imagery and imagery-derived products.

  3. Making LibrariesAccessible for Visually Impaired Users: Practical Advice For Librarians

    Directory of Open Access Journals (Sweden)

    Devney Hamilton

    2011-12-01

    Full Text Available This article provides an introduction to making university libraries accessible to visually impaired users. It includes a summary of how visually impaired students access information and how libraries can provide access to materials, devices and software, and staff support to ensure visually impaired students ’ equal opportunity to use the library. The practical advice for librarians are based on interviews with 18 visually impaired university students and professionals who specialize in media, library services and information retrieval.

  4. Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System

    Institute of Scientific and Technical Information of China (English)

    Wen-Min Li; Xue-Lei Li; Qiao-Yan Wen; Shuo Zhang; Hua Zhang

    2017-01-01

    In hybrid cloud computing, encrypted data access control can provide a fine-grained access method for orga-nizations to enact policies closer to organizational policies. This paper presents an improved CP-ABE (ciphertext-policy attribute-based encryption) scheme to construct an encrypted data access control solution that is suitable for mobile users in hybrid cloud system. In our improvement, we split the original decryption keys into a control key, a secret key and a set of transformation keys. The private cloud managed by the organization administrator takes charge of updating the transformation keys using the control key. It helps to handle the situation of flexible access management and attribute alteration. Meanwhile, the mobile user's single secret key remains unchanged as well as the ciphertext even if the data user's attribute has been revoked. In addition, we modify the access control list through adding the attributes with corresponding control key and transformation keys so as to manage user privileges depending upon the system version. Finally, the analysis shows that our scheme is secure, flexible and efficient to be applied in mobile hybrid cloud computing.

  5. Autonomy and Housing Accessibility Among Powered Mobility Device Users

    Science.gov (United States)

    Brandt, Åse; Lexell, Eva Månsson; Iwarsson, Susanne

    2015-01-01

    OBJECTIVE. To describe environmental barriers, accessibility problems, and powered mobility device (PMD) users’ autonomy indoors and outdoors; to determine the home environmental barriers that generated the most housing accessibility problems indoors, at entrances, and in the close exterior surroundings; and to examine personal factors and environmental components and their association with indoor and outdoor autonomy. METHOD. This cross-sectional study was based on data collected from a sample of 48 PMD users with a spinal cord injury (SCI) using the Impact of Participation and Autonomy and the Housing Enabler instruments. Descriptive statistics and logistic regression were used. RESULTS. More years living with SCI predicted less restriction in autonomy indoors, whereas more functional limitations and accessibility problems related to entrance doors predicted more restriction in autonomy outdoors. CONCLUSION. To enable optimized PMD use, practitioners must pay attention to the relationship between client autonomy and housing accessibility problems. PMID:26356666

  6. User Perception of Facebook App Data Access: A Comparison of Methods and Privacy Concerns

    Directory of Open Access Journals (Sweden)

    Jennifer Golbeck

    2016-03-01

    Full Text Available Users share vast amounts of personal information online, but are they fully aware of what information they are sharing and with whom? In this paper, we focused on Facebook apps and set out to understand how concerned users are about privacy and how well-informed they are about what personal data apps can access. We found that initially, subjects were generally under-informed about what data apps could access from their profiles. After viewing additional information about these permissions, subjects’ concern about privacy on Facebook increased. Subjects’ understanding of what data apps were able to access increased, although even after receiving explicit information on the topic, many subjects still did not fully understand the extent to which apps could access their data.

  7. A New Key-lock Method for User Authentication and Access Control

    Institute of Scientific and Technical Information of China (English)

    JI Dongyao; ZHANG Futai; WANG Yumin

    2001-01-01

    We propose a new key-lock methodfor user authentication and access control based onChinese remainder theorem, the concepts of the ac-cess control matrix, key-lock-pair, time stamp, and the NS public key protocol. Our method is dynamicand needs a minimum amount of computation in thesense that it only updates at most one key/lock foreach access request. We also demonstrate how an au-thentication protocol can be integrated into the ac-cess control method. By applying a time stamp, themethod can not only withstand replay attack, butalso strengthen the authenticating mechanism, whichcould not be achieved simultaneously in previous key-lock methods.

  8. Making Patron Data Work Harder: User Search Terms as Access Points?

    OpenAIRE

    Jason A. Clark

    2008-01-01

    Montana State University (MSU) Libraries are experimenting with re-using patron-generated data to create browseable access points for the Electronic Theses and Dissertations (ETD) collection. A beta QueryCatcher module logs recent search terms and the number of associated hits. These terms are used to create browseable lists and tagclouds which enhance access to the ETD collection. Gathering and reusing information about user behavior is an emerging trend in web application development. This ...

  9. Unofficial policy: access to housing, housing information and social services among homeless drug users in Hartford, Connecticut

    Directory of Open Access Journals (Sweden)

    Corbett A Michelle

    2007-03-01

    Full Text Available Abstract Background Much research has shown that the homeless have higher rates of substance abuse problems than housed populations and that substance abuse increases individuals' vulnerability to homelessness. However, the effects of housing policies on drug users' access to housing have been understudied to date. This paper will look at the "unofficial" housing policies that affect drug users' access to housing. Methods Qualitative interviews were conducted with 65 active users of heroin and cocaine at baseline, 3 and 6 months. Participants were purposively sampled to reflect a variety of housing statuses including homeless on the streets, in shelters, "doubled-up" with family or friends, or permanently housed in subsidized, unsubsidized or supportive housing. Key informant interviews and two focus group interviews were conducted with 15 housing caseworkers. Data were analyzed to explore the processes by which drug users receive information about different housing subsidies and welfare benefits, and their experiences in applying for these. Results A number of unofficial policy mechanisms limit drug users' access to housing, information and services, including limited outreach to non-shelter using homeless regarding housing programs, service provider priorities, and service provider discretion in processing applications and providing services. Conclusion Unofficial policy, i.e. the mechanisms used by caseworkers to ration scarce housing resources, is as important as official housing policies in limiting drug users' access to housing. Drug users' descriptions of their experiences working with caseworkers to obtain permanent, affordable housing, provide insights as to how access to supportive and subsidized housing can be improved for this population.

  10. User needs in television archive access

    DEFF Research Database (Denmark)

    Kirkegaard Lunn, Brian

    2009-01-01

    This paper presents a methodical approach for generating deep knowledge about users, as a prerequisite for design and construction of digital information access to cultural heritage information objects. We exemplify this methodical approach by reporting on an explorative study of information need...... topic or content; and 4) Muddled topic or content. Fourthly, the interviewees' needs consist of four phases: 1) Getting an overview of transmitted broadcasts; 2) Identification of borderline exemplars; 3) Selection of specific programmes; and 4) Verification of facts. The present paper presents novel...... research on characteristics of information needs in a television broadcast context. We demonstrate how one may go about generating knowledge which is imperative for the design and construction of future broadcast retrieval systems. Udgivelsesdato: 2009...

  11. Designing the OPAC User Interface to Improve Access and Retrieval.

    Science.gov (United States)

    Basista, Thomas; And Others

    1991-01-01

    Discussion of problems with retrieval of records in library online public access catalogs (OPACs) focuses on an ongoing research project at the Indiana University of Pennsylvania (IUP) that has been trying to improve subject retrieval vocabulary control using natural and thesaural language and on the design of a good graphical user interface.…

  12. Monitoring User-Based Accessibility Assessment in Urban Environments and in Public Buildings

    Directory of Open Access Journals (Sweden)

    Gintaras Stauskis

    2018-04-01

    Full Text Available The research features analysis of user-experience-based accessibility assessment and progress monitoring of buildings and public spaces; this analysis is used as a tool for facilitating the development of humane, socially sustainable and an inclusive urban environment. A group of users representing people with different kinds of disabilities, the elderly and families with children was created to assess the quality of access to various buildings with different functions and locations across Vilnius and in Singapore. A school, two hospitals, a rehab centre and two offices were selected for access monitoring in Vilnius City, while a hotel, a café and two metro stations with public squares were chosen for access assessment in Singapore. As the same method was principally applied to assess accessibility of selected buildings in Vilnius City in 2000 and 2017 and in Singapore in 2012, the article draws a comparative analysis of access levels in these two cities located in different global regions. The results show a definite improvement of access quality over time and also identify the critical aspects in this process. The segment of plot planning represents the lowest quality of access for all assessed building types as compared to the building segment and the external–internal element segments. The paper also draws conclusions that access improvement is a continuous process of implementing advanced urban policy instruments, and city planners can contribute to it by constantly analysing and presenting to public the monitoring data about the progress in access improvement. Comparing the assessment results between Vilnius City and Singapore – cities that are located in different global regions and in different socio-economic environments – provides a practical tool for benchmarking and setting the priorities for this process.

  13. Subject Access Problems of Different Types of OPAC Users Or, the Double Challenge.

    Science.gov (United States)

    Cochrane, Pauline A.

    1989-01-01

    Reviews the problems of users of online public access catalogs and argues that it is necessary to think of all searching problems as systems problems rather than user failures, and to concentrate research in the area of systems enhancements. A list of improved tools needed for subject searching in online catalogs is identified. (CLB)

  14. AquaUsers: Improving access to remotely sensed data for non-specialists

    Science.gov (United States)

    Clements, Oliver; Walker, Peter; Calton, Ben; Miller, Peter

    2015-04-01

    In recent years more and more complex remotely sensed data have been made available to the public by national and international agencies. These data are also reprocessed by different organisations to produce secondary products that are of specific need to a community. For instance the production of chlorophyll concentration maps from ocean colour data provided by NASA for the marine community. Providing access to such data has normally been focused on simply making the data available with appropriate metadata so that domain specialists can make use of it. One area that has seen significant investment, both of time and money, has been in the production of web based data portals. Primarily these have focused on spatial data. By providing a web map visualisation users are able to quickly assess both spatial coverage and data values. Data portal improvements have been possible thanks to advancements in back end data servers such as Thredds and ncWMS as well as improvements in front-end libraries for data visualisation including OpenLayers and D3. Data portals that make use of these technological advancements have aimed at improving the access and use of data by trained scientific domain specialists. There is now a push to improve access to these systems by non-scientific domain specialists through several European Commission funded projects, including OPEC and AquaUsers. These projects have improved upon an open source web GIS portal created by Plymouth Marine Laboratory [https://github.com/pmlrsg/GISportal]. We will present the latest version of our GIS portal, discuss the designs steps taken to achieve the latest build and share user stories as to how non-domain specialists are now able to utilise the system and get benefits from remotely sensed data. A first version was produced and disseminated to end users for feedback. At this stage the end users included government advisors, fish farmers and scientific groups with no specific GIS training or knowledge. This

  15. Impact of Users Identities and Access Conditions on Downlink Performance in Closed Small-Cell Networks

    KAUST Repository

    Radaydeh, Redha; Gaaloul, Fakhreddine; Alouini, Mohamed-Slim

    2015-01-01

    This paper investigates the effect of various operation parameters on the downlink user performance in overlaid small-cell networks. The case study considers closed-access small cells (e.g., femtocells), wherein only active authorized user

  16. User-oriented information access by information need recontextualisation and articulation. Application in nuclear criticality safety

    International Nuclear Information System (INIS)

    Medini, Lionel

    2001-01-01

    This research thesis addresses the design methodology of a system of access to information which is based on an access to relevant information with respect to user needs. In a first part, the author addresses the various issues related to access to information and to information understanding. The next part addresses the involved methods and tools and presents the operational approach adopted for this research regarding access to information. Different disciplines are addressed (knowledge management, ergonomics and information science) and different technologies are used (W3 and XML, DVP, ActiveX, pdf format and the Adobe suite). In the core chapter, the author reports the design of a LMCE (a multi-user book of electronic knowledge) which allows both hypermedia navigation in knowledge diagrams and a construction of a document query. This design is based on a knowledge-management modelling to define diagrams, on ergonomics modelling for user profile identification, and on information science for a specific indexing of the information system. The prototype can be visualized with a web browser such as Internet Explorer 5. The author reports a first assessment and discusses the contribution of his approach to the problematic of access to information which is to be applied to nuclear criticality safety [fr

  17. Accessibility through user-centred and Inclusive Design processes

    DEFF Research Database (Denmark)

    Herriott, Richard

    2014-01-01

    This PhD dissertation addresses the subject of accessibility through user-centred and Inclusive Design processes (ID). The project takes as its starting point the observation that the concept of Inclusive Design is not adequately delimited. The supporting literature in the field of ID is structured...... around the fact that the needs of individuals with reduced capabilities compared to the norm (referred to for convenience as "the elderly and disabled") have not been properly addressed by standard design processes. In response to this fact, ID is a proposed design method to find more effective means...

  18. User experience with a health insurance coverage and benefit-package access: implications for policy implementation towards expansion in Nigeria.

    Science.gov (United States)

    Mohammed, Shafiu; Aji, Budi; Bermejo, Justo Lorenzo; Souares, Aurelia; Dong, Hengjin; Sauerborn, Rainer

    2016-04-01

    Developing countries are devising strategies and mechanisms to expand coverage and benefit-package access for their citizens through national health insurance schemes (NHIS). In Nigeria, the scheme aims to provide affordable healthcare services to insured-persons and their dependants. However, inclusion of dependants is restricted to four biological children and a spouse per user. This study assesses the progress of implementation of the NHIS in Nigeria, relating to coverage and benefit-package access, and examines individual factors associated with the implementation, according to users' perspectives. A retrospective, cross-sectional survey was done between October 2010 and March 2011 in Kaduna state and 796 users were randomly interviewed. Questions regarding coverage of immediate-family members and access to benefit-package for treatment were analysed. Indicators of coverage and benefit-package access were each further aggregated and assessed by unit-weighted composite. The additive-ordinary least square regression model was used to identify user factors that may influence coverage and benefit-package access. With respect to coverage, immediate-dependants were included for 62.3% of the users, and 49.6 rated this inclusion 'good' (49.6%). In contrast, 60.2% supported the abolishment of the policy restriction for non-inclusion of enrolees' additional children and spouses. With respect to benefit-package access, 82.7% of users had received full treatments, and 77.6% of them rated this as 'good'. Also, 14.4% of users had been refused treatments because they could not afford them. The coverage of immediate-dependants was associated with age, sex, educational status, children and enrolment duration. The benefit-package access was associated with types of providers, marital status and duration of enrolment. This study revealed that coverage of family members was relatively poor, while benefit-package access was more adequate. Non-inclusion of family members could

  19. Improving User Access to the Integrated Multi-Satellite Retrievals for GPM (IMERG) Products

    Science.gov (United States)

    Huffman, George; Bolvin, David; Nelkin, Eric; Kidd, Christopher

    2016-04-01

    The U.S. Global Precipitation Measurement mission (GPM) team has developed the Integrated Multi-satellitE Retrievals for GPM (IMERG) algorithm to take advantage of the international constellation of precipitation-relevant satellites and the Global Precipitation Climatology Centre surface precipitation gauge analysis. The goal is to provide a long record of homogeneous, high-resolution quasi-global estimates of precipitation. While expert scientific researchers are major users of the IMERG products, it is clear that many other user communities and disciplines also desire access to the data for wide-ranging applications. Lessons learned during the Tropical Rainfall Measuring Mission, the predecessor to GPM, led to some basic design choices that provided the framework for supporting multiple user bases. For example, two near-real-time "runs" are computed, the Early and Late (currently 5 and 15 hours after observation time, respectively), then the Final Run about 3 months later. The datasets contain multiple fields that provide insight into the computation of the complete precipitation data field, as well as diagnostic (currently) estimates of the precipitation's phase. In parallel with this, the archive sites are working to provide the IMERG data in a variety of formats, and with subsetting and simple interactive analysis to make the data more easily available to non-expert users. The various options for accessing the data are summarized under the pmm.nasa.gov data access page. The talk will end by considering the feasibility of major user requests, including polar coverage, a simplified Data Quality Index, and reduced data latency for the Early Run. In brief, the first two are challenging, but under the team's control. The last requires significant action by some of the satellite data providers.

  20. Pollutant emission registers-INES and EPER toward PRTR

    International Nuclear Information System (INIS)

    Caricchia, A.M.; Cirillo, M.C.; Gagna, A.

    2005-01-01

    PRTRs (Pollutant Release and Transfer Registers) are information systems collecting and providing public access to information on pollutant releases in the environment. These registers are based on a scheduled reporting by the manufacturing facilities. Since the establishment of the TRI (Toxic Release lnventory) at the end of the '80s in the USA, international interest grew focussing on the definition of the features of national PRTRs as environmental management systems. The Protocol on PRTRs, the first international legally binding agreement, was signed in 2003 in the frame of the UNECE-Convention on Access to Information, Public Participation in Decision-making and Access to Justice in Environmental Matters (Aarhus Convention, 1999). The European register EPER (European Pollutant Emission Register), established in the Directive 96/61/EC, represents the first step at a European level towards a truly integrated pollutant emissions register, an experience which is going to improve further with the forthcoming introduction of the E-PRTR (European Pollutant Release and Transfer Register). Operating since 2003, EPER collects the information provided by 9377 facilities spread over EU15 countries plus Norway and Hungary. Concerning Italy, in accordance with European EPER, a national pollutant emission register has been established, called INES ('Inventario Nazionale delle Emissioni e loro Sorgenti'). INES can be currently browsed and queried on the following web-page: http://www.sinanet.apat.it [it

  1. Creating Accessible Science Museums with User-Activated Environmental Audio Beacons (Ping!)

    Science.gov (United States)

    Landau, Steven; Wiener, William; Naghshineh, Koorosh; Giusti, Ellen

    2005-01-01

    In 2003, Touch Graphics Company carried out research on a new invention that promises to improve accessibility to science museums for visitors who are visually impaired. The system, nicknamed Ping!, allows users to navigate an exhibit area, listen to audio descriptions, and interact with exhibits using a cell phone-based interface. The system…

  2. Visits to Registered Nurses: An Opportunity to Increase Contraceptive Access in California.

    Science.gov (United States)

    Parker, Emese C; Kong, Kevin; Watts, Leslie A; Schwarz, Eleanor B; Darney, Philip D; Thiel de Bocanegra, Heike

    In 2013, California passed Assembly Bill (A.B.) 2348, approving registered nurses (RNs) to dispense patient self-administered hormonal contraceptives and administer injections of hormonal contraceptives. The Family Planning, Access, Care and Treatment (Family PACT) program, which came into effect in 1997 to expand low-income, uninsured California resident access to contraceptives at no cost, is one program in which qualified RNs can dispense and administer contraceptives. The aims of this study were to (a) describe utilization of RN visits within California's Family PACT program and (b) evaluate the impact of RN visits on client birth control acquisition during the first 18 months after implementation of A.B. 2348 (January 1, 2013 to June 30, 2014). A descriptive observational design using administrative databases was used. Family PACT claims were retrieved for RN visits and contraception. Paid claims for contraceptive dispensing and/or administration visits by physicians, nurse practitioners, certified nurse midwives, and physician assistants were compared before and after the implementation of A.B. 2348 at practice sites where RN visits were and were not utilized. Contraceptive methods and administration procedures were identified using Healthcare Common Procedure Coding System codes, National Drug Codes, and Common Procedural Terminology codes. Claims data for healthcare facilities were abstracted by site location based on a unique combination of National Provider Identifier (NPI), NPI Owner, and NPI location number. RN visits were found mainly in Northern California and the Central Valley (73%). Sixty-eight percent of RN visits resulted in same-day dispensing and/or administration of hormonal (and/or barrier) methods. Since benefit implementation, RN visits resulted in a 10% increase in access to birth control dispensing and/or administration visits. RN visits were also associated with future birth control acquisition and other healthcare utilization within the

  3. Illinois I/O Register to FASTBUS Interface

    International Nuclear Information System (INIS)

    Downing, R.; Lesny, D.; Whitten, W.

    1983-01-01

    The I/O Register to FASTBUS Interface (IORFI) is connected to a processor via two 16-bit output registers (OR1,OR2) and two 16-bit output resisters (IR1,IR2). One of the output registers (OR1) is used to specify the interface function which is to be performed when the interface is accessed via the Data-in Register (IR2) or the Data-out Register (OR2). The other input register (IR1) is used to read the direct status of the FASTBUS lines independent of OR1. The changes made to the SLAC design at the University of Illinois are described

  4. SoNeUCON_{ABC}Pro: an access control model for social networks with translucent user provenance

    OpenAIRE

    González Manzano, Lorena; Slaymaker, Mark; Fuentes García Romero de Tejada, José María de; Vayenas, Dimitris

    2018-01-01

    Proceedings of: SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017 Web-Based Social Networks (WBSNs) are used by millions of people worldwide. While WBSNs provide many benefits, privacy preservation is a concern. The management of access control can help to assure data is accessed by authorized users. However, it is critical to provide sufficient flexibility so that a rich set of conditions may be imposed by users. In this paper we coi...

  5. Sci-Hub provides access to nearly all scholarly literature.

    Science.gov (United States)

    Himmelstein, Daniel S; Romero, Ariel Rodriguez; Levernier, Jacob G; Munro, Thomas Anthony; McLaughlin, Stephen Reid; Greshake Tzovaras, Bastian; Greene, Casey S

    2018-03-01

    The website Sci-Hub enables users to download PDF versions of scholarly articles, including many articles that are paywalled at their journal's site. Sci-Hub has grown rapidly since its creation in 2011, but the extent of its coverage has been unclear. Here we report that, as of March 2017, Sci-Hub's database contains 68.9% of the 81.6 million scholarly articles registered with Crossref and 85.1% of articles published in toll access journals. We find that coverage varies by discipline and publisher, and that Sci-Hub preferentially covers popular, paywalled content. For toll access articles, we find that Sci-Hub provides greater coverage than the University of Pennsylvania, a major research university in the United States. Green open access to toll access articles via licit services, on the other hand, remains quite limited. Our interactive browser at https://greenelab.github.io/scihub allows users to explore these findings in more detail. For the first time, nearly all scholarly literature is available gratis to anyone with an Internet connection, suggesting the toll access business model may become unsustainable. © 2018, Himmelstein et al.

  6. Inequity of access to ACE inhibitors in Swedish heart failure patients: a register-based study

    Science.gov (United States)

    Lindahl, Bertil; Hanning, Marianne; Westerling, Ragnar

    2016-01-01

    Background Several international studies suggest inequity in access to evidence-based heart failure (HF) care. Specifically, studies of ACE inhibitors (ACEIs) point to reduced ACEI access related to female sex, old age and socioeconomic position. Thus far, most studies have either been rather small, lacking diagnostic data, or lacking the possibility to account for several individual-based sociodemographic factors. Our aim was to investigate differences, which could reflect inequity in access to ACEIs based on sex, age, socioeconomic status or immigration status in Swedish patients with HF. Methods Individually linked register data for all Swedish adults hospitalised for HF in 2005–2010 (n=93 258) were analysed by multivariate regression models to assess the independent risk of female sex, high age, low employment status, low income level, low educational level or foreign country of birth, associated with lack of an ACEI dispensation within 1 year of hospitalisation. Adjustment for possible confounding was made for age, comorbidity, Angiotensin receptor blocker therapy, period and follow-up time. Results Analysis revealed an adjusted OR for no ACEI dispensation for women of 1.31 (95% CI 1.27 to 1.35); for the oldest patients of 2.71 (95% CI 2.53 to 2.91); and for unemployed patients of 1.59 (95% CI 1.46 to 1.73). Conclusions Access to ACEI treatment was reduced in women, older patients and unemployed patients. We conclude that access to ACEIs is inequitable among Swedish patients with HF. Future studies should include clinical data, as well as mortality outcomes in different groups. PMID:26261264

  7. Virtual reality for accessibility assessment of a built environment for a wheelchair user

    OpenAIRE

    MOUSSAOUI, Abdelhak; PRUSKI, Alain; MAAOUI, Choubeila

    2012-01-01

    The aging world population requires more attention to the autonomy of individuals. The impaired physical abilities need changes in the built environment for an optimal use. Due to physical limitations, aged persons frequently become users of a wheelchair which also leads to limitations in accessing their homes. This paper describes a tool for evaluating mobility and grasping, thus allowing housing professionals to assess the needed changes in terms of accessibility. This tool, which uses the ...

  8. Single memory with multiple shift register functionality

    NARCIS (Netherlands)

    2010-01-01

    The present invention relates to a memory device comprising a memory (EM) having at least two predetermined register memory sections addressable by respective address ranges AS1-ASz) and at least one access port (P1-PZ) for providing access to said memory (EM). Furthermore, access control means (A)

  9. Balanced Bipartite Graph Based Register Allocation for Network Processors in Mobile and Wireless Networks

    Directory of Open Access Journals (Sweden)

    Feilong Tang

    2010-01-01

    Full Text Available Mobile and wireless networks are the integrant infrastructure of mobile and pervasive computing that aims at providing transparent and preferred information and services for people anytime anywhere. In such environments, end-to-end network bandwidth is crucial to improve user's transparent experience when providing on-demand services such as mobile video playing. As a result, powerful computing power is required for networked nodes, especially for routers. General-purpose processors cannot meet such requirements due to their limited processing ability, and poor programmability and scalability. Intel's network processor IXP is specially designed for fast packet processing to achieve a broad bandwidth. IXP provides a large number of registers to reduce the number of memory accesses. Registers in an IXP are physically partitioned as two banks so that two source operands in an instruction have to come from the two banks respectively, which makes the IXP register allocation tricky and different from conventional ones. In this paper, we investigate an approach for efficiently generating balanced bipartite graph and register allocation algorithms for the dual-bank register allocation in IXPs. The paper presents a graph uniform 2-way partition algorithm (FPT, which provides an optimal solution to the graph partition, and a heuristic algorithm for generating balanced bipartite graph. Finally, we design a framework for IXP register allocation. Experimental results demonstrate the framework and the algorithms are efficient in register allocation for IXP network processors.

  10. Optical code division multiple access secure communications systems with rapid reconfigurable polarization shift key user code

    Science.gov (United States)

    Gao, Kaiqiang; Wu, Chongqing; Sheng, Xinzhi; Shang, Chao; Liu, Lanlan; Wang, Jian

    2015-09-01

    An optical code division multiple access (OCDMA) secure communications system scheme with rapid reconfigurable polarization shift key (Pol-SK) bipolar user code is proposed and demonstrated. Compared to fix code OCDMA, by constantly changing the user code, the performance of anti-eavesdropping is greatly improved. The Pol-SK OCDMA experiment with a 10 Gchip/s user code and a 1.25 Gb/s user data of payload has been realized, which means this scheme has better tolerance and could be easily realized.

  11. ASSESSMENT OF THE VOLUNTEERED GEOGRAPHIC INFORMATION FEEDBACK SYSTEM FOR THE DUTCH TOPOGRAPHICAL KEY REGISTER

    Directory of Open Access Journals (Sweden)

    M. Grus

    2015-08-01

    Full Text Available Since Topographical Key Register has become an open data the amount of users increased enormously. The highest grow was in the private users group. The increasing number of users and their growing demand for high actuality of the topographic data sets motivates the Dutch Kadaster to innovate and improve the Topographical Key Register (BRT. One of the initiatives was to provide a voluntary geographical information project aiming at providing a user-friendly feedback system adjusted to all kinds of user groups. The feedback system is a compulsory element of the Topographical Key Register in the Netherlands. The Dutch Kadaster is obliged to deliver a feedback system and the key-users are obliged to use it. The aim of the feedback system is to improve the quality and stimulate the usage of the data. The results of the pilot shows that the user-friendly and open to everyone feedback system contributes enormously to improve the quality of the topographic dataset.

  12. National Sample Survey of Registered Nurses

    Data.gov (United States)

    U.S. Department of Health & Human Services — The National Sample Survey of Registered Nurses (NSSRN) Download makes data from the survey readily available to users in a one-stop download. The Survey has been...

  13. Open Access Complements Interlibrary Loan Services, but Additional User Education is

    Directory of Open Access Journals (Sweden)

    Richard Hayman

    2016-03-01

    15% of articles requested (n=170 were filled using a gold OA source, and that another 30 article requests (~2.6% were filled with materials available in the public domain. This leads to the conclusion that the majority of article requests are filled using green OA sources. As the library also includes OA collections within its electronic resources, staff filled 13% of ILL article requests (n=152 using journals and repositories from these sources. Another 16% of article requests were filled using a combination of various online open repositories, including subject repositories (n=83, institutional repositories (n=84, or national or consortial repositories (n=16. The author includes a similar breakdown of fulfillment rates and sources for the other main categories explored – books and book chapters, theses and dissertations, conference papers, and reports – representing a combined 27% of all OA ILL requests. Regarding this content, it is noteworthy that overall open access requests for these material categories has dropped across each category when compared to the author’s previous study, with the exception of report requests, which more than doubled compared to that previous study. The study includes a brief overview of the user status for users making the various open access requests, with undergraduate students (n=283 and graduate students (n=807 combined making 70% of all requests. Subject areas are also briefly examined, with ILL requests coming from 63 different schools or departments across the library system. The top 15 are reported, with Psychology being the top requester (n=198, followed closely by Engineering & Technology (n=182. The author notes that 7 of the top 15 are STEM or health science disciplines. Conclusion – The rate of ILL requests for OA materials shows that library users continue to struggle with information retrieval. The researcher concludes that in many cases, making an ILL request is easier for the user than completing a thorough

  14. Accessibility to Specialized Public Oral Health Services from the Perspective of Brazilian Users

    Science.gov (United States)

    de Castro, Ricardo Dias; Rangel, Marianne de Lucena; da Silva, Marcos André Azevedo; de Lucena, Brunna Thaís Lucwu; Cavalcanti, Alessandro Leite; Bonan, Paulo Rogério Ferreti; Oliveira, Julyana de Araújo

    2016-01-01

    The Specialized Dental Clinics (SDCs) represent the first government initiative in Latin America aimed at providing specialized oral health services. This study sought to evaluate the organizational accessibility to specialized oral health care services in Brazil and to understand the factors that may be associated with accessibility from the user’s perspective. This epidemiological, cross-sectional and quantitative study was conducted by means of interviews with individuals who sought specialized public oral health services in the city of João Pessoa, Paraíba, Brazil, and consisted of a sample of 590 individuals. Users expressed a favorable view of the classification and resolutive nature of specialized services offered by Brazilian public health. The binary logistic regression analysis revealed weak points highlighting the difficulty involved in obtaining such treatments leading to unfavorable evaluations. In the resolutive nature item, difficulty in accessing the location, queues and lack of materials and equipment were highlighted as statistically significant unfavorable aspects. While many of the users considered the service to be resolutive, weaknesses were mentioned that need to be detected to promote improvements and to prevent other health models adopted worldwide from reproducing the same flaws. PMID:27775584

  15. Capacity bounds for the 2-user Gaussian IM-DD optical multiple-access channel

    KAUST Repository

    Al-Ebraheemy, Omer M. S.

    2016-11-01

    Optical wireless communications (OWC) is a potential solution for coping with the mismatch between the users growing demand for higher data-rates and the wireless network capabilities. In this paper, a multi-user OWC scenario is studied from an in formation-theoretic perspective. The studied network consists of two users communicating simultaneously with one access point using OWC, thus establishing an optical uplink channel. The capacity of this network is an important metric which reflects the highest possible communication rates that can be achieved over this channel. Capacity outer and inner bounds are derived, and are shown to be fairly tight in the high signal-to-noise ratio regime. © 2016 IEEE.

  16. The STEP database through the end-users eyes--USABILITY STUDY.

    Science.gov (United States)

    Salunke, Smita; Tuleu, Catherine

    2015-08-15

    The user-designed database of Safety and Toxicity of Excipients for Paediatrics ("STEP") is created to address the shared need of drug development community to access the relevant information of excipients effortlessly. Usability testing was performed to validate if the database satisfies the need of the end-users. Evaluation framework was developed to assess the usability. The participants performed scenario based tasks and provided feedback and post-session usability ratings. Failure Mode Effect Analysis (FMEA) was performed to prioritize the problems and improvements to the STEP database design and functionalities. The study revealed several design vulnerabilities. Tasks such as limiting the results, running complex queries, location of data and registering to access the database were challenging. The three critical attributes identified to have impact on the usability of the STEP database included (1) content and presentation (2) the navigation and search features (3) potential end-users. Evaluation framework proved to be an effective method for evaluating database effectiveness and user satisfaction. This study provides strong initial support for the usability of the STEP database. Recommendations would be incorporated into the refinement of the database to improve its usability and increase user participation towards the advancement of the database. Copyright © 2015 Elsevier B.V. All rights reserved.

  17. SAM: Secure Access of Media Independent Information Service with User Anonymity

    Directory of Open Access Journals (Sweden)

    Li Guangsong

    2010-01-01

    Full Text Available Seamless handover across different access technologies is very important in the future wireless networks. To optimize vertical handover in heterogeneous networks, IEEE 802.21 standard defines Media Independent Handover (MIH services. The MIH services can be a new target to attackers, which will be the main concern for equipment vendors and service providers. In this paper, we focus specifically on security of Media Independent Information Service (MIIS and present a new access authentication scheme with user anonymity for MIIS. The protocol can be used to establish a secure channel between the mobile node and the information server. Security and performance of the protocol are also analyzed in this paper.

  18. fNIRS suggests increased effort during executive access in ecstasy polydrug users.

    Science.gov (United States)

    Roberts, C A; Montgomery, C

    2015-05-01

    Ecstasy use is associated with cognitive impairment, believed to result from damage to 5-HT axons. Neuroimaging techniques to investigate executive dysfunction in ecstasy users provide a more sensitive measure of cognitive impairment than behavioural indicators. The present study assessed executive access to semantic memory in ecstasy polydrug users and non-users. Twenty ecstasy polydrug users and 20 non-user controls completed an oral variant of the Chicago Word Fluency Test (CWFT), whilst the haemodynamic response to the task was measured using functional near-infrared spectroscopy (fNIRS). There were no between-group differences in many background measures including measures of sleep and mood state (anxiety, arousal, hedonic tone). No behavioural differences were observed on the CWFT. However, there were significant differences in oxy-Hb level change at several voxels relating to the left dorsolateral prefrontal cortex (DLPFC) and right medial prefrontal cortex (PFC) during the CWFT, indicating increased cognitive effort in ecstasy users relative to controls. Regression analyses showed that frequency of ecstasy use, total lifetime dose and amount used in the last 30 days was significant predictors of oxy-Hb increase at several voxels after controlling for alcohol and cannabis use indices. The results suggest that ecstasy users show increased activation in the PFC as a compensatory mechanism, to achieve equivalent performance to non-users. These findings are in agreement with much of the literature in the area which suggests that ecstasy may be a selective serotonin neurotoxin in humans.

  19. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  20. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  1. User Practices in Keyword and Boolean Searching on an Online Public Access Catalog.

    Science.gov (United States)

    Ensor, Pat

    1992-01-01

    Discussion of keyword and Boolean searching techniques in online public access catalogs (OPACs) focuses on a study conducted at Indiana State University that examined users' attitudes toward searching on NOTIS (Northwestern Online Total Integrated System). Relevant literature is reviewed, and implications for library instruction are suggested. (17…

  2. On Low-Complexity Full-diversity Detection In Multi-User MIMO Multiple-Access Channels

    KAUST Repository

    Ismail, Amr

    2014-01-28

    Multiple-input multiple-output (MIMO) techniques are becoming commonplace in recent wireless communication standards. This newly introduced dimension (i.e., space) can be efficiently used to mitigate the interference in the multi-user MIMO context. In this paper, we focus on the uplink of a MIMO multiple access channel (MAC) where perfect channel state information (CSI) is only available at the destination. We provide new sufficient conditions for a wide range of space-time block codes (STBC)s to achieve full-diversity under partial interference cancellation group decoding (PICGD) with or without successive interference cancellation (SIC) for completely blind users. Interference cancellation (IC) schemes for two and three users are then provided and shown to satisfy the full-diversity criteria. Beside the complexity reduction due to the fact that PICGD enables separate decoding of distinct users without sacrificing the diversity gain, further reduction of the decoding complexity may be obtained. In fact, thanks to the structure of the proposed schemes, the real and imaginary parts of each user\\'s symbols may be decoupled without any loss of performance. Our new IC scheme is shown to outperform recently proposed two-user IC scheme especially for high spectral efficiency while requiring significantly less decoding complexity.

  3. 77 FR 73455 - Transportation Workers Identification Card (TWIC) Removal for Commercial Users To Access...

    Science.gov (United States)

    2012-12-10

    ... Manager at [email protected]us.army.mil . References: Department of Defense Instruction number 8520.2... DEPARTMENT OF DEFENSE Department of the Army Transportation Workers Identification Card (TWIC) Removal for Commercial Users To Access Electronic Transportation Acquisition (ETA) AGENCY: Department of...

  4. 15 CFR Appendix A to Part 950 - Schedule of User Fees for Access to NOAA Environmental Data

    Science.gov (United States)

    2010-01-01

    ... NOAA Environmental Data A Appendix A to Part 950 Commerce and Foreign Trade Regulations Relating to..., App. A Appendix A to Part 950—Schedule of User Fees for Access to NOAA Environmental Data Name of product/data/publication/information/service Current fee New fee NOAA National Data Centers Standard User...

  5. Inequities in accessibility to and utilisation of maternal health services in Ghana after user-fee exemption: a descriptive study.

    Science.gov (United States)

    Ganle, John K; Parker, Michael; Fitzpatrick, Raymond; Otupiri, Easmon

    2014-11-01

    Inequities in accessibility to, and utilisation of maternal healthcare services impede progress towards attainment of the maternal health-related Millennium Development Goals. The objective of this study is to examine the extent to which maternal health services are utilised in Ghana, and whether inequities in accessibility to and utilization of services have been eliminated following the implementation of a user-fee exemption policy, that aims to reduce financial barriers to access, reduce inequities in access, and improve access to and use of birthing services. We analyzed data from the 2007 Ghana Maternal Health Survey for inequities in access to and utilization of maternal health services. In measuring the inequities, frequency tables and cross-tabulations were used to compare rates of service utilization by region, residence and selected socio-demographic variables. Findings show marginal increases in accessibility to and utilisation of skilled antenatal, delivery and postnatal care services following the policy implementation (2003-2007). However, large gradients of inequities exist between geographic regions, urban and rural areas, and different socio-demographic, religious and ethnic groupings. More urban women (40%) than rural, 53% more women in the highest wealth quintile than women in the lowest, 38% more women in the best performing region (Central Region) than the worst (Upper East Region), and 48% more women with at least secondary education than those with no formal education, accessed and used all components of skilled maternal health services in the five years preceding the survey. Our findings raise questions about the potential equity and distributional benefits of Ghana's user-fee exemption policy, and the role of non-financial barriers or considerations. Exempting user-fees for maternal health services is a promising policy option for improving access to maternal health care, but might be insufficient on its own to secure equitable access to

  6. Cross-National User Priorities for Housing Provision and Accessibility — Findings from the European innovAge Project

    Directory of Open Access Journals (Sweden)

    Maria Haak

    2015-03-01

    Full Text Available To develop an innovative information and communication technology (ICT tool intended to help older people in their search for optimal housing solutions, a first step in the development process is to gain knowledge from the intended users. Thus the aim of this study was to deepen the knowledge about needs and expectations about housing options as expressed and prioritized by older people, people ageing with disabilities and professionals. A participatory design focus was adopted; 26 people with a range of functional limitations representing the user perspective and 15 professionals with a variety of backgrounds, participated in research circles that were conducted in four European countries. An additional 20 experts were invited as guests to the different research circle meetings. Three themes illustrating cross-national user priorities for housing provision and accessibility were identified: “Information barrier: accessible housing”, “Information barrier: housing adaptation benefits”, and “Cost barrier: housing adaptations”. In conclusion, early user involvement and identification of cross-national differences in priorities and housing options will strengthen the development of a user-friendly ICT tool that can empower older people and people with disabilities to be more active consumers regarding housing provision.

  7. On Low-Complexity Full-diversity Detection In Multi-User MIMO Multiple-Access Channels

    KAUST Repository

    Ismail, Amr; Alouini, Mohamed-Slim

    2014-01-01

    Multiple-input multiple-output (MIMO) techniques are becoming commonplace in recent wireless communication standards. This newly introduced dimension (i.e., space) can be efficiently used to mitigate the interference in the multi-user MIMO context. In this paper, we focus on the uplink of a MIMO multiple access channel (MAC) where perfect channel state information (CSI) is only available at the destination. We provide new sufficient conditions for a wide range of space-time block codes (STBC)s to achieve full-diversity under partial interference cancellation group decoding (PICGD) with or without successive interference cancellation (SIC) for completely blind users. Interference cancellation (IC) schemes for two and three users are then provided and shown to satisfy the full-diversity criteria. Beside the complexity reduction due to the fact that PICGD enables separate decoding of distinct users without sacrificing the diversity gain, further reduction of the decoding complexity may be obtained. In fact, thanks to the structure of the proposed schemes, the real and imaginary parts of each user's symbols may be decoupled without any loss of performance. Our new IC scheme is shown to outperform recently proposed two-user IC scheme especially for high spectral efficiency while requiring significantly less decoding complexity.

  8. A Comparison of Mobile and Fixed Device Access on User Engagement Associated With Women, Infants, and Children (WIC) Online Nutrition Education.

    Science.gov (United States)

    Brusk, John J; Bensley, Robert J

    2016-11-15

    Online health education has expanded its reach due to cost-effective implementation and demonstrated effectiveness. However, a limitation exists with the evaluation of online health education implementations and how the impact of the system is attenuated by the extent to which a user engages with it. Moreover, the current online health education research does not consider how this engagement has been affected by the transition from fixed to mobile user access over the last decade. This paper focuses on comparing the impact mobile versus fixed devices have on user engagement key performance indicators (KPI) associated with the wichealth website (.org), an Internet-based parent-child feeding intervention offered to clients associated with the US Department of Agriculture's Special Supplemental Nutrition Program for Women, Infants, and Children (WIC). Data were collected from 612,201 nutrition education lessons completed by 305,735 unique WIC participants in 21 states over a 1-year period. Data consisted of system-collected measures, profile items, and items from an exit survey administered at the conclusion of each lesson. User engagement was defined based on 3 KPIs associated with usage of the wichealth website: number of link views, link view time, and progression in stage of readiness to change. Independent samples t tests were used to compare KPIs between fixed only and mobile only device users and paired samples t tests were used to compare KPIs within users who completed at least one lesson each on both a fixed and mobile device. A logistic regression was performed to estimate the odds of KPI performance thresholds in the independent samples study group given access device type while controlling for confounding of user characteristics associated with these KPIs. Analysis of 8 user characteristics (lessons completed, race, ethnicity, language, state of residence, pregnancy status, beginning stage of change, and preferred nutrition education method) were

  9. Registered nurses' use of research findings in the care of older people.

    Science.gov (United States)

    Boström, Anne-Marie; Kajermo, Kerstin Nilsson; Nordström, Gun; Wallin, Lars

    2009-05-01

    To describe registered nurses' reported use of research in the care of older people and to examine associations between research use and factors related to the elements: the communication channels, the adopter and the social system. Research use among registered nurses working in hospital settings has been reported in many studies. Few studies, however, have explored the use of research among registered nurses working in the care of older people. A cross-sectional survey. In eight municipalities, all registered nurses (n = 210) working in older people care were invited to participate (response rate 67%). The Research Utilisation Questionnaire was adopted. Questions concerning the work organisation and research-related resources were sent to the Community Chief Nurse at each municipality. Descriptive statistics and logistic regression were applied. The registered nurses reported a relatively low use of research findings in daily practice, despite reporting a positive attitude to research. The registered nurses reported lack of access to research reports at the work place and that they had little support from unit managers and colleagues. Registered nurses working in municipalities with access to research-related resources reported more use of research than registered nurses without resources. The factors 'Access to research findings at work place', 'Positive attitudes to research' and 'Nursing programme at university level' were significantly associated with research use. There is a great potential to increase registered nurses' use of research findings in the care of older people. Factors which were linked to the communication channels and the adopter were associated with research use. Strategies to enhance research use should focus on access to and adequate training in using information sources, increased knowledge on research methodology and nursing science and a supportive organisation.

  10. The Effect of Transport Accessibility on the Social Inclusion of Wheelchair Users: A Mixed Method Analysis

    Directory of Open Access Journals (Sweden)

    Raquel Velho

    2016-06-01

    Full Text Available In recent years the accessibility of London buses has improved with the introduction of ramps and wheelchair priority areas. These advances are meant to remove physical barriers to entering the bus, but new conflicts have arisen particularly over the physical space aboard. We aimed to research the barriers faced by wheelchair users in public transport using a mixed methods approach to establish the breadth of issues faced by wheelchair users. To this end we quantified the push-force used alight a bus and a study to understand the coping mechanisms used by people to propel up a ramp. This quantitative approach found push forces which resulted in a load of 2 to 3 times body weight being transferred through people’s shoulders, forces which can be directly linked to shoulder injury. This could disable the user further, preventing them from being able to push their wheelchair. Alongside the quantitative study, we conducted qualitative research comprising of a number of in-depth interviews with wheelchair users about the barriers they face in public transport. Our main claim, highlighted through this interdisciplinary collaboration, is that proposed ‘solutions’ to accessibility, such as ramps, often generate problems of their own. These barriers can affect the life of wheelchair users, impacting on their confidence and causing social isolation. These can be long-term in nature or immediate.

  11. Scaffolding the design of accessible eLearning content: a user-centered approach and cognitive perspective.

    Science.gov (United States)

    Catarci, Tiziana; De Giovanni, Loredana; Gabrielli, Silvia; Kimani, Stephen; Mirabella, Valeria

    2008-08-01

    There exist various guidelines for facilitating the design, preparation, and deployment of accessible eLearning applications and contents. However, such guidelines prevalently address accessibility in a rather technical sense, without giving sufficient consideration to the cognitive aspects and issues related to the use of eLearning materials by learners with disabilities. In this paper we describe how a user-centered design process was applied to develop a method and set of guidelines for didactical experts to scaffold their creation of accessible eLearning content, based on a more sound approach to accessibility. The paper also discusses possible design solutions for tools supporting eLearning content authors in the adoption and application of the proposed approach.

  12. The benefit of the European User Community from transnational access to national radiation facilities

    DEFF Research Database (Denmark)

    Barrier, Elise; Manuel Braz Fernandes, Francisco; Bujan, Maya

    2014-01-01

    Transnational access (TNA) to national radiation sources is presently provided via programmes of the European Commission by BIOSTRUCT-X and CALIPSO with a major benefit for scientists from European countries. Entirely based on scientific merit, TNA allows all European scientists to realise synchr...... development of the research infrastructure of photon science. Taking into account the present programme structure of HORIZON2020, the European Synchrotron User Organization (ESUO) sees considerable dangers for the continuation of this successful collaboration in the future....... synchrotron radiation experiments for addressing the Societal Challenges promoted in HORIZON2020. In addition, by TNA all European users directly take part in the development of the research infrastructure of facilities. The mutual interconnection of users and facilities is a strong prerequisite for future...

