WorldWideScience

Sample records for sophisticated access methods

  1. Roman sophisticated surface modification methods to manufacture silver counterfeited coins

    Science.gov (United States)

    Ingo, G. M.; Riccucci, C.; Faraldi, F.; Pascucci, M.; Messina, E.; Fierro, G.; Di Carlo, G.

    2017-11-01

    By means of the combined use of X-ray photoelectron spectroscopy (XPS), optical microscopy (OM) and scanning electron microscopy (SEM) coupled with energy dispersive X-ray spectroscopy (EDS) the surface and subsurface chemical and metallurgical features of silver counterfeited Roman Republican coins are investigated to decipher some aspects of the manufacturing methods and to evaluate the technological ability of the Roman metallurgists to produce thin silver coatings. The results demonstrate that over 2000 ago important advances in the technology of thin layer deposition on metal substrates were attained by Romans. The ancient metallurgists produced counterfeited coins by combining sophisticated micro-plating methods and tailored surface chemical modification based on the mercury-silvering process. The results reveal that Romans were able systematically to chemically and metallurgically manipulate alloys at a micro scale to produce adherent precious metal layers with a uniform thickness up to few micrometers. The results converge to reveal that the production of forgeries was aimed firstly to save expensive metals as much as possible allowing profitable large-scale production at a lower cost. The driving forces could have been a lack of precious metals, an unexpected need to circulate coins for trade and/or a combinations of social, political and economic factors that requested a change in money supply. Finally, some information on corrosion products have been achieved useful to select materials and methods for the conservation of these important witnesses of technology and economy.

  2. Constructing a sophistication index as a method of market ...

    African Journals Online (AJOL)

    segmentation method offers researchers and marketing practitioners a ..... Pallant (2010) recommends a minimum value of 0.6 for a good analysis. .... a means of profiling segments, stock farmers are not classified as unsophisticated,.

  3. Constructing a Sophistication Index as a Method of Market ...

    African Journals Online (AJOL)

    This study investigates the process of index construction as a means of measuring a hypothetical construct that can typically not be measured by a single question or item and applying it as a method of market segmentation. The availability of incidental secondary data provided a relevant quantitative basis to illustrate this ...

  4. Sophisticated Online Learning Scheme for Green Resource Allocation in 5G Heterogeneous Cloud Radio Access Networks

    KAUST Repository

    Alqerm, Ismail

    2018-01-23

    5G is the upcoming evolution for the current cellular networks that aims at satisfying the future demand for data services. Heterogeneous cloud radio access networks (H-CRANs) are envisioned as a new trend of 5G that exploits the advantages of heterogeneous and cloud radio access networks to enhance spectral and energy efficiency. Remote radio heads (RRHs) are small cells utilized to provide high data rates for users with high quality of service (QoS) requirements, while high power macro base station (BS) is deployed for coverage maintenance and low QoS users service. Inter-tier interference between macro BSs and RRHs and energy efficiency are critical challenges that accompany resource allocation in H-CRANs. Therefore, we propose an efficient resource allocation scheme using online learning, which mitigates interference and maximizes energy efficiency while maintaining QoS requirements for all users. The resource allocation includes resource blocks (RBs) and power. The proposed scheme is implemented using two approaches: centralized, where the resource allocation is processed at a controller integrated with the baseband processing unit and decentralized, where macro BSs cooperate to achieve optimal resource allocation strategy. To foster the performance of such sophisticated scheme with a model free learning, we consider users\\' priority in RB allocation and compact state representation learning methodology to improve the speed of convergence and account for the curse of dimensionality during the learning process. The proposed scheme including both approaches is implemented using software defined radios testbed. The obtained results and simulation results confirm that the proposed resource allocation solution in H-CRANs increases the energy efficiency significantly and maintains users\\' QoS.

  5. Sophisticated Players and Sophisticated Agents

    NARCIS (Netherlands)

    Rustichini, A.

    1998-01-01

    A sophisticated player is an individual who takes the action of the opponents, in a strategic situation, as determined by decision of rational opponents, and acts accordingly. A sophisticated agent is rational in the choice of his action, but ignores the fact that he is part of a strategic

  6. A Case Study on E - Banking Security – When Security Becomes Too Sophisticated for the User to Access Their Information

    OpenAIRE

    Aaron M. French

    2012-01-01

    While eBanking security continues to increase in sophistication to protect against threats, the usability of the eBanking decreases resulting in poor security behaviors by the users. The current research evaluates se curity risks and measures taken for eBanking solutions. A case study is presented describing how increased complexity decreases vulnerabilities online but increases vulnerabilities from internal threats and eBanking users

  7. Optical Alignment of the Chromospheric Lyman-Alpha SpectroPolarimeter using Sophisticated Methods to Minimize Activities under Vacuum

    Science.gov (United States)

    Giono, G.; Katsukawa, Y.; Ishikawa, R.; Narukage, N.; Kano, R.; Kubo, M.; Ishikawa, S.; Bando, T.; Hara, H.; Suematsu, Y.; hide

    2016-01-01

    The Chromospheric Lyman-Alpha Spectro-Polarimeter (CLASP) is a sounding-rocket instrument developed at the National Astronomical Observatory of Japan (NAOJ) as a part of an international collaboration. The in- strument main scientific goal is to achieve polarization measurement of the Lyman-alpha line at 121.56 nm emitted from the solar upper-chromosphere and transition region with an unprecedented 0.1% accuracy. For this purpose, the optics are composed of a Cassegrain telescope coated with a "cold mirror" coating optimized for UV reflection and a dual-channel spectrograph allowing for simultaneous observation of the two orthogonal states of polarization. Although the polarization sensitivity is the most important aspect of the instrument, the spatial and spectral resolutions of the instrument are also crucial to observe the chromospheric features and resolve the Ly- pro les. A precise alignment of the optics is required to ensure the resolutions, but experiments under vacuum conditions are needed since Ly-alpha is absorbed by air, making the alignment experiments difficult. To bypass this issue, we developed methods to align the telescope and the spectrograph separately in visible light. We will explain these methods and present the results for the optical alignment of the CLASP telescope and spectrograph. We will then discuss the combined performances of both parts to derive the expected resolutions of the instrument, and compare them with the flight observations performed on September 3rd 2015.

  8. In Praise of the Sophists.

    Science.gov (United States)

    Gibson, Walker

    1993-01-01

    Discusses the thinking of the Greek Sophist philosophers, particularly Gorgias and Protagoras, and their importance and relevance for contemporary English instructors. Considers the problem of language as signs of reality in the context of Sophist philosophy. (HB)

  9. Sophisticating a naive Liapunov function

    International Nuclear Information System (INIS)

    Smith, D.; Lewins, J.D.

    1985-01-01

    The art of the direct method of Liapunov to determine system stability is to construct a suitable Liapunov or V function where V is to be positive definite (PD), to shrink to a center, which may be conveniently chosen as the origin, and where V is the negative definite (ND). One aid to the art is to solve an approximation to the system equations in order to provide a candidate V function. It can happen, however, that the V function is not strictly ND but vanishes at a finite number of isolated points. Naively, one anticipates that stability has been demonstrated since the trajectory of the system at such points is only momentarily tangential and immediately enters a region of inward directed trajectories. To demonstrate stability rigorously requires the construction of a sophisticated Liapunov function from what can be called the naive original choice. In this paper, the authors demonstrate the method of perturbing the naive function in the context of the well-known second-order oscillator and then apply the method to a more complicated problem based on a prompt jump model for a nuclear fission reactor

  10. Cumulative Dominance and Probabilistic Sophistication

    NARCIS (Netherlands)

    Wakker, P.P.; Sarin, R.H.

    2000-01-01

    Machina & Schmeidler (Econometrica, 60, 1992) gave preference conditions for probabilistic sophistication, i.e. decision making where uncertainty can be expressed in terms of (subjective) probabilities without commitment to expected utility maximization. This note shows that simpler and more general

  11. Cognitive Load and Strategic Sophistication

    OpenAIRE

    Allred, Sarah; Duffy, Sean; Smith, John

    2013-01-01

    We study the relationship between the cognitive load manipulation and strategic sophistication. The cognitive load manipulation is designed to reduce the subject's cognitive resources that are available for deliberation on a choice. In our experiment, subjects are placed under a large cognitive load (given a difficult number to remember) or a low cognitive load (given a number which is not difficult to remember). Subsequently, the subjects play a one-shot game then they are asked to recall...

  12. Critical confrontation of standard and more sophisticated methods for modelling the dispersion in air of heavy gas clouds; evaluation and illustration of the intrinsic limitations of both categories

    International Nuclear Information System (INIS)

    Riethmuller, M.L.

    1983-01-01

    Mathematical models of gas dispersion have evolved drastically since the 1930's. For a long time, the most widely used approach was the so-called Gaussian model as described in practical terms by Turner or box models which have shown relative merits. In the field of heavy gas dispersion, the use of such approaches appeared somewhat limited and therefore new models have been proposed. Some of these new generation models were making use of the latest progress in turbulence modelling as derived from laboratory work as well as numerical advances. The advent of faster and larger computers made possible the development of three dimensional codes that were computing both flow field and gas dispersion taking into account details of the ground obstacles, heat exchange and possibly phase changes as well. The description of these new types of models makes them appear as a considerable improvement over the simpler approaches. However, recent comparisons between many of these have led to the conclusion that the scatter between predictions attained with sophisticated models was just as large as with other ones. It seems therefore, that current researchers might have fallen into the trap of confusing mathematical precision with accuracy. It is therefore felt necessary to enlighten this question by an investigation which, rather than comparing individual models, would analyse the key features of both approaches and put in evidence their relative merits and degree of realism when being really applied

  13. Research Investigation of Information Access Methods

    Science.gov (United States)

    Heinrichs, John H.; Sharkey, Thomas W.; Lim, Jeen-Su

    2006-01-01

    This study investigates the satisfaction of library users at Wayne State University who utilize alternative information access methods. The LibQUAL+[TM] desired and perceived that satisfaction ratings are used to determine the user's "superiority gap." By focusing limited library resources to address "superiority gap" issues identified by each…

  14. Estudo teórico das transições eletrônicas usando métodos simples e sofisticados Theoretical study of electronic transitions using simple and sophisticated methods

    Directory of Open Access Journals (Sweden)

    Nelson H. Morgon

    2013-01-01

    Full Text Available In this paper, the use of both simple and sophisticated models in the study of electronic transitions was explored for a set of molecular systems: C2H4, C4H4, C4H6, C6H6, C6H8, "C8", C60, and [H2NCHCH(CHCHkCHNH2]+, where k = 0 to 4. The simple model of the free particle (1D, 2D, and 3D boxes, rings or spherical surfaces, considering the boundary conditions, was found to yield similar results to the sophisticated theoretical methods such as EOM-CCSD/6-311++G** or TD(NStates=5,Root=1-M06-2X/6-311++G**.

  15. Pension fund sophistication and investment policy

    NARCIS (Netherlands)

    de Dreu, J.|info:eu-repo/dai/nl/364537906; Bikker, J.A.|info:eu-repo/dai/nl/06912261X

    This paper assesses the sophistication of pension funds’ investment policies using data on 748 Dutch pension funds during the 1999–2006 period. We develop three indicators of sophistication: gross rounding of investment choices, investments in alternative sophisticated asset classes and ‘home bias’.

  16. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  17. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  18. The value of multivariate model sophistication

    DEFF Research Database (Denmark)

    Rombouts, Jeroen; Stentoft, Lars; Violante, Francesco

    2014-01-01

    We assess the predictive accuracies of a large number of multivariate volatility models in terms of pricing options on the Dow Jones Industrial Average. We measure the value of model sophistication in terms of dollar losses by considering a set of 444 multivariate models that differ in their spec....... In addition to investigating the value of model sophistication in terms of dollar losses directly, we also use the model confidence set approach to statistically infer the set of models that delivers the best pricing performances.......We assess the predictive accuracies of a large number of multivariate volatility models in terms of pricing options on the Dow Jones Industrial Average. We measure the value of model sophistication in terms of dollar losses by considering a set of 444 multivariate models that differ...

  19. A Method for Automated Planning of FTTH Access Network Infrastructures

    DEFF Research Database (Denmark)

    Riaz, Muhammad Tahir; Pedersen, Jens Myrup; Madsen, Ole Brun

    2005-01-01

    In this paper a method for automated planning of Fiber to the Home (FTTH) access networks is proposed. We introduced a systematic approach for planning access network infrastructure. The GIS data and a set of algorithms were employed to make the planning process more automatic. The method explains...... method. The method, however, does not fully automate the planning but make the planning process significantly fast. The results and discussion are presented and conclusion is given in the end....

  20. A novel asynchronous access method with binary interfaces

    Directory of Open Access Journals (Sweden)

    Torres-Solis Jorge

    2008-10-01

    Full Text Available Abstract Background Traditionally synchronous access strategies require users to comply with one or more time constraints in order to communicate intent with a binary human-machine interface (e.g., mechanical, gestural or neural switches. Asynchronous access methods are preferable, but have not been used with binary interfaces in the control of devices that require more than two commands to be successfully operated. Methods We present the mathematical development and evaluation of a novel asynchronous access method that may be used to translate sporadic activations of binary interfaces into distinct outcomes for the control of devices requiring an arbitrary number of commands to be controlled. With this method, users are required to activate their interfaces only when the device under control behaves erroneously. Then, a recursive algorithm, incorporating contextual assumptions relevant to all possible outcomes, is used to obtain an informed estimate of user intention. We evaluate this method by simulating a control task requiring a series of target commands to be tracked by a model user. Results When compared to a random selection, the proposed asynchronous access method offers a significant reduction in the number of interface activations required from the user. Conclusion This novel access method offers a variety of advantages over traditionally synchronous access strategies and may be adapted to a wide variety of contexts, with primary relevance to applications involving direct object manipulation.

  1. Toward Proper Authentication Methods in Electronic Medical Record Access Compliant to HIPAA and C.I.A. Triangle.

    Science.gov (United States)

    Tipton, Stephen J; Forkey, Sara; Choi, Young B

    2016-04-01

    This paper examines various methods encompassing the authentication of users in accessing Electronic Medical Records (EMRs). From a methodological perspective, multiple authentication methods have been researched from both a desktop and mobile accessibility perspective. Each method is investigated at a high level, along with comparative analyses, as well as real world examples. The projected outcome of this examination is a better understanding of the sophistication required in protecting the vital privacy constraints of an individual's Protected Health Information (PHI). In understanding the implications of protecting healthcare data in today's technological world, the scope of this paper is to grasp an overview of confidentiality as it pertains to information security. In addressing this topic, a high level overview of the three goals of information security are examined; in particular, the goal of confidentiality is the primary focus. Expanding upon the goal of confidentiality, healthcare accessibility legal aspects are considered, with a focus upon the Health Insurance Portability and Accountability Act of 1996 (HIPAA). With the primary focus of this examination being access to EMRs, the paper will consider two types of accessibility of concern: access from a physician, or group of physicians; and access from an individual patient.

  2. A Method for Upper Bounding on Network Access Speed

    DEFF Research Database (Denmark)

    Knudsen, Thomas Phillip; Patel, A.; Pedersen, Jens Myrup

    2004-01-01

    This paper presents a method for calculating an upper bound on network access speed growth and gives guidelines for further research experiments and simulations. The method is aimed at providing a basis for simulation of long term network development and resource management.......This paper presents a method for calculating an upper bound on network access speed growth and gives guidelines for further research experiments and simulations. The method is aimed at providing a basis for simulation of long term network development and resource management....

  3. Does underground storage still require sophisticated studies?

    International Nuclear Information System (INIS)

    Marsily, G. de

    1997-01-01

    Most countries agree to the necessity of burying high or medium-level wastes in geological layers situated at a few hundred meters below the ground level. The advantages and disadvantages of different types of rock such as salt, clay, granite and volcanic material are examined. Sophisticated studies are lead to determine the best geological confinement but questions arise about the time for which safety must be ensured. France has chosen 3 possible sites. These sites are geologically described in the article. The final place will be proposed after a testing phase of about 5 years in an underground facility. (A.C.)

  4. An Extended Role Based Access Control Method for XML Documents

    Institute of Scientific and Technical Information of China (English)

    MENG Xiao-feng; LUO Dao-feng; OU Jian-bo

    2004-01-01

    As XML has been increasingly important as the Data-change format of Internet and Intranet, access-control-on-XML-properties rises as a new issue.Role-based access control (RBAC) is an access control method that has been widely used in Internet, Operation System and Relation Data Base these 10 years.Though RBAC is already relatively mature in the above fields, new problems occur when it is used in XML properties.This paper proposes an integrated model to resolve these problems, after the fully analysis on the features of XML and RBAC.

  5. A method to evaluate equitable accessibility : Combining ethical theories and accessibility-based approaches

    NARCIS (Netherlands)

    Lucas, K.; Van Wee, G.P.; Maat, C.

    2015-01-01

    In this paper, we present the case that traditional transport appraisal methods do not sufficiently capture the social dimensions of mobility and accessibility. However, understanding this is highly relevant for policymakers to understand the impacts of their transport decisions. These dimensions

  6. Kinds of access: Different methods for report reveal different kinds of metacognitive access

    DEFF Research Database (Denmark)

    Overgaard, Morten; Sandberg, Kristian

    2012-01-01

    that there is not only a theoretical, but also an empirical difference between different methods of reporting. We hypothesize that differences in the sensitivity of different scales may reveal that different types of access are used to issue direct reports about experiences and metacognitive reports about...

  7. GROUPING WEB ACCESS SEQUENCES uSING SEQUENCE ALIGNMENT METHOD

    OpenAIRE

    BHUPENDRA S CHORDIA; KRISHNAKANT P ADHIYA

    2011-01-01

    In web usage mining grouping of web access sequences can be used to determine the behavior or intent of a set of users. Grouping websessions is how to measure the similarity between web sessions. There are many shortcomings in traditional measurement methods. The taskof grouping web sessions based on similarity and consists of maximizing the intra-group similarity while minimizing the inter-groupsimilarity is done using sequence alignment method. This paper introduces a new method to group we...

  8. IMPROVING NEAREST NEIGHBOUR SEARCH IN 3D SPATIAL ACCESS METHOD

    Directory of Open Access Journals (Sweden)

    A. Suhaibaha

    2016-10-01

    Full Text Available Nearest Neighbour (NN is one of the important queries and analyses for spatial application. In normal practice, spatial access method structure is used during the Nearest Neighbour query execution to retrieve information from the database. However, most of the spatial access method structures are still facing with unresolved issues such as overlapping among nodes and repetitive data entry. This situation will perform an excessive Input/Output (IO operation which is inefficient for data retrieval. The situation will become more crucial while dealing with 3D data. The size of 3D data is usually large due to its detail geometry and other attached information. In this research, a clustered 3D hierarchical structure is introduced as a 3D spatial access method structure. The structure is expected to improve the retrieval of Nearest Neighbour information for 3D objects. Several tests are performed in answering Single Nearest Neighbour search and k Nearest Neighbour (kNN search. The tests indicate that clustered hierarchical structure is efficient in handling Nearest Neighbour query compared to its competitor. From the results, clustered hierarchical structure reduced the repetitive data entry and the accessed page. The proposed structure also produced minimal Input/Output operation. The query response time is also outperformed compared to the other competitor. For future outlook of this research several possible applications are discussed and summarized.

  9. Method and apparatus for managing access to a memory

    Science.gov (United States)

    DeBenedictis, Erik

    2017-08-01

    A method and apparatus for managing access to a memory of a computing system. A controller transforms a plurality of operations that represent a computing job into an operational memory layout that reduces a size of a selected portion of the memory that needs to be accessed to perform the computing job. The controller stores the operational memory layout in a plurality of memory cells within the selected portion of the memory. The controller controls a sequence by which a processor in the computing system accesses the memory to perform the computing job using the operational memory layout. The operational memory layout reduces an amount of energy consumed by the processor to perform the computing job.

  10. Diffusion accessibility as a method for visualizing macromolecular surface geometry.

    Science.gov (United States)

    Tsai, Yingssu; Holton, Thomas; Yeates, Todd O

    2015-10-01

    Important three-dimensional spatial features such as depth and surface concavity can be difficult to convey clearly in the context of two-dimensional images. In the area of macromolecular visualization, the computer graphics technique of ray-tracing can be helpful, but further techniques for emphasizing surface concavity can give clearer perceptions of depth. The notion of diffusion accessibility is well-suited for emphasizing such features of macromolecular surfaces, but a method for calculating diffusion accessibility has not been made widely available. Here we make available a web-based platform that performs the necessary calculation by solving the Laplace equation for steady state diffusion, and produces scripts for visualization that emphasize surface depth by coloring according to diffusion accessibility. The URL is http://services.mbi.ucla.edu/DiffAcc/. © 2015 The Protein Society.

  11. Kinds of access: different methods for report reveal different kinds of metacognitive access

    Science.gov (United States)

    Overgaard, Morten; Sandberg, Kristian

    2012-01-01

    In experimental investigations of consciousness, participants are asked to reflect upon their own experiences by issuing reports about them in different ways. For this reason, a participant needs some access to the content of her own conscious experience in order to report. In such experiments, the reports typically consist of some variety of ratings of confidence or direct descriptions of one's own experiences. Whereas different methods of reporting are typically used interchangeably, recent experiments indicate that different results are obtained with different kinds of reporting. We argue that there is not only a theoretical, but also an empirical difference between different methods of reporting. We hypothesize that differences in the sensitivity of different scales may reveal that different types of access are used to issue direct reports about experiences and metacognitive reports about the classification process. PMID:22492747

  12. STOCK EXCHANGE LISTING INDUCES SOPHISTICATION OF CAPITAL BUDGETING

    Directory of Open Access Journals (Sweden)

    Wesley Mendes-da-Silva

    2014-08-01

    Full Text Available This article compares capital budgeting techniques employed in listed and unlisted companies in Brazil. We surveyed the Chief Financial Officers (CFOs of 398 listed companies and 300 large unlisted companies, and based on 91 respondents, the results suggest that the CFOs of listed companies tend to use less simplistic methods more often, for example: NPV and CAPM, and that CFOs of unlisted companies are less likely to estimate the cost of equity, despite being large companies. These findings indicate that stock exchange listing may require greater sophistication of the capital budgeting process.

  13. Analytical resource assessment method for continuous (unconventional) oil and gas accumulations - The "ACCESS" Method

    Science.gov (United States)

    Crovelli, Robert A.; revised by Charpentier, Ronald R.

    2012-01-01

    The U.S. Geological Survey (USGS) periodically assesses petroleum resources of areas within the United States and the world. The purpose of this report is to explain the development of an analytic probabilistic method and spreadsheet software system called Analytic Cell-Based Continuous Energy Spreadsheet System (ACCESS). The ACCESS method is based upon mathematical equations derived from probability theory. The ACCESS spreadsheet can be used to calculate estimates of the undeveloped oil, gas, and NGL (natural gas liquids) resources in a continuous-type assessment unit. An assessment unit is a mappable volume of rock in a total petroleum system. In this report, the geologic assessment model is defined first, the analytic probabilistic method is described second, and the spreadsheet ACCESS is described third. In this revised version of Open-File Report 00-044 , the text has been updated to reflect modifications that were made to the ACCESS program. Two versions of the program are added as appendixes.

  14. Nanotube structures, methods of making nanotube structures, and methods of accessing intracellular space

    Science.gov (United States)

    VanDersarl, Jules J.; Xu, Alexander M.; Melosh, Nicholas A.; Tayebi, Noureddine

    2016-02-23

    In accordance with the purpose(s) of the present disclosure, as embodied and broadly described herein, embodiments of the present disclosure, in one aspect, relate to methods of making a structure including nanotubes, a structure including nanotubes, methods of delivering a fluid to a cell, methods of removing a fluid to a cell, methods of accessing intracellular space, and the like.

  15. Does Investors' Sophistication Affect Persistence and Pricing of Discretionary Accruals?

    OpenAIRE

    Lanfeng Kao

    2007-01-01

    This paper examines whether the sophistication of market investors influences management's strategy on discretionary accounting choice, and thus changes the persistence of discretionary accruals. The results show that the persistence of discretionary accruals for firms face with naive investors is lower than that for firms face with sophisticated investors. The results also demonstrate that sophisticated investors indeed incorporate the implications of current earnings components into future ...

  16. Modified network simulation model with token method of bus access

    Directory of Open Access Journals (Sweden)

    L.V. Stribulevich

    2013-08-01

    Full Text Available Purpose. To study the characteristics of the local network with the marker method of access to the bus its modified simulation model was developed. Methodology. Defining characteristics of the network is carried out on the developed simulation model, which is based on the state diagram-layer network station with the mechanism of processing priorities, both in steady state and in the performance of control procedures: the initiation of a logical ring, the entrance and exit of the station network with a logical ring. Findings. A simulation model, on the basis of which can be obtained the dependencies of the application the maximum waiting time in the queue for different classes of access, and the reaction time usable bandwidth on the data rate, the number of network stations, the generation rate applications, the number of frames transmitted per token holding time, frame length was developed. Originality. The technique of network simulation reflecting its work in the steady condition and during the control procedures, the mechanism of priority ranking and handling was proposed. Practical value. Defining network characteristics in the real-time systems on railway transport based on the developed simulation model.

  17. Automatically Assessing Lexical Sophistication: Indices, Tools, Findings, and Application

    Science.gov (United States)

    Kyle, Kristopher; Crossley, Scott A.

    2015-01-01

    This study explores the construct of lexical sophistication and its applications for measuring second language lexical and speaking proficiency. In doing so, the study introduces the Tool for the Automatic Analysis of LExical Sophistication (TAALES), which calculates text scores for 135 classic and newly developed lexical indices related to word…

  18. The Impact of Financial Sophistication on Adjustable Rate Mortgage Ownership

    Science.gov (United States)

    Smith, Hyrum; Finke, Michael S.; Huston, Sandra J.

    2011-01-01

    The influence of a financial sophistication scale on adjustable-rate mortgage (ARM) borrowing is explored. Descriptive statistics and regression analysis using recent data from the Survey of Consumer Finances reveal that ARM borrowing is driven by both the least and most financially sophisticated households but for different reasons. Less…

  19. The role of sophisticated accounting system in strategy management

    OpenAIRE

    Naranjo Gil, David

    2004-01-01

    Organizations are designing more sophisticated accounting information systems to meet the strategic goals and enhance their performance. This study examines the effect of accounting information system design on the performance of organizations pursuing different strategic priorities. The alignment between sophisticated accounting information systems and organizational strategy is analyzed. The enabling effect of the accounting information system on performance is also examined. Relationships ...

  20. Probabilistic Sophistication, Second Order Stochastic Dominance, and Uncertainty Aversion

    OpenAIRE

    Simone Cerreia-Vioglio; Fabio Maccheroni; Massimo Marinacci; Luigi Montrucchio

    2010-01-01

    We study the interplay of probabilistic sophistication, second order stochastic dominance, and uncertainty aversion, three fundamental notions in choice under uncertainty. In particular, our main result, Theorem 2, characterizes uncertainty averse preferences that satisfy second order stochastic dominance, as well as uncertainty averse preferences that are probabilistically sophisticated.

  1. The First Sophists and the Uses of History.

    Science.gov (United States)

    Jarratt, Susan C.

    1987-01-01

    Reviews the history of intellectual views on the Greek sophists in three phases: (1) their disparagement by Plato and Aristotle as the morally disgraceful "other"; (2) nineteenth century British positivists' reappraisal of these relativists as ethically and scientifically superior; and (3) twentieth century versions of the sophists as…

  2. Comparison of RF spectrum prediction methods for dynamic spectrum access

    Science.gov (United States)

    Kovarskiy, Jacob A.; Martone, Anthony F.; Gallagher, Kyle A.; Sherbondy, Kelly D.; Narayanan, Ram M.

    2017-05-01

    Dynamic spectrum access (DSA) refers to the adaptive utilization of today's busy electromagnetic spectrum. Cognitive radio/radar technologies require DSA to intelligently transmit and receive information in changing environments. Predicting radio frequency (RF) activity reduces sensing time and energy consumption for identifying usable spectrum. Typical spectrum prediction methods involve modeling spectral statistics with Hidden Markov Models (HMM) or various neural network structures. HMMs describe the time-varying state probabilities of Markov processes as a dynamic Bayesian network. Neural Networks model biological brain neuron connections to perform a wide range of complex and often non-linear computations. This work compares HMM, Multilayer Perceptron (MLP), and Recurrent Neural Network (RNN) algorithms and their ability to perform RF channel state prediction. Monte Carlo simulations on both measured and simulated spectrum data evaluate the performance of these algorithms. Generalizing spectrum occupancy as an alternating renewal process allows Poisson random variables to generate simulated data while energy detection determines the occupancy state of measured RF spectrum data for testing. The results suggest that neural networks achieve better prediction accuracy and prove more adaptable to changing spectral statistics than HMMs given sufficient training data.

  3. PAUL AND SOPHISTIC RHETORIC: A PERSPECTIVE ON HIS ...

    African Journals Online (AJOL)

    use of modern rhetorical theories but analyses the letter in terms of the clas- ..... If a critical reader would have had the traditional anti-sophistic arsenal ..... pressions and that 'rhetoric' is mainly a matter of communicating these thoughts.

  4. Sophistication and Performance of Italian Agri‐food Exports

    Directory of Open Access Journals (Sweden)

    Anna Carbone

    2012-06-01

    Full Text Available Nonprice competition is increasingly important in world food markets. Recently, the expression ‘export sophistication’ has been introduced in the economic literature to refer to a wide set of attributes that increase product value. An index has been proposed to measure sophistication in an indirect way through the per capita GDP of exporting countries (Lall et al., 2006; Haussmann et al., 2007.The paper applies the sophistication measure to the Italian food export sector, moving from an analysis of trends and performance of Italian food exports. An original way to disentangle different components in the temporal variation of the sophistication index is also proposed.Results show that the sophistication index offers original insights on recent trends in world food exports and with respect to Italian core food exports.

  5. Obfuscation, Learning, and the Evolution of Investor Sophistication

    OpenAIRE

    Bruce Ian Carlin; Gustavo Manso

    2011-01-01

    Investor sophistication has lagged behind the growing complexity of retail financial markets. To explore this, we develop a dynamic model to study the interaction between obfuscation and investor sophistication in mutual fund markets. Taking into account different learning mechanisms within the investor population, we characterize the optimal timing of obfuscation for financial institutions who offer retail products. We show that educational initiatives that are directed to facilitate learnin...

  6. Accessibility

    DEFF Research Database (Denmark)

    Brooks, Anthony Lewis

    2017-01-01

    This contribution is timely as it addresses accessibility in regards system hardware and software aligned with introduction of the Twenty-First Century Communications and Video Accessibility Act (CVAA) and adjoined game industry waiver that comes into force January 2017. This is an act created...... by the USA Federal Communications Commission (FCC) to increase the access of persons with disabilities to modern communications, and for other purposes. The act impacts advanced communications services and products including text messaging; e-mail; instant messaging; video communications; browsers; game...... platforms; and games software. However, the CVAA has no legal status in the EU. This text succinctly introduces and questions implications, impact, and wider adoption. By presenting the full CVAA and game industry waiver the text targets to motivate discussions and further publications on the subject...

  7. Quantitative methods in electroencephalography to access therapeutic response.

    Science.gov (United States)

    Diniz, Roseane Costa; Fontenele, Andrea Martins Melo; Carmo, Luiza Helena Araújo do; Ribeiro, Aurea Celeste da Costa; Sales, Fábio Henrique Silva; Monteiro, Sally Cristina Moutinho; Sousa, Ana Karoline Ferreira de Castro

    2016-07-01

    Pharmacometrics or Quantitative Pharmacology aims to quantitatively analyze the interaction between drugs and patients whose tripod: pharmacokinetics, pharmacodynamics and disease monitoring to identify variability in drug response. Being the subject of central interest in the training of pharmacists, this work was out with a view to promoting this idea on methods to access the therapeutic response of drugs with central action. This paper discusses quantitative methods (Fast Fourier Transform, Magnitude Square Coherence, Conditional Entropy, Generalised Linear semi-canonical Correlation Analysis, Statistical Parametric Network and Mutual Information Function) used to evaluate the EEG signals obtained after administration regimen of drugs, the main findings and their clinical relevance, pointing it as a contribution to construction of different pharmaceutical practice. Peter Anderer et. al in 2000 showed the effect of 20mg of buspirone in 20 healthy subjects after 1, 2, 4, 6 and 8h after oral ingestion of the drug. The areas of increased power of the theta frequency occurred mainly in the temporo-occipital - parietal region. It has been shown by Sampaio et al., 2007 that the use of bromazepam, which allows the release of GABA (gamma amino butyric acid), an inhibitory neurotransmitter of the central nervous system could theoretically promote dissociation of cortical functional areas, a decrease of functional connectivity, a decrease of cognitive functions by means of smaller coherence (electrophysiological magnitude measured from the EEG by software) values. Ahmad Khodayari-Rostamabad et al. in 2015 talk that such a measure could be a useful clinical tool potentially to assess adverse effects of opioids and hence give rise to treatment guidelines. There was the relation between changes in pain intensity and brain sources (at maximum activity locations) during remifentanil infusion despite its potent analgesic effect. The statement of mathematical and computational

  8. Transport Accessibility In Light Of The DEA Method

    Directory of Open Access Journals (Sweden)

    Górniak Joanna

    2014-12-01

    Full Text Available The development of transport infrastructure and increasing the efficiency of transport services are major factors of economic growth. The concept of transport accessibility can be analysed in various aspects. This article focuses on the accessibility of freight transport by road and rail, measured with infrastructure equipment. The primary objective of this study is to determine the efficiency of selected European countries in 2000, 2005 and 2010 in terms of transport accessibility for given expenditures and results. The efficiency will be measured with the Data Envelopment Analysis, which assesses the efficiency with which a given economy transforms expenditures into results. The hypothesis assumes the existence of differences between the efficiency in terms of transport accessibility in European countries and a possibility to increase this efficiency by using the experience of countries with a high efficiency level.