  13. Wheelchair users, access and exclusion in South African higher education

    Directory of Open Access Journals (Sweden)

    Desire Chiwandire

    2017-09-01

    Conclusion: South African universities are still not places where all students are equally able to integrate socially. DUSMs know what ought to be done to make campuses more accessible and welcoming to students with disabilities and should be empowered to play a leading role in sensitising non-disabled members of universities, to create greater awareness of, and appreciation for, the multiple ways in which wheelchair user students continue to be excluded from full participation in university life. South African universities need to adopt a systemic approach to inclusion, which fosters an understanding of inclusion as a fundamental right rather than as a luxury.

  14. TGCat, The Chandra Transmission Grating Catalog and Archive: Systems, Design and Accessibility

    OpenAIRE

    Mitschang, Arik W.; Huenemoerder, David P.; Nichols, Joy S.

    2009-01-01

    The recently released Chandra Transmission Grating Catalog and Archive, TGCat, presents a fully dynamic on-line catalog allowing users to browse and categorize Chandra gratings observations quickly and easily, generate custom plots of resulting response corrected spectra on-line without the need for special software and to download analysis ready products from multiple observations in one convenient operation. TGCat has been registered as a VO resource with the NVO providing direct access to ...

  15. Lexical-Access Ability and Cognitive Predictors of Speech Recognition in Noise in Adult Cochlear Implant Users

    OpenAIRE

    Kaandorp, Marre W.; Smits, Cas; Merkus, Paul; Festen, Joost M.; Goverts, S. Theo

    2017-01-01

    Not all of the variance in speech-recognition performance of cochlear implant (CI) users can be explained by biographic and auditory factors. In normal-hearing listeners, linguistic and cognitive factors determine most of speech-in-noise performance. The current study explored specifically the influence of visually measured lexical-access ability compared with other cognitive factors on speech recognition of 24 postlingually deafened CI users. Speech-recognition performance was measured with ...

  16. Resource Discovery and Universal Access: Understanding Enablers and Barriers from the User Perspective

    OpenAIRE

    Beyene, Wondwossen

    2016-01-01

    Resource discovery tools are keys to explore, find , and retrieve resources from multitudes of collections hosted by library and information systems. Modern resource discovery tools provide facet - rich interfaces that provide multiple alternatives to ex pose resources for their potential users and help them navigate to the resources they need. This paper examines one of those tools from the perspective of universal access, ...

  17. Computer Security: When a person leaves - access rights remain!

    CERN Multimedia

    Computer Security Team

    2014-01-01

    We have been contacted recently by an embarrassed project manager who just figured out that a student who left at the end of 2013 still had access rights to read the whole project folder in February 2014: “How can that be?! In any other company, access rights would be purged at the same time as an employment contract terminates." Not so at CERN.   CERN has always been an open site with an open community. Physical access to the site is lightweight and you just need to have your CERN access card at hand. Further restrictions have only been put in place where safety or security really require them, and CERN does not require you to keep your access card on display. The same holds for the digital world. Once registered at CERN - either by contract, via your experiment or through the Users' office - you own a computing account that provides you with access to a wide variety of computing services. For example, last year 9,730 students/technicians/engineers/researchers/sta...

  18. [Design and application of user managing system of cardiac remote monitoring network].

    Science.gov (United States)

    Chen, Shouqiang; Zhang, Jianmin; Yuan, Feng; Gao, Haiqing

    2007-12-01

    According to inpatient records, data managing demand of cardiac remote monitoring network and computer, this software was designed with relative database ACCESS. Its interface, operational button and menu were designed in VBA language assistantly. Its design included collective design, amity, practicability and compatibility. Its function consisted of registering, inquiring, statisticing and printing, et al. It could be used to manage users effectively and could be helpful to exerting important action of cardiac remote monitoring network in preventing cardiac-vascular emergency ulteriorly.

  19. Model Based User's Access Requirement Analysis of E-Governance Systems

    Science.gov (United States)

    Saha, Shilpi; Jeon, Seung-Hwan; Robles, Rosslin John; Kim, Tai-Hoon; Bandyopadhyay, Samir Kumar

    The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify user's access requirement for the stakeholders and then according to the models of Nath's approach. Based on this analysis, the Govt. can also make standards of security based on the e-governance models. Thus there will be less human errors and bias. This analysis leads to the security architecture of the specific G2C application.

  20. PHOTO ENCODING OF ANALOG WATER METER FOR USER ACCESS AND PAYMENT SYSTEM

    OpenAIRE

    GODFREY A. MILLS; MOSES A. ACQUAH; APPAH BREMANG

    2012-01-01

    This paper presents design reconfiguration of analog water meter to provide remote access to user water consumption and billing records, payments, and meter device monitoring using photo-encoding as the detecting method for water consumption, a PIC18F2423 microcontroller for data processing, and SMS (short message service) technology for data transportation. To validate the system design, an analog water meter was converted into a digital equivalent and interfaced to the cellular network to t...

  1. Online Access to Weather Satellite Imagery Through the World Wide Web

    Science.gov (United States)

    Emery, W.; Baldwin, D.

    1998-01-01

    Both global area coverage (GAC) and high-resolution picture transmission (HRTP) data from the Advanced Very High Resolution Radiometer (AVHRR) are made available to laternet users through an online data access system. Older GOES-7 data am also available. Created as a "testbed" data system for NASA's future Earth Observing System Data and Information System (EOSDIS), this testbed provides an opportunity to test both the technical requirements of an onune'd;ta system and the different ways in which the -general user, community would employ such a system. Initiated in December 1991, the basic data system experienced five major evolutionary changes In response to user requests and requirements. Features added with these changes were the addition of online browse, user subsetting, dynamic image Processing/navigation, a stand-alone data storage system, and movement,from an X-windows graphical user Interface (GUI) to a World Wide Web (WWW) interface. Over Its lifetime, the system has had as many as 2500 registered users. The system on the WWW has had over 2500 hits since October 1995. Many of these hits are by casual users that only take the GIF images directly from the interface screens and do not specifically order digital data. Still, there b a consistent stream of users ordering the navigated image data and related products (maps and so forth). We have recently added a real-time, seven- day, northwestern United States normalized difference vegetation index (NDVI) composite that has generated considerable Interest. Index Terms-Data system, earth science, online access, satellite data.

  2. Analysis of the functioning of a therapeutic comunity for drug users

    Directory of Open Access Journals (Sweden)

    Mariane Capellato Melo

    2016-11-01

    Full Text Available Prolonged hospitalization of drug users in Therapeutic Communities (TC has become a public policy in Brazil. The aim of this study was to understand and analyze the functioning of a TC, considering the activities carried out there, the relationships established and the intervention process. Five visits to a TC were carried out. These visits were registered in a field diary. The notes were analyzed seeking to understand discursive features of the functioning of the TC and the impact of its functioning on the subjectivity of the users. The activities were labor therapy and group activities, and the Christian religious believes were explored. Relations were hierarchical, using strategies of control, confrontation and construction of guilt. Activities positioned the users as impulsive, addicts and deviants. The influence of the limited access to consumer goods and citizenship rights in the life trajectories of the users were not taken into consideration. Their problems with drugs were treated only as something internal, creating only strategies towards reconstructing the user's identity.

  3. Access to highly active antiretroviral therapy (HAART) for injecting drug users in the WHO European Region 2002-2004

    DEFF Research Database (Denmark)

    Donoghoe, Martin C; Bollerup, Annemarie R; Lazarus, Jeff

    2007-01-01

    Providing equitable access to highly active antiretroviral treatment (HAART) to injecting drug users (IDUs) is both feasible and desirable. Given the evidence that IDUs can adhere to HAART as well as non-IDUs and the imperative to provide universal and equitable access to HIV/AIDS treatment for all...... who need it, here we examine whether IDUs in the 52 countries in the WHO European Region have equitable access to HAART and whether that access has changed over time between 2002 and 2004. We consider regional and country differences in IDU HAART access; examine preliminary data regarding...

  4. Achievable Rate of a Cognitive MIMO Multiple Access Channel With Multi-Secondary Users

    KAUST Repository

    Sboui, Lokman; Ghazzai, Hakim; Rezki, Zouheir; Alouini, Mohamed-Slim

    2015-01-01

    We study the secondary sum-rate of an underlay cognitive multiple access channel consisting of a primary user and multiple secondary users (SUs) communicating with a common destination. We propose a particular linear precoding and SU selection scheme that maximize the cognitive sum-rate. This scheme is based on space alignment strategy allowing SUs to share the spectrum without interfering with each other. We derive the optimal power allocation for each selected SU after applying perfect or imperfect successive interference cancellation. Numerical results show that the proposed scheme provides a significant sum-rate improvement as the number of SUs increases. In addition, it achieves almost the same performance as an exhaustive search selection, mainly in low and high power ranges. © 1997-2012 IEEE.

  5. Achievable Rate of a Cognitive MIMO Multiple Access Channel With Multi-Secondary Users

    KAUST Repository

    Sboui, Lokman

    2015-03-01

    We study the secondary sum-rate of an underlay cognitive multiple access channel consisting of a primary user and multiple secondary users (SUs) communicating with a common destination. We propose a particular linear precoding and SU selection scheme that maximize the cognitive sum-rate. This scheme is based on space alignment strategy allowing SUs to share the spectrum without interfering with each other. We derive the optimal power allocation for each selected SU after applying perfect or imperfect successive interference cancellation. Numerical results show that the proposed scheme provides a significant sum-rate improvement as the number of SUs increases. In addition, it achieves almost the same performance as an exhaustive search selection, mainly in low and high power ranges. © 1997-2012 IEEE.

  6. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Zhou Yajian; Li Jiandong; Liu Kai

    2002-01-01

    A novel Multiple Access Control (MAC) protocol - User-dependent Perfect-scheduling Multiple Access (UPMA) protocol, which supports joint transmission of voice and data packets,is proposed. By this protocol, the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals (MTs)can be perfectly scheduled by means of polling. Meanwhile, a unique frame structure is designed to guarantee Quality of Service (QoS) in voice traffic supporting. An effective collision resolution algorithm is also proposed to guarantee rapid channel access for activated MTs. Finally, performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  7. End User Evaluations

    Science.gov (United States)

    Jay, Caroline; Lunn, Darren; Michailidou, Eleni

    As new technologies emerge, and Web sites become increasingly sophisticated, ensuring they remain accessible to disabled and small-screen users is a major challenge. While guidelines and automated evaluation tools are useful for informing some aspects of Web site design, numerous studies have demonstrated that they provide no guarantee that the site is genuinely accessible. The only reliable way to evaluate the accessibility of a site is to study the intended users interacting with it. This chapter outlines the processes that can be used throughout the design life cycle to ensure Web accessibility, describing their strengths and weaknesses, and discussing the practical and ethical considerations that they entail. The chapter also considers an important emerging trend in user evaluations: combining data from studies of “standard” Web use with data describing existing accessibility issues, to drive accessibility solutions forward.

  8. Online Public Access Catalog User Studies: A Review of Research Methodologies, March 1986-November 1989.

    Science.gov (United States)

    Seymour, Sharon

    1991-01-01

    Review of research methodologies used in studies of online public access catalog (OPAC) users finds that a variety of research methodologies--e.g., surveys, transaction log analysis, interviews--have been used with varying degrees of expertise. It is concluded that poor research methodology resulting from limited training and resources limits the…

  9. 76 FR 72619 - User Fee To Take the Registered Tax Return Preparer Competency Examination

    Science.gov (United States)

    2011-11-25

    ..., 2011)), provide that only attorneys, certified public accountants, enrolled agents, and registered tax... Fee To Take the Registered Tax Return Preparer Competency Examination AGENCY: Internal Revenue Service... regulations. The final regulations redesignate rules pertaining to fees for obtaining a preparer tax...

  10. An Accessible User Interface for Geoscience and Programming

    Science.gov (United States)

    Sevre, E. O.; Lee, S.

    2012-12-01

    The goal of this research is to develop an interface that will simplify user interaction with software for scientists. The motivating factor of the research is to develop tools that assist scientists with limited motor skills with the efficient generation and use of software tools. Reliance on computers and programming is increasing in the world of geology, and it is increasingly important for geologists and geophysicists to have the computational resources to use advanced software and edit programs for their research. I have developed a prototype of a program to help geophysicists write programs using a simple interface that requires only simple single-mouse-clicks to input code. It is my goal to minimize the amount of typing necessary to create simple programs and scripts to increase accessibility for people with disabilities limiting fine motor skills. This interface can be adapted for various programming and scripting languages. Using this interface will simplify development of code for C/C++, Java, and GMT, and can be expanded to support any other text based programming language. The interface is designed around the concept of maximizing the amount of code that can be written using a minimum number of clicks and typing. The screen is split into two sections: a list of click-commands is on the left hand side, and a text area is on the right hand side. When the user clicks on a command on the left hand side the applicable code is automatically inserted at the insertion point in the text area. Currently in the C/C++ interface, there are commands for common code segments that are often used, such as for loops, comments, print statements, and structured code creation. The primary goal is to provide an interface that will work across many devices for developing code. A simple prototype has been developed for the iPad. Due to the limited number of devices that an iOS application can be used with, the code has been re-written in Java to run on a wider range of devices

  11. Perceived efficacy of herbal remedies by users accessing primary healthcare in Trinidad

    Directory of Open Access Journals (Sweden)

    Gomes Natalie

    2007-02-01

    Full Text Available Abstract Background The increasing global popularity of herbal remedies requires further investigation to determine the probable factors driving this burgeoning phenomenon. We propose that the users' perception of efficacy is an important factor and assessed the perceived efficacy of herbal remedies by users accessing primary health facilities throughout Trinidad. Additionally, we determined how these users rated herbal remedies compared to conventional allopathic medicines as being less, equally or more efficacious. Methods A descriptive cross-sectional study was undertaken at 16 randomly selected primary healthcare facilities throughout Trinidad during June-August 2005. A de novo, pilot-tested questionnaire was interviewer-administered to confirmed herbal users (previous or current. Stepwise multiple regression analysis was done to determine the influence of predictor variables on perceived efficacy and comparative efficacy with conventional medicines. Results 265 herbal users entered the study and cited over 100 herbs for the promotion of health/wellness and the management of specific health concerns. Garlic was the most popular herb (in 48.3% of the sample and was used for the common cold, cough, fever, as 'blood cleansers' and carminatives. It was also used in 20% of hypertension patients. 230 users (86.8% indicated that herbs were efficacious and perceived that they had equal or greater efficacy than conventional allopathic medicines. Gender, ethnicity, income and years of formal education did not influence patients' perception of herb efficacy; however, age did (p = 0.036. Concomitant use of herbs and allopathic medicines was relatively high at 30%; and most users did not inform their attending physician. Conclusion Most users perceived that herbs were efficacious, and in some instances, more efficacious than conventional medicines. We suggest that this perception may be a major contributing factor influencing the sustained and increasing

  12. Access Denied! Contrasting Data Access in the United States and Ireland

    Directory of Open Access Journals (Sweden)

    Grogan Samuel

    2016-07-01

    Full Text Available The ability of an Internet user to access data collected about himself as a result of his online activity is a key privacy safeguard. Online, data access has been overshadowed by other protections such as notice and choice. This paper describes attitudes about data access. 873 US and Irish Internet users participated in a survey designed to examine views on data access to information held by online companies and data brokers. We observed low levels of awareness of access mechanisms along with a high desire for access in both participant groups. We tested three proposed access systems in keeping with industry programs and regulatory proposals. User response was positive. We conclude that access remains an important privacy protection that is inadequately manifested in practice. Our study provides insight for lawmakers and policymakers, as well as computer scientists who implement these systems.

  13. Meth mouth severity in response to drug-use patterns and dental access in methamphetamine users.

    Science.gov (United States)

    Brown, Ronni E; Morisky, Donald E; Silverstein, Steven J

    2013-06-01

    Meth mouth is the rapid development of tooth decay in methamphetamine users. Our study questioned whether drug-use patterns and dental care access are risk factors affecting the severity of meth mouth. Participants received dental examinations, and the number of decayed, missing and filled teeth (DMFT) were counted and used to measure meth mouth severity.

  14. The TJ-II Relational Database Access Library: A User's Guide

    International Nuclear Information System (INIS)

    Sanchez, E.; Portas, A. B.; Vega, J.

    2003-01-01

    A relational database has been developed to store data representing physical values from TJ-II discharges. This new database complements the existing TJ-EI raw data database. This database resides in a host computer running Windows 2000 Server operating system and it is managed by SQL Server. A function library has been developed that permits remote access to these data from user programs running in computers connected to TJ-II local area networks via remote procedure cali. In this document a general description of the database and its organization are provided. Also given are a detailed description of the functions included in the library and examples of how to use these functions in computer programs written in the FORTRAN and C languages. (Author) 8 refs

  15. Key Based Mutual Authentication (KBMA Mechanism for Secured Access in MobiCloud Environment

    Directory of Open Access Journals (Sweden)

    Donald A. Cecil

    2016-01-01

    Full Text Available Mobile Cloud Computing (MCC fuels innovation in Mobile Computing and opens new pathways between mobile devices and infrastructures. There are several issues in MCC environment as it integrates various technologies. Among all issues, security lies on the top where many users are not willing to adopt the cloud services. This paper focuses on the authentication. The objective of this paper is to provide a mechanism for authenticating all the entities involved in accessing the cloud services. A mechanism called Key Based Mutual Authentication (KBMA is proposed which is divided into two processes namely registration and authentication. Registration is a one-time process where the users are registered for accessing the cloud services by giving the desired unique information. Authentication process is carried out mutually to verify the identities of Device and Cloud Service Provider (CSP. Scyther tool is used for analysing the vulnerability in terms of attacks. The result claims show that the proposed mechanism is resilient against various attacks.

  16. A University Web Portal redesign applying accessibility patterns. Breaking Down Barriers for Visually Impaired Users

    Directory of Open Access Journals (Sweden)

    Hernán Sosa

    2015-08-01

    Full Text Available Definitely, the WWW and ICTs have become the preferred media for the interaction between society and its citizens, and public and private organizations have today the possibility of deploying their activities through the Web. In particular, university education is a domain where the benefits of these technological resources can strongly contribute in caring for students. However, most university Web portals are inaccessible to their user community (students, professors, and non-teaching staff, between others, since these portals do not take into account the needs of people with different capabilities. In this work, we propose an accessibility pattern driven process to the redesign of university Web portals, aiming to break down barriers for visually impaired users. The approach is implemented to a real case study: the Web portal of Universidad Nacional de la Patagonia Austral (UNPA. The results come from applying accessibility recommendations and evaluation tools (automatic and manual from internationally recognized organizations, to both versions of the Web portal: the original and the redesign one.

  17. Using Open and Interoperable Ways to Publish and Access LANCE AIRS Near-Real Time Data

    Science.gov (United States)

    Zhao, Peisheng; Lynnes, Christopher; Vollmer, Bruce; Savtchenko, Andrey; Theobald, Michael; Yang, Wenli

    2011-01-01

    The Atmospheric Infrared Sounder (AIRS) Near-Real Time (NRT) data from the Land Atmosphere Near real-time Capability for EOS (LANCE) element at the Goddard Earth Sciences Data and Information Services Center (GES DISC) provides information on the global and regional atmospheric state, with very low temporal latency, to support climate research and improve weather forecasting. An open and interoperable platform is useful to facilitate access to, and integration of, LANCE AIRS NRT data. As Web services technology has matured in recent years, a new scalable Service-Oriented Architecture (SOA) is emerging as the basic platform for distributed computing and large networks of interoperable applications. Following the provide-register-discover-consume SOA paradigm, this presentation discusses how to use open-source geospatial software components to build Web services for publishing and accessing AIRS NRT data, explore the metadata relevant to registering and discovering data and services in the catalogue systems, and implement a Web portal to facilitate users' consumption of the data and services.

  18. Secure access to patient's health records using SpeechXRays a mutli-channel biometrics platform for user authentication.

    Science.gov (United States)

    Spanakis, Emmanouil G; Spanakis, Marios; Karantanas, Apostolos; Marias, Kostas

    2016-08-01

    The most commonly used method for user authentication in ICT services or systems is the application of identification tools such as passwords or personal identification numbers (PINs). The rapid development in ICT technology regarding smart devices (laptops, tablets and smartphones) has allowed also the advance of hardware components that capture several biometric traits such as fingerprints and voice. These components are aiming among others to overcome weaknesses and flaws of password usage under the prism of improved user authentication with higher level of security, privacy and usability. To this respect, the potential application of biometrics for secure user authentication regarding access in systems with sensitive data (i.e. patient's data from electronic health records) shows great potentials. SpeechXRays aims to provide a user recognition platform based on biometrics of voice acoustics analysis and audio-visual identity verification. Among others, the platform aims to be applied as an authentication tool for medical personnel in order to gain specific access to patient's electronic health records. In this work a short description of SpeechXrays implementation tool regarding eHealth is provided and analyzed. This study explores security and privacy issues, and offers a comprehensive overview of biometrics technology applications in addressing the e-Health security challenges. We present and describe the necessary requirement for an eHealth platform concerning biometric security.

  19. MLF user program

    International Nuclear Information System (INIS)

    Kamiyama, Takashi; Ikeda, Yujiro

    2008-01-01

    The user program of J-PARC/MLF is overviewed. Since MLF will be one of the major neutron facilities in the world, an international standard system for the user program is expected. It is also expected to establish a system to promote users from industries. The MLF user program is based on the IUPAP recommendation on the selection of proposals. Both open and closed accesses, biannual, regular, rapid accesses, etc. will be provided. All the features in the system are being introduced to maximize both scientific and engineering outputs from MLF. (author)

  20. The microsphere, the user and the architecture

    DEFF Research Database (Denmark)

    Suenson, Valinka; Harder, Henrik

    This paper presents a case study of the use of new RFID technology to register different movement patterns. The RFID technology was tested for the first time in a contemporary library in Denmark placed in Hjørring in November 2009. The RFID registration shows the library as a place of polyphony...... of individual routes. The question asked in this paper is how the RFID registrations can show the multi functionality of a public space. Furthermore, how can architecture be seen as an active part in attracting valuable users? The use of RFID technology to register indoor movement patterns is a new....... The RFID devices were carried by 252 users over four days and registered where and for how long they stayed in different places. The RFID tracking covered the movement patterns of both categories of users – borrowers and nonborrowers alike. According to Sloterdijk every social interaction takes place...

  1. CaWingz user's guide

    International Nuclear Information System (INIS)

    Cha, Ben-chin.

    1994-01-01

    This document assumes that you have read and understood the Wingz user's manuals. CaWingz is an external Wingz program which, when combined with a set of script files, provides easy-to-use EPICS channel access interface functions for Wingz users. The external function run allows Wingz user to invoke any Unix processor within caWingz. Few additional functions for accessing static database field and monitoring of value change event is available for EPICS users after release 3.11. The functions, script files, and usage are briefly described in this document. The script files supplied here serve as examples only. Users are responsible for generating their own spreadsheet and script files. CaWingz communicates with IOC through channel access function calls

  2. Individuals appreciate having their medication record on the web: a survey of attitudes to a national pharmacy register.

    Science.gov (United States)

    Montelius, Emelie; Astrand, Bengt; Hovstadius, Bo; Petersson, Göran

    2008-11-11

    Many patients receive health care in different settings. Thus, a limitation of clinical care may be inaccurate medication lists, since data exchange between settings is often lacking and patients do not regularly self-report on changes in their medication. Health care professionals and patients are both interested in utilizing electronic health information. However, opinion is divided as to who should take responsibility for maintaining personal health records. In Sweden, the government has passed a law to enforce and fund a national register of dispensed medications. The register comprises all individuals with dispensed medications (6.4 million individuals, September 2006) and can be accessed by the individual online via "My dispensed medications". The individual has the right to restrict the accessibility of the information in health care settings. The aim of the present study was to evaluate the users' attitudes towards their access to "My dispensed medications" as part of a new interactive Internet service on prescribed medications. A password-protected Web survey was conducted among a first group of users of "My dispensed medications". Data was anonymously collected and analyzed with regard to the usefulness and design of the Web site, the respondents' willingness to discuss their "My dispensed medications" with others, their reasons for access, and their source of information about the service. During the study period (January-March, 2007), all 7860 unique site visitors were invited to answer the survey. Invitations were accepted by 2663 individuals, and 1716 responded to the online survey yielding a view rate of 21.8% (1716/7860) and a completion rate of 64.4% (1716/2663). The completeness rate for each question was in the range of 94.9% (1629/1716) to 99.5% (1707/1716). In general, the respondents' expectations of the usefulness of "My dispensed medications" were high (total median grade 5; Inter Quartile Range [IQR] 3, on a scale 1-6). They were also

  3. User-generated online health content: a survey of Internet users in the United Kingdom.

    Science.gov (United States)

    O'Neill, Braden; Ziebland, Sue; Valderas, Jose; Lupiáñez-Villanueva, Francisco

    2014-04-30

    The production of health information has begun to shift from commercial organizations to health care users themselves. People increasingly go online to share their own health and illness experiences and to access information others have posted, but this behavior has not been investigated at a population level in the United Kingdom. This study aims to explore access and production of user-generated health content among UK Internet users and to investigate relationships between frequency of use and other variables. We undertook an online survey of 1000 UK Internet users. Descriptive and multivariate statistical analyses were used to interpret the data. Nearly one-quarter of respondents (23.7%, 237/1000) reported accessing and sharing user-generated health content online, whereas more than 20% (22.2%, 222/1000) were unaware that it was possible to do this. Respondents could be divided into 3 groups based on frequency of use: rare users (78.7%, 612/778) who accessed and shared content less than weekly, users (13.9%, 108/778) who did so weekly, and superusers (7.5%, 58/778) who did so on a daily basis. Superusers were more likely to be male (Puser-generated online health content, only a minority of respondents reported doing so frequently. As this type of content proliferates, superusers are likely to shape the health information that others access. Further research should assess the effect of user-generated online content on health outcomes and use of health services by Internet users.

  4. Comparison of transportation related injury mechanisms and outcome of young road users and adult road users, a retrospective analysis on 24,373 patients derived from the TraumaRegister DGU®.

    Science.gov (United States)

    Brockamp, Thomas; Schmucker, Uli; Lefering, Rolf; Mutschler, Manuel; Driessen, Arne; Probst, Christian; Bouillon, Bertil; Koenen, Paola

    2017-06-14

    Most young people killed in road crashes are known as vulnerable road users. A combination of physical and developmental immaturity as well as inexperience increases the risk of road traffic accidents with a high injury severity rate. Understanding injury mechanism and pattern in a group of young road users may reduce morbidity and mortality. This study analyzes injury patterns and outcomes of young road users compared to adult road users. The comparison takes into account different transportation related injury mechanisms. A retrospective analysis using data collected between 2002 and 2012 from the TraumaRegister DGU® was performed. Only patients with a transportation related injury mechanism (motor vehicle collision (MVC), motorbike, cyclist, and pedestrian) and an ISS ≥ 9 were included in our analysis. Four different groups of young road users were compared to adult trauma data depending on the transportation related injury mechanism. Twenty four thousand three hundred seventy three, datasets were retrieved to compare all subgroups. The mean ISS was 23.3 ± 13.1. The overall mortality rate was 8.61%. In the MVC, the motorbike and the cyclist group, we found young road users having more complex injury patterns with a higher AIS pelvis, AIS head, AIS abdomen and AIS of the extremities and also a lower GCS. Whereas in these three sub-groups the adult trauma group only had a higher AIS thorax. Only in the group of the adult pedestrians we found a higher AIS pelvis, AIS abdomen, AIS thorax, a higher AIS of the extremities and a lower GCS. This study reports on the most common injuries and injury patterns in young trauma patients in comparison to an adult trauma sample. Our analysis show that in contrast to more experienced road users our young collective refers to be a vulnerable trauma group with an increased risk of a high injury severity and high mortality rate. We indicate a striking difference in terms of the region of injury and the mechanism of

  5. User-Based Information Retrieval System Interface Evaluation: An Examination of an On-Line Public Access Catalog.

    Science.gov (United States)

    Hert, Carol A.; Nilan, Michael S.

    1991-01-01

    Presents preliminary data that characterizes the relationship between what users say they are trying to accomplish when using an online public access catalog (OPAC) and their perceptions of what input to give the system. Human-machine interaction is discussed, and appropriate methods for evaluating information retrieval systems are considered. (18…

  6. Proof-of-Concept System for Opportunistic Spectrum Access in Multi-user Decentralized Networks

    Directory of Open Access Journals (Sweden)

    Sumit J. Darak

    2016-09-01

    Full Text Available Poor utilization of an electromagnetic spectrum and ever increasing demand for spectrum have led to surge of interests in opportunistic spectrum access (OSA based paradigms like cognitive radio and unlicensed LTE. In OSA for decentralized networks, frequency band selection from wideband spectrum is a challenging task since secondary users (SUs do not share any information with each other. In this paper, a new decision making policy (DMP has been proposed for OSA in the multi-user decentralized networks. First contribution is an accurate characterization of frequency bands using Bayes-UCB algorithm. Then, a novel SU orthogonization scheme using Bayes-UCB algorithm is proposed replacing randomization based scheme. At the end, USRP testbed has been developed for analyzing the performance of DMPs using real radio signals. Experimental results show that the proposed DMP offers significant improvement in spectrum utilization, fewer subband switching and collisions compared to other DMPs.

  7. Characterization and Optimization of LDPC Codes for the 2-User Gaussian Multiple Access Channel

    Directory of Open Access Journals (Sweden)

    Declercq David

    2007-01-01

    Full Text Available We address the problem of designing good LDPC codes for the Gaussian multiple access channel (MAC. The framework we choose is to design multiuser LDPC codes with joint belief propagation decoding on the joint graph of the 2-user case. Our main result compared to existing work is to express analytically EXIT functions of the multiuser decoder with two different approximations of the density evolution. This allows us to propose a very simple linear programming optimization for the complicated problem of LDPC code design with joint multiuser decoding. The stability condition for our case is derived and used in the optimization constraints. The codes that we obtain for the 2-user case are quite good for various rates, especially if we consider the very simple optimization procedure.

  8. ARCAS (ACACIA Regional Climate-data Access System) -- a Web Access System for Climate Model Data Access, Visualization and Comparison

    Science.gov (United States)

    Hakkarinen, C.; Brown, D.; Callahan, J.; hankin, S.; de Koningh, M.; Middleton-Link, D.; Wigley, T.

    2001-05-01

    A Web-based access system to climate model output data sets for intercomparison and analysis has been produced, using the NOAA-PMEL developed Live Access Server software as host server and Ferret as the data serving and visualization engine. Called ARCAS ("ACACIA Regional Climate-data Access System"), and publicly accessible at http://dataserver.ucar.edu/arcas, the site currently serves climate model outputs from runs of the NCAR Climate System Model for the 21st century, for Business as Usual and Stabilization of Greenhouse Gas Emission scenarios. Users can select, download, and graphically display single variables or comparisons of two variables from either or both of the CSM model runs, averaged for monthly, seasonal, or annual time resolutions. The time length of the averaging period, and the geographical domain for download and display, are fully selectable by the user. A variety of arithmetic operations on the data variables can be computed "on-the-fly", as defined by the user. Expansions of the user-selectable options for defining analysis options, and for accessing other DOD-compatible ("Distributed Ocean Data System-compatible") data sets, residing at locations other than the NCAR hardware server on which ARCAS operates, are planned for this year. These expansions are designed to allow users quick and easy-to-operate web-based access to the largest possible selection of climate model output data sets available throughout the world.

  9. LNS users primer for accessing government sites on the ARPA network. [MIT. -->. ANL, BNL, LBL, and New York Univ. Courant Inst

    Energy Technology Data Exchange (ETDEWEB)

    Kannel, M.

    1979-06-01

    This primer was developed as part of the study conducted by the Laboratory for Nuclear Science (LNS) on the feasibility of networks for computer resource sharing. The primer is an instructinal guide for the LNS user who would like to access and use computers at other government sites on the ARPA network. The format is a series of scenarios of actual recorded on-line terminal sessions' showing the novice user how to access the foreign site, obtain help documentation, run a simple program, and transfer files to and from the foreign site. Access to the ARPA network in these scenarios is via Multics or the Massachusetts Institute of Technology Terminal Interface Processor. The foreign government sites accessed are the computing facilities at Argonne National Laboratory, Brookhaven National Laboratory, Lawrence Livermore Laboratory, and New York University Courant Institute. This technique of auditing actual terminal sessions as a teaching aid can be extended to include other computing facilities as well as other networks.

  10. Registering Names and Addresses for Information Technology.

    Science.gov (United States)

    Knapp, Arthur A.

    The identification of administrative authorities and the development of associated procedures for registering and accessing names and addresses of communications data systems are considered in this paper. It is noted that, for data communications systems using standards based on the Open Systems Interconnection (OSI) Reference Model specified by…

  11. Extended spectrum SWIR camera with user-accessible Dewar

    Science.gov (United States)

    Benapfl, Brendan; Miller, John Lester; Vemuri, Hari; Grein, Christoph; Sivananthan, Siva

    2017-02-01

    Episensors has developed a series of extended short wavelength infrared (eSWIR) cameras based on high-Cd concentration Hg1-xCdxTe absorbers. The cameras have a bandpass extending to 3 microns cutoff wavelength, opening new applications relative to traditional InGaAs-based cameras. Applications and uses are discussed and examples given. A liquid nitrogen pour-filled version was initially developed. This was followed by a compact Stirling-cooled version with detectors operating at 200 K. Each camera has unique sensitivity and performance characteristics. The cameras' size, weight and power specifications are presented along with images captured with band pass filters and eSWIR sources to demonstrate spectral response beyond 1.7 microns. The soft seal Dewars of the cameras are designed for accessibility, and can be opened and modified in a standard laboratory environment. This modular approach allows user flexibility for swapping internal components such as cold filters and cold stops. The core electronics of the Stirlingcooled camera are based on a single commercial field programmable gate array (FPGA) that also performs on-board non-uniformity corrections, bad pixel replacement, and directly drives any standard HDMI display.

  12. Thus Spake the OPAC User.

    Science.gov (United States)

    Markey, Karen

    1983-01-01

    Findings of focused-group interviews conducted for OCLC study of library users and online public access catalogs (OPACs) indicate users like OPACs, have problems finding right subject heading, envision features to improve subject access, want access to more than books, and want OPACs to provide new services. Eight references are listed. (EJS)

  13. Louisiana coastal GIS network: Graphical user interface for access to spatial data

    Science.gov (United States)

    Hiland, Matteson; McBride, Randolph A.; Davis, Donald; Braud, Dewitt; Streiffer, Henry; Jones, Farrell; Lewis, Anthony; Williams, S.

    1991-01-01

    Louisiana's coastal wetlands support a large percentage of the nation's seafood and fur industries, vast deposits of oil and natural gas, habitat for thousands of species of plants and animals, winter nesting grounds and migratory paths for numerous waterfowl, and many recreational resources enjoyed by residents and tourists. Louisiana's wetlands also have the highest rates of coastal erosion and wetland loss in the nation. While numerous studies across many disciplines have been conducted on both local and regional scales, no complete inventory exists for this information. The Louisiana Coastal Geographic Information System Network (LCGISN) is currently being developed to facilitate access to existing data for coastal zone planners, managers, and researchers. The Louisiana Geological Survey (LGS), in cooperation with the LSU Department of Geography and Anthropology, the Computer Aided Design and Geographic Information Systems Research Laboratory (CADGIS), and others, is pursuing this project under the terms of a cooperative agreement with the U.S. Geological Survey. LCGISN is an automated system for searching and retrieving geographic, cartographic, and bibliographic data. By linking original programming with an existing GIS software package and an industry standard relational database management system, LCGISN will provide the capability for users to search for data references by interactively defining the area of interest on a displayed map/image reference background. Several agencies will be networked to provide easy access to a wide variety of information. LCGISN, with its headquarters at LGS, will serve as the central node on the network, providing data format conversions, projection and datum transformations, and storage of several of the most commonly used data sets. Thematic mapper data, USGS 7.5-minute quadrangle map boundaries, political and legal boundaries, major transportation routes, and other digital data will provide a base map to aid the user in

  14. Acceptability and perceived barriers and facilitators to creating a national research register to enable 'direct to patient' enrolment into research: the Scottish Health Research Register (SHARE).

    Science.gov (United States)

    Grant, Aileen; Ure, Jenny; Nicolson, Donald J; Hanley, Janet; Sheikh, Aziz; McKinstry, Brian; Sullivan, Frank

    2013-10-18

    Difficulties with recruitment pose a major, increasingly recognised challenge to the viability of research. We sought to explore whether a register of volunteers interested in research participation, with data linkage to electronic health records to identify suitable research participants, would prove acceptable to healthcare staff, patients and researchers. We undertook a qualitative study in which a maximum variation sampling approach was adopted. Focus groups and interviews were conducted with patients, general practitioners (GP), practice managers and health service researchers in two Scottish health boards. Analysis was primarily thematic to identify a range of issues and concerns for all stakeholder groups. The concept of a national research register was, in general, acceptable to all stakeholder groups and was widely regarded as beneficial for research and for society. Patients, however, highlighted a number of conditions which should be met in the design of a register to expedite confidence and facilitate recruitment. They also gave their perceptions on how a register should operate and be promoted, favouring a range of media. GPs and practice managers were primarily concerned with the security and confidentiality of patient data and the impact a register may have on their workload. Researchers were supportive of the initiative seeing advantages in more rapid access to a wider pool of patients. They did raise concerns that GPs may be able to block access to personal patient data held in general practice clinical systems and that the register may not be representative of the whole population. This work suggests that patients, healthcare staff and researchers have a favourable view of the potential benefits of a national register to identify people who are potentially eligible and willing to participate in health related research. It has highlighted a number of issues for the developers to incorporate in the design of research registers.

  15. Virtual Mission Operations Center -Explicit Access to Small Satellites by a Net Enabled User Base

    Science.gov (United States)

    Miller, E.; Medina, O.; Paulsen, P.; Hopkins, J.; Long, C.; Holloman, K.

    2008-08-01

    The Office of Naval Research (ON R), The Office of the Secr etary of Defense (OSD) , Th e Operationally Responsive Space Off ice (ORS) , and th e National Aeronautics and Space Administration (NASA) are funding the development and integration of key technologies and new processes that w ill allow users across th e bread th of operations the ab ility to access, task , retr ieve, and collaborate w ith data from various sensors including small satellites v ia the Intern et and the SIPRnet. The V irtual Mission Oper ations Center (VMO C) facilitates the dynamic apportionmen t of space assets, allows scalable mission man agement of mu ltiple types of sensors, and provid es access for non-space savvy users through an intu itive collaborative w eb site. These key technologies are b eing used as experimentation pathfinders fo r th e Do D's Operationally Responsiv e Sp ace (O RS) initiative and NASA's Sensor W eb. The O RS initiative seeks to provide space assets that can b e rapid ly tailored to meet a commander's in telligen ce or commun ication needs. For the DoD and NASA the V MO C provid es ready and scalab le access to space b ased assets. To the commercial space sector the V MO C may provide an analog to the innovativ e fractional ownersh ip approach represen ted by FlexJet. This pap er delves in to the technology, in tegration, and applicability of th e V MO C to th e DoD , NASA , and co mmer cial sectors.

  16. Community Impact of Pharmacy-Randomized Intervention to Improve Access to Syringes and Services for Injection Drug Users

    Science.gov (United States)

    Crawford, Natalie D.; Amesty, Silvia; Rivera, Alexis V.; Harripersaud, Katherine; Turner, Alezandria; Fuller, Crystal M.

    2014-01-01

    Objectives: In an effort to reduce HIV transmission among injection drug users (IDUs), New York State deregulated pharmacy syringe sales in 2001 through the Expanded Syringe Access Program by removing the requirement of a prescription. With evidence suggesting pharmacists' ability to expand their public health role, a structural, pharmacy-based…

  17. Reflections on Distributive Leadership for Work-Based Mobile Learning of Canadian Registered Nurses

    Science.gov (United States)

    Fahlman, Dorothy

    2017-01-01

    The ubiquity, flexibility, and accessibility of mobile devices can transform how registered nurses in Canada learn beyond the confines of traditional education/training boundaries in their work settings. Many Canadian registered nurses have actively embraced mobile technologies for their work-based learning to meet their competency requirements…

  18. European Interoperability Assets Register and Quality Framework Implementation.

    Science.gov (United States)

    Moreno-Conde, Alberto; Thienpont, Geert; Lamote, Inge; Coorevits, Pascal; Parra, Carlos; Kalra, Dipak

    2016-01-01

    Interoperability assets is the term applied to refer to any resource that can support the design, implementation and successful adoption of eHealth services that can exchange data meaningfully. Some examples may include functional requirements, specifications, standards, clinical models and term lists, guidance on how standards may be used concurrently, implementation guides, educational resources, and other resources. Unfortunately, these are largely accessible in ad hoc ways and result in scattered fragments of a solution space that urgently need to be brought together. At present, it is well known that new initiatives and projects will reinvent assets of which they were unaware, while those assets which were potentially of great value are forgotten, not maintained and eventually fall into disuse. This research has defined a quality in use model and assessed the suitability of this quality framework based on the feedback and opinion of a representative sample of potential end users. This quality framework covers the following domains of asset development and adoption: (i) Development process, (ii) Maturity level, (iii) Trustworthiness, (iv) Support & skills, (v) Sustainability, (vi) Semantic interoperability, (vii) Cost & effort of adoption (viii) Maintenance. When participants were requested to evaluate how the overall quality in use framework, 70% would recommend using the register to their colleagues, 70% felt that it could provide relevant benefits for discovering new assets, and 50% responded that it would support their decision making about the recommended asset to adopt or implement in their organisation. Several European projects have expressed interest in using the register, which will now be sustained and promoted by the the European Institute for Innovation through Health Data.

  19. User internface for rail traffic control system

    OpenAIRE

    Križaj, Blaž

    2013-01-01

    The thesis represents a solution to the problem of remote access to a server application, its management, and graphical user interface (GUI) build above console application. The TRIS Server operates in the UNIX environment without a graphical user interface as a service. Access to the application, archive files and management without graphical user interface is user unfriendly, as it requires knowledge of UNIX environment and Bash scripting language. Remote access via the internet represen...

  20. The Danish registers of causes of death

    DEFF Research Database (Denmark)

    Juel, K; Helweg-Larsen, K

    1999-01-01

    In 1875 registration of causes of death in Denmark was established by the National Board of Health, and annual statistics of death have since been published. Until 1970 the national statistics were based upon punched cards with data collected from the death certificates. Since then the register has...... been fully computerized and includes individual based data of all deaths occurring among all residents in Denmark dying in Denmark. Furthermore, a microfilm of all death certificates from 1943 and onward is kept in the National Board of Health. The Danish Institute for Clinical Epidemiology (DICE) has...... established a computerized register of individual records of deaths in Denmark from 1943 and onwards. No other country covers computerized individual based data of death registration for such a long period, now 54 years. This paper describes the history of the registers, the data sources and access to data...

  1. A descriptive study of registered nurses' experiences with web-based learning.

    Science.gov (United States)

    Atack, Lynda; Rankin, James

    2002-11-01

    To describe the experiences of registered nurses (RNs) who enrolled in a web-based course from either their home or the workplace. In order to maintain competency in rapidly changing health care systems, and meet the challenge of overcoming traditional barriers to continuing education, RNs need access to innovative educational delivery methods. As yet, little is known about the web-based learners' experience, particularly when courses are accessed from the nursing practice setting. The article focuses on the results from questionnaires conducted with 57 RNs enrolled in a web-based, postdiploma course. These findings emanate from a larger study using survey method and focus group interviews. Nurses' experiences were measured using the Online Learner Support Instrument which was developed and tested for use in the study. Most nurses found the course highly satisfactory. Not all experiences were positive however, and a number of challenges were faced. Access to the course from home was reported as very satisfactory for the majority, while work users encountered a number of serious barriers such as insufficient time and limited computer access. The RNs made significant gains in their learning with e-mail, Internet, keyboarding and word processing skills during the 16-week course. Lack of computer skills, erroneous perceptions of course workload and inadequate preparation for web learning were largely responsible for the majority of withdrawals. Web-based learning can be an effective mode of delivery for nursing education. Advance preparation by educational institutions, employers and prospective students is essential. Teachers, peers, technology, course design and the learning environment are key variables that influence the learners' experience and success.

  2. Black Open Access in Ukraine: Analysis of Downloading Sci-Hub Publications by Ukrainian Internet Users

    OpenAIRE

    Nazarovets, Serhii

    2018-01-01

    Introduction. High subscription fees to scholarly research journals provoke researchers to use illegal channels of access to scientific information. Analysis of statistical data on downloads of scholarly research papers by Ukrainian Internet users from illegal web resource can help to define gaps in information provision at the institutional or the state level for each scientific field. Problem Statement. To conduct an analysis of behavior and geography of downloads of scholarly research p...

  3. Learning and mastery behaviours as risk factors to abandonment in a paediatric user of advanced single-switch access technology.

    Science.gov (United States)

    Brian, Leung; Jessica A, Brian; Tom, Chau

    2013-09-01

    The present descriptive case study documents the behaviours of a child single-switch user in the community setting and draws attention to learning and mastery behaviours as risk factors to single-switch abandonment. Our observations were interpreted in the context of a longer term school-based evaluation of an advanced single-switch access technology with a nine year-old user with severe spastic quadriplegic cerebral palsy. The child completed 25 experiment sessions averaging a rate of three sessions every two weeks. During each session he worked on several blocks of single-switch computer activity using his vocal cord vibration switch. Despite high levels of single-switch sensitivity and specificity that suggested a good fit between the participant and the technology, the participant perceived a lower proficiency level of his own abilities, demonstrated impatience and intolerance to interaction errors, and was apprehensive of making mistakes when using his switch in public. The benefit of gaining some degree of independent physical access might not necessarily enhance resilience to interaction errors or bouts of poor task performance. On the other hand, the participant's behaviours were consistent with those of a typically developing child learning or mastering any new skill or task. Implications for Rehabilitation The attitude and behaviour of a paediatric switch user towards skill development can be risk factors to abandonment of an access technology, despite successful clinical trial with the device. Children with severe disabilities can be associated with the same types of skill development behaviour patterns and achievement motivation as their typically developing peers. Empirical observations of the case participant's switch use behaviours suggest that user training could be adaptive in order to account for individual differences in skill development and achievement motivation.

  4. Barriers to Access to Sterile Syringes as Perceived by Pharmacists and Injecting Drug Users: Implications for Harm Reduction in Lebanon.

    Science.gov (United States)

    Ghaddar, Ali; Nassar, Karine; Elsoury, Ghadier

    2017-09-19

    Access to sterile syringes to injecting drug users (IDU) reduces sharing behavior and prevents the transmission of HIV. To describe the barriers to access to sterile syringes for IDUs in Lebanon from the perspectives of pharmacists and IDUs. in this qualitative study conducted in Lebanon, data were collected from 72 syringe purchase tests at pharmacies, 64 interviewees with pharmacists and 2 focus groups with injecting drug users. Two independent researchers analyzed the verbatim transcripts. Results revealed that pharmacists often deny access to sterile syringes to IDUs who are frequently stigmatized and intimidated at pharmacies. While no large gender differences in pharmacists' attitudes and practices were observed, inequalities in syringe access were noticed with men IDUs more often denied purchase. Pharmacists had several barriers to sell syringes to IDUs including fear of disease spread, increased drug use, inappropriately discarded syringes, staff and customer safety, and business concerns. IDUs had several challenges to purchase syringes including stigmatization, intimidation, physical harassment, concern to reveal identity, fear of arrest and syringe price abuse. Identifying the barriers to and facilitators of access to sterile syringes to IDUs is important to guide the development of efficient policies. Findings implicate the importance of empowering IDUs to purchase syringes at pharmacies through reducing the negative attitude towards IDUs and strengthening pharmacists' role in the promotion of health of IDUs. Findings also suggest that the habit of syringe sharing would decrease if the legal and cultural barriers to access are reduced.

  5. Assessment of Bonelike (registered) graft with a resorbable matrix using an animal model

    International Nuclear Information System (INIS)

    Lobato, J.V.; Hussain, N. Sooraj; Botelho, C.M.; Mauricio, A.C.; Afonso, A.; Ali, N.; Santos, J.D.

    2006-01-01

    Synthetic bone grafts have been developed to provide an alternative to autografts and allografts. Bonelike (registered) is a patented synthetic osteoconductive bone graft that mimics the mineral composition of natural bone. In the present preliminary animal studies a user-friendly version of synthetic bone graft Bonelike (registered) have been developed by using a resorbable matrix, Floseal (registered) , as a vehicle and raloxifene hydrochloride as a therapeutic molecule, that is known to decrease osteoclast activity and therefore enhanced bone formation. From histological and scanning electron microscopy evaluations, the use of Bonelike (registered) associated with Floseal (registered) and raloxifene hydrochloride showed that new bone was rapidly apposed on implanted granules and also that the presence of the matrix and therapeutic molecule does not alter the proven highly osteoconductivity properties of Bonelike (registered) . Therefore, this association may be one step-forward for the clinical applications of Bonelike (registered) scaffolds since it is much more easy-to-handle when compared to granular materials

  6. Personal lifelong user model clouds

    DEFF Research Database (Denmark)

    Dolog, Peter; Kay, Judy; Kummerfeld, Bob

    This paper explores an architecture for very long term user modelling, based upon personal user model clouds. These ensure that the individual's applications can access their model whenever it is needed. At the same time, the user can control the use of their user model. So, they can ensure...... which combines both. Finally we discuss implications of our approach for consistency and freshness of the user model information....... it is accessed only when and where they wish, by applications that they wish. We consider the challenges of representing user models so that they can be reused by multiple applications. We indicate potential synergies between distributed and centralised user modelling architectures, proposing an architecture...

  7. Australian lobbyist registers are not serving the purposes they were designed for.

    Science.gov (United States)

    Robertson, Narelle; Kypri, Kypros; Stafford, Julia; Daube, Mike; Avery, Michelle; Miller, Peter

    2017-07-11

    There is widespread concern about the nature, extent and impacts of lobbying by industries selling unhealthy commodities, which threatens public health and undermines important democratic processes. In the last decade, all Australian jurisdictions (except the Northern Territory) have established lobbyist registers with the stated objective of increasing the capacity of government and the public to scrutinise lobbying. Our aim was to assess whether the registers are fulfilling this objective. We conducted web searches of registers in Australian jurisdictions in 2014 and 2015 to determine what type of information they collected and whether data were accessible. We supplemented searches with e-mails and phone calls to registrars to clarify policies and seek additional information. We found that the data were lacking in critical details and historical information was difficult or impossible to obtain. None of the registers required in-house lobbyists to register or to be bound by the Lobbying Codes of Conduct. None required that informal lobbying (e.g. by government relations staff within a company) be recorded, and none provided detailed information about the nature and extent of lobbying activities. The registers do not meet the stated objective of making lobbying activity transparent to the Australian public. Timely access to comprehensive information is essential to help promote the rational development of policy concerning tobacco, alcohol and gambling problems. There is an urgent need to reform lobbyist registers to ensure that they are comprehensive and transparent. [Robertson N, Kypri K, Stafford J, Daube M, Avery M, Miller P. Australian lobbyist registers are not serving the purposes they were designed for. Drug Alcohol Rev 2017;00:000-000]. © 2017 Australasian Professional Society on Alcohol and other Drugs.

  8. User Types in Online Applications

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2011-08-01

    Full Text Available Online applications are presented in the context of information society. Online applications characteristics are analyzed. Quality characteristics are presented in relation to online applications users. Types of users for AVIO application are presented. Use cases for AVIO application are identified. The limitations of AVIO application are defined. Types of users in online applications are identified. The threedimensional matrix of access to the online application resources is built. The user type-oriented database is structured. Access management of the fields related to the database tables is analyzed. The classification of online applications users is done.

  9. Recommending access control decisions to social media users

    OpenAIRE

    Misra, Gaurav; Such, Jose M.

    2017-01-01

    Social media has become an integral part of the Internet and has revolutionized interpersonal communication. The lines of separation between content creators and content consumers have blurred as normal users have platforms such as social media sites, blogs and microblogs at their disposal on which they can create and consume content as well as have the opportunity to interact with other users. This change has also led to several well documented privacy problems for the users. The privacy pro...

  10. Financial accessibility and user fee reforms for maternal healthcare in five sub-Saharan countries: a quasi-experimental analysis.

    Science.gov (United States)

    Leone, Tiziana; Cetorelli, Valeria; Neal, Sarah; Matthews, Zoë

    2016-01-28

    Evidence on whether removing fees benefits the poorest is patchy and weak. The aim of this paper is to measure the impact of user fee reforms on the probability of giving birth in an institution or undergoing a caesarean section (CS) in Ghana, Burkina Faso, Zambia, Cameroon and Nigeria for the poorest strata of the population. Women's experience of user fees in 5 African countries. Using quasi-experimental regression analysis we tested the impact of user fee reforms on facilities' births and CS differentiated by wealth, education and residence in Burkina Faso and Ghana. Mapping of the literature followed by key informant interviews are used to verify details of reform implementation and to confirm and support our countries' choice. We analysed data from consecutive surveys in 5 countries: 2 case countries that experienced reforms (Ghana and Burkina Faso) by contrast with 3 that did not experience reforms (Zambia, Cameroon, Nigeria). User fee reforms are associated with a significant percentage of the increase in access to facility births (27 percentage points) and to a much lesser extent to CS (0.7 percentage points). Poor (but not the poorest), and non-educated women, and those in rural areas benefitted the most from the reforms. User fees reforms have had a higher impact in Burkina Faso compared with Ghana. Findings show a clear positive impact on access when user fees are removed, but limited evidence for improved availability of CS for those most in need. More women from rural areas and from lower socioeconomic backgrounds give birth in health facilities after fee reform. Speed and quality of implementation might be the key reason behind the differences between the 2 case countries. This calls for more research into the impact of reforms on quality of care. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  11. Assessing mouse alternatives to access to computer: a case study of a user with cerebral palsy.

    Science.gov (United States)

    Pousada, Thais; Pareira, Javier; Groba, Betania; Nieto, Laura; Pazos, Alejandro

    2014-01-01

    The purpose of this study is to describe the process of assessment of three assistive devices to meet the needs of a woman with cerebral palsy (CP) in order to provide her with computer access and use. The user has quadriplegic CP, with anarthria, using a syllabic keyboard. Devices were evaluated through a three-step approach: (a) use of a questionnaire to preselect potential assistive technologies, (b) use of an eTAO tool to determine the effectiveness of each devised, and (c) a conducting semi-structured interview to obtain qualitative data. Touch screen, joystick, and trackball were the preselected devices. The best device that met the user's needs and priorities was joystick. The finding was corroborated by both the eTAO tool and the semi-structured interview. Computers are a basic form of social participation. It is important to consider the special needs and priorities of users and to try different devices when undertaking a device-selection process. Environmental and personal factors have to be considered, as well. This leads to a need to evaluate new tools in order to provide the appropriate support. The eTAO could be a suitable instrument for this purpose. Additional research is also needed to understand how to better match devices with different user populations and how to comprehensively evaluate emerging technologies relative to users with disabilities.

  12. Users' perception of library use malpractices: case study of ...

    African Journals Online (AJOL)

    This study investigated library users perception of library use malpractices in academic libraries; using University of Calabar as a case study. Simple random sampling technique was use to draw a sample of 500 users from a population of 1804 registered users of the library. Questionnaire was use for data collection.

  13. Fiscal 1998 achievement report on regional consortium research and development project. Venture business raising type regional consortium - Small business creation base type (Research and development of cooperative/distributed user authentication system conforming to HTTP); 1998 nendo HTTP purotokoru de jitsugensuru kyocho bunsan user ninsho system no kenkyu kaihatsu seika hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-03-01

    Since electronic commerce is rapidly expanding while an increasing number of corporations are in operation on digital networks, importance is also growing of systems for user identification and authentication. The aim is to develop a user authentication system, low in price and easy to introduce, which is needed by the Internet on which there is a growing world-wide market and by Intranets. A cooperative/distributed user authentication system has been developed, under which a user who has registered his passport with a server can access plural servers using one and the same password while enjoying high security. It is an HTTP (hypertext transfer protocol)-conforming application program under which user information distributed among plural servers works cooperatively to present a convenient, safe, fault-free user authentication system. A survey is conducted for its commercialization, and the magnitude of the market that requires this technology, the importance of this technology, etc., are clarified. (NEDO)

  14. Developing a useful, user-friendly website for cancer patient follow-up: users' perspectives on ease of access and usefulness.

    Science.gov (United States)

    Bartlett, Y K; Selby, D L; Newsham, A; Keding, A; Forman, D; Brown, J; Velikova, G; Wright, P

    2012-11-01

    UK cancer survival has improved, leading to an increase in review patients and pressure on clinics. Use of the Internet for information exchange between patients and healthcare staff may provide a useful adjunct or alternative to traditional follow-up. This study aimed to develop and evaluate a website for use in follow-up cancer care in terms of usability, feasibility and acceptability. A website was developed and underwent iterative amendment following patient usability testing in focus groups. Patients on follow-up completed a Computer and Internet Usage Questionnaire. Internet users consented to a randomised crossover study to complete paper and online questionnaires, browse the website and participate in a website evaluation interview. Patient website use was tracked. Usability: Website changes were made following patient testing (n= 21). Patients would have liked a 'personalized' website with links to their clinical team, out with the scope of this study. Feasibility: The majority of participants (65%) had Internet access. Age remained a differentiating factor. Acceptability: Final evaluation (n= 103) was positive although many would like to maintain face-to-face hospital contact. User involvement in website design can ensure patient needs are met. A website model for follow-up will suit some patients but others will prefer clinical contact. © 2012 Blackwell Publishing Ltd.

  15. Spatial Release From Masking in Simulated Cochlear Implant Users With and Without Access to Low-Frequency Acoustic Hearing

    Directory of Open Access Journals (Sweden)

    Ben Williges

    2015-12-01

    Full Text Available For normal-hearing listeners, speech intelligibility improves if speech and noise are spatially separated. While this spatial release from masking has already been quantified in normal-hearing listeners in many studies, it is less clear how spatial release from masking changes in cochlear implant listeners with and without access to low-frequency acoustic hearing. Spatial release from masking depends on differences in access to speech cues due to hearing status and hearing device. To investigate the influence of these factors on speech intelligibility, the present study measured speech reception thresholds in spatially separated speech and noise for 10 different listener types. A vocoder was used to simulate cochlear implant processing and low-frequency filtering was used to simulate residual low-frequency hearing. These forms of processing were combined to simulate cochlear implant listening, listening based on low-frequency residual hearing, and combinations thereof. Simulated cochlear implant users with additional low-frequency acoustic hearing showed better speech intelligibility in noise than simulated cochlear implant users without acoustic hearing and had access to more spatial speech cues (e.g., higher binaural squelch. Cochlear implant listener types showed higher spatial release from masking with bilateral access to low-frequency acoustic hearing than without. A binaural speech intelligibility model with normal binaural processing showed overall good agreement with measured speech reception thresholds, spatial release from masking, and spatial speech cues. This indicates that differences in speech cues available to listener types are sufficient to explain the changes of spatial release from masking across these simulated listener types.

  16. Overall satisfaction of health care users with the quality of and access to health care services: a cross-sectional study in six Central and Eastern European countries.

    Science.gov (United States)

    Stepurko, Tetiana; Pavlova, Milena; Groot, Wim

    2016-08-02

    The measurement of consumer satisfaction is an essential part of the assessment of health care services in terms of service quality and health care system responsiveness. Studies across Europe have described various strategies health care users employ to secure services with good quality and quick access. In Central and Eastern European countries, such strategies also include informal payments to health care providers. This paper analyzes the satisfaction of health care users with the quality of and access to health care services. The study focuses on six Central and Eastern European countries (Bulgaria, Hungary, Lithuania, Poland, Romania and Ukraine). We use data on past experience with health care use collected in 2010 through uniform national surveys in these countries. Based on these data, we carry out a multi-country analysis to investigate factors associated with the satisfaction of health care users in the six countries. The results indicate that about 10-14 % of the service users are not satisfied with the quality of, or access to health care services they used in the preceding year. However, significant differences across countries and services are observed, e.g. the highest level of dissatisfaction with access to outpatient services (16.4 %) is observed among patients in Lithuania, while in Poland, the level of dissatisfaction with quality of outpatient and inpatient services are much lower than dissatisfaction with access. The study also analyses the association of users' satisfaction with factors such as making informal payments, inability to pay and relative importance of service attributes stated by the service users. These multi-country findings provide evidence for health policy making in the Central and Eastern European countries. Although the average rates of satisfactions per country are relatively high, the results suggest that there is ample room for improvements. Specifically, many service-users still report dissatisfaction especially those

  17. Das sprachliche Register (Speech Registers)

    Science.gov (United States)

    Hess-Luttich, Ernest W. B.

    1974-01-01

    The linguistic behavior of a given individual varies; he will on different occasions speak (or write) differently according to what may be roughly described as different social situations: he will use a number of different registers. The application of such registers both in the field of text analysis and in the preparation of teaching materials…

  18. Accessibility of antiretroviral therapy in Ghana: Convenience of access

    African Journals Online (AJOL)

    SAHARA-J: Journal of Social Aspects of HIV/AIDS. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 9, No 2 (2012) >. Log in or Register to get access to full text downloads.

  19. A Flexible Component based Access Control Architecture for OPeNDAP Services

    Science.gov (United States)

    Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank

    2010-05-01

    Network data access services such as OPeNDAP enable widespread access to data across user communities. However, without ready means to restrict access to data for such services, data providers and data owners are constrained from making their data more widely available. Even with such capability, the range of different security technologies available can make interoperability between services and user client tools a challenge. OPeNDAP is a key data access service in the infrastructure under development to support the CMIP5 (Couple Model Intercomparison Project Phase 5). The work is being carried out as part of an international collaboration including the US Earth System Grid and Curator projects and the EU funded IS-ENES and Metafor projects. This infrastructure will bring together Petabytes of climate model data and associated metadata from over twenty modelling centres around the world in a federation with a core archive mirrored at three data centres. A security system is needed to meet the requirements of organisations responsible for model data including the ability to restrict data access to registered users, keep them up to date with changes to data and services, audit access and protect finite computing resources. Individual organisations have existing tools and services such as OPeNDAP with which users in the climate research community are already familiar. The security system should overlay access control in a way which maintains the usability and ease of access to these services. The BADC (British Atmospheric Data Centre) has been working in collaboration with the Earth System Grid development team and partner organisations to develop the security architecture. OpenID and MyProxy were selected at an early stage in the ESG project to provide single sign-on capability across the federation of participating organisations. Building on the existing OPeNDAP specification an architecture based on pluggable server side components has been developed at the BADC

  20. Automated Computer Access Request System

    Science.gov (United States)

    Snook, Bryan E.

    2010-01-01

    The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).

  1. Becoming a web-based learner: registered nurses' experiences.

    Science.gov (United States)

    Atack, Lynda

    2003-11-01

    The purpose of the study was to describe Registered Nurses' experiences when taking a web-based course from either the workplace or home, and the impact of their learning on clinical practice. Little is known about the web-based learners' experience, particularly when courses are accessed from the nursing practice setting. Even less is known about whether nurses transfer their web-based learning to clinical practice. A qualitative design employing focus group interviews was used. Participants included hospital and community nurses from three Canadian provinces and one territory. Data were collected at three points over a 6-month period and analysed using a thematic analysis process. These findings emanate from a larger study using survey method and focus group interviews. The focus group interviews captured the hurdles nurses faced during the first weeks when they struggled with technology, re-framed their views of teaching and adjusted to web-based learning from home and work. These first stressful weeks were followed by a period during which nurses developed relationships with the teacher and peers that enabled them to focus on learning and prevented attrition. Most nurses reported the web course was convenient and that they would be interested and comfortable using technology for learning and work purposes in the future. Six weeks after the course was completed, nurses articulated a number of ways the course had improved their practice. Initial weeks in a web-based course can be very challenging for novice Internet users, however, most nurses who completed the course reported a positive learning experience. Nurses, employers and educators should evaluate computer skills, computer access and the learning environment when preparing for web-based learning.

  2. Lexical-Access Ability and Cognitive Predictors of Speech Recognition in Noise in Adult Cochlear Implant Users.

    Science.gov (United States)

    Kaandorp, Marre W; Smits, Cas; Merkus, Paul; Festen, Joost M; Goverts, S Theo

    2017-01-01

    Not all of the variance in speech-recognition performance of cochlear implant (CI) users can be explained by biographic and auditory factors. In normal-hearing listeners, linguistic and cognitive factors determine most of speech-in-noise performance. The current study explored specifically the influence of visually measured lexical-access ability compared with other cognitive factors on speech recognition of 24 postlingually deafened CI users. Speech-recognition performance was measured with monosyllables in quiet (consonant-vowel-consonant [CVC]), sentences-in-noise (SIN), and digit-triplets in noise (DIN). In addition to a composite variable of lexical-access ability (LA), measured with a lexical-decision test (LDT) and word-naming task, vocabulary size, working-memory capacity (Reading Span test [RSpan]), and a visual analogue of the SIN test (text reception threshold test) were measured. The DIN test was used to correct for auditory factors in SIN thresholds by taking the difference between SIN and DIN: SRT diff . Correlation analyses revealed that duration of hearing loss (dHL) was related to SIN thresholds. Better working-memory capacity was related to SIN and SRT diff scores. LDT reaction time was positively correlated with SRT diff scores. No significant relationships were found for CVC or DIN scores with the predictor variables. Regression analyses showed that together with dHL, RSpan explained 55% of the variance in SIN thresholds. When controlling for auditory performance, LA, LDT, and RSpan separately explained, together with dHL, respectively 37%, 36%, and 46% of the variance in SRT diff outcome. The results suggest that poor verbal working-memory capacity and to a lesser extent poor lexical-access ability limit speech-recognition ability in listeners with a CI.

  3. Impact of Users Identities and Access Conditions on Downlink Performance in Closed Small-Cell Networks

    KAUST Repository

    Radaydeh, Redha

    2015-05-26

    This paper investigates the effect of various operation parameters on the downlink user performance in overlaid small-cell networks. The case study considers closed-access small cells (e.g., femtocells), wherein only active authorized user equipments (UEs) can be served, and each of which is allocated single downlink channel at a time. On the other hand, the macrocell base station can unconditionally serve macrocell UEs that exist inside its coverage space. The available channels can be shared simultaneously in the macrocell network and the femtocell network. Moreover, a channel can be reused only at the macrocell base station. The analysis provides quantitative approaches to model UEs identities, their likelihoods of being active, and their likelihoods of producing interference, considering UEs classifications, locations, and access capabilities. Moreover, it develops models for various interference sources observed from effective interference femtocells, considering femtocells capacities and operation conditions. The associated formulations to describe a desired UE performance and the impact of the number of available channels as well as the adopted channel assignment approach are thoroughly investigated. The results are generally presented for any channel models of interference sources as well as the desired source of the served UE. Moreover, specific channel models are then adopted, for which generalized closedform analytical results for the desired UE outage probability performance are obtained. Numerical and simulation results are presented to further clarify the main outcomes of the developed analysis.

  4. Accessibility observations of visually impaired users using the South African National Accessibility Portal

    CSIR Research Space (South Africa)

    Coetzee, L

    2008-05-01

    Full Text Available . Improving web site accessibility has proven to be a challenging task with a myriad of standards, accessibility testing tools and few technical guides for implementation. This paper presents the South African National Accessibility Portal (NAP), which is used...

  5. An efficient biometric and password-based remote user authentication using smart card for Telecare Medical Information Systems in multi-server environment.

    Science.gov (United States)

    Maitra, Tanmoy; Giri, Debasis

    2014-12-01

    The medical organizations have introduced Telecare Medical Information System (TMIS) to provide a reliable facility by which a patient who is unable to go to a doctor in critical or urgent period, can communicate to a doctor through a medical server via internet from home. An authentication mechanism is needed in TMIS to hide the secret information of both parties, namely a server and a patient. Recent research includes patient's biometric information as well as password to design a remote user authentication scheme that enhances the security level. In a single server environment, one server is responsible for providing services to all the authorized remote patients. However, the problem arises if a patient wishes to access several branch servers, he/she needs to register to the branch servers individually. In 2014, Chuang and Chen proposed an remote user authentication scheme for multi-server environment. In this paper, we have shown that in their scheme, an non-register adversary can successfully logged-in into the system as a valid patient. To resist the weaknesses, we have proposed an authentication scheme for TMIS in multi-server environment where the patients can register to a root telecare server called registration center (RC) in one time to get services from all the telecare branch servers through their registered smart card. Security analysis and comparison shows that our proposed scheme provides better security with low computational and communication cost.

  6. How is a specialist depression service effective for persistent moderate to severe depressive disorder?: a qualitative study of service user experience.

    Science.gov (United States)

    Thomson, Louise; Barker, Marcus; Kaylor-Hughes, Catherine; Garland, Anne; Ramana, Rajini; Morriss, Richard; Hammond, Emily; Hopkins, Gail; Simpson, Sandra

    2018-06-15

    A specialist depression service (SDS) offering collaborative pharmacological and cognitive behaviour therapy treatment for persistent depressive disorder showed effectiveness against depression symptoms versus usual community based multidisciplinary care in a randomised controlled trial (RCT) in specialist mental health services in England. However, there is uncertainty concerning how specialist depression services effect such change. The current study aimed to evaluate the factors which may explain the greater effectiveness of SDS compared to Treatment as Usual (TAU) by exploring the experience of the RCT participants. Qualitative audiotaped and transcribed semi-structured interviews were conducted 12-18 months after baseline with 21 service users (12 SDS, 9 TAU arms) drawn from all three sites. Inductive thematic analysis using a grounded approach contrasted the experiences of SDS with TAU participants. Four themes emerged in relation to service user experience: 1. Specific treatment components of the SDS: which included sub-themes of the management of medication change, explaining and developing treatment strategies, setting realistic expectations, and person-centred and holistic approach; 2. Individual qualities of SDS clinicians; 3. Collaborative team context in SDS: which included sub-themes of communication between healthcare professionals, and continuity of team members; 4. Accessibility to SDS: which included sub-themes of flexibility of locations, frequent consultation as reinforcement, gradual pace of treatment, and challenges of returning to usual care. The study uncovered important mechanisms and contextual factors in the SDS that service users experience as different from TAU, and which may explain the greater effectiveness of the SDS: the technical expertise of the healthcare professionals, personal qualities of clinicians, teamwork, gradual pace of care, accessibility and managing service transitions. Usual care in other specialist mental health

  7. Graphical User Interfaces and Library Systems: End-User Reactions.

    Science.gov (United States)

    Zorn, Margaret; Marshall, Lucy

    1995-01-01

    Describes a study by Parke-Davis Pharmaceutical Research Library to determine user satisfaction with the graphical user interface-based (GUI) Dynix Marquis compared with the text-based Dynix Classic Online Public Access Catalog (OPAC). Results show that the GUI-based OPAC was preferred by endusers over the text-based OPAC. (eight references) (DGM)

  8. A novel clustering and supervising users' profiles method

    Institute of Scientific and Technical Information of China (English)

    Zhu Mingfu; Zhang Hongbin; Song Fangyun

    2005-01-01

    To better understand different users' accessing intentions, a novel clustering and supervising method based on accessing path is presented. This method divides users' interest space to express the distribution of users' interests, and directly to instruct the constructing process of web pages indexing for advanced performance.

  9. The AAS Working Group on Accessibility and Disability (WGAD) Year 1 Highlights and Database Access

    Science.gov (United States)

    Knierman, Karen A.; Diaz Merced, Wanda; Aarnio, Alicia; Garcia, Beatriz; Monkiewicz, Jacqueline A.; Murphy, Nicholas Arnold

    2017-06-01

    The AAS Working Group on Accessibility and Disability (WGAD) was formed in January of 2016 with the express purpose of seeking equity of opportunity and building inclusive practices for disabled astronomers at all educational and career stages. In this presentation, we will provide a summary of current activities, focusing on developing best practices for accessibility with respect to astronomical databases, publications, and meetings. Due to the reliance of space sciences on databases, it is important to have user centered design systems for data retrieval. The cognitive overload that may be experienced by users of current databases may be mitigated by use of multi-modal interfaces such as xSonify. Such interfaces would be in parallel or outside the original database and would not require additional software efforts from the original database. WGAD is partnering with the IAU Commission C1 WG Astronomy for Equity and Inclusion to develop such accessibility tools for databases and methods for user testing. To collect data on astronomical conference and meeting accessibility considerations, WGAD solicited feedback from January AAS attendees via a web form. These data, together with upcoming input from the community and analysis of accessibility documents of similar conferences, will be used to create a meeting accessibility document. Additionally, we will update the progress of journal access guidelines and our social media presence via Twitter. We recommend that astronomical journals form committees to evaluate the accessibility of their publications by performing user-centered usability studies.

  10. Performance analysis of quantum access network using code division multiple access model

    International Nuclear Information System (INIS)

    Hu Linxi; Yang Can; He Guangqiang

    2017-01-01

    A quantum access network has been implemented by frequency division multiple access and time division multiple access, while code division multiple access is limited for its difficulty to realize the orthogonality of the code. Recently, the chaotic phase shifters were proposed to guarantee the orthogonality by different chaotic signals and spread the spectral content of the quantum states. In this letter, we propose to implement the code division multiple access quantum network by using chaotic phase shifters and synchronization. Due to the orthogonality of the different chaotic phase shifter, every pair of users can faithfully transmit quantum information through a common channel and have little crosstalk between different users. Meanwhile, the broadband spectra of chaotic signals efficiently help the quantum states to defend against channel loss and noise. (paper)

  11. CAPTCHA: Impact on User Experience of Users with Learning Disabilities

    Directory of Open Access Journals (Sweden)

    Ruti Gafni

    2016-12-01

    Full Text Available CAPTCHA is one of the most common solutions to check if the user trying to enter a Website is a real person or an automated piece of software. This challenge-response test, implemented in many Internet Websites, emphasizes the gaps between accessibility and security on the Internet, as it poses an obstacle for the learning-impaired in the reading and comprehension of what is presented in the test. Various types of CAPTCHA tests have been developed in order to address accessibility and security issues. The objective of this study is to investigate how the differences between various CAPTCHA tests affect user experience among populations with and without learning disabilities. A questionnaire accompanied by experiencing five different tests was administered to 212 users, 60 of them with learning disabilities. Response rates for each test and levels of success were collected automatically. Findings suggest that users with learning disabilities have more difficulties in solving the tests, especially those with distorted texts, have more negative attitudes towards the CAPTCHA tests, but the response time has no statistical difference from users without learning disabilities. These insights can help to develop and implement solutions suitable for many users and especially for population with learning disabilities.

  12. Representing Graphical User Interfaces with Sound: A Review of Approaches

    Science.gov (United States)

    Ratanasit, Dan; Moore, Melody M.

    2005-01-01

    The inability of computer users who are visually impaired to access graphical user interfaces (GUIs) has led researchers to propose approaches for adapting GUIs to auditory interfaces, with the goal of providing access for visually impaired people. This article outlines the issues involved in nonvisual access to graphical user interfaces, reviews…

  13. Web Accessibility and Guidelines

    Science.gov (United States)

    Harper, Simon; Yesilada, Yeliz

    Access to, and movement around, complex online environments, of which the World Wide Web (Web) is the most popular example, has long been considered an important and major issue in the Web design and usability field. The commonly used slang phrase ‘surfing the Web’ implies rapid and free access, pointing to its importance among designers and users alike. It has also been long established that this potentially complex and difficult access is further complicated, and becomes neither rapid nor free, if the user is disabled. There are millions of people who have disabilities that affect their use of the Web. Web accessibility aims to help these people to perceive, understand, navigate, and interact with, as well as contribute to, the Web, and thereby the society in general. This accessibility is, in part, facilitated by the Web Content Accessibility Guidelines (WCAG) currently moving from version one to two. These guidelines are intended to encourage designers to make sure their sites conform to specifications, and in that conformance enable the assistive technologies of disabled users to better interact with the page content. In this way, it was hoped that accessibility could be supported. While this is in part true, guidelines do not solve all problems and the new WCAG version two guidelines are surrounded by controversy and intrigue. This chapter aims to establish the published literature related to Web accessibility and Web accessibility guidelines, and discuss limitations of the current guidelines and future directions.

  14. Plagiarism and registered health professionals: navigating the borderlands between scholarly and professional misconduct.

    Science.gov (United States)

    Wardle, Jon

    2013-12-01

    As access to published materials becomes more readily available, the ability to plagiarise material, deliberately or unwittingly has become easier than ever. This article explores important recent decisions in Australia and the United Kingdom regarding registered health practitioners who have engaged in plagiarism, both related and unrelated to their clinical practice, and explores the ways in which regulatory authorities in these countries have viewed scholarly misconduct committed by registered health professionals. This article also examines the implications of plagiarism for the registered health professions, and makes suggestions for strategies to reduce its influence and incidence in modern clinical practice.

  15. Enterprise Dynamic Access Control (EDAC)

    National Research Council Canada - National Science Library

    Fernandez, Richard

    2005-01-01

    .... Resources can represent software applications, web services and even facility access. An effective access control model should be capable of evaluating resource access based on user characteristics and environmentals...

  16. Accessing and disclosing protected resources

    DEFF Research Database (Denmark)

    Olesen, Henning; Khajuria, Samant

    2015-01-01

    Today, data is money. Whether it is private users' personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization measures to be deployed. Enabling...... advanced user controlled privacy is essential to realize the visions of 5G applications and services. For service providers and enterprises resources are usually well safeguarded, while private users are often missing the tools and the know-how to protect their own data and preserve their privacy. The user...... the framework of User Managed Access (UMA), can enable users to understand the value of their protected resources and possibly give them control of how their data will be used by service providers....

  17. Removing user fees for health services: A multi-epistemological perspective on access inequities in Senegal.

    Science.gov (United States)

    Mladovsky, Philipa; Ba, Maymouna

    2017-09-01

    Plan Sésame (PS) is a user fee exemption policy launched in 2006 to provide free access to health services to Senegalese citizens aged 60 and over. Analysis of a large household survey evaluating PS echoes findings of other studies showing that user fee removal can be highly inequitable. 34 semi-structured interviews and 19 focus group discussions with people aged 60 and over were conducted in four regions in Senegal (Dakar, Diourbel, Matam and Tambacounda) over a period of six months during 2012. They were analysed to identify underlying causes of exclusion from/inclusion in PS and triangulated with the household survey. The results point to three steps at which exclusion occurs: (i) not being informed about PS; (ii) not perceiving a need to use health services under PS; and (iii) inability to access health services under PS, despite having the information and perceived need. We identify lay explanations for exclusion at these different steps. Some lay explanations point to social exclusion, defined as unequal power relations. For example, poor access to PS was seen to be caused by corruption, patronage, poverty, lack of social support, internalised discrimination and adverse incorporation. Other lay explanations do not point to social exclusion, for example: poor implementation; inadequate funding; high population demand; incompetent bureaucracy; and PS as a favour or moral obligation to friends or family. Within a critical realist paradigm, we interpret these lay explanations as empirical evidence for the presence of the following hidden underlying causal mechanisms: lacking capabilities; mobilisation of institutional bias; and social closure. However, social constructionist perspectives lead us to critique this paradigm by drawing attention to contested health, wellbeing and corruption discourses. These differences in interpretation lead to subsequent differential policy recommendations. This demonstrates the need for the adoption of a "multi

  18. Libraries and Accessibility: Istanbul Public Libraries Case

    Directory of Open Access Journals (Sweden)

    Gül Yücel

    2016-12-01

    Full Text Available In the study; the assessment of accessibility has been conducted in Istanbul public libraries within the scope of public area. Public libraries commonly serve with its user of more than 20 million in total, spread to the general of Turkey, having more than one thousand branches in the centrums and having more than one million registered members. The building principles and standards covering the subjects such as the selection of place, historical and architectural specification of the region, distance to the centre of population and design in a way that the disabled people could benefit from the library services fully have been determined with regulations in the construction of new libraries. There are works for the existent libraries such as access for the disabled, fire safety precautions etc. within the scope of the related standards. Easy access by everyone is prioritized in the public libraries having a significant role in life-long learning. The purpose of the study is to develop solution suggestions for the accessibility problems in the public libraries. The study based on the eye inspection and assessments carried out within the scope of accessibility in the public libraries subsidiary to Istanbul Culture and Tourism Provincial Directorate Library and Publications Department within the provincial borders of Istanbul. The arrangements such as reading halls, study areas, book shelves etc. have been examined within the frame of accessible building standards. Building entrances, ramps and staircases, horizontal and vertical circulation of building etc. have been taken into consideration within the scope of accessible building standards. The subjects such as the reading and studying areas and book shelf arrangements for the library have been assessed within the scope of specific buildings. There are a total of 34 public libraries subsidiary to Istanbul Culture and Tourism Provincial Directorate on condition that 20 ea. of them are in the

  19. What drives Users' Website Registration?

    NARCIS (Netherlands)

    T. Li (Ting); P.A. Pavlou (Paul)

    2013-01-01

    textabstractUser registration is an important prerequisite for the success of many websites by enabling users to gain access to domain information and personalized content. It is not always desirable for users, however, because they need to disclose personal information. This paper examines what

  20. Factors that help injecting drug users to access and benefit from services: A qualitative study

    Directory of Open Access Journals (Sweden)

    sheard Laura

    2007-10-01

    Full Text Available Abstract Background International research shows that injecting drug users (IDUs can encounter many barriers when they try to access drug treatment and other services. However, the existing literature is mostly quantitative and does not consider the kinds of factors that injectors themselves identify as enabling them to access and benefit from services. Responding to this gap in knowledge, our paper explores IDUs' own suggestions for improving service engagement and their reports of other factors enabling them to seek help. Methods Semi-structured qualitative interviews were conducted with 75 current illicit drug injectors in three geographically diverse areas of West Yorkshire, England. Recruitment was through needle exchange programmes, with additional snowball sampling to ensure inclusivity of gender, ethnicity and primary drug injected. Transcribed data were analysed thematically using Framework. Results Although participants were often satisfied with current access to services, they made three broad suggestions for improving engagement. These were: providing more services (more providers and more forms of support; better operation of existing services (including better communication systems and more flexibility around individual needs; and staffing-related improvements (particularly, less judgemental and more understanding staff attitudes. Other factors identified as important enablers of help seeking were: having supporting relationships (particularly with family members; personal circumstances/life events (especially becoming a parent; and an injector's state of mind (such as feeling motivated and positive. Conclusion A range of practical suggestions for improving IDUs' access to drug treatment and other services are identified.

  1. Full-Text Linking: Affiliated versus Nonaffiliated Access in a Free Database.

    Science.gov (United States)

    Grogg, Jill E.; Andreadis, Debra K.; Kirk, Rachel A.

    2002-01-01

    Presents a comparison of access to full-text articles from a free bibliographic database (PubSCIENCE) for affiliated and unaffiliated users. Found that affiliated users had access to more full-text articles than unaffiliated users had, and that both types of users could increase their level of access through additional searching and greater…

  2. Easing Internet access of health information for elderly users

    NARCIS (Netherlands)

    Alpay, L.L.; Toussaint, P.J.; Ezendam, N.P.M.; Rövekamp, T.A.J.M.; Graafmans, W.C.; Westendorp, R.G.J.

    2004-01-01

    Elderly users are increasingly becoming active consumers of Internet technologies. Developing websites dedicated to this user group presents several design issues (such as that of 'design for all', participatory design, patient empowerment and cognitive usability assessment methods). SeniorGezond is

  3. The HADDOCK2.2 Web Server: User-Friendly Integrative Modeling of Biomolecular Complexes.

    Science.gov (United States)

    van Zundert, G C P; Rodrigues, J P G L M; Trellet, M; Schmitz, C; Kastritis, P L; Karaca, E; Melquiond, A S J; van Dijk, M; de Vries, S J; Bonvin, A M J J

    2016-02-22

    The prediction of the quaternary structure of biomolecular macromolecules is of paramount importance for fundamental understanding of cellular processes and drug design. In the era of integrative structural biology, one way of increasing the accuracy of modeling methods used to predict the structure of biomolecular complexes is to include as much experimental or predictive information as possible in the process. This has been at the core of our information-driven docking approach HADDOCK. We present here the updated version 2.2 of the HADDOCK portal, which offers new features such as support for mixed molecule types, additional experimental restraints and improved protocols, all of this in a user-friendly interface. With well over 6000 registered users and 108,000 jobs served, an increasing fraction of which on grid resources, we hope that this timely upgrade will help the community to solve important biological questions and further advance the field. The HADDOCK2.2 Web server is freely accessible to non-profit users at http://haddock.science.uu.nl/services/HADDOCK2.2. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  4. From Web accessibility to Web adaptability.

    Science.gov (United States)

    Kelly, Brian; Nevile, Liddy; Sloan, David; Fanou, Sotiris; Ellison, Ruth; Herrod, Lisa

    2009-07-01

    This article asserts that current approaches to enhance the accessibility of Web resources fail to provide a solid foundation for the development of a robust and future-proofed framework. In particular, they fail to take advantage of new technologies and technological practices. The article introduces a framework for Web adaptability, which encourages the development of Web-based services that can be resilient to the diversity of uses of such services, the target audience, available resources, technical innovations, organisational policies and relevant definitions of 'accessibility'. The article refers to a series of author-focussed approaches to accessibility through which the authors and others have struggled to find ways to promote accessibility for people with disabilities. These approaches depend upon the resource author's determination of the anticipated users' needs and their provision. Through approaches labelled as 1.0, 2.0 and 3.0, the authors have widened their focus to account for contexts and individual differences in target audiences. Now, the authors want to recognise the role of users in determining their engagement with resources (including services). To distinguish this new approach, the term 'adaptability' has been used to replace 'accessibility'; new definitions of accessibility have been adopted, and the authors have reviewed their previous work to clarify how it is relevant to the new approach. Accessibility 1.0 is here characterised as a technical approach in which authors are told how to construct resources for a broadly defined audience. This is known as universal design. Accessibility 2.0 was introduced to point to the need to account for the context in which resources would be used, to help overcome inadequacies identified in the purely technical approach. Accessibility 3.0 moved the focus on users from a homogenised universal definition to recognition of the idiosyncratic needs and preferences of individuals and to cater for them. All of

  5. New users of antipsychotic medication

    DEFF Research Database (Denmark)

    Baandrup, L; Kruse, M

    2016-01-01

    patterns and labor market affiliation, considering both authority approved and off-label prescriptions and the relation to polypharmacy. METHODS: Register-based cohort study using a dataset of 71,254 new antipsychotic users with a psychiatric diagnosis. Labor market affiliation and duration of welfare...... payments were analyzed using linear regression models and duration analysis. The analyses were adjusted for the following confounding variables: age, gender, diagnosis, marital status, length of education, and utilization of mental health care services. RESULTS: The majority of new antipsychotic users...

  6. An Investigation of ACCI's User Choice Proposals. Working Paper.

    Science.gov (United States)

    Ferrier, Fran; Smith, Chris Selby

    A project investigated Australian Chamber of Commerce and Industry (ACCI)-developed proposals designed to strengthen User Choice. (The ability of employers and employees to select a training provider of their choice, providing it is registered in their state or territory, is known as "User Choice.") Stage 1 analyzed the ACCI position,…

  7. Artificial intelligence techniques for modeling database user behavior

    Science.gov (United States)

    Tanner, Steve; Graves, Sara J.

    1990-01-01

    The design and development of the adaptive modeling system is described. This system models how a user accesses a relational database management system in order to improve its performance by discovering use access patterns. In the current system, these patterns are used to improve the user interface and may be used to speed data retrieval, support query optimization and support a more flexible data representation. The system models both syntactic and semantic information about the user's access and employs both procedural and rule-based logic to manipulate the model.

  8. Perceived barriers to accessing mental health services among black and minority ethnic (BME) communities: a qualitative study in Southeast England.

    Science.gov (United States)

    Memon, Anjum; Taylor, Katie; Mohebati, Lisa M; Sundin, Josefin; Cooper, Max; Scanlon, Thomas; de Visser, Richard

    2016-11-16

    In most developed countries, substantial disparities exist in access to mental health services for black and minority ethnic (BME) populations. We sought to determine perceived barriers to accessing mental health services among people from these backgrounds to inform the development of effective and culturally acceptable services to improve equity in healthcare. Qualitative study in Southeast England. 26 adults from BME backgrounds (13 men, 13 women; aged >18 years) were recruited to 2 focus groups. Participants were identified through the registers of the Black and Minority Ethnic Community Partnership centre and by visits to local community gatherings and were invited to take part by community development workers. Thematic analysis was conducted to identify key themes about perceived barriers to accessing mental health services. Participants identified 2 broad themes that influenced access to mental health services. First, personal and environmental factors included inability to recognise and accept mental health problems, positive impact of social networks, reluctance to discuss psychological distress and seek help among men, cultural identity, negative perception of and social stigma against mental health and financial factors. Second, factors affecting the relationship between service user and healthcare provider included the impact of long waiting times for initial assessment, language barriers, poor communication between service users and providers, inadequate recognition or response to mental health needs, imbalance of power and authority between service users and providers, cultural naivety, insensitivity and discrimination towards the needs of BME service users and lack of awareness of different services among service users and providers. People from BME backgrounds require considerable mental health literacy and practical support to raise awareness of mental health conditions and combat stigma. There is a need for improving information about services

  9. The Nordic medical birth registers – a potential goldmine for clinical research

    DEFF Research Database (Denmark)

    Langhoff-Roos, Jens; Krebs, Lone; Klungsøyr, Kari

    2014-01-01

    on preceding, underlying and present health problems of the parents and their offspring. Researchers may, with permission from the national authorities, obtain access to individualized or anonymized data from the registers and tissue-banks. These data allow for multivariate analyses but their usefulness...... large cohorts (approximately 100 000 births) in Denmark and Norway have been described by questionnaires, interviews and collection of biological samples (blood, urine and milk teeth), as well as a systematic prospective follow-up of the offspring. National patient registers provide information...

  10. Hepatitis C prevalence in Denmark -an estimate based on multiple national registers

    DEFF Research Database (Denmark)

    Christensen, Peer Brehm; Hay, Gordon; Jepsen, Peter

    2012-01-01

    ABSTRACT: BACKGROUND: A national survey for chronic hepatitis C has not been performed in Denmark and the prevalence is unknown. Our aim was to estimate the prevalence of chronic hepatitis C from public registers and the proportion of these patients who received specialized healthcare. METHODS...... by capture-recapture analysis. The population with undiagnosed hepatitis C was derived from the national register of drug users by comparing diagnosed and tested persons. RESULTS: A total of 6,935 patients diagnosed with chronic hepatitis C were identified in the four registers and the estimated population.......37-0.42) of the population over 15 years of age. CONCLUSIONS: The estimated prevalence of chronic hepatitis C in Denmark was 0.38%. Less than half of the patients with chronic hepatitis C in Denmark have been identified and among these patients, one in three has attended specialised care....

  11. Web accessibility standards and disability: developing critical perspectives on accessibility.

    Science.gov (United States)

    Lewthwaite, Sarah

    2014-01-01

    Currently, dominant web accessibility standards do not respect disability as a complex and culturally contingent interaction; recognizing that disability is a variable, contrary and political power relation, rather than a biological limit. Against this background there is clear scope to broaden the ways in which accessibility standards are understood, developed and applied. Commentary. The values that shape and are shaped by legislation promote universal, statistical and automated approaches to web accessibility. This results in web accessibility standards conveying powerful norms fixing the relationship between technology and disability, irrespective of geographical, social, technological or cultural diversity. Web accessibility standards are designed to enact universal principles; however, they express partial and biopolitical understandings of the relation between disability and technology. These values can be limiting, and potentially counter-productive, for example, for the majority of disabled people in the "Global South" where different contexts constitute different disabilities and different experiences of web access. To create more robust, accessible outcomes for disabled people, research and standards practice should diversify to embrace more interactional accounts of disability in different settings. Implications for Rehabilitation Creating accessible experiences is an essential aspect of rehabilitation. Web standards promote universal accessibility as a property of an online resource or service. This undervalues the importance of the user's intentions, expertize, their context, and the complex social and cultural nature of disability. Standardized, universal approaches to web accessibility may lead to counterproductive outcomes for disabled people whose impairments and circumstances do not meet Western disability and accessibility norms. Accessible experiences for rehabilitation can be enhanced through an additional focus on holistic approaches to

  12. Interoperable Access to NCAR Research Data Archive Collections

    Science.gov (United States)

    Schuster, D.; Ji, Z.; Worley, S. J.; Manross, K.