  9. METHOD AND ABSTRACT MODEL FOR CONTROL AND ACCESS RIGHTS BY REQUESTS REDIRECTION

    Directory of Open Access Journals (Sweden)

    K. A. Shcheglov

    2015-11-01

    Full Text Available We have researched implementation problems of control and access rights of subjects to objects in modern computer systems. We have suggested access control method based on objects access requests redirection. The method possesses a distinctive feature as compared to discretional access control. In case when a subject needs to deny writing (object modification, it is not denied but redirected (access rights are not changed, but operation is performed with another object. This gives the possibility to implement access policies to system objects without breaking the system and applications operability, and share correctly access objects between subjects. This important property of suggested access control method enables to solve fundamentally new system objects securing problems like system resources virtualization aimed to protect system objects from users’ and applications attacks. We have created an abstract model, and it shows that this method (access control from subjects to objects based on requests redirection can be used as self-sufficient access control method, implementing any access control policy (from subjects to objects, thus being an alternative to discretional access control method.

  10. Sophisticated Search Capabilities in the ADS Abstract Service

    Science.gov (United States)

    Eichhorn, G.; Accomazzi, A.; Grant, C. S.; Henneken, E.; Kurtz, M. J.; Murray, S. S.

    2003-12-01

    The ADS provides access to over 940,000 references from astronomy and planetary sciences publications and 1.5 million records from physics publications. It is funded by NASA and provides free access to these references, as well as to 2.4 million scanned pages from the astronomical literature. These include most of the major astronomy and several planetary sciences journals, as well as many historical observatory publications. The references now include the abstracts from all volumes of the Journal of Geophysical Research (JGR) since the beginning of 2002. We get these abstracts on a regular basis. The Kluwer journal Solar Physics has been scanned back to volume 1 and is available through the ADS. We have extracted the reference lists from this and many other journals and included them in the reference and citation database of the ADS. We have recently scanning Earth, Moon and Planets, another Kluwer journal, and will scan other Kluwer journals in the future as well. We plan on extracting references from these journals as well in the near future. The ADS has many sophisticated query features. These allow the user to formulate complex queries. Using results lists to get further information about the selected articles provide the means to quickly find important and relevant articles from the database. Three advanced feedback queries are available from the bottom of the ADS results list (in addition to regular feedback queries already available from the abstract page and from the bottom of the results list): 1. Get reference list for selected articles: This query returns all known references for the selected articles (or for all articles in the first list). The resulting list will be ranked according to how often each article is referred to and will show the most referenced articles in the field of study that created the first list. It presumably shows the most important articles in that field. 2. Get citation list for selected articles: This returns all known articles

  11. A Key Management Method for Cryptographically Enforced Access Control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem; Fernández-Medina, Eduardo; Yagüe, Mariemma I.

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  12. Financial Literacy and Financial Sophistication in the Older Population

    Science.gov (United States)

    Lusardi, Annamaria; Mitchell, Olivia S.; Curto, Vilsa

    2017-01-01

    Using a special-purpose module implemented in the Health and Retirement Study, we evaluate financial sophistication in the American population over the age of 50. We combine several financial literacy questions into an overall index to highlight which questions best capture financial sophistication and examine the sensitivity of financial literacy responses to framing effects. Results show that many older respondents are not financially sophisticated: they fail to grasp essential aspects of risk diversification, asset valuation, portfolio choice, and investment fees. Subgroups with notable deficits include women, the least educated, non-Whites, and those over age 75. In view of the fact that retirees increasingly must take on responsibility for their own retirement security, such meager levels of knowledge have potentially serious and negative implications. PMID:28553191

  13. The conceptualization and measurement of cognitive health sophistication.

    Science.gov (United States)

    Bodie, Graham D; Collins, William B; Jensen, Jakob D; Davis, Lashara A; Guntzviller, Lisa M; King, Andy J

    2013-01-01

    This article develops a conceptualization and measure of cognitive health sophistication--the complexity of an individual's conceptual knowledge about health. Study 1 provides initial validity evidence for the measure--the Healthy-Unhealthy Other Instrument--by showing its association with other cognitive health constructs indicative of higher health sophistication. Study 2 presents data from a sample of low-income adults to provide evidence that the measure does not depend heavily on health-related vocabulary or ethnicity. Results from both studies suggest that the Healthy-Unhealthy Other Instrument can be used to capture variability in the sophistication or complexity of an individual's health-related schematic structures on the basis of responses to two simple open-ended questions. Methodological advantages of the Healthy-Unhealthy Other Instrument and suggestions for future research are highlighted in the discussion.

  14. Financial Literacy and Financial Sophistication in the Older Population.

    Science.gov (United States)

    Lusardi, Annamaria; Mitchell, Olivia S; Curto, Vilsa

    2014-10-01

    Using a special-purpose module implemented in the Health and Retirement Study, we evaluate financial sophistication in the American population over the age of 50. We combine several financial literacy questions into an overall index to highlight which questions best capture financial sophistication and examine the sensitivity of financial literacy responses to framing effects. Results show that many older respondents are not financially sophisticated: they fail to grasp essential aspects of risk diversification, asset valuation, portfolio choice, and investment fees. Subgroups with notable deficits include women, the least educated, non-Whites, and those over age 75. In view of the fact that retirees increasingly must take on responsibility for their own retirement security, such meager levels of knowledge have potentially serious and negative implications.

  15. Library of sophisticated functions for analysis of nuclear spectra

    Science.gov (United States)

    Morháč, Miroslav; Matoušek, Vladislav

    2009-10-01

    In the paper we present compact library for analysis of nuclear spectra. The library consists of sophisticated functions for background elimination, smoothing, peak searching, deconvolution, and peak fitting. The functions can process one- and two-dimensional spectra. The software described in the paper comprises a number of conventional as well as newly developed methods needed to analyze experimental data. Program summaryProgram title: SpecAnalysLib 1.1 Catalogue identifier: AEDZ_v1_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEDZ_v1_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.html No. of lines in distributed program, including test data, etc.: 42 154 No. of bytes in distributed program, including test data, etc.: 2 379 437 Distribution format: tar.gz Programming language: C++ Computer: Pentium 3 PC 2.4 GHz or higher, Borland C++ Builder v. 6. A precompiled Windows version is included in the distribution package Operating system: Windows 32 bit versions RAM: 10 MB Word size: 32 bits Classification: 17.6 Nature of problem: The demand for advanced highly effective experimental data analysis functions is enormous. The library package represents one approach to give the physicists the possibility to use the advanced routines simply by calling them from their own programs. SpecAnalysLib is a collection of functions for analysis of one- and two-parameter γ-ray spectra, but they can be used for other types of data as well. The library consists of sophisticated functions for background elimination, smoothing, peak searching, deconvolution, and peak fitting. Solution method: The algorithms of background estimation are based on Sensitive Non-linear Iterative Peak (SNIP) clipping algorithm. The smoothing algorithms are based on the convolution of the original data with several types of filters and algorithms based on discrete

  16. Use of the Paid Open Access Option in Hybrid Open Access Journals in Agriculture: A Mixed-Methods Study

    Directory of Open Access Journals (Sweden)

    Megan Kocher

    2016-12-01

    Full Text Available We explore the use and usefulness of the hybrid open access publishing model in agricultural sciences using a combination of quantitative and qualitative methods. To ascertain the level of usage of the paid open access option in hybrid open access journals in agriculture, we studied the agriculture-related journals published by six commercial publishers. These publishers offer authors the option of paying a fee, often close to $3,000 per article, to make their article immediately freely available, usually with a Creative Commons license. We defined agriculture broadly but also assigned each journal to a subspecialty (e.g., animal science in order to see if there were differences based on these subdivisions. For each journal we gathered data for 2014-2015 and noted the total number of research articles and the number of those that were made freely available by authors paying the open access fee. To give context to our results we also surveyed local faculty in agricultural sciences, asking their reasons for considering the paid open access options and the sources of the funds to pay for it. Survey respondents were asked about their academic position and rank to see if there were differences to be noted. We also investigated the findability of the open access articles, noting if each individual publisher offered a way to easily locate all the freely available articles in a particular journal and if there are other avenues to easily locate these articles.

  17. The Methods and Mechanisms for Access Control of Encrypted Data in Clouds

    Directory of Open Access Journals (Sweden)

    Sergey Vladimirovich Zapechnikov

    2013-09-01

    Full Text Available The paper is about the problem of data access control in clouds. The main mechanisms for access control of encrypted data in untrusted cloud environments are analyzed and described. The comparative analysis of access control algorithms and implementation issues are offered. The main practical result of research is a web-based (Wikipedia-like reference and information system devoted to the access control methods and mechanisms.

  18. Finding the Fabulous Few: Why Your Program Needs Sophisticated Research.

    Science.gov (United States)

    Pfizenmaier, Emily

    1981-01-01

    Fund raising, it is argued, needs sophisticated prospect research. Professional prospect researchers play an important role in helping to identify prospective donors and also in helping to stimulate interest in gift giving. A sample of an individual work-up on a donor and a bibliography are provided. (MLW)

  19. Procles the Carthaginian: A North African Sophist in Pausanias’ Periegesis

    Directory of Open Access Journals (Sweden)

    Juan Pablo Sánchez Hernández

    2010-11-01

    Full Text Available Procles, cited by Pausanias (in the imperfect tense about a display in Rome and for an opinion about Pyrrhus of Epirus, probably was not a historian of Hellenistic date, but a contemporary sophist whom Pausanias encountered in person in Rome.

  20. SMEs and new ventures need business model sophistication

    DEFF Research Database (Denmark)

    Kesting, Peter; Günzel-Jensen, Franziska

    2015-01-01

    , and Spreadshirt, this article develops a framework that introduces five business model sophistication strategies: (1) uncover additional functions of your product, (2) identify strategic benefits for third parties, (3) take advantage of economies of scope, (4) utilize cross-selling opportunities, and (5) involve...

  1. Improving Nearest Neighbour Search in 3D Spatial Access Method

    DEFF Research Database (Denmark)

    Suhaibah, A.; Rahman, A. A.; Uznir, U.

    2016-01-01

    are still facing with unresolved issues such as overlapping among nodes and repetitive data entry. This situation will perform an excessive Input/Output (IO) operation which is inefficient for data retrieval. The situation will become more crucial while dealing with 3D data. The size of 3D data is usually...... and the accessed page. The proposed structure also produced minimal Input/Output operation. The query response time is also outperformed compared to the other competitor. For future outlook of this research several possible applications are discussed and summarized....

  2. Evaluating Michigan's community hospital access: spatial methods for decision support

    Directory of Open Access Journals (Sweden)

    Varnakovida Pariwate

    2006-09-01

    Full Text Available Abstract Background Community hospital placement is dictated by a diverse set of geographical factors and historical contingency. In the summer of 2004, a multi-organizational committee headed by the State of Michigan's Department of Community Health approached the authors of this paper with questions about how spatial analyses might be employed to develop a revised community hospital approval procedure. Three objectives were set. First, the committee needed visualizations of both the spatial pattern of Michigan's population and its 139 community hospitals. Second, the committee required a clear, defensible assessment methodology to quantify access to existing hospitals statewide, taking into account factors such as distance to nearest hospital and road network density to estimate travel time. Third, the committee wanted to contrast the spatial distribution of existing community hospitals with a theoretical configuration that best met statewide demand. This paper presents our efforts to first describe the distribution of Michigan's current community hospital pattern and its people, and second, develop two models, access-based and demand-based, to identify areas with inadequate access to existing hospitals. Results Using the product from the access-based model and contiguity and population criteria, two areas were identified as being "under-served." The lower area, located north/northeast of Detroit, contained the greater total land area and population of the two areas. The upper area was centered north of Grand Rapids. A demand-based model was applied to evaluate the existing facility arrangement by allocating daily bed demand in each ZIP code to the closest facility. We found 1,887 beds per day were demanded by ZIP centroids more than 16.1 kilometers from the nearest existing hospital. This represented 12.7% of the average statewide daily bed demand. If a 32.3 kilometer radius was employed, unmet demand dropped to 160 beds per day (1

  3. A New Key-lock Method for User Authentication and Access Control

    Institute of Scientific and Technical Information of China (English)

    JI Dongyao; ZHANG Futai; WANG Yumin

    2001-01-01

    We propose a new key-lock methodfor user authentication and access control based onChinese remainder theorem, the concepts of the ac-cess control matrix, key-lock-pair, time stamp, and the NS public key protocol. Our method is dynamicand needs a minimum amount of computation in thesense that it only updates at most one key/lock foreach access request. We also demonstrate how an au-thentication protocol can be integrated into the ac-cess control method. By applying a time stamp, themethod can not only withstand replay attack, butalso strengthen the authenticating mechanism, whichcould not be achieved simultaneously in previous key-lock methods.

  4. Development Strategies for Tourism Destinations: Tourism Sophistication vs. Resource Investments

    OpenAIRE

    Rainer Andergassen; Guido Candela

    2010-01-01

    This paper investigates the effectiveness of development strategies for tourism destinations. We argue that resource investments unambiguously increase tourism revenues and that increasing the degree of tourism sophistication, that is increasing the variety of tourism related goods and services, increases tourism activity and decreases the perceived quality of the destination's resource endowment, leading to an ambiguous effect on tourism revenues. We disentangle these two effects and charact...

  5. Accessing High Spatial Resolution in Astronomy Using Interference Methods

    Science.gov (United States)

    Carbonel, Cyril; Grasset, Sébastien; Maysonnave, Jean

    2018-01-01

    In astronomy, methods such as direct imaging or interferometry-based techniques (Michelson stellar interferometry for example) are used for observations. A particular advantage of interferometry is that it permits greater spatial resolution compared to direct imaging with a single telescope, which is limited by diffraction owing to the aperture of…

  6. Final Report: Advanced Methods for Accessing and Disseminating Nuclear Data, August 13, 1996 - March 15, 1999

    International Nuclear Information System (INIS)

    Stone, Craig A.

    1999-01-01

    Scientific Digital Visions, Inc. developed methods of accessing and dissemination nuclear data contained within the databases of the National Data Center (NNDC) at the Brookhaven National Laboratory supporting a long standing and important DOE Program to provide scientists access to NNDC Databases. The NNDC participated as a partner in this effort

  7. ACCESS METHOD TO THE LEARNING OF BASIC TECHNICAL-TACTICAL HANDBALL ELEMENTS

    Directory of Open Access Journals (Sweden)

    Dobrislav Vujović

    2007-05-01

    Full Text Available The analysis of the handball development tendencies demands more and more sophisticated work forms and methods which provide possibility of the quick and good quality implementation of the setup goals and tasks in the work with children. In that case it becomes very important to create the best methods and instruments by which, with the systematic work, the acquired technical/tactical skils and motoric capacities will be adopted and automatized. Process of acquiring of technical/tactical skills and motoric capacities represents main goal in the overall training process of young handball players. It is also a part of the transformation process and an important prerequisite of the specifi c handball competition activity. During the systematic work e.g. training process, from the beginner to the top handball player, this learning process is very unique and in interwoven. It is going on by following general training rules with the purpose of creating supreme sport result

  8. Accessing inoculation methods of maize and wheat with Azospirillum brasilense.

    Science.gov (United States)

    Fukami, Josiane; Nogueira, Marco Antonio; Araujo, Ricardo Silva; Hungria, Mariangela

    2016-03-01

    The utilization of inoculants containing Azospirillum is becoming more popular due to increasing reports of expressive gains in grain yields. However, incompatibility with pesticides used in seed treatments represents a main limitation for a successful inoculation. Therefore, in this study we searched for alternatives methods for seed inoculation of maize and wheat, aiming to avoid the direct contact of bacteria with pesticides. Different doses of inoculants containing Azospirillum brasilense were employed to perform inoculation in-furrow, via soil spray at sowing and via leaf spray after seedlings had emerged, in comparison to seed inoculation. Experiments were conducted first under greenhouse controlled conditions and then confirmed in the field at different locations in Brazil. In the greenhouse, most parameters measured responded positively to the largest inoculant dose used in foliar sprays, but benefits could also be observed from both in-furrow and soil spray inoculation. However, our results present evidence that field inoculation with plant-growth promoting bacteria must consider inoculant doses, and point to the need of fine adjustments to avoid crossing the threshold of growth stimulation and inhibition. All inoculation techniques increased the abundance of diazotrophic bacteria in plant tissues, and foliar spray improved colonization of leaves, while soil inoculations favored root and rhizosphere colonization. In field experiments, inoculation with A. brasilense allowed for a 25 % reduction in the need for N fertilizers. Our results have identified alternative methods of inoculation that were as effective as the standard seed inoculation that may represent an important strategy to avoid the incompatibility between inoculant bacteria and pesticides employed for seed treatment.

  9. The New Toxicology of Sophisticated Materials: Nanotoxicology and Beyond

    Science.gov (United States)

    Maynard, Andrew D.; Warheit, David B.; Philbert, Martin A.

    2011-01-01

    It has long been recognized that the physical form of materials can mediate their toxicity—the health impacts of asbestiform materials, industrial aerosols, and ambient particulate matter are prime examples. Yet over the past 20 years, toxicology research has suggested complex and previously unrecognized associations between material physicochemistry at the nanoscale and biological interactions. With the rapid rise of the field of nanotechnology and the design and production of increasingly complex nanoscale materials, it has become ever more important to understand how the physical form and chemical composition of these materials interact synergistically to determine toxicity. As a result, a new field of research has emerged—nanotoxicology. Research within this field is highlighting the importance of material physicochemical properties in how dose is understood, how materials are characterized in a manner that enables quantitative data interpretation and comparison, and how materials move within, interact with, and are transformed by biological systems. Yet many of the substances that are the focus of current nanotoxicology studies are relatively simple materials that are at the vanguard of a new era of complex materials. Over the next 50 years, there will be a need to understand the toxicology of increasingly sophisticated materials that exhibit novel, dynamic and multifaceted functionality. If the toxicology community is to meet the challenge of ensuring the safe use of this new generation of substances, it will need to move beyond “nano” toxicology and toward a new toxicology of sophisticated materials. Here, we present a brief overview of the current state of the science on the toxicology of nanoscale materials and focus on three emerging toxicology-based challenges presented by sophisticated materials that will become increasingly important over the next 50 years: identifying relevant materials for study, physicochemical characterization, and

  10. Strategic sophistication of individuals and teams. Experimental evidence

    Science.gov (United States)

    Sutter, Matthias; Czermak, Simon; Feri, Francesco

    2013-01-01

    Many important decisions require strategic sophistication. We examine experimentally whether teams act more strategically than individuals. We let individuals and teams make choices in simple games, and also elicit first- and second-order beliefs. We find that teams play the Nash equilibrium strategy significantly more often, and their choices are more often a best response to stated first order beliefs. Distributional preferences make equilibrium play less likely. Using a mixture model, the estimated probability to play strategically is 62% for teams, but only 40% for individuals. A model of noisy introspection reveals that teams differ from individuals in higher order beliefs. PMID:24926100

  11. Few remarks on chiral theories with sophisticated topology

    International Nuclear Information System (INIS)

    Golo, V.L.; Perelomov, A.M.

    1978-01-01

    Two classes of the two-dimensional Euclidean chiral field theoreties are singled out: 1) the field phi(x) takes the values in the compact Hermitiam symmetric space 2) the field phi(x) takes the values in an orbit of the adjoint representation of the comcompact Lie group. The theories have sophisticated topological and rich analytical structures. They are considered with the help of topological invariants (topological charges). Explicit formulae for the topological charges are indicated, and the lower bound extimate for the action is given

  12. Accessing High Spatial Resolution in Astronomy Using Interference Methods

    Science.gov (United States)

    Carbonel, Cyril; Grasset, Sébastien; Maysonnave, Jean

    2018-04-01

    In astronomy, methods such as direct imaging or interferometry-based techniques (Michelson stellar interferometry for example) are used for observations. A particular advantage of interferometry is that it permits greater spatial resolution compared to direct imaging with a single telescope, which is limited by diffraction owing to the aperture of the instrument as shown by Rueckner et al. in a lecture demonstration. The focus of this paper, addressed to teachers and/or students in high schools and universities, is to easily underline both an application of interferometry in astronomy and stress its interest for resolution. To this end very simple optical experiments are presented to explain all the concepts. We show how an interference pattern resulting from the combined signals of two telescopes allows us to measure the distance between two stars with a resolution beyond the diffraction limit. Finally this work emphasizes the breathtaking resolution obtained in state-of-the-art instruments such as the VLTi (Very Large Telescope interferometer).

  13. Efficient Unsteady Flow Visualization with High-Order Access Dependencies

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Jiang; Guo, Hanqi; Yuan, Xiaoru

    2016-04-19

    We present a novel high-order access dependencies based model for efficient pathline computation in unsteady flow visualization. By taking longer access sequences into account to model more sophisticated data access patterns in particle tracing, our method greatly improves the accuracy and reliability in data access prediction. In our work, high-order access dependencies are calculated by tracing uniformly-seeded pathlines in both forward and backward directions in a preprocessing stage. The effectiveness of our proposed approach is demonstrated through a parallel particle tracing framework with high-order data prefetching. Results show that our method achieves higher data locality and hence improves the efficiency of pathline computation.

  14. Sophistication of burnup analysis system for fast reactor (2)

    International Nuclear Information System (INIS)

    Yokoyama, Kenji; Hirai, Yasushi; Tatsumi, Masahiro

    2010-10-01

    Improvement on prediction accuracy for neutronics characteristics of fast reactor cores is one of the most important study domains in terms of both achievement of high economical plant efficiency based on reasonably advanced designs and increased reliability and safety margins. In former study, considerable improvement on prediction accuracy in neutronics design has been achieved in the development of the unified cross-section set as a fruit of a series of critical experiments such as JUPITER in application of the reactor constant adjustments. For design of fast reactor cores improvement of not only static characteristics but also burnup characteristics is very important. For such purpose, it is necessary to improve the prediction accuracy on burnup characteristics using actual burnup data of 'JOYO' and 'MONJU', experimental and prototype fast reactors. Recently, study on effective burnup method for minor actinides becomes important theme. However, there is a problem that analysis work tends to become inefficient for lack of functionality suitable for analysis of composition change due to burnup since the conventional analysis system is targeted to critical assembly systems. Therefore development of burnup analysis system for fast reactors with modularity and flexibility is being done that would contribute to actual core design work and improvement of prediction accuracy. In the previous study, we have developed a prototype system which has functions of performing core and burnup calculations using given constant files (PDS files) and information based on simple and easy user input data. It has also functions of fuel shuffling which is indispensable for power reactor analysis systems. In the present study, by extending the prototype system, features for handling of control rods and energy collapse of group constants have been designed and implemented. Computational results from the present analysis system are stored into restart files which can be accessible by

  15. Women's access needs in maternity care in rural Tasmania, Australia: a mixed methods study.

    Science.gov (United States)

    Hoang, Ha; Le, Quynh; Terry, Daniel

    2014-03-01

    This study investigates (i) maternity care access issues in rural Tasmania, (ii) rural women's challenges in accessing maternity services and (iii) rural women's access needs in maternity services. A mixed-method approach using a survey and semi-structured interviews was conducted. The survey explored women's views of rural maternity services from antenatal to postnatal care, while interviews reinforced the survey results and provided insights into the access issues and needs of women in maternity care. The survey was completed by n=210 women, with a response rate of 35%, with n=22 follow-up interviews being conducted. The survey indicated the majority of rural women believed antenatal education and check-ups and postnatal check-ups should be provided locally. The majority of women surveyed also believed in the importance of having a maternity unit in the local hospital, which was further iterated and clarified within the interviews. Three main themes emerged from the interview data, namely (i) lack of access to maternity services, (ii) difficulties in accessing maternity services, and (iii) rural women's access needs. The study suggested that women's access needs are not fully met in some rural areas of Tasmania. Rural women face many challenges when accessing maternity services, including financial burden and risk of labouring en route. The study supports the claim that the closure of rural maternity units shifts cost and risk from the health care system to rural women and their families. Copyright © 2013 Australian College of Midwives. Published by Elsevier Ltd. All rights reserved.

  16. The sophisticated control of the tram bogie on track

    Directory of Open Access Journals (Sweden)

    Radovan DOLECEK

    2015-09-01

    Full Text Available The paper deals with the problems of routing control algorithms of new conception of tram vehicle bogie. The main goal of these research activities is wear reduction of rail wheels and tracks, wear reduction of traction energy losses and increasing of running comfort. The testing experimental tram vehicle with special bogie construction powered by traction battery is utilized for these purposes. This vehicle has a rotary bogie with independent rotating wheels driven by permanent magnets synchronous motors and a solid axle. The wheel forces in bogie are measured by large amounts of the various sensors placed on the testing experimental tram vehicle. Nowadays the designed control algorithms are implemented to the vehicle superset control system. The traction requirements and track characteristics have an effect to these control algorithms. This control including sophisticated routing brings other improvements which is verified and corrected according to individual traction and driving characteristics, and opens new possibilities.

  17. An Extended Two-Phase Method for Accessing Sections of Out-of-Core Arrays

    Directory of Open Access Journals (Sweden)

    Rajeev Thakur

    1996-01-01

    Full Text Available A number of applications on parallel computers deal with very large data sets that cannot fit in main memory. In such applications, data must be stored in files on disks and fetched into memory during program execution. Parallel programs with large out-of-core arrays stored in files must read/write smaller sections of the arrays from/to files. In this article, we describe a method for accessing sections of out-of-core arrays efficiently. Our method, the extended two-phase method, uses collective l/O: Processors cooperate to combine several l/O requests into fewer larger granularity requests, to reorder requests so that the file is accessed in proper sequence, and to eliminate simultaneous l/O requests for the same data. In addition, the l/O workload is divided among processors dynamically, depending on the access requests. We present performance results obtained from two real out-of-core parallel applications – matrix multiplication and a Laplace's equation solver – and several synthetic access patterns, all on the Intel Touchstone Delta. These results indicate that the extended two-phase method significantly outperformed a direct (noncollective method for accessing out-of-core array sections.

  18. Guided endodontics: accuracy of a novel method for guided access cavity preparation and root canal location.

    Science.gov (United States)

    Zehnder, M S; Connert, T; Weiger, R; Krastl, G; Kühl, S

    2016-10-01

    To present a novel method utilizing 3D printed templates to gain guided access to root canals and to evaluate its accuracy in vitro. Sixty extracted human teeth were placed into six maxillary jaw models. Preoperative CBCT scans were matched with intra-oral scans using the coDiagnostix(™) software. Access cavities, sleeves and templates for guidance were virtually planned. Templates were produced by a 3D printer. After access cavity preparation by two operators, a postoperative CBCT scan was superimposed on the virtual planning. Accuracy was measured by calculating the deviation of planned and prepared cavities in three dimensions and angle. Ninety-five per cent confidence intervals were calculated for both operators. All root canals were accessible after cavity preparation with 'Guided Endodontics'. Deviations of planned and prepared access cavities were low with means ranging from 0.16 to 0.21 mm for different aspects at the base of the bur and 0.17-0.47 mm at the tip of the bur. Mean of angle deviation was 1.81°. Overlapping 95% confidence intervals revealed no significant difference between operators. 'Guided Endodontics' allowed an accurate access cavity preparation up to the apical third of the root utilizing printed templates for guidance. All root canals were accessible after preparation. © 2015 International Endodontic Journal. Published by John Wiley & Sons Ltd.

  19. Sophisticated Online Learning Scheme for Green Resource Allocation in 5G Heterogeneous Cloud Radio Access Networks

    KAUST Repository

    Alqerm, Ismail; Shihada, Basem

    2018-01-01

    is implemented using two approaches: centralized, where the resource allocation is processed at a controller integrated with the baseband processing unit and decentralized, where macro BSs cooperate to achieve optimal resource allocation strategy. To foster

  20. Formalization of the Access Control on ARM-Android Platform with the B Method

    Science.gov (United States)

    Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing

    2018-01-01

    ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.

  1. Sophisticated Communication in the Brazilian Torrent Frog Hylodes japi.

    Science.gov (United States)

    de Sá, Fábio P; Zina, Juliana; Haddad, Célio F B

    2016-01-01

    Intraspecific communication in frogs plays an important role in the recognition of conspecifics in general and of potential rivals or mates in particular and therefore with relevant consequences for pre-zygotic reproductive isolation. We investigate intraspecific communication in Hylodes japi, an endemic Brazilian torrent frog with territorial males and an elaborate courtship behavior. We describe its repertoire of acoustic signals as well as one of the most complex repertoires of visual displays known in anurans, including five new visual displays. Previously unknown in frogs, we also describe a bimodal inter-sexual communication system where the female stimulates the male to emit a courtship call. As another novelty for frogs, we show that in addition to choosing which limb to signal with, males choose which of their two vocal sacs will be used for visual signaling. We explain how and why this is accomplished. Control of inflation also provides additional evidence that vocal sac movement and color must be important for visual communication, even while producing sound. Through the current knowledge on visual signaling in Neotropical torrent frogs (i.e. hylodids), we discuss and highlight the behavioral diversity in the family Hylodidae. Our findings indicate that communication in species of Hylodes is undoubtedly more sophisticated than we expected and that visual communication in anurans is more widespread than previously thought. This is especially true in tropical regions, most likely due to the higher number of species and phylogenetic groups and/or to ecological factors, such as higher microhabitat diversity.

  2. Sophisticated Communication in the Brazilian Torrent Frog Hylodes japi.

    Directory of Open Access Journals (Sweden)

    Fábio P de Sá

    Full Text Available Intraspecific communication in frogs plays an important role in the recognition of conspecifics in general and of potential rivals or mates in particular and therefore with relevant consequences for pre-zygotic reproductive isolation. We investigate intraspecific communication in Hylodes japi, an endemic Brazilian torrent frog with territorial males and an elaborate courtship behavior. We describe its repertoire of acoustic signals as well as one of the most complex repertoires of visual displays known in anurans, including five new visual displays. Previously unknown in frogs, we also describe a bimodal inter-sexual communication system where the female stimulates the male to emit a courtship call. As another novelty for frogs, we show that in addition to choosing which limb to signal with, males choose which of their two vocal sacs will be used for visual signaling. We explain how and why this is accomplished. Control of inflation also provides additional evidence that vocal sac movement and color must be important for visual communication, even while producing sound. Through the current knowledge on visual signaling in Neotropical torrent frogs (i.e. hylodids, we discuss and highlight the behavioral diversity in the family Hylodidae. Our findings indicate that communication in species of Hylodes is undoubtedly more sophisticated than we expected and that visual communication in anurans is more widespread than previously thought. This is especially true in tropical regions, most likely due to the higher number of species and phylogenetic groups and/or to ecological factors, such as higher microhabitat diversity.

  3. Multi-views storage model and access methods of conversation history in converged IP messaging system

    Science.gov (United States)

    Lu, Meilian; Yang, Dong; Zhou, Xing

    2013-03-01

    Based on the analysis of the requirements of conversation history storage in CPM (Converged IP Messaging) system, a Multi-views storage model and access methods of conversation history are proposed. The storage model separates logical views from physical storage and divides the storage into system managed region and user managed region. It simultaneously supports conversation view, system pre-defined view and user-defined view of storage. The rationality and feasibility of multi-view presentation, the physical storage model and access methods are validated through the implemented prototype. It proves that, this proposal has good scalability, which will help to optimize the physical data storage structure and improve storage performance.