    2014-12-01

    The National Center for Atmospheric Research (NCAR) Research Data Archive (RDA) provides free access to 600+ observational and gridded dataset collections. The RDA is designed to support atmospheric and related sciences research, updated frequently where datasets have ongoing production, and serves data to 10,000 unique users annually. The traditional data access options include web-based direct archive file downloads, user selected data subsets and format conversions produced by server-side computations, and client and cURL-based APIs for routine scripted data retrieval. To enhance user experience and utility, the RDA now also offers THREDDS Data Server (TDS) access for many highly valued dataset collections. TDS offered datasets are presented as aggregations, enabling users to access an entire dataset collection, that can be comprised of 1000's of files, through a single virtual file. The OPeNDAP protocol, supported by the TDS, allows compatible tools to open and access these virtual files remotely, and make the native data file format transparent to the end user. The combined functionality (TDS/OPeNDAP) gives users the ability to browse, select, visualize, and download data from a complete dataset collection without having to transfer archive files to a local host. This presentation will review the TDS basics and describe the specific TDS implementation on the RDA's diverse archive of GRIB-1, GRIB-2, and gridded NetCDF formatted dataset collections. Potential future TDS implementation on in-situ observational dataset collections will be discussed. Illustrative sample cases will be used to highlight the end users benefits from this interoperable data access to the RDA.

  13. BlindSense: An Accessibility-inclusive Universal User Interface for Blind People

    Directory of Open Access Journals (Sweden)

    A. Khan

    2018-04-01

    Full Text Available A large number of blind people use smartphone-based assistive technology to perform their common activities. In order to provide a better user experience the existing user interface paradigm needs to be revisited. A new user interface model has been proposed in this paper. A simplified, semantically consistent, and blind-friendly adaptive user interface is provided. The proposed solution is evaluated through an empirical study on 63 blind people leveraging an improved user experience in performing common activities on a smartphone.

  14. Migrants' access to healthcare

    DEFF Research Database (Denmark)

    Norredam, Marie

    2011-01-01

    There are strong pragmatic and moral reasons for receiving societies to address access to healthcare for migrants. Receiving societies have a pragmatic interest in sustaining migrants' health to facilitate integration; they also have a moral obligation to ensure migrants' access to healthcare...... according to international human rights principles. The intention of this thesis is to increase the understanding of migrants' access to healthcare by exploring two study aims: 1) Are there differences in migrants' access to healthcare compared to that of non-migrants? (substudy I and II); and 2) Why...... are there possible differences in migrants' access to healthcare compared to that of non-migrants? (substudy III and IV). The thesis builds on different methodological approaches using both register-based retrospective cohort design, cross-sectional design and survey methods. Two different measures of access were...

  15. Building a learning health system using clinical registers: a non-technical introduction.

    Science.gov (United States)

    Ovretveit, John; Nelson, Eugene; James, Brent

    2016-10-10

    Purpose The purpose of this paper is to describe how clinical registers were designed and used to serve multiple purposes in three health systems, in order to contribute practical experience for building learning healthcare systems. Design/methodology/approach Case description and comparison of the development and use of clinical registries, drawing on participants' experience and published and unpublished research. Findings Clinical registers and new software systems enable fact-based decisions by patients, clinicians, and managers about better care, as well as new and more economical research. Designing systems to present the data for users' daily work appears to be the key to effective use of the potential afforded by digital data. Research limitations/implications The case descriptions draw on the experience of the authors who were involved in the development of the registers, as well as on published and unpublished research. There is limited data about outcomes for patients or cost-effectiveness. Practical implications The cases show the significant investments which are needed to make effective use of clinical register data. There are limited skills to design and apply the digital systems to make the best use of the systems and to reduce their disadvantages. More use can be made of digital data for quality improvement, patient empowerment and support, and for research. Social implications Patients can use their data combined with other data to self-manage their chronic conditions. There are challenges in designing and using systems so that those with lower health and computer literacy and incomes also benefit from these systems, otherwise the digital revolution may increase health inequalities. Originality/value The paper shows three real examples of clinical registers which have been developed as part of their host health systems' strategies to develop learning healthcare systems. The paper gives a simple non-technical introduction and overview for

  16. Signature-based User Authentication

    OpenAIRE

    Hámorník, Juraj

    2015-01-01

    This work aims on missing handwritten signature authentication in Windows. Result of this work is standalone software that allow users to log into Windows by writing signature. We focus on security of signature authentification and best overall user experience. We implemented signature authentification service that accept signature and return user access token if signature is genuine. Signature authentification is done by comparing given signature to signature patterns by their similarity. Si...

  17. Phases and Steps in the Access to Data in Information Tools

    DEFF Research Database (Denmark)

    Bergenholtz, Henning; Bothma, Theo; Gouws, Rufus

    2015-01-01

    route and access time, but not access structure. This term is not only ill defined – it is less relevant, because each user has different access routes, and also the same user makes use of different routes in different cases. We describe four experiments in a case study with one test person how...... the different access processes in different user situations take place. This test person is trying to solve different accounting information needs in different user situations. The aim of this paper is to compare and contrast the access process terminology of lexicography and information science, to systematize...... the terms in a logical structure and to show how these disciplines complement one another by providing clearer definitions to describe the different access processes....

  18. Accessible Website Content Guidelines for Users with Intellectual Disabilities

    NARCIS (Netherlands)

    Karreman, Joyce; van der Geest, Thea; Buursink, Esmee

    2007-01-01

    Background: The W3C Web Accessibility Initiative has issued guidelines for making websites better and easier to access for people with various disabilities (W3C Web Accessibility Initiative guidelines 1999). - Method: The usability of two versions of a website (a non-adapted site and a site that was

  19. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  20. Overview of Graphical User Interfaces.

    Science.gov (United States)

    Hulser, Richard P.

    1993-01-01

    Discussion of graphical user interfaces for online public access catalogs (OPACs) covers the history of OPACs; OPAC front-end design, including examples from Indiana University and the University of Illinois; and planning and implementation of a user interface. (10 references) (EA)

  1. Which Users Should Be the Focus of Mobile Personal Health Records? Analysis of User Characteristics Influencing Usage of a Tethered Mobile Personal Health Record.

    Science.gov (United States)

    Lee, Guna; Park, Joong Yeol; Shin, Soo-Yong; Hwang, Jong Su; Ryu, Hyeon Jeong; Lee, Jae Ho; Bates, David W

    2016-05-01

    This study was conducted to analyze the usage pattern of a hospital-tethered mobile personal health records (m-PHRs) application named My Chart in My Hand (MCMH) and to identify user characteristics that influence m-PHR usage. Access logs to MCMH and its menus were collected for a total of 18 months, from August 2011 to January 2013. Usage patterns between users without a patient identification number (ID) and users with a patient ID were compared. Users with a patient ID were divided into light and heavy user groups by the median number of monthly access. Multiple linear regression models were used to assess MCMH usage pattern by characteristics of MCMH user with a patient ID. The total number of MCMH logins was 105,603, and the median number of accesses was 15 times. Users (n = 7,096) mostly accessed the "My Chart" menu, but "OPD [outpatient department] Service Support" and "Health Management" menus were also frequently used. Patients with chronic diseases, experience of hospital visits including emergency room and OPD, and age group of 0-19 years were more frequently found among users with a patient ID (n = 2,186) (p < 0.001). A similar trend was found in the heavy user group (n = 1,123). Submenus of laboratory result, online appointment, and medication lists that were accessed mostly by users with a patient ID were associated with OPD visit and chronic diseases. This study showed that focuses on patients with chronic disease and more hospital visits and empowerment functions in a tethered m-PHR would be helpful to pursue the extensive use.

  2. NESDIS OSPO Data Access Policy and CRM

    Science.gov (United States)

    Seybold, M. G.; Donoho, N. A.; McNamara, D.; Paquette, J.; Renkevens, T.

    2012-12-01

    The Office of Satellite and Product Operations (OSPO) is the NESDIS office responsible for satellite operations, product generation, and product distribution. Access to and distribution of OSPO data was formally established in a Data Access Policy dated February, 2011. An extension of the data access policy is the OSPO Customer Relationship Management (CRM) Database, which has been in development since 2008 and is reaching a critical level of maturity. This presentation will provide a summary of the data access policy and standard operating procedure (SOP) for handling data access requests. The tangential CRM database will be highlighted including the incident tracking system, reporting and notification capabilities, and the first comprehensive portfolio of NESDIS satellites, instruments, servers, applications, products, user organizations, and user contacts. Select examples of CRM data exploitation will show how OSPO is utilizing the CRM database to more closely satisfy the user community's satellite data needs with new product promotions, as well as new data and imagery distribution methods in OSPO's Environmental Satellite Processing Center (ESPC). In addition, user services and outreach initiatives from the Satellite Products and Services Division will be highlighted.

  3. Children's caregiving of HIV-infected parents accessing treatment in ...

    African Journals Online (AJOL)

    Children's caregiving of HIV-infected parents accessing treatment in western Kenya: challenges and ... Log in or Register to get access to full text downloads. ... The research draws attention to the difficulties and opportunities of strengthening ...

  4. Primary user localisation and uplink resource allocation in orthogonal frequency division multiple access cognitive radio systems

    KAUST Repository

    Nam, Haewoon

    2015-05-21

    In cognitive radio networks, secondary users (SUs) can share spectrum with primary users (PUs) under the condition that no interference is caused to the PUs. To evaluate the interference imposed to the PUs, the cognitive systems discussed in the literature usually assume that the channel state information (CSI) of the link from a secondary transmitter to a primary receiver (interference link) is known at the secondary transmitter. However, this assumption may often be impractical in cognitive radio systems, since the PUs need to be oblivious to the presence of the SUs. The authors first discuss PU localisation and then introduce an uplink resource allocation algorithm for orthogonal frequency division multiple access-based cognitive radio systems, where relative location information between primary and SUs is used instead of CSI of the interference link to estimate the interference. Numerical and simulation results show that it is indeed effective to use location information as a part of resource allocation and thus a near-optimal capacity is achieved. © The Institution of Engineering and Technology 2015.

  5. Access/AML -

    Data.gov (United States)

    Department of Transportation — The AccessAML is a web-based internet single application designed to reduce the vulnerability associated with several accounts assinged to a single users. This is a...

  6. The Danish National Health Service Register (NHSR) as a Source for Research on Primary Care

    DEFF Research Database (Denmark)

    Andersen, John Sahl; Olivarius, Niels de Fine; Krasnik, Allan

    . The data is easy accessible from the Danish National Board of Health. Conclusion: The register's strengths include completeness, size and long follow-up period. It is useful for research purposes especially when linked with other registers. However, grave reservations must be made regarding the validity...... of the register as no studies of this point have been made. Knowledge of the working conditions in general practice is necessary in order to use the NHSR for research purposes.......Aim: To describe NHSR in relation to research. Content: The data in the register from general practice is generated through the GPs’ electronic invoices to the Regional Health Administration. Data from 1990 onwards is available covering more than 600 million patient contacts. For each service...

  7. DIRAC: Secure web user interface

    International Nuclear Information System (INIS)

    Casajus Ramo, A; Sapunov, M

    2010-01-01

    Traditionally the interaction between users and the Grid is done with command line tools. However, these tools are difficult to use by non-expert users providing minimal help and generating outputs not always easy to understand especially in case of errors. Graphical User Interfaces are typically limited to providing access to the monitoring or accounting information and concentrate on some particular aspects failing to cover the full spectrum of grid control tasks. To make the Grid more user friendly more complete graphical interfaces are needed. Within the DIRAC project we have attempted to construct a Web based User Interface that provides means not only for monitoring the system behavior but also allows to steer the main user activities on the grid. Using DIRAC's web interface a user can easily track jobs and data. It provides access to job information and allows performing actions on jobs such as killing or deleting. Data managers can define and monitor file transfer activity as well as check requests set by jobs. Production managers can define and follow large data productions and react if necessary by stopping or starting them. The Web Portal is build following all the grid security standards and using modern Web 2.0 technologies which allow to achieve the user experience similar to the desktop applications. Details of the DIRAC Web Portal architecture and User Interface will be presented and discussed.

  8. Feedback from Usability Evaluation to User Interface Design

    DEFF Research Database (Denmark)

    Nielsen, C. M.; Overgaard, M.; Pedersen, M. B.

    2005-01-01

    This paper reports from an exploratory study of means for providing feedback from a usability evaluation to the user interface designers. In this study, we conducted a usability evaluation of a mobile system that is used by craftsmen to register use of time and materials. The results...... and weaknesses of the system. The findings indicate that detailed descriptions of problems and log descriptions of the user's interaction with the system and of system interaction are useful for the designers when trying to understand the usability problems that the users have encountered....

  9. 76 FR 59329 - User Fees Relating to the Registered Tax Return Preparer Competency Examination and...

    Science.gov (United States)

    2011-09-26

    ... and requiring tax return preparers who are not attorneys, certified public accountants, or enrolled... only attorneys, certified public accountants, enrolled agents, and registered tax return preparers are...-6 permits specified individuals who are supervised by the attorney, certified public accountant...

  10. A novel asynchronous access method with binary interfaces

    Directory of Open Access Journals (Sweden)

    Torres-Solis Jorge

    2008-10-01

    Full Text Available Abstract Background Traditionally synchronous access strategies require users to comply with one or more time constraints in order to communicate intent with a binary human-machine interface (e.g., mechanical, gestural or neural switches. Asynchronous access methods are preferable, but have not been used with binary interfaces in the control of devices that require more than two commands to be successfully operated. Methods We present the mathematical development and evaluation of a novel asynchronous access method that may be used to translate sporadic activations of binary interfaces into distinct outcomes for the control of devices requiring an arbitrary number of commands to be controlled. With this method, users are required to activate their interfaces only when the device under control behaves erroneously. Then, a recursive algorithm, incorporating contextual assumptions relevant to all possible outcomes, is used to obtain an informed estimate of user intention. We evaluate this method by simulating a control task requiring a series of target commands to be tracked by a model user. Results When compared to a random selection, the proposed asynchronous access method offers a significant reduction in the number of interface activations required from the user. Conclusion This novel access method offers a variety of advantages over traditionally synchronous access strategies and may be adapted to a wide variety of contexts, with primary relevance to applications involving direct object manipulation.

  11. Abolition of user fees: the Uganda paradox.

    Science.gov (United States)

    Nabyonga Orem, Juliet; Mugisha, Frederick; Kirunga, Christine; Macq, Jean; Criel, Bart

    2011-11-01

    Inadequate health financing is one of the major challenges health systems in low-income countries currently face. Health financing reforms are being implemented with an increasing interest in policies that abolish user fees. Data from three nationally representative surveys conducted in Uganda in 1999/2000, 2002/03 and 2005/06 were used to investigate the impact of user fee abolition on the attainment of universal coverage objectives. An increase in illness reporting was noted over the three surveys, especially among the poorer quintiles. An increase in utilization was registered in the period immediately following the abolition of user fees and was most pronounced in the poorest quintile. Overall, there was an increase in utilization in both public and private health care delivery sectors, but only at clinic and health centre level, not at hospitals. Our study shows important changes in health-care-seeking behaviour. In 2002/03, the poorest population quintile started using government health centres more often than private clinics whereas in 1999/2000 private clinics were the main source of health care. The richest quintile has increasingly used private clinics. Overall, it appears that the private sector remains a significant source of health care. Following abolition of user fees, we note an increase in the use of lower levels of care with subsequent reductions in use of hospitals. Total annual average expenditures on health per household remained fairly stable between the 1999/2000 and 2002/03 surveys. There was, however, an increase of US$21 in expenditure between the 2002/03 and 2005/06 surveys. Abolition of user fees improved access to health services and efficiency in utilization. On the negative side is the fact that financial protection is yet to be achieved. Out-of-pocket expenditure remains high and mainly affects the poorer population quintiles. A dual system seems to have emerged where wealthier population groups are switching to the private sector.

  12. Increasing the Impact of High-Resolution Lidar Topography Through Online Data Access and Processing

    Science.gov (United States)

    Crosby, C. J.; Nandigam, V.; Baru, C.; Arrowsmith, R.

    2013-12-01

    Topography data acquired with lidar (light detection and ranging) technology are revolutionizing the way we study the Earth's surface and overlying vegetation. These data, collected from satellite, airborne, tripod, or mobile-mounted scanners have emerged as a fundamental tool for research on topics including earthquake hazards, hillslope processes, and cyrosphere change. The U.S. National Science Foundation-funded OpenTopography (OT) Facility (http://www.opentopography.org) is a web-based system designed to democratize access to earth science-oriented lidar topography data. OT provides free, online access to lidar data in a number of forms, including the point cloud and associated geospatial-processing tools for customized analysis. The point cloud data are co-located with on-demand processing tools to generate digital elevation models, and derived products and visualizations which allow users to quickly access data in a format appropriate for their scientific application. The OT system is built using a service-oriented architecture (SOA) that leverages cyberinfrastructure resources at the San Diego Supercomputer Center at the University of California San Diego to allow users, regardless of expertise, to access these massive lidar datasets and derived raster data products for use in research and teaching. OT hosts over 600 billion lidar returns covering more than 120,000 km2. These data are provided by a variety of partners under joint agreements and memoranda of understanding with OT. Partners include national facilities such as the NSF-funded National Center for Airborne Lidar Mapping (NCALM), as well as non-governmental organizations and local, state, and federal agencies. OT has become a hub for high-resolution topography resources. Datasets hosted by other organizations, as well as lidar-specific software, can be registered into the OT catalog, providing users a 'one-stop shop' for such information. OT is also a partner on the NASA Lidar Access System (NLAS

  13. Auditing the Accessibility of Massive Open Online Courses (MOOCs).

    Science.gov (United States)

    Iniesto, Francisco; McAndrew, Patrick; Minocha, Shailey; Coughlan, Tim

    2017-01-01

    The outcome from the research being reported in this paper is the design of an accessibility audit to evaluate Massive Open Online Courses (MOOCs) for accessibility and to arrive at solutions and adaptations that can meet user needs. This accessibility audit includes expert-based heuristic evaluations and user-based evaluations of the MOOC platforms and individual courses.

  14. The NCAR Research Data Archive's Hybrid Approach for Data Discovery and Access

    Science.gov (United States)

    Schuster, D.; Worley, S. J.

    2013-12-01

    The NCAR Research Data Archive (RDA http://rda.ucar.edu) maintains a variety of data discovery and access capabilities for it's 600+ dataset collections to support the varying needs of a diverse user community. In-house developed and standards-based community tools offer services to more than 10,000 users annually. By number of users the largest group is external and access the RDA through web based protocols; the internal NCAR HPC users are fewer in number, but typically access more data volume. This paper will detail the data discovery and access services maintained by the RDA to support both user groups, and show metrics that illustrate how the community is using the services. The distributed search capability enabled by standards-based community tools, such as Geoportal and an OAI-PMH access point that serves multiple metadata standards, provide pathways for external users to initially discover RDA holdings. From here, in-house developed web interfaces leverage primary discovery level metadata databases that support keyword and faceted searches. Internal NCAR HPC users, or those familiar with the RDA, may go directly to the dataset collection of interest and refine their search based on rich file collection metadata. Multiple levels of metadata have proven to be invaluable for discovery within terabyte-sized archives composed of many atmospheric or oceanic levels, hundreds of parameters, and often numerous grid and time resolutions. Once users find the data they want, their access needs may vary as well. A THREDDS data server running on targeted dataset collections enables remote file access through OPENDAP and other web based protocols primarily for external users. In-house developed tools give all users the capability to submit data subset extraction and format conversion requests through scalable, HPC based delayed mode batch processing. Users can monitor their RDA-based data processing progress and receive instructions on how to access the data when it is

  15. Non-professional user`s understanding of Geographic Information

    DEFF Research Database (Denmark)

    Arleth, Mette

    2003-01-01

    of digital media, including online access to a variety of GI-based services; maps, online Geographic information systems, interactive 3D models etc. However, can we expect that a citizen, who has no relevant professional basis for understanding the concept geographic information, be able to use GI......-based online services and comprehend the information contents? Using the Gi-based online services qualitatively in the participatory process obviously requires knowledge of the non-professional user`s understanding and use of GI. This paper discusses the needs for research into this field as well as relevant...

  16. Supplement B: Research Networking Systems Characteristics Profiles. A Companion to the OCLC Research Report, Registering Researchers in Authority Files

    Science.gov (United States)

    Smith-Yoshimura, Karen; Altman, Micah; Conlon, Michael; Cristán, Ana Lupe; Dawson, Laura; Dunham, Joanne; Hickey, Thom; Hill, Amanda; Hook, Daniel; Horstmann, Wolfram; MacEwan, Andrew; Schreur, Philip; Smart, Laura; Wacker, Melanie; Woutersen, Saskia

    2014-01-01

    The OCLC Research Report, "Registering Researchers in Authority Files", [Accessible in ERIC as ED564924] summarizes the results of the research conducted by the OCLC Research Registering Researchers in Authority Files Task Group in 2012-2014. Details of this research are in supplementary data sets: (1) "Supplement A: Use Cases. A…

  17. Accessing and disclosing protected resources

    DEFF Research Database (Denmark)

    Olesen, Henning; Khajuria, Samant

    2014-01-01

    TODAY, DATA IS MONEY. Whether it is private users’ personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization. For service providers and enterpr......TODAY, DATA IS MONEY. Whether it is private users’ personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization. For service providers...... and enterprises resources are usually well safeguarded, while private users are often missing the tools and the know-how to protect their own data and preserve their privacy. The user’s personal data have become an economic asset, not necessarily to the owners of these data, but to the service providers, whose...... business mod- els often includes the use of these data. In this paper we focus on the user – service provider interaction and discuss how recent technological progress, in particular the framework of User Managed Access (UMA), can enable users to understand the value of their protected resources...

  18. The web based user interface of RODOS

    International Nuclear Information System (INIS)

    Raskob, W.; Mueller, A.; Munz, E.; Rafat, M.

    2003-01-01

    Full text: The interaction between the RODOS system and its users has three main objectives: (1) operation of the system in its automatic and interactive modes including the processing of meteorological and radiological on-line data, and the choice of module chains for performing the necessary calculations; (2) input of data defining the accident situation, such as source term information, intervention criteria and timing of emergency actions; (3) selection and presentation of results in the form of spatial and temporal distributions of activity concentrations, areas affected by emergency actions and countermeasures, and their radiological and economic consequences. Users of category A have direct access to the RODOS system via local or wide area networks through the client/server protocol Internet/X. Any internet connected X desktop machine, such as Unix workstations from different vendors, X- terminals, Linux PCs, and PCs with X-emulation can be used. A number of X-Windows based graphical user interfaces (GUIs) provide direct access to all functionalities of the RODOS system and allow for handling the various user interactions with the RODOS system described above. Among others, the user can trigger or interrupt the automatic processing mode, execute application programs simultaneously, modify and delete data, import data sets from databases, and change configuration files. As the user interacts directly with in-memory active processes, the system responses immediately after having performed the necessary calculations. For obtaining the requested results, the users must know, which chain of application software has to be selected, how to interact with their interfaces, which sort of initialization data have to be assigned, etc. This flexible interaction with RODOS implies that only experienced and well-trained users are able to operate the system and to obtain correct and sensible information. A new interface has been developed which is based an the commonly used

  19. User illusion: ideological construction of ‘user-generated content’ in the EC consultation on copyright

    Directory of Open Access Journals (Sweden)

    Kristofer Erickson

    2014-10-01

    Full Text Available Recent policy consultations by the UK Intellectual Property Office, the US Patent and Trademark Office and the European Commission (EC have highlighted the importance of user-generated content in debates to reform copyright. User-generated content (UGC – often combining existing copyright material with transformative creativity – remains a contested terrain, with no clear or widely accepted definition. This paper examines how various stakeholders in the 2014 EC consultation on copyright attempted to shape the definition of UGC in order to suit their interests, sometimes aligning or conflicting with other stakeholder groups. Data from 203 written responses by registered stakeholders (authors, platform intermediaries and users were subjected to a discourse analysis methodology. Key arguments and policy preferences from each stakeholder group are identified and discussed.

  20. A General Attribute and Rule Based Role-Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource. This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments.

  1. A Scandinavian Experience of Register Collaboration: The Nordic Arthroplasty Register Association (NARA)

    DEFF Research Database (Denmark)

    Havelin, Leif I; Robertsson, Otto; Fenstad, Anne M

    2011-01-01

    The Nordic (Scandinavian) countries have had working arthroplasty registers for several years. However, the small numbers of inhabitants and the conformity within each country with respect to preferred prosthesis brands and techniques have limited register research.......The Nordic (Scandinavian) countries have had working arthroplasty registers for several years. However, the small numbers of inhabitants and the conformity within each country with respect to preferred prosthesis brands and techniques have limited register research....

  2. Josephson shift registers

    International Nuclear Information System (INIS)

    Przybysz, J.X.

    1989-01-01

    This paper gives a review of Josephson shift register circuits that were designed, fabricated, or tested, with emphasis on work in the 1980s. Operating speed is most important, since it often limits system performance. Older designs used square-wave clocks, but most modern designs use offset sine waves, with either two or three phases. Operating margins and gate bias uniformity are key concerns. The fastest measured Josephson shift register operated at 2.3 GHz, which compares well with a GaAs shift register that consumes 250 times more power. The difficulties of high-speed testing have prevented many Josephson shift registers from being operated at their highest speeds. Computer simulations suggest that 30-GHz operation is possible with current Nb/Al 2 O 3 /Nb technology. Junctions with critical current densities near 10 kA/cm 2 would make 100-GHz shift registers feasible

  3. A survey of users and non-users of a UK teaching hospital library and information service.

    Science.gov (United States)

    Turtle, Kathleen M

    2005-12-01

    The Lancashire Teaching Hospitals NHS Trust was formed in 2002 with the merger of two existing trusts. The library services unified to create a new expanded service with 11 staff. The librarians wanted to test out users' opinions of the service, as a basis for a developmental strategy. They also wanted to find out to what extent they were offering a multi-disciplinary service, available to all staff. Therefore it was decided to include both users and non-users in the survey. A twenty-question questionnaire was sent out to a 10% sample of registered users in all staff categories. The same questionnaire was sent out to a 10% sample of non-users, with the help of the Human Resources Department. The library staff and facilities were generally well regarded. The stock needed expansion in various areas, especially allied health and biomedical science. Non-users were in fact often occasional or remote users. Other non-users needed informing that they were entitled to use the service. Further research is required, especially concerning the information needs of allied health and scientific staff. There is a need for stock expansion. A marketing strategy is required to capture the interest of potential users.

  4. Hidden costs: the direct and indirect impact of user fees on access to malaria treatment and primary care in Mali.

    Science.gov (United States)

    Johnson, Ari; Goss, Adeline; Beckerman, Jessica; Castro, Arachu

    2012-11-01

    About 20 years after initial calls for the introduction of user fees in health systems in sub-Saharan Africa, a growing coalition is advocating for their removal. Several African countries have abolished user fees for health care for some or all of their citizens. However, fee-for-service health care delivery remains a primary health care funding model in many countries in sub-Saharan Africa. Although the impact of user fees on utilization of health services and household finances has been studied extensively, further research is needed to characterize the multi-faceted health and social problems associated with charging user fees. This ethnographic study aims to identify consequences of user fees on gender inequality, food insecurity, and household decision-making for a group of women living in poverty. Ethnographic life history interviews were conducted with 24 women in Yirimadjo, Mali in 2007. Purposive sampling selected participants across a broad socio-economic spectrum. Semi-structured interviews addressed participants' past medical history, socio-economic status, social and family history, and access to health care. Interview transcripts were coded using the guiding analytical framework of structural violence. Interviews revealed that user fees for health care not only decreased utilization of health services, but also resulted in delayed presentation for care, incomplete or inadequate care, compromised food security and household financial security, and reduced agency for women in health care decision making. The effects of user fees were amplified by conditions of poverty, as well as gender and health inequality; user fees in turn reinforced the inequalities created by those very conditions. The qualitative data reveal multi-faceted health and socioeconomic effects of user fees, and illustrate that user fees for health care may impact quality of care, health outcomes, food insecurity, and gender inequality, in addition to impacting health care utilization

  5. User's manual for the National Water-Quality Assessment Program Invertebrate Data Analysis System (IDAS) software, version 5

    Science.gov (United States)

    Cuffney, Thomas F.; Brightbill, Robin A.

    2011-01-01

    The Invertebrate Data Analysis System (IDAS) software was developed to provide an accurate, consistent, and efficient mechanism for analyzing invertebrate data collected as part of the U.S. Geological Survey National Water-Quality Assessment (NAWQA) Program. The IDAS software is a stand-alone program for personal computers that run Microsoft Windows(Registered). It allows users to read data downloaded from the NAWQA Program Biological Transactional Database (Bio-TDB) or to import data from other sources either as Microsoft Excel(Registered) or Microsoft Access(Registered) files. The program consists of five modules: Edit Data, Data Preparation, Calculate Community Metrics, Calculate Diversities and Similarities, and Data Export. The Edit Data module allows the user to subset data on the basis of taxonomy or sample type, extract a random subsample of data, combine or delete data, summarize distributions, resolve ambiguous taxa (see glossary) and conditional/provisional taxa, import non-NAWQA data, and maintain and create files of invertebrate attributes that are used in the calculation of invertebrate metrics. The Data Preparation module allows the user to select the type(s) of sample(s) to process, calculate densities, delete taxa on the basis of laboratory processing notes, delete pupae or terrestrial adults, combine lifestages or keep them separate, select a lowest taxonomic level for analysis, delete rare taxa on the basis of the number of sites where a taxon occurs and (or) the abundance of a taxon in a sample, and resolve taxonomic ambiguities by one of four methods. The Calculate Community Metrics module allows the user to calculate 184 community metrics, including metrics based on organism tolerances, functional feeding groups, and behavior. The Calculate Diversities and Similarities module allows the user to calculate nine diversity and eight similarity indices. The Data Export module allows the user to export data to other software packages (CANOCO, Primer

  6. State-Transition-Aware Spilling Heuristic for MLC STT-RAM-Based Registers

    Directory of Open Access Journals (Sweden)

    Yuanhui Ni

    2017-01-01

    Full Text Available Multilevel Cell Spin-Transfer Torque Random Access Memory (MLC STT-RAM is a promising nonvolatile memory technology to build registers for its natural immunity to electromagnetic radiation in rad-hard space environment. Unlike traditional SRAM-based registers, MLC STT-RAM exhibits unbalanced write state transitions due to the fact that the magnetization directions of hard and soft domains cannot be flipped independently. This feature leads to nonuniform costs of write states in terms of latency and energy. However, current SRAM-targeting register allocations do not have a clear understanding of the impact of the different write state-transition costs. As a result, those approaches heuristically select variables to be spilled without considering the spilling priority imposed by MLC STT-RAM. Aiming to address this limitation, this paper proposes a state-transition-aware spilling cost minimization (SSCM policy, to save power when MLC STT-RAM is employed in register design. Specifically, the spilling cost model is first constructed according to the linear combination of different state-transition frequencies. Directed by the proposed cost model, the compiler picks up spilling candidates to achieve lower power and higher performance. Experimental results show that the proposed SSCM technique can save energy by 19.4% and improve the lifetime by 23.2% of MLC STT-RAM-based register design.

  7. On Web User Tracking: How Third-Party Http Requests Track Users' Browsing Patterns for Personalised Advertising

    OpenAIRE

    Puglisi, Silvia; Rebollo-Monedero, David; Forné, Jordi

    2016-01-01

    On today's Web, users trade access to their private data for content and services. Advertising sustains the business model of many websites and applications. Efficient and successful advertising relies on predicting users' actions and tastes to suggest a range of products to buy. It follows that, while surfing the Web users leave traces regarding their identity in the form of activity patterns and unstructured data. We analyse how advertising networks build user footprints and how the sugg...

  8. Envisioning Advanced User Interfaces for E-Government Applications: A Case Study

    Science.gov (United States)

    Calvary, Gaëlle; Serna, Audrey; Coutaz, Joëlle; Scapin, Dominique; Pontico, Florence; Winckler, Marco

    The increasing use of the Web as a software platform together with the advance of technology has promoted Web applications as a starting point for improving communication between citizens and administration. Currently, several e-government Web portals propose applications for accessing information regarding healthcare, taxation, registration, housing, agriculture, education, and social services, which otherwise may be difficult to obtain. However, the adoption of services provided to citizens depends upon how such applications comply with the users' needs. Unfortunately, building an e-government website doesn't guarantee that all citizens who come to use it can access its contents. These services need to be accessible to all citizens/customers equally to ensure wider reach and subsequent adoption of the e-government services. User disabilities, computer or language illiteracy (e.g., foreign language), flexibility on information access (e.g., user remotely located in rural areas, homeless, mobile users), and ensuring user privacy on sensitive data are some of the barriers that must be taken into account when designing the User Interface (UI) of e-government applications.

  9. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    2016-08-01

    Full Text Available In wireless sensor networks (WSNs, a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  10. An End User Development Approach for Mobile Web Augmentation

    Directory of Open Access Journals (Sweden)

    Gabriela Bosetti

    2017-01-01

    Full Text Available The trend towards mobile devices usage has made it possible for the Web to be conceived not only as an information space but also as a ubiquitous platform where users perform all kinds of tasks. In some cases, users access the Web with native mobile applications developed for well-known sites, such as, LinkedIn, Facebook, and Twitter. These native applications might offer further (e.g., location-based functionalities to their users in comparison with their corresponding Web sites because they were developed with mobile features in mind. However, many Web applications have no native counterpart and users access them using a mobile Web browser. Although the access to context information is not a complex issue nowadays, not all Web applications adapt themselves according to it or diversely improve the user experience by listening to a wide range of sensors. At some point, users might want to add mobile features to these Web sites, even if those features were not originally supported. In this paper, we present a novel approach to allow end users to augment their preferred Web sites with mobile features. We support our claims by presenting a framework for mobile Web augmentation, an authoring tool, and an evaluation with 21 end users.

  11. Globus Identity, Access, and Data Management: Platform Services for Collaborative Science

    Science.gov (United States)

    Ananthakrishnan, R.; Foster, I.; Wagner, R.

    2016-12-01

    Globus is software-as-a-service for research data management, developed at, and operated by, the University of Chicago. Globus, accessible at www.globus.org, provides high speed, secure file transfer; file sharing directly from existing storage systems; and data publication to institutional repositories. 40,000 registered users have used Globus to transfer tens of billions of files totaling hundreds of petabytes between more than 10,000 storage systems within campuses and national laboratories in the US and internationally. Web, command line, and REST interfaces support both interactive use and integration into applications and infrastructures. An important component of the Globus system is its foundational identity and access management (IAM) platform service, Globus Auth. Both Globus research data management and other applications use Globus Auth for brokering authentication and authorization interactions between end-users, identity providers, resource servers (services), and a range of clients, including web, mobile, and desktop applications, and other services. Compliant with important standards such as OAuth, OpenID, and SAML, Globus Auth provides mechanisms required for an extensible, integrated ecosystem of services and clients for the research and education community. It underpins projects such as the US National Science Foundation's XSEDE system, NCAR's Research Data Archive, and the DOE Systems Biology Knowledge Base. Current work is extending Globus services to be compliant with FEDRAMP standards for security assessment, authorization, and monitoring for cloud services. We will present Globus IAM solutions and give examples of Globus use in various projects for federated access to resources. We will also describe how Globus Auth and Globus research data management capabilities enable rapid development and low-cost operations of secure data sharing platforms that leverage Globus services and integrate them with local policy and security.

  12. Arthroplasty register for Germany

    Directory of Open Access Journals (Sweden)

    Hagen, Anja

    2009-10-01

    Full Text Available Scientific background: The annual number of joint replacement operations in Germany is high. The introduction of an arthroplasty register promises an important contribution to the improvement of the quality of patient’s care. Research questions: The presented report addresses the questions on organization and functioning, benefits and cost-benefits as well as on legal, ethical and social aspects of the arthroplasty registers. Methods: A systematic literature search was conducted in September 2008 in the medical databases MEDLINE, EMBASE etc. and was complemented with a hand search. Documents describing arthroplasty registers and/or their relevance as well as papers on legal, ethical and social aspects of such registers were included in the evaluation. The most important information was extracted and analysed. Results: Data concerning 30 arthroplasty registers in 19 countries as well as one international arthroplasty register were identified. Most of the arthroplasty registers are maintained by national orthopedic societies, others by health authorities or by their cooperation. Mostly, registries are financially supported by governments and rarely by other sources.The participation of the orthopedists in the data collection process of the arthroplasty registry is voluntary in most countries. The consent of the patients is usually required. The unique patient identification is ensured in nearly all registers.Each data set consists of patient and clinic identification numbers, data on diagnosis, the performed intervention, the operation date and implanted prostheses. The use of clinical scores, patient-reported questionnaires and radiological documentation is rare. Methods for data documentation and transfer are paper form, electronic entry as well as scanning of the data using bar codes. The data are mostly being checked for their completeness and validity. Most registers offer results of the data evaluation to the treating orthopedists and

  13. Guidelines for Accessibility to Microblogging: an Integral Approach

    OpenAIRE

    Martín García, Yod Samuel; Álvarez Alba, Laura; Yelmo Garcia, Juan Carlos

    2011-01-01

    Microblogging is one of the most popular user-generated media, hence its accessibility has a large impact for users. However, the accessibility of this medium is poor in practice, due to the combination of bad practices by different agents ranging from the providers that host microblogging services to prosumers that post contents to them. Here we present an accessibility-oriented model of microblogging services, analyze the impact of its components, and propose guidelines for each of them to ...

  14. GO RIO: Achieving Universal Access to Mass Transit

    Science.gov (United States)

    Martinez, Ted, Jr.; Castaneda-Calleros, Russell

    2009-01-01

    GO RIO is a universal access, mass-transit program that has been offered to all students who are registered full-time at Rio Hondo College. Through an agreement with five local transit agencies, full-time students can obtain a pass that provides full access seven days a week throughout the entire semester.

  15. Flexible Access Control for Dynamic Collaborative Environments

    NARCIS (Netherlands)

    Dekker, M.A.C.

    2009-01-01

    Access control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect

  16. Do hip prosthesis related infection codes in administrative discharge registers correctly classify periprosthetic hip joint infection?

    DEFF Research Database (Denmark)

    Lange, Jeppe; Pedersen, Alma B; Troelsen, Anders

    2015-01-01

    PURPOSE: Administrative discharge registers could be a valuable and easily accessible single-sources for research data on periprosthetic hip joint infection. The aim of this study was to estimate the positive predictive value of the International Classification of Disease 10th revision (ICD-10...... in future single-source register based studies, but preferably should be used in combination with alternate data sources to ensure higher validity....... decreased to 82% (95% CI: 72-89). CONCLUSIONS: Misclassification must be expected and taken into consideration when using administrative discharge registers for epidemiological research on periprosthetic hip joint infection. We believe that the periprosthetic hip joint infection diagnosis code can be of use...

  17. Accessing VA Healthcare During Large-Scale Natural Disasters.

    Science.gov (United States)

    Der-Martirosian, Claudia; Pinnock, Laura; Dobalian, Aram

    2017-01-01

    Natural disasters can lead to the closure of medical facilities including the Veterans Affairs (VA), thus impacting access to healthcare for U.S. military veteran VA users. We examined the characteristics of VA patients who reported having difficulty accessing care if their usual source of VA care was closed because of natural disasters. A total of 2,264 veteran VA users living in the U.S. northeast region participated in a 2015 cross-sectional representative survey. The study used VA administrative data in a complex stratified survey design with a multimode approach. A total of 36% of veteran VA users reported having difficulty accessing care elsewhere, negatively impacting the functionally impaired and lower income VA patients.

  18. Digital Watermarks Enabling E-Commerce Strategies: Conditional and User Specific Access to Services and Resources

    Science.gov (United States)

    Dittmann, Jana; Steinebach, Martin; Wohlmacher, Petra; Ackermann, Ralf

    2002-12-01

    Digital watermarking is well known as enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multimedia data and analyze the spread spectrum of the data over networks and servers. Research has shown that data hiding techniques can be applied successfully to other application areas like manipulations recognition. In this paper, we show our innovative approach for integrating watermark and cryptography based methods within a framework of new application scenarios spanning a wide range from dedicated and user specific services, "Try&Buy" mechanisms to general means for long-term customer relationships. The tremendous recent efforts to develop and deploy ubiquitous mobile communication possibilities are changing the demands but also possibilities for establishing new business and commerce relationships. Especially we motivate annotation watermarks and aspects of M-Commerce to show important scenarios for access control. Based on a description of the challenges of the application domain and our latest work we discuss, which methods can be used for establishing services in a fast convenient and secure way for conditional access services based on digital watermarking combined with cryptographic techniques. We introduce an example scenario for digital audio and an overview of steps in order to establish these concepts practically.

  19. Conviviality-driven access control policy

    NARCIS (Netherlands)

    El Kateb, Donia; Zannone, N.; Moawad, Assaad; Caire, Patrice; Nain, Grégory; Mouelhi, Tejeddine; Le Traon, Yves

    2015-01-01

    Nowadays many organizations experience security incidents due to unauthorized access to information. To reduce the risk of such incidents, security policies are often employed to regulate access to information. Such policies, however, are often too restrictive, and users do not have the rights

  20. Revocable Anonymous Access to the Internet?

    Science.gov (United States)

    Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos

    2003-01-01

    Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…

  1. Livestock Fadama users' access to information on selected livestock ...

    African Journals Online (AJOL)

    The FUGs members never had access to information on key livestock technologies like artificial insemination, automated feeding, feed formulation and creep feeding. Farmers' number of years of formal education (r = -0.09) and family size (r= 0.09) had no significant relationships with respondents' access to information on ...

  2. Access Control Based on Trail Inference

    Directory of Open Access Journals (Sweden)

    ALBARELO, P. C.

    2015-06-01

    Full Text Available Professionals are constantly seeking qualification and consequently increasing their knowledge in their area of expertise. Thus, it is interesting to develop a computer system that knows its users and their work history. Using this information, even in the case of professional role change, the system could allow the renewed authorization for activities, based on previously authorized use. This article proposes a model for user access control that is embedded in a context-aware environment. The model applies the concept of trails to manage access control, recording activities usage in contexts and applying this history as a criterion to grant new accesses. Despite the fact that previous related research works consider contexts, none of them uses the concept of trails. Hence, the main contribution of this work is the use of a new access control criterion, namely, the history of previous accesses (trails. A prototype was implemented and applied in an evaluation based on scenarios. The results demonstrate the feasibility of the proposal, allowing for access control systems to use an alternative way to support access rights.

  3. Access Data Analysis Cookbook

    CERN Document Server

    Bluttman, Ken

    2008-01-01

    This book offers practical recipes to solve a variety of common problems that users have with extracting Access data and performing calculations on it. Whether you use Access 2007 or an earlier version, this book will teach you new methods to query data, different ways to move data in and out of Access, how to calculate answers to financial and investment issues, how to jump beyond SQL by manipulating data with VBA, and more.

  4. Rural providers' access to online resources: a randomized controlled trial

    Science.gov (United States)

    Hall, Laura J.; McElfresh, Karen R.; Warner, Teddy D.; Stromberg, Tiffany L.; Trost, Jaren; Jelinek, Devin A.

    2016-01-01

    Objective The research determined the usage and satisfaction levels with one of two point-of-care (PoC) resources among health care providers in a rural state. Methods In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants' attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA), paired t tests, and Cohen's d statistic to compare pre- and post-study effects sizes. Results Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to “about right amounts of information” at the completion of the study. DynaMed users reported a Cohen's d increase of +1.50 compared to AccessMedicine users' reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen's d. Conclusion Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine. PMID:26807050

  5. The iMars WebGIS - A Central Hub for Displaying and Distributing Co-Registered Data of Mars

    Science.gov (United States)

    van Gasselt, S.; Morley, J.; Houghton, R.; Bamford, S.; Ivanov, A.; Muller, J.-P.; Yershov, V.; Sidiripoulos, P.; Gwinner, K.; Waehlisch, M.; Kim, J. R.

    2014-04-01

    The iMars-project [1] is an EU funded R&D project which has started in 2014 and which is aimed at developing an automated processing system for generating image stacks of high-precision, co-registered, terrain-corrected and multi-temporal data of Mars obtained since 1977. It is anticipated that the entire NASA and ESA record of orbital image data will be co-registered and terrain-corrected in 2015 [1] so that time-series data can be generated for subsequent analyses. Such analyses will be conducted automatically using change-detection algorithms or interactively and visually using the citizen-science concept implemented at Zooniverse [2]. For more detailed information see [1] and visit the project's website at http://www.i-Mars.eu. Close user interaction plays a paramount role within iMars which requires sophisticated concepts for data handling and communication allowing users to integrate, analyse and visualise data from a central location. This interactive data hub will be realised through open-source webGIS implementations and by providing webGIS services to the user community using established OGC-protocols (see Fig. 1, [3, 4, 5]).

  6. Vote to link: Recovering from misbehaving anonymous users

    NARCIS (Netherlands)

    Lueks, W.; Everts, M.H.; Hoepman, J.H.

    2016-01-01

    Service providers are often reluctant to support anonymous access, because this makes it hard to deal with misbehaving users. Anonymous blacklisting and reputation systems can help prevent misbehaving users from causing more damage. However, by the time the user is blocked or has lost reputation,

  7. Viability of a New Road Infrastructure with Heterogeneous Users in Madrid Access

    OpenAIRE

    Pedro Cantos-Sanchez; Rafael Moner-Colonques; Jose J. Sempere-Monerris; Oscar Alvarez

    2008-01-01

    This paper explores the importance of heterogeneity in value of time when assessing the viability of a new road infrastructure to alleviate congestion problems. The Spanish government has developed a congestion pricing demonstration entering Madrid city centre, where road users have to choose between a free but highly congested road and a priced free-flowing road. We consider a continuum of users who differ in their value of time. Users dislike congestion and this is more so the more a user v...

  8. Wheelchair accessibility to public buildings in Istanbul.

    Science.gov (United States)

    Evcil, A Nilay

    2009-03-01

    Accessibility to public environment is the human right and basic need of each citizen and is one of the fundamental considerations for urban planning. The aim of this study is to determine the compliance of public buildings in central business districts (CBD) of Istanbul, Turkey, to wheelchair accessibility to the guidelines of the instrument and identify architectural barriers faced by wheelchair users. This is a descriptive study of 26 public buildings in CBD of Istanbul. The instrument used is the adapted Useh, Moyo and Munyonga questionnaire to collect the data from direct observation and measurement. Descriptive statistics of simple percentages and means are used to explain the compliance to the guidelines of the instrument and wheelchair accessibility. The descriptive survey results indicate that wheelchair users experience many accessibility problems in public environment of the most urbanised city (cultural capital of Europe in 2010) in a developing country. It is found that the major architectural barrier is the public transportation items with the lowest mean compliance (25%). Beside this, the most compliant to the instrument is entrance to building items with 79% as mean percentage. It is also found that there is an intention to improve accessibility when building construction period is investigated. This article describes the example of the compliance of public buildings accessibility when the country has legislation, but lacking regulations about accessibility for the wheelchair users.

  9. The Ocean Observatories Initiative: Unprecedented access to real-time data streaming from the Cabled Array through OOI Cyberinfrastructure

    Science.gov (United States)

    Knuth, F.; Vardaro, M.; Belabbassi, L.; Smith, M. J.; Garzio, L. M.; Crowley, M. F.; Kerfoot, J.; Kawka, O. E.

    2016-02-01

    The National Science Foundation's Ocean Observatories Initiative (OOI), is a broad-scale, multidisciplinary facility that will transform oceanographic research by providing users with unprecedented access to long-term datasets from a variety of deployed physical, chemical, biological, and geological sensors. The Cabled Array component of the OOI, installed and operated by the University of Washington, is located on the Juan de Fuca tectonic plate off the coast of Oregon. It is a unique network of >100 cabled instruments and instrumented moorings transmitting data to shore in real-time via fiber optic technology. Instruments now installed include HD video and digital still cameras, mass spectrometers, a resistivity-temperature probe inside the orifice of a high-temperature hydrothermal vent, upward-looking ADCP's, pH and pC02 sensors, Horizontal Electrometer Pressure Inverted Echosounders and many others. Here, we present the technical aspects of data streaming from the Cabled Array through the OOI Cyberinfrastructure. We illustrate the types of instruments and data products available, data volume and density, processing levels and algorithms used, data delivery methods, file formats and access methods through the graphical user interface. Our goal is to facilitate the use and access to these unprecedented, co-registered oceanographic datasets. We encourage researchers to collaborate through the use of these simultaneous, interdisciplinary measurements, in the exploration of short-lived events (tectonic, volcanic, biological, severe storms), as well as long-term trends in ocean systems (circulation patterns, climate change, ocean acidity, ecosystem shifts).

  10. Reported Design Processes for Accessibility in Rail Transport

    DEFF Research Database (Denmark)

    Herriott, Richard; Cook, Sharon

    2014-01-01

    Accessibility is a fundamental requirement in public transport (PT) yet there exists little research on design for accessibility or inclusive design (ID) in this area. This paper sets out to discover what methods are used in the rail sector to achieve accessibility goals and to examine how far...... these methods deviate from user-centred and ID norms. Semi-structured interviews were conducted with nine rolling stock producers, operators and design consultancies. The purpose was to determine if ID design methods are used explicitly and the extent to which the processes used conformed to ID (if at all......). The research found that the role of users in the design process of manufacturers was limited and that compliance with industry standards was the dominant means to achieving accessibility goals. Design consultancies were willing to apply more user-centred design if the client requested it. Where operators were...

  11. Design and simulations of a spectral efficient optical code division multiple access scheme using alternated energy differentiation and single-user soft-decision demodulation

    Science.gov (United States)

    A. Garba, Aminata

    2017-01-01

    This paper presents a new approach to optical Code Division Multiple Access (CDMA) network transmission scheme using alternated amplitude sequences and energy differentiation at the transmitters to allow concurrent and secure transmission of several signals. The proposed system uses error control encoding and soft-decision demodulation to reduce the multi-user interference at the receivers. The design of the proposed alternated amplitude sequences, the OCDMA energy modulators and the soft decision, single-user demodulators are also presented. Simulation results show that the proposed scheme allows achieving spectral efficiencies higher than several reported results for optical CDMA and much higher than the Gaussian CDMA capacity limit.

  12. Interfaces for End-User Information Seeking.

    Science.gov (United States)

    Marchionini, Gary

    1992-01-01

    Discusses essential features of interfaces to support end-user information seeking. Highlights include cognitive engineering; task models and task analysis; the problem-solving nature of information seeking; examples of systems for end-users, including online public access catalogs (OPACs), hypertext, and help systems; and suggested research…

  13. User recruitment, training, and support at NOAO Data Lab

    Science.gov (United States)

    Nikutta, Robert; Fitzpatrick, Michael J.; NOAO Data Lab

    2018-06-01

    The NOAO Data Lab (datalab.noao.edu) is a fully-fledged science data & analysis platform. However, simply building a science platform is notenough to declare it a success. Like any such system built for users, it needs actual users who see enough value in it to be willing toovercome the inertia of registering an account, studying the documentation, working through examples, and ultimately attempting tosolve their own science problems using the platform. The NOAO Data Lab has been open to users since June 2016. In this past year we haveregistered hundreds of users and improved the system, not least through the interaction with and feedback from our users. The posterwill delineate our efforts to recruit new users through conference presentations, platform demos and user workshops, and what we do toassure that users experience their first steps and their learning process with Data Lab as easy, competent, and inspiring. It will alsopresent our efforts in user retention and user support, from a human-staffed helpdesk, to one-on-one sessions, to regular"bring-your-own-problem (BYOP)" in-house sessions with interested users.

  14. Users mnemonic passwords: An empirical analysis | Egwali ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 21, No 1 (2014) >. Log in or Register to get access to full text downloads.

  15. Choice, Inclusion, and Access to Information: Understanding Female Farmers’ Participation in Kyrgyzstan’s Water-User Associations

    Directory of Open Access Journals (Sweden)

    Rebecca Nixon

    2017-12-01

    Full Text Available Participatory processes have been widely promoted within the field of natural resource management as a method of supporting efficient resource use and, within these processes, much emphasis has been placed on gendered participation. In Kyrgyzstan, participation in irrigation management is organized through water-user associations (WUAs, a decentralized system of management commonly prescribed to increase equity and efficiency in water distribution. Women in Kyrgyzstan are active in irrigated agriculture particularly in light of changing demographics due to labor migration, yet they make up a small percentage of the members and leaders in these WUAs. This study draws upon interviews with WUA officials, village leaders, and female farmers in five communities in southern Kyrgyzstan to examine the determinants of female farmers’ participation in WUAs. We argue that female farmers are strategic in how they choose to irrigate outside of the WUAs as users or participate in WUAs as members or leaders, however their gender, age, and class limits their access to information about WUAs and inclusion in WUA activities. These findings suggest the need to reassess participatory processes in WUAs in order to increase female farmers’ inclusion in WUAs and demonstrates the complexity of gendered participation in natural resource management.

  16. Incentive Mechanism for P2P Content Sharing over Heterogenous Access Networks

    Science.gov (United States)

    Sato, Kenichiro; Hashimoto, Ryo; Yoshino, Makoto; Shinkuma, Ryoichi; Takahashi, Tatsuro

    In peer-to-peer (P2P) content sharing, users can share their content by contributing their own resources to one another. However, since there is no incentive for contributing contents or resources to others, users may attempt to obtain content without any contribution. To motivate users to contribute their resources to the service, incentive-rewarding mechanisms have been proposed. On the other hand, emerging wireless technologies, such as IEEE 802.11 wireless local area networks, beyond third generation (B3G) cellular networks and mobile WiMAX, provide high-speed Internet access for wireless users. Using these high-speed wireless access, wireless users can use P2P services and share their content with other wireless users and with fixed users. However, this diversification of access networks makes it difficult to appropriately assign rewards to each user according to their contributions. This is because the cost necessary for contribution is different in different access networks. In this paper, we propose a novel incentive-rewarding mechanism called EMOTIVER that can assign rewards to users appropriately. The proposed mechanism uses an external evaluator and interactive learning agents. We also investigate a way of appropriately controlling rewards based on the system service's quality and managing policy.

  17. Graphical user interface for accessing water-quality data for the Devils Lake basin, North Dakota

    Science.gov (United States)

    Ryberg, Karen R.; Damschen, William C.; Vecchia, Aldo V.

    2005-01-01

    Maintaining the quality of surface waters in the Devils Lake Basin in North Dakota is important for protecting the agricultural resources, fisheries, waterfowl and wildlife habitat, and recreational value of the basin. The U.S. Geological Survey, in cooperation with local, State, and Federal agencies, has collected and analyzed water-quality samples from streams and lakes in the basin since 1957, and the North Dakota Department of Health has collected and analyzed water-quality samples from lakes in the basin since 2001. Because water-quality data for the basin are important for numerous reasons, a graphical user interface was developed to access, view, and download the historical data for the basin. The interface is a web-based application that is available to the public and includes data through water year 2003. The interface will be updated periodically to include data for subsequent years.

  18. Mandatory and Location-Aware Access Control for Relational Databases

    Science.gov (United States)

    Decker, Michael

    Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.

  19. Proximity Displays for Access Control

    Science.gov (United States)

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  20. Multiple-Access Quantum-Classical Networks

    Science.gov (United States)

    Razavi, Mohsen

    2011-10-01

    A multi-user network that supports both classical and quantum communication is proposed. By relying on optical code-division multiple access techniques, this system offers simultaneous key exchange between multiple pairs of network users. A lower bound on the secure key generation rate will be derived for decoy-state quantum key distribution protocols.

  1. Network Interface Specification for the T1 Microprocessor

    Science.gov (United States)

    1994-05-01

    details of the data transfer functional units, interconnect structure, and network operation. Application Layer Communication Model Communication...use of the communication resources. 3.6 Network Virtualisation The CNS-1 is designed for single-user, batch-style processing; no timesharing or space...matches the count register (both the timer and count register are in the network interface and are user-accessible). Although this function is not strictly

  2. Exposing the Strategies that Can Reduce the Obstacles: Improving the Science User Experience

    Science.gov (United States)

    Lindsay, Francis E.; Brennan, Jennifer; Behnke, Jeanne; Lynnes, Chris

    2017-01-01

    It is now well established that pursuing generic solutions to what seem are common problems in Earth science data access and use can often lead to disappointing results for both system developers and the intended users. This presentation focuses on real-world experience of managing a large and complex data system, NASAs Earth Science Data and Information Science System (EOSDIS), whose mission is to serve both broad user communities and those in smaller niche applications of Earth science data and services. In the talk, we focus on our experiences with known data user obstacles characterizing EOSDIS approaches, including various technological techniques, for engaging and bolstering, where possible, user experiences with EOSDIS. For improving how existing and prospective users discover and access NASA data from EOSDIS we introduce our cross-archive tool: Earthdata Search. This new search and order tool further empowers users to quickly access data sets using clever and intuitive features. The Worldview data visualization tool is also discussed highlighting how many users are now performing extensive data exploration without necessarily downloading data. Also, we explore our EOSDIS data discovery and access webinars, data recipes and short tutorials, targeted technical and data publications, user profiles and social media as additional tools and methods used for improving our outreach and communications to a diverse user community. These efforts have paid substantial dividends for our user communities by allowing us to target discipline specific community needs. The desired take-away from this presentation will be an improved understanding of how EOSDIS has approached, and in several instances achieved, removing or lowering the barriers to data access and use. As we look ahead to more complex Earth science missions, EOSDIS will continue to focus on our user communities, both broad and specialized, so that our overall data system can continue to serve the needs of

  3. Exposing the Strategies that can Reduce the Obstacles: Improving the Science User Experience

    Science.gov (United States)

    Lindsay, F. E.; Brennan, J.; Behnke, J.; Lynnes, C.

    2017-12-01

    It is now well established that pursuing generic solutions to what seem are common problems in Earth science data access and use can often lead to disappointing results for both system developers and the intended users. This presentation focuses on real-world experience of managing a large and complex data system, NASA's Earth Science Data and Information Science System (EOSDIS), whose mission is to serve both broad user communities and those in smaller niche applications of Earth science data and services. In the talk, we focus on our experiences with known data user obstacles characterizing EOSDIS approaches, including various technological techniques, for engaging and bolstering, where possible, user experiences with EOSDIS. For improving how existing and prospective users discover and access NASA data from EOSDIS we introduce our cross-archive tool: Earthdata Search. This new search and order tool further empowers users to quickly access data sets using clever and intuitive features. The Worldview data visualization tool is also discussed highlighting how many users are now performing extensive data exploration without necessarily downloading data. Also, we explore our EOSDIS data discovery and access webinars, data recipes and short tutorials, targeted technical and data publications, user profiles and and social media as additional tools and methods used for improving our outreach and communications to a diverse user community. These efforts have paid substantial dividends for our user communities by allowing us to target discipline specific community needs. The desired take-away from this presentation will be an improved understanding of how EOSDIS has approached, and in several instances achieved, removing or lowering the barriers to data access and use. As we look ahead to more complex Earth science missions, EOSDIS will continue to focus on our user communities, both broad and specialized, so that our overall data system can continue to serve the needs of

  4. x509-free access to WLCG resources

    OpenAIRE

    Short, H; Manzi, A; De Notaris, V; Keeble, O; Kiryanov, A; Mikkonen, H; Tedesco, P; Wartel, R

    2017-01-01

    Access to WLCG resources is authenticated using an x509 and PKI infrastructure. Even though HEP users have always been exposed to certificates directly, the development of modern Web Applications by the LHC experiments calls for simplified authentication processes keeping the underlying software unmodified. In this work we will show a solution with the goal of providing access to WLCG resources using the user’s home organisations credentials, without the need for user-acquired x509 certificat...

  5. Sign Compute Resolve for Random Access

    DEFF Research Database (Denmark)

    Goseling, Jasper; Stefanovic, Cedomir; Popovski, Petar

    2014-01-01

    users collide. We measure the performance of the proposed method in terms of user resolution rate as well as overall throughput of the system. The results show that our approach significantly increases the performance of the system even compared to coded random access, where collisions are not wasted......We present an approach to random access that is based on three elements: physical-layer network coding, signature codes and tree splitting. Upon occurrence of a collision, physical-layer network coding enables the receiver to decode the sum of the information that was transmitted by the individual...

  6. EARS: Electronic Access to Reference Service.

    Science.gov (United States)

    Weise, F O; Borgendale, M

    1986-10-01

    Electronic Access to Reference Service (EARS) is a front end to the Health Sciences Library's electronic mail system, with links to the online public catalog. EARS, which became operational in September 1984, is accessed by users at remote sites with either a terminal or microcomputer. It is menu-driven, allowing users to request: a computerized literature search, reference information, a photocopy of a journal article, or a book. This paper traces the history of EARS and discusses its use, its impact on library staff and services, and factors that influence the diffusion of new technology.

  7. Barriers to treatment access for Chagas disease in Mexico.

    Science.gov (United States)

    Manne, Jennifer M; Snively, Callae S; Ramsey, Janine M; Salgado, Marco Ocampo; Bärnighausen, Till; Reich, Michael R

    2013-01-01

    According to World Health Organization (WHO) prevalence estimates, 1.1 million people in Mexico are infected with Trypanosoma cruzi, the etiologic agent of Chagas disease (CD). However, limited information is available about access to antitrypanosomal treatment. This study assesses the extent of access in Mexico, analyzes the barriers to access, and suggests strategies to overcome them. Semi-structured in-depth interviews were conducted with 18 key informants and policymakers at the national level in Mexico. Data on CD cases, relevant policy documents and interview data were analyzed using the Flagship Framework for Pharmaceutical Policy Reform policy interventions: regulation, financing, payment, organization, and persuasion. Data showed that 3,013 cases were registered nationally from 2007-2011, representing 0.41% of total expected cases based on Mexico's national prevalence estimate. In four of five years, new registered cases were below national targets by 11-36%. Of 1,329 cases registered nationally in 2010-2011, 834 received treatment, 120 were pending treatment as of January 2012, and the treatment status of 375 was unknown. The analysis revealed that the national program mainly coordinated donation of nifurtimox and that important obstacles to access include the exclusion of antitrypanosomal medicines from the national formulary (regulation), historical exclusion of CD from the social insurance package (organization), absence of national clinical guidelines (organization), and limited provider awareness (persuasion). Efforts to treat CD in Mexico indicate an increased commitment to addressing this disease. Access to treatment could be advanced by improving the importation process for antitrypanosomal medicines and adding them to the national formulary, increasing education for healthcare providers, and strengthening clinical guidelines. These recommendations have important implications for other countries in the region with similar problems in access to

  8. A Precoded OFDMA System with User Cooperation

    NARCIS (Netherlands)

    Yu, Yao; Yatawatta, Sarod; Petropulu, Athina P.

    2010-01-01

    A new cooperative scheme for a two-user orthogonal frequency division multiple access (OFDMA) uplink communication scenario is proposed. Each user is equipped with one transmit/receive antenna. Before transmission, inter-block linear precoding is introduced to pairs of blocks. The cooperative

  9. MUTAGEN: Multi-user tool for annotating GENomes

    DEFF Research Database (Denmark)

    Brugger, K.; Redder, P.; Skovgaard, Marie

    2003-01-01

    MUTAGEN is a free prokaryotic annotation system. It offers the advantages of genome comparison, graphical sequence browsers, search facilities and open-source for user-specific adjustments. The web-interface allows several users to access the system from standard desktop computers. The Sulfolobus...

  10. The principle of public access to official documents in Sweden

    International Nuclear Information System (INIS)

    Persson, I.

    2001-01-01

    In Sweden, access to information is considered one of the cornerstones of the free democratic exchange of views. It is not enough that public authorities give information about their work. Public activities shall be open to the citizens and the media in such a way that they can choose the information they wish to obtain, without having to rely on public information services. An official document is public, it must be kept available to anyone who wishes to peruse it. Official documents are registered in a public register in order to allow to anyone to exercise their right of access to official document. (N.C.)

  11. Internet access and usage by staff and students: a case study of ...

    African Journals Online (AJOL)

    This study focused on Internet access and usage by staff and students in the University of Jos Main Library. It investigated monthly number of users that queued to access Internet monthly and the number of users who actually had access to use the Internet between January – December 2006. Other things investigated ...

  12. Progress Report Phase I: Use, access, and fire/fuels management attitudes and preferences of user groups concerning the Valles Caldera National Preserve (VCNP) and adjacent areas

    Science.gov (United States)

    Kurt F. Anschuetz; Carol B. Raish

    2010-01-01

    This document represents a progress report of activities completed during Phase I of the study titled, Use, Access, and Fire/Fuels Management Attitudes and Preferences of User Groups Concerning the Valles Caldera National Preserve (VCNP) and Adjacent Areas, and the preliminary findings of this work.

  13. Pattern and predictors of sick leave among users of antidepressants: a Danish retrospective register-based cohort study.

    Science.gov (United States)

    Gasse, Christiane; Petersen, Liselotte; Chollet, Julien; Saragoussi, Delphine

    2013-12-01

    Depression is associated with work absenteeism, reduced productivity, and significant personal and societal economic burden. We describe patterns and determinants of sick leave among working Danish antidepressant users. Persons starting antidepressant treatment (January 1, 2004 through December 31, 2005) were identified from a representative 25% sample of the Danish population by linking Danish national registries. Inclusion criteria were age 18-64 years, being in the workforce the week prior to the first antidepressant prescription (index prescription, IP), and no antidepressant prescription in the year prior to the IP. Only sick leaves >2 weeks are centrally registered in Denmark and could be assessed. Cox regression analyses identified predictors of sick leave during the year following the IP, based on previous history of sick leave and clinical and socio-demographic baseline characteristics. In the cohort of 25,908 (59.7% women), sick leave prevalence increased from 37.5% (year prior to IP) to 45.3% (year after the IP); 30.7% were on sick leave for >8 weeks. Incidence peaked (35.5% of individuals) the week after the IP. Of persons with sick leave in the year before the IP, 62.7% were on sick leave the first week after the IP, vs 5.7% of those without previous sick leave. Predictors associated with increased risk of sick leave among those without previous sick leave were unemployment, female gender, age 25-54 years, couples with children, and vocational and higher intermediate education (including e.g. teachers and nurses). Reasons for sick leave, sick leaves of less than 14 days and the indications for antidepressant treatment were unknown. Sick leave was prevalent in persons starting new antidepressant use, often lasting >8 weeks. Previous sick leave was the strongest predictor of subsequent sick leave. © 2013 Elsevier B.V. All rights reserved.

  14. A novel IPTV program multiplex access system to EPON

    Science.gov (United States)

    Xu, Xian; Liu, Deming; He, Wei; Lu, Xi

    2007-11-01

    With the rapid development of high speed networks, such as Ethernet Passive Optical Network (EPON), traffic patterns in access networks have evolved from traditional text-oriented service to the mixed text-, voice- and video- based services, leading to so called "Triple Play". For supporting IPTV service in EPON access network infrastructure, in this article we propose a novel IPTV program multiplex access system to EPON, which enables multiple IPTV program source servers to seamlessly access to IPTV service access port of optical line terminal (OLT) in EPON. There are two multiplex schemes, namely static multiplex scheme and dynamic multiplex scheme, in implementing the program multiplexing. Static multiplex scheme is to multiplex all the IPTV programs and forward them to the OLT, regardless of the need of end-users. While dynamic multiplex scheme can dynamically multiplex and forward IPTV programs according to what the end-users actually demand and those watched by no end-user would not be multiplexed. By comparing these two schemes, a reduced traffic of EPON can be achieved by using dynamic multiplex scheme, especially when most end-users are watching the same few IPTV programs. Both schemes are implemented in our system, with their hardware and software designs described.

  15. Designing a Secure E-commerce with Credential Purpose-based Access Control

    OpenAIRE

    Norjihan Abdul Ghani; Harihodin Selamat; Zailani Mohamed Sidek

    2014-01-01

    The rapid growth of e-commerce has created a great opportunities for both businesses and end users. The essential e-commerce process is required for the successful operation and management of e-commerce activities. One of the processes is access control and security. E-commerce must establish a secure access between the parties in an e-commerce transaction by authenticating users, authorizing access, and enforcing security features. The e-commerce application must authorize access to only tho...

  16. The web-based user interface for EAST plasma control system

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, R.R., E-mail: rrzhang@ipp.ac.cn [Institute of Plasma Physics, Chinese Academy of Sciences, Anhui (China); Xiao, B.J. [Institute of Plasma Physics, Chinese Academy of Sciences, Anhui (China); School of Nuclear Science and Technology, University of Science and Technology of China, Anhui (China); Yuan, Q.P. [Institute of Plasma Physics, Chinese Academy of Sciences, Anhui (China); Yang, F. [Institute of Plasma Physics, Chinese Academy of Sciences, Anhui (China); Department of Computer Science, Anhui Medical University, Anhui (China); Zhang, Y. [Institute of Plasma Physics, Chinese Academy of Sciences, Anhui (China); Johnson, R.D.; Penaflor, B.G. [General Atomics, DIII-D National Fusion Facility, San Diego, CA (United States)

    2014-05-15

    The plasma control system (PCS) plays a vital role at EAST for fusion science experiments. Its software application consists of two main parts: an IDL graphical user interface for setting a large number of plasma parameters to specify each discharge, several programs for performing the real-time feedback control and managing the whole control system. The PCS user interface can be used from any X11 Windows client with privileged access to the PCS computer system. However, remote access to the PCS system via the IDL user interface becomes an extreme inconvenience due to the high network latency to draw or operate the interfaces. In order to realize lower latency for remote access to the PCS system, a web-based system has been developed for EAST recently. The setup data are retrieved from the PCS system and client-side JavaScript draws the interfaces into the user's browser. The user settings are also sent back to the PCS system for controlling discharges. These technologies allow the web-based user interface to be viewed by authorized users with a web browser and have it communicate with PCS server processes directly. It works together with the IDL interface and provides a new way to aid remote participation.

  17. The web-based user interface for EAST plasma control system

    International Nuclear Information System (INIS)

    Zhang, R.R.; Xiao, B.J.; Yuan, Q.P.; Yang, F.; Zhang, Y.; Johnson, R.D.; Penaflor, B.G.

    2014-01-01

    The plasma control system (PCS) plays a vital role at EAST for fusion science experiments. Its software application consists of two main parts: an IDL graphical user interface for setting a large number of plasma parameters to specify each discharge, several programs for performing the real-time feedback control and managing the whole control system. The PCS user interface can be used from any X11 Windows client with privileged access to the PCS computer system. However, remote access to the PCS system via the IDL user interface becomes an extreme inconvenience due to the high network latency to draw or operate the interfaces. In order to realize lower latency for remote access to the PCS system, a web-based system has been developed for EAST recently. The setup data are retrieved from the PCS system and client-side JavaScript draws the interfaces into the user's browser. The user settings are also sent back to the PCS system for controlling discharges. These technologies allow the web-based user interface to be viewed by authorized users with a web browser and have it communicate with PCS server processes directly. It works together with the IDL interface and provides a new way to aid remote participation

  18. VoIP Accessibility: A Usability Study of Voice over Internet Protocol (VoIP) Systems and A Survey of VoIP Users with Vision Loss

    Science.gov (United States)

    Packer, Jaclyn; Reuschel, William

    2018-01-01

    Introduction: Accessibility of Voice over Internet Protocol (VoIP) systems was tested with a hands-on usability study and an online survey of VoIP users who are visually impaired. The survey examined the importance of common VoIP features, and both methods assessed difficulty in using those features. Methods: The usability test included four paid…

  19. Environmental Consciousness and Practices of Land Users along ...

    African Journals Online (AJOL)

    Ethiopian Journal of Environmental Studies and Management. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 8 (2015) >. Log in or Register to get access to full text downloads.

  20. Way to increase the user access at the LCLS baseline

    Energy Technology Data Exchange (ETDEWEB)

    Geloni, Gianluca [European XFEL GmbH, Hamburg; Kocharyan, Vitali; Saldin, Evgeni [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2010-10-15

    Although the LCLS photon beam is meant for a single user, the baseline undulator is long enough to serve two users simultaneously. To this end, we propose a setup composed of two simple elements: an X-ray mirror pair for X-ray beam deflection, and a short (4 m-long) magnetic chicane, which creates an offset for mirror pair installation in the middle of the baseline undulator. The insertable mirror pair can be used for spatial separation of the X-ray beams generated in the first and in the second half of the baseline undulator. The method of deactivating one half and activating another half of the undulator is based on the rapid switching of the FEL amplification process. As proposed elsewhere, using a kicker installed upstream of the LCLS baseline undulator and an already existing corrector in the first half of the undulator, it is possible to rapidly switch the X-ray beam from one user to another, thus providing two active beamlines at any time. We present simulation results dealing with the LCLS baseline, and show that it is possible to generate two saturated SASE X-ray beams in the whole 0.8-8 keV photon energy range in the same baseline undulator. These can be exploited to serve two users. Implementation of the proposed technique does not perturb the baseline mode of operation of the LCLS undulator. Moreover, the magnetic chicane setup is very flexible, and can be used as a self-seeding setup too. We present simulation results for the LCLS baseline undulator with SHAB (second harmonic afterburner) and show that one can produce monochromatic radiation at the 2nd harmonic as well as at the 1st. We describe an efficient way for obtaining multi-user operation at the LCLS hard X-ray FEL. To this end, a photon beam distribution system based on the use of crystals in the Bragg reflection geometry is proposed. The reflectivity of crystal deflectors can be switched fast enough by flipping the crystals with piezoelectric devices similar to those for X-ray phase retarders

  1. Ubiquitous Accessibility for People with Visual Impairments: Are We There Yet?

    Science.gov (United States)

    Billah, Syed Masum; Ashok, Vikas; Porter, Donald E; Ramakrishnan, I V

    2017-05-01

    Ubiquitous access is an increasingly common vision of computing, wherein users can interact with any computing device or service from anywhere, at any time. In the era of personal computing, users with visual impairments required special-purpose, assistive technologies, such as screen readers, to interact with computers. This paper investigates whether technologies like screen readers have kept pace with, or have created a barrier to, the trend toward ubiquitous access, with a specific focus on desktop computing as this is still the primary way computers are used in education and employment. Towards that, the paper presents a user study with 21 visually-impaired participants, specifically involving the switching of screen readers within and across different computing platforms, and the use of screen readers in remote access scenarios. Among the findings, the study shows that, even for remote desktop access-an early forerunner of true ubiquitous access-screen readers are too limited, if not unusable. The study also identifies several accessibility needs, such as uniformity of navigational experience across devices, and recommends potential solutions. In summary, assistive technologies have not made the jump into the era of ubiquitous access, and multiple, inconsistent screen readers create new practical problems for users with visual impairments.

  2. User-centered 3D geovisualisation

    DEFF Research Database (Denmark)

    Nielsen, Anette Hougaard

    2004-01-01

    . In a broader perspective, the overall aim is to develop a language in 3D Geovisualisation gained through usability projects and the development of a theoretical background. A conceptual level of user-centered 3D Geovisualisation is introduced by applying a categorisation originating from Virtual Reality...... and shadowing effects or with weather phenomena serving a level of realism and providing depth cues. The rendered objects and scenes are graphically accessible through the interface where immersive or non-immersive monitors in different sizes and shapes are relevant. Through the user interface, users can...

  3. Relaxing rdf queries based on user and domain preferences

    DEFF Research Database (Denmark)

    Dolog, Peter; Stueckenschmidt, Heiner; Wache, Holger

    2009-01-01

    Research in cooperative query answering is triggered by the observation that users are often not able to correctly formulate queries to databases such that they return the intended result. Due to lacking knowledge about the contents and the structure of a database, users will often only be able t...... application in the context of e-learning systems....... knowledge and user preferences. We describe a framework for information access that combines query refinement and relaxation in order to provide robust, personalized access to heterogeneous resource description framework data as well as an implementation in terms of rewriting rules and explain its...

  4. Channel-aware multi-user uplink transmission scheme for SIMO-OFDM systems

    Institute of Scientific and Technical Information of China (English)

    PAN ChengKang; CAI YueMing; XU YouYun

    2009-01-01

    The problem of medium access control (MAC) in wireless single-Input multiple-output-orthogonal frequency division multiplexing (SIMO-OFOM) systems is addressed.Traditional random access protocols have low overheads and inferior performance.Centralized methods have superior performance and high overheads.To achieve the tradeoff between overhead and performance,we propose a channelaware uplink transmission (CaUT) scheme for SIMO-OFDM systems.In CaUT,users transmit requestto-send (RTS) at some subcarriers whose channel gains are above a predetermined threshold.Using the channel state information provided by RTS,access point performs user selection with receive beamforming to decide which users can access and then broadcasts the selection results via clear-to-send (CTS) to users.We present a distributed power control scheme by using a simple fixed modulation mode.We optimize the modulation order and channel gain thresholds to maximize the separable packets subject to the bit-error-rate (BER) and temporal fairness requirements and the Individual average transmit power constraints.The performance of CaUT scheme is analyzed analytically and evaluated by simulations.Simulation results show that CaUT can achieve more significant throughput performance than traditional random access protocols.

  5. User Experience for Disabled Users in Open Educational Resources Websites

    Directory of Open Access Journals (Sweden)

    Rosa Navarrete

    2015-11-01

    Full Text Available Open Educational Resources (OER are digital materials for teaching-learning purpose released under an open license that are available through websites. In the last decade, some governments have encouraged the development and using of OER in order to contribute to the achievement of the right to education for everyone, a fundamental right included in The Universal Declaration of Human Rights. Besides, inclusion of people with disabilities is a global concern that need to be addressed in all living aspects including education.In this research we address the user experience in OER websites —considering the perspective of users with disabilities— in order to recognize possible barriers in web design. The conformance criteria considered for this reviewing are mandatory aspects of user experience in relation to Web accessibility and Web usability.

  6. User Experience for Disabled Users in Open Educational Resources Websites

    Directory of Open Access Journals (Sweden)

    Rosa Navarrete

    2015-11-01

    Full Text Available Open Educational Resources (OER are digital materials for teaching-learning purpose released under an open license that are available through websites. In the last decade, some governments have encouraged the development and using of OER in order to contribute to the achievement of the right to education for everyone, a fundamental right included in The Universal Declaration of Human Rights. Besides, inclusion of people with disabilities is a global concern that need to be addressed in all living aspects including education. In this research we address the user experience in OER websites —considering the perspective of users with disabilities— in order to recognize possible barriers in web design. The conformance criteria considered for this reviewing are mandatory aspects of user experience in relation to Web accessibility and Web usability.

  7. Debug register rootkits : A study of malicious use of the IA-32 debug registers

    OpenAIRE

    Persson, Emil; Mattsson, Joel

    2012-01-01

    The debug register rootkit is a special type of rootkit that has existed for over a decade, and is told to be undetectable by any scanning tools. It exploits the debug registers in Intel’s IA-32 processor architecture. This paper investigates the debug register rootkit to find out why it is considered a threat, and which malware removal tools have implemented detection algorithms against this threat. By implementing and running a debug register rootkit against the most popular Linux tools, ne...

  8. Research Investigation of Information Access Methods

    Science.gov (United States)

    Heinrichs, John H.; Sharkey, Thomas W.; Lim, Jeen-Su

    2006-01-01

    This study investigates the satisfaction of library users at Wayne State University who utilize alternative information access methods. The LibQUAL+[TM] desired and perceived that satisfaction ratings are used to determine the user's "superiority gap." By focusing limited library resources to address "superiority gap" issues identified by each…

  9. Development of the CHARIOT Research Register for the Prevention of Alzheimer's Dementia and Other Late Onset Neurodegenerative Diseases.

    Directory of Open Access Journals (Sweden)

    Mark E Larsen

    Full Text Available Identifying cognitively healthy people at high risk of developing dementia is an ever-increasing focus. These individuals are essential for inclusion in observational studies into the natural history of the prodromal and early disease stages and for interventional studies aimed at prevention or disease modification. The success of this research is dependent on having access to a well characterised, representative and sufficiently large population of individuals. Access to such a population remains challenging as clinical research has, historically, focussed on patients with dementia referred to secondary and tertiary services. The primary care system in the United Kingdom allows access to a true prodromal population prior to symptoms emerging and specialist referral. We report the development and recruitment rates of the CHARIOT register, a primary care-based recruitment register for research into the prevention of dementia. The CHARIOT register was designed specifically to support recruitment into observational natural history studies of pre-symptomatic or prodromal dementia stages, and primary or secondary prevention pharmaceutical trials or other prevention strategies for dementia and other cognitive problems associated with ageing.Participants were recruited through searches of general practice lists across the west and central London regions. Invitations were posted to individuals aged between 60 and 85 years, without a diagnosis of dementia. Upon consent, a minimum data set of demographic and contact details was extracted from the patient's electronic health record.To date, 123 surgeries participated in the register, recruiting a total of 24,509 participants-a response rate of 22.3%. The age, gender and ethnicity profiles of participants closely match that of the overall eligible population. Higher response rates tended to be associated with larger practices (r = 0.34, practices with a larger older population (r = 0.27, less

  10. Editorial: Next Generation Access Networks

    Science.gov (United States)

    Ruffini, Marco; Cincotti, Gabriella; Pizzinat, Anna; Vetter, Peter

    2015-12-01

    Over the past decade we have seen an increasing number of operators deploying Fibre-to-the-home (FTTH) solutions in access networks, in order to provide home users with a much needed network access upgrade, to support higher peak rates, higher sustained rates and a better and more uniform broadband coverage of the territory.

  11. The Danish Adoption Register.

    Science.gov (United States)

    Petersen, Liselotte; Sørensen, Thorkild I A

    2011-07-01

    The Danish Adoption Register was established in 1963-1964 to explore the genetic and environmental contribution to familial aggregation of schizophrenia. The register encompass information on all 14,425 non-familial adoptions of Danish children legally granted in Denmark 1924-1947. It includes name and date of birth of each adoptee and his or her biological and adoptive parents, date of transfer to adoptive parents and date of formal adoption. The linkage to biological and adoptive parents is close to complete, even biological fathers are registered for 91.4% of the adoptees. Adoption registers are a unique source allowing disentangling of genetic and familial environmental influences on traits, risk of diseases, and mortality.

  12. Book Review: Economics: The User's Guide | Douglas | New ...

    African Journals Online (AJOL)

    New Agenda: South African Journal of Social and Economic Policy. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 57 (2015) >. Log in or Register to get access to full text downloads.

  13. Joint estimation and contention-resolution protocol for wireless random access

    DEFF Research Database (Denmark)

    Stefanovic, Cedomir; Trillingsgaard, Kasper Fløe; Kiilerich Pratas, Nuno

    2013-01-01

    We propose a contention-based random-access protocol, designed for wireless networks where the number of users is not a priori known. The protocol operates in rounds divided into equal-duration slots, performing at the same time estimation of the number of users and resolution of their transmissi......We propose a contention-based random-access protocol, designed for wireless networks where the number of users is not a priori known. The protocol operates in rounds divided into equal-duration slots, performing at the same time estimation of the number of users and resolution...... successive interference cancellation which, coupled with the use of the optimized access probabilities, enables throughputs that are substantially higher than the traditional slotted ALOHA-like protocols. The key feature of the proposed protocol is that the round durations are not a priori set...

  14. Rural providers’ access to online resources: a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Jonathan D. Eldredge

    2016-01-01

    Full Text Available Objective: The research determined the usage and satisfaction levels with one of two point-of-care (PoC resources among health care providers in a rural state. Methods: In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants’ attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA, paired t tests, and Cohen’s d statistic to compare pre- and post-study effects sizes. Results: Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to ‘‘about right amounts of information’’ at the completion of the study. DynaMed users reported a Cohen’s d increase of þ1.50 compared to AccessMedicine users’ reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen’s d. Conclusion: Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine.

  15. Meta-analysis of executive functioning in ecstasy/polydrug users.

    Science.gov (United States)

    Roberts, C A; Jones, A; Montgomery, C

    2016-06-01

    Ecstasy/3,4-methylenedioxymethamphetamine (MDMA) use is proposed to cause damage to serotonergic (5-HT) axons in humans. Therefore, users should show deficits in cognitive processes that rely on serotonin-rich, prefrontal areas of the brain. However, there is inconsistency in findings to support this hypothesis. The aim of the current study was to examine deficits in executive functioning in ecstasy users compared with controls using meta-analysis. We identified k = 39 studies, contributing 89 effect sizes, investigating executive functioning in ecstasy users and polydrug-using controls. We compared function-specific task performance in 1221 current ecstasy users and 1242 drug-using controls, from tasks tapping the executive functions - updating, switching, inhibition and access to long-term memory. The significant main effect demonstrated overall executive dysfunction in ecstasy users [standardized mean difference (SMD) = -0.18, 95% confidence interval (CI) -0.26 to -0.11, Z = 5.05, p Ecstasy users showed significant performance deficits in access (SMD = -0.33, 95% CI -0.46 to -0.19, Z = 4.72, p ecstasy users to date and provides a behavioural correlate of potential serotonergic neurotoxicity.

  16. Danish registers on aspects of reproduction

    DEFF Research Database (Denmark)

    Blenstrup, Lene Tølbøll; Knudsen, Lisbeth B.

    2011-01-01

    Introduction: The establishing of three Danish population based registers, namely the Fertility Database, the Register of Legally Induced Abortions and the In Vitro Fertilisation register aimed at providing data for surveying of reproductive outcome. Content: The registers include information...... on births, abortions and assisted reproduction as well as selected characteristics of the women (and men) involved. Validity and Coverage: Both the validity and coverage of each register is considered of high quality. Conclusions: These registers provide, both individually and in combination, unique...

  17. Mining Users Mobility at Public Transportation

    Directory of Open Access Journals (Sweden)

    joao ferreira

    2017-02-01

    Full Text Available In this research work we propose a new approach to estimate the number of passengers in a public transportation and determinate the users’ route path based on a passive approach without user intervention. The method is based on the probe requests of users mobile device through the collected data in wireless access point. This data is manipulated to extract the information about the numbers of users with mobile devices and track their route path and time. This data can be manipulated to extract useful knowledge related with users’ habits at public transportation and extract user mobility patterns.

  18. PathwayAccess: CellDesigner plugins for pathway databases.

    Science.gov (United States)

    Van Hemert, John L; Dickerson, Julie A

    2010-09-15

    CellDesigner provides a user-friendly interface for graphical biochemical pathway description. Many pathway databases are not directly exportable to CellDesigner models. PathwayAccess is an extensible suite of CellDesigner plugins, which connect CellDesigner directly to pathway databases using respective Java application programming interfaces. The process is streamlined for creating new PathwayAccess plugins for specific pathway databases. Three PathwayAccess plugins, MetNetAccess, BioCycAccess and ReactomeAccess, directly connect CellDesigner to the pathway databases MetNetDB, BioCyc and Reactome. PathwayAccess plugins enable CellDesigner users to expose pathway data to analytical CellDesigner functions, curate their pathway databases and visually integrate pathway data from different databases using standard Systems Biology Markup Language and Systems Biology Graphical Notation. Implemented in Java, PathwayAccess plugins run with CellDesigner version 4.0.1 and were tested on Ubuntu Linux, Windows XP and 7, and MacOSX. Source code, binaries, documentation and video walkthroughs are freely available at http://vrac.iastate.edu/~jlv.

  19. Usability evaluation of user interface of thesis title review system

    Science.gov (United States)

    Tri, Y.; Erna, A.; Gellysa, U.

    2018-03-01

    Presentation of programs with user interface that can be accessed online through the website of course greatly provide user benefits. User can easily access the program they need. There are usability values that serve as a benchmark for the success of a user accessible program, ie efficiency, effectiveness, and convenience. These usability values also determine the development of the program for the better use. Therefore, on the review title thesis program that will be implemented in STT Dumai was measured usability evaluation. It aims to see which sides are not yet perfect and need to be improved to improve the performance and utilization of the program. Usability evaluation was measured by using smartPLS software. Database used was the result of respondent questionnaires that include questions about the experience when they used program. The result of a review of thesis title program implemented in STT Dumai has an efficiency value of 22.615, the effectiveness of 20.612, and satisfaction of 33.177.

  20. Characterization of coded random access with compressive sensing based multi user detection

    DEFF Research Database (Denmark)

    Ji, Yalei; Stefanovic, Cedomir; Bockelmann, Carsten

    2014-01-01

    The emergence of Machine-to-Machine (M2M) communication requires new Medium Access Control (MAC) schemes and physical (PHY) layer concepts to support a massive number of access requests. The concept of coded random access, introduced recently, greatly outperforms other random access methods...... coded random access with CS-MUD on the PHY layer and show very promising results for the resulting protocol....

  1. An Effective News Recommendation Method for Microblog User

    Directory of Open Access Journals (Sweden)

    Wanrong Gu

    2014-01-01

    Full Text Available Recommending news stories to users, based on their preferences, has long been a favourite domain for recommender systems research. Traditional systems strive to satisfy their user by tracing users' reading history and choosing the proper candidate news articles to recommend. However, most of news websites hardly require any user to register before reading news. Besides, the latent relations between news and microblog, the popularity of particular news, and the news organization are not addressed or solved efficiently in previous approaches. In order to solve these issues, we propose an effective personalized news recommendation method based on microblog user profile building and sub class popularity prediction, in which we propose a news organization method using hybrid classification and clustering, implement a sub class popularity prediction method, and construct user profile according to our actual situation. We had designed several experiments compared to the state-of-the-art approaches on a real world dataset, and the experimental results demonstrate that our system significantly improves the accuracy and diversity in mass text data.

  2. An effective news recommendation method for microblog user.

    Science.gov (United States)

    Gu, Wanrong; Dong, Shoubin; Zeng, Zhizhao; He, Jinchao

    2014-01-01

    Recommending news stories to users, based on their preferences, has long been a favourite domain for recommender systems research. Traditional systems strive to satisfy their user by tracing users' reading history and choosing the proper candidate news articles to recommend. However, most of news websites hardly require any user to register before reading news. Besides, the latent relations between news and microblog, the popularity of particular news, and the news organization are not addressed or solved efficiently in previous approaches. In order to solve these issues, we propose an effective personalized news recommendation method based on microblog user profile building and sub class popularity prediction, in which we propose a news organization method using hybrid classification and clustering, implement a sub class popularity prediction method, and construct user profile according to our actual situation. We had designed several experiments compared to the state-of-the-art approaches on a real world dataset, and the experimental results demonstrate that our system significantly improves the accuracy and diversity in mass text data.

  3. An Effective News Recommendation Method for Microblog User

    Science.gov (United States)

    Gu, Wanrong; Dong, Shoubin; Zeng, Zhizhao; He, Jinchao

    2014-01-01

    Recommending news stories to users, based on their preferences, has long been a favourite domain for recommender systems research. Traditional systems strive to satisfy their user by tracing users' reading history and choosing the proper candidate news articles to recommend. However, most of news websites hardly require any user to register before reading news. Besides, the latent relations between news and microblog, the popularity of particular news, and the news organization are not addressed or solved efficiently in previous approaches. In order to solve these issues, we propose an effective personalized news recommendation method based on microblog user profile building and sub class popularity prediction, in which we propose a news organization method using hybrid classification and clustering, implement a sub class popularity prediction method, and construct user profile according to our actual situation. We had designed several experiments compared to the state-of-the-art approaches on a real world dataset, and the experimental results demonstrate that our system significantly improves the accuracy and diversity in mass text data. PMID:24983011

  4. Personalization of XML Content Browsing Based on User Preferences

    Science.gov (United States)

    Encelle, Benoit; Baptiste-Jessel, Nadine; Sedes, Florence

    2009-01-01

    Personalization of user interfaces for browsing content is a key concept to ensure content accessibility. In this direction, we introduce concepts that result in the generation of personalized multimodal user interfaces for browsing XML content. User requirements concerning the browsing of a specific content type can be specified by means of…

  5. Evaluation of the Water Scarcity Energy Cost for Users

    Directory of Open Access Journals (Sweden)

    Chiara M. Fontanazza

    2013-01-01

    Full Text Available In systems experiencing water scarcity and consequent intermittent supply, users often adopt private tanks that collect water during service periods and supply users when the service is not available. The tank may be fed by gravity or by private pumping stations depending on the network pressure level. Once water resources are collected, the tank can supply users by gravity if it is located on the rooftop or by additional pumping if underground. Private tanks thus increase the energy cost of the water supply service for users by introducing several small pumping structures inside the network. The present paper aims to evaluate this users’ energy cost for different private tank configurations. A real case study was analysed, and the results showed that intermittent distribution causes inequalities not only in users’ access to water resource but also costs that users have to bear to have access to water.

  6. An Effective Key Management Approach to Differential Access Control in Dynamic Environments

    OpenAIRE

    Yogesh Karandikar; Xukai Zou; Yuanshun Dai

    2006-01-01

    Applications like e-newspaper or interactive online gaming have more than one resource and a large number of users. There is a many-to-many relationship between users and resources; each user can access multiple resources and multiple users can access each resource. The resources are independent and each resource needs to be encrypted by a different Resource Encryption Key (REK). Each REK needs to be distributed to all subscribers of the resource and each subscriber must get all the REKs he/s...

  7. Waste assay measurement integration system user interface

    International Nuclear Information System (INIS)

    Mousseau, K.C.; Hempstead, A.R.; Becker, G.K.