  4. Mapping Norway - a Method to Register and Survey the Status of Accessibility

    Science.gov (United States)

    Michaelis, Sven; Bögelsack, Kathrin

    2018-05-01

    The Norwegian mapping authority has developed a standard method for mapping accessibility mostly for people with limited or no walking abilities in urban and recreational areas. We choose an object-orientated approach where points, lines and polygons represents objects in the environment. All data are stored in a geospatial database, so they can be presented as web map and analyzed using GIS software. By the end of 2016 more than 160 municipalities are mapped using that method. The aim of this project is to establish a national standard for mapping and to provide a geodatabase that shows the status of accessibility throughout Norway. The data provide a useful tool for national statistics, local planning authorities and private users. First results show that accessibility is low and Norway still faces many challenges to meet the government's goals for Universal Design.

  5. Impact of sophisticated fog spray models on accident analyses

    International Nuclear Information System (INIS)

    Roblyer, S.P.; Owzarski, P.C.

    1978-01-01

    The N-Reactor confinement system release dose to the public in a postulated accident is reduced by washing the confinement atmosphere with fog sprays. This allows a low pressure release of confinement atmosphere containing fission products through filters and out an elevated stack. The current accident analysis required revision of the CORRAL code and other codes such as CONTEMPT to properly model the N Reactor confinement into a system of multiple fog-sprayed compartments. In revising these codes, more sophisticated models for the fog sprays and iodine plateout were incorporated to remove some of the conservatism of steam condensing rate, fission product washout and iodine plateout than used in previous studies. The CORRAL code, which was used to describe the transport and deposition of airborne fission products in LWR containment systems for the Rasmussen Study, was revised to describe fog spray removal of molecular iodine (I 2 ) and particulates in multiple compartments for sprays having individual characteristics of on-off times, flow rates, fall heights, and drop sizes in changing containment atmospheres. During postulated accidents, the code determined the fission product removal rates internally rather than from input decontamination factors. A discussion is given of how the calculated plateout and washout rates vary with time throughout the analysis. The results of the accident analyses indicated that more credit could be given to fission product washout and plateout. An important finding was that the release of fission products to the atmosphere and adsorption of fission products on the filters were significantly lower than previous studies had indicated

  6. Method of constructing lower dry well access tunnel for nuclear reactor container

    International Nuclear Information System (INIS)

    Kume, Tadashi; Furukawa, Hedeyasu.

    1993-01-01

    The method of the present invention facilitates construction of a lower dry well access tunnel for a nuclear reactor container. The lower dry well access tunnel is constructed across the reactor container and the reactor main body foundation. In this case, the lower dry well access tunnel is divided into three sections, i.e., axial end portions and a central portion. At first, each of the end portions is attached to the walls of the reactor container and the reactor main body foundation respectively. Subsequently, the central portion is attached to each of the end portions. An adjusting margin is previously provided to the central portion upon manufacturing each of the sections for adjusting deviation from a nominal size upon construction. In such a construction method, it is possible to eliminate interference accident during construction between the end portions of the lower dry well access tunnel and the reactor container and the reactor main body foundation, to facilitate the construction. Further, this facilitates the fabricating operation for dimensional alignment between the lower dry well access tunnel, and the reactor container and the reactor main body foundation. (I.S.)

  7. A METHOD OF AND A SYSTEM FOR CONTROLLING ACCESS TO A SHARED RESOURCE

    DEFF Research Database (Denmark)

    2006-01-01

    A method and a system of controlling access of data items to a shared resource, wherein the data items each is assigned to one of a plurality of priorities, and wherein, when a predetermined number of data items of a priority have been transmitted to the shared resource, that priority...

  8. Systematic analysis of geo-location and spectrum sensing as access methods to TV white space

    CSIR Research Space (South Africa)

    Mauwa, H

    2016-11-01

    Full Text Available Access to the television white space by white space devices comes with a major technical challenge: white space devices can potentially interfere with existing television signals. Two methods have been suggested in the literature to help white space...

  9. Teens' Survey of Stores in the District of Columbia on Accessibility of Family Planning Methods.

    Science.gov (United States)

    Center for Population Options, Washington, DC.

    Access to and availability of contraceptive methods in stores play an important role in the prevention of AIDS, unwanted pregnancies, and other sexually transmitted diseases. Although teens are generally knowledgable about birth control, many encounter barriers when attempting to obtain contraceptive. Forty-five drug stores and 15 convenience…

  10. A Method for Upper Bounding Long Term Growth of Network Access Speed

    Directory of Open Access Journals (Sweden)

    Thomas Phillip Knudsen

    2006-06-01

    Full Text Available The development in home Internet access speed has shown an exponential development with growth rates averaging 25% per year. For resource management in network provisioning it becomes an urgent question how long such growth can continue. This paper presents a method for calculating an upper bound to visual content driven growth, proceeding from datarate requirements for a full virtual environment. Scenarios and approaches for reducing datarate requirements are considered and discussed. The presented figures for an upper bound on network access speed are discussed and perspectives on further research presented.

  11. A Method for Upper Bounding Long Term Growth of Network Access Speed

    DEFF Research Database (Denmark)

    Knudsen, Thomas Phillip; Pedersen, Jens Myrup; Madsen, Ole Brun

    2004-01-01

    The development in home Internet access speed has shown an exponential development with growth rates averaging 25% per year. For resource management in network provisioning it becomes an urgent question how long such growth can continue. This paper presents a method for calculating an upper bound...... to visual content driven growth, proceeding from datarate requirements for a full virtual environment. Scenarios and approaches for reducing datarate requirements are considered and discussed. The presented figures for an upper bound on network access speed are discussed and perspectives on further research...

  12. Building Models in the Classroom: Taking Advantage of Sophisticated Geomorphic Numerical Tools Using a Simple Graphical User Interface

    Science.gov (United States)

    Roy, S. G.; Koons, P. O.; Gerbi, C. C.; Capps, D. K.; Tucker, G. E.; Rogers, Z. A.

    2014-12-01

    Sophisticated numerical tools exist for modeling geomorphic processes and linking them to tectonic and climatic systems, but they are often seen as inaccessible for users with an exploratory level of interest. We have improved the accessibility of landscape evolution models by producing a simple graphics user interface (GUI) that takes advantage of the Channel-Hillslope Integrated Landscape Development (CHILD) model. Model access is flexible: the user can edit values for basic geomorphic, tectonic, and climate parameters, or obtain greater control by defining the spatiotemporal distributions of those parameters. Users can make educated predictions by choosing their own parametric values for the governing equations and interpreting the results immediately through model graphics. This method of modeling allows users to iteratively build their understanding through experimentation. Use of this GUI is intended for inquiry and discovery-based learning activities. We discuss a number of examples of how the GUI can be used at the upper high school, introductory university, and advanced university level. Effective teaching modules initially focus on an inquiry-based example guided by the instructor. As students become familiar with the GUI and the CHILD model, the class can shift to more student-centered exploration and experimentation. To make model interpretations more robust, digital elevation models can be imported and direct comparisons can be made between CHILD model results and natural topography. The GUI is available online through the University of Maine's Earth and Climate Sciences website, through the Community Surface Dynamics Modeling System (CSDMS) model repository, or by contacting the corresponding author.

  13. Purification through Emotions: The Role of Shame in Plato's "Sophist" 230B4-E5

    Science.gov (United States)

    Candiotto, Laura

    2018-01-01

    This article proposes an analysis of Plato's "Sophist" (230b4--e5) that underlines the bond between the logical and the emotional components of the Socratic "elenchus", with the aim of depicting the social valence of this philosophical practice. The use of emotions characterizing the 'elenctic' method described by Plato is…

  14. Searching for Suicide Methods: Accessibility of Information About Helium as a Method of Suicide on the Internet.

    Science.gov (United States)

    Gunnell, David; Derges, Jane; Chang, Shu-Sen; Biddle, Lucy

    2015-01-01

    Helium gas suicides have increased in England and Wales; easy-to-access descriptions of this method on the Internet may have contributed to this rise. To investigate the availability of information on using helium as a method of suicide and trends in searching about this method on the Internet. We analyzed trends in (a) Google searching (2004-2014) and (b) hits on a Wikipedia article describing helium as a method of suicide (2013-2014). We also investigated the extent to which helium was described as a method of suicide on web pages and discussion forums identified via Google. We found no evidence of rises in Internet searching about suicide using helium. News stories about helium suicides were associated with increased search activity. The Wikipedia article may have been temporarily altered to increase awareness of suicide using helium around the time of a celebrity suicide. Approximately one third of the links retrieved using Google searches for suicide methods mentioned helium. Information about helium as a suicide method is readily available on the Internet; the Wikipedia article describing its use was highly accessed following celebrity suicides. Availability of online information about this method may contribute to rises in helium suicides.

  15. EAP-Kerberos: A Low Latency EAP Authentication Method for Faster Handoffs in Wireless Access Networks

    Science.gov (United States)

    Zrelli, Saber; Okabe, Nobuo; Shinoda, Yoichi

    The wireless medium is a key technology for enabling ubiquitous and continuous network connectivity. It is becoming more and more important in our daily life especially with the increasing adoption of networking technologies in many fields such as medical care and transportation systems. Although most wireless technologies nowadays provide satisfying bandwidth and higher speeds, several of these technologies still lack improvements with regard to handoff performance. In this paper, we focus on wireless network technologies that rely on the Extensible Authentication Protocol for mutual authentication between the station and the access network. Such technologies include local area wireless networks (IEEE 802.11) as well as broadband wireless networks (IEEE 802.16). We present a new EAP authentication method based on a three party authentication scheme, namely Kerberos, that considerably shortens handoff delays. Compared to other methods, the proposed method has the advantage of not requiring any changes on the access points, making it readily deployable at reasonable costs.

  16. A Novel Method for Intraoral Access to the Superior Head of the Human Lateral Pterygoid Muscle

    Directory of Open Access Journals (Sweden)

    Aleli Tôrres Oliveira

    2014-01-01

    Full Text Available Background. The uncoordinated activity of the superior and inferior parts of the lateral pterygoid muscle (LPM has been suggested to be one of the causes of temporomandibular joint (TMJ disc displacement. A therapy for this muscle disorder is the injection of botulinum toxin (BTX, of the LPM. However, there is a potential risk of side effects with the injection guide methods currently available. In addition, they do not permit appropriate differentiation between the two bellies of the muscle. Herein, a novel method is presented to provide intraoral access to the superior head of the human LPM with maximal control and minimal hazards. Methods. Computational tomography along with digital imaging software programs and rapid prototyping techniques were used to create a rapid prototyped guide to orient BTX injections in the superior LPM. Results. The method proved to be feasible and reliable. Furthermore, when tested in one volunteer it allowed precise access to the upper head of LPM, without producing side effects. Conclusions. The prototyped guide presented in this paper is a novel tool that provides intraoral access to the superior head of the LPM. Further studies will be necessary to test the efficacy and validate this method in a larger cohort of subjects.

  17. Spatial access priority mapping (SAPM) with fishers: a quantitative GIS method for participatory planning.

    Science.gov (United States)

    Yates, Katherine L; Schoeman, David S

    2013-01-01

    Spatial management tools, such as marine spatial planning and marine protected areas, are playing an increasingly important role in attempts to improve marine management and accommodate conflicting needs. Robust data are needed to inform decisions among different planning options, and early inclusion of stakeholder involvement is widely regarded as vital for success. One of the biggest stakeholder groups, and the most likely to be adversely impacted by spatial restrictions, is the fishing community. In order to take their priorities into account, planners need to understand spatial variation in their perceived value of the sea. Here a readily accessible, novel method for quantitatively mapping fishers' spatial access priorities is presented. Spatial access priority mapping, or SAPM, uses only basic functions of standard spreadsheet and GIS software. Unlike the use of remote-sensing data, SAPM actively engages fishers in participatory mapping, documenting rather than inferring their priorities. By so doing, SAPM also facilitates the gathering of other useful data, such as local ecological knowledge. The method was tested and validated in Northern Ireland, where over 100 fishers participated in a semi-structured questionnaire and mapping exercise. The response rate was excellent, 97%, demonstrating fishers' willingness to be involved. The resultant maps are easily accessible and instantly informative, providing a very clear visual indication of which areas are most important for the fishers. The maps also provide quantitative data, which can be used to analyse the relative impact of different management options on the fishing industry and can be incorporated into planning software, such as MARXAN, to ensure that conservation goals can be met at minimum negative impact to the industry. This research shows how spatial access priority mapping can facilitate the early engagement of fishers and the ready incorporation of their priorities into the decision-making process

  18. Action research to improve methods of delivery and feedback in an Access Grid Room environment

    Science.gov (United States)

    McArthur, Lynne C.; Klass, Lara; Eberhard, Andrew; Stacey, Andrew

    2011-12-01

    This article describes a qualitative study which was undertaken to improve the delivery methods and feedback opportunity in honours mathematics lectures which are delivered through Access Grid Rooms. Access Grid Rooms are facilities that provide two-way video and audio interactivity across multiple sites, with the inclusion of smart boards. The principal aim was to improve the student learning experience, given the new environment. The specific aspects of the course delivery that the study focused on included presentation of materials and provision of opportunities for interaction between the students and between students and lecturers. The practical considerations in the delivery of distance learning are well documented in the literature, and similar problems arise in the Access Grid Room environment; in particular, those of limited access to face-to-face interaction and the reduction in peer support. The nature of the Access Grid Room classes implies that students studying the same course can be physically situated in different cities, and possibly in different countries. When studying, it is important that students have opportunity to discuss new concepts with others; particularly their peers and their lecturer. The Access Grid Room environment also presents new challenges for the lecturer, who must learn new skills in the delivery of materials. The unique nature of Access Grid Room technology offers unprecedented opportunity for effective course delivery and positive outcomes for students, and was developed in response to a need to be able to interact with complex data, other students and the instructor, in real-time, at a distance and from multiple sites. This is a relatively new technology and as yet there has been little or no studies specifically addressing the use and misuse of the technology. The study found that the correct placement of cameras and the use of printed material and smart boards were all crucial to the student experience. In addition, the

  19. INTEGRATIVE METHOD OF TEACHING INFORMATION MODELING IN PRACTICAL HEALTH SERVICE BASED ON MICROSOFT ACCESS QUERIES

    Directory of Open Access Journals (Sweden)

    Svetlana A. Firsova

    2016-06-01

    Full Text Available Introduction: this article explores the pedagogical technology employed to teach medical students foundations of work with MICROSOFT ACCESS databases. The above technology is based on integrative approach to the information modeling in public health practice, drawing upon basic didactic concepts that pertain to objects and tools databases created in MICROSOFT ACCESS. The article examines successive steps in teaching the topic “Queries in MICROSOFT ACCESS” – from simple queries to complex ones. The main attention is paid to such components of methodological system, as the principles and teaching methods classified according to the degree of learners’ active cognitive activity. The most interesting is the diagram of the relationship of learning principles, teaching methods and specific types of requests. Materials and Methods: the authors used comparative analysis of literature, syllabi, curricula in medical informatics taught at leading medical universities in Russia. Results: the original technique of training in putting queries with databases of MICROSOFT ACCESS is presented for analysis of information models in practical health care. Discussion and Conclusions: it is argued that the proposed pedagogical technology will significantly improve the effectiveness of teaching the course “Medical Informatics”, that includes development and application of models to simulate the operation of certain facilities and services of the health system which, in turn, increases the level of information culture of practitioners.

  20. System and method for integrating and accessing multiple data sources within a data warehouse architecture

    Science.gov (United States)

    Musick, Charles R [Castro Valley, CA; Critchlow, Terence [Livermore, CA; Ganesh, Madhaven [San Jose, CA; Slezak, Tom [Livermore, CA; Fidelis, Krzysztof [Brentwood, CA

    2006-12-19

    A system and method is disclosed for integrating and accessing multiple data sources within a data warehouse architecture. The metadata formed by the present method provide a way to declaratively present domain specific knowledge, obtained by analyzing data sources, in a consistent and useable way. Four types of information are represented by the metadata: abstract concepts, databases, transformations and mappings. A mediator generator automatically generates data management computer code based on the metadata. The resulting code defines a translation library and a mediator class. The translation library provides a data representation for domain specific knowledge represented in a data warehouse, including "get" and "set" methods for attributes that call transformation methods and derive a value of an attribute if it is missing. The mediator class defines methods that take "distinguished" high-level objects as input and traverse their data structures and enter information into the data warehouse.

  1. Solving Real-Life Problems: Future Mobile Technology Sophistication

    Directory of Open Access Journals (Sweden)

    FARHAN SHAFIQ

    2016-07-01

    Full Text Available Almost all the human being real life concerned domains are taking advantage of latest technologies for enhancing their process, procedures and operations. This integration of technological innovations provides ease of access, flexibility, transparency, reliability and speed for the concerned process and procedures. Rapid growth of ICT (Information and Communication Technology and MT (Mobile Technology provides opportunity to redesign and reengineered the human routines? life activities process and procedures. Technology integration and adoption in routine life activities may serves compensatory mechanism to assist the population in different manner such as monitoring older adults and children at homes, provides security assistance, monitoring and recording patients vital signs automatically, controlling and monitoring equipments and devices, providing assistance in shopping, banking and education as well. Disasters happened suddenly, destroy everything indiscriminately. Adoption and integration of latest technologies including ICT and MT can enhance the current disaster management process, procedures and operations. This research study focuses the impacts of latest and emerging technology trends in routine life activities and surrounds their potential strength to improve and enhance disaster management activities. MT is providing a promising platform for facilitating people to enhance their routine life activities. This research argue that integration and adoption of mobile computing in disaster management domain can enhance disaster management activities with promising minimizing error, quick information assembling, quick response based on technology manipulation and prioritizing action.

  2. Solving real-life problems: future mobile technology sophistication

    International Nuclear Information System (INIS)

    Shafiq, F.; Ahsan, K.; Nadeem, A.

    2016-01-01

    Almost all the human being real life concerned domains are taking advantage of latest technologies for enhancing their process, procedures and operations. This integration of technological innovations provides ease of access, flexibility, transparency, reliability and speed for the concerned process and procedures. Rapid growth of ICT (Information and Communication Technology) and MT (Mobile Technology) provides opportunity to redesign and re-engineered the human routines life activities process and procedures. Technology integration and adoption in routine life activities may serves compensatory mechanism to assist the population in different manner such as monitoring older adults and children at homes, provides security assistance, monitoring and recording patients vital signs automatically, controlling and monitoring equipments and devices, providing assistance in shopping, banking and education as well. Disasters happened suddenly, destroy everything indiscriminately. Adoption and integration of latest technologies including ICT and MT can enhance the current disaster management process, procedures and operations. This research study focuses the impacts of latest and emerging technology trends in routine life activities and surrounds their potential strength to improve and enhance disaster management activities. MT is providing a promising platform for facilitating people to enhance their routine life activities. This research argue that integration and adoption of mobile computing in disaster management domain can enhance disaster management activities with promising minimizing error, quick information assembling, quick response based on technology manipulation and prioritizing action. (author)

  3. Solvent Flux Method (SFM): A Case Study of Water Access to Candida antarctica Lipase B.

    Science.gov (United States)

    Benson, Sven P; Pleiss, Jürgen

    2014-11-11

    The solvent flux method (SFM) was developed to comprehensively characterize the influx of solvent molecules from the solvent environment into the active site of a protein in the framework of molecular dynamics simulations. This was achieved by introducing a solvent concentration gradient as well as partially reorienting and rescaling the velocity vector of all solvent molecules contained within a spherical volume enclosing the protein, thus inducing an accelerated solvent influx toward the active site. In addition to the detection of solvent access pathway within the protein structure, it is hereby possible to identify potential amino acid positions relevant to solvent-related enzyme engineering with high statistical significance. The method is particularly aimed at improving the reverse hydrolysis reaction rates in nonaqueous media. Candida antarctica lipase B (CALB) binds to a triglyceride-water interface with its substrate entrance channel oriented toward the hydrophobic substrate interface. The lipase-triglyceride-water system served as a model system for SFM to evaluate the influx of water molecules to the active site. As a proof of principle for SFM, a previously known water access pathway in CALB was identified as the primary water channel. In addition, a secondary water channel and two pathways for water access which contribute to water leakage between the protein and the triglyceride-water interface were identified.

  4. RSARF: Prediction of residue solvent accessibility from protein sequence using random forest method

    KAUST Repository

    Ganesan, Pugalenthi; Kandaswamy, Krishna Kumar Umar; Chou -, Kuochen; Vivekanandan, Saravanan; Kolatkar, Prasanna R.

    2012-01-01

    Prediction of protein structure from its amino acid sequence is still a challenging problem. The complete physicochemical understanding of protein folding is essential for the accurate structure prediction. Knowledge of residue solvent accessibility gives useful insights into protein structure prediction and function prediction. In this work, we propose a random forest method, RSARF, to predict residue accessible surface area from protein sequence information. The training and testing was performed using 120 proteins containing 22006 residues. For each residue, buried and exposed state was computed using five thresholds (0%, 5%, 10%, 25%, and 50%). The prediction accuracy for 0%, 5%, 10%, 25%, and 50% thresholds are 72.9%, 78.25%, 78.12%, 77.57% and 72.07% respectively. Further, comparison of RSARF with other methods using a benchmark dataset containing 20 proteins shows that our approach is useful for prediction of residue solvent accessibility from protein sequence without using structural information. The RSARF program, datasets and supplementary data are available at http://caps.ncbs.res.in/download/pugal/RSARF/. - See more at: http://www.eurekaselect.com/89216/article#sthash.pwVGFUjq.dpuf

  5. Internet and Social Media Access Among Youth Experiencing Homelessness: Mixed-Methods Study.

    Science.gov (United States)

    VonHoltz, Lauren A Houdek; Frasso, Rosemary; Golinkoff, Jesse M; Lozano, Alicia J; Hanlon, Alexandra; Dowshen, Nadia

    2018-05-22

    leisure or entertainment activities. While homeless youth experience changes in the frequency, amount of time, and specific uses of the internet and social media, study participants were able to access the internet regularly. The internet was used to search health-related topics. Given the importance of smartphones in accessing the internet, mobile-optimized websites may be an effective method for reaching this group. ©Lauren A Houdek VonHoltz, Rosemary Frasso, Jesse M Golinkoff, Alicia J Lozano, Alexandra Hanlon, Nadia Dowshen. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 22.05.2018.

  6. Sophistication of operator training using BWR plant simulator

    International Nuclear Information System (INIS)

    Ohshiro, Nobuo; Endou, Hideaki; Fujita, Eimitsu; Miyakita, Kouji

    1986-01-01

    In Japanese nuclear power stations, owing to the improvement of fuel management, thorough maintenance and inspection, and the improvement of facilities, high capacity ratio has been attained. The thorough training of operators in nuclear power stations also contributes to it sufficiently. The BWR operator training center was established in 1971, and started the training of operators in April, 1974. As of the end of March, 1986, more than 1800 trainees completed training. At present, in the BWR operator training center, No.1 simulator of 800 MW class and No.2 simulator of 1100 MW class are operated for training. In this report, the method, by newly adopting it, good result was obtained, is described, that is, the method of introducing the feeling of being present on the spot into the place of training, and the new testing method introduced in retraining course. In the simulator training which is apt to place emphasis on a central control room, the method of stimulating trainees by playing the part of correspondence on the spot and heightening the training effect of multiple monitoring was tried, and the result was confirmed. The test of confirmation on the control board was added. (Kako, I.)

  7. xSyn: A Software Tool for Identifying Sophisticated 3-Way Interactions From Cancer Expression Data

    Directory of Open Access Journals (Sweden)

    Baishali Bandyopadhyay

    2017-08-01

    Full Text Available Background: Constructing gene co-expression networks from cancer expression data is important for investigating the genetic mechanisms underlying cancer. However, correlation coefficients or linear regression models are not able to model sophisticated relationships among gene expression profiles. Here, we address the 3-way interaction that 2 genes’ expression levels are clustered in different space locations under the control of a third gene’s expression levels. Results: We present xSyn, a software tool for identifying such 3-way interactions from cancer gene expression data based on an optimization procedure involving the usage of UPGMA (Unweighted Pair Group Method with Arithmetic Mean and synergy. The effectiveness is demonstrated by application to 2 real gene expression data sets. Conclusions: xSyn is a useful tool for decoding the complex relationships among gene expression profiles. xSyn is available at http://www.bdxconsult.com/xSyn.html .

  8. Accessible methods for the dynamic time-scale decomposition of biochemical systems.

    Science.gov (United States)

    Surovtsova, Irina; Simus, Natalia; Lorenz, Thomas; König, Artjom; Sahle, Sven; Kummer, Ursula

    2009-11-01

    The growing complexity of biochemical models asks for means to rationally dissect the networks into meaningful and rather independent subnetworks. Such foregoing should ensure an understanding of the system without any heuristics employed. Important for the success of such an approach is its accessibility and the clarity of the presentation of the results. In order to achieve this goal, we developed a method which is a modification of the classical approach of time-scale separation. This modified method as well as the more classical approach have been implemented for time-dependent application within the widely used software COPASI. The implementation includes different possibilities for the representation of the results including 3D-visualization. The methods are included in COPASI which is free for academic use and available at www.copasi.org. irina.surovtsova@bioquant.uni-heidelberg.de Supplementary data are available at Bioinformatics online.

  9. Sophistication of computational science and fundamental physics simulations

    International Nuclear Information System (INIS)

    Ishiguro, Seiji; Ito, Atsushi; Usami, Shunsuke; Ohtani, Hiroaki; Sakagami, Hitoshi; Toida, Mieko; Hasegawa, Hiroki; Horiuchi, Ritoku; Miura, Hideaki

    2016-01-01

    Numerical experimental reactor research project is composed of the following studies: (1) nuclear fusion simulation research with a focus on specific physical phenomena of specific equipment, (2) research on advanced simulation method to increase predictability or expand its application range based on simulation, (3) visualization as the foundation of simulation research, (4) research for advanced computational science such as parallel computing technology, and (5) research aiming at elucidation of fundamental physical phenomena not limited to specific devices. Specifically, a wide range of researches with medium- to long-term perspectives are being developed: (1) virtual reality visualization, (2) upgrading of computational science such as multilayer simulation method, (3) kinetic behavior of plasma blob, (4) extended MHD theory and simulation, (5) basic plasma process such as particle acceleration due to interaction of wave and particle, and (6) research related to laser plasma fusion. This paper reviews the following items: (1) simultaneous visualization in virtual reality space, (2) multilayer simulation of collisionless magnetic reconnection, (3) simulation of microscopic dynamics of plasma coherent structure, (4) Hall MHD simulation of LHD, (5) numerical analysis for extension of MHD equilibrium and stability theory, (6) extended MHD simulation of 2D RT instability, (7) simulation of laser plasma, (8) simulation of shock wave and particle acceleration, and (9) study on simulation of homogeneous isotropic MHD turbulent flow. (A.O.)

  10. Average Likelihood Methods of Classification of Code Division Multiple Access (CDMA)

    Science.gov (United States)

    2016-05-01

    subject to code matrices that follows the structure given by (113). [⃗ yR y⃗I ] = √ Es 2L [ GR1 −GI1 GI2 GR2 ] [ QR −QI QI QR ] [⃗ bR b⃗I ] + [⃗ nR n⃗I... QR ] [⃗ b+ b⃗− ] + [⃗ n+ n⃗− ] (115) The average likelihood for type 4 CDMA (116) is a special case of type 1 CDMA with twice the code length and...AVERAGE LIKELIHOOD METHODS OF CLASSIFICATION OF CODE DIVISION MULTIPLE ACCESS (CDMA) MAY 2016 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE

  11. Modern devices the simple physics of sophisticated technology

    CERN Document Server

    Joseph, Charles L

    2016-01-01

    This book discusses the principles of physics through applications of state-of-the-art technologies and advanced instruments. The authors use diagrams, sketches, and graphs coupled with equations and mathematical analysis to enhance the reader's understanding of modern devices. Readers will learn to identify common underlying physical principles that govern several types of devices, while gaining an understanding of the performance trade-off imposed by the physical limitations of various processing methods. The topics discussed in the book assume readers have taken an introductory physics course, college algebra, and have a basic understanding of calculus. * Describes the basic physics behind a large number of devices encountered in everyday life, from the air conditioner to Blu-ray discs * Covers state-of-the-art devices such as spectrographs, photoelectric image sensors, spacecraft systems, astronomical and planetary observatories, biomedical imaging instruments, particle accelerators, and jet engines * Inc...

  12. Lexical Sophistication as a Multidimensional Phenomenon: Relations to Second Language Lexical Proficiency, Development, and Writing Quality

    Science.gov (United States)

    Kim, Minkyung; Crossley, Scott A.; Kyle, Kristopher

    2018-01-01

    This study conceptualizes lexical sophistication as a multidimensional phenomenon by reducing numerous lexical features of lexical sophistication into 12 aggregated components (i.e., dimensions) via a principal component analysis approach. These components were then used to predict second language (L2) writing proficiency levels, holistic lexical…

  13. The predictors of economic sophistication: media, interpersonal communication and negative economic experiences

    NARCIS (Netherlands)

    Kalogeropoulos, A.; Albæk, E.; de Vreese, C.H.; van Dalen, A.

    2015-01-01

    In analogy to political sophistication, it is imperative that citizens have a certain level of economic sophistication, especially in times of heated debates about the economy. This study examines the impact of different influences (media, interpersonal communication and personal experiences) on

  14. Isocratean Discourse Theory and Neo-Sophistic Pedagogy: Implications for the Composition Classroom.

    Science.gov (United States)

    Blair, Kristine L.

    With the recent interest in the fifth century B.C. theories of Protagoras and Gorgias come assumptions about the philosophical affinity of the Greek educator Isocrates to this pair of older sophists. Isocratean education in discourse, with its emphasis on collaborative political discourse, falls within recent definitions of a sophist curriculum.…

  15. Aristotle and Social-Epistemic Rhetoric: The Systematizing of the Sophistic Legacy.

    Science.gov (United States)

    Allen, James E.

    While Aristotle's philosophical views are more foundational than those of many of the Older Sophists, Aristotle's rhetorical theories inherit and incorporate many of the central tenets ascribed to Sophistic rhetoric, albeit in a more systematic fashion, as represented in the "Rhetoric." However, Aristotle was more than just a rhetorical…

  16. Sophistication of burnup analysis system for fast reactor

    International Nuclear Information System (INIS)

    Yokoyama, Kenji; Hirai, Yasushi; Hyoudou, Hideaki; Tatsumi, Masahiro

    2010-02-01

    Improvement on prediction accuracy for neutronics property of fast reactor cores is one of the most important study domains in terms of both achievement of high economical plant efficiency based on reasonably advanced designs and increased reliability and safety margins. In former study, considerable improvement on prediction accuracy in neutronics design has been achieved in the development of the unified constants library as a fruit of a series of critical experiments such as JUPITER in application of the reactor constant adjustments. For design of fast reactor cores, however, improvement of not only static properties but also burnup properties is very important. For such purpose, it is necessary to improve the prediction accuracy on burnup properties using actual burnup data of 'JOYO' and 'MONJU', experimental and prototype fast reactors. Recently, study on effective burnup method for minor actinides becomes important theme. However, there is a problem that analysis work tends to become inefficient for lack of functionality suitable for analysis of composition change due to burnup since the conventional analysis system is targeted to critical assembly systems. Therefore development of burnup analysis system for fast reactors with modularity and flexibility is being done that would contribute to actual core design work and improvement of prediction accuracy. In the previous research, we have developed a prototype system which has functions of performing core and burnup calculations using given constant files (PDS files) and information based on simple and easy user input data. It has also functions of fuel shuffling which is indispensable for production systems. In the present study, we implemented functions for cell calculations and burnup calculations. With this, whole steps in analysis can be carried out with only this system. In addition, we modified the specification of user input to improve the convenience of this system. Since implementations being done so

  17. More Sophisticated Fits of the Oribts of Haumea's Interacting Moons

    Science.gov (United States)

    Oldroyd, William Jared; Ragozzine, Darin; Porter, Simon

    2018-04-01

    Since the discovery of Haumea's moons, it has been a challenge to model the orbits of its moons, Hi’iaka and Namaka. With many precision HST observations, Ragozzine & Brown 2009 succeeded in calculating a three-point mass model which was essential because Keplerian orbits were not a statistically acceptable fit. New data obtained in 2010 could be fit by adding a J2 and spin pole to Haumea, but new data from 2015 was far from the predicted locations, even after an extensive exploration using Bayesian Markov Chain Monte Carlo methods (using emcee). Here we report on continued investigations as to why our model cannot fit the full 10-year baseline of data. We note that by ignoring Haumea and instead examining the relative motion of the two moons in the Hi’iaka centered frame leads to adequate fits for the data. This suggests there are additional parameters connected to Haumea that will be required in a full model. These parameters are potentially related to photocenter-barycenter shifts which could be significant enough to affect the fitting process; these are unlikely to be caused by the newly discovered ring (Ortiz et al. 2017) or by unknown satellites (Burkhart et al. 2016). Additionally, we have developed a new SPIN+N-bodY integrator called SPINNY that self-consistently calculates the interactions between n-quadrupoles and is designed to test the importance of other possible effects (Haumea C22, satellite torques on the spin-pole, Sun, etc.) on our astrometric fits. By correctly determining the orbit of Haumea’s satellites we develop a better understanding of the physical properties of each of the objects with implications for the formation of Haumea, its moons, and its collisional family.