    1995-01-01

    The Waste Assay Measurement Integration System (WAMIS) is being developed to improve confidence in and lower the uncertainty of waste characterization data. There are two major components to the WAMIS: a data access and visualization component and a data interpretation component. The intent of the access and visualization software is to provide simultaneous access to all data sources that describe the contents of any particular container of waste. The visualization software also allows the user to display data at any level from raw to reduced output. Depending on user type, the software displays a menuing hierarchy, related to level of access, that allows the user to observe only those data sources s/he has been authorized to view. Access levels include system administrator, physicist, QA representative, shift operations supervisor, and data entry. Data sources are displayed in separate windows and presently include (1) real-time radiography video, (2) gamma spectra, (3) passive and active neutron, (4) radionuclide mass estimates, (5) total alpha activity (Ci), (6) container attributes, (7) thermal power (w), and (8) mass ratio estimates for americium, plutonium, and uranium isotopes. The data interpretation component is in the early phases of design, but will include artificial intelligence, expert system, and neural network techniques. The system is being developed on a Pentium PC using Microsoft Visual C++. Future generations of WAMIS will be UNIX based and will incorporate more generically radiographic/tomographic, gamma spectroscopic/tomographics, neutron, and prompt gamma measurements

  8. Network Performance and Quality of Experience of Remote Access Laboratories

    Directory of Open Access Journals (Sweden)

    Alexander A. Kist

    2012-11-01

    Full Text Available Remote Access Laboratories (RAL have become important learning and teaching tools. This paper presents a performance study that targets a specific remote access architecture implemented within a universities operational environment. This particular RAL system provides globally authenticated and arbitrated remote access to virtualized computers as well as computer controlled hardware experiments. This paper presents system performance results that have been obtained utilizing both a set of automated and human subject tests. Principle objectives of the study were: To gain a better understanding of the nature of network traffic caused by experimental activity usage; to obtain an indication of user expectations of activity performance; and to develop a measure to predict Quality of Experience, based on easily measurable Quality of Service parameters. The study emulates network layer variation of access-bandwidth and round-trip-time of typical usage scenarios and contrasts against user perception results that allow classifying expected user performance. It demonstrates that failure rate is excellent measure of usability, and that round-trip-time predominantly affects user experience. Thin-client and remote desktop architectures are popular to separate the location of users and the actual data processing and use similar structures, hence results of this study to be applied in these application areas as well.

  9. Automating testbed documentation and database access using World Wide Web (WWW) tools

    Science.gov (United States)

    Ames, Charles; Auernheimer, Brent; Lee, Young H.

    1994-01-01

    A method for providing uniform transparent access to disparate distributed information systems was demonstrated. A prototype testing interface was developed to access documentation and information using publicly available hypermedia tools. The prototype gives testers a uniform, platform-independent user interface to on-line documentation, user manuals, and mission-specific test and operations data. Mosaic was the common user interface, and HTML (Hypertext Markup Language) provided hypertext capability.

  10. Reduced feedback selective cluster index scheduling with user pre-selection for next-generation multi-input multi-output orthogonal frequency division multiple access system

    OpenAIRE

    Nicolaou, M; Doufexi, A; Armour, SMD; Sun, Y

    2011-01-01

    The joint use of opportunistic scheduling and orthogonal frequency division multiple access (OFDMA) provide significant gains in environments of low mobility and scatter for which channel variations are low. The downside of opportunistic scheduling in multicarrier systems such as OFDMA, lies in the substantial uplink overhead required to feed back by the mobile stations (MSs) describing users' instantaneous link conditions. This study presents a novel approach towards multicarrier opportunist...

  11. Accessible Collaborative Learning Using Mobile Devices

    Science.gov (United States)

    Wald, Mike; Li, Yunjia; Draffan, E. A.

    2014-01-01

    This paper describes accessible collaborative learning using mobile devices with mobile enhancements to Synote, the freely available, award winning, open source, web based application that makes web hosted recordings easier to access, search, manage, and exploit for all learners, teachers and other users. Notes taken live during lectures using…

  12. Numerical Representations and User Behaviour in Social Networking Sites

    DEFF Research Database (Denmark)

    Sjöklint, Mimmi; Constantiou, Ioanna; Trier, Matthias

    2013-01-01

    The new technological enhancements and the accessibility to varieties of online applications, enable users to collect personal data and perform self-evaluation through test, comparison and experimentation. The sparked interest in numbers and numbers as self-representative visualisations is promin......The new technological enhancements and the accessibility to varieties of online applications, enable users to collect personal data and perform self-evaluation through test, comparison and experimentation. The sparked interest in numbers and numbers as self-representative visualisations...... theoretical pillars: self-determination theory, heuristic decision making and behavioural economics. A discussion departs from these convictions to investigate user reactions and behaviour when faced with numerical representations in the SNS....

  13. OpenTopography: Enabling Online Access to High-Resolution Lidar Topography Data and Processing Tools

    Science.gov (United States)

    Crosby, Christopher; Nandigam, Viswanath; Baru, Chaitan; Arrowsmith, J. Ramon

    2013-04-01

    resources. Datasets hosted by other organizations, as well as lidar-specific software, can be registered into the OpenTopography catalog, providing users a "one-stop shop" for such information. With several thousand active users, OpenTopography is an excellent example of a mature Spatial Data Infrastructure system that is enabling access to challenging data for research, education and outreach. Ongoing OpenTopography design and development work includes the archive and publication of datasets using digital object identifiers (DOIs); creation of a more flexible and scalable high-performance environment for processing of large datasets; expanded support for satellite and terrestrial lidar; and creation of a "pluggable" infrastructure for third-party programs and algorithms. OpenTopography has successfully created a facility for sharing lidar data. In the project's next phase, we are working to enable equally easy and successful sharing of services for processing and analysis of these data.

  14. User-Centered Digital Library Project Phase 2: User Testing with Teachers and Students with Disabilities. Evaluation Report

    Science.gov (United States)

    Moeller, Babette

    2010-01-01

    The goal of the User-Centered Digital Library Project, conducted by the National Center for Accessible Media (NCAM) at WGBH, was to adapt the Teachers' Domain online digital library to enable teachers and students with disabilities to more readily use the resources in science classrooms. NCAM added accessibility features such as captions and audio…

  15. 78 FR 22845 - Certain Lined Paper Products From India: Final Results of Countervailing Duty Administrative...

    Science.gov (United States)

    2013-04-17

    ... Electronic Service System (IA ACCESS). Access to IA ACCESS is available to registered users at http.... Export Promotion of Capital Goods Scheme (EPCGS) 3. Export Oriented Units (EOU) Reimbursement of Central Sales Tax (CST) Paid on Materials Procured Domestically 4. Export Oriented Units Duty-Free Import of...

  16. Scientific user requirements for a herbarium data portal.

    Science.gov (United States)

    Vissers, Jorick; den Bosch, Frederik Van; Bogaerts, Ann; Cocquyt, Christine; Degreef, Jérôme; Diagre, Denis; de Haan, Myriam; Smedt, Sofie De; Henry Engledow; Ertz, Damien; Fabri, Régine; Godefroid, Sandrine; Nicole Hanquart; Mergen, Patricia; Ronse, Anne; Sosef, Marc; Stévart, Tariq; Stoffelen, Piet; Vanderhoeven, Sonia; Groom, Quentin

    2017-01-01

    The digitization of herbaria and their online access will greatly facilitate access to plant collections around the world. This will improve the efficiency of taxonomy and help reduce inequalities between scientists. The Botanic Garden Meise, Belgium, is currently digitizing 1.2 million specimens including label data. In this paper we describe the user requirements analysis conducted for a new herbarium web portal. The aim was to identify the required functionality, but also to assist in the prioritization of software development and data acquisition. The Garden conducted the analysis in cooperation with Clockwork, the digital engagement agency of Ordina. Using a series of interactive interviews, potential users were consulted from universities, research institutions, science-policy initiatives and the Botanic Garden Meise. Although digital herbarium data have many potential stakeholders, we focused on the needs of taxonomists, ecologists and historians, who are currently the primary users of the Meise herbarium data portal. The three categories of user have similar needs, all wanted as much specimen data as possible, and for those data, to be interlinked with other digital resources within and outside the Garden. Many users wanted an interactive system that they could comment on, or correct online, particularly if such corrections and annotations could be used to rank the reliability of data. Many requirements depend on the quality of the digitized data associated with each specimen. The essential data fields are the taxonomic name; geographic location; country; collection date; collector name and collection number. Also all researchers valued linkage between biodiversity literature and specimens. Nevertheless, to verify digitized data the researchers still want access to high quality images, even if fully transcribed label information is provided. The only major point of disagreement is the level of access users should have and what they should be allowed to do

  17. Public Access Points, Location of public beach access along the Oregon Coast. Boat ramp locations were added to the dataset to allow users to view the location of boat ramps along the Columbia River and the Willamete River north of the Oregon City Dam., Published in 2005, 1:100000 (1in=8333ft) scale, Oregon Geospatial Enterprise Office (GEO).

    Data.gov (United States)

    NSGIC State | GIS Inventory — Public Access Points dataset current as of 2005. Location of public beach access along the Oregon Coast. Boat ramp locations were added to the dataset to allow users...

  18. Content accessibility of Web documents: Overview of concepts and needed standards

    DEFF Research Database (Denmark)

    Alapetite, A.

    2006-01-01

    The concept of Web accessibility refers to a combined set of measures, namely, how easily and how efficiently different types of users may make use of a given service. While some recommendations for accessibility are focusing on people with variousspecific disabilities, this document seeks...... to broaden the scope to any type of user and any type of use case. The document provides an introduction to some required concepts and technical standards for designing accessible Web sites. A brief review of thelegal requirements in a few countries for Web accessibility complements the recommendations...

  19. Improving nomenclatural consistency: a decade of experience in the World Register of Marine Species

    Directory of Open Access Journals (Sweden)

    Tammy Horton

    2017-12-01

    Full Text Available The World Register of Marine species (WoRMS has been established for a decade. The early history of the database involved compilation of existing global and regional species registers. This aggregation, combined with changes to data types and the changing needs of WoRMS users, has resulted in an evolution of data-entry consistency over time. With the task of aggregating the accepted species names for all marine species approaching completion, our focus has shifted to improving the consistency and quality of data held while keeping pace with the addition of > 2000 new marine species described annually. This paper defines priorities and longer-term aims that promote standardisation within and interoperability among biodiversity databases, provides editors with further information on how to input nomenclatural data in a standardised way and clarifies for users of WoRMS how and why names are represented as they are. We 1 explain the categories of names included; 2 list standard reasons used to explain why a name is considered ‘unaccepted’ or ‘uncertain’; 3 present and explain the more difficult situations encountered; 4 describe categories of sources and notes linked to a taxon; and 5 recommend how type material, type locality and environmental information should be entered.

  20. CAPTCHA: Impact on User Experience of Users with Learning Disabilities

    Science.gov (United States)

    Gafni, Ruti; Nagar, Idan

    2016-01-01

    CAPTCHA is one of the most common solutions to check if the user trying to enter a Website is a real person or an automated piece of software. This challenge-response test, implemented in many Internet Websites, emphasizes the gaps between accessibility and security on the Internet, as it poses an obstacle for the learning-impaired in the reading…

  1. Actual problems of accession in relation with library statistics

    Directory of Open Access Journals (Sweden)

    Tereza Poličnik-Čermelj

    2010-01-01

    Full Text Available Accession is the process of recording bibliographic units in an accession register. Typically,library materials are acquired by purchase, exchange, gift or legal deposit. How-ever, COBISS (Cooperative Online Bibliographic System and Services Holdings software module includes some additional methods of acquisition which causes problems in gathering and presenting statistical data on local holdings. The article explains how to record holdings of different types of library materials and how to record retrospective collections. It describes necessary procedures in case the codes that define the publication pattern of the holdings are changed with special attention to integrating resources. Procedures of accession and circulation of bound materials, supplementary materials, teaching sets, multi parts, multimedia and collection level catalogue records are described. The attention is given to errors in recording lost item replacements and to the problems of circulation of certain types of library materials. The author also suggests how to record remote electronic resources. It is recommended to verify holdings data before the accession register is generated. The relevant and credible statistical data on collection development can only be created by librarians with sufficient acquisition and cataloguing skills.

  2. National Register Historic Districts

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — The National Register Historic District layer is a shape file showing the boundaries of Historic Districts that are listed on the National Register of Historic Places.

  3. Analisis Web Accessibility Pada Perancangan Website Chat

    OpenAIRE

    Yushan, Subhansyah

    2011-01-01

    Chat is a popular application where one user can communicate to another using text. Nowadays in the internet, many websites provide chat applications, such as Instant Messaging, Yahoo Messanger, and etc. Website which provides chat application cannot accomodate users who have any dissabilities, especialy users with visual disabilities. This situation makes communication process more complicated, where accessibility level of sending and receiving information has became low. The ...

  4. Flexible and Transparent User Authentication for Mobile Devices

    Science.gov (United States)

    Clarke, Nathan; Karatzouni, Sevasti; Furnell, Steven

    The mobile device has become a ubiquitous technology that is capable of supporting an increasingly large array of services, applications and information. Given their increasing importance, it is imperative to ensure that such devices are not misused or abused. Unfortunately, a key enabling control to prevent this, user authentication, has not kept up with the advances in device technology. This paper presents the outcomes of a 2 year study that proposes the use of transparent and continuous biometric authentication of the user: providing more comprehensive identity verification; minimizing user inconvenience; and providing security throughout the period of use. A Non-Intrusive and Continuous Authentication (NICA) system is described that maintains a continuous measure of confidence in the identity of the user, removing access to sensitive services and information with low confidence levels and providing automatic access with higher confidence levels. An evaluation of the framework is undertaken from an end-user perspective via a trial involving 27 participants. Whilst the findings raise concerns over education, privacy and intrusiveness, overall 92% of users felt the system offered a more secure environment when compared to existing forms of authentication.

  5. Access to IEEE Electronic Library

    CERN Multimedia

    2007-01-01

    From 2007, the CERN Library now offers readers online access to the complete IEEE Electronic Library (Institute of Electrical and Electronics Engineers). This new licence gives unlimited online access to all IEEE and IET (previously IEE) journals and proceedings as well as all current IEEE standards and selected archived ones. Some of the titles offer volumes back to 1913. This service currently represents more than 1,400,000 full-text articles! This leading engineering information resource replaces the previous service, a sub-product of the IEEE database called 'IEEE Enterprise', which offered online access to the complete collection of IEEE journals and proceedings, but with limited features. The service had become so popular that the CERN Working Group for Acquisitions recommended that the Library subscribe to the complete IEEE Electronic Library for 2007. Usage statistics for recent months showed there was a demand for the service from a large community of CERN users and we were aware that many users h...

  6. Sesame IO Library User Manual Version 8

    Energy Technology Data Exchange (ETDEWEB)

    Abhold, Hilary [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Young, Ginger Ann [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-05-15

    This document is a user manual for SES_IO, a low-level library for reading and writing sesame files. The purpose of the SES_IO library is to provide a simple user interface for accessing and creating sesame files that does not change across sesame format type (such as binary, ascii, and xml).

  7. User-Centered Design in Practice: The Brown University Experience

    Science.gov (United States)

    Bordac, Sarah; Rainwater, Jean

    2008-01-01

    This article presents a case study in user-centered design that explores the needs and preferences of undergraduate users. An analysis of LibQual+ and other user surveys, interviews with public service staff, and a formal American with Disabilities Act accessibility review served as the basis for planning a redesign of the Brown University…

  8. The Graphical User Interface: Crisis, Danger, and Opportunity.

    Science.gov (United States)

    Boyd, L. H.; And Others

    1990-01-01

    This article describes differences between the graphical user interface and traditional character-based interface systems, identifies potential problems posed by graphic computing environments for blind computer users, and describes some programs and strategies that are being developed to provide access to those environments. (Author/JDD)

  9. User requirements for access to Dutch spoken audio archives

    NARCIS (Netherlands)

    Heeren, W.F.L.

    2008-01-01

    Searching archived audiovisual collections will change in the near future. Instead of sifting through kilometers of analog tapes in archives' deposits, end users will be able to explore the collections from behind a personal computer, either at an archive or at their home. A first step in the

  10. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  11. Multiple access to sterile syringes for injection drug users: vending machines, needle exchange programs and legal pharmacy sales in Marseille, France.

    Science.gov (United States)

    Moatti, J P; Vlahov, D; Feroni, I; Perrin, V; Obadia, Y

    2001-03-01

    In Marseille, southeastern France, HIV prevention programs for injection drug users (IDUs) simultaneously include access to sterile syringes through needle exchange programs (NEPs), legal pharmacy sales and, since 1996, vending machines that mechanically exchange new syringes for used ones. The purpose of this study was to compare the characteristics of IDUs according to the site where they last obtained new syringes. During 3 days in September 1997, all IDUs who obtained syringes from 32 pharmacies, four NEPs and three vending machines were offered the opportunity to complete a self-administered questionnaire on demographics, drug use characteristics and program utilization. Of 485 individuals approached, the number who completed the questionnaire was 141 in pharmacies, 114 in NEPs and 88 at vending machines (response rate = 70.7%). Compared to NEP users, vending machine users were younger and less likely to be enrolled in a methadone program or to report being HIV infected, but more likely to misuse buprenorphine. They also had lower financial resources and were less likely to be heroin injectors than both pharmacy and NEP users. Our results suggest that vending machines attract a very different group of IDUs than NEPs, and that both programs are useful adjuncts to legal pharmacy sales for covering the needs of IDUs for sterile syringes in a single city. Assessment of the effectiveness and cost-effectiveness of combining such programs for the prevention of HIV and other infectious diseases among IDUs requires further comparative research. Copyright 2001 S. Karger AG, Basel

  12. Implementation of Multiple Access Techniques Applicable for Maritime Satellite Communications

    Directory of Open Access Journals (Sweden)

    Stojce Dimov Ilcev

    2013-12-01

    Full Text Available In this paper are introduced fundamentals, characteristics, advantages and disadvantages of Multiple Access (MA employed as transmission techniques in the Maritime Mobile Satellite Communications (MMSC between ships and Coast Earth Station (CES via Geostationary Earth Orbit (GEO or Not-GEO satellite constellations. In fixed satellite communication, as a rule, especially in MMSC many users are active at the same time. The problem of simultaneous communications between many single or multipoint mobile satellite users can be solved by using MA technique, such as Frequency Division Multiple Access (FDMA, Time Division Multiple Access (TDMA, Code Division Multiple Access (CDMA, Space Division Multiple Access (SDMA and Random (Packet Division Multiple Access (RDMA. Since the resources of the systems such as the transmitting power and the bandwidth are limited, it is advisable to use the channels with complete charge and to create a different MA to the channel. This generates a problem of summation and separation of signals in the transmission and reception parts, respectively. Deciding this problem consists in the development of orthogonal channels of transmission in order to divide signals from various users unambiguously on the reception part.

  13. The Long Road to Partnership: Conflict Resolution of Register 45 Mesuji Lampung

    Directory of Open Access Journals (Sweden)

    Komang Jaka Ferdian

    2017-08-01

    Full Text Available A known agrarian issue took place in Indonesia, particularly in the area of Register 45 Mesuji Lampung. The granting of natural forest management permit by the government to PT. Silva Inhutani, thus eliminating public access around Register 45 to manage the forest, subsequently lead to conflict in the region. The objectives of this research are, namely: 1 to explain the grounds for partnership in the Register 45 area; and 2 to analyze the partnership program undertaken in Register 45 as an effort of resolving conflict. This research used a descriptive qualitative approach that describes the results of research, assessment and other references reinforced with empirical data through interviews and observations. This study found a number of issues in the partnership agreement formation process, wherein the community was not being involved in the formation process of the partnership provisions, such as the planting process and the profit sharing scheme. The issues found in the implementation stage of the partnership agreement can be observed from an internal factor perspective, which was the unfulfilled expectation to increase acacia planting. Regarding the external factor, there were still many acts of thuggery in the area of Register 45 that interfered with the partnership process. There was also a fundamental problem in the partnership implementation, which was the prevalent lack of aptness in the mapping of community entitled to the partnership, as well as the lack of trust among collaborating parties.

  14. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  15. Barriers to antiretroviral treatment access for injecting drug users living with HIV in Chennai, South India.

    Science.gov (United States)

    Chakrapani, Venkatesan; Velayudham, Jaikumar; Shunmugam, Murali; Newman, Peter A; Dubrow, Robert

    2014-01-01

    India's National AIDS Control Organization provides free antiretroviral treatment (ART) to people living with HIV (PLHIV), including members of marginalized groups such as injecting drug users (IDUs). To help inform development of interventions to enhance ART access, we explored barriers to free ART access at government ART centers for IDUs living with HIV in Chennai by conducting three focus groups (n = 19 IDUs) and four key informant interviews. Data were explored using framework analysis to identify categories and derive themes. We found interrelated barriers at the family and social, health-care system, and individual levels. Family and social level barriers included lack of family support and fear of societal discrimination, as well as unmet basic needs, including food and shelter. Health-care system barriers included actual or perceived unfriendly hospital environment and procedures such as requiring proof of address and identity from PLHIV, including homeless IDUs; provider perception that IDUs will not adhere to ART, resulting in ART not being initiated; actual or perceived inadequate counseling services and lack of confidentiality; and lack of effective linkages between ART centers, needle/syringe programs, and drug dependence treatment centers. Individual-level barriers included active drug use, lack of self-efficacy in ART adherence, low motivation to initiate ART stemming from a fatalistic attitude, and inadequate knowledge about ART. These findings indicate that to facilitate IDUs gaining access to ART, systemic changes are needed, including steps to make the environment and procedures at government ART centers more IDU-friendly and steps to decrease HIV- and drug use-related stigma and discrimination faced by IDUs from the general public and health-care providers. Housing support for homeless IDUs and linkage of IDUs with drug dependence treatment are also essential.

  16. High risk behaviors of injection drug users registered with harm reduction programme in Karachi, Pakistan

    Directory of Open Access Journals (Sweden)

    Memon Ashraf

    2007-02-01

    Full Text Available Abstract Background Surveillance data of Sindh AIDS Control Programme, Pakistan suggest that HIV infection is rapidly increasing among IDUs in Karachi and has reached 9% in 2004–5 indicating that the country has progressed from nascent to concentrated level of HIV epidemic. Findings of 2nd generation surveillance in 2004–5 also indicate 104/395 (26.3% IDUs HIV positive in the city. Methods We conducted a cross sectional study among registered IDUs of a needle exchange and harm reduction programme in Karachi, Pakistan. A total of 161 IDUs were included in the study between October–November 2003. A detailed questionnaire was implemented and blood samples were collected for HIV, hepatitis B & C and syphilis. HIV, hepatitis B and C antibody tests were performed using Enzyme Linked Immunosorbent Assay (ELISA method. Syphilis tests (RPR & TPHA were performed on Randox kit. Besides calculating frequencies univariate analysis was performed using t tests for continuous variables as age, age at first intercourse and average age of initiation of addiction and chi square for categorical variables like paid for sex or not to identify risk factors for hepatitis B and C and syphilis. Results Average age of IDU was 35.9 years and average age of initiation of drugs was 15.9 years. Number of drug injections per day was 2.3. Shooting drugs in group sharing syringes was reported by 128 (79.5% IDUs. Over half 94 (58.3% reported paying for sex and 64% reported never using a condom. Commercial selling of blood was reported by 44 (28%. 1 of 161 was HIV positive (0.6%. The prevalence of hepatitis B was 12 (7.5%, hepatitis C 151 (94.3% and syphilis 21 (13.1%. IDUs who were hepatitis C positive were more likely to start sexual activity at an earlier age and had never used condoms. Similarly IDUs who were hepatitis B positive were more likely to belong to a younger age group. Syphilis positive IDUs were more likely to have paid for sex and had never used a condom

  17. Accessible Web Design - The Power of the Personal Message.

    Science.gov (United States)

    Whitney, Gill

    2015-01-01

    The aim of this paper is to describe ongoing research being carried out to enable people with visual impairments to communicate directly with designers and specifiers of hobby and community web sites to maximise the accessibility of their sites. The research started with an investigation of the accessibility of community and hobby web sites as perceived by a group of visually impaired end users. It is continuing with an investigation into how to best to communicate with web designers who are not experts in web accessibility. The research is making use of communication theory to investigate how terminology describing personal experience can be used in the most effective and powerful way. By working with the users using a Delphi study the research has ensured that the views of the visually impaired end users is successfully transmitted.

  18. Choice in maternity care: associations with unit supply, geographic accessibility and user characteristics

    Science.gov (United States)

    2012-01-01

    Background Despite national policies to promote user choice for health services in many European countries, current trends in maternity unit closures create a context in which user choice may be reduced, not expanded. Little attention has been paid to the potential impact of closures on pregnant women’s choice of maternity unit. We study here how pregnant women’s choices interact with the distance they must travel to give birth, individual socioeconomic characteristics and the supply of maternity units in France in 2003. Results Overall, about one-third of women chose their maternity units based on proximity. This proportion increased steeply as supply was constrained. Greater distances between the first and second closest maternity unit were strongly associated with increasing preferences for proximity; when these distances were ≥ 30 km, over 85% of women selected the closest unit (revealed preference) and over 70% reported that proximity was the reason for their choice (expressed preference). Women living at a short distance to the closest maternity unit appeared to be more sensitive to increases in distance between their first and second closest available maternity units. The preference for proximity, expressed and revealed, was related to demographic and social characteristics: women from households in the manual worker class chose a maternity unit based on its proximity more often and also went to the nearest unit when compared with women from professional and managerial households. These sociodemographic associations held true after adjusting for supply factors, maternal age and socioeconomic status. Conclusions Choice seems to be arbitrated in both absolute and relative terms. Taking changes in supply into consideration and how these affect choice is an important element for assessing the real impact of maternity unit closures on pregnant women’s experiences. An indicator measuring the proportion of women for whom the distance between the first

  19. Relating timed and register automata

    Directory of Open Access Journals (Sweden)

    Diego Figueira

    2010-11-01

    Full Text Available Timed automata and register automata are well-known models of computation over timed and data words respectively. The former has clocks that allow to test the lapse of time between two events, whilst the latter includes registers that can store data values for later comparison. Although these two models behave in appearance differently, several decision problems have the same (undecidability and complexity results for both models. As a prominent example, emptiness is decidable for alternating automata with one clock or register, both with non-primitive recursive complexity. This is not by chance. This work confirms that there is indeed a tight relationship between the two models. We show that a run of a timed automaton can be simulated by a register automaton, and conversely that a run of a register automaton can be simulated by a timed automaton. Our results allow to transfer complexity and decidability results back and forth between these two kinds of models. We justify the usefulness of these reductions by obtaining new results on register automata.

  20. The ARAC client system: network-based access to ARAC

    International Nuclear Information System (INIS)

    Leach, M J; Sumikawa, D; Webster, C

    1999-01-01

    The ARAC Client System allows users (such as emergency managers and first responders) with commonly available desktop and laptop computers to utilize the central ARAC system over the Internet or any other communications link using Internet protocols. Providing cost-effective fast access to the central ARAC system greatly expands the availability of the ARAC capability. The ARAC Client system consists of (1) local client applications running on the remote user's computer, and (2) ''site servers'' that provide secure access to selected central ARAC system capabilities and run on a scalable number of dedicated workstations residing at the central facility. The remote client applications allow users to describe a real or potential them-bio event, electronically sends this information to the central ARAC system which performs model calculations, and quickly receive and visualize the resulting graphical products. The site servers will support simultaneous access to ARAC capabilities by multiple users. The ARAC Client system is based on object-oriented client/server and distributed computing technologies using CORBA and Java, and consists of a large number of interacting components

  1. Free-space optical code-division multiple-access system design

    Science.gov (United States)

    Jeromin, Lori L.; Kaufmann, John E.; Bucher, Edward A.

    1993-08-01

    This paper describes an optical direct-detection multiple access communications system for free-space satellite networks utilizing code-division multiple-access (CDMA) and forward error correction (FEC) coding. System performance is characterized by how many simultaneous users operating at data rate R can be accommodated in a signaling bandwidth W. The performance of two CDMA schemes, optical orthogonal codes (OOC) with FEC and orthogonal convolutional codes (OCC), is calculated and compared to information-theoretic capacity bounds. The calculations include the effects of background and detector noise as well as nonzero transmitter extinction ratio and power imbalance among users. A system design for 10 kbps multiple-access communications between low-earth orbit satellites is given. With near- term receiver technology and representative system losses, a 15 W peak-power transmitter provides 10-6 BER performance with seven interfering users and full moon background in the receiver FOV. The receiver employs an array of discrete wide-area avalanche photodiodes (APD) for wide field of view coverage. Issues of user acquisition and synchronization, implementation technology, and system scalability are also discussed.

  2. Towards a Two-Dimensional Framework for User Models

    NARCIS (Netherlands)

    Vrieze, P.T. de; Bommel, P. van; Klok, J.; Weide, Th.P. van der; Gensel, Jérôme; Sèdes, Florence; Martin, Hervé

    2003-01-01

    The focus of this paper is user modeling in the context of personalisation of information systems. Such a personalisation is essential to give users the feeling that the system is easily accessible. The way this adaptive personalization works is very dependent on the adaptation model that is

  3. Computer Registration Becoming Mandatory

    CERN Multimedia

    2003-01-01

    Following the decision by the CERN Management Board (see Weekly Bulletin 38/2003), registration of all computers connected to CERN's network will be enforced and only registered computers will be allowed network access. The implementation has started with the IT buildings, continues with building 40 and the Prevessin site (as of Tuesday 4th November 2003), and will cover the whole of CERN before the end of this year. We therefore recommend strongly that you register all your computers in CERN's network database including all network access cards (Ethernet AND wireless) as soon as possible without waiting for the access restriction to take force. This will allow you accessing the network without interruption and help IT service providers to contact you in case of problems (e.g. security problems, viruses, etc.) Users WITH a CERN computing account register at: http://cern.ch/register/ (CERN Intranet page) Visitors WITHOUT a CERN computing account (e.g. short term visitors) register at: http://cern.ch/regis...

  4. External access to ALICE controls conditions data

    International Nuclear Information System (INIS)

    Jadlovský, J; Jadlovská, A; Sarnovský, J; Jajčišin, Š; Čopík, M; Jadlovská, S; Papcun, P; Bielek, R; Čerkala, J; Kopčík, M; Chochula, P; Augustinus, A

    2014-01-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead – users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data – an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  5. The Copenhagen School Health Records Register

    DEFF Research Database (Denmark)

    Baker, Jennifer L; Sørensen, Thorkild I A

    2011-01-01

    The Copenhagen School Health Records Register is an electronic register of health examination information on 372,636 children who attended school in Copenhagen, Denmark from 1936 to 2005.......The Copenhagen School Health Records Register is an electronic register of health examination information on 372,636 children who attended school in Copenhagen, Denmark from 1936 to 2005....

  6. The Danish Adoption Register

    DEFF Research Database (Denmark)

    Petersen, Liselotte; Sørensen, Thorkild I A

    2011-01-01

    The Danish Adoption Register was established in 1963-1964 to explore the genetic and environmental contribution to familial aggregation of schizophrenia.......The Danish Adoption Register was established in 1963-1964 to explore the genetic and environmental contribution to familial aggregation of schizophrenia....

  7. EPOS Seismology services and their users

    Science.gov (United States)

    Haslinger, Florian; Dupont, Aurelien; Michelini, Alberto; Rietbrock, Andreas; Sleeman, Reinoud; Wiemer, Stefan; Basili, Roberto; Bossu, Rémy; Cakti, Eser; Cotton, Fabrice; Crawford, Wayne; Crowley, Helen; Danciu, Laurentiu; Diaz, Jordi; Garth, Tom; Locati, Mario; Luzi, Lucia; Pitilakis, Kyriazis; Roumelioti, Zafeiria; Strollo, Angelo

    2017-04-01

    The construction of seismological community services for the European Plate Observing System Research Infrastructure (EPOS) is by now well under way. A significant number of services are already operational, largely based on those existing at established institutions or collaborations like ORFEUS, EMSC, AHEAD and EFEHR, and more are being added to be ready for internal validation by late 2017. In this presentation we focus on a number of issues related to the interaction of the community of users with the services provided by the seismological part of the EPOS research infrastructure. How users interact with a service (and how satisfied they are with this interaction) is viewed as one important component of the validation of a service within EPOS, and certainly is key to the uptake of a service and from that also it's attributed value. Within EPOS Seismology, the following aspects of user interaction have already surfaced: - user identification (and potential tracking) versus ease-of-access and openness Requesting users to identify themselves when accessing a service provides various advantages to providers and users (e.g. quantifying & qualifying the service use, customization of services and interfaces, handling access rights and quotas), but may impact the ease of access and also shy away users who don't wish to be identified for whatever reason. - service availability versus cost There is a clear and prominent connection between the availability of a service, both regarding uptime and capacity, and its operational cost (IT systems and personnel), and it is often not clear where to draw the line (and based on which considerations). In connection to that, how to best utilize third-party IT infrastructures (either commercial or public), and what the long-term cost implications of that might be, is equally open. - licensing and attribution The issue of intellectual property and associated licensing policies for data, products and services is only recently gaining

  8. Providing the Public with Online Access to Large Bibliographic Data Bases.

    Science.gov (United States)

    Firschein, Oscar; Summit, Roger K.

    DIALOG, an interactive, computer-based information retrieval language, consists of a series of computer programs designed to make use of direct access memory devices in order to provide the user with a rapid means of identifying records within a specific memory bank. Using the system, a library user can be provided access to sixteen distinct and…

  9. Code-expanded radio access protocol for machine-to-machine communications

    DEFF Research Database (Denmark)

    Thomsen, Henning; Kiilerich Pratas, Nuno; Stefanovic, Cedomir

    2013-01-01

    The random access methods used for support of machine-to-machine, also referred to as Machine-Type Communications, in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. We propose an approach that is motivated b...... subframes and orthogonal preambles, the amount of available contention resources is drastically increased, enabling the massive support of Machine-Type Communication users that is beyond the reach of current systems.......The random access methods used for support of machine-to-machine, also referred to as Machine-Type Communications, in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. We propose an approach that is motivated...... by the random access method employed in LTE, which significantly increases the amount of contention resources without increasing the system resources, such as contention subframes and preambles. This is accomplished by a logical, rather than physical, extension of the access method in which the available system...

  10. Distributed data access in the sequential access model at the D0 experiment at Fermilab

    International Nuclear Information System (INIS)

    Terekhov, Igor; White, Victoria

    2000-01-01

    The authors present the Sequential Access Model (SAM), which is the data handling system for D0, one of two primary High Energy Experiments at Fermilab. During the next several years, the D0 experiment will store a total of about 1 PByte of data, including raw detector data and data processed at various levels. The design of SAM is not specific to the D0 experiment and carries few assumptions about the underlying mass storage level; its ideas are applicable to any sequential data access. By definition, in the sequential access mode a user application needs to process a stream of data, by accessing each data unit exactly once, the order of data units in the stream being irrelevant. The units of data are laid out sequentially in files. The adopted model allows for significant optimizations of system performance, decrease of user file latency and increase of overall throughput. In particular, caching is done with the knowledge of all the files needed in the near future, defined as all the files of the already running or submitted jobs. The bulk of the data is stored in files on tape in the mass storage system (MSS) called Enstore[2] and also developed at Fermilab. (The tape drives are served by an ADIC AML/2 Automated Tape Library). At any given time, SAM has a small fraction of the data cached on disk for processing. In the present paper, the authors discuss how data is delivered onto disk and how it is accessed by user applications. They will concentrate on data retrieval (consumption) from the MSS; when SAM is used for storing of data, the mechanisms are rather symmetrical. All of the data managed by SAM is cataloged in great detail in a relational database (ORACLE). The database also serves as the persistency mechanism for the SAM servers described in this paper. Any client or server in the SAM system which needs to store or retrieve information from the database does so through the interfaces of a CORBA-based database server. The users (physicists) use the

  11. Towards Emulation-as-a-Service: Cloud Services for Versatile Digital Object Access

    Directory of Open Access Journals (Sweden)

    Dirk von Suchodoletz

    2013-06-01

    Full Text Available The changing world of IT services opens the chance to more tightly integrate digital long-term preservation into systems, both for commercial and end users. The emergence of cloud offerings re-centralizes services, and end users interact with them remotely through standardized (web-client applications on their various devices. This offers the chance to use partially the same concepts and methods to access obsolete computer environments and allows for more sustainable business processes. In order to provide a large variety of user-friendly remote emulation services, especially in combination with authentic performance and user experience, a distributed system model and architecture is required, suitable to run as a cloud service, allowing for the specialization both of memory institutions and third party service providers.The shift of the usually non-trivial task of the emulation of obsolete software environments from the end user to specialized providers can help to simplify digital preservation and access strategies. Besides offering their users better access to their holdings, libraries and archives may gain new business opportunities to offer services to a third party, such as businesses requiring authentic reproduction of digital objects and processes for legal reasons. This paper discusses cloud concepts as the next logical step for accessing original digital material. Emulation-as-a-Service (EaaS fills the gap between the successful demonstration of emulation strategies as a long term access strategy and it’s perceived availability and usability. EaaS can build upon the ground of research and prototypical implementations of previous projects, and reuse well established remote access technology.In this article we develop requirements and a system model, suitable for a distributed environment. We will discuss the building blocks of the core services as well as requirements regarding access management. Finally, we will try to present a

  12. Accessibility information in New Delhi for "EasenAccess" Android-based app for persons with disability: an observational study.

    Science.gov (United States)

    Agarwal, Yashovardhan

    2018-06-14

    adaptations to people's living environments, which will enable them to use their wheelchair indoors. In Accessible Routes from Crowd-based Cloud Services (ARCCS) many NGOs have been able to develop sensors, which are themselves part of the Internet of Things, which when attached to a mobility device extend the ability of that device. Users can interact with the sensor data on their mobile phone via an app. They can also add geo-tagged photo or voice notes to annotate their journey. These can then be shared with other users of the ARCCS system. The system has been developed with a range of wheelchair users and other stakeholders. For example, one such initiative by the Government of India is called "Street Rehab". The aim of Street Rehab is to co-develop a new system for delivering a service for wheelchair users, which puts everyday activities at the heart of the rehabilitation process. To do this, a clear understanding of user needs, available technology and the accessibility of the city are all required. The first step is to understand the current accessibility of Delhi, the next to map this with the rehabilitation and livelihoods requirements of the wheelchair and tricycle users. This approach has led to the development of novel sensors and a data processing chain, which can automatically identify features of the sidewalk or surface, for example, drop curb, camber, and rough terrain. These classifications are then used to help with increasing localization of the person. In addition, the sensors can be used to identify how the pushing techniques of people, who self-propel their wheelchair. They have developed these sensors, as mobile phones alone, while useful if secured in a fixed position, are not adequate when loosely placed in bags or pockets. The aim is to find practical solutions for those who use mobility aids in India to access the services and places they wish to without risk of injury. Injuries can occur due to toppling out of a mobility device, being hit by a

  13. Awareness and use of electronic databases by public library users ...

    African Journals Online (AJOL)

    The study investigated awareness, access and use of electronic database by public library users in Ibadan Oyo State in Nigeria. The purpose of this study was to determine awareness of public library users' electronic databases, find out what these users used electronic databases to do and to identify problems associated ...

  14. PubChem Power User Gateway (PUG)

    Data.gov (United States)

    U.S. Department of Health & Human Services — PUG provides access to PubChem services via a programmatic interface. Users may download data, initiate chemical structure searches, standardize chemical structures...

  15. ASRC Aerospace Corporation Selects Dynamically Reconfigurable Anadigm(Registered Trademark) FPAA For Advanced Data Acquisition System

    Science.gov (United States)

    Mata, Carlos T.

    2003-01-01

    Anadigm(registered trademark) today announced that ASRC Aerospace Corporation has designed Anadigm's dynamically reconfigurable Field Programmable Analog Array (FPAA) technology into an advanced data acquisition system developed under contract for NASA. ASRC Aerospace designed in the Anadigm(registered trademark) FPAA to provide complex analog signal conditioning in its intelligent, self-calibrating, and self-healing advanced data acquisition system (ADAS). The ADAS has potential applications in industrial, manufacturing, and aerospace markets. This system offers highly reliable operation while reducing the need for user interaction. Anadigm(registered trademark)'s dynamically reconfigurable FPAAs can be reconfigured in-system by the designer or on the fly by a microprocessor. A single device can thus be programmed to implement multiple analog functions and/or to adapt on-the-fly to maintain precision operation despite system degradation and aging. In the case of the ASRC advanced data acquisition system, the FPAA helps ensure that the system will continue to operating at 100% functionality despite changes in the environment, component degradation, and/or component failures.

  16. Registers of multiple sclerosis in Denmark

    DEFF Research Database (Denmark)

    Koch-Henriksen, N; Magyari, M; Laursen, B

    2015-01-01

    between a number of different environmental exposures in the past and the subsequent risk of MS. Some of these studies have been able to exonerate suspected risk factors. The other register, the nationwide Danish Multiple Sclerosis Treatment Register, is a follow-up register for all patients who have......There are two nationwide population-based registers for multiple sclerosis (MS) in Denmark. The oldest register is The Danish Multiple Sclerosis Registry (DMSR), which is an epidemiological register for estimation of prevalence and incidence of MS and survival, and for identifying exposures earlier...... received disease-modifying treatments since 1996. It has, in particular, contributed to the knowledge of the role of antibodies against the biological drugs used for the treatment of MS....

  17. A user's manual to the PMBOK guide

    CERN Document Server

    Stackpole Snyder, Cynthia

    2013-01-01

    The must-have manual to understand and use the latest edition of the Fifth Edition The professional standard in the field of project management, A Guide to the Project Management Body of Knowledge (PMBOK® Guide-Fifth Edition) published by the Project Management Institute (PMI) serves as the ultimate resource for professionals and as a valuable studying and training device for students taking the PMP® Exam. A User''s Manual to the PMBOK® Guide takes the next logical step to act as a true user''s manual. With an accessible format and easy-to-understand language, it helps to not only distill es

  18. Policies to Promote User Innovation

    DEFF Research Database (Denmark)

    Svensson, Peter; Hartmann, Rasmus Koss

    and benefits of such policies. As a first empirical step to understanding such policies, this paper reports on the results of providing hospital clinicians with access to ‘makerspaces’, i.e. staffed facilities with prototyping tools and the expertise in using them. Findings suggest that almost all innovations...... developed in the makerspaces are user innovations; that the potential returns from the first 56 innovations developed in the makerspaces are 30-80 times the required investment; and that most of the innovations would not have been developed without access to makerspaces. Yet owing to lack of diffusion, only...... a limited share of potential returns is realized. This suggests that provision of makerspaces, at least in healthcare contexts, is a tremendously effective form of user-supporting innovation policy both from an organizational and societal perspective, but also that it might need to be supplemented...

  19. Dynamically Authorized Role-Based Access Control for Grid Applications

    Institute of Scientific and Technical Information of China (English)

    YAO Hanbing; HU Heping; LU Zhengding; LI Ruixuan

    2006-01-01

    Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations". The heterogeneous, dynamic and multi-domain nature of these environments makes challenging security issues that demand new technical approaches. Despite the recent advances in access control approaches applicable to Grid computing, there remain issues that impede the development of effective access control models for Grid applications. Among them there are the lack of context-based models for access control, and reliance on identity or capability-based access control schemes. An access control scheme that resolve these issues is presented, and a dynamically authorized role-based access control (D-RBAC) model extending the RBAC with context constraints is proposed. The D-RABC mechanisms dynamically grant permissions to users based on a set of contextual information collected from the system and user's environments, while retaining the advantages of RBAC model. The implementation architecture of D-RBAC for the Grid application is also described.

  20. The Danish Pathology Register

    DEFF Research Database (Denmark)

    Bjerregaard, Beth; Larsen, Ole B

    2011-01-01

    The National Board of Health, Denmark in 1997 published guidelines for reporting of pathology data and the Danish Pathology Register (DPR) was established.......The National Board of Health, Denmark in 1997 published guidelines for reporting of pathology data and the Danish Pathology Register (DPR) was established....

  1. Break-glass handling exceptional situations in access control

    CERN Document Server

    Petritsch, Helmut

    2014-01-01

    Helmut Petritsch describes the first holistic approach to Break-Glass which covers the whole life-cycle: from access control modeling (pre-access), to logging the security-relevant system state during Break-Glass accesses (at-access), and the automated analysis of Break-Glass accesses (post-access). Break-Glass allows users to override security restrictions in exceptional situations. While several Break-Glass models specific to given access control models have already been discussed in research (e.g., extending RBAC with Break-Glass), the author introduces a generic Break-Glass model. The pres

  2. IT Risk register

    OpenAIRE

    Kohout, Karel

    2011-01-01

    The theoretical part of the thesis analyzes several selected methodologies and best-practices related to information technology risks management, with focus on documents and guidance developed by ISACA. It builds a set of ideas and basic requirements for effective model of an IT risk register. Strong emphasis is placed on mapping CobiT 4.1 based Risk IT to COBIT 5. The practical part describes implementation of an exploratory web-based IT risk register in Python programming language utilizing...

  3. Joint control algorithm in access network

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    To deal with long probing delay and inaccurate probing results in the endpoint admission control method,a joint local and end-to-end admission control algorithm is proposed,which introduces local probing of access network besides end-to-end probing.Through local probing,the algorithm accurately estimated the resource status of the access network.Simulation shows that this algorithm can improve admission control performance and reduce users' average waiting time when the access network is heavily loaded.

  4. Barriers and facilitators to using NHS Direct: a qualitative study of 'users' and 'non-users'.

    Science.gov (United States)

    Cook, Erica J; Randhawa, Gurch; Large, Shirley; Guppy, Andy; Chater, Angel M; Ali, Nasreen

    2014-10-25

    NHS Direct, introduced in 1998, has provided 24/7 telephone-based healthcare advice and information to the public in England and Wales. National studies have suggested variation in the uptake of this service amongst the UK's diverse population. This study provides the first exploration of the barriers and facilitators that impact upon the uptake of this service from the perspectives of both 'users' and 'non- users'. Focus groups were held with NHS Direct 'users' (N = 2) from Bedfordshire alongside 'non-users' from Manchester (N = 3) and Mendip, Somerset (N = 4). Each focus group had between five to eight participants. A total of eighty one people aged between 21 and 94 years old (M: 58.90, SD: 22.70) took part in this research. Each focus group discussion lasted approximately 90 minutes and was audiotape-recorded with participants' permission. The recordings were transcribed verbatim. A framework approach was used to analyse the transcripts. The findings from this research uncovered a range of barriers and facilitators that impact upon the uptake of NHS Direct. 'Non-users' were unaware of the range of services that NHS Direct provided. Furthermore, 'non-users' highlighted a preference for face-to face communication, identifying a lack of confidence in discussing healthcare over the telephone. This was particularly evident among older people with cognitive difficulties. The cost to telephone a '0845' number from a mobile was also viewed to be a barrier to access NHS Direct, expressed more often by 'non-users' from deprived communities. NHS Direct 'users' identified that awareness, ease of use and convenience were facilitators which influenced their decision to use the service. An understanding of the barriers and facilitators which impact on the access and uptake of telephone-based healthcare is essential to move patients towards the self-care model. This research has highlighted the need for telephone-based healthcare services to increase public awareness; through

  5. Access 2013 all-in-one for dummies

    CERN Document Server

    Barrows, Alison; Taylor, Allen G

    2013-01-01

    Get started with the new Access 2013 with this impressive all-in-one reference! Microsoft Access allows you to store, organize, view, analyze, and share data; the new release enables you to build even more powerful, custom database solutions that integrate with the web and enterprise data sources. This compilation of nine indispensible minibooks is exactly what you need to get up to speed on the latest changes to Access. This easy-to-understand resource provides both new and experienced Access users with invaluable advice for connecting Access to SQL Server, manipulating data local

  6. Psychological risk factors of addiction to social networking site among Chinese smart phone users

    OpenAIRE

    Wu, Anise M. S.; Cheung, Vivi I.; Ku, L.; Hung, Eva P. W.

    2013-01-01

    Background and aims: Smartphones allow users to access social networking sites (SNSs) whenever and wherever they want. Such easy availability and accessibility may increase their vulnerability to addiction. Based on the social cognitive theory (SCT), we examined the impacts of outcome expectancies, self-efficacy, and impulsivity on young Chinese smartphone users' addictive tendencies toward SNSs. Methods: Two hundred seventy-seven Macau young smartphone users (116 males and 161 females; mean ...

  7. Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning

    OpenAIRE

    Lee, Wei-Han; Lee, Ruby B.

    2017-01-01

    Authentication of smartphone users is important because a lot of sensitive data is stored in the smartphone and the smartphone is also used to access various cloud data and services. However, smartphones are easily stolen or co-opted by an attacker. Beyond the initial login, it is highly desirable to re-authenticate end-users who are continuing to access security-critical services and data. Hence, this paper proposes a novel authentication system for implicit, continuous authentication of the...

  8. The borderless online user

    DEFF Research Database (Denmark)

    Riis, Thomas; Schovsbo, Jens Hemmingsen

    2017-01-01

    Traditionally copyright has been exploited in separate geographical markets. This practice restricts the ability of users to access online services, music, movies and sports events on their electronic devices wherever they are in Europe and regardless of borders, viz. so called ‘portability...... of amending the current legal regime. This contribution argues, however, that existing EU rules and principles, in particular the rules of competition law, may deal with the challenges of the existing restrictions on the cross-border access to online services to such an extent that those challenges...

  9. Very wide register : an asymmetric register file organization for low power embedded processors.

    NARCIS (Netherlands)

    Raghavan, P.; Lambrechts, A.; Jayapala, M.; Catthoor, F.; Verkest, D.T.M.L.; Corporaal, H.

    2007-01-01

    In current embedded systems processors, multi-ported register files are one of the most power hungry parts of the processor, even when they are clustered. This paper presents a novel register file architecture, which has single ported cells and asymmetric interfaces to the memory and to the

  10. Computer Registration Becoming Mandatory

    CERN Multimedia

    2003-01-01

    Following the decision by the CERN Management Board (see Weekly Bulletin 38/2003), registration of all computers connected to CERN's network will be enforced and only registered computers will be allowed network access. The implementation has started with the IT buildings, continues with building 40 and the Prevessin site (as of Tuesday 4th November 2003), and will cover the whole of CERN before the end of this year. We therefore recommend strongly that you register all your computers in CERN's network database (Ethernet and wire-less cards) as soon as possible without waiting for the access restriction to take force. This will allow you accessing the network without interruption and help IT service providers to contact you in case of problems (security problems, viruses, etc.) • Users WITH a CERN computing account register at: http://cern.ch/register/ (CERN Intranet page) • Visitors WITHOUT a CERN computing account (e.g. short term visitors) register at: http://cern.ch/registerVisitorComp...

  11. High-fidelity projective read-out of a solid-state spin quantum register.

    Science.gov (United States)

    Robledo, Lucio; Childress, Lilian; Bernien, Hannes; Hensen, Bas; Alkemade, Paul F A; Hanson, Ronald

    2011-09-21

    Initialization and read-out of coupled quantum systems are essential ingredients for the implementation of quantum algorithms. Single-shot read-out of the state of a multi-quantum-bit (multi-qubit) register would allow direct investigation of quantum correlations (entanglement), and would give access to further key resources such as quantum error correction and deterministic quantum teleportation. Although spins in solids are attractive candidates for scalable quantum information processing, their single-shot detection has been achieved only for isolated qubits. Here we demonstrate the preparation and measurement of a multi-spin quantum register in a low-temperature solid-state system by implementing resonant optical excitation techniques originally developed in atomic physics. We achieve high-fidelity read-out of the electronic spin associated with a single nitrogen-vacancy centre in diamond, and use this read-out to project up to three nearby nuclear spin qubits onto a well-defined state. Conversely, we can distinguish the state of the nuclear spins in a single shot by mapping it onto, and subsequently measuring, the electronic spin. Finally, we show compatibility with qubit control: we demonstrate initialization, coherent manipulation and single-shot read-out in a single experiment on a two-qubit register, using techniques suitable for extension to larger registers. These results pave the way for a test of Bell's inequalities on solid-state spins and the implementation of measurement-based quantum information protocols. © 2011 Macmillan Publishers Limited. All rights reserved

  12. Uniform access to clinical data in a distributed environment. Radiology

    International Nuclear Information System (INIS)

    Adelhard, K.; Swoboda, N.; Nissen-Meyer, S.; Reiser, M.

    1999-01-01

    Purpose: Providing medical reports on wards and ambulatory settings in electronic form can improve the quality of health care delivery. Radiology was chosen as an example to demonstrate how to implement uniform access to clinical data in a hospital. Method: Medical professionals at the university hospital in Munich, Grosshadern, have access to all radiological reports of their patients. Web browsers are used as a front end. A centralized administration of users and patients is in place. Results: Centralized access control and patient selection guarantee uniform access to all applicable data via intranet and controls access rights. The high acceptance of this service is reflected by the high number of 150 requests per day. Discussion: Access to radiological reports within the Grosshadern University Clinics was enabled via web browsers in a short time. The high acceptance of the system also proves its easy use. Integration of the system in a centralized user and patient identification system supports the unified access to clinical data. (orig.) [de

  13. Libraries as facilitators in access to information by visually impaired users

    Directory of Open Access Journals (Sweden)

    Tania Milca Malheiros

    2017-10-01

    Full Text Available This article deals with the role of libraries as collaborators in the process of information acquisition by visually impaired users. It aims to show the importance of this role in the process of social inclusion of these users and the need to discuss this issue. As a fundamental point for its inclusion are the production and supply of alternative materials. The barriers faced in the process of information acquisition are cited, such as the lack of adapted materials and the cost of production. It also presents a history of the acquisition of information from these users and their inclusion in Brazilian and foreign libraries. The research method used was the literature review having been consulted the databaseLibrary and Information Science Abstracts (LISA, Library & Information Science and TechnologyAbstracts (LISTA, Information Science and Technology Abstracts (ISTA, Base de dados de Periódicos em Ciência da Informação (BRAPCI, Google and Google Scholar.As a conclusion, we point out the cooperation between library services as a solution to this issue.

  14. I need to know! Timely accessing of perioperative user manuals.

    Science.gov (United States)

    Landreneau, Raphael

    2010-12-01

    Ready access to equipment or product information is essential for the safe operation of the many items that a perioperative nurse is asked to use, troubleshoot, or maintain. One institution's solution for making manufacturer information available in the practice setting was to create a facility intranet site dedicated to OR equipment manuals. This site provides information access to perioperative nurses and support staff members and, ultimately, helps improve patient care. Published by Elsevier Inc. All rights reserved.

  15. Advanced Test Reactor National Scientific User Facility Partnerships

    International Nuclear Information System (INIS)

    Marshall, Frances M.; Allen, Todd R.; Benson, Jeff B.; Cole, James I.; Thelen, Mary Catherine

    2012-01-01

    In 2007, the United States Department of Energy designated the Advanced Test Reactor (ATR), located at Idaho National Laboratory, as a National Scientific User Facility (NSUF). This designation made test space within the ATR and post-irradiation examination (PIE) equipment at INL available for use by researchers via a proposal and peer review process. The goal of the ATR NSUF is to provide researchers with the best ideas access to the most advanced test capability, regardless of the proposer's physical location. Since 2007, the ATR NSUF has expanded its available reactor test space, and obtained access to additional PIE equipment. Recognizing that INL may not have all the desired PIE equipment, or that some equipment may become oversubscribed, the ATR NSUF established a Partnership Program. This program enables and facilitates user access to several university and national laboratories. So far, seven universities and one national laboratory have been added to the ATR NSUF with capability that includes reactor-testing space, PIE equipment, and ion beam irradiation facilities. With the addition of these universities, irradiation can occur in multiple reactors and post-irradiation exams can be performed at multiple universities. In each case, the choice of facilities is based on the user's technical needs. Universities and laboratories included in the ATR NSUF partnership program are as follows: (1) Nuclear Services Laboratories at North Carolina State University; (2) PULSTAR Reactor Facility at North Carolina State University; (3) Michigan Ion Beam Laboratory (1.7 MV Tandetron accelerator) at the University of Michigan; (4) Irradiated Materials at the University of Michigan; (5) Harry Reid Center Radiochemistry Laboratories at University of Nevada, Las Vegas; (6) Characterization Laboratory for Irradiated Materials at the University of Wisconsin-Madison; (7) Tandem Accelerator Ion Beam. (1.7 MV terminal voltage tandem ion accelerator) at the University of Wisconsin

  16. User Centric Policy Management

    Science.gov (United States)

    Cheek, Gorrell P.

    2013-01-01

    Internet use, in general, and online social networking sites, in particular, are experiencing tremendous growth with hundreds of millions of active users. As a result, there is a tremendous amount of privacy information and content online. Protecting this information is a challenge. Access control policy composition is complex, laborious and…

  17. Space Telescope Control System science user operations

    Science.gov (United States)

    Dougherty, H. J.; Rossini, R.; Simcox, D.; Bennett, N.

    1984-01-01

    The Space Telescope science users will have a flexible and efficient means of accessing the capabilities provided by the ST Pointing Control System, particularly with respect to managing the overal acquisition and pointing functions. To permit user control of these system functions - such as vehicle scanning, tracking, offset pointing, high gain antenna pointing, solar array pointing and momentum management - a set of special instructions called 'constructs' is used in conjuction with command data packets. This paper discusses the user-vehicle interface and introduces typical operational scenarios.

  18. The Design and Evaluation of a Front-End User Interface for Energy Researchers.

    Science.gov (United States)

    Borgman, Christine L.; And Others

    1989-01-01

    Reports on the Online Access to Knowledge (OAK) Project, which developed software to support end user access to a Department of Energy database based on the skill levels and needs of energy researchers. The discussion covers issues in development, evaluation, and the study of user behavior in designing an interface tailored to a special…

  19. 76 FR 17064 - Shared Use Path Accessibility Guidelines

    Science.gov (United States)

    2011-03-28

    ...] RIN 3014-AA41 Shared Use Path Accessibility Guidelines AGENCY: Architectural and Transportation... (ANPRM) to develop accessibility guidelines for shared use paths. Shared use paths are designed for both... users. The guidelines will include technical provisions for making newly constructed and altered shared...

  20. Registered Nurse (Associate Degree).

    Science.gov (United States)

    Ohio State Univ., Columbus. Center on Education and Training for Employment.

    This document, which is designed for use in developing a tech prep competency profile for the occupation of registered nurse (with an associate degree), lists technical competencies and competency builders for 19 units pertinent to the health technologies cluster in general and 5 units specific to the occupation of registered nurse. The following…

  1. Contribution of microfinance in enhancing food access and coping ...

    African Journals Online (AJOL)

    African Journal of Food, Agriculture, Nutrition and Development. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 17, No 3 (2017) >. Log in or Register to get access to full text downloads.

  2. Public access to private land in Scotland | Miller | Potchefstroom ...

    African Journals Online (AJOL)

    Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 15, No 2 (2012) >. Log in or Register to get access to full text downloads.

  3. Dual-mode ultraflow access networks: a hybrid solution for the access bottleneck

    Science.gov (United States)

    Kazovsky, Leonid G.; Shen, Thomas Shunrong; Dhaini, Ahmad R.; Yin, Shuang; De Leenheer, Marc; Detwiler, Benjamin A.

    2013-12-01

    Optical Flow Switching (OFS) is a promising solution for large Internet data transfers. In this paper, we introduce UltraFlow Access, a novel optical access network architecture that offers dual-mode service to its end-users: IP and OFS. With UltraFlow Access, we design and implement a new dual-mode control plane and a new dual-mode network stack to ensure efficient connection setup and reliable and optimal data transmission. We study the impact of the UltraFlow system's design on the network throughput. Our experimental results show that with an optimized system design, near optimal (around 10 Gb/s) OFS data throughput can be attained when the line rate is 10Gb/s.

  4. The design and implementation of access control management system in IHEP network

    International Nuclear Information System (INIS)

    Wang Yanming; An Dehai; Qi Fazhi

    2010-01-01

    In campus network environment of Institute of High Energy Physics, because of the number of Network devices and computers are large scale, ensuring the access validity of network devices and user's computer, and aiming at effective control the exceptional network communication are technological means to achieve network normal running. The access control system of Campus network of institute of High Energy Physics using MySQL database in the behind, and using CGI PHP HTML language to develop the front interface. The System achieves user information management, user computer access control, cutting down the exceptional network communication and alarm function. Increasing the management effective of network, to ensure campus network safety and reliable running. (authors)

  5. The new system of public registers in the Czech Republic

    Directory of Open Access Journals (Sweden)

    Michael Stencl

    2010-04-01

    Full Text Available This paper discusses the basic principles of data-sharing as defined in the Basic RegistryAct, No. 111/2009 Coll. Basic registers of public administration should become a new source of data for public authorities and for private entities. Authors describe the architecture of the basic registers’ system and discuss some possible technical solutions for each of the four basic registries (Registry of Inhabitants, Registry of Persons, Registry of Territorial Identification, Registry of Rights and Obligations. Special interest is put on the management of access permissions and the rules for providing the data to various clients.

  6. Efficient key management for cryptographically enforced access control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  7. Development traumatic brain injury computer user interface for disaster area in Indonesia supported by emergency broadband access network.

    Science.gov (United States)

    Sutiono, Agung Budi; Suwa, Hirohiko; Ohta, Toshizumi; Arifin, Muh Zafrullah; Kitamura, Yohei; Yoshida, Kazunari; Merdika, Daduk; Qiantori, Andri; Iskandar

    2012-12-01

    Disasters bring consequences of negative impacts on the environment and human life. One of the common cause of critical condition is traumatic brain injury (TBI), namely, epidural (EDH) and subdural hematoma (SDH), due to downfall hard things during earthquake. We proposed and analyzed the user response, namely neurosurgeon, general doctor/surgeon and nurse when they interacted with TBI computer interface. The communication systems was supported by TBI web based applications using emergency broadband access network with tethered balloon and simulated in the field trial to evaluate the coverage area. The interface consisted of demography data and multi tabs for anamnesis, treatment, follow up and teleconference interfaces. The interface allows neurosurgeon, surgeon/general doctors and nurses to entry the EDH and SDH patient's data during referring them on the emergency simulation and evaluated based on time needs and their understanding. The average time needed was obtained after simulated by Lenovo T500 notebook using mouse; 8-10 min for neurosurgeons, 12-15 min for surgeons/general doctors and 15-19 min for nurses. By using Think Pad X201 Tablet, the time needed for entry data was 5-7 min for neurosurgeon, 7-10 min for surgeons/general doctors and 12-16 min for nurses. We observed that the time difference was depending on the computer type and user literacy qualification as well as their understanding on traumatic brain injury, particularly for the nurses. In conclusion, there are five data classification for simply TBI GUI, namely, 1) demography, 2) specific anamnesis for EDH and SDH, 3) treatment action and medicine of TBI, 4) follow up data display and 5) teleneurosurgery for streaming video consultation. The type of computer, particularly tablet PC was more convenient and faster for entry data, compare to that computer mouse touched pad. Emergency broadband access network using tethered balloon is possible to be employed to cover the communications systems in

  8. Patient access to complex chronic disease records on the Internet

    Directory of Open Access Journals (Sweden)

    Bartlett Cherry

    2012-08-01

    Full Text Available Abstract Background Access to medical records on the Internet has been reported to be acceptable and popular with patients, although most published evaluations have been of primary care or office-based practice. We tested the feasibility and acceptability of making unscreened results and data from a complex chronic disease pathway (renal medicine available to patients over the Internet in a project involving more than half of renal units in the UK. Methods Content and presentation of the Renal PatientView (RPV system was developed with patient groups. It was designed to receive information from multiple local information systems and to require minimal extra work in units. After piloting in 4 centres in 2005 it was made available more widely. Opinions were sought from both patients who enrolled and from those who did not in a paper survey, and from staff in an electronic survey. Anonymous data on enrolments and usage were extracted from the webserver. Results By mid 2011 over 17,000 patients from 47 of the 75 renal units in the UK had registered. Users had a wide age range (90 yrs but were younger and had more years of education than non-users. They were enthusiastic about the concept, found it easy to use, and 80% felt it gave them a better understanding of their disease. The most common reason for not enrolling was being unaware of the system. A minority of patients had security concerns, and these were reduced after enrolling. Staff responses were also strongly positive. They reported that it aided patient concordance and disease management, and increased the quality of consultations with a neutral effect on consultation length. Neither patient nor staff responses suggested that RPV led to an overall increase in patient anxiety or to an increased burden on renal units beyond the time required to enrol each patient. Conclusions Patient Internet access to secondary care records concerning a complex chronic disease is feasible and popular

  9. Patient access to complex chronic disease records on the Internet.

    Science.gov (United States)

    Bartlett, Cherry; Simpson, Keith; Turner, A Neil

    2012-08-06

    Access to medical records on the Internet has been reported to be acceptable and popular with patients, although most published evaluations have been of primary care or office-based practice. We tested the feasibility and acceptability of making unscreened results and data from a complex chronic disease pathway (renal medicine) available to patients over the Internet in a project involving more than half of renal units in the UK. Content and presentation of the Renal PatientView (RPV) system was developed with patient groups. It was designed to receive information from multiple local information systems and to require minimal extra work in units. After piloting in 4 centres in 2005 it was made available more widely. Opinions were sought from both patients who enrolled and from those who did not in a paper survey, and from staff in an electronic survey. Anonymous data on enrollment and usage were extracted from the webserver. By mid 2011 over 17,000 patients from 47 of the 75 renal units in the UK had registered. Users had a wide age range (90 yrs) but were younger and had more years of education than non-users. They were enthusiastic about the concept, found it easy to use, and 80% felt it gave them a better understanding of their disease. The most common reason for not enrolling was being unaware of the system. A minority of patients had security concerns, and these were reduced after enrolling. Staff responses were also strongly positive. They reported that it aided patient concordance and disease management, and increased the quality of consultations with a neutral effect on consultation length. Neither patient nor staff responses suggested that RPV led to an overall increase in patient anxiety or to an increased burden on renal units beyond the time required to enroll each patient. Patient Internet access to secondary care records concerning a complex chronic disease is feasible and popular, providing an increased sense of empowerment and understanding, with no

  10. Wilmar Planning Tool, user guide

    Energy Technology Data Exchange (ETDEWEB)

    Larsen, Helge V.

    2006-01-15

    This is a short user guide to the Wilmar Planning Tool developed in the project Wind Power Integration in Liberalised Electricity Markets (WILMAR) supported by EU (Contract No. ENK5-CT-2002-00663). A User Shell implemented in an Excel workbook controls the Wilmar Planning Tool. All data are contained in Access databases that communicate with various sub-models through text files that are exported from or imported to the databases. In the User Shell various scenario variables and control parameters are set, and export of model data from the input database, activation of the models, as well as import of model results to the output database are triggered from the shell. (au)

  11. Wilmar Planning Tool, user guide

    International Nuclear Information System (INIS)

    Larsen, Helge V.

    2006-01-01

    This is a short user guide to the Wilmar Planning Tool developed in the project Wind Power Integration in Liberalised Electricity Markets (WILMAR) supported by EU (Contract No. ENK5-CT-2002-00663). A User Shell implemented in an Excel workbook controls the Wilmar Planning Tool. All data are contained in Access databases that communicate with various sub-models through text files that are exported from or imported to the databases. In the User Shell various scenario variables and control parameters are set, and export of model data from the input database, activation of the models, as well as import of model results to the output database are triggered from the shell. (au)

  12. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Science.gov (United States)

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  13. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Directory of Open Access Journals (Sweden)

    Seungsoo Baek

    2014-01-01

    Full Text Available There has been an explosive increase in the population of the OSN (online social network in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  14. Assessment of physical facilities and users' satisfaction: a case study ...

    African Journals Online (AJOL)

    Information Impact: Journal of Information and Knowledge Management. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 7, No 2 (2016) >. Log in or Register to get access to full text downloads.

  15. Capacity bounds for the 2-user Gaussian IM-DD optical multiple-access channel

    KAUST Repository

    Al-Ebraheemy, Omer M. S.; Chaaban, Anas; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2016-01-01

    Optical wireless communications (OWC) is a potential solution for coping with the mismatch between the users growing demand for higher data-rates and the wireless network capabilities. In this paper, a multi-user OWC scenario is studied from

  16. Syringe vending machines for injection drug users: an experiment in Marseille, France.

    Science.gov (United States)

    Obadia, Y; Feroni, I; Perrin, V; Vlahov, D; Moatti, J P

    1999-01-01

    OBJECTIVES: This study evaluated the usefulness of vending machines in providing injection drug users with access to sterile syringes in Marseille, France. METHODS: Self-administered questionnaires were offered to 485 injection drug users obtaining syringes from 32 pharmacies, 4 needle exchange programs, and 3 vending machines. RESULTS: Of the 343 respondents (response rate = 70.7%), 21.3% used the vending machines as their primary source of syringes. Primary users of vending machines were more likely than primary users of other sources to be younger than 30 years, to report no history of drug maintenance treatment, and to report no sharing of needles or injection paraphernalia. CONCLUSIONS: Vending machines may be an appropriate strategy for providing access to syringes for younger injection drug users, who have typically avoided needle exchange programs and pharmacies. PMID:10589315

  17. A PRELIMINARY STUDY FOR DEVELOPING ACCESSIBLE MOOC SERVICES

    Directory of Open Access Journals (Sweden)

    Francisco Iniesto

    2016-11-01

    Full Text Available The flexibility of the MOOC service allows students to learn at their own time, place and pace, enhancing continuous communication and interaction between all participants in knowledge and community building. This model especially benefits people with disabilities, which can improve therefore their level of employability and social inclusion, reaching a better quality of life. Unfortunately the access to MOOC platforms present severe barriers: there is a lack of accessibility on the learning resources, the communicating tools and personalized user interfaces. All these issues add extra difficulties such as the need to develop specific digital or even social skills for students with functional diversity. In this context, MOOCs are leading a revolutionary computer and mobile-based scenario along with social technologies that will emerge new kinds of learning applications that enhance communication and collaboration processes. For that reason, this paper describes the need for designing an information model and related specifications to support a new strategy for delivering accessible MOOC courses to learners with special needs, in terms of their preferences and context of use based on a particular application profile. This user profile’s design is based on standard metadata schemas, data that provides information about other data, regarding the achievement of accessibility from content to user preferences.

  18. Role Based Access Control system in the ATLAS experiment

    International Nuclear Information System (INIS)

    Valsan, M L; Dumitru, I; Darlea, G L; Bujor, F; Dobson, M; Miotto, G Lehmann; Schlenker, S; Avolio, G; Scannicchio, D A; Filimonov, V; Khomoutnikov, V; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Twomey, M

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (∼3000), roles (∼320), groups (∼80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  19. Policies to promote user innovation

    DEFF Research Database (Denmark)

    Svensson, Peter O.; Hartmann, Rasmus Koss

    2018-01-01

    of such policies. It is also not clear whether there is a problem for user-directed policy to solve, or what that problem is. As a first empirical step to answering these questions, we report the results of providing hospital clinicians with access to ‘makerspaces’, i.e. staffed facilities with prototyping tools...... and the expertise in using them. Findings suggest that almost all innovations developed in the makerspaces are user innovations; that the potential returns from the innovations developed in the makerspaces’ first year of operation are more than tenfold the required investment; and that most of the innovations would...... not have been developed without access to makerspaces. Due to lack of diffusion, only a limited share of potential returns is realized. This suggests not only that there are problems of non-development and under-development that policy can solve and that doing so supports social welfare. It also suggests...

  20. European correlation counter (ECC) VER. 1.0 users manual

    International Nuclear Information System (INIS)

    Vocino, V.

    1989-01-01

    The users manual is conceived for the utilization of personal computers linked to a shift register for the assay of Pu containing fuel. It is based on an MS DOS system and permits the users to store calibration curves, constants, measurement and assay data on floppy disks for ulterior utilisation. The interpretation models use the latest theories of neutron multiplication and dead time effects. The inspector is guided by the screen display step by step from the instrument test via calibration to the assay and data storage. All test, calibration and assay data can be printed out on paper tape and serve to the inspector to prepare the respective inspection report. The users are invited to make suggestions to the authors, such that the manual's use can be adapted to further requirements

  1. The Graphical User Interface Crisis: Danger and Opportunity.

    Science.gov (United States)

    Boyd, Lawrence H.; And Others

    This paper examines graphic computing environments, identifies potential problems in providing access to blind people, and describes programs and strategies being developed to provide this access. The paper begins with an explanation of how graphic user interfaces differ from character-based systems in their use of pixels, visual metaphors such as…

  2. The older adult road user : recommendations for driver assistance

    NARCIS (Netherlands)

    Wilschut, E.S.; Kroon, E.C.M.; Goede, M. de; Cremers, A.H.M.; Hoedemaeker, D.M.

    2014-01-01

    The number of older road users is getting increasingly larger in Europe. Therefore policy makers pay more attention to the abilities and limitations of this group of road users. Providing accessible and comfortable assistance and safety functions for mobility is a key challenge in the objective of

  3. 75 FR 32221 - Alticor, Inc., Including Access Business Group International, LLC, and Amway Corporation...

    Science.gov (United States)

    2010-06-07

    ... Access Business Group International, LLC, and Amway Corporation, Including On-Site Leased Workers from... Business Group International, LLC and Amway Corporation. The notice was published in the Federal Register... issued as follows: All workers of Alticor, Inc., including Access Business Group International, LLC and...

  4. Code-Expanded Random Access for Machine-Type Communications

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Stefanovic, Cedomir

    2012-01-01

    Abstract—The random access methods used for support of machine-type communications (MTC) in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. Motivated by the random access method employed in LTE, we propose...

  5. e+e- event generator EPOCS user's manual

    International Nuclear Information System (INIS)

    Kato, Kiyoshi; Munehisa, Tomo.

    1987-07-01

    EPOCS(Electron POsitron Collision Simulator) is a Monte-Carlo event generator for high energy e + e - annihilation. This program generates events based on the standard model, i.e., quantum chromodynamics (QCD) and electro-weak theory. It works at the center-of-mass energy below W + W - production, i.e., in the energy region of TRISTAN, SLC and LEP. For these high energy machines one of the important subjects is the exploration for the top quark. The production and hadronization of the top quark is included in EPOCS. Besides the top quark, we expect 'new' physics in this high energy region. EPOCS has enough flexibility for users to cope with a new idea. Users can register a new particle, modify the built-in particle data, define new primary interactions and so on. The event generator has a number of parameters, both physical parameters and control parameters. Users can control most of these parameters in EPOCS at will. (author)

  6. Route Instruction Mechanism for Mobile Users Leveraging Distributed Wireless Resources

    Science.gov (United States)

    Kakehi, Takeshi; Shinkuma, Ryoichi; Murase, Tutomu; Motoyoshi, Gen; Yamori, Kyoko; Takahashi, Tatsuro

    The market growths of smart-phones and thin clients have been significantly increasing communication traffic in mobile networks. To handle the increased traffic, network operators should consider how to leverage distributed wireless resources such as distributed spots of wireless local access networks. In this paper, we consider the system where multiple moving users share distributed wireless access points on their traveling routes between their start and goal points and formulate as an optimization problem. Then, we come up with three algorithms as a solution for the problem. The key idea here is ‘longcut route instruction’, in which users are instructed to choose a traveling route where less congested access points are available; even if the moving distance increases, the throughput for users in the system would improve. In this paper, we define the gain function. Moreover, we analyze the basic characteristics of the system using as a simple model as possible.

  7. Disruption - Access cards service

    CERN Multimedia

    2014-01-01

    We would like to inform you that between 10 November and 15 December 2014, the access cards service in Building 55 will be disrupted, as the GS Department has decided to improve the facilities for users of this building. During the work, you will find the registration, biometric registration and dosimeter exchange services on the second floor of Building 55 and the vehicle sticker service on the ground floor along with the access cards service. We thank you for your understanding and apologise for any inconvenience caused.

  8. Tagging for Subject Access: A Glimpse into Current Practice by Vendors, Libraries, and Users

    Science.gov (United States)

    Yang, Sharon Q.

    2012-01-01

    The study looked into the 307 Koha libraries listed in Breeding's Library Technology Guides. Since all the tag clouds in Koha are user-contributed, their adoption and usage can shed light on the extent to which libraries are supporting user tagging. The research also revealed that public library users are more actively involved in tagging than…

  9. An SSH key management system: easing the pain of managing key/user/account associations

    Science.gov (United States)

    Arkhipkin, D.; Betts, W.; Lauret, J.; Shiryaev, A.

    2008-07-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins.

  10. An SSH key management system: easing the pain of managing key/user/account associations

    International Nuclear Information System (INIS)

    Arkhipkin, D; Shiryaev, A; Betts, W; Lauret, J

    2008-01-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins

  11. Real time recording system of radioisotopes by local area network (LAN) computer system and user input processing

    International Nuclear Information System (INIS)

    Shinohara, Kunio; Ito, Atsushi; Kawaguchi, Hajime; Yanase, Makoto; Uno, Kiyoshi.

    1991-01-01

    A computer-assisted real time recording system was developed for management of radioisotopes. The system composed of two personal computers forming LAN, identification-card (ID-card) reader, and electricity-operating door-lock. One computer is operated by radiation safety staffs and stores the records of radioisotopes. The users of radioisotopes are registered in this computer. Another computer is installed in front of the storage room for radioisotopes. This computer is ready for operation by a registered ID-card and is input data by the user. After the completion of data input, the door to the storage room is unlocked. The present system enables us the following merits: Radiation safety staffs can easily keep up with the present states of radioisotopes in the storage room and save much labor. Radioactivity is always corrected. The upper limit of radioactivities in use per day is automatically checked and users are regulated when they input the amounts to be used. Users can obtain storage records of radioisotopes any time. In addition, the system is applicable to facilities which have more than two storage rooms. (author)

  12. Multiple-User, Multitasking, Virtual-Memory Computer System

    Science.gov (United States)

    Generazio, Edward R.; Roth, Don J.; Stang, David B.

    1993-01-01

    Computer system designed and programmed to serve multiple users in research laboratory. Provides for computer control and monitoring of laboratory instruments, acquisition and anlaysis of data from those instruments, and interaction with users via remote terminals. System provides fast access to shared central processing units and associated large (from megabytes to gigabytes) memories. Underlying concept of system also applicable to monitoring and control of industrial processes.

  13. Esophageal and gastric cancer incidence and mortality in alendronate users

    DEFF Research Database (Denmark)

    Abrahamsen, Bo; Pazianas, Michael; Eiken, Pia Agnete

    2011-01-01

    their esophageal or gastric location could be accurately distinguished. We conducted a register-based, open cohort study using national healthcare data for Denmark. Upper endoscopy frequency, cancer incidence and mortality was examined in 30,606 alendronate users (female, age 50 + ) and 122,424 matched controls......Recent studies have reached conflicting conclusions regarding the risk of esophageal cancer with oral bisphosphonates. Prior studies did not record the number of cancer deaths or endoscopy rates, which could be higher in bisphosphonate users and lead to more cancers being diagnosed at a stage when....... Primary outcomes were esophageal cancer incidence and death due to esophageal cancer. The analysis showed that alendronate users were more likely to have undergone recent upper endoscopy (4.1 vs 1.7%, p ...

  14. Accessibility and inclusion informational

    Directory of Open Access Journals (Sweden)

    Mônica Sena de Souza

    2013-06-01

    Full Text Available Introduction: Discusses the role of information professionals in meeting the informational demands of people with disabilities in the information society. The librarian is crucial for the effectiveness and success in the informational inclusion of people with disabilities, considering also continuing education for their professional qualification.Objective: To provide reflections on the role of the librarian in serving users with disabilities, highlighting the need for improvement in information units, identified in the scientific literature with regard to accessibility.Methodology: Literature search, based on a review of literature in books and scientific papers, highlighting the main authors: Adams (2000, Mazzoni (2001 and Sassaki (1997, 2002, 2005.Results: The lack of informational access for people with disabilities hampers their social and political participation, hence, reduces its condition of citizenship.Conclusion: The librarian responsible for seeking continuing education, greater involvement in the events of the area and the constant search for job training, which will reflect on the best service the information needs of users with disabilities.

  15. 1 CFR 11.7 - Federal Register Index.

    Science.gov (United States)

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Federal Register Index. 11.7 Section 11.7... REGISTER PUBLICATIONS SUBSCRIPTIONS § 11.7 Federal Register Index. The annual subscription price for the monthly Federal Register Index, purchased separately, in paper form, is $29. The price excludes postage...

  16. Activity Management System user reference manual. Revision 1

    International Nuclear Information System (INIS)

    Gates, T.A.; Burdick, M.B.

    1994-01-01

    The Activity Management System (AMS) was developed in response to the need for a simple-to-use, low-cost, user interface system for collecting and logging Hanford Waste Vitrification Plant Project (HWVP) activities. This system needed to run on user workstations and provide common user access to a database stored on a local network file server. Most important, users wanted a system that provided a management tool that supported their individual process for completing activities. Existing system treated the performer as a tool of the system. All AMS data is maintained in encrypted format. Users can feel confident that any activities they have entered into the database are private and that, as the originator, they retain sole control over who can see them. Once entered into the AMS database, the activities cannot be accessed by anyone other than the originator, the designated agent, or by authorized viewers who have been explicitly granted the right to look at specific activities by the originator. This user guide is intended to assist new AMS users in learning how to use the application and, after the initial learning process, will serve as an ongoing reference for experienced users in performing infrequently used functions. Online help screens provide reference to some of the key information in this manual. Additional help screens, encompassing all the applicable material in this manual, will be incorporated into future AMS revisions. A third, and most important, source of help is the AMS administrator(s). This guide describes the initial production version of AMS, which has been designated Revision 1.0

  17. Universal Verification Methodology Based Register Test Automation Flow.

    Science.gov (United States)

    Woo, Jae Hun; Cho, Yong Kwan; Park, Sun Kyu

    2016-05-01

    In today's SoC design, the number of registers has been increased along with complexity of hardware blocks. Register validation is a time-consuming and error-pron task. Therefore, we need an efficient way to perform verification with less effort in shorter time. In this work, we suggest register test automation flow based UVM (Universal Verification Methodology). UVM provides a standard methodology, called a register model, to facilitate stimulus generation and functional checking of registers. However, it is not easy for designers to create register models for their functional blocks or integrate models in test-bench environment because it requires knowledge of SystemVerilog and UVM libraries. For the creation of register models, many commercial tools support a register model generation from register specification described in IP-XACT, but it is time-consuming to describe register specification in IP-XACT format. For easy creation of register model, we propose spreadsheet-based register template which is translated to IP-XACT description, from which register models can be easily generated using commercial tools. On the other hand, we also automate all the steps involved integrating test-bench and generating test-cases, so that designers may use register model without detailed knowledge of UVM or SystemVerilog. This automation flow involves generating and connecting test-bench components (e.g., driver, checker, bus adaptor, etc.) and writing test sequence for each type of register test-case. With the proposed flow, designers can save considerable amount of time to verify functionality of registers.

  18. Design and Implementation of Linux Access Control Model

    Institute of Scientific and Technical Information of China (English)

    Wei Xiaomeng; Wu Yongbin; Zhuo Jingchuan; Wang Jianyun; Haliqian Mayibula

    2017-01-01

    In this paper,the design and implementation of an access control model for Linux system are discussed in detail. The design is based on the RBAC model and combines with the inherent characteristics of the Linux system,and the support for the process and role transition is added.The core idea of the model is that the file is divided into different categories,and access authority of every category is distributed to several roles.Then,roles are assigned to users of the system,and the role of the user can be transited from one to another by running the executable file.

  19. The Live Access Server Scientific Product Generation Through Workflow Orchestration

    Science.gov (United States)

    Hankin, S.; Calahan, J.; Li, J.; Manke, A.; O'Brien, K.; Schweitzer, R.

    2006-12-01

    The Live Access Server (LAS) is a well-established Web-application for display and analysis of geo-science data sets. The software, which can be downloaded and installed by anyone, gives data providers an easy way to establish services for their on-line data holdings, so their users can make plots; create and download data sub-sets; compare (difference) fields; and perform simple analyses. Now at version 7.0, LAS has been in operation since 1994. The current "Armstrong" release of LAS V7 consists of three components in a tiered architecture: user interface, workflow orchestration and Web Services. The LAS user interface (UI) communicates with the LAS Product Server via an XML protocol embedded in an HTTP "get" URL. Libraries (APIs) have been developed in Java, JavaScript and perl that can readily generate this URL. As a result of this flexibility it is common to find LAS user interfaces of radically different character, tailored to the nature of specific datasets or the mindset of specific users. When a request is received by the LAS Product Server (LPS -- the workflow orchestration component), business logic converts this request into a series of Web Service requests invoked via SOAP. These "back- end" Web services perform data access and generate products (visualizations, data subsets, analyses, etc.). LPS then packages these outputs into final products (typically HTML pages) via Jakarta Velocity templates for delivery to the end user. "Fine grained" data access is performed by back-end services that may utilize JDBC for data base access; the OPeNDAP "DAPPER" protocol; or (in principle) the OGC WFS protocol. Back-end visualization services are commonly legacy science applications wrapped in Java or Python (or perl) classes and deployed as Web Services accessible via SOAP. Ferret is the default visualization application used by LAS, though other applications such as Matlab, CDAT, and GrADS can also be used. Other back-end services may include generation of Google

  20. Molecular Electronic Shift Registers

    Science.gov (United States)

    Beratan, David N.; Onuchic, Jose N.

    1990-01-01

    Molecular-scale shift registers eventually constructed as parts of high-density integrated memory circuits. In principle, variety of organic molecules makes possible large number of different configurations and modes of operation for such shift-register devices. Several classes of devices and implementations in some specific types of molecules proposed. All based on transfer of electrons or holes along chains of repeating molecular units.

  1. Content sensitivity based access control framework for Hadoop

    Directory of Open Access Journals (Sweden)

    T.K. Ashwin Kumar

    2017-11-01

    Full Text Available Big data technologies have seen tremendous growth in recent years. They are widely used in both industry and academia. In spite of such exponential growth, these technologies lack adequate measures to protect data from misuse/abuse. Corporations that collect data from multiple sources are at risk of liabilities due to the exposure of sensitive information. In the current implementation of Hadoop, only file-level access control is feasible. Providing users with the ability to access data based on the attributes in a dataset or the user’s role is complicated because of the sheer volume and multiple formats (structured, unstructured and semi-structured of data. In this paper, we propose an access control framework, which enforces access control policies dynamically based on the sensitivity of the data. This framework enforces access control policies by harnessing the data context, usage patterns and information sensitivity. Information sensitivity changes over time with the addition and removal of datasets, which can lead to modifications in access control decisions. The proposed framework accommodates these changes. The proposed framework is automated to a large extent as the data itself determines the sensitivity with minimal user intervention. Our experimental results show that the proposed framework is capable of enforcing access control policies on non-multimedia datasets with minimal overhead.

  2. User and Machine Authentication and Authorization Infrastructure for Distributed Wireless Sensor Network Testbeds

    Directory of Open Access Journals (Sweden)

    Gerald Wagenknecht

    2013-03-01

    Full Text Available The intention of an authentication and authorization infrastructure (AAI is to simplify and unify access to different web resources. With a single login, a user can access web applications at multiple organizations. The Shibboleth authentication and authorization infrastructure is a standards-based, open source software package for web single sign-on (SSO across or within organizational boundaries. It allows service providers to make fine-grained authorization decisions for individual access of protected online resources. The Shibboleth system is a widely used AAI, but only supports protection of browser-based web resources. We have implemented a Shibboleth AAI extension to protect web services using Simple Object Access Protocol (SOAP. Besides user authentication for browser-based web resources, this extension also provides user and machine authentication for web service-based resources. Although implemented for a Shibboleth AAI, the architecture can be easily adapted to other AAIs.

  3. Improving Open Access through Prior Learning Assessment

    Science.gov (United States)

    Yin, Shuangxu; Kawachi, Paul

    2013-01-01

    This paper explores and presents new data on how to improve open access in distance education through using prior learning assessments. Broadly there are three types of prior learning assessment (PLAR): Type-1 for prospective students to be allowed to register for a course; Type-2 for current students to avoid duplicating work-load to gain…

  4. Validation of a Cerebral Palsy Register

    DEFF Research Database (Denmark)

    Topp, Monica; Langhoff-Roos, Jens; Uldall, P.

    1997-01-01

    OBJECTIVES: To analyse completeness and validity of data in the Cerebral Palsy Register in Denmark, 1979-1982. METHODS: Completeness has been assessed by comparing data from The Danish National Patient Register (DNPR) with the cases included in the Cerebral Palsy Register (CPR). Agreement between......, but gestational age was subject to a systematic error, and urinary infections in pregnancy (kappa = 0.43) and placental abruption (kappa = 0.52) were seriously under-reported in the CPR. CONCLUSIONS: Completeness of the Cerebral Palsy Register in Denmark, 1979-1982, has been assessed to maximal 85%, emphasizing...

  5. Register-based studies of healthcare costs

    DEFF Research Database (Denmark)

    Kruse, Marie; Christiansen, Terkel

    2011-01-01

    Introduction: The aim of this paper is to provide an overview and a few examples of how national registers are used in analyses of healthcare costs in Denmark. Research topics: The paper focuses on health economic analyses based on register data. For the sake of simplicity, the studies are divided...... into three main categories: economic evaluations of healthcare interventions, cost-of-illness analyses, and other analyses such as assessments of healthcare productivity. Conclusion: We examined a number of studies using register-based data on healthcare costs. Use of register-based data renders...

  6. 78 FR 21100 - Low Enriched Uranium From France: Final Results of the Expedited Second Sunset Review of the...

    Science.gov (United States)

    2013-04-09

    ... received no response from the respondent interested parties, i.e., French uranium producers and exporters... Centralized Electronic Service System (IA ACCESS). IA ACCESS is available to registered users at http... the Internet at http://trade.gov/ia/ . The signed Decision Memorandum and electronic versions of the...

  7. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    Science.gov (United States)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  8. Migration and health: exploring the role of migrant status through register-based studies.

    Science.gov (United States)

    Nørredam, Marie

    2015-04-01

    This thesis aims to explore migrant status as a determinant in register-based studies on migrant health. It is based on eight studies that investigate the following three main issues: 1) What is the importance of migrant status for morbidity patterns among migrants compared with Native Danes? 2) Do migrant status and ethnicity affect clinical indicators of access among migrants compared with native Danes? 3) What is the importance of migrant status for mortality patterns among migrants compared with Native Danes? The thesis builds on a register-based historical prospective cohort design. Through Statistics Denmark, all refugees (n = 29,174) and family reunification immigrants (n = 33,287) who received residence permits in Denmark from 1 January 1993 to 31 December 1999 were included and matched 4:1 on age and sex with Native Danes. Register linkage was obtained twice during follow-ups in 2004 and 2008 respectively. Personal identification numbers were cross-linked to the Danish Psychiatric Central Register, the National Patient Registry, the Registry of Coercive Measures in Psychiatric Treatment, the Register of Causes of Death, and the Danish Cancer Registry. Migrant status defined by legal grounds for obtaining a residence permit was dichotomised into refugees and family reunification immigrants and used as the determinant in most studies. Analyses involved both Poisson and Cox regression analysis. Most analyses were stratified by ethnicity and adjusted for age and sex. Some were also stratified for individual income. Three sub-themes were investigated: morbidity, clinical indicators of access, and mortality. The first sub-theme (Papers I-III) showed that refugees had a consistently higher morbidity from several mental health disorders in contrast to family reunification immigrants, whose morbidity from mental disorders was lower than or similar to native Danes. The cancer incidence study did not find an effect of migrant status but found, rather, that migrants

  9. Register-based studies on migration, ethnicity, and health

    DEFF Research Database (Denmark)

    Norredam, Marie; Kastrup, Marianne; Helweg-Larsen, Karin

    2011-01-01

    INTRODUCTION: Researchers in Denmark have unique possibilities of register-based research in relation to migration, ethnicity, and health. This review article outlines how these opportunities have been used, so far, by presenting a series of examples. RESEARCH TOPICS: We selected six registers...... it discriminatory. Although, we do not register ethnicity in relation to use of health care in Denmark, our possibilities of linkage between population registers and registers on diseases and healthcare utilisation appear to render the same potentials....... to highlight the process of how migrant study populations have been established and studied in relation to different registers: The Danish Cancer Registry, the Danish Central Psychiatric Research Register, the Danish National Patient Register, the Danish National Health Service Register, the Danish Injury...

  10. Important announcement to INSPEC database users

    CERN Multimedia

    DSU Department

    2008-01-01

    The Library is in the process of transferring CERN’s subscription to the online INSPEC database to a new provider, which involves a new access platform. Users who have saved searches or alerts on the present system should record the details of their search strings as soon as possible whilst the old platform is still available, and manually move them to the new platform which will become available very soon. Access to the older platform will shortly be switched off, after which it will not be possible to access any saved information stored there. Access to the new platform will be available soon from the Library’s INSPEC page: http://library.cern.ch/information_resources/inspec.html

  11. User Authentication in Smartphones for Telehealth.

    Science.gov (United States)

    Smith, Katherine A; Zhou, Leming; Watzlaf, Valerie J M

    2017-01-01

    Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA) breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed.

  12. IDA: An Intelligent Data Access Program

    National Research Council Canada - National Science Library

    Sagalowicz, Daniel

    1977-01-01

    .... The first component of LADDER is INLAND (Informal Natural Language Access to Navy Data), which allows the user to ask questions in English about information contained in databases similar to those currently...