  18. A generic method for assignment of reliability scores applied to solvent accessibility predictions

    Directory of Open Access Journals (Sweden)

    Nielsen Morten

    2009-07-01

    Full Text Available Abstract Background Estimation of the reliability of specific real value predictions is nontrivial and the efficacy of this is often questionable. It is important to know if you can trust a given prediction and therefore the best methods associate a prediction with a reliability score or index. For discrete qualitative predictions, the reliability is conventionally estimated as the difference between output scores of selected classes. Such an approach is not feasible for methods that predict a biological feature as a single real value rather than a classification. As a solution to this challenge, we have implemented a method that predicts the relative surface accessibility of an amino acid and simultaneously predicts the reliability for each prediction, in the form of a Z-score. Results An ensemble of artificial neural networks has been trained on a set of experimentally solved protein structures to predict the relative exposure of the amino acids. The method assigns a reliability score to each surface accessibility prediction as an inherent part of the training process. This is in contrast to the most commonly used procedures where reliabilities are obtained by post-processing the output. Conclusion The performance of the neural networks was evaluated on a commonly used set of sequences known as the CB513 set. An overall Pearson's correlation coefficient of 0.72 was obtained, which is comparable to the performance of the currently best public available method, Real-SPINE. Both methods associate a reliability score with the individual predictions. However, our implementation of reliability scores in the form of a Z-score is shown to be the more informative measure for discriminating good predictions from bad ones in the entire range from completely buried to fully exposed amino acids. This is evident when comparing the Pearson's correlation coefficient for the upper 20% of predictions sorted according to reliability. For this subset, values of 0

  19. The Effect of Transport Accessibility on the Social Inclusion of Wheelchair Users: A Mixed Method Analysis

    Directory of Open Access Journals (Sweden)

    Raquel Velho

    2016-06-01

    Full Text Available In recent years the accessibility of London buses has improved with the introduction of ramps and wheelchair priority areas. These advances are meant to remove physical barriers to entering the bus, but new conflicts have arisen particularly over the physical space aboard. We aimed to research the barriers faced by wheelchair users in public transport using a mixed methods approach to establish the breadth of issues faced by wheelchair users. To this end we quantified the push-force used alight a bus and a study to understand the coping mechanisms used by people to propel up a ramp. This quantitative approach found push forces which resulted in a load of 2 to 3 times body weight being transferred through people’s shoulders, forces which can be directly linked to shoulder injury. This could disable the user further, preventing them from being able to push their wheelchair. Alongside the quantitative study, we conducted qualitative research comprising of a number of in-depth interviews with wheelchair users about the barriers they face in public transport. Our main claim, highlighted through this interdisciplinary collaboration, is that proposed ‘solutions’ to accessibility, such as ramps, often generate problems of their own. These barriers can affect the life of wheelchair users, impacting on their confidence and causing social isolation. These can be long-term in nature or immediate.

  20. Review of clinically accessible methods to determine lean body mass for normalization of standardized uptake values

    International Nuclear Information System (INIS)

    DEVRIESE, Joke; POTTEL, Hans; BEELS, Laurence; MAES, Alex; VAN DE WIELE, Christophe; GHEYSENS, Olivier

    2016-01-01

    With the routine use of 2-deoxy-2-[ 18 F]-fluoro-D-glucose (18F-FDG) positron emission tomography/computed tomography (PET/CT) scans, metabolic activity of tumors can be quantitatively assessed through calculation of SUVs. One possible normalization parameter for the standardized uptake value (SUV) is lean body mass (LBM), which is generally calculated through predictive equations based on height and body weight. (Semi-)direct measurements of LBM could provide more accurate results in cancer populations than predictive equations based on healthy populations. In this context, four methods to determine LBM are reviewed: bioelectrical impedance analysis, dual-energy X-ray absorptiometry. CT, and magnetic resonance imaging. These methods were selected based on clinical accessibility and are compared in terms of methodology, precision and accuracy. By assessing each method’s specific advantages and limitations, a well-considered choice of method can hopefully lead to more accurate SUVLBM values, hence more accurate quantitative assessment of 18F-FDG PET images.

  1. The State of Nursing Home Information Technology Sophistication in Rural and Nonrural US Markets.

    Science.gov (United States)

    Alexander, Gregory L; Madsen, Richard W; Miller, Erin L; Wakefield, Douglas S; Wise, Keely K; Alexander, Rachel L

    2017-06-01

    To test for significant differences in information technology sophistication (ITS) in US nursing homes (NH) based on location. We administered a primary survey January 2014 to July 2015 to NH in each US state. The survey was cross-sectional and examined 3 dimensions (IT capabilities, extent of IT use, degree of IT integration) among 3 domains (resident care, clinical support, administrative activities) of ITS. ITS was broken down by NH location. Mean responses were compared across 4 NH categories (Metropolitan, Micropolitan, Small Town, and Rural) for all 9 ITS dimensions and domains. Least square means and Tukey's method were used for multiple comparisons. Methods yielded 815/1,799 surveys (45% response rate). In every health care domain (resident care, clinical support, and administrative activities) statistical differences in facility ITS occurred in larger (metropolitan or micropolitan) and smaller (small town or rural) populated areas. This study represents the most current national assessment of NH IT since 2004. Historically, NH IT has been used solely for administrative activities and much less for resident care and clinical support. However, results are encouraging as ITS in other domains appears to be greater than previously imagined. © 2016 National Rural Health Association.

  2. A sophisticated simulation for the fracture behavior of concrete material using XFEM

    Science.gov (United States)

    Zhai, Changhai; Wang, Xiaomin; Kong, Jingchang; Li, Shuang; Xie, Lili

    2017-10-01

    The development of a powerful numerical model to simulate the fracture behavior of concrete material has long been one of the dominant research areas in earthquake engineering. A reliable model should be able to adequately represent the discontinuous characteristics of cracks and simulate various failure behaviors under complicated loading conditions. In this paper, a numerical formulation, which incorporates a sophisticated rigid-plastic interface constitutive model coupling cohesion softening, contact, friction and shear dilatation into the XFEM, is proposed to describe various crack behaviors of concrete material. An effective numerical integration scheme for accurately assembling the contribution to the weak form on both sides of the discontinuity is introduced. The effectiveness of the proposed method has been assessed by simulating several well-known experimental tests. It is concluded that the numerical method can successfully capture the crack paths and accurately predict the fracture behavior of concrete structures. The influence of mode-II parameters on the mixed-mode fracture behavior is further investigated to better determine these parameters.

  3. Reactive polymer coatings: A robust platform towards sophisticated surface engineering for biotechnology

    Science.gov (United States)

    Chen, Hsien-Yeh

    Functionalized poly(p-xylylenes) or so-called reactive polymers can be synthesized via chemical vapor deposition (CVD) polymerization. The resulting ultra-thin coatings are pinhole-free and can be conformally deposited to a wide range of substrates and materials. More importantly, the equipped functional groups can served as anchoring sites for tailoring the surface properties, making these reactive coatings a robust platform that can deal with sophisticated challenges faced in biointerfaces. In this work presented herein, surface coatings presenting various functional groups were prepared by CVD process. Such surfaces include aldehyde-functionalized coating to precisely immobilize saccharide molecules onto well-defined areas and alkyne-functionalized coating to click azide-modified molecules via Huisgen 1,3-dipolar cycloaddition reaction. Moreover, CVD copolymerization has been conducted to prepare multifunctional coatings and their specific functions were demonstrated by the immobilization of biotin and NHS-ester molecules. By using a photodefinable coating, polyethylene oxides were immobilized onto a wide range of substrates through photo-immobilization. Spatially controlled protein resistant properties were characterized by selective adsorption of fibrinogen and bovine serum albumin as model systems. Alternatively, surface initiator coatings were used for polymer graftings of polyethylene glycol) methyl ether methacrylate, and the resultant protein- and cell- resistant properties were characterized by adsorption of kinesin motor proteins, fibrinogen, and murine fibroblasts (NIH3T3). Accessibility of reactive coatings within confined microgeometries was systematically studied, and the preparation of homogeneous polymer thin films within the inner surface of microchannels was demonstrated. Moreover, these advanced coatings were applied to develop a dry adhesion process for microfluidic devices. This process provides (i) excellent bonding strength, (ii) extended

  4. Early Patient Access to Medicines: Health Technology Assessment Bodies Need to Catch Up with New Marketing Authorization Methods.

    Science.gov (United States)

    Leyens, Lada; Brand, Angela

    National and international medicines agencies have developed innovative methods to expedite promising new medicines to the market and facilitate early patient access. Some of these approval pathways are the conditional approval and the adaptive pathways by the European Medicines Agency (EMA); the Promising Innovative Medicine (PIM) designation and the Early Access to Medicines Scheme (EAMS) by the Medicines and Healthcare Products Regulatory Agency (MHRA), as well as the Fast Track, Breakthrough or Accelerated Approval methods by the Food and Drug Administration (FDA). However, at least in Europe, these methods cannot achieve the goal of improving timely access for patients to new medicines on their own; the reimbursement process also has to become adaptive and flexible. In the past 2 years, the effective access (national patient access) to newly approved oncology drugs ranged from 1 to 30 months, with an extremely high variability between European countries. The goal of early patient access in Europe can only be achieved if the national health technology assessment bodies, such as NICE (ENG), HAS (FR), G-BA (DE) or AIFA (IT), provide harmonized, transparent, flexible, conditional and adaptive methods that adopt the level of evidence accepted by the medicines agencies. The efforts from medicines agencies are welcome but will be in vain if health technology assessments do not follow with similar initiatives, and the European 'postcode' lottery will continue. © 2016 S. Karger AG, Basel.

  5. The evaluation of radiologic methods for access guidance in percutaneous nephrolithotomy: a systematic review of the literature.

    Science.gov (United States)

    Breda, Alberto; Territo, Angelo; Scoffone, Cesare; Seitz, Christian; Knoll, Thomas; Herrmann, Thomas; Brehmer, Mariannhe; Osther, Palle J S; Liatsikos, Evangelos

    2017-11-12

    Percutaneous nephrolithotomy (PNL) is the treatment of choice for larger and complex renal calculi. First step in performing PNL is to obtain access to the renal cavity using either fluoroscopy or ultrasound (US) guidance or a combination of both. Which guiding method to choose is controversial? A systematic review of the literature was performed comparing image guidance modalities for obtaining access in PNL. Evidence acquisition and synthesis: A PubMed, Scopus and Cochrane search for peer-reviewed studies was performed using the keywords "ultrasound" AND "fluoroscopy" AND "Percutaneous nephrolithotomy". Eligible articles were reviewed according to PRISMA criteria. Two hundred and forty records were identified using the keywords. Of these twelve studies were considered relevant. US guidance seems to be associated with a slightly lower complication rate, which may be related to fewer puncture attempts needed for obtaining access and to better peri-renal organ visualization. On the other hand, US-guidance alone needs the adjunct of fluoroscopy in a significant number of cases for achieving access. Stone free rate (SFR) was comparable between groups. Using US for renal access unequivocally reduces radiation exposure. Current evidence indicates that both fluoroscopy and US guidance may be successfully used for obtaining percutaneous renal access. Combining the image-guiding modalities - US and fluoroscopy - seems to increase outcome in PNL both with regard to success in achieving access and reducing complications. Furthermore, including US in the access strategy of PNL reduces radiation exposure to surgeon and staff as well as patients.

  6. A spectral nudging method for the ACCESS1.3 atmospheric model

    Science.gov (United States)

    Uhe, P.; Thatcher, M.

    2015-06-01

    A convolution-based method of spectral nudging of atmospheric fields is developed in the Australian Community Climate and Earth Systems Simulator (ACCESS) version 1.3 which uses the UK Met Office Unified Model version 7.3 as its atmospheric component. The use of convolutions allow for flexibility in application to different atmospheric grids. An approximation using one-dimensional convolutions is applied, improving the time taken by the nudging scheme by 10-30 times compared with a version using a two-dimensional convolution, without measurably degrading its performance. Care needs to be taken in the order of the convolutions and the frequency of nudging to obtain the best outcome. The spectral nudging scheme is benchmarked against a Newtonian relaxation method, nudging winds and air temperature towards ERA-Interim reanalyses. We find that the convolution approach can produce results that are competitive with Newtonian relaxation in both the effectiveness and efficiency of the scheme, while giving the added flexibility of choosing which length scales to nudge.

  7. A spectral nudging method for the ACCESS1.3 atmospheric model

    Directory of Open Access Journals (Sweden)

    P. Uhe

    2015-06-01

    Full Text Available A convolution-based method of spectral nudging of atmospheric fields is developed in the Australian Community Climate and Earth Systems Simulator (ACCESS version 1.3 which uses the UK Met Office Unified Model version 7.3 as its atmospheric component. The use of convolutions allow for flexibility in application to different atmospheric grids. An approximation using one-dimensional convolutions is applied, improving the time taken by the nudging scheme by 10–30 times compared with a version using a two-dimensional convolution, without measurably degrading its performance. Care needs to be taken in the order of the convolutions and the frequency of nudging to obtain the best outcome. The spectral nudging scheme is benchmarked against a Newtonian relaxation method, nudging winds and air temperature towards ERA-Interim reanalyses. We find that the convolution approach can produce results that are competitive with Newtonian relaxation in both the effectiveness and efficiency of the scheme, while giving the added flexibility of choosing which length scales to nudge.

  8. Access to Money and Relation to Women's Use of Family Planning Methods Among Young Married Women in Rural India.

    Science.gov (United States)

    Reed, Elizabeth; Donta, Balaiah; Dasgupta, Anindita; Ghule, Mohan; Battala, Madhusudana; Nair, Saritha; Silverman, Jay; Jadhav, Arun; Palaye, Prajakta; Saggurti, Niranjan; Raj, Anita

    2016-06-01

    Objectives The social positioning (i.e. social status and autonomy) of women in the household facilitates women's access to and decision-making power related to family planning (FP). Women's access to spending money, which may be an indicator of greater social positioning in the household, may also be greater among women who engage in income generating activities for their families, regardless of women's status in the household. However, in both scenarios, access to money may independently afford greater opportunity to obtain family planning services among women. This study seeks to assess whether access to money is associated with FP outcomes independently of women's social positioning in their households. Methods Using survey data from married couples in rural Maharashtra, India (n = 855), crude and adjusted regression was used to assess women's access to their own spending money in relation to past 3 month use of condoms and other forms of contraceptives (pills, injectables, intrauterine device). Results Access to money (59 %) was associated with condom and other contraceptive use (AORs ranged 1.5-1.8). These findings remained significant after adjusting for women's FP decision-making power in the household and mobility to seek FP services. Conclusion While preliminary, findings suggest that access to money may increase women's ability to obtain FP methods, even in contexts where social norms to support women's power in FP decision-making may not be readily adopted.

  9. Comparing Accessibility Auditing Methods for Ebooks: Crowdsourced, Functionality-Led Versus Web Content Methodologies.

    Science.gov (United States)

    James, Abi; Draffan, E A; Wald, Mike

    2017-01-01

    This paper presents a gap analysis between crowdsourced functional accessibility evaluations of ebooks conducted by non-experts and the technical accessibility standards employed by developers. It also illustrates how combining these approaches can provide more appropriate information for a wider group of users with print impairments.

  10. Fire Source Accessibility of Water Mist Fire Suppression Improvement through Flow Method Control

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Jun Ho; Kim, Hyeong Taek; Kim, Yun Jung; Park, Mun Hee [KHNP CRI, Daejeon (Korea, Republic of)

    2013-10-15

    Recently, nuclear power plants set CO{sub 2} fire suppression system. However it is hard to establish and to maintain and it also has difficulties performing function test. Therefore, it needs to develop a new fire suppression system to replace the existing CO{sub 2} fire suppression systems in nuclear power plant. In fact, already, there exist alternatives - gas fire suppression system or clean fire extinguishing agent, but it is hard to apply because it requires a highly complicated plan. However, water mist fire suppression system which has both water system and gas system uses small amount of water and droplet, so it is excellent at oxygen displacement and more suitable for nuclear power plant because it can avoid second damage caused by fire fighting water. This paper explains about enclosure effect of water mist fire suppression. And it suggests a study direction about water mist fire source approach improvement and enclosure effect improvement, using flow method control of ventilation system. Water mist fire suppression can be influenced by various variable. And flow and direction of ventilation system are important variable. Expectations of the plan for more fire source ventilation system is as in the following. It enhances enclosure effects of water mists, so it improves extinguish performance. Also the same effect as a inert gas injection causes can be achieved. Lastly, it is considered that combustible accessibility of water mists will increase because of descending air currents.

  11. Spatial Accessibility of Primary Care in England: A Cross-Sectional Study Using a Floating Catchment Area Method.

    Science.gov (United States)

    Bauer, Jan; Müller, Ruth; Brüggmann, Dörthe; Groneberg, David A

    2017-07-07

    To analyze the general practitioners (GPs) with regard to the degree of urbanization, social deprivation, general health, and disability. Small area population data and GP practice data in England. We used a floating catchment area method to measure spatial GP accessibility with regard to the degree of urbanization, social deprivation, general health, and disability. Data were collected from the Office for National Statistics and the general practice census and analyzed using a geographic information system. In all, 25.8 percent of the population in England lived in areas with a significant low GP accessibility (mean z-score: -4.2); 27.6 percent lived in areas with a significant high GP accessibility (mean z-score: 7.7); 97.8 percent of high GP accessibility areas represented urban areas, and 31.1 percent of low GP accessibility areas represented rural areas (correlation of accessibility and urbanity: r = 0.59; psocial deprivation was present (r = -0.19; paccessibility throughout England. However, socially deprived areas did not have poorer spatial access to GPs. © Health Research and Educational Trust.

  12. The musicality of non-musicians: an index for assessing musical sophistication in the general population.

    Directory of Open Access Journals (Sweden)

    Daniel Müllensiefen

    Full Text Available Musical skills and expertise vary greatly in Western societies. Individuals can differ in their repertoire of musical behaviours as well as in the level of skill they display for any single musical behaviour. The types of musical behaviours we refer to here are broad, ranging from performance on an instrument and listening expertise, to the ability to employ music in functional settings or to communicate about music. In this paper, we first describe the concept of 'musical sophistication' which can be used to describe the multi-faceted nature of musical expertise. Next, we develop a novel measurement instrument, the Goldsmiths Musical Sophistication Index (Gold-MSI to assess self-reported musical skills and behaviours on multiple dimensions in the general population using a large Internet sample (n = 147,636. Thirdly, we report results from several lab studies, demonstrating that the Gold-MSI possesses good psychometric properties, and that self-reported musical sophistication is associated with performance on two listening tasks. Finally, we identify occupation, occupational status, age, gender, and wealth as the main socio-demographic factors associated with musical sophistication. Results are discussed in terms of theoretical accounts of implicit and statistical music learning and with regard to social conditions of sophisticated musical engagement.

  13. Moral foundations and political attitudes: The moderating role of political sophistication.

    Science.gov (United States)

    Milesi, Patrizia

    2016-08-01

    Political attitudes can be associated with moral concerns. This research investigated whether people's level of political sophistication moderates this association. Based on the Moral Foundations Theory, this article examined whether political sophistication moderates the extent to which reliance on moral foundations, as categories of moral concerns, predicts judgements about policy positions. With this aim, two studies examined four policy positions shown by previous research to be best predicted by the endorsement of Sanctity, that is, the category of moral concerns focused on the preservation of physical and spiritual purity. The results showed that reliance on Sanctity predicted political sophisticates' judgements, as opposed to those of unsophisticates, on policy positions dealing with equal rights for same-sex and unmarried couples and with euthanasia. Political sophistication also interacted with Fairness endorsement, which includes moral concerns for equal treatment of everybody and reciprocity, in predicting judgements about equal rights for unmarried couples, and interacted with reliance on Authority, which includes moral concerns for obedience and respect for traditional authorities, in predicting opposition to stem cell research. Those findings suggest that, at least for these particular issues, endorsement of moral foundations can be associated with political attitudes more strongly among sophisticates than unsophisticates. © 2015 International Union of Psychological Science.

  14. Reading wild minds: A computational assay of Theory of Mind sophistication across seven primate species.

    Directory of Open Access Journals (Sweden)

    Marie Devaine

    2017-11-01

    Full Text Available Theory of Mind (ToM, i.e. the ability to understand others' mental states, endows humans with highly adaptive social skills such as teaching or deceiving. Candidate evolutionary explanations have been proposed for the unique sophistication of human ToM among primates. For example, the Machiavellian intelligence hypothesis states that the increasing complexity of social networks may have induced a demand for sophisticated ToM. This type of scenario ignores neurocognitive constraints that may eventually be crucial limiting factors for ToM evolution. In contradistinction, the cognitive scaffolding hypothesis asserts that a species' opportunity to develop sophisticated ToM is mostly determined by its general cognitive capacity (on which ToM is scaffolded. However, the actual relationships between ToM sophistication and either brain volume (a proxy for general cognitive capacity or social group size (a proxy for social network complexity are unclear. Here, we let 39 individuals sampled from seven non-human primate species (lemurs, macaques, mangabeys, orangutans, gorillas and chimpanzees engage in simple dyadic games against artificial ToM players (via a familiar human caregiver. Using computational analyses of primates' choice sequences, we found that the probability of exhibiting a ToM-compatible learning style is mainly driven by species' brain volume (rather than by social group size. Moreover, primates' social cognitive sophistication culminates in a precursor form of ToM, which still falls short of human fully-developed ToM abilities.

  15. The musicality of non-musicians: an index for assessing musical sophistication in the general population.

    Science.gov (United States)

    Müllensiefen, Daniel; Gingras, Bruno; Musil, Jason; Stewart, Lauren

    2014-01-01

    Musical skills and expertise vary greatly in Western societies. Individuals can differ in their repertoire of musical behaviours as well as in the level of skill they display for any single musical behaviour. The types of musical behaviours we refer to here are broad, ranging from performance on an instrument and listening expertise, to the ability to employ music in functional settings or to communicate about music. In this paper, we first describe the concept of 'musical sophistication' which can be used to describe the multi-faceted nature of musical expertise. Next, we develop a novel measurement instrument, the Goldsmiths Musical Sophistication Index (Gold-MSI) to assess self-reported musical skills and behaviours on multiple dimensions in the general population using a large Internet sample (n = 147,636). Thirdly, we report results from several lab studies, demonstrating that the Gold-MSI possesses good psychometric properties, and that self-reported musical sophistication is associated with performance on two listening tasks. Finally, we identify occupation, occupational status, age, gender, and wealth as the main socio-demographic factors associated with musical sophistication. Results are discussed in terms of theoretical accounts of implicit and statistical music learning and with regard to social conditions of sophisticated musical engagement.

  16. Health care access for rural youth on equal terms? A mixed methods study protocol in northern Sweden.

    Science.gov (United States)

    Goicolea, Isabel; Carson, Dean; San Sebastian, Miguel; Christianson, Monica; Wiklund, Maria; Hurtig, Anna-Karin

    2018-01-11

    The purpose of this paper is to propose a protocol for researching the impact of rural youth health service strategies on health care access. There has been no published comprehensive assessment of the effectiveness of youth health strategies in rural areas, and there is no clearly articulated model of how such assessments might be conducted. The protocol described here aims to gather information to; i) Assess rural youth access to health care according to their needs, ii) Identify and understand the strategies developed in rural areas to promote youth access to health care, and iii) Propose actions for further improvement. The protocol is described with particular reference to research being undertaken in the four northernmost counties of Sweden, which contain a widely dispersed and diverse youth population. The protocol proposes qualitative and quantitative methodologies sequentially in four phases. First, to map youth access to health care according to their health care needs, including assessing horizontal equity (equal use of health care for equivalent health needs,) and vertical equity (people with greater health needs should receive more health care than those with lesser needs). Second, a multiple case study design investigates strategies developed across the region (youth clinics, internet applications, public health programs) to improve youth access to health care. Third, qualitative comparative analysis of the 24 rural municipalities in the region identifies the best combination of conditions leading to high youth access to health care. Fourth, a concept mapping study involving rural stakeholders, care providers and youth provides recommended actions to improve rural youth access to health care. The implementation of this research protocol will contribute to 1) generating knowledge that could contribute to strengthening rural youth access to health care, as well as to 2) advancing the application of mixed methods to explore access to health care.

  17. Differential ethnic associations between maternal flexibility and play sophistication in toddlers born very low birth weight

    Science.gov (United States)

    Erickson, Sarah J.; Montague, Erica Q.; Maclean, Peggy C.; Bancroft, Mary E.; Lowe, Jean R.

    2013-01-01

    Children born very low birth weight (development of self-regulation and effective functional skills, and play serves as an important avenue of early intervention. The current study investigated associations between maternal flexibility and toddler play sophistication in Caucasian, Spanish speaking Hispanic, English speaking Hispanic, and Native American toddlers (18-22 months adjusted age) in a cross-sectional cohort of 73 toddlers born VLBW and their mothers. We found that the association between maternal flexibility and toddler play sophistication differed by ethnicity (F(3,65) = 3.34, p = .02). In particular, Spanish speaking Hispanic dyads evidenced a significant positive association between maternal flexibility and play sophistication of medium effect size. Results for Native Americans were parallel to those of Spanish speaking Hispanic dyads: the relationship between flexibility and play sophistication was positive and of small-medium effect size. Findings indicate that for Caucasians and English speaking Hispanics, flexibility evidenced a non-significant (negative and small effect size) association with toddler play sophistication. Significant follow-up contrasts revealed that the associations for Caucasian and English speaking Hispanic dyads were significantly different from those of the other two ethnic groups. Results remained unchanged after adjusting for the amount of maternal language, an index of maternal engagement and stimulation; and after adjusting for birth weight, gestational age, gender, test age, cognitive ability, as well maternal age, education, and income. Our results provide preliminary evidence that ethnicity and acculturation may mediate the association between maternal interactive behavior such as flexibility and toddler developmental outcomes, as indexed by play sophistication. Addressing these association differences is particularly important in children born VLBW because interventions targeting parent interaction strategies such as

  18. User Perception of Facebook App Data Access: A Comparison of Methods and Privacy Concerns

    Directory of Open Access Journals (Sweden)

    Jennifer Golbeck

    2016-03-01

    Full Text Available Users share vast amounts of personal information online, but are they fully aware of what information they are sharing and with whom? In this paper, we focused on Facebook apps and set out to understand how concerned users are about privacy and how well-informed they are about what personal data apps can access. We found that initially, subjects were generally under-informed about what data apps could access from their profiles. After viewing additional information about these permissions, subjects’ concern about privacy on Facebook increased. Subjects’ understanding of what data apps were able to access increased, although even after receiving explicit information on the topic, many subjects still did not fully understand the extent to which apps could access their data.

  19. The Value of Multivariate Model Sophistication: An Application to pricing Dow Jones Industrial Average options

    DEFF Research Database (Denmark)

    Rombouts, Jeroen V.K.; Stentoft, Lars; Violante, Francesco

    innovation for a Laplace innovation assumption improves the pricing in a smaller way. Apart from investigating directly the value of model sophistication in terms of dollar losses, we also use the model condence set approach to statistically infer the set of models that delivers the best pricing performance.......We assess the predictive accuracy of a large number of multivariate volatility models in terms of pricing options on the Dow Jones Industrial Average. We measure the value of model sophistication in terms of dollar losses by considering a set 248 multivariate models that differer...

  20. Cognitive ability rivals the effect of political sophistication on ideological voting

    DEFF Research Database (Denmark)

    Hebbelstrup Rye Rasmussen, Stig

    2016-01-01

    This article examines the impact of cognitive ability on ideological voting. We find, using a US sample and a Danish sample, that the effect of cognitive ability rivals the effect of the traditionally strongest predicter of ideological voting political sophistication. Furthermore, the results...... are consistent with the effect of cognitive ability being partly mediated by political sophistication. Much of the effect of cognitive ability remains however and is not explained by differences in education or Openness to experience either. The implications of these results for democratic theory are discussed....

  1. The Analysis of Sophisticated Direction of Arrival Estimation Methods in Passive Coherent Locators

    National Research Council Canada - National Science Library

    Ozcetin, Ahmet

    2002-01-01

    ...). The goal is to compare the ACMA to the MUSIC, and CBF algorithms for application to PCL. The results and analysis presented here support the use of constant modulus information, where available, as an important addition to DOA estimation...

  2. Simple gambling or sophisticated gaming? : applying game analysis methods to modern video slot machine games

    OpenAIRE

    Leppäsalko, Tero

    2017-01-01

    Slot machine games have become the most popular form of gambling worldwide. In Finland, their pervasiveness in public spaces and popularity makes them one of the most common form of gaming. However, in game studies, gambling games are often regarded as borderline games due to the player’s lack of control. In this thesis I ask whether modern video slot machine games can be considered as games and if so, what similarities there are between them and contemporary video games. To find out if m...

  3. Multi-disciplinary communication networks for skin risk assessment in nursing homes with high IT sophistication.

    Science.gov (United States)

    Alexander, Gregory L; Pasupathy, Kalyan S; Steege, Linsey M; Strecker, E Bradley; Carley, Kathleen M

    2014-08-01

    The role of nursing home (NH) information technology (IT) in quality improvement has not been clearly established, and its impacts on communication between care givers and patient outcomes in these settings deserve further attention. In this research, we describe a mixed method approach to explore communication strategies used by healthcare providers for resident skin risk in NH with high IT sophistication (ITS). Sample included NH participating in the statewide survey of ITS. We incorporated rigorous observation of 8- and 12-h shifts, and focus groups to identify how NH IT and a range of synchronous and asynchronous tools are used. Social network analysis tools and qualitative analysis were used to analyze data and identify relationships between ITS dimensions and communication interactions between care providers. Two of the nine ITS dimensions (resident care-technological and administrative activities-technological) and total ITS were significantly negatively correlated with number of unique interactions. As more processes in resident care and administrative activities are supported by technology, the lower the number of observed unique interactions. Additionally, four thematic areas emerged from staff focus groups that demonstrate how important IT is to resident care in these facilities including providing resident-centered care, teamwork and collaboration, maintaining safety and quality, and using standardized information resources. Our findings in this study confirm prior research that as technology support (resident care and administrative activities) and overall ITS increases, observed interactions between staff members decrease. Conversations during staff interviews focused on how technology facilitated resident centered care through enhanced information sharing, greater virtual collaboration between team members, and improved care delivery. These results provide evidence for improving the design and implementation of IT in long term care systems to support

  4. The Role of Need for Contraception in the Evaluation of Interventions to Improve Access to Family-Planning Methods

    Science.gov (United States)

    Leon, Federico R.; Lundgren, Rebecka; Sinai, Irit; Jennings, Victoria

    2011-01-01

    A nonrandomized experiment carried out in Jharkhand, India, shows how the effects of interventions designed to improve access to family-planning methods can be erroneously regarded as trivial when contraceptive use is utilized as dependent variable, ignoring women's need for contraception. Significant effects of the intervention were observed on…

  5. GIS-based accessibility analysis- a mixed method approach to determine public primary health care demand in South Africa

    CSIR Research Space (South Africa)

    Mokgalaka, H

    2013-11-01

    Full Text Available The spatial realities and dynamics of a changing population with changing health care needs require regular and logical methods to evaluate and assist in primary health care (PHC) planning. Geographical access is an important aspect in the planning...

  6. Method for Evaluation of Outage Probability on Random Access Channel in Mobile Communication Systems

    Science.gov (United States)

    Kollár, Martin

    2012-05-01

    In order to access the cell in all mobile communication technologies a so called random-access procedure is used. For example in GSM this is represented by sending the CHANNEL REQUEST message from Mobile Station (MS) to Base Transceiver Station (BTS) which is consequently forwarded as an CHANNEL REQUIRED message to the Base Station Controller (BSC). If the BTS decodes some noise on the Random Access Channel (RACH) as random access by mistake (so- called ‘phantom RACH') then it is a question of pure coincidence which èstablishment cause’ the BTS thinks to have recognized. A typical invalid channel access request or phantom RACH is characterized by an IMMEDIATE ASSIGNMENT procedure (assignment of an SDCCH or TCH) which is not followed by sending an ESTABLISH INDICATION from MS to BTS. In this paper a mathematical model for evaluation of the Power RACH Busy Threshold (RACHBT) in order to guaranty in advance determined outage probability on RACH is described and discussed as well. It focuses on Global System for Mobile Communications (GSM) however the obtained results can be generalized on remaining mobile technologies (ie WCDMA and LTE).

  7. Assessing Epistemic Sophistication by Considering Domain-Specific Absolute and Multiplicistic Beliefs Separately

    Science.gov (United States)

    Peter, Johannes; Rosman, Tom; Mayer, Anne-Kathrin; Leichner, Nikolas; Krampen, Günter

    2016-01-01

    Background: Particularly in higher education, not only a view of science as a means of finding absolute truths (absolutism), but also a view of science as generally tentative (multiplicism) can be unsophisticated and obstructive for learning. Most quantitative epistemic belief inventories neglect this and understand epistemic sophistication as…

  8. The Relationship between Logistics Sophistication and Drivers of the Outsourcing of Logistics Activities

    Directory of Open Access Journals (Sweden)

    Peter Wanke

    2008-10-01

    Full Text Available A strong link has been established between operational excellence and the degree of sophistication of logistics organization, a function of factors such as performance monitoring, investment in Information Technology [IT] and the formalization of logistics organization, as proposed in the Bowersox, Daugherty, Dröge, Germain and Rogers (1992 Leading Edge model. At the same time, shippers have been increasingly outsourcing their logistics activities to third party providers. This paper, based on a survey with large Brazilian shippers, addresses a gap in the literature by investigating the relationship between dimensions of logistics organization sophistication and drivers of logistics outsourcing. To this end, the dimensions behind the logistics sophistication construct were first investigated. Results from factor analysis led to the identification of six dimensions of logistics sophistication. By means of multivariate logistical regression analyses it was possible to relate some of these dimensions, such as the formalization of the logistics organization, to certain drivers of the outsourcing of logistics activities of Brazilian shippers, such as cost savings. These results indicate the possibility of segmenting shippers according to characteristics of their logistics organization, which may be particularly useful to logistics service providers.

  9. Reacting to Neighborhood Cues?: Political Sophistication Moderates the Effect of Exposure to Immigrants

    DEFF Research Database (Denmark)

    Danckert, Bolette; Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    2017-01-01

    is founded on politically sophisticated individuals having a greater comprehension of news and other mass-mediated sources, which makes them less likely to rely on neighborhood cues as sources of information relevant for political attitudes. Based on a unique panel data set with fine-grained information...

  10. Sophistic Ethics in the Technical Writing Classroom: Teaching "Nomos," Deliberation, and Action.

    Science.gov (United States)

    Scott, J. Blake

    1995-01-01

    Claims that teaching ethics is particularly important to technical writing. Outlines a classical, sophistic approach to ethics based on the theories and pedagogies of Protagoras, Gorgias, and Isocrates, which emphasizes the Greek concept of "nomos," internal and external deliberation, and responsible action. Discusses problems and…

  11. Close to the Clothes : Materiality and Sophisticated Archaism in Alexander van Slobbe’s Design Practices

    NARCIS (Netherlands)

    Baronian, M.-A.

    This article looks at the work of contemporary Dutch fashion designer Alexander van Slobbe (1959) and examines how, since the 1990s, his fashion practices have consistently and consciously put forward a unique reflection on questions related to materiality, sophisticated archaism, luxury,

  12. Close to the Clothes: Materiality and Sophisticated Archaism in Alexander van Slobbe’s Design Practices

    NARCIS (Netherlands)

    Baronian, M.-A.

    This article looks at the work of contemporary Dutch fashion designer Alexander van Slobbe (1959) and examines how, since the 1990s, his fashion practices have consistently and consciously put forward a unique reflection on questions related to materiality, sophisticated archaism, luxury,

  13. Lexical Complexity Development from Dynamic Systems Theory Perspective: Lexical Density, Diversity, and Sophistication

    Directory of Open Access Journals (Sweden)

    Reza Kalantari

    2017-10-01

    Full Text Available This longitudinal case study explored Iranian EFL learners’ lexical complexity (LC through the lenses of Dynamic Systems Theory (DST. Fifty independent essays written by five intermediate to advanced female EFL learners in a TOEFL iBT preparation course over six months constituted the corpus of this study. Three Coh-Metrix indices (Graesser, McNamara, Louwerse, & Cai, 2004; McNamara & Graesser, 2012, three Lexical Complexity Analyzer indices (Lu, 2010, 2012; Lu & Ai, 2011, and four Vocabprofile indices (Cobb, 2000 were selected to measure different dimensions of LC. Results of repeated measures analysis of variance (RM ANOVA indicated an improvement with regard to only lexical sophistication. Positive and significant relationships were found between time and mean values in Academic Word List and Beyond-2000 as indicators of lexical sophistication. The remaining seven indices of LC, falling short of significance, tended to flatten over the course of this writing program. Correlation analyses among LC indices indicated that lexical density enjoyed positive correlations with lexical sophistication. However, lexical diversity revealed no significant correlations with both lexical density and lexical sophistication. This study suggests that DST perspective specifies a viable foundation for analyzing lexical complexity

  14. Does a more sophisticated storm erosion model improve probabilistic erosion estimates?

    NARCIS (Netherlands)

    Ranasinghe, R.W.M.R.J.B.; Callaghan, D.; Roelvink, D.

    2013-01-01

    The dependency between the accuracy/uncertainty of storm erosion exceedance estimates obtained via a probabilistic model and the level of sophistication of the structural function (storm erosion model) embedded in the probabilistic model is assessed via the application of Callaghan et al.'s (2008)

  15. The evaluation of radiologic methods for access guidance in percutaneous nephrolithotomy

    DEFF Research Database (Denmark)

    Breda, Alberto; Territo, Angelo; Scoffone, Cesare

    2018-01-01

    is controversial? A systematic review of the literature was performed comparing image guidance modalities for obtaining access in PNL. Evidence acquisition and synthesis: A PubMed, Scopus and Cochrane search for peer-reviewed studies was performed using the keywords "ultrasound" AND "fluoroscopy" AND "Percutaneous...

  16. Videophone Technology and Students with Deaf-Blindness: A Method for Increasing Access and Communication

    Science.gov (United States)

    Emerson, Judith; Bishop, John

    2012-01-01

    Introduction: Seeing the Possibilities with Videophone Technology began as research project funded by the National Center for Technology Innovation. The project implemented a face-to-face social networking program for students with deaf-blindness to investigate the potential for increasing access and communication using videophone technology.…

  17. Development of improved methods for remote access of DIII-D data and data analysis

    International Nuclear Information System (INIS)

    Greene, K.L.; McHarg, B.B. Jr.

    1997-11-01

    The DIII-D tokamak is a national fusion research facility. There is an increasing need to access data from remote sites in order to facilitate data analysis by collaborative researchers at remote locations, both nationally and internationally. In the past, this has usually been done by remotely logging into computers at the DIII-D site. With the advent of faster networking and powerful computers at remote sites, it is becoming possible to access and analyze data from anywhere in the world as if the remote user were actually at the DIII-D site. The general mechanism for accessing DIII-D data has always been via the PTDATA subroutine. Substantial enhancements are being made to that routine to make it more useful in a non-local environment. In particular, a caching mechanism is being built into PTDATA to make network data access more efficient. Studies are also being made of using Distributed File System (DFS) disk storage in a Distributed Computing Environment (DCE). A data server has been created that will migrate, on request, shot data from the DIII-D environment into the DFS environment

  18. Selective Access to Heterocyclic Sulfonamides and Sulfonyl Fluorides via a Parallel Medicinal Chemistry Enabled Method.

    Science.gov (United States)

    Tucker, Joseph W; Chenard, Lois; Young, Joseph M

    2015-11-09

    A sulfur-functionalized aminoacrolein derivative is used for the efficient and selective synthesis of heterocyclic sulfonyl chlorides, sulfonyl fluorides, and sulfonamides. The development of a 3-step parallel medicinal chemistry (PMC) protocol for the synthesis of pyrazole-4-sulfonamides effectively demonstrates the utility of this reagent. This reactivity was expanded to provide rapid access to other heterocyclic sulfonyl fluorides, including pyrimidines and pyridines, whose corresponding sulfonyl chlorides lack suitable chemical stability.

  19. Water accessibility in a membrane-inserting peptide comparing Overhauser DNP and pulse EPR methods

    Energy Technology Data Exchange (ETDEWEB)

    Segawa, Takuya F., E-mail: takuya.segawa@alumni.ethz.ch; Doppelbauer, Maximilian; Garbuio, Luca; Doll, Andrin; Polyhach, Yevhen O.; Jeschke, Gunnar, E-mail: gjeschke@ethz.ch [Laboratory of Physical Chemistry, ETH Zurich, Vladimir-Prelog-Weg 2, CH-8093 Zurich (Switzerland)

    2016-05-21

    Water accessibility is a key parameter for the understanding of the structure of biomolecules, especially membrane proteins. Several experimental techniques based on the combination of electron paramagnetic resonance (EPR) spectroscopy with site-directed spin labeling are currently available. Among those, we compare relaxation time measurements and electron spin echo envelope modulation (ESEEM) experiments using pulse EPR with Overhauser dynamic nuclear polarization (DNP) at X-band frequency and a magnetic field of 0.33 T. Overhauser DNP transfers the electron spin polarization to nuclear spins via cross-relaxation. The change in the intensity of the {sup 1}H NMR spectrum of H{sub 2}O at a Larmor frequency of 14 MHz under a continuous-wave microwave irradiation of the nitroxide spin label contains information on the water accessibility of the labeled site. As a model system for a membrane protein, we use the hydrophobic α-helical peptide WALP23 in unilamellar liposomes of DOPC. Water accessibility measurements with all techniques are conducted for eight peptides with different spin label positions and low radical concentrations (10–20 μM). Consistently in all experiments, the water accessibility appears to be very low, even for labels positioned near the end of the helix. The best profile is obtained by Overhauser DNP, which is the only technique that succeeds in discriminating neighboring positions in WALP23. Since the concentration of the spin-labeled peptides varied, we normalized the DNP parameter ϵ, being the relative change of the NMR intensity, by the electron spin concentration, which was determined from a continuous-wave EPR spectrum.

  20. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks.

    Science.gov (United States)

    Lei, Chunyang; Bie, Hongxia; Fang, Gengfa; Zhang, Xuekun

    2015-12-03

    Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT), Machine-to-Machine (M2M) communications, Vehicular-to-Vehicular (V2V) communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  1. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chunyang Lei

    2015-12-01

    Full Text Available Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT, Machine-to-Machine (M2M communications, Vehicular-to-Vehicular (V2V communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  2. Comparison between statistical and optimization methods in accessing unmixing of spectrally similar materials

    CSIR Research Space (South Africa)

    Debba, Pravesh

    2010-11-01

    Full Text Available This paper reports on the results from ordinary least squares and ridge regression as statistical methods, and is compared to numerical optimization methods such as the stochastic method for global optimization, simulated annealing, particle swarm...

  3. Sophisticated Fowl: The Complex Behaviour and Cognitive Skills of Chickens and Red Junglefowl

    Directory of Open Access Journals (Sweden)

    Laura Garnham

    2018-01-01

    Full Text Available The world’s most numerous bird, the domestic chicken, and their wild ancestor, the red junglefowl, have long been used as model species for animal behaviour research. Recently, this research has advanced our understanding of the social behaviour, personality, and cognition of fowl, and demonstrated their sophisticated behaviour and cognitive skills. Here, we overview some of this research, starting with describing research investigating the well-developed senses of fowl, before presenting how socially and cognitively complex they can be. The realisation that domestic chickens, our most abundant production animal, are behaviourally and cognitively sophisticated should encourage an increase in general appraise and fascination towards them. In turn, this should inspire increased use of them as both research and hobby animals, as well as improvements in their unfortunately often poor welfare.

  4. The relation between maturity and sophistication shall be properly dealt with in nuclear power development

    International Nuclear Information System (INIS)

    Li Yongjiang

    2009-01-01

    The paper analyses the advantages and disadvantages of the second generation improved technologies and third generation technologies mainly developed in China in terms of safety and economy. The paper also discusses the maturity of the second generation improved technologies and the sophistication of the third generation technologies respectively. Meanwhile, the paper proposes that the advantage and disadvantage of second generation improved technologies and third generation technologies should be carefully taken into consideration and the relationship between the maturity and sophistication should be properly dealt with in the current stage. A two-step strategy shall be taken as a solution to solve the problem of insufficient capacity of nuclear power, trace and develop the third generation technologies, so as to ensure the sound and fast development of nuclear power. (authors)

  5. Financial Sophistication and the Distribution of the Welfare Cost of Inflation

    OpenAIRE

    Paola Boel; Gabriele Camera

    2009-01-01

    The welfare cost of anticipated inflation is quantified in a calibrated model of the U.S. economy that exhibits tractable equilibrium dispersion in wealth and earnings. Inflation does not generate large losses in societal welfare, yet its impact varies noticeably across segments of society depending also on the financial sophistication of the economy. If money is the only asset, then inflation hurts mostly the wealthier and more productive agents, while those poorer and less productive may ev...

  6. Putin’s Russia: Russian Mentality and Sophisticated Imperialism in Military Policies

    OpenAIRE

    Szénási, Lieutenant-Colonel Endre

    2016-01-01

    According to my experiences, the Western world hopelessly fails to understand Russian mentality, or misinterprets it. During my analysis of the Russian way of thinking I devoted special attention to the examination of military mentality. I have connected the issue of the Russian way of thinking to the contemporary imperial policies of Putin’s Russia.  I have also attempted to prove the level of sophistication of both. I hope that a better understanding of both the Russian mentality and imperi...

  7. Musical Sophistication and the Effect of Complexity on Auditory Discrimination in Finnish Speakers

    Science.gov (United States)

    Dawson, Caitlin; Aalto, Daniel; Šimko, Juraj; Vainio, Martti; Tervaniemi, Mari

    2017-01-01

    Musical experiences and native language are both known to affect auditory processing. The present work aims to disentangle the influences of native language phonology and musicality on behavioral and subcortical sound feature processing in a population of musically diverse Finnish speakers as well as to investigate the specificity of enhancement from musical training. Finnish speakers are highly sensitive to duration cues since in Finnish, vowel and consonant duration determine word meaning. Using a correlational approach with a set of behavioral sound feature discrimination tasks, brainstem recordings, and a musical sophistication questionnaire, we find no evidence for an association between musical sophistication and more precise duration processing in Finnish speakers either in the auditory brainstem response or in behavioral tasks, but they do show an enhanced pitch discrimination compared to Finnish speakers with less musical experience and show greater duration modulation in a complex task. These results are consistent with a ceiling effect set for certain sound features which corresponds to the phonology of the native language, leaving an opportunity for music experience-based enhancement of sound features not explicitly encoded in the language (such as pitch, which is not explicitly encoded in Finnish). Finally, the pattern of duration modulation in more musically sophisticated Finnish speakers suggests integrated feature processing for greater efficiency in a real world musical situation. These results have implications for research into the specificity of plasticity in the auditory system as well as to the effects of interaction of specific language features with musical experiences. PMID:28450829

  8. Musical Sophistication and the Effect of Complexity on Auditory Discrimination in Finnish Speakers.

    Science.gov (United States)

    Dawson, Caitlin; Aalto, Daniel; Šimko, Juraj; Vainio, Martti; Tervaniemi, Mari

    2017-01-01

    Musical experiences and native language are both known to affect auditory processing. The present work aims to disentangle the influences of native language phonology and musicality on behavioral and subcortical sound feature processing in a population of musically diverse Finnish speakers as well as to investigate the specificity of enhancement from musical training. Finnish speakers are highly sensitive to duration cues since in Finnish, vowel and consonant duration determine word meaning. Using a correlational approach with a set of behavioral sound feature discrimination tasks, brainstem recordings, and a musical sophistication questionnaire, we find no evidence for an association between musical sophistication and more precise duration processing in Finnish speakers either in the auditory brainstem response or in behavioral tasks, but they do show an enhanced pitch discrimination compared to Finnish speakers with less musical experience and show greater duration modulation in a complex task. These results are consistent with a ceiling effect set for certain sound features which corresponds to the phonology of the native language, leaving an opportunity for music experience-based enhancement of sound features not explicitly encoded in the language (such as pitch, which is not explicitly encoded in Finnish). Finally, the pattern of duration modulation in more musically sophisticated Finnish speakers suggests integrated feature processing for greater efficiency in a real world musical situation. These results have implications for research into the specificity of plasticity in the auditory system as well as to the effects of interaction of specific language features with musical experiences.

  9. Motivating and Facilitating Advancements in Space Weather Real-Time Data Availability: Factors, Data, and Access Methods

    Science.gov (United States)

    Pankratz, C. K.; Baker, D. N.; Jaynes, A. N.; Elkington, S. R.; Baltzer, T.; Sanchez, F.

    2017-12-01

    Society's growing reliance on complex and highly interconnected technological systems makes us increasingly vulnerable to the effects of space weather events - maybe more than for any other natural hazard. An extreme solar storm today could conceivably impact hundreds of the more than 1400 operating Earth satellites. Such an extreme storm could cause collapse of the electrical grid on continental scales. The effects on navigation, communication, and remote sensing of our home planet could be devastating to our social functioning. Thus, it is imperative that the scientific community address the question of just how severe events might become. At least as importantly, it is crucial that policy makers and public safety officials be informed by the facts on what might happen during extreme conditions. This requires essentially real-time alerts, warnings, and also forecasts of severe space weather events, which in turn demands measurements, models, and associated data products to be available via the most effective data discovery and access methods possible. Similarly, advancement in the fundamental scientific understanding of space weather processes is also vital, requiring that researchers have convenient and effective access to a wide variety of data sets and models from multiple sources. The space weather research community, as with many scientific communities, must access data from dispersed and often uncoordinated data repositories to acquire the data necessary for the analysis and modeling efforts that advance our understanding of solar influences and space physics on the Earth's environment. The Laboratory for Atmospheric and Space Physics (LASP), as a leading institution in both producing data products and advancing the state of scientific understanding of space weather processes, is well positioned to address many of these issues. In this presentation, we will outline the motivating factors for effective space weather data access, summarize the various data

  10. Perceived barriers in accessing dental care among patients attending dental institute using decision-making trial and evaluation laboratory method

    Directory of Open Access Journals (Sweden)

    Ravneet Malhi

    2015-01-01

    Full Text Available Introduction: Utilization of dental service is a concept of expressing the extent of interaction between the service provider and the people for whom it is indented. However, one of the major issues in social welfare is the equitable provision of these services to the population. Aim: To determine the perceived barriers affecting access to the dental services in the dental institute. Materials and Methods: A cross-sectional survey was conducted in the dental institute during the month of February in the year 2014 using decision-making trial and evaluation laboratory (DEMATEL method. The study sample included the 364 subjects. The required data were collected using a specially designed and pretested questionnaire. The data were analyzed using SPSS 18.0 (SPSS Inc., Chicago, IL, USA and MATLAB 7.6.0. The mean, standard deviations were used to describe the data, and inferential statistics included one-way ANOVA and DEMATEL. Results: The five determinants of cost, inconvenience, fear, organization, and patient-dentist relationship were determined as barriers to access dental services. Based on subjects′ responses to the questions, the cost (54.75% agreed or strongly agreed was identified as the most important factor affecting the access to dental health care followed by dentist-patient relationship (48.57%, inconvenience (36.55%, fear (23.70%, and organization (14.02%. The difference was found to be statistically significant (P = 0.0001. When the hierarchy of the affecting and affected factors was calculated, based on the factor analysis by using DEMATEL method, the cost (R−J = 0.16 and organization (R−J = 1.15, were certain affecting determinant which influenced the access to dental services and inconvenience. Conclusion: The major barriers to oral health care utilization among our patients were cost, fear, and organization. Policymakers, administrators, and insurance organizations have a major role. Hence, the policies should be fair and

  11. Method of preliminary localization of the iris in biometric access control systems

    Science.gov (United States)

    Minacova, N.; Petrov, I.

    2015-10-01

    This paper presents a method of preliminary localization of the iris, based on the stable brightness features of the iris in images of the eye. In tests on images of eyes from publicly available databases method showed good accuracy and speed compared to existing methods preliminary localization.

  12. Do organizations adopt sophisticated capital budgeting practices to deal with uncertainty in the investment decision? : A research note

    NARCIS (Netherlands)

    Verbeeten, Frank H M

    This study examines the impact of uncertainty on the sophistication of capital budgeting practices. While the theoretical applications of sophisticated capital budgeting practices (defined as the use of real option reasoning and/or game theory decision rules) have been well documented, empirical

  13. "SOCRATICS" AS ADDRESSES OF ISOCRATES’ EPIDEICTIC SPEECHES (Against the Sophists, Encomium of Helen, Busiris

    Directory of Open Access Journals (Sweden)

    Anna Usacheva

    2012-06-01

    Full Text Available This article analyses the three epideictic orations of Isocrates which are in themselves a precious testimony of the quality of intellectual life at the close of the fourth century before Christ. To this period belong also the Socratics who are generally seen as an important link between Socrates and Plato. The author of this article proposes a more productive approach to the study of Antisthenes, Euclid of Megara and other so-called Socratics, revealing them not as independent thinkers but rather as adherents of the sophistic school and also as teachers, thereby, including them among those who took part in the educative activity of their time

  14. Low Level RF Including a Sophisticated Phase Control System for CTF3

    CERN Document Server

    Mourier, J; Nonglaton, J M; Syratchev, I V; Tanner, L

    2004-01-01

    CTF3 (CLIC Test Facility 3), currently under construction at CERN, is a test facility designed to demonstrate the key feasibility issues of the CLIC (Compact LInear Collider) two-beam scheme. When completed, this facility will consist of a 150 MeV linac followed by two rings for bunch-interleaving, and a test stand where 30 GHz power will be generated. In this paper, the work that has been carried out on the linac's low power RF system is described. This includes, in particular, a sophisticated phase control system for the RF pulse compressor to produce a flat-top rectangular pulse over 1.4 µs.

  15. A development and integration of the concentration database for relative method, k0 method and absolute method in instrumental neutron activation analysis using Microsoft Access

    International Nuclear Information System (INIS)

    Hoh Siew Sin

    2012-01-01

    Instrumental Neutron Activation Analysis (INAA) is offen used to determine and calculate the concentration of an element in the sample by the National University of Malaysia, especially students of Nuclear Science Program. The lack of a database service leads consumers to take longer time to calculate the concentration of an element in the sample. This is because we are more dependent on software that is developed by foreign researchers which are costly. To overcome this problem, a study has been carried out to build an INAA database software. The objective of this study is to build a database software that help the users of INAA in Relative Method and Absolute Method for calculating the element concentration in the sample using Microsoft Excel 2010 and Microsoft Access 2010. The study also integrates k 0 data, k 0 Concent and k 0 -Westcott to execute and complete the system. After the integration, a study was conducted to test the effectiveness of the database software by comparing the concentrations between the experiments and in the database. Triple Bare Monitor Zr-Au and Cr-Mo-Au were used in Abs-INAA as monitor to determine the thermal to epithermal neutron flux ratio (f). Calculations involved in determining the concentration are the net peak area (N p ), the measurement time (t m ), the irradiation time (t irr ), k-factor (k), thermal to epithermal neutron flux ratio (f), the parameters of the neutron flux distribution epithermal (α) and detection efficiency (ε p ). For Com-INAA databases, reference material IAEA-375 Soil was used to calculate the concentration of elements in the sample. CRM, SRM are also used in this database. After the INAA database integration, a verification process was to examine the effectiveness of the Abs-INAA was carried out by comparing the sample concentration between the in database and the experiment. The result of the experimental concentration value of INAA database software performed with high accuracy and precision. ICC

  16. A generic method for assignment of reliability scores applied to solvent accessibility predictions

    DEFF Research Database (Denmark)

    Petersen, Bent; Petersen, Thomas Nordahl; Andersen, Pernille

    2009-01-01

    : The performance of the neural networks was evaluated on a commonly used set of sequences known as the CB513 set. An overall Pearson's correlation coefficient of 0.72 was obtained, which is comparable to the performance of the currently best public available method, Real-SPINE. Both methods associate a reliability...... comparing the Pearson's correlation coefficient for the upper 20% of predictions sorted according to reliability. For this subset, values of 0.79 and 0.74 are obtained using our and the compared method, respectively. This tendency is true for any selected subset....

  17. A Visualization Technique for Accessing Solution Pool in Interactive Methods of Multiobjective Optimization

    OpenAIRE

    Filatovas, Ernestas; Podkopaev, Dmitry; Kurasova, Olga

    2015-01-01

    Interactive methods of multiobjective optimization repetitively derive Pareto optimal solutions based on decision maker’s preference information and present the obtained solutions for his/her consideration. Some interactive methods save the obtained solutions into a solution pool and, at each iteration, allow the decision maker considering any of solutions obtained earlier. This feature contributes to the flexibility of exploring the Pareto optimal set and learning about the op...

  18. REVIEW OF METHODS FOR THE SURVEILLANCE AND ACCESS CONTROL USING THE THERMAL IMAGING SYSTEM

    Directory of Open Access Journals (Sweden)

    Mate Krišto

    2016-12-01

    Full Text Available This paper presents methods for human detection for application in the field of national security in the context of state border surveillance. Except in the context of state border security, the presented methods can be applied to monitor other protected object and infrastructure such as ports and airports, power plants, water supply systems, oil pipelines, etc. Presented methods are based on use of thermal imaging systems for the human detection, recognition and identification. In addition to methods for the detection of persons, are presented and methods for face recognition and identification of the person. The use of such systems has special significance in the context of national security in the domain of timely detection of illegal crossing of state border or illegal movement near buildings, which are of special importance for national security such as traffic infrastructure facilities, power plants, military bases, especially in mountain or forests areas. In this context, thermal imaging has significant advantages over the optical camera surveillance systems because thermal imaging is robust to weather conditions and due to such an infrared thermal system can successfully applied in any weather conditions, or the periods of the day. Featured are procedures that has human detection results as well as a brief survey of specific implementation in terms of the use of infrared thermal imagers mounted on autonomous vehicles (AV and unmanned aerial vehicles (UAV. In addition to the above in this paper are described techniques and methods of face detection and human identification based on thermal image (thermogram.

  19. Accessing memory

    Science.gov (United States)

    Yoon, Doe Hyun; Muralimanohar, Naveen; Chang, Jichuan; Ranganthan, Parthasarathy

    2017-09-26

    A disclosed example method involves performing simultaneous data accesses on at least first and second independently selectable logical sub-ranks to access first data via a wide internal data bus in a memory device. The memory device includes a translation buffer chip, memory chips in independently selectable logical sub-ranks, a narrow external data bus to connect the translation buffer chip to a memory controller, and the wide internal data bus between the translation buffer chip and the memory chips. A data access is performed on only the first independently selectable logical sub-rank to access second data via the wide internal data bus. The example method also involves locating a first portion of the first data, a second portion of the first data, and the second data on the narrow external data bus during separate data transfers.

  20. A qualitative study examining methods of accessing and identifying research relevant to clinical practice among rehabilitation clinicians

    Directory of Open Access Journals (Sweden)

    Patel D

    2017-12-01

    Full Text Available Drasti Patel,1 Christine Koehmstedt,1 Rebecca Jones,1 Nathan T Coffey,1 Xinsheng Cai,2 Steven Garfinkel,2 Dahlia M Shaewitz,2 Ali A Weinstein1 1Center for Study of Chronic Illness and Disability, College of Health and Human Services, George Mason University, Fairfax, VA, 2American Institutes for Research, Washington, DC, USA Purpose: Research examining the utilization of evidence-based practice (EBP specifically among rehabilitation clinicians is limited. The objective of this study was to examine how various rehabilitative clinicians including physical therapists, occupational therapists, rehabilitation counselors, and physiatrists are gaining access to literature and whether they are able to implement the available research into practice.Methods: A total of 21 total clinicians were interviewed via telephone. Using NVivo, a qualitative analysis of the responses was performed.Results: There were similarities found with respect to the information-seeking behaviors and translation of research across the different clinician types. Lack of time was reported to be a barrier for both access to literature and implementation of research across all clinician types. The majority of clinicians who reported having difficulty with utilizing the published literature indicated that the literature was not applicable to their practice, the research was not specific enough to be put into practice, or the research found was too outdated to be relevant. In addition, having a supportive work environment aided in the search and utilization of research through providing resources central to assisting clinicians in gaining access to health information.Conclusion: Our study identified several barriers that affect EBP for rehabilitation clinicians. The findings suggest the need for researchers to ensure that their work is applicable and specific to clinical practice for implementation to occur. Keywords: health information, information behavior, knowledge utilization

  1. Systematization and sophistication of a comprehensive sensitivity analysis program. Phase 2

    International Nuclear Information System (INIS)

    Oyamada, Kiyoshi; Ikeda, Takao

    2004-02-01

    This study developed minute estimation by adopting comprehensive sensitivity analytical program for reliability of TRU waste repository concepts in a crystalline rock condition. We examined each components and groundwater scenario of geological repository and prepared systematic bases to examine the reliability from the point of comprehensiveness. Models and data are sophisticated to examine the reliability. Based on an existing TRU waste repository concepts, effects of parameters to nuclide migration were quantitatively classified. Those parameters, that will be decided quantitatively, are such as site character of natural barrier and design specification of engineered barriers. Considering the feasibility of those figures of specifications, reliability is re-examined on combinations of those parameters within a practical range. Future issues are; Comprehensive representation of hybrid geosphere model including the fractured medium and permeable matrix medium. Sophistication of tools to develop the reliable combinations of parameters. It is significant to continue this study because the disposal concepts and specification of TRU nuclides containing waste on various sites shall be determined rationally and safely through these studies. (author)

  2. A Green Media Access Method for IEEE 802.15.6 Wireless Body Area Network.

    Science.gov (United States)

    Jacob, Anil K; Jacob, Lillykutty

    2017-09-30

    It is of utmost importance to conserve battery energy to the maximum possible extent in WBAN nodes while collecting and transferring medical data. The IEEE 802.15.6 WBAN standard does not specify any method to conserve energy. This paper focuses on a method to conserve energy in IEEE 802.15.6 WBAN nodes when using CSMA/CA, while simultaneously restricting data delivery delay to the required value as specified in medical applications. The technique is to allow the nodes to sleep all the times except for receiving beacons and for transmitting data frames whenever a data frame enters an empty buffer. The energy consumed by the nodes and the average latency of data frame for periodical arrival of data are found out analytically. The analytical results are validated and also the proposed method is compared with other energy conserving schemes, using Castalia simulation studies. The proposed method shows superior performance in both device lifetime and latency of emergency medical data.

  3. Women with learning disabilities and access to cervical screening: retrospective cohort study using case control methods

    Science.gov (United States)

    Reynolds, Fiona; Stanistreet, Debbi; Elton, Peter

    2008-01-01

    Background Several studies in the UK have suggested that women with learning disabilities may be less likely to receive cervical screening tests and a previous local study in had found that GPs considered screening unnecessary for women with learning disabilities. This study set out to ascertain whether women with learning disabilities are more likely to be ceased from a cervical screening programme than women without; and to examine the reasons given for ceasing women with learning disabilities. It was carried out in Bury, Heywood-and-Middleton and Rochdale. Methods Carried out using retrospective cohort study methods, women with learning disabilities were identified by Read code; and their cervical screening records were compared with the Call-and-Recall records of women without learning disabilities in order to examine their screening histories. Analysis was carried out using case-control methods – 1:2 (women with learning disabilities: women without learning disabilities), calculating odds ratios. Results 267 women's records were compared with the records of 534 women without learning disabilities. Women with learning disabilities had an odds ratio (OR) of 0.48 (Confidence Interval (CI) 0.38 – 0.58; X2: 72.227; p.value learning disabilities. Conclusion The reasons given for ceasing and/or not screening suggest that merely being coded as having a learning disability is not the sole reason for these actions. There are training needs among smear takers regarding appropriate reasons not to screen and providing screening for women with learning disabilities. PMID:18218106

  4. National Survey on Access, Use and Promotion of Rational Use of Medicines (PNAUM: household survey component methods

    Directory of Open Access Journals (Sweden)

    Sotero Serrate Mengue

    Full Text Available ABSTRACT OBJECTIVE To describe methodological aspects of the household survey National Survey on Access, Use and Promotion of Rational Use of Medicines (PNAUM related to sampling design and implementation, the actual obtained sample, instruments and fieldwork. METHODS A cross-sectional, population-based study with probability sampling in three stages of the population living in households located in Brazilian urban areas. Fieldwork was carried out between September 2013 and February 2014. The data collection instrument included questions related to: information about households, residents and respondents; chronic diseases and medicines used; use of health services; acute diseases and events treated with drugs; use of contraceptives; use of pharmacy services; behaviors that may affect drug use; package inserts and packaging; lifestyle and health insurance. RESULTS In total, 41,433 interviews were carried out in 20,404 households and 576 urban clusters corresponding to 586 census tracts distributed in the five Brazilian regions, according to eight domains defined by age and gender. CONCLUSIONS The results of the survey may be used as a baseline for future studies aiming to assess the impact of government action on drug access and use. For local studies using a compatible method, PNAUM may serve as a reference point to evaluate variations in space and population. With a comprehensive evaluation of drug-related aspects, PNAUM is a major source of data for a variety of analyses to be carried out both at academic and government level.