  13. SDN Based User-Centric Framework for Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Zhaoming Lu

    2016-01-01

    Full Text Available Due to the rapid growth of mobile data traffic, more and more basestations and access points (APs have been densely deployed to provide users with ubiquitous network access, which make current wireless network a complex heterogeneous network (HetNet. However, traditional wireless networks are designed with network-centric approaches where different networks have different quality of service (QoS strategies and cannot easily cooperate with each other to serve network users. Massive network infrastructures could not assure users perceived network and service quality, which is an indisputable fact. To address this issue, we design a new framework for heterogeneous wireless networks with the principle of user-centricity, refactoring the network from users’ perspective to suffice their requirements and preferences. Different from network-centric approaches, the proposed framework takes advantage of Software Defined Networking (SDN and virtualization technology, which will bring better perceived services quality for wireless network users. In the proposed user-centric framework, control plane and data plane are decoupled to manage the HetNets in a flexible and coadjutant way, and resource virtualization technology is introduced to abstract physical resources of HetNets into unified virtualized resources. Hence, ubiquitous and undifferentiated network connectivity and QoE (quality of experience driven fine-grained resource management could be achieved for wireless network users.

  14. Discrete Kalman Filter based Sensor Fusion for Robust Accessibility Interfaces

    International Nuclear Information System (INIS)

    Ghersi, I; Miralles, M T; Mariño, M

    2016-01-01

    Human-machine interfaces have evolved, benefiting from the growing access to devices with superior, embedded signal-processing capabilities, as well as through new sensors that allow the estimation of movements and gestures, resulting in increasingly intuitive interfaces. In this context, sensor fusion for the estimation of the spatial orientation of body segments allows to achieve more robust solutions, overcoming specific disadvantages derived from the use of isolated sensors, such as the sensitivity of magnetic-field sensors to external influences, when used in uncontrolled environments. In this work, a method for the combination of image-processing data and angular-velocity registers from a 3D MEMS gyroscope, through a Discrete-time Kalman Filter, is proposed and deployed as an alternate user interface for mobile devices, in which an on-screen pointer is controlled with head movements. Results concerning general performance of the method are presented, as well as a comparative analysis, under a dedicated test application, with results from a previous version of this system, in which the relative-orientation information was acquired directly from MEMS sensors (3D magnetometer-accelerometer). These results show an improved response for this new version of the pointer, both in terms of precision and response time, while keeping many of the benefits that were highlighted for its predecessor, giving place to a complementary method for signal acquisition that can be used as an alternative-input device, as well as for accessibility solutions. (paper)

  15. Online Catalogs and Their Users.

    Science.gov (United States)

    Broadus, Robert N.

    1983-01-01

    Review of research on online public access catalogs sponsored by Council on Library Resources notes the scope and method (questionnaires administered to catalog users and nonusers in 29 participating institutions) and findings and applications (including organizational setting and computer system, catalog use and satisfaction, and implications).…

  16. A User-Centered Approach to Adaptive Hypertext Based on an Information Relevance Model

    Science.gov (United States)

    Mathe, Nathalie; Chen, James

    1994-01-01

    Rapid and effective to information in large electronic documentation systems can be facilitated if information relevant in an individual user's content can be automatically supplied to this user. However most of this knowledge on contextual relevance is not found within the contents of documents, it is rather established incrementally by users during information access. We propose a new model for interactively learning contextual relevance during information retrieval, and incrementally adapting retrieved information to individual user profiles. The model, called a relevance network, records the relevance of references based on user feedback for specific queries and user profiles. It also generalizes such knowledge to later derive relevant references for similar queries and profiles. The relevance network lets users filter information by context of relevance. Compared to other approaches, it does not require any prior knowledge nor training. More importantly, our approach to adaptivity is user-centered. It facilitates acceptance and understanding by users by giving them shared control over the adaptation without disturbing their primary task. Users easily control when to adapt and when to use the adapted system. Lastly, the model is independent of the particular application used to access information, and supports sharing of adaptations among users.

  17. Five years of poisons information on the internet: the UK experience of TOXBASE.

    Science.gov (United States)

    Bateman, D N; Good, A M

    2006-08-01

    In 1999, the UK adopted a policy of using TOXBASE, an internet service available free to registered National Health Service (NHS) departments and professionals, as the first point of information on poisoning. This was the first use worldwide of the internet for provision of clinical advice at a national level. We report the impact on database usage and NPIS telephone call loads. Trends in the pattern of TOXBASE usage from 2000-2004 are reported by user category. Information on the monographs accessed most frequently was also extracted from the webserver and sorted by user category. The numbers of telephone calls to the National Poisons Information Service (NPIS) were extracted from NPIS annual reports. Numbers of database logons increased 3.5 fold from 102,352 in 2000 to 368,079 in 2004, with a total of 789,295 accesses to product monographs in 2004. Registered users increased almost tenfold, with approximately half accessing the database at least once a year. Telephone calls to the NPIS dropped by over half. Total contacts with NPIS (web and telephone) increased 50%. Major users in 2004 were hospital emergency departments (60.5% of logons) and NHS public access helplines (NHS Direct and NHS24) (29.4%). Different user groups access different parts of the database. Emergency departments access printable fact sheets for about 10% of monographs they access. Provision of poisons information by the internet has been successful in reducing NPIS call loads. Provision of basic poisons information by this method appears to be acceptable to different professional groups, and to be effective in reducing telephone call loads and increasing service cost effectiveness.

  18. Interactive SIGHT: textual access to simple bar charts

    Science.gov (United States)

    Demir, Seniz; Oliver, David; Schwartz, Edward; Elzer, Stephanie; Carberry, Sandra; Mccoy, Kathleen F.; Chester, Daniel

    2010-12-01

    Information graphics, such as bar charts and line graphs, are an important component of many articles from popular media. The majority of such graphics have an intention (a high-level message) to communicate to the graph viewer. Since the intended message of a graphic is often not repeated in the accompanying text, graphics together with the textual segments contribute to the overall purpose of an article and cannot be ignored. Unfortunately, these visual displays are provided in a format which is not readily accessible to everyone. For example, individuals with sight impairments who use screen readers to listen to documents have limited access to the graphics. This article presents a new accessibility tool, the Interactive SIGHT (Summarizing Information GrapHics Textually) system, that is intended to enable visually impaired users to access the knowledge that one would gain from viewing information graphics found on the web. The current system, which is implemented as a browser extension that works on simple bar charts, can be invoked by a user via a keystroke combination while navigating the web. Once launched, Interactive SIGHT first provides a brief summary that conveys the underlying intention of a bar chart along with the chart's most significant and salient features, and then produces history-aware follow-up responses to provide further information about the chart upon request from the user. We present two user studies that were conducted with sighted and visually impaired users to determine how effective the initial summary and follow-up responses are in conveying the informational content of bar charts, and to evaluate how easy it is to use the system interface. The evaluation results are promising and indicate that the system responses are well-structured and enable visually impaired users to answer key questions about bar charts in an easy-to-use manner. Post-experimental interviews revealed that visually impaired participants were very satisfied with

  19. FaceMashup: An End-User Development Tool for Social Network Data

    Directory of Open Access Journals (Sweden)

    Daniele Massa

    2016-03-01

    Full Text Available Every day, each active social network user produces and shares texts, images and videos. While developers can access such data through application programming interfaces (APIs for creating games, visualizations and routines, end users have less control on such information. Their access is mediated by the social application features, which limits them in combining sources, filtering results and performing actions on groups of elements. In order to fill this gap, we introduce FaceMashup, an end user development (EUD environment supporting the manipulation of the Facebook graph. We describe the tool interface, documenting the choices we made during the design iterations. Data types are represented through widgets containing user interface (UI elements similar to those used in the social network application. Widgets can be connected with each other with the drag and drop of their inner fields, and the application updates their content. Finally, we report the results of a user-test on the FaceMashup prototype, which shows a good acceptance of the environment by end-users.

  20. International Reactor Physics Handbook Database and Analysis Tool (IDAT) - IDAT user manual

    International Nuclear Information System (INIS)

    2013-01-01

    The IRPhEP Database and Analysis Tool (IDAT) was first released in 2013 and is included on the DVD. This database and corresponding user interface allows easy access to handbook information. Selected information from each configuration was entered into IDAT, such as the measurements performed, benchmark values, calculated values and materials specifications of the benchmark. In many cases this is supplemented with calculated data such as neutron balance data, spectra data, k-eff nuclear data sensitivities, and spatial reaction rate plots. IDAT accomplishes two main objectives: 1. Allow users to search the handbook for experimental configurations that satisfy their input criteria. 2. Allow users to trend results and identify suitable benchmarks experiments for their application. IDAT provides the user with access to several categories of calculated data, including: - 1-group neutron balance data for each configuration with individual isotope contributions in the reactor system. - Flux and other reaction rates spectra in a 299-group energy scheme. Plotting capabilities were implemented into IDAT allowing the user to compare the spectra of selected configurations in the original fine energy structure or on any user-defined broader energy structure. - Sensitivity coefficients (percent changes of k-effective due to elementary change of basic nuclear data) for the major nuclides and nuclear processes in a 238-group energy structure. IDAT is actively being developed. Those approved to access the online version of the handbook will also have access to an online version of IDAT. As May 2013 marks the first release, IDAT may contain data entry errors and omissions. The handbook remains the primary source of reactor physics benchmark data. A copy of IDAT user's manual is attached to this document. A copy of the IRPhE Handbook can be obtained on request at http://www.oecd-nea.org/science/wprs/irphe/irphe-handbook/form.html

  1. Access problem to UNIQA’s extranet portal

    CERN Document Server

    HR Department

    2008-01-01

    UNIQA would like to inform members of the Health Insurance Scheme that they are temporarily unable to access the EXTRANET portal, via which, amongst other things, they may consult reimbursement notifications. The difficulty is that once the user name and password have been entered to access the secure site, the user is redirected to the same initial screen without any error notification. UNIQA’s computing department has been informed of the problem and is carrying out investigations. We will be informed as soon as the problem has been solved (via the Bulletin and the CHIS site http://cern.ch/chis). UNIQA apologises in advance for any inconvenience caused by this technical problem.

  2. Squidy : a Zoomable Design Environment for Natural User Interfaces

    OpenAIRE

    König, Werner A.; Rädle, Roman; Reiterer, Harald

    2009-01-01

    We introduce the interaction library Squidy, which eases the design of natural user interfaces by unifying relevant frameworks and toolkits in a common library. Squidy provides a central design environment based on high-level visual data flow programming combined with zoomable user interface concepts. The user interface offers a Simple visual language and a collection of ready-to-use devices, filters and interaction techniques. The concept of semantic zooming enables nevertheless access to mo...

  3. Access Rights Distribution

    Directory of Open Access Journals (Sweden)

    T. M. Pestunova

    2011-03-01

    Full Text Available The main aspects of the development of the information system, which grants users the rights for access to automated information system resources on the basis of the organization business-processes, are considered. The conceptual, informational, functional models of the system, as well as a model, which allows to realize control while using various formal models (RBAC, DAC, MAC, are described.

  4. Rural eHealth nutrition education for limited-income families: an iterative and user-centered design approach.

    Science.gov (United States)

    Atkinson, Nancy L; Saperstein, Sandra L; Desmond, Sharon M; Gold, Robert S; Billing, Amy S; Tian, Jing

    2009-06-22

    Adult women living in rural areas have high rates of obesity. Although rural populations have been deemed hard to reach, Internet-based programming is becoming a viable strategy as rural Internet access increases. However, when people are able to get online, they may not find information designed for them and their needs, especially harder to reach populations. This results in a "content gap" for many users. User-centered design is a methodology that can be used to create appropriate online materials. This research was conducted to apply a user-centered approach to the design and development of a health promotion website for low-income mothers living in rural Maryland. Three iterative rounds of concept testing were conducted to (1) identify the name and content needs of the site and assess concerns about registering on a health-related website; (2) determine the tone and look of the website and confirm content and functionality; and (3) determine usability and acceptability. The first two rounds involved focus group and small group discussions, and the third round involved usability testing with individual women as they used the prototype system. The formative research revealed that women with limited incomes were enthusiastic about a website providing nutrition and physical activity information targeted to their incomes and tailored to their personal goals and needs. Other priority content areas identified were budgeting, local resources and information, and content that could be used with their children. Women were able to use the prototype system effectively. This research demonstrated that user-centered design strategies can help close the "content gap" for at-risk audiences.

  5. Continuity of care in the Health Care Network: negotiation between users and professionals

    Directory of Open Access Journals (Sweden)

    Maria Denise Schimith

    2014-12-01

    Full Text Available This study aimed to identify the negotiation and shared decision-making between professionals and users in a Family Health Unit and its influence on the continuity of care in the Health Care Network. Qualitative research created from a case study. One conducted 19 interviews, observation and document research. It was developed in a city in the countryside of Rio Grande do Sul, Brazil, in 2012. The results show that decisions used to happen unilaterally and that users and professionals looked for alternative ways to the continuity of care. It was not possible to identify the negotiation between professional and users and it was noticed that the user was alone looking for access. It is understood that primary care in the city researched needs to take responsibility for users and their access.

  6. Privacy-preserving security solution for cloud services

    OpenAIRE

    L. Malina; J. Hajny; P. Dzurenda; V. Zeman

    2015-01-01

    We propose a novel privacy-preserving security solution for cloud services. Our solution is based on an efficient non-bilinear group signature scheme providing the anonymous access to cloud services and shared storage servers. The novel solution offers anonymous authenticationfor registered users. Thus, users' personal attributes (age, valid registration, successful payment) can be proven without revealing users' identity, and users can use cloud services without any threat of profiling their...

  7. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology Submission Deadline: 1 June 2005 Background With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks

  8. Online Help to End-Users in a Networked Environment.

    Science.gov (United States)

    Meyer, Paul

    1991-01-01

    Discusses the need for online help for end-users based on experiences with an online public access catalog (OPAC) at the University of Cape Town libraries. The concept of end users is examined, the role of search intermediaries in information systems is explained, and online help and systems design is discussed. (LRW)

  9. The Role of Social Media User Experience as a Mediator for Understanding Social Media User Behavior in Indonesia’s Museum Industry: Literature Review

    Science.gov (United States)

    Sundjaja, A. M.; LumanGaol, F.; Budiarti, T.; Abbas, B. S.; Abdinagoro, S. B.; Ongowarsito, H.

    2017-01-01

    Social media has changed the interaction between the customer and the business, social media has proven to provide new opportunities in facilitating access to information, efficiency and ease of interaction between customers and businesses that are distributed geographically dispersed. Ease of interaction to improve access to information about products, services, and prices have proven to have a positive impact for consumers. The purpose of this article is to develop a conceptual model to test the effect of user motivation, user expectations, and online community involvement to the intention of behavior that is mediated by the use of social media museum experience. This article is a literature study on exploration of social media user experiences museum in Indonesia. Authors searched and examined 85 articles from google scholar with the following keywords: motivation, expectations, online communities, user experience, social media, Technology Acceptance Model, Experiential Marketing, Uses and Gratification Theory. Proposed data collection techniques are literature study, survey and observation. The sample used in this research is 400 respondents of social media users that follow the social media managed by Indonesia’s museum. The sampling technique are systematic sampling. We use Structural Equation Model with AMOS for analyze the data.

  10. The upgrade of the J-TEXT experimental data access and management system

    International Nuclear Information System (INIS)

    Yang, C.; Zhang, M.; Zheng, W.; Liu, R.; Zhuang, G.

    2014-01-01

    Highlights: • The J-TEXT DAMS is developed based on B/S model, which makes it conveniently access the system. • The JWeb-Scope adopts segment strategy to read data that improve the speed of reading data. • DAMS have integrated the management and JWeb-Scope and make an easy way for visitors to access the experiment data. • The JWeb-Scope can be visited all over the world, plot experiment data and zoom in or out smoothly. - Abstract: The experimental data of J-TEXT tokamak are stored in the MDSplus database. The old J-TEXT data access system is based on the tools provided by MDSplus. Since the number of signals is huge, the data retrieval for an experiment is difficult. To solve this problem, the J-TEXT experimental data access and management system (DAMS) based on MDSplus has been developed. The DAMS left the old MDSplus system unchanged providing new tools, which can help users to handle all signals as well as to retrieve signals they need thanks to the user information requirements. The DAMS also offers users a way to create their jScope configuration files which can be downloaded to the local computer. In addition, the DAMS provides a JWeb-Scope tool to visualize the signal in a browser. JWeb-Scope adopts segment strategy to read massive data efficiently. Users can plot one or more signals on their own choice and zoom-in, zoom-out smoothly. The whole system is based on B/S model, so that the users only need of the browsers to access the DAMS. The DAMS has been tested and it has a better user experience. It will be integrated into the J-TEXT remote participation system later

  11. Public Access to NASA's Earth Science Data

    Science.gov (United States)

    Behnke, J.; James, N.

    2013-12-01

    Many steps have been taken over the past 20 years to make NASA's Earth Science data more accessible to the public. The data collected by NASA represent a significant public investment in research. NASA holds these data in a public trust to promote comprehensive, long-term Earth science research. Consequently, NASA developed a free, open and non-discriminatory policy consistent with existing international policies to maximize access to data and to keep user costs as low as possible. These policies apply to all data archived, maintained, distributed or produced by NASA data systems. The Earth Observing System Data and Information System (EOSDIS) is a major core capability within NASA Earth Science Data System Program. EOSDIS is designed to ingest, process, archive, and distribute data from approximately 90 instruments. Today over 6800 data products are available to the public through the EOSDIS. Last year, EOSDIS distributed over 636 million science data products to the user community, serving over 1.5 million distinct users. The system supports a variety of science disciplines including polar processes, land cover change, radiation budget, and most especially global climate change. A core philosophy of EOSDIS is that the general user is best served by providing discipline specific support for the data. To this end, EOSDIS has collocated NASA Earth science data with centers of science discipline expertise, called Distributed Active Archive Centers (DAACs). DAACs are responsible for data management, archive and distribution of data products. There are currently twelve DAACs in the EOSDIS system. The centralized entrance point to the NASA Earth Science data collection can be found at http://earthdata.nasa.gov. Over the years, we have developed several methods for determining needs of the user community including use of the American Customer Satisfaction Index survey and a broad metrics program. Annually, we work with an independent organization (CFI Group) to send this

  12. Highlights from e-EPS: Coordinated Access to Light sources

    CERN Multimedia

    e-EPS News

    2014-01-01

    The CALIPSO project, which runs until May 2015, will contribute to the effective exploitation of European synchrotrons and free electron lasers. CALIPSO (Coordinated Access to Light sources to Promote Standards and Optimisation) includes 20 partners forming one of the largest Research Networks in the world.   e-EPS interviewed M. Bertolo, CALIPSO project manager and his assistant C. Blasetti. Which challenges are addressed by CALIPSO? CALIPSO’s goal is to optimize the exploitation of the European synchrotrons and Free Electron Lasers. With respect to previous projects funded by the European Commission, it foresees significant improvements in integration, innovation and user-friendliness in all three areas of networking, transnational access and instrumentation. The Transnational Access program potentially benefits a community of 25,000 estimated users offering free open access to 12 synchrotrons and 5 free electron lasers solely based on scientific merit. In ad...

  13. A Key Management Method for Cryptographically Enforced Access Control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem; Fernández-Medina, Eduardo; Yagüe, Mariemma I.

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  14. The ISIS Open GENIE user manual

    International Nuclear Information System (INIS)

    Akeroyd, F.A.; Ashworth, R.L.; Campbell, S.I.; Johnston, S.D.; Martin, J.M.; Moreton-Smith, C.M.; Sivia, D.S.

    2000-01-01

    This manual should enable you to become familiar with Open GENIE quickly and easily. It therefore complements the Open GENIE Reference Manual which should be used to understand the full meaning of Open GENIE commands. The reference manual is accessible on the ISIS web server at: http://www.isis.rl.ac.uk/GENIEReferenceManual/ and the user manual is planned to be accessible by January '98 at http://www.isis.rl.ac.ukIGENIEUserManual/. The Open GENIE User Manual is separated into two parts: Part A. The User Manual. An introduction to the use of Open GENIE. Part B. The Installation Guide. General information on how to install and run Open GENIE. Assuming that you are new to Open GENIE and have just downloaded a copy you will need to consult the Installation Guide to get Open GENIE installed on your machine. After this we recommend you experiment with some of the example files to get an idea of the capabilities of Open GENIE. For further information, comments, additions of routines that you feel should be included, please contact us at genie at isise.rl.ac.uk

  15. Bridging the gap connecting users to digital contents

    CERN Document Server

    Lee, Sul H

    2013-01-01

    The amount of digital information that libraries need to manage effectively for the benefit of users is constantly increasing. This book discusses in detail how library administrators can better handle this growing abundance of information, as well as effective ways to allow library users easy access. Respected leaders in the field of librarianship explore various aspects of how librarians are meeting the challenges of delivering more digital information to a changing user base, including preservation demands, licensing agreements, digitizing and making available collections unique to speci

  16. Register-based research on twins

    DEFF Research Database (Denmark)

    Christensen, Kaare; Ohm Kyvik, Kirsten; Holm, Niels V

    2011-01-01

    Introduction: The Danish Twin Registry (DTR) has for more than 50 years been based on surveys and clinical investigations and over the two last decades also on register linkage. Currently these two approaches are merged within Statistics Denmark. Research topics: Here we report on three major...... groups of register-based research in the DTR that used the uniqueness of twinning. First, we focus on the ''long-term prognosis'' of being a twin compared with being a singleton and show that Danish twins have health trajectories in adulthood similar to singletons, which is a result of interest for twins...... illustrate how the co-twin control method in a register setting can be used to control for the effect of rearing environment and genetic factors in studies of the association between exposures and health. CONCLUSION: The spectrum of register-based twin studies is very wide and have changed in accordance...

  17. Performance Evaluation of TDMA Medium Access Control Protocol in Cognitive Wireless Networks

    Directory of Open Access Journals (Sweden)

    Muhammed Enes Bayrakdar

    2017-02-01

    Full Text Available Cognitive radio paradigm has been revealed as a new communication technology that shares channels in wireless networks. Channel assignment is a crucial issue in the field of cognitive wireless networks because of the spectrum scarcity. In this work, we have evaluated the performance of TDMA medium access control protocol. In our simulation scenarios, primary users and secondary users utilize TDMA as a medium access control protocol. We have designed a network environment in Riverbed simulation software that consists of primary users, secondary users, and base stations. In our system model, secondary users sense the spectrum and inform the base station about empty channels. Then, the base station decides accordingly which secondary user may utilize the empty channel. Energy detection technique is employed as a spectrum sensing technique because it is the best when information about signal of primary user is acquired. Besides, different number of users is selected in simulation scenarios in order to obtain accurate delay and throughput results. Comparing analytical model with simulation results, we have shown that performance analysis of our system model is consistent and accurate.

  18. Development of RESTful services and map-based user interface tools for access and delivery of data and metadata from the Marine-Geo Digital Library

    Science.gov (United States)

    Morton, J. J.; Ferrini, V. L.

    2015-12-01

    The Marine Geoscience Data System (MGDS, www.marine-geo.org) operates an interactive digital data repository and metadata catalog that provides access to a variety of marine geology and geophysical data from throughout the global oceans. Its Marine-Geo Digital Library includes common marine geophysical data types and supporting data and metadata, as well as complementary long-tail data. The Digital Library also includes community data collections and custom data portals for the GeoPRISMS, MARGINS and Ridge2000 programs, for active source reflection data (Academic Seismic Portal), and for marine data acquired by the US Antarctic Program (Antarctic and Southern Ocean Data Portal). Ensuring that these data are discoverable not only through our own interfaces but also through standards-compliant web services is critical for enabling investigators to find data of interest.Over the past two years, MGDS has developed several new RESTful web services that enable programmatic access to metadata and data holdings. These web services are compliant with the EarthCube GeoWS Building Blocks specifications and are currently used to drive our own user interfaces. New web applications have also been deployed to provide a more intuitive user experience for searching, accessing and browsing metadata and data. Our new map-based search interface combines components of the Google Maps API with our web services for dynamic searching and exploration of geospatially constrained data sets. Direct introspection of nearly all data formats for hundreds of thousands of data files curated in the Marine-Geo Digital Library has allowed for precise geographic bounds, which allow geographic searches to an extent not previously possible. All MGDS map interfaces utilize the web services of the Global Multi-Resolution Topography (GMRT) synthesis for displaying global basemap imagery and for dynamically provide depth values at the cursor location.

  19. Remote access to mathematical software

    International Nuclear Information System (INIS)

    Dolan, E.; Hovland, P.; More, J.; Norris, B.; Smith, B.

    2001-01-01

    The network-oriented application services paradigm is becoming increasingly common for scientific computing. The popularity of this approach can be attributed to the numerous advantages to both user and developer provided by network-enabled mathematical software. The burden of installing and maintaining complex systems is lifted from the user, while enabling developers to provide frequent updates without disrupting service. Access to software with similar functionality can be unified under the same interface. Remote servers can utilize potentially more powerful computing resources than may be available locally. We discuss some of the application services developed by the Mathematics and Computer Science Division at Argonne National Laboratory, including the Network Enabled Optimization System (NEOS) Server and the Automatic Differentiation of C (ADIC) Server, as well as preliminary work on Web access to the Portable Extensible Toolkit for Scientific Computing (PETSc). We also provide a brief survey of related work

  20. Mining User spatiotemporal Behavior in Geospatial Cyberinfrastructure --using GEOSS Clearinghouse as an example

    Science.gov (United States)

    XIA, J.; Yang, C.; Liu, K.; Huang, Q.; Li, Z.

    2013-12-01

    Big Data becomes increasingly important in almost all scientific domains, especially in geoscience where hundreds to millions of sensors are collecting data of the Earth continuously (Whitehouse News 2012). With the explosive growth of data, various Geospatial Cyberinfrastructure (GCI) (Yang et al. 2010) components are developed to manage geospatial resources and provide data access for the public. These GCIs are accessed by different users intensively on a daily basis. However, little research has been done to analyze the spatiotemporal patterns of user behavior, which could be critical to the management of Big Data and the operation of GCIs (Yang et al. 2011). For example, the spatiotemporal distribution of end users helps us better arrange and locate GCI computing facilities. A better indexing and caching mechanism could be developed based on the spatiotemporal pattern of user queries. In this paper, we use GEOSS Clearinghouse as an example to investigate spatiotemporal patterns of user behavior in GCIs. The investigation results show that user behaviors are heterogeneous but with patterns across space and time. Identified patterns include (1) the high access frequency regions; (2) local interests; (3) periodical accesses and rush hours; (4) spiking access. Based on identified patterns, this presentation reports several solutions to better support the operation of the GEOSS Clearinghouse and other GCIs. Keywords: Big Data, EarthCube, CyberGIS, Spatiotemporal Thinking and Computing, Data Mining, User Behavior Reference: Fayyad, U. M., Piatetsky-Shapiro, G., Smyth, P., & Uthurusamy, R. 1996. Advances in knowledge discovery and data mining. Whitehouse. 2012. Obama administration unveils 'BIG DATA' initiative: announces $200 million in new R&D investments. Whitehouse. Retrieved from http://www.whitehouse.gov/sites/default/files/microsites/ostp/big_data_press_release_final_2.pdf [Accessed 14 June 2013] Yang, C., Wu, H., Huang, Q., Li, Z., & Li, J. 2011. Using spatial

  1. Interoperable and accessible census and survey data from IPUMS.

    Science.gov (United States)

    Kugler, Tracy A; Fitch, Catherine A

    2018-02-27

    The first version of the Integrated Public Use Microdata Series (IPUMS) was released to users in 1993, and since that time IPUMS has come to stand for interoperable and accessible census and survey data. Initially created to harmonize U.S. census microdata over time, IPUMS now includes microdata from the U.S. and international censuses and from surveys on health, employment, and other topics. IPUMS also provides geo-spatial data, aggregate population data, and environmental data. IPUMS supports ten data products, each disseminating an integrated data collection with a set of tools that make complex data easy to find, access, and use. Key features are record-level integration to create interoperable datasets, user-friendly interfaces, and comprehensive metadata and documentation. The IPUMS philosophy aligns closely with the FAIR principles of findability, accessibility, interoperability, and re-usability. IPUMS data have catalyzed knowledge generation across a wide range of social science and other disciplines, as evidenced by the large volume of publications and other products created by the vast IPUMS user community.

  2. StarTrax --- The Next Generation User Interface

    Science.gov (United States)

    Richmond, Alan; White, Nick

    StarTrax is a software package to be distributed to end users for installation on their local computing infrastructure. It will provide access to many services of the HEASARC, i.e. bulletins, catalogs, proposal and analysis tools, initially for the ROSAT MIPS (Mission Information and Planning System), later for the Next Generation Browse. A user activating the GUI will reach all HEASARC capabilities through a uniform view of the system, independent of the local computing environment and of the networking method of accessing StarTrax. Use it if you prefer the point-and-click metaphor of modern GUI technology, to the classical command-line interfaces (CLI). Notable strengths include: easy to use; excellent portability; very robust server support; feedback button on every dialog; painstakingly crafted User Guide. It is designed to support a large number of input devices including terminals, workstations and personal computers. XVT's Portability Toolkit is used to build the GUI in C/C++ to run on: OSF/Motif (UNIX or VMS), OPEN LOOK (UNIX), or Macintosh, or MS-Windows (DOS), or character systems.

  3. Enabling Web-Based GIS Tools for Internet and Mobile Devices To Improve and Expand NASA Data Accessibility and Analysis Functionality for the Renewable Energy and Agricultural Applications

    Science.gov (United States)

    Ross, A.; Stackhouse, P. W.; Tisdale, B.; Tisdale, M.; Chandler, W.; Hoell, J. M., Jr.; Kusterer, J.

    2014-12-01

    The NASA Langley Research Center Science Directorate and Atmospheric Science Data Center have initiated a pilot program to utilize Geographic Information System (GIS) tools that enable, generate and store climatological averages using spatial queries and calculations in a spatial database resulting in greater accessibility of data for government agencies, industry and private sector individuals. The major objectives of this effort include the 1) Processing and reformulation of current data to be consistent with ESRI and openGIS tools, 2) Develop functions to improve capability and analysis that produce "on-the-fly" data products, extending these past the single location to regional and global scales. 3) Update the current web sites to enable both web-based and mobile application displays for optimization on mobile platforms, 4) Interact with user communities in government and industry to test formats and usage of optimization, and 5) develop a series of metrics that allow for monitoring of progressive performance. Significant project results will include the the development of Open Geospatial Consortium (OGC) compliant web services (WMS, WCS, WFS, WPS) that serve renewable energy and agricultural application products to users using GIS software and tools. Each data product and OGC service will be registered within ECHO, the Common Metadata Repository, the Geospatial Platform, and Data.gov to ensure the data are easily discoverable and provide data users with enhanced access to SSE data, parameters, services, and applications. This effort supports cross agency, cross organization, and interoperability of SSE data products and services by collaborating with DOI, NRCan, NREL, NCAR, and HOMER for requirements vetting and test bed users before making available to the wider public.

  4. Perceptions of Cataloguers and End-Users towards Bilingual Authority Files.

    Science.gov (United States)

    Abdoulaye, Kaba

    2002-01-01

    Analyzes and describes bilingual authority files at the main library of the International Islamic University of Malaysia. Highlights include a review of multilingual research; perceptions of end users and catalogers; problems with bilingual files; and use of the OPAC (online public access catalog) by users. (Author/LRW)

  5. Performance analysis of adaptive modulation for cognitive radios with opportunistic access

    KAUST Repository

    Chen, Yunfei

    2011-06-01

    The performance of adaptive modulation for cognitive radio with opportunistic access is analyzed by considering the effects of spectrum sensing and primary user traffic for Nakagami-m fading channels. Both the adaptive continuous rate scheme and the adaptive discrete rate scheme are considered. Numerical results show that spectrum sensing and primary user traffic cause considerable degradation to the bit error rate performance of adaptive modulation in a cognitive radio system with opportunistic access to the licensed channel. They also show that primary user traffic does not affect the link spectral efficiency performance of adaptive modulation, while the spectrum sensing degrades the link spectral efficiency performance. © 2011 IEEE.

  6. On the performance of shared access control strategy for femtocells

    KAUST Repository

    Magableh, Amer M.; Radaydeh, Redha Mahmoud; Alouini, Mohamed-Slim

    2013-01-01

    access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to improve and enhance the system performance. The system model considers a femtocell that is equipped with a

  7. Image transmission in multicore-fiber code-division multiple access network

    Science.gov (United States)

    Yang, Guu-Chang; Kwong, Wing C.

    1997-01-01

    Recently, two-dimensional (2-D) signature patterns were proposed to encode binary digitized image pixels in optical code-division multiple-access (CDMA) networks with 'multicore' fiber. The new technology enables parallel transmission and simultaneous access of 2-D images in multiple-access environment, where these signature patterns are defined as optical orthogonal signature pattern codes (OOSPCs). However, previous work on OOSPCs assumed that the weight of each signature pattern was the same. In this paper, we construct a new family of OOSPCs with the removal of this assumption. Since varying the weight of a user's signature pattern affects that user's performance, this approach is useful for CDMA optical systems with multiple performance requirements.

  8. Flexible and Lightweight Access Control for Online Healthcare Social Networks in the Context of the Internet of Things

    Directory of Open Access Journals (Sweden)

    Zhen Qin

    2017-01-01

    Full Text Available Online healthcare social networks (OHSNs play an essential role in sharing information among medical experts and patients who are equipped with similar experiences. To access other patients’ data or experts’ diagnosis anywhere and anytime, it is necessary to integrate the OHSN into the Internet as part of the Internet of Things (IoT. Therefore, it is crucial to design an efficient and versatile access control scheme that can grant and revoke a user to access the OHSN. In this paper, we propose novel attribute-based encryption (ABE features with user revocation and verifiable decryption outsourcing to control the access privilege of the users. The security of the proposed ABE scheme is given in the well-studied random oracle model. With the proposed ABE scheme, the malicious users can be excluded from the system and the user can offload most of the overhead in the decryption to an untrusted cloud server in a verifiable manner. An access control scheme for the OHSN has been given in the context of the IoT based on the proposed ABE scheme. The simulation demonstrates that our access control mechanism is practical.

  9. Data Access System for Hydrology

    Science.gov (United States)

    Whitenack, T.; Zaslavsky, I.; Valentine, D.; Djokic, D.

    2007-12-01

    As part of the CUAHSI HIS (Consortium of Universities for the Advancement of Hydrologic Science, Inc., Hydrologic Information System), the CUAHSI HIS team has developed Data Access System for Hydrology or DASH. DASH is based on commercial off the shelf technology, which has been developed in conjunction with a commercial partner, ESRI. DASH is a web-based user interface, developed in ASP.NET developed using ESRI ArcGIS Server 9.2 that represents a mapping, querying and data retrieval interface over observation and GIS databases, and web services. This is the front end application for the CUAHSI Hydrologic Information System Server. The HIS Server is a software stack that organizes observation databases, geographic data layers, data importing and management tools, and online user interfaces such as the DASH application, into a flexible multi- tier application for serving both national-level and locally-maintained observation data. The user interface of the DASH web application allows online users to query observation networks by location and attributes, selecting stations in a user-specified area where a particular variable was measured during a given time interval. Once one or more stations and variables are selected, the user can retrieve and download the observation data for further off-line analysis. The DASH application is highly configurable. The mapping interface can be configured to display map services from multiple sources in multiple formats, including ArcGIS Server, ArcIMS, and WMS. The observation network data is configured in an XML file where you specify the network's web service location and its corresponding map layer. Upon initial deployment, two national level observation networks (USGS NWIS daily values and USGS NWIS Instantaneous values) are already pre-configured. There is also an optional login page which can be used to restrict access as well as providing a alternative to immediate downloads. For large request, users would be notified via

  10. A Global User-Driven Model for Tile Prefetching in Web Geographical Information Systems.

    Science.gov (United States)

    Pan, Shaoming; Chong, Yanwen; Zhang, Hang; Tan, Xicheng

    2017-01-01

    A web geographical information system is a typical service-intensive application. Tile prefetching and cache replacement can improve cache hit ratios by proactively fetching tiles from storage and replacing the appropriate tiles from the high-speed cache buffer without waiting for a client's requests, which reduces disk latency and improves system access performance. Most popular prefetching strategies consider only the relative tile popularities to predict which tile should be prefetched or consider only a single individual user's access behavior to determine which neighbor tiles need to be prefetched. Some studies show that comprehensively considering all users' access behaviors and all tiles' relationships in the prediction process can achieve more significant improvements. Thus, this work proposes a new global user-driven model for tile prefetching and cache replacement. First, based on all users' access behaviors, a type of expression method for tile correlation is designed and implemented. Then, a conditional prefetching probability can be computed based on the proposed correlation expression mode. Thus, some tiles to be prefetched can be found by computing and comparing the conditional prefetching probability from the uncached tiles set and, similarly, some replacement tiles can be found in the cache buffer according to multi-step prefetching. Finally, some experiments are provided comparing the proposed model with other global user-driven models, other single user-driven models, and other client-side prefetching strategies. The results show that the proposed model can achieve a prefetching hit rate in approximately 10.6% ~ 110.5% higher than the compared methods.

  11. Enhancing Sensing and Channel Access in Cognitive Radio Networks

    KAUST Repository

    Hamza, Doha R.

    2014-06-18

    Cognitive radio technology is a promising technology to solve the wireless spectrum scarcity problem by intelligently allowing secondary, or unlicensed, users access to the primary, licensed, users\\' frequency bands. Cognitive technology involves two main tasks: 1) sensing the wireless medium to assess the presence of the primary users and 2) designing secondary spectrum access techniques that maximize the secondary users\\' benefits while maintaining the primary users\\' privileged status. On the spectrum sensing side, we make two contributions. First, we maximize a utility function representing the secondary throughput while constraining the collision probability with the primary below a certain value. We optimize therein the channel sensing time, the sensing decision threshold, the channel probing time, together with the channel sensing order for wideband primary channels. Second, we design a cooperative spectrum sensing technique termed sensing with equal gain combining whereby cognitive radios simultaneously transmit their sensing results to the fusion center over multipath fading reporting channels. The proposed scheme is shown to outperform orthogonal reporting systems in terms of achievable secondary throughput and to be robust against phase and synchronization errors. On the spectrum access side, we make four contributions. First, we design a secondary scheduling scheme with the goal of minimizing the secondary queueing delay under constraints on the average secondary transmit power and the maximum tolerable primary outage probability. Second, we design another secondary scheduling scheme based on the spectrum sensing results and the primary automatic repeat request feedback. The optimal medium access probabilities are obtained via maximizing the secondary throughput subject to constraints that guarantee quality of service parameters for the primary. Third, we propose a three-message superposition coding scheme to maximize the secondary throughput without

  12. Restructuring Big Data to Improve Data Access and Performance in Analytic Services Making Research More Efficient for the Study of Extreme Weather Events and Application User Communities

    Science.gov (United States)

    Ostrenga, D.; Shen, S.; Vollmer, B.; Meyer, D. L.

    2017-12-01

    NASA climate reanalysis dataset from MERRA-2 contains numerous data for atmosphere, land, and ocean, that are grouped into 95 products of archived volume over 300 TB. The data files are saved as hourly-file, day-file (hourly time interval) and month-file containing up to 125 parameters. Due to the large number of data files and the sheer data volumes, it is a challenging for users, especially those in the application research community, to handle dealing with the original data files. Most of these researchers prefer to focus on a small region or single location using the hourly data for long time periods to analyze extreme weather events or say winds for renewable energy applications. At the GES DISC, we have been working closely with the science teams and the application user community to create several new value added data products and high quality services to facilitate the use of the model data for various types of research. We have tested converting hourly data from one-day per file into different data cubes, such as one-month, one-year, or whole-mission and then continued to analyze the efficiency of the accessibility of this newly structured data through various services. Initial results have shown that compared to the original file structure, the new data has significantly improved the performance for accessing long time series. It is noticed that the performance is associated to the cube size and structure, the compression method, and how the data are accessed. The optimized data cube structure will not only improve the data access, but also enable better online analytic services for doing statistical analysis and extreme events mining. Two case studies will be presented using the newly structured data and value added services, the California drought and the extreme drought of the Northeastern states of Brazil. Furthermore, data access and analysis through cloud storage capabilities will be investigated.

  13. Challenges in Cultivating EOSDIS User Survey Participation

    Science.gov (United States)

    Boquist, C. L.; Sofinowski, E. J.; Walter, S.

    2011-12-01

    Since 2004 NASA has surveyed users of its Earth Observing System Data and Information System (EOSDIS) to determine user satisfaction with its services. The surveys have been conducted by CFI Group under contract with the Federal Consulting Group, Executive Agent in government for the American Customer Satisfaction Index (ACSI). The purpose of these annual surveys is to help EOSDIS and the data centers assess current status and improve future services. The survey questions include demographic and experiential questions in addition to the ACSI and EOSDIS specific rating questions. In addition to customer satisfaction, analysis of each year's results has provided insight into the survey process. Although specific questions have been added, modified, or deleted to reflect changes to the EOSDIS system and processes, the model rating questions have remained the same to ensure consistency for evaluating cross year trends. Working with the CFI Group, we have refined the invitation and questions to increase clarity and address the different ways diverse groups of users access services at EOSDIS data centers. We present challenges in preparing a single set of questions that go to users with backgrounds in many Earth science disciplines. These users may have contacted any of the 12 EOSDIS data centers for information or may have accessed data or data products from many kinds of aircraft and satellite instruments. We discuss lessons learned in preparing the invitation and survey questions and the steps taken to make the survey easier to complete and to encourage increased participation.

  14. H1DS: A new web-based data access system

    Energy Technology Data Exchange (ETDEWEB)

    Pretty, D.G., E-mail: david.pretty@anu.edu.au; Blackwell, B.D.

    2014-05-15

    Highlights: • We present H1DS, a new RESTful web service for accessing fusion data. • We examine the scalability and extensibility of H1DS. • We present a fast and user friendly web browser client for the H1DS web service. • A summary relational database is presented as an application of the H1DS API. - Abstract: A new data access system, H1DS, has been developed and deployed for the H-1 Heliac at the Australian Plasma Fusion Research Facility. The data system provides access to fusion data via a RESTful web service. With the URL acting as the API to the data system, H1DS provides a scalable and extensible framework which is intuitive to new users, and allows access from any internet connected device. The H1DS framework, originally designed to work with MDSplus, has a modular design which can be extended to provide access to alternative data storage systems.

  15. H1DS: A new web-based data access system

    International Nuclear Information System (INIS)

    Pretty, D.G.; Blackwell, B.D.

    2014-01-01

    Highlights: • We present H1DS, a new RESTful web service for accessing fusion data. • We examine the scalability and extensibility of H1DS. • We present a fast and user friendly web browser client for the H1DS web service. • A summary relational database is presented as an application of the H1DS API. - Abstract: A new data access system, H1DS, has been developed and deployed for the H-1 Heliac at the Australian Plasma Fusion Research Facility. The data system provides access to fusion data via a RESTful web service. With the URL acting as the API to the data system, H1DS provides a scalable and extensible framework which is intuitive to new users, and allows access from any internet connected device. The H1DS framework, originally designed to work with MDSplus, has a modular design which can be extended to provide access to alternative data storage systems

  16. Tracking Users for a Targeted Dissemination

    Directory of Open Access Journals (Sweden)

    Philippe Bautier

    2015-12-01

    Full Text Available How to build a dissemination and communication strategy in a world where users have easy access to a deluge of data and information from various origins and where IT tools and design standards change so quickly that users behaviour and their expectations are continuously modified? The first challenge of Eurostat is clearly to know what users want: we know our different types of users but we have to identify how they get our data, what they do with our data, how they react to our outputs and which sort of new service they would like us to propose. Translating these needs into a visual dissemination is a new challenge undertaken by Eurostat through a new portal, new mobile apps and new info graphs and basic application as well as increasing the visibility on Google. The objective of this paper is to share Eurostat's experience in identifying user Leeds and to show how concretely this information has been visually disseminated.

  17. The Danish Hip Arthroplasty Register

    DEFF Research Database (Denmark)

    Gundtoft, Per Hviid; Varnum, Claus; Pedersen, Alma Becic

    2016-01-01

    AIM OF DATABASE: The aim of the Danish Hip Arthroplasty Register (DHR) is to continuously monitor and improve the quality of treatment of primary and revision total hip arthroplasty (THA) in Denmark. STUDY POPULATION: The DHR is a Danish nationwide arthroplasty register established in January 1995...

  18. XACML to build access control policies for Internet of Things

    OpenAIRE

    Atlam, Hany F.; Alassafi, Madini, Obad; Alenezi, Ahmed; Walters, Robert; Wills, Gary

    2018-01-01

    Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issues. The access control is one of the main elements to address these issues. It provides the access to system resources only to authorized users and ensures that they behave in an authorized manner during their access sessions. One of the significant components of any access control model is access policies. They are used to build the criteria to permit or deny any access request. Building an ef...

  19. Perspectives on access to in vitro fertilization in Portugal

    Directory of Open Access Journals (Sweden)

    S. Silva

    2012-04-01

    Full Text Available OBJECTIVE: To analyze users' reasons for choosing in vitro fertilization treatment in public or private services and to identify their suggestions for improving fertility treatment. METHODS: A qualitative study using an interpretative approach was conducted. Fifteen semi-structured interviews were conducted with patients undergoing in vitro fertilization treatment (nine women, one man and five couples at home or at their workplace in the districts of Viana do Castelo, Braga, Porto and Lisbon, Portugal, between July 2005 and February 2006. RESULTS: Users evaluated access to in vitro fertilization treatment in public and private services based mainly on their individual experiences and called for more access to less costly, faster and friendlier care with suitable facilities, appropriate time management and caring medical providers. These perceptions were also associated with views on the need for fighting stigmatization of infertility, protecting children's rights and guaranteeing sustainability of health care system. Interviewees sought to balance reduced waiting time and more attentive care with costs involved. The choice of services depended on the users' purchase power and place of residence and availability of attentive care. CONCLUSIONS: Current national policies on in vitro fertilization treatment meet user's demands of promoting access to, and quality, availability and affordability of in vitro fertilization treatment. However, their focus on legal regulation and technical-scientific aspects contrasts with the users' emphasis on reimbursement, insurance coverage and focus on emotional aspects of the treatment. The study showed these policies should ensure insurance coverage, participation of user representatives in the National Council for Assisted Reproductive Technology, promotion of infertility research and certification of fertility laboratories.

  20. Designing User Manuals for the Online Public Access Catalog.

    Science.gov (United States)

    Seiden, Peggy; Sullivan, Patricia

    1986-01-01

    Describes the process of developing and revising a brochure to guide library patrons in conducting an author search on an online public access catalog in order to demonstrate the application of four steps in production of a functional document--analysis; planning; development; evaluation, testing, and revision. Three sources are given. (EJS)