  5. Women with learning disabilities and access to cervical screening: retrospective cohort study using case control methods

    Directory of Open Access Journals (Sweden)

    Stanistreet Debbi

    2008-01-01

    Full Text Available Abstract Background Several studies in the UK have suggested that women with learning disabilities may be less likely to receive cervical screening tests and a previous local study in had found that GPs considered screening unnecessary for women with learning disabilities. This study set out to ascertain whether women with learning disabilities are more likely to be ceased from a cervical screening programme than women without; and to examine the reasons given for ceasing women with learning disabilities. It was carried out in Bury, Heywood-and-Middleton and Rochdale. Methods Carried out using retrospective cohort study methods, women with learning disabilities were identified by Read code; and their cervical screening records were compared with the Call-and-Recall records of women without learning disabilities in order to examine their screening histories. Analysis was carried out using case-control methods – 1:2 (women with learning disabilities: women without learning disabilities, calculating odds ratios. Results 267 women's records were compared with the records of 534 women without learning disabilities. Women with learning disabilities had an odds ratio (OR of 0.48 (Confidence Interval (CI 0.38 – 0.58; X2: 72.227; p.value X2: 24.236; p.value X2: 286.341; p.value Conclusion The reasons given for ceasing and/or not screening suggest that merely being coded as having a learning disability is not the sole reason for these actions. There are training needs among smear takers regarding appropriate reasons not to screen and providing screening for women with learning disabilities.

  6. Information Accessibility of the Charcoal Burning Suicide Method in Mainland China.

    Science.gov (United States)

    Cheng, Qijin; Chang, Shu-Sen; Guo, Yingqi; Yip, Paul S F

    2015-01-01

    There has been a marked rise in suicide by charcoal burning (CB) in some East Asian countries but little is known about its incidence in mainland China. We examined media-reported CB suicides and the availability of online information about the method in mainland China. We extracted and analyzed data for i) the characteristics and trends of fatal and nonfatal CB suicides reported by mainland Chinese newspapers (1998-2014); ii) trends and geographic variations in online searches using keywords relating to CB suicide (2011-2014); and iii) the content of Internet search results. 109 CB suicide attempts (89 fatal and 20 nonfatal) were reported by newspapers in 13 out of the 31 provinces or provincial-level-municipalities in mainland China. There were increasing trends in the incidence of reported CB suicides and in online searches using CB-related keywords. The province-level search intensities were correlated with CB suicide rates (Spearman's correlation coefficient = 0.43 [95% confidence interval: 0.08-0.68]). Two-thirds of the web links retrieved using the search engine contained detailed information about the CB suicide method, of which 15% showed pro-suicide attitudes, and the majority (86%) did not encourage people to seek help. The incidence of CB suicide was based on newspaper reports and likely to be underestimated. Mental health and suicide prevention professionals in mainland China should be alert to the increased use of this highly lethal suicide method. Better surveillance and intervention strategies need to be developed and implemented.

  7. A Novel, Open Access Method to Assess Sleep Duration Using a Wrist-Worn Accelerometer.

    Directory of Open Access Journals (Sweden)

    Vincent T van Hees

    Full Text Available Wrist-worn accelerometers are increasingly being used for the assessment of physical activity in population studies, but little is known about their value for sleep assessment. We developed a novel method of assessing sleep duration using data from 4,094 Whitehall II Study (United Kingdom, 2012-2013 participants aged 60-83 who wore the accelerometer for 9 consecutive days, filled in a sleep log and reported sleep duration via questionnaire. Our sleep detection algorithm defined (nocturnal sleep as a period of sustained inactivity, itself detected as the absence of change in arm angle greater than 5 degrees for 5 minutes or more, during a period recorded as sleep by the participant in their sleep log. The resulting estimate of sleep duration had a moderate (but similar to previous findings agreement with questionnaire based measures for time in bed, defined as the difference between sleep onset and waking time (kappa = 0.32, 95%CI:0.29,0.34 and total sleep duration (kappa = 0.39, 0.36,0.42. This estimate was lower for time in bed for women, depressed participants, those reporting more insomnia symptoms, and on weekend days. No such group differences were found for total sleep duration. Our algorithm was validated against data from a polysomnography study on 28 persons which found a longer time window and lower angle threshold to have better sensitivity to wakefulness, while the reverse was true for sensitivity to sleep. The novelty of our method is the use of a generic algorithm that will allow comparison between studies rather than a "count" based, device specific method.

  8. Creating multithemed ecological regions for macroscale ecology: Testing a flexible, repeatable, and accessible clustering method

    Science.gov (United States)

    Cheruvelil, Kendra Spence; Yuan, Shuai; Webster, Katherine E.; Tan, Pang-Ning; Lapierre, Jean-Francois; Collins, Sarah M.; Fergus, C. Emi; Scott, Caren E.; Norton Henry, Emily; Soranno, Patricia A.; Filstrup, Christopher T.; Wagner, Tyler

    2017-01-01

    Understanding broad-scale ecological patterns and processes often involves accounting for regional-scale heterogeneity. A common way to do so is to include ecological regions in sampling schemes and empirical models. However, most existing ecological regions were developed for specific purposes, using a limited set of geospatial features and irreproducible methods. Our study purpose was to: (1) describe a method that takes advantage of recent computational advances and increased availability of regional and global data sets to create customizable and reproducible ecological regions, (2) make this algorithm available for use and modification by others studying different ecosystems, variables of interest, study extents, and macroscale ecology research questions, and (3) demonstrate the power of this approach for the research question—How well do these regions capture regional-scale variation in lake water quality? To achieve our purpose we: (1) used a spatially constrained spectral clustering algorithm that balances geospatial homogeneity and region contiguity to create ecological regions using multiple terrestrial, climatic, and freshwater geospatial data for 17 northeastern U.S. states (~1,800,000 km2); (2) identified which of the 52 geospatial features were most influential in creating the resulting 100 regions; and (3) tested the ability of these ecological regions to capture regional variation in water nutrients and clarity for ~6,000 lakes. We found that: (1) a combination of terrestrial, climatic, and freshwater geospatial features influenced region creation, suggesting that the oft-ignored freshwater landscape provides novel information on landscape variability not captured by traditionally used climate and terrestrial metrics; and (2) the delineated regions captured macroscale heterogeneity in ecosystem properties not included in region delineation—approximately 40% of the variation in total phosphorus and water clarity among lakes was at the regional

  9. All ITO-based transparent resistive switching random access memory using oxygen doping method

    International Nuclear Information System (INIS)

    Kim, Hee-Dong; Yun, Min Ju; Kim, Sungho

    2015-01-01

    Recently, transparent memory would be useful in invisible electronics. In this work, for the first time we present a feasibility of stable unipolar resistive switching (RS) characteristics with reset current of sub-micron ampere for the fully transparent ITO/oxygen-doped ITO/ITO memory capacitors, i.e., all ITO structures, produced by sputtering method, which shows a high optical transmittance of approximately 80% in the visible region as well as near ultra-violet region. In addition, in a RS test to evaluate a reliability for the proposed memory devices, we observed a stable endurance of >100 cycles and a retention time of >10 4  s at 85 °C, with a current ratio of ∼10 2 to ∼10 3 . This result indicates that this transparent memory by engineering the amount of oxygen ions within the ITO films could be a milestone for future see-through electronic devices. - Highlights: • The resistive switching characteristics of the transparent ITO/O-doped ITO/ITO RRAM cells have investigated. • All ITO-based RRAM cell is achieved using oxygen doping method. • Good endurance and long retention time were observed.

  10. Research on Quantum Authentication Methods for the Secure Access Control Among Three Elements of Cloud Computing

    Science.gov (United States)

    Dong, Yumin; Xiao, Shufen; Ma, Hongyang; Chen, Libo

    2016-12-01

    Cloud computing and big data have become the developing engine of current information technology (IT) as a result of the rapid development of IT. However, security protection has become increasingly important for cloud computing and big data, and has become a problem that must be solved to develop cloud computing. The theft of identity authentication information remains a serious threat to the security of cloud computing. In this process, attackers intrude into cloud computing services through identity authentication information, thereby threatening the security of data from multiple perspectives. Therefore, this study proposes a model for cloud computing protection and management based on quantum authentication, introduces the principle of quantum authentication, and deduces the quantum authentication process. In theory, quantum authentication technology can be applied in cloud computing for security protection. This technology cannot be cloned; thus, it is more secure and reliable than classical methods.

  11. When not to copy: female fruit flies use sophisticated public information to avoid mated males

    Science.gov (United States)

    Loyau, Adeline; Blanchet, Simon; van Laere, Pauline; Clobert, Jean; Danchin, Etienne

    2012-10-01

    Semen limitation (lack of semen to fertilize all of a female's eggs) imposes high fitness costs to female partners. Females should therefore avoid mating with semen-limited males. This can be achieved by using public information extracted from watching individual males' previous copulating activities. This adaptive preference should be flexible given that semen limitation is temporary. We first demonstrate that the number of offspring produced by males Drosophila melanogaster gradually decreases over successive copulations. We then show that females avoid mating with males they just watched copulating and that visual public cues are sufficient to elicit this response. Finally, after males were given the time to replenish their sperm reserves, females did not avoid the males they previously saw copulating anymore. These results suggest that female fruit flies may have evolved sophisticated behavioural processes of resistance to semen-limited males, and demonstrate unsuspected adaptive context-dependent mate choice in an invertebrate.

  12. RSYST: From nuclear reactor calculations towards a highly sophisticated scientific software integration environment

    International Nuclear Information System (INIS)

    Noack, M.; Seybold, J.; Ruehle, R.

    1996-01-01

    The software environment RSYST was originally used to solve problems of reactor physics. The consideration of advanced scientific simulation requirements and the strict application of modern software design principles led to a system which is perfectly suitable to solve problems in various complex scientific problem domains. Starting with a review of the early days of RSYST, we describe the straight evolution driven by the need of software environment which combines the advantages of a high-performance database system with the capability to integrate sophisticated scientific technical applications. The RSYST architecture is presented and the data modelling capabilities are described. To demonstrate the powerful possibilities and flexibility of the RSYST environment, we describe a wide range of RSYST applications, e.g., mechanical simulations of multibody systems, which are used in biomechanical research, civil engineering and robotics. In addition, a hypermedia system which is used for scientific technical training and documentation is presented. (orig.) [de

  13. BIDS apps: Improving ease of use, accessibility, and reproducibility of neuroimaging data analysis methods.

    Directory of Open Access Journals (Sweden)

    Krzysztof J Gorgolewski

    2017-03-01

    Full Text Available The rate of progress in human neurosciences is limited by the inability to easily apply a wide range of analysis methods to the plethora of different datasets acquired in labs around the world. In this work, we introduce a framework for creating, testing, versioning and archiving portable applications for analyzing neuroimaging data organized and described in compliance with the Brain Imaging Data Structure (BIDS. The portability of these applications (BIDS Apps is achieved by using container technologies that encapsulate all binary and other dependencies in one convenient package. BIDS Apps run on all three major operating systems with no need for complex setup and configuration and thanks to the comprehensiveness of the BIDS standard they require little manual user input. Previous containerized data processing solutions were limited to single user environments and not compatible with most multi-tenant High Performance Computing systems. BIDS Apps overcome this limitation by taking advantage of the Singularity container technology. As a proof of concept, this work is accompanied by 22 ready to use BIDS Apps, packaging a diverse set of commonly used neuroimaging algorithms.

  14. New tools and methods for direct programmatic access to the dbSNP relational database.

    Science.gov (United States)

    Saccone, Scott F; Quan, Jiaxi; Mehta, Gaurang; Bolze, Raphael; Thomas, Prasanth; Deelman, Ewa; Tischfield, Jay A; Rice, John P

    2011-01-01

    Genome-wide association studies often incorporate information from public biological databases in order to provide a biological reference for interpreting the results. The dbSNP database is an extensive source of information on single nucleotide polymorphisms (SNPs) for many different organisms, including humans. We have developed free software that will download and install a local MySQL implementation of the dbSNP relational database for a specified organism. We have also designed a system for classifying dbSNP tables in terms of common tasks we wish to accomplish using the database. For each task we have designed a small set of custom tables that facilitate task-related queries and provide entity-relationship diagrams for each task composed from the relevant dbSNP tables. In order to expose these concepts and methods to a wider audience we have developed web tools for querying the database and browsing documentation on the tables and columns to clarify the relevant relational structure. All web tools and software are freely available to the public at http://cgsmd.isi.edu/dbsnpq. Resources such as these for programmatically querying biological databases are essential for viably integrating biological information into genetic association experiments on a genome-wide scale.

  15. Analysis of rail welding methods for mine rail access with the use of modern technologies

    Science.gov (United States)

    Usoltsev, A. A.; Shevchenko, R. A.; Kozyrev, N. A.; Kriukov, R. E.; Shishkin, P. E.

    2017-09-01

    Welded joint zones are weak sections of the railway track for all traffic cases (in the case of high-speed traffic and heavy traffic). In the paper advantages and disadvantages of the basic ways of rails welding, which are widely used today, are considered: electrocontact and aluminothermic. Carefully selected mode of differentially thermally strengthened rails string will allow the process of correction after heat treatment to be minimized and internal residual compressive stresses to be kept. Particular attention should be paid to the method of rails welding, in which after rails welding during their cooling it is offered to perform quasi-isothermal exposure in the temperature range of fine structure formation by passing pulses of alternating electric current through the welded joint maintaining this temperature until the end of the transformation. The use of quasi-isothermal exposure at a temperature of 600 - 650 °C makes it possible to obtain a finely dispersed structure of the welded seam of rails without additional heat treatment.

  16. An Innovative Method of Measuring Changes in Access to Healthful Foods in School Lunch Programs: Findings from a Pilot Evaluation.

    Directory of Open Access Journals (Sweden)

    Allison P Hawkes

    Full Text Available A large local health department in Colorado partnered with 15 school districts to develop an approach to evaluate changes in access to healthy foods in reimbursable school lunches and a la carte offerings.School district nutrition managers were engaged at the start of this project. Health department dietitians developed criteria to classify food items as "Lower Fat and less added Sugar" (LFS and "Higher Fat and more added Sugar" (HFS based on the percentage of calories from fat and grams of added sugar. Lunch production sheets were obtained for two time periods, food items and the number of planned servings recorded. LFS and HFS planned servings were summed for each time period, and a LFS to HFS ratio calculated by dividing LFS planned servings by HFS planned servings. Additional analyses included calculating LFS: HFS ratios by school district, and for a la carte offerings.In 2009, the LFS: HFS ratio was 2.08, in 2011, 3.71 (P<0.0001. The method also detected changes in ratios at the school district level. For a la carte items, in 2009 the ratio of LFS: HFS was 0.53, and in 2011, 0.61 (not statistically significant.This method detected an increase in the LFS: HFS ratio over time and demonstrated that the school districts improved access to healthful food/drink by changing the contents of reimbursable school lunches. The evaluation method discussed here can generate information that districts can use in helping sustain and expand their efforts to create healthier environments for children and adults. Although federal regulations now cover all food and beverages served during the school day, there are still opportunities to improve and measure changes in food served in other settings such as child care centers, youth correction facilities, or in schools not participating in the National School Lunch Program.

  17. Attending Physician Remote Access of the Electronic Health Record and Implications for Resident Supervision: A Mixed Methods Study.

    Science.gov (United States)

    Martin, Shannon K; Tulla, Kiara; Meltzer, David O; Arora, Vineet M; Farnan, Jeanne M

    2017-12-01

    Advances in information technology have increased remote access to the electronic health record (EHR). Concurrently, standards defining appropriate resident supervision have evolved. How often and under what circumstances inpatient attending physicians remotely access the EHR for resident supervision is unknown. We described a model of attending remote EHR use for resident supervision, and quantified the frequency and magnitude of use. Using a mixed methods approach, general medicine inpatient attendings were surveyed and interviewed about their remote EHR use. Frequency of use and supervisory actions were quantitatively examined via survey. Transcripts from semistructured interviews were analyzed using grounded theory to identify codes and themes. A total of 83% (59 of 71) of attendings participated. Fifty-seven (97%) reported using the EHR remotely, with 54 (92%) reporting they discovered new clinical information not relayed by residents via remote EHR use. A majority (93%, 55 of 59) reported that this resulted in management changes, and 54% (32 of 59) reported making immediate changes by contacting cross-covering teams. Six major factors around remote EHR use emerged: resident, clinical, educational, personal, technical, and administrative. Attendings described resident and clinical factors as facilitating "backstage" supervision via remote EHR use. In our study to assess attending remote EHR use for resident supervision, attendings reported frequent remote use with resulting supervisory actions, describing a previously uncharacterized form of "backstage" oversight supervision. Future work should explore best practices in remote EHR use to provide effective supervision and ultimately improve patient safety.

  18. A hybrid 3D spatial access method based on quadtrees and R-trees for globe data

    Science.gov (United States)

    Gong, Jun; Ke, Shengnan; Li, Xiaomin; Qi, Shuhua

    2009-10-01

    3D spatial access method for globe data is very crucial technique for virtual earth. This paper presents a brand-new maintenance method to index 3d objects distributed on the whole surface of the earth, which integrates the 1:1,000,000- scale topographic map tiles, Quad-tree and R-tree. Furthermore, when traditional methods are extended into 3d space, the performance of spatial index deteriorates badly, for example 3D R-tree. In order to effectively solve this difficult problem, a new algorithm of dynamic R-tree is put forward, which includes two sub-procedures, namely node-choosing and node-split. In the node-choosing algorithm, a new strategy is adopted, not like the traditional mode which is from top to bottom, but firstly from bottom to top then from top to bottom. This strategy can effectively solve the negative influence of node overlap. In the node-split algorithm, 2-to-3 split mode substitutes the traditional 1-to-2 mode, which can better concern the shape and size of nodes. Because of the rational tree shape, this R-tree method can easily integrate the concept of LOD. Therefore, it will be later implemented in commercial DBMS and adopted in time-crucial 3d GIS system.

  19. A Computational Method based on Radio Frequency Technologies for the Analysis of Accessibility of Disabled People in Sustainable Cities

    Directory of Open Access Journals (Sweden)

    Virgilio Gilart-Iglesias

    2015-11-01

    Full Text Available The sustainability strategy in urban spaces arises from reflecting on how to achieve a more habitable city and is materialized in a series of sustainable transformations aimed at humanizing different environments so that they can be used and enjoyed by everyone without exception and regardless of their ability. Modern communication technologies allow new opportunities to analyze efficiency in the use of urban spaces from several points of view: adequacy of facilities, usability, and social integration capabilities. The research presented in this paper proposes a method to perform an analysis of movement accessibility in sustainable cities based on radio frequency technologies and the ubiquitous computing possibilities of the new Internet of Things paradigm. The proposal can be deployed in both indoor and outdoor environments to check specific locations of a city. Finally, a case study in a controlled context has been simulated to validate the proposal as a pre-deployment step in urban environments.

  20. Background field removal technique using regularization enabled sophisticated harmonic artifact reduction for phase data with varying kernel sizes.

    Science.gov (United States)

    Kan, Hirohito; Kasai, Harumasa; Arai, Nobuyuki; Kunitomo, Hiroshi; Hirose, Yasujiro; Shibamoto, Yuta

    2016-09-01

    An effective background field removal technique is desired for more accurate quantitative susceptibility mapping (QSM) prior to dipole inversion. The aim of this study was to evaluate the accuracy of regularization enabled sophisticated harmonic artifact reduction for phase data with varying spherical kernel sizes (REV-SHARP) method using a three-dimensional head phantom and human brain data. The proposed REV-SHARP method used the spherical mean value operation and Tikhonov regularization in the deconvolution process, with varying 2-14mm kernel sizes. The kernel sizes were gradually reduced, similar to the SHARP with varying spherical kernel (VSHARP) method. We determined the relative errors and relationships between the true local field and estimated local field in REV-SHARP, VSHARP, projection onto dipole fields (PDF), and regularization enabled SHARP (RESHARP). Human experiment was also conducted using REV-SHARP, VSHARP, PDF, and RESHARP. The relative errors in the numerical phantom study were 0.386, 0.448, 0.838, and 0.452 for REV-SHARP, VSHARP, PDF, and RESHARP. REV-SHARP result exhibited the highest correlation between the true local field and estimated local field. The linear regression slopes were 1.005, 1.124, 0.988, and 0.536 for REV-SHARP, VSHARP, PDF, and RESHARP in regions of interest on the three-dimensional head phantom. In human experiments, no obvious errors due to artifacts were present in REV-SHARP. The proposed REV-SHARP is a new method combined with variable spherical kernel size and Tikhonov regularization. This technique might make it possible to be more accurate backgroud field removal and help to achive better accuracy of QSM. Copyright © 2016 Elsevier Inc. All rights reserved.

  1. The Impact of Services on Economic Complexity: Service Sophistication as Route for Economic Growth.

    Science.gov (United States)

    Stojkoski, Viktor; Utkovski, Zoran; Kocarev, Ljupco

    2016-01-01

    Economic complexity reflects the amount of knowledge that is embedded in the productive structure of an economy. By combining tools from network science and econometrics, a robust and stable relationship between a country's productive structure and its economic growth has been established. Here we report that not only goods but also services are important for predicting the rate at which countries will grow. By adopting a terminology which classifies manufactured goods and delivered services as products, we investigate the influence of services on the country's productive structure. In particular, we provide evidence that complexity indices for services are in general higher than those for goods, which is reflected in a general tendency to rank countries with developed service sector higher than countries with economy centred on manufacturing of goods. By focusing on country dynamics based on experimental data, we investigate the impact of services on the economic complexity of countries measured in the product space (consisting of both goods and services). Importantly, we show that diversification of service exports and its sophistication can provide an additional route for economic growth in both developing and developed countries.

  2. Exploring the predictive power of interaction terms in a sophisticated risk equalization model using regression trees.

    Science.gov (United States)

    van Veen, S H C M; van Kleef, R C; van de Ven, W P M M; van Vliet, R C J A

    2018-02-01

    This study explores the predictive power of interaction terms between the risk adjusters in the Dutch risk equalization (RE) model of 2014. Due to the sophistication of this RE-model and the complexity of the associations in the dataset (N = ~16.7 million), there are theoretically more than a million interaction terms. We used regression tree modelling, which has been applied rarely within the field of RE, to identify interaction terms that statistically significantly explain variation in observed expenses that is not already explained by the risk adjusters in this RE-model. The interaction terms identified were used as additional risk adjusters in the RE-model. We found evidence that interaction terms can improve the prediction of expenses overall and for specific groups in the population. However, the prediction of expenses for some other selective groups may deteriorate. Thus, interactions can reduce financial incentives for risk selection for some groups but may increase them for others. Furthermore, because regression trees are not robust, additional criteria are needed to decide which interaction terms should be used in practice. These criteria could be the right incentive structure for risk selection and efficiency or the opinion of medical experts. Copyright © 2017 John Wiley & Sons, Ltd.

  3. The tool for the automatic analysis of lexical sophistication (TAALES): version 2.0.

    Science.gov (United States)

    Kyle, Kristopher; Crossley, Scott; Berger, Cynthia

    2017-07-11

    This study introduces the second release of the Tool for the Automatic Analysis of Lexical Sophistication (TAALES 2.0), a freely available and easy-to-use text analysis tool. TAALES 2.0 is housed on a user's hard drive (allowing for secure data processing) and is available on most operating systems (Windows, Mac, and Linux). TAALES 2.0 adds 316 indices to the original tool. These indices are related to word frequency, word range, n-gram frequency, n-gram range, n-gram strength of association, contextual distinctiveness, word recognition norms, semantic network, and word neighbors. In this study, we validated TAALES 2.0 by investigating whether its indices could be used to model both holistic scores of lexical proficiency in free writes and word choice scores in narrative essays. The results indicated that the TAALES 2.0 indices could be used to explain 58% of the variance in lexical proficiency scores and 32% of the variance in word-choice scores. Newly added TAALES 2.0 indices, including those related to n-gram association strength, word neighborhood, and word recognition norms, featured heavily in these predictor models, suggesting that TAALES 2.0 represents a substantial upgrade.

  4. Simple Plans or Sophisticated Habits? State, Transition and Learning Interactions in the Two-Step Task.

    Science.gov (United States)

    Akam, Thomas; Costa, Rui; Dayan, Peter

    2015-12-01

    The recently developed 'two-step' behavioural task promises to differentiate model-based from model-free reinforcement learning, while generating neurophysiologically-friendly decision datasets with parametric variation of decision variables. These desirable features have prompted its widespread adoption. Here, we analyse the interactions between a range of different strategies and the structure of transitions and outcomes in order to examine constraints on what can be learned from behavioural performance. The task involves a trade-off between the need for stochasticity, to allow strategies to be discriminated, and a need for determinism, so that it is worth subjects' investment of effort to exploit the contingencies optimally. We show through simulation that under certain conditions model-free strategies can masquerade as being model-based. We first show that seemingly innocuous modifications to the task structure can induce correlations between action values at the start of the trial and the subsequent trial events in such a way that analysis based on comparing successive trials can lead to erroneous conclusions. We confirm the power of a suggested correction to the analysis that can alleviate this problem. We then consider model-free reinforcement learning strategies that exploit correlations between where rewards are obtained and which actions have high expected value. These generate behaviour that appears model-based under these, and also more sophisticated, analyses. Exploiting the full potential of the two-step task as a tool for behavioural neuroscience requires an understanding of these issues.

  5. Simple Plans or Sophisticated Habits? State, Transition and Learning Interactions in the Two-Step Task

    Science.gov (United States)

    Akam, Thomas; Costa, Rui; Dayan, Peter

    2015-01-01

    The recently developed ‘two-step’ behavioural task promises to differentiate model-based from model-free reinforcement learning, while generating neurophysiologically-friendly decision datasets with parametric variation of decision variables. These desirable features have prompted its widespread adoption. Here, we analyse the interactions between a range of different strategies and the structure of transitions and outcomes in order to examine constraints on what can be learned from behavioural performance. The task involves a trade-off between the need for stochasticity, to allow strategies to be discriminated, and a need for determinism, so that it is worth subjects’ investment of effort to exploit the contingencies optimally. We show through simulation that under certain conditions model-free strategies can masquerade as being model-based. We first show that seemingly innocuous modifications to the task structure can induce correlations between action values at the start of the trial and the subsequent trial events in such a way that analysis based on comparing successive trials can lead to erroneous conclusions. We confirm the power of a suggested correction to the analysis that can alleviate this problem. We then consider model-free reinforcement learning strategies that exploit correlations between where rewards are obtained and which actions have high expected value. These generate behaviour that appears model-based under these, and also more sophisticated, analyses. Exploiting the full potential of the two-step task as a tool for behavioural neuroscience requires an understanding of these issues. PMID:26657806

  6. Simple Plans or Sophisticated Habits? State, Transition and Learning Interactions in the Two-Step Task.

    Directory of Open Access Journals (Sweden)

    Thomas Akam

    2015-12-01

    Full Text Available The recently developed 'two-step' behavioural task promises to differentiate model-based from model-free reinforcement learning, while generating neurophysiologically-friendly decision datasets with parametric variation of decision variables. These desirable features have prompted its widespread adoption. Here, we analyse the interactions between a range of different strategies and the structure of transitions and outcomes in order to examine constraints on what can be learned from behavioural performance. The task involves a trade-off between the need for stochasticity, to allow strategies to be discriminated, and a need for determinism, so that it is worth subjects' investment of effort to exploit the contingencies optimally. We show through simulation that under certain conditions model-free strategies can masquerade as being model-based. We first show that seemingly innocuous modifications to the task structure can induce correlations between action values at the start of the trial and the subsequent trial events in such a way that analysis based on comparing successive trials can lead to erroneous conclusions. We confirm the power of a suggested correction to the analysis that can alleviate this problem. We then consider model-free reinforcement learning strategies that exploit correlations between where rewards are obtained and which actions have high expected value. These generate behaviour that appears model-based under these, and also more sophisticated, analyses. Exploiting the full potential of the two-step task as a tool for behavioural neuroscience requires an understanding of these issues.

  7. Nurturing Opportunity Identification for Business Sophistication in a Cross-disciplinary Study Environment

    Directory of Open Access Journals (Sweden)

    Karine Oganisjana

    2012-12-01

    Full Text Available Opportunity identification is the key element of the entrepreneurial process; therefore the issue of developing this skill in students is a crucial task in contemporary European education which has recognized entrepreneurship as one of the lifelong learning key competences. The earlier opportunity identification becomes a habitual way of thinking and behavior across a broad range of contexts, the more likely that entrepreneurial disposition will steadily reside in students. In order to nurture opportunity identification in students for making them able to organize sophisticated businesses in the future, certain demands ought to be put forward as well to the teacher – the person who is to promote these qualities in their students. The paper reflects some findings of a research conducted within the frameworks of a workplace learning project for the teachers of one of Riga secondary schools (Latvia. The main goal of the project was to teach the teachers to identify hidden inner links between apparently unrelated things, phenomena and events within 10th grade study curriculum and connect them together and create new opportunities. The creation and solution of cross-disciplinary tasks were the means for achieving this goal.

  8. Ranking network of a captive rhesus macaque society: a sophisticated corporative kingdom.

    Science.gov (United States)

    Fushing, Hsieh; McAssey, Michael P; Beisner, Brianne; McCowan, Brenda

    2011-03-15

    We develop a three-step computing approach to explore a hierarchical ranking network for a society of captive rhesus macaques. The computed network is sufficiently informative to address the question: Is the ranking network for a rhesus macaque society more like a kingdom or a corporation? Our computations are based on a three-step approach. These steps are devised to deal with the tremendous challenges stemming from the transitivity of dominance as a necessary constraint on the ranking relations among all individual macaques, and the very high sampling heterogeneity in the behavioral conflict data. The first step simultaneously infers the ranking potentials among all network members, which requires accommodation of heterogeneous measurement error inherent in behavioral data. Our second step estimates the social rank for all individuals by minimizing the network-wide errors in the ranking potentials. The third step provides a way to compute confidence bounds for selected empirical features in the social ranking. We apply this approach to two sets of conflict data pertaining to two captive societies of adult rhesus macaques. The resultant ranking network for each society is found to be a sophisticated mixture of both a kingdom and a corporation. Also, for validation purposes, we reanalyze conflict data from twenty longhorn sheep and demonstrate that our three-step approach is capable of correctly computing a ranking network by eliminating all ranking error.

  9. Ranking network of a captive rhesus macaque society: a sophisticated corporative kingdom.

    Directory of Open Access Journals (Sweden)

    Hsieh Fushing

    2011-03-01

    Full Text Available We develop a three-step computing approach to explore a hierarchical ranking network for a society of captive rhesus macaques. The computed network is sufficiently informative to address the question: Is the ranking network for a rhesus macaque society more like a kingdom or a corporation? Our computations are based on a three-step approach. These steps are devised to deal with the tremendous challenges stemming from the transitivity of dominance as a necessary constraint on the ranking relations among all individual macaques, and the very high sampling heterogeneity in the behavioral conflict data. The first step simultaneously infers the ranking potentials among all network members, which requires accommodation of heterogeneous measurement error inherent in behavioral data. Our second step estimates the social rank for all individuals by minimizing the network-wide errors in the ranking potentials. The third step provides a way to compute confidence bounds for selected empirical features in the social ranking. We apply this approach to two sets of conflict data pertaining to two captive societies of adult rhesus macaques. The resultant ranking network for each society is found to be a sophisticated mixture of both a kingdom and a corporation. Also, for validation purposes, we reanalyze conflict data from twenty longhorn sheep and demonstrate that our three-step approach is capable of correctly computing a ranking network by eliminating all ranking error.

  10. Access 3 project protocol: young people and health system navigation in the digital age: a multifaceted, mixed methods study.

    Science.gov (United States)

    Kang, Melissa; Robards, Fiona; Sanci, Lena; Steinbeck, Katharine; Jan, Stephen; Hawke, Catherine; Kong, Marlene; Usherwood, Tim

    2017-08-07

    The integration of digital technology into everyday lives of young people has become widespread. It is not known whether and how technology influences barriers and facilitators to healthcare, and whether and how young people navigate between face-to-face and virtual healthcare. To provide new knowledge essential to policy and practice, we designed a study that would explore health system access and navigation in the digital age. The study objectives are to: (1) describe experiences of young people accessing and navigating the health system in New South Wales (NSW), Australia; (2) identify barriers and facilitators to healthcare for young people and how these vary between groups; (3) describe health system inefficiencies, particularly for young people who are marginalised; (4) provide policy-relevant knowledge translation of the research data. This mixed methods study has four parts, including: (1) a cross-sectional survey of young people (12-24 years) residing in NSW, Australia; (2) a longitudinal, qualitative study of a subsample of marginalised young people (defined as young people who: identify as Aboriginal and/or Torres Strait Islander; are experiencing homelessness; identify as sexuality and/or gender diverse; are of refugee or vulnerable migrant background; and/or live in rural or remote NSW); (3) interviews with professionals; (4) a knowledge translation forum. Ethics approvals were sought and granted. Data collection commenced in March 2016 and will continue until June 2017. This study will gather practice and policy-relevant intelligence about contemporary experiences of young people and health services, with a unique focus on five different groups of marginalised young people, documenting their experiences over time. Access 3 will explore navigation around all levels of the health system, determine whether digital technology is integrated into this, and if so how, and will translate findings into policy-relevant recommendations. © Article author(s) (or

  11. Central intake to improve access to physiotherapy for children with complex needs: a mixed methods case report.

    Science.gov (United States)

    Wittmeier, Kristy D M; Restall, Gayle; Mulder, Kathy; Dufault, Brenden; Paterson, Marie; Thiessen, Matthew; Lix, Lisa M

    2016-08-31

    Children with complex needs can face barriers to system access and navigation related to their need for multiple services and healthcare providers. Central intake for pediatric rehabilitation was developed and implemented in 2008 in Winnipeg Manitoba Canada as a means to enhance service coordination and access for children and their families. This study evaluates the process and impact of implementing a central intake system, using pediatric physiotherapy as a case example. A mixed methods instrumental case study design was used. Interviews were completed with 9 individuals. Data was transcribed and analyzed for themes. Quantitative data (wait times, referral volume and caregiver satisfaction) was collected for children referred to physiotherapy with complex needs (n = 1399), and a comparison group of children referred for orthopedic concerns (n = 3901). Wait times were analyzed using the Kruskal-Wallis test, caregiver satisfaction was analyzed using Fisher exact test and change point modeling was applied to examine referral volume over the study period. Interview participants described central intake implementation as creating more streamlined processes. Factors that facilitated successful implementation included 1) agreement among stakeholders, 2) hiring of a central intake coordinator, 3) a financial commitment from the government and 4) leadership at the individual and organization level. Mean (sd) wait times improved for children with complex needs (12.3(13.1) to 8.0(6.9) days from referral to contact with family, p physiotherapy (i.e., decreasing wait times) for families of children with complex needs. Future research is needed to build on this single discipline case study approach to examine changes in wait times, therapy coordination and stakeholder satisfaction within the context of continuing improvements for pediatric therapy services within the province.

  12. Access to a polymerase chain reaction assay method targeting 13 respiratory viruses can reduce antibiotics: a randomised, controlled trial

    Directory of Open Access Journals (Sweden)

    Lindh Magnus

    2011-04-01

    Full Text Available Abstract Background Viral respiratory infections are common worldwide and range from completely benign disease to life-threatening illness. Symptoms can be unspecific, and an etiologic diagnosis is rarely established because of a lack of suitable diagnostic tools. Improper use of antibiotics is common in this setting, which is detrimental in light of the development of bacterial resistance. It has been suggested that the use of diagnostic tests could reduce antibiotic prescription rates. The objective of this study was to evaluate whether access to a multiplex polymerase chain reaction (PCR assay panel for etiologic diagnosis of acute respiratory tract infections (ARTIs would have an impact on antibiotic prescription rate in primary care clinical settings. Methods Adult patients with symptoms of ARTI were prospectively included. Nasopharyngeal and throat swabs were analysed by using a multiplex real-time PCR method targeting thirteen viruses and two bacteria. Patients were recruited at 12 outpatient units from October 2006 through April 2009, and samples were collected on the day of inclusion (initial visit and after 10 days (follow-up visit. Patients were randomised in an open-label treatment protocol to receive a rapid or delayed result (on the following day or after eight to twelve days. The primary outcome measure was the antibiotic prescription rate at the initial visit, and the secondary outcome was the total antibiotic prescription rate during the study period. Results A total sample of 447 patients was randomised. Forty-one were excluded, leaving 406 patients for analysis. In the group of patients randomised for a rapid result, 4.5% (9 of 202 of patients received antibiotics at the initial visit, compared to 12.3% (25 of 204 (P = 0.005 of patients in the delayed result group. At follow-up, there was no significant difference between the groups: 13.9% (28 of 202 in the rapid result group and 17.2% (35 of 204 in the delayed result group (P

  13. Access to Money and Relation to Women’s Use of Family Planning Methods among Young Married Women in Rural India

    Science.gov (United States)

    Reed, Elizabeth; Donta, Balaiah; Dasgupta, Anindita; Ghule, Mohan; Battala, Madhusudana; Nair, Saritha; Silverman, Jay; Jadhav, Arun; Palaye, Prajakta; Saggurti, Niranjan; Raj, Anita

    2016-01-01

    Objectives The social positioning (i.e. social status and autonomy) of women in the household facilitates women’s access to and decision-making power related to family planning (FP). Women’s access to spending money, which may be an indicator of greater social positioning in the household, may also be greater among women who engage in income generating activities for their families, regardless of women’s status in the household. However, in both scenarios, access to money may independently afford greater opportunity to obtain family planning services among women. This study seeks to assess whether access to money is associated with FP outcomes independently of women’s social positioning in their households. Methods Using survey data from married couples in rural Maharashtra, India (n=855), crude and adjusted regression was used to assess women’s access to their own spending money in relation to past 3 month use of condoms and other forms of contraceptives (pills, injectables, intrauterine device). Results Access to money (59%) was associated with condom and other contraceptive use (AORs ranged: 1.5 – 1.8). These findings remained significant after adjusting for women’s FP decision-making power in the household and mobility to seek FP services. Conclusion While preliminary, findings suggest that access to money may increase women’s ability to obtain FP methods, even in contexts where social norms to support women’s power in FP decision-making may not be readily adopted. PMID:26971270

  14. A design method to assess the accessibility of light on PV cells in an arbitraty geometry by means of ambient occlusion

    NARCIS (Netherlands)

    Reinders, Angelina H.M.E.; Willeke, G.; Ossenbrink, H.

    2007-01-01

    A design method has been developed by which the accessibility of light on PV cells in an arbitrary geometry can be quickly visualized and quantified. Modelling of irradiance in this method is based on ambient occlusion, which indicates the likelihood of shading of object’s surfaces due to

  15. Complementary role of two evaluation methods in the usability and accessibility evaluation of a non-standard system

    CSIR Research Space (South Africa)

    Adebesin, F

    2010-10-01

    Full Text Available and used by people with varying abilities. Although accessibility concerns are aimed at making systems usable for people with disabilities, support for direct accessibility, the built-in redundancies in an application that enable as many people as possible...

  16. A Novel Qualitative Method to Improve Access, Elicitation, and Sample Diversification for Enhanced Transferability Applied to Studying Chemistry Outreach

    Science.gov (United States)

    Pratt, Justin M.; Yezierski, Ellen J.

    2018-01-01

    Conducting qualitative research in any discipline warrants two actions: accessing participants and eliciting their ideas. In chemistry education research (CER), survey techniques have been used to increase access to participants and diversify samples. Interview tasks (such as card sorting, using demonstrations, and using simulations) have been…

  17. ChIPWig: a random access-enabling lossless and lossy compression method for ChIP-seq data.

    Science.gov (United States)

    Ravanmehr, Vida; Kim, Minji; Wang, Zhiying; Milenkovic, Olgica

    2018-03-15

    Chromatin immunoprecipitation sequencing (ChIP-seq) experiments are inexpensive and time-efficient, and result in massive datasets that introduce significant storage and maintenance challenges. To address the resulting Big Data problems, we propose a lossless and lossy compression framework specifically designed for ChIP-seq Wig data, termed ChIPWig. ChIPWig enables random access, summary statistics lookups and it is based on the asymptotic theory of optimal point density design for nonuniform quantizers. We tested the ChIPWig compressor on 10 ChIP-seq datasets generated by the ENCODE consortium. On average, lossless ChIPWig reduced the file sizes to merely 6% of the original, and offered 6-fold compression rate improvement compared to bigWig. The lossy feature further reduced file sizes 2-fold compared to the lossless mode, with little or no effects on peak calling and motif discovery using specialized NarrowPeaks methods. The compression and decompression speed rates are of the order of 0.2 sec/MB using general purpose computers. The source code and binaries are freely available for download at https://github.com/vidarmehr/ChIPWig-v2, implemented in C ++. milenkov@illinois.edu. Supplementary data are available at Bioinformatics online.

  18. Genetic relationships among wild and cultivated accessions of curry leaf plant (Murraya koenigii (L.) Spreng.), as revealed by DNA fingerprinting methods.

    Science.gov (United States)

    Verma, Sushma; Rana, T S

    2013-02-01

    Murraya koenigii (L.) Spreng. (Rutaceae), is an aromatic plant and much valued for its flavor, nutritive and medicinal properties. In this study, three DNA fingerprinting methods viz., random amplification of polymorphic DNA (RAPD), directed amplification of minisatellite DNA (DAMD), and inter-simple sequence repeat (ISSR), were used to unravel the genetic variability and relationships across 92 wild and cultivated M. koenigii accessions. A total of 310, 102, and 184, DNA fragments were amplified using 20 RAPD, 5 DAMD, and 13 ISSR primers, revealing 95.80, 96.07, and 96.73% polymorphism, respectively, across all accessions. The average polymorphic information content value obtained with RAPD, DAMD, and ISSR markers was 0.244, 0.250, and 0.281, respectively. The UPGMA tree, based on Jaccard's similarity coefficient generated from the cumulative (RAPD, DAMD, and ISSR) band data showed two distinct clusters, clearly separating wild and cultivated accessions in the dendrogram. Percentage polymorphism, gene diversity (H), and Shannon information index (I) estimates were higher in cultivated accessions compared to wild accessions. The overall high level of polymorphism and varied range of genetic distances revealed a wide genetic base in M. koenigii accessions. The study suggests that RAPD, DAMD, and ISSR markers are highly useful to unravel the genetic variability in wild and cultivated accessions of M. koenigii.

  19. Data mining methods and applications

    CERN Document Server

    Lawrence, Kenneth D; Klimberg, Ronald K

    2007-01-01

    With today's information explosion, many organizations are now able to access a wealth of valuable data. Unfortunately, most of these organizations find they are ill-equipped to organize this information, let alone put it to work for them. Gain a Competitive Advantage Employ data mining in research and forecasting Build models with data management tools and methodology optimization Gain sophisticated breakdowns and complex analysis through multivariate, evolutionary, and neural net methodsLearn how to classify data and maintain qualityTransform Data into Business Acumen Data Mining Methods and

  20. Comparing the perception with the reality of walking in a hilly environment: an accessibility method applied to a University campus in Hong Kong

    Directory of Open Access Journals (Sweden)

    Guibo Sun

    2015-05-01

    Full Text Available The influence of hilliness on walking behavior could be a consequence of the real effect of the local topography, but individual perception of the difficulties associated with walking in a hilly environment may also be important. Previous studies have found that people’s perceptions do not necessarily match well with the realities of walking in hilly environments. There are a few methods that can be used to visualize the geography of that difference for use by urban planners and public health practitioners. A walking accessibility measure that allows comparison of perception and reality is proposed and implemented in this study. We note that difficulties in calculating accessibility measures in the present context arise primarily from problems with data quality, three-dimensional pedestrian network modelling and the adequacy of accessibility methods for describing and predicting walking behavior. We present practical strategies for addressing these issues using geographic information systems. Our method is illustrated by calculating accessibility for a hilly university campus in Hong Kong. Walking behaviors on, and people’s perceptions of, this hilly environment were obtained through walking diaries and a survey. The article concludes with suggested directions for the future development of walking accessibility measures along with some ideas about their applicability to the practice of planning and designing a walkable environment.

  1. Sophisticated Approval Voting, Ignorance Priors, and Plurality Heuristics: A Behavioral Social Choice Analysis in a Thurstonian Framework

    Science.gov (United States)

    Regenwetter, Michel; Ho, Moon-Ho R.; Tsetlin, Ilia

    2007-01-01

    This project reconciles historically distinct paradigms at the interface between individual and social choice theory, as well as between rational and behavioral decision theory. The authors combine a utility-maximizing prescriptive rule for sophisticated approval voting with the ignorance prior heuristic from behavioral decision research and two…

  2. A method to implement fine-grained access control for personal health records through standard relational database queries.

    Science.gov (United States)

    Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley

    2010-10-01

    Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.

  3. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    International Nuclear Information System (INIS)

    Hartman, Steven M.

    2012-01-01

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  4. Broadband Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Broadband Access. Worldwide market for broadband access $30 Billion! Over 200 million broadband subscribers worldwide! Various Competing Broadband access. Digital Subscriber line; Wireless; Optical Fiber.

  5. Access 2010 Programmer's Reference

    CERN Document Server

    Hennig, Teresa; Griffith, Geoffrey L

    2010-01-01

    A comprehensive guide to programming for Access 2010 and 2007. Millions of people use the Access database applications, and hundreds of thousands of developers work with Access daily. Access 2010 brings better integration with SQL Server and enhanced XML support; this Wrox guide shows developers how to take advantage of these and other improvements. With in-depth coverage of VBA, macros, and other programming methods for building Access applications, this book also provides real-world code examples to demonstrate each topic.: Access is the leading database that is used worldwide; While VBA rem

  6. Open access and beyond

    Directory of Open Access Journals (Sweden)

    Das Chhaya

    2006-09-01

    Full Text Available Abstract Uncensored exchange of scientific results hastens progress. Open Access does not stop at the removal of price and permission barriers; still, censorship and reading disabilities, to name a few, hamper access to information. Here, we invite the scientific community and the public to discuss new methods to distribute, store and manage literature in order to achieve unfettered access to literature.

  7. Using Geographic Information Systems and Spatial Analysis Methods to Assess Household Water Access and Sanitation Coverage in the SHINE Trial.

    Science.gov (United States)

    Ntozini, Robert; Marks, Sara J; Mangwadu, Goldberg; Mbuya, Mduduzi N N; Gerema, Grace; Mutasa, Batsirai; Julian, Timothy R; Schwab, Kellogg J; Humphrey, Jean H; Zungu, Lindiwe I

    2015-12-15

    Access to water and sanitation are important determinants of behavioral responses to hygiene and sanitation interventions. We estimated cluster-specific water access and sanitation coverage to inform a constrained randomization technique in the SHINE trial. Technicians and engineers inspected all public access water sources to ascertain seasonality, function, and geospatial coordinates. Households and water sources were mapped using open-source geospatial software. The distance from each household to the nearest perennial, functional, protected water source was calculated, and for each cluster, the median distance and the proportion of households within 1500 m of such a water source. Cluster-specific sanitation coverage was ascertained using a random sample of 13 households per cluster. These parameters were included as covariates in randomization to optimize balance in water and sanitation access across treatment arms at the start of the trial. The observed high variability between clusters in both parameters suggests that constraining on these factors was needed to reduce risk of bias. © The Author 2015. Published by Oxford University Press for the Infectious Diseases Society of America.

  8. Sophisticated lessons from simple organisms: appreciating the value of curiosity-driven research

    Directory of Open Access Journals (Sweden)

    Robert J. Duronio

    2017-12-01

    Full Text Available For hundreds of years, biologists have studied accessible organisms such as garden peas, sea urchins collected at low tide, newt eggs, and flies circling rotten fruit. These organisms help us to understand the world around us, attracting and inspiring each new generation of biologists with the promise of mystery and discovery. Time and time again, what we learn from such simple organisms has emphasized our common biological origins by proving to be applicable to more complex organisms, including humans. Yet, biologists are increasingly being tasked with developing applications from the known, rather than being allowed to follow a path to discovery of the as yet unknown. Here, we provide examples of important lessons learned from research using selected non-vertebrate organisms. We argue that, for the purpose of understanding human disease, simple organisms cannot and should not be replaced solely by human cell-based culture systems. Rather, these organisms serve as powerful discovery tools for new knowledge that could subsequently be tested for conservation in human cell-based culture systems. In this way, curiosity-driven biological research in simple organisms has and will continue to pay huge dividends in both the short and long run for improving the human condition.

  9. Piloting the use of indigenous methods to prevent Nipah virus infection by interrupting bats' access to date palm sap in Bangladesh.

    Science.gov (United States)

    Nahar, Nazmun; Mondal, Utpal Kumar; Sultana, Rebeca; Hossain, M Jahangir; Khan, M Salah Uddin; Gurley, Emily S; Oliveras, Elizabeth; Luby, Stephen P

    2013-09-01

    People in Bangladesh frequently drink fresh date palm sap. Fruit bats (Pteropus giganteus) also drink raw sap and may contaminate the sap by shedding Nipah virus through saliva and urine. In a previous study we identified two indigenous methods to prevent bats accessing the sap, bamboo skirts and lime (calcium carbonate). We conducted a pilot study to assess the acceptability of these two methods among sap harvesters. We used interactive community meetings and group discussions to encourage all the sap harvesters (n = 12) from a village to use either bamboo skirts or lime smear that some of them (n = 4) prepared and applied. We measured the preparation and application time and calculated the cost of bamboo skirts. We conducted interviews after the use of each method. The sap harvesters found skirts effective in preventing bats from accessing sap. They were sceptical that lime would be effective as the lime was washed away by the sap flow. Preparation of the skirt took ∼105 min. The application of each method took ∼1 min. The cost of the bamboo skirt is minimal because bamboo is widely available and they made the skirts with pieces of used bamboo. The bamboo skirt method appeared practical and affordable to the sap harvesters. Further studies should explore its ability to prevent bats from accessing date palm sap and assess if its use produces more or better quality sap, which would provide further incentives to make it more acceptable for its regular use.

  10. Facilitators and barriers to accessing reproductive health care for migrant beer promoters in Cambodia, Laos, Thailand and Vietnam: A mixed methods study

    Science.gov (United States)

    2012-01-01

    Background The purpose of the research was to assess access to sexual and reproductive health services for migrant women who work as beer promoters. This mixed methods research was conducted in Phnom Penh, Cambodia, Bangkok, Thailand, Vientiane, Laos, and Hanoi, Vietnam during 2010 to 2011. Methods Focus groups were held with beer promoters and separate focus groups or interviews with key informants to explore the factors affecting beer promoters’ access to health care institutions for reproductive health care. The findings of the focus groups were used to develop a survey for beer promoters. This survey was conducted in popular health institutions for these women in each of the four Asian cities. Results Several common themes were evident. Work demands prevented beer promoters from accessing health care. Institutional factors affecting care included cost, location, environmental factors (e.g. waiting times, cleanliness and confidentiality) and service factors (e.g. staff attitudes, clinic hours, and availability of medications). Personal factors affecting access were shyness and fear, lack of knowledge, and support from family and friends. The survey of the beer promoters confirmed that cost, location and both environmental and service factors impact on access to health care services for beer promoters. Many beer promoters are sexually active, and a significant proportion of those surveyed rely on sex work to supplement their income. Many also drink with their clients. Despite a few differences amongst the surveyed population, the findings were remarkably similar across the four research sites. Conclusions Recommendations from the research include the provision of evening and weekend clinic hours to facilitate access, free or low cost clinics, and health insurance through employer or government plans which are easy to access for migrants. Other improvements that would facilitate the access of beer promoters to these services include increased funding to hire

  11. Facilitators and barriers to accessing reproductive health care for migrant beer promoters in Cambodia, Laos, Thailand and Vietnam: A mixed methods study

    Directory of Open Access Journals (Sweden)

    Webber Gail

    2012-07-01

    Full Text Available Abstract Background The purpose of the research was to assess access to sexual and reproductive health services for migrant women who work as beer promoters. This mixed methods research was conducted in Phnom Penh, Cambodia, Bangkok, Thailand, Vientiane, Laos, and Hanoi, Vietnam during 2010 to 2011. Methods Focus groups were held with beer promoters and separate focus groups or interviews with key informants to explore the factors affecting beer promoters’ access to health care institutions for reproductive health care. The findings of the focus groups were used to develop a survey for beer promoters. This survey was conducted in popular health institutions for these women in each of the four Asian cities. Results Several common themes were evident. Work demands prevented beer promoters from accessing health care. Institutional factors affecting care included cost, location, environmental factors (e.g. waiting times, cleanliness and confidentiality and service factors (e.g. staff attitudes, clinic hours, and availability of medications. Personal factors affecting access were shyness and fear, lack of knowledge, and support from family and friends. The survey of the beer promoters confirmed that cost, location and both environmental and service factors impact on access to health care services for beer promoters. Many beer promoters are sexually active, and a significant proportion of those surveyed rely on sex work to supplement their income. Many also drink with their clients. Despite a few differences amongst the surveyed population, the findings were remarkably similar across the four research sites. Conclusions Recommendations from the research include the provision of evening and weekend clinic hours to facilitate access, free or low cost clinics, and health insurance through employer or government plans which are easy to access for migrants. Other improvements that would facilitate the access of beer promoters to these services include

  12. A qualitative study examining methods of accessing and identifying research relevant to clinical practice among rehabilitation clinicians.

    Science.gov (United States)

    Patel, Drasti; Koehmstedt, Christine; Jones, Rebecca; Coffey, Nathan T; Cai, Xinsheng; Garfinkel, Steven; Shaewitz, Dahlia M; Weinstein, Ali A

    2017-01-01

    Research examining the utilization of evidence-based practice (EBP) specifically among rehabilitation clinicians is limited. The objective of this study was to examine how various rehabilitative clinicians including physical therapists, occupational therapists, rehabilitation counselors, and physiatrists are gaining access to literature and whether they are able to implement the available research into practice. A total of 21 total clinicians were interviewed via telephone. Using NVivo, a qualitative analysis of the responses was performed. There were similarities found with respect to the information-seeking behaviors and translation of research across the different clinician types. Lack of time was reported to be a barrier for both access to literature and implementation of research across all clinician types. The majority of clinicians who reported having difficulty with utilizing the published literature indicated that the literature was not applicable to their practice, the research was not specific enough to be put into practice, or the research found was too outdated to be relevant. In addition, having a supportive work environment aided in the search and utilization of research through providing resources central to assisting clinicians in gaining access to health information. Our study identified several barriers that affect EBP for rehabilitation clinicians. The findings suggest the need for researchers to ensure that their work is applicable and specific to clinical practice for implementation to occur.

  13. THE HIGH LEVEL ACCESSION DIALOGUE FOR MACEDONIA: ADVANTAGES AND DISADVANTAGES

    Directory of Open Access Journals (Sweden)

    Mladen Karadjoski

    2015-04-01

    Full Text Available One of the strategic goals for the Republic of Macedonia is membership in the European Union. At the end of 2011, the Commission launched a so-called High Level Accession Dialogue for Macedonia, with a possibility to start the negotiations after the fulfillment of the Dialogue goals and benchmarks. For these reasons, the main goal of this paper will be to give an answer of the dilemma whether the Accession Dialogue for Macedonia is an accelerator of the entrance in the European Union, or is just a sophisticated tool for delay of the start of the negotiations for final accession. The expected results will correspond with the future EU plans for Macedonia, but also for the other Western Balkan countries, i.e. we will try to examine whether these countries have a realistic perspective for entrance in the European Union, or they are just a “declarative décor” for the vocabulary of the Brussels diplomats and member countries representatives. That will help to determine i.e. to try to predict the next steps of these countries, connected with the European integration, regardless of the actual constellation in the European Union concerning the Enlargement policy. The descriptive method, content analyses method, comparative method, but also the inductive and deductive methods will be used in this paper.

  14. Academic Dishonesty: Does Social Media Allow for Increased and More Sophisticated Levels of Student Cheating?

    Science.gov (United States)

    Best, Linda M.; Shelley, Daniel J.

    2018-01-01

    This article examines the effects of the social media applications Facebook, Twitter, Snap Chat/Instagram, Texting and various smartphone applications on academic dishonesty in higher education. The study employed a mixed-methods approach conducted through an emailed question-pro student survey consisting of 20 questions. The results of the study…

  15. Access to Justice for Communications Surveillance and Interception : Scrutinising Intelligence Gathering Reform Legislation

    NARCIS (Netherlands)

    Quirine Eijkman

    2018-01-01

    By analysing intelligence-gathering reform legislation this article discusses access to justice for communications interception by the intelligence and security services. In the aftermath of the Snowden revelations, sophisticated oversight systems for bulk communications surveillance are being

  16. Brand personality and its influence on brand loyalty - Do sophisticated brands have more brand loyal customers?

    OpenAIRE

    Bekk, Magdalena; Skatulla, Veronika; Pösl, Miriam; Natter, Martin; Spörrle, Matthias

    2009-01-01

    Objectives. Creating loyal customers is one of the most important aims organisations have. However, most marketing departments try to create loyal customers through customer loyalty programmes only. This study aims at investigating the influence of the brand’s image (i.e., brand personality; Aaker, 1997) on brand loyalty. Method. Study 1 (N = 360) was used to derive a valid single-item measure from a multi-item scale for the three inter-culturally stable brand personality dimensions (sinc...

  17. Statistical Approaches Used to Assess the Equity of Access to Food Outlets: A Systematic Review

    Directory of Open Access Journals (Sweden)

    Karen E. Lamb

    2015-07-01

    Full Text Available BackgroundInequalities in eating behaviours are often linked to the types of food retailers accessible in neighbourhood environments. Numerous studies have aimed to identify if access to healthy and unhealthy food retailers is socioeconomically patterned across neighbourhoods, and thus a potential risk factor for dietary inequalities. Existing reviews have examined differences between methodologies, particularly focussing on neighbourhood and food outlet access measure definitions. However, no review has informatively discussed the suitability of the statistical methodologies employed; a key issue determining the validity of study findings. Our aim was to examine the suitability of statistical approaches adopted in these analyses.MethodsSearches were conducted for articles published from 2000-2014. Eligible studies included objective measures of the neighbourhood food environment and neighbourhood-level socio-economic status, with a statistical analysis of the association between food outlet access and socio-economic status.ResultsFifty-four papers were included. Outlet accessibility was typically defined as the distance to the nearest outlet from the neighbourhood centroid, or as the number of food outlets within a neighbourhood (or buffer. To assess if these measures were linked to neighbourhood disadvantage, common statistical methods included ANOVA, correlation, and Poisson or negative binomial regression. Although all studies involved spatial data, few considered spatial analysis techniques or spatial autocorrelation.ConclusionsWith advances in GIS software, sophisticated measures of neighbourhood outlet accessibility can be considered. However, approaches to statistical analysis often appear less sophisticated. Care should be taken to consider assumptions underlying the analysis and the possibility of spatially correlated residuals which could affect the results.

  18. Understanding differences in access to water fountains and sugar-sweetened beverages in children׳s environments: a pilot study in high and low deprivation neighbourhoods.

    Science.gov (United States)

    Pearson, Amber L; de Latour, Phillip; Kemp, Gabrielle; Findlay, Nohoana; Halim, Angela; Atkinson, Nicola; Chong, Mark; Cameron, Rose; Brown, Courtney; Kim, Grace; Campbell, Paul; Hills, Toby; Jayawant, Aditya; Chae, Matthew; Bhagavan, Chiranth; French, Claire; Jenkin, Gabrielle; Smith, Moira; Signal, Louise

    2014-11-01

    Access to water fountains and sugar-sweetened beverages (SSBs) in children׳s environments may impact on child obesity and may vary with neighbourhood deprivation. Our pilot analyses of access to water fountains and SSBs in Wellington, New Zealand revealed that water fountain access was high in school environments and low in recreational environments. There were also differences in water fountain and SSB access points by neighbourhood deprivation. The methods piloted in this study could be translated in a larger study, more capable of detecting significant differences in access and allowing for more sophisticated analyses. Such future studies may provide important evidence for the improvement of children׳s health and well-being. Copyright © 2014 Elsevier Ltd. All rights reserved.

  19. Old tools for sophisticated diagnosis: Electrocardiography for the assessment of myocardial viability

    International Nuclear Information System (INIS)

    Margonato, A.; Chierchia, S.

    1996-01-01

    The identification of residual myocardial viability in patients with a previous myocardial infarction has important clinical implications. Various methods have been developed for the detection of viable myocardium, however most of them are expensive and available only to high-tech centers. In the attempt to obtain reliable information at a low cost, exercise-ECG has been proposed as a useful technique. The results of a series of studies show that ST segment elevation and ventricular arrhythmias elicited by exercise are reliable signs of the presence of reversible myocardial damage

  20. Priorities and strategies for improving disabled women's access to maternity services when they are affected by domestic abuse: a multi-method study using concept maps.

    Science.gov (United States)

    Bradbury-Jones, Caroline; Breckenridge, Jenna P; Devaney, John; Duncan, Fiona; Kroll, Thilo; Lazenbatt, Anne; Taylor, Julie

    2015-12-28

    Domestic abuse is a significant public health issue. It occurs more frequently among disabled women than those without a disability and evidence suggests that a great deal of domestic abuse begins or worsens during pregnancy. All women and their infants are entitled to equal access to high quality maternity care. However, research has shown that disabled women who experience domestic abuse face numerous barriers to accessing care. The aim of the study was to identify the priority areas for improving access to maternity services for this group of women; develop strategies for improved access and utilisation; and explore the feasibility of implementing the identified strategies. This multi-method study was the third and final part of a larger study conducted in the UK between 2012 and 2014. The study used a modified concept mapping approach and was theoretically underpinned by Andersen's model of healthcare use. Seven focus group interviews were conducted with a range of maternity care professionals (n = 45), incorporating quantitative and qualitative components. Participants ranked perceived barriers to women's access and utilisation of maternity services in order of priority using a 5-point Likert scale. Quantitative data exploration used descriptive and non-parametric analyses. In the qualitative component of each focus group, participants discussed the barriers and identified potential improvement strategies (and feasibility of implementing these). Qualitative data were analysed inductively using a framework analysis approach. The three most highly ranked barriers to women's access and utilisation of maternity services identified in the quantitative component were: 1) staff being unaware and not asking about domestic abuse and disability; 2) the impact of domestic abuse on women; 3) women's fear of disclosure. The top two priority strategies were: providing information about domestic abuse to all women and promoting non-judgemental staff attitude. These were

  1. Facilitators and barriers to accessing reproductive health care for migrant beer promoters in Cambodia, Laos, Thailand and Vietnam: a mixed methods study.

    Science.gov (United States)

    Webber, Gail; Spitzer, Denise; Somrongthong, Ratana; Dat, Truong Cong; Kounnavongsa, Somphone

    2012-07-02

    The purpose of the research was to assess access to sexual and reproductive health services for migrant women who work as beer promoters. This mixed methods research was conducted in Phnom Penh, Cambodia, Bangkok, Thailand, Vientiane, Laos, and Hanoi, Vietnam during 2010 to 2011. Focus groups were held with beer promoters and separate focus groups or interviews with key informants to explore the factors affecting beer promoters' access to health care institutions for reproductive health care. The findings of the focus groups were used to develop a survey for beer promoters. This survey was conducted in popular health institutions for these women in each of the four Asian cities. Several common themes were evident. Work demands prevented beer promoters from accessing health care. Institutional factors affecting care included cost, location, environmental factors (e.g. waiting times, cleanliness and confidentiality) and service factors (e.g. staff attitudes, clinic hours, and availability of medications). Personal factors affecting access were shyness and fear, lack of knowledge, and support from family and friends.The survey of the beer promoters confirmed that cost, location and both environmental and service factors impact on access to health care services for beer promoters. Many beer promoters are sexually active, and a significant proportion of those surveyed rely on sex work to supplement their income. Many also drink with their clients. Despite a few differences amongst the surveyed population, the findings were remarkably similar across the four research sites. Recommendations from the research include the provision of evening and weekend clinic hours to facilitate access, free or low cost clinics, and health insurance through employer or government plans which are easy to access for migrants. Other improvements that would facilitate the access of beer promoters to these services include increased funding to hire more staff (reducing waiting times) and to

  2. Kinetic theory of beam-induced plasmas generalised to sophisticated atomic structures

    International Nuclear Information System (INIS)

    Peyraud-Cuenca, Nelly

    1987-01-01

    We present an analytic kinetic model available for all particle-beam-induced atomic plasmas, without any restriction on the distribution of electronic levels. The method is an iteration of the already known solution available only for the distribution of atomic levels as in the rare gases. We recall a universal atomic kinetic model which, independently of its applications to the study of efficient laser systems, might be a first step in the analytic investigation of molecular problems. Then, the iteration is systematically applied to all possible atomic structures whose number is increased by the non-local character of inelastic processes. We deduce a general analytic representation of the 'tail' of the electron distribution function as a ratio between non-local source terms and a combination of inelastic cross sections, from which we exhibit a physical interpretation and essential scaling laws. The theory is applied to sodium which is an important element in the research of efficient laser systems. (author)

  3. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  4. Assessment of myocardial metabolism by PET - a sophisticated dream or clinical reality

    International Nuclear Information System (INIS)

    Schelbert, H.R.

    1986-01-01

    This symposium reviewed radionuclide techniques for the noninvasive study of regional myocardial metabolism and spanned a wide range of topics. New radiotracers for probing different metabolic pathways or selected biochemical reaction steps were presented. New information on tracers already in use was forthcoming. Because the imaging device can measure only concentrations of radiolabel in tissue, other studies examined relationships between uptake and turnover of radioactivity in tissue as an externally observed signal, the chemical fate of the label, and the biologic process under study. Other studies formulated these relationships through tracer compartment models, which are fundament to quantifying regional physiologic processes externally. Other investigations applied radiotracer methods to experimental models of cardiac disease to patients. They described findings of regional or global alterations in substrate metabolism. These observations highlighted the potential clinical value of this new methodology. At the same time, several of these observations remain at present without mechanistic explanation; yet they form the foundation on which working hypotheses can be built, which in turn can be tested in vivo. (orig.)

  5. Assessment of myocardial metabolism by PET - a sophisticated dream or clinical reality

    Energy Technology Data Exchange (ETDEWEB)

    Schelbert, H R

    1986-08-01

    This symposium reviewed radionuclide techniques for the noninvasive study of regional myocardial metabolism and spanned a wide range of topics. New radiotracers for probing different metabolic pathways or selected biochemical reaction steps were presented. New information on tracers already in use was forthcoming. Because the imaging device can measure only concentrations of radiolabel in tissue, other studies examined relationships between uptake and turnover of radioactivity in tissue as an externally observed signal, the chemical fate of the label, and the biologic process under study. Other studies formulated these relationships through tracer compartment models, which are fundament to quantifying regional physiologic processes externally. Other investigations applied radiotracer methods to experimental models of cardiac disease to patients. They described findings of regional or global alterations in substrate metabolism. These observations highlighted the potential clinical value of this new methodology. At the same time, several of these observations remain at present without mechanistic explanation; yet they form the foundation on which working hypotheses can be built, which in turn can be tested in vivo.

  6. Revolving Loan Fund: A Novel Approach to Increasing Access to Long-Acting Reversible Contraception Methods in Community Health Centers.

    Science.gov (United States)

    Evans, Megan L; Breeze, Janis L; Paulus, Jessica K; Meadows, Audra

    The aim of this study was to assess the impact of a revolving loan fund (RLF) on timing of device insertion and long-acting reversible contraception (LARC) access among a high-risk urban population at 3 Boston community health centers. Three health centers were identified to implement a RLF. Each clinic received $5000 from the RLF to purchase LARC devices. Data collected through medical record review retrospectively 1 year prior to start of the RLF and prospectively for 1 year thereafter included patient demographics, type of LARC selected, patient's date of documented interest in a LARC device, and date of insertion. The effect of a RLF on delay to LARC insertion was tested using negative binomial regression, controlling for site and potential confounding variables between the pre- and post-RLF periods. Three urban community health centers. Reproductive-aged women who received family planning services at the 3 participating health centers. Increasing access to LARC and decreasing wait times to LARC insertion after implementation of the RLF. Data on 133 patients in the pre-RLF group and 205 in the post-RLF group were collected. There were no statistically significant differences in demographic or clinical characteristics between the 2 time periods. LARC uptake increased significantly from the pre- to post-RLF period, specifically among implant users. There was a statistically significant decrease in the mean number of days in delay from interest to insertion from the pre- to post-RLF period (pre-RLF: 31.3 ± 50.6 days; post-RLF: 13.6 ± 16.7 days, adjusted P < .001). The reasons for the delay did not differ significantly between the 2 time periods. The RLF decreased wait time for the devices and increased overall insertion rates. This may serve as a promising solution to improve LARC access in community health centers. This project could be expanded to include more health centers, creating a city wide RLF. This expansion could allow for further data analysis

  7. Open access

    NARCIS (Netherlands)

    Valkenburg, P.M.

    2015-01-01

    Open access week Van 19 tot en met 25 oktober 2015 vond wereldwijd de Open Access Week plaats. Tijdens deze week werden er over de hele wereld evenementen georganiseerd waar open access een rol speelt. Ook in Nederland zijn er diverse symposia, workshops en debatten georganiseerd zoals het debat in

  8. Homeless people's access to primary care physiotherapy services: an exploratory, mixed-method investigation using a follow-up qualitative extension to core quantitative research.

    Science.gov (United States)

    Dawes, Jo; Deaton, Stuart; Greenwood, Nan

    2017-06-30

    The purpose of this study was to appraise referrals of homeless patients to physiotherapy services and explore perceptions of barriers to access. This exploratory mixed-method study used a follow-up qualitative extension to core quantitative research design. Over 9 months, quantitative data were gathered from the healthcare records of homeless patients referred to physiotherapy by a general practitioner (GP) practice, including the number of referrals and demographic data of all homeless patients referred. Corresponding physiotherapy records of those people referred to physiotherapy were searched for the outcome of their care. Qualitative semi-structured telephone interviews, based on the quantitative findings, were carried out with staff involved with patient care from the referring GP practice and were used to expand insight into the quantitative findings. Two primary care sites provided data for this study: a GP practice dedicated exclusively to homeless people and the physiotherapy department receiving their referrals. Quantitative data from the healthcare records of 34 homeless patient referrals to physiotherapy were collected and analysed. In addition, five staff involved in patient care were interviewed. 34 referrals of homeless people were made to physiotherapy in a 9-month period. It was possible to match 25 of these to records from the physiotherapy department. Nine (36%) patients did not attend their first appointment; seven (28%) attended an initial appointment, but did not attend a subsequent appointment and were discharged from the service; five (20%) completed treatment and four patients (16%) had ongoing treatment. Semi-structured interviews revealed potential barriers preventing homeless people from accessing physiotherapy services, the complex factors being faced by those making referrals and possible ways to improve physiotherapy access. Homeless people with musculoskeletal problems may fail to access physiotherapy treatment, but opportunities

  9. Apparatus and method for servicing an elongated suspended pump motor in an electric power plant with limited access

    International Nuclear Information System (INIS)

    Chavez, R.V.; Ekeroth, D.E.; Johnson, F.T.; Matusz, J.M.

    1994-01-01

    Elongated coolant pumps suspended under steam generators within containment in a power plant with limited access space, are removed and replaced by an elongated maintenance cart with an elongated opening along one side in which the motor is received. Rollers support the cart for conveying the elongated motor in an upright position out from under the steam generator and onto an elevator. The elevator is lowered to transfer support of the cart and motor through trunnions to saddles straddling the elevator for rotation of the cart to a generally horizontal position. The elevator then raises the horizontally disposed cart carrying the motor to a higher floor where it is rolled off the elevator and out through the auxiliary equipment hatch. 14 figures

  10. Statistical Approaches Used to Assess the Equity of Access to Food Outlets: A Systematic Review.

    Science.gov (United States)

    Lamb, Karen E; Thornton, Lukar E; Cerin, Ester; Ball, Kylie

    2015-01-01

    Inequalities in eating behaviours are often linked to the types of food retailers accessible in neighbourhood environments. Numerous studies have aimed to identify if access to healthy and unhealthy food retailers is socioeconomically patterned across neighbourhoods, and thus a potential risk factor for dietary inequalities. Existing reviews have examined differences between methodologies, particularly focussing on neighbourhood and food outlet access measure definitions. However, no review has informatively discussed the suitability of the statistical methodologies employed; a key issue determining the validity of study findings. Our aim was to examine the suitability of statistical approaches adopted in these analyses. Searches were conducted for articles published from 2000-2014. Eligible studies included objective measures of the neighbourhood food environment and neighbourhood-level socio-economic status, with a statistical analysis of the association between food outlet access and socio-economic status. Fifty-four papers were included. Outlet accessibility was typically defined as the distance to the nearest outlet from the neighbourhood centroid, or as the number of food outlets within a neighbourhood (or buffer). To assess if these measures were linked to neighbourhood disadvantage, common statistical methods included ANOVA, correlation, and Poisson or negative binomial regression. Although all studies involved spatial data, few considered spatial analysis techniques or spatial autocorrelation. With advances in GIS software, sophisticated measures of neighbourhood outlet accessibility can be considered. However, approaches to statistical analysis often appear less sophisticated. Care should be taken to consider assumptions underlying the analysis and the possibility of spatially correlated residuals which could affect the results.

  11. Novel method to ascertain chromatin accessibility at specific genomic loci from frozen brain homogenates and laser capture microdissected defined cells.

    Science.gov (United States)

    Delvaux, Elaine; Mastroeni, Diego; Nolz, Jennifer; Coleman, Paul D

    2016-06-01

    We describe a novel method for assessing the "open" or "closed" state of chromatin at selected locations within the genome. This method combines the use of Benzonase, which can digest DNA in the presence of actin, with qPCR to define digested regions. We demonstrate the application of this method in brain homogenates and laser captured cells. We also demonstrate application to selected sites within more than one gene and multiple sites within one gene. We demonstrate the validity of the method by treating cells with valproate, known to render chromatin more permissive, and by comparison with classical digestion with DNase I in an in vitro preparation. Although we demonstrate the use of this method in brain tissue we also recognize its applicability to other tissue types.

  12. Novel method to ascertain chromatin accessibility at specific genomic loci from frozen brain homogenates and laser capture microdissected defined cells

    Directory of Open Access Journals (Sweden)

    Elaine Delvaux

    2016-06-01

    Full Text Available We describe a novel method for assessing the “open” or “closed” state of chromatin at selected locations within the genome. This method combines the use of Benzonase, which can digest DNA in the presence of actin, with quantitative polymerase chain reaction to define digested regions. We demonstrate the application of this method in brain homogenates and laser captured cells. We also demonstrate application to selected sites within more than 1 gene and multiple sites within 1 gene. We demonstrate the validity of the method by treating cells with valproate, known to render chromatin more permissive, and by comparison with classical digestion with DNase I in an in vitro preparation. Although we demonstrate the use of this method in brain tissue, we also recognize its applicability to other tissue types.

  13. Estimating the Technical Potential of Grid-Connected PV Systems in Indonesia : A Comparison of a Method Based on Open Access Data with a Method Based on GIS

    NARCIS (Netherlands)

    Kunaifi, Kunaifi; Reinders, Angelina H.M.E.; Smets, Arno

    2017-01-01

    In this paper, we compare two methods for estimating the technical potential of grid-connected PV systems in Indonesia. One was a method developed by Veldhuis and Renders [1] and the other is a new method using Geographic Information System (GIS) and multi-criteria decision making (MCDM). The first

  14. Access Data Analysis Cookbook

    CERN Document Server

    Bluttman, Ken

    2008-01-01

    This book offers practical recipes to solve a variety of common problems that users have with extracting Access data and performing calculations on it. Whether you use Access 2007 or an earlier version, this book will teach you new methods to query data, different ways to move data in and out of Access, how to calculate answers to financial and investment issues, how to jump beyond SQL by manipulating data with VBA, and more.

  15. Switching characteristics in Cu:SiO2 by chemical soak methods for resistive random access memory (ReRAM)

    Science.gov (United States)

    Chin, Fun-Tat; Lin, Yu-Hsien; Yang, Wen-Luh; Liao, Chin-Hsuan; Lin, Li-Min; Hsiao, Yu-Ping; Chao, Tien-Sheng

    2015-01-01

    A limited copper (Cu)-source Cu:SiO2 switching layer composed of various Cu concentrations was fabricated using a chemical soaking (CS) technique. The switching layer was then studied for developing applications in resistive random access memory (ReRAM) devices. Observing the resistive switching mechanism exhibited by all the samples suggested that Cu conductive filaments formed and ruptured during the set/reset process. The experimental results indicated that the endurance property failure that occurred was related to the joule heating effect. Moreover, the endurance switching cycle increased as the Cu concentration decreased. In high-temperature tests, the samples demonstrated that the operating (set/reset) voltages decreased as the temperature increased, and an Arrhenius plot was used to calculate the activation energy of the set/reset process. In addition, the samples demonstrated stable data retention properties when baked at 85 °C, but the samples with low Cu concentrations exhibited short retention times in the low-resistance state (LRS) during 125 °C tests. Therefore, Cu concentration is a crucial factor in the trade-off between the endurance and retention properties; furthermore, the Cu concentration can be easily modulated using this CS technique.

  16. An accessible method for the evaluation of the thermo-oxidative stability of organic substrates based on vegetable oils

    Energy Technology Data Exchange (ETDEWEB)

    Dzyuba, Valeriy I.; Koval, Lyudmila I., E-mail: l_koval@ionc.kiev.ua; Pekhnyo, Vasyl I.

    2016-05-20

    Graphical abstract: Autooxidation of sunflower oil at 110 °C. - Highlights: • A novel method for the determination of the oxidation induction period is proposed. • All component parts of the device are widely used in laboratory practice. • The method is on a par with standardized methods in terms of repeatability. - Abstract: A novel cost-effective computerized method is proposed for the determination of the oxidation induction period (OIP) of organic substrates. All component parts of the device are factory-made (interchangeable) details, which are widely used in laboratory practice. A sample is charged into the reactor, the closed reactor-condenser-stopcock system is evacuated. Then the device is filled with oxygen. The reactor is warmed up to balance with atmospheric pressure. The device is sealed and stirring of the heating medium, substrate and digital data transfer from the pressure sensor to the computer is started. The monitoring of the autooxidation of the sample is terminated after the system pressure has decreased by 300 hPa. A test report is formed with the aid of a computer using Microsoft Excel; OIP is determined as the point of intersection of two tangent lines to the curve. The proposed method is on a par with standardized methods in terms of the repeatability of measurement results.

  17. The effect of cooking and washing rice on the bio-accessibility of As, Cu, Fe, V and Zn using an on-line continuous leaching method.

    Science.gov (United States)

    Horner, Nolan S; Beauchemin, Diane

    2013-01-03

    A previously developed method based on continuous on-line leaching with artificial gastro-intestinal fluids was used to determine the bio-accessible fraction of As, Cu, Fe, V and Zn in brown and white rice from California by inductively coupled mass spectrometry (ICP-MS). Saliva generally accounted for the largest percentage of total element leached in comparison to gastric and intestinal juices. Arsenic speciation analysis was performed on the saliva and gastric juice leachates using ion exchange chromatography coupled to ICP-MS. The four most toxic species of As (As(III), monomethylarsonic acid (MMA), dimethylarsinic acid (DMA) and As(V)), as well as Cl(-) in the gastric juice leachate, were successfully separated within 5.5min using a simple nitric acid gradient. While cooking rice had relatively little effect on total bio-accessibility, a change in species from As(V) and DMA to As(III) was observed for both types of rice. On the other hand, washing the rice with doubly deionized water prior to cooking removed a large percentage of the total bio-accessible fraction of As, Cu, Fe, V and Zn. Copyright © 2012 Elsevier B.V. All rights reserved.

  18. Using Geospatial Research Methods to Examine Resource Accessibility and Availability as it Relates to Community Participation of Individuals with Serious Mental Illnesses.

    Science.gov (United States)

    Townley, Greg; Brusilovskiy, Eugene; Snethen, Gretchen; Salzer, Mark S

    2018-03-01

    Greater community participation among individuals with serious mental illnesses is associated with better psychosocial and health outcomes. Typically, studies examining community participation have utilized self-report measures and been conducted in limited settings. The introduction of methodological advances to examining community participation of individuals with serious mental illnesses has the potential to advance the science of community mental health research and invigorate the work of community psychologists in this area. This study employed an innovative geospatial approach to examine the relationship between community participation and resource accessibility (i.e., proximity) and availability (i.e., concentration) among 294 individuals utilizing community mental health services throughout the United States. Findings suggest small but significant associations between community participation and the accessibility and availability of resources needed for participation. Furthermore, findings demonstrate the importance of car access for individuals residing in both urban and non-urban settings. The methods and results presented in this study have implications for community mental health research and services and provide an illustration of ways that geospatial methodologies can be used to investigate environmental factors that impact community inclusion and participation of individuals with serious mental illnesses. © Society for Community Research and Action 2017.

  19. Learning Strategic Sophistication

    NARCIS (Netherlands)

    Blume, A.; DeJong, D.V.; Maier, M.

    2005-01-01

    We experimentally investigate coordination games in which cognition plays an important role, i.e. where outcomes are affected by the agents level of understanding of the game and the beliefs they form about each others understanding.We ask whether and when repeated exposure permits agents to learn

  20. Apparatus and method supporting wireless access to multiple security layers in an industrial control and automation system or other system

    Science.gov (United States)

    Chen, Yu-Gene T.

    2013-04-16

    A method includes receiving a message at a first wireless node. The first wireless node is associated with a first wired network, and the first wired network is associated with a first security layer. The method also includes transmitting the message over the first wired network when at least one destination of the message is located in the first security layer. The method further includes wirelessly transmitting the message for delivery to a second wireless node when at least one destination of the message is located in a second security layer. The second wireless node is associated with a second wired network, and the second wired network is associated with the second security layer. The first and second security layers may be associated with different security paradigms and/or different security domains. Also, the message could be associated with destinations in the first and second security layers.

  1. Efficiency Analysis of the access method with the cascading Bloom filter to the data warehouse on the parallel computing platform

    Science.gov (United States)

    Grigoriev, Yu A.; Proletarskaya, V. A.; Ermakov, E. Yu; Ermakov, O. Yu

    2017-10-01

    A new method was developed with a cascading Bloom filter (CBF) for executing SQL queries in the Apache Spark parallel computing environment. It includes the representation of the original query in the form of several subqueries, the development of a connection graph and the transformation of subqueries, the definition of connections where it is necessary to use Bloom filters, the representation of the graph in terms of Spark. On the example of the query Q3 of the TPC-H test, full-scale experiments were carried out, which confirmed the effectiveness of the developed method.

  2. Development of a test method to access the sludge reduction potential of aquatic organisms in activated sludge

    NARCIS (Netherlands)

    Buijs, B.R.; Klapwijk, A.; Elissen, H.J.H.; Rulkens, W.H.

    2008-01-01

    This article shows the development of a quantitative sludge reduction test method, which uses the sludge consuming aquatic worm Lumbriculus variegatus (Oligochaeta, Lumbriculidae). Essential for the test are sufficient oxygen supply and the presence of a non-stirred layer of sludge for burrowing of

  3. Sophisticated Calculation of the 1oo4-architecture for Safety-related Systems Conforming to IEC61508

    International Nuclear Information System (INIS)

    Hayek, A; Al Bokhaiti, M; Schwarz, M H; Boercsoek, J

    2012-01-01

    With the publication and enforcement of the standard IEC 61508 of safety related systems, recent system architectures have been presented and evaluated. Among a number of techniques and measures to the evaluation of safety integrity level (SIL) for safety-related systems, several measures such as reliability block diagrams and Markov models are used to analyze the probability of failure on demand (PFD) and mean time to failure (MTTF) which conform to IEC 61508. The current paper deals with the quantitative analysis of the novel 1oo4-architecture (one out of four) presented in recent work. Therefore sophisticated calculations for the required parameters are introduced. The provided 1oo4-architecture represents an advanced safety architecture based on on-chip redundancy, which is 3-failure safe. This means that at least one of the four channels have to work correctly in order to trigger the safety function.

  4. Macromolecular competition titration method accessing thermodynamics of the unmodified macromolecule-ligand interactions through spectroscopic titrations of fluorescent analogs.

    Science.gov (United States)

    Bujalowski, Wlodzimierz; Jezewska, Maria J

    2011-01-01

    Analysis of thermodynamically rigorous binding isotherms provides fundamental information about the energetics of the ligand-macromolecule interactions and often an invaluable insight about the structure of the formed complexes. The Macromolecular Competition Titration (MCT) method enables one to quantitatively obtain interaction parameters of protein-nucleic acid interactions, which may not be available by other methods, particularly for the unmodified long polymer lattices and specific nucleic acid substrates, if the binding is not accompanied by adequate spectroscopic signal changes. The method can be applied using different fluorescent nucleic acids or fluorophores, although the etheno-derivatives of nucleic acid are especially suitable as they are relatively easy to prepare, have significant blue fluorescence, their excitation band lies far from the protein absorption spectrum, and the modification eliminates the possibility of base pairing with other nucleic acids. The MCT method is not limited to the specific size of the reference nucleic acid. Particularly, a simple analysis of the competition titration experiments is described in which the fluorescent, short fragment of nucleic acid, spanning the exact site-size of the protein-nucleic acid complex, and binding with only a 1:1 stoichiometry to the protein, is used as a reference macromolecule. Although the MCT method is predominantly discussed as applied to studying protein-nucleic acid interactions, it can generally be applied to any ligand-macromolecule system by monitoring the association reaction using the spectroscopic signal originating from the reference macromolecule in the presence of the competing macromolecule, whose interaction parameters with the ligand are to be determined. Copyright © 2011 Elsevier Inc. All rights reserved.

  5. Macromolecular Competition Titration Method: Accessing Thermodynamics of the Unmodified Macromolecule–Ligand Interactions Through Spectroscopic Titrations of Fluorescent Analogs

    Science.gov (United States)

    Bujalowski, Wlodzimierz; Jezewska, Maria J.

    2011-01-01

    Analysis of thermodynamically rigorous binding isotherms provides fundamental information about the energetics of the ligand–macromolecule interactions and often an invaluable insight about the structure of the formed complexes. The Macromolecular Competition Titration (MCT) method enables one to quantitatively obtain interaction parameters of protein–nucleic acid interactions, which may not be available by other methods, particularly for the unmodified long polymer lattices and specific nucleic acid substrates, if the binding is not accompanied by adequate spectroscopic signal changes. The method can be applied using different fluorescent nucleic acids or fluorophores, although the etheno-derivatives of nucleic acid are especially suitable as they are relatively easy to prepare, have significant blue fluorescence, their excitation band lies far from the protein absorption spectrum, and the modification eliminates the possibility of base pairing with other nucleic acids. The MCT method is not limited to the specific size of the reference nucleic acid. Particularly, a simple analysis of the competition titration experiments is described in which the fluorescent, short fragment of nucleic acid, spanning the exact site-size of the protein–nucleic acid complex, and binding with only a 1:1 stoichiometry to the protein, is used as a reference macromolecule. Although the MCT method is predominantly discussed as applied to studying protein–nucleic acid interactions, it can generally be applied to any ligand–macromolecule system by monitoring the association reaction using the spectroscopic signal originating from the reference macromolecule in the presence of the competing macromolecule, whose interaction parameters with the ligand are to be determined. PMID:21195223

  6. Migrants' access to healthcare

    DEFF Research Database (Denmark)

    Norredam, Marie

    2011-01-01

    There are strong pragmatic and moral reasons for receiving societies to address access to healthcare for migrants. Receiving societies have a pragmatic interest in sustaining migrants' health to facilitate integration; they also have a moral obligation to ensure migrants' access to healthcare...... according to international human rights principles. The intention of this thesis is to increase the understanding of migrants' access to healthcare by exploring two study aims: 1) Are there differences in migrants' access to healthcare compared to that of non-migrants? (substudy I and II); and 2) Why...... are there possible differences in migrants' access to healthcare compared to that of non-migrants? (substudy III and IV). The thesis builds on different methodological approaches using both register-based retrospective cohort design, cross-sectional design and survey methods. Two different measures of access were...

  7. Spatial access method for urban geospatial database management: An efficient approach of 3D vector data clustering technique

    DEFF Research Database (Denmark)

    Azri, Suhaibah; Ujang, Uznir; Rahman, Alias Abdul

    2014-01-01

    In the last few years, 3D urban data and its information are rapidly increased due to the growth of urban area and urbanization phenomenon. These datasets are then maintain and manage in 3D spatial database system. However, performance deterioration is likely to happen due to the massiveness of 3D...... datasets. As a solution, 3D spatial index structure is used as a booster to increase the performance of data retrieval. In commercial database, commonly and widely used index structure for 3D spatial database is 3D R-Tree. This is due to its simplicity and promising method in handling spatial data. However......D geospatial data clustering to be used in the construction of 3D R-Tree and respectively could reduce the overlapping among nodes. The proposed method is tested on 3D urban dataset for the application of urban infill development. By using several cases of data updating operations such as building...

  8. Analysis of a simulated microarray dataset: Comparison of methods for data normalisation and detection of differential expression (Open Access publication

    Directory of Open Access Journals (Sweden)

    Mouzaki Daphné

    2007-11-01

    Full Text Available Abstract Microarrays allow researchers to measure the expression of thousands of genes in a single experiment. Before statistical comparisons can be made, the data must be assessed for quality and normalisation procedures must be applied, of which many have been proposed. Methods of comparing the normalised data are also abundant, and no clear consensus has yet been reached. The purpose of this paper was to compare those methods used by the EADGENE network on a very noisy simulated data set. With the a priori knowledge of which genes are differentially expressed, it is possible to compare the success of each approach quantitatively. Use of an intensity-dependent normalisation procedure was common, as was correction for multiple testing. Most variety in performance resulted from differing approaches to data quality and the use of different statistical tests. Very few of the methods used any kind of background correction. A number of approaches achieved a success rate of 95% or above, with relatively small numbers of false positives and negatives. Applying stringent spot selection criteria and elimination of data did not improve the false positive rate and greatly increased the false negative rate. However, most approaches performed well, and it is encouraging that widely available techniques can achieve such good results on a very noisy data set.

  9. Characterization of a Gas-Purge Method to Access 11C-Carbon-Dioxide Radioactivity in Blood

    International Nuclear Information System (INIS)

    Ng, Y.; Green, M.A.

    2014-01-01

    Carbon-11 (t 1/2 : 20 minutes) labeled radiotracers, such as 11 C-acetate and 11 C-palmitate are widely used in positron emission tomography (PET) for noninvasive evaluation of myocardial metabolism under varied physiological conditions. These tracers are attractive probes of tissue physiology, because they are simply radiolabeled versions of the native biochemical substrates. One of the major metabolites generated by these tracers upon the administration is 11 CO 2 produced via the citric acid cycle. In quantitative modeling of 11 C-acetate and 11 C-palmitate PET data, the fraction of blood 11 C radioactivity present as 11 CO 2 needs to be measured to obtain a correct radiotracer arterial input function. Accordingly, the literature describes a method whereby the total blood 11 C-activity is counted in blood samples treated with base solution, while the fraction of 11 CO 2 is measured after the blood is treated with acid followed by a 10 minutes gas-purge. However, a detailed description of the experimental validation of this method was not provided. The goal of this study was to test the reliability of a 10-minute gas purging method used to assay 11 CO 2 radioactivity in blood. (author)

  10. Open Access

    Science.gov (United States)

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder…

  11. Open access

    African Journals Online (AJOL)

    Prof. Dennis Ocholla

    The argument that access to information is an instrumental and individual as well as ... and Dean School of Information Studies, University of Wisconsin, Milwaukee, USA. ... to scholarly publications and can be in any digital format, including text, movies and ... language barriers, censorship, lack of access to the Internet and ...

  12. Index of Access: a new innovative and dynamic tool for rural health service and workforce planning.

    Science.gov (United States)

    McGrail, Matthew R; Russell, Deborah J; Humphreys, John S

    2017-10-01

    Objective Improving access to primary health care (PHC) remains a key issue for rural residents and health service planners. This study aims to show that how access to PHC services is measured has important implications for rural health service and workforce planning. Methods A more sophisticated tool to measure access to PHC services is proposed, which can help health service planners overcome the shortcomings of existing measures and long-standing access barriers to PHC. Critically, the proposed Index of Access captures key components of access and uses a floating catchment approach to better define service areas and population accessibility levels. Moreover, as demonstrated through a case study, the Index of Access enables modelling of the effects of workforce supply variations. Results Hypothetical increases in supply are modelled for a range of regional centres, medium and small rural towns, with resulting changes of access scores valuable to informing health service and workforce planning decisions. Conclusions The availability and application of a specific 'fit-for-purpose' access measure enables a more accurate empirical basis for service planning and allocation of health resources. This measure has great potential for improved identification of PHC access inequities and guiding redistribution of PHC services to correct such inequities. What is known about the topic? Resource allocation and health service planning decisions for rural and remote health settings are currently based on either simple measures of access (e.g. provider-to-population ratios) or proxy measures of access (e.g. standard geographical classifications). Both approaches have substantial limitations for informing rural health service planning and decision making. What does this paper add? The adoption of a new improved tool to measure access to PHC services, the Index of Access, is proposed to assist health service and workforce planning. Its usefulness for health service planning is

  13. Feasibility study of context-awareness device Comfort calculation methods and their application to comfort-based access control

    DEFF Research Database (Denmark)

    Guo, Jingjing; Jensen, Christian D.; Ma, Jianfeng

    2016-01-01

    Mobile devices have become more powerful and are increasingly integrated in the everyday life of people; from playing games, taking pictures and interacting with social media to replacing credit cards in payment solutions. Some actions may only be appropriate in some situations, so the security...... of a mobile device is therefore increasingly linked to its context, such as its location, surroundings (e.g. objects in the immediate environment) and so on. However, situational awareness and context are not captured by traditional security models. In this paper, we examine the notion of Device Comfort......, which captures a device's ability to secure and reason about its environment. Specifically, we study the feasibility of two device comfort calculation methods we proposed in previous work. We do trace driven simulations based on a large body of sensed data from mobile devices in the real world...

  14. The universal access handbook

    CERN Document Server

    Stephanidis, Constantine

    2009-01-01

    In recent years, the field of Universal Access has made significant progress in consolidating theoretical approaches, scientific methods and technologies, as well as in exploring new application domains. Increasingly, professionals in this rapidly maturing area require a comprehensive and multidisciplinary resource that addresses current principles, methods, and tools. Written by leading international authorities from academic, research, and industrial organizations and nonmarket institutions, The Universal Access Handbook covers the unfolding scientific, methodological, technological, and pol

  15. Using Program Data to Improve Access to Family Planning and Enhance the Method Mix in Conflict-Affected Areas of the Democratic Republic of the Congo

    Science.gov (United States)

    Ho, Lara S; Wheeler, Erin

    2018-01-01

    Unmet need for family planning in the conflict-affected area of eastern Democratic Republic of the Congo (DRC) has been reported to be as high as 38%, and women in such conflict settings are often the most at risk for maternal mortality. The International Rescue Committee implements the Family Planning and Post-Abortion Care in Emergencies program in 3 provinces of eastern DRC to provide women and couples access to family planning, including long-acting reversible contraceptives (LARCs). This article presents routine program data from June 2011 through December 2013 from 2 health zones as well as results from a qualitative assessment of family planning clients and of male and female non-users, conducted in 2013. It then describes how these findings were used to make program adjustments to improve access to family planning services and client informed choice and assesses the effects of the program design changes on family planning uptake and method mix using routine program data from January 2014 through December 2016. Between 2011 and 2013, 8,985 clients adopted family planning, with an average 14 clients adopting a method per facility, per month. The method mix remained stable during this period, with implants dominating at 48%. Barriers to uptake identified from the qualitative research were both supply- and demand-related, including misconceptions about certain modern contraceptive methods on the part of providers, users, and other community members. The program implemented several program changes based on the assessment findings, including clinical coaching and supportive supervision to improve provider skills and attitudes, introduction of immediate postpartum insertion of the intrauterine device (IUD) and the levonorgestrel-releasing intrauterine system (LNG-IUS), and behavior change communication campaigns to raise awareness about family planning. After these program changes, the mean number of clients adopting modern family planning per facility, per month

  16. Using Program Data to Improve Access to Family Planning and Enhance the Method Mix in Conflict-Affected Areas of the Democratic Republic of the Congo.

    Science.gov (United States)

    Ho, Lara S; Wheeler, Erin

    2018-03-21

    Unmet need for family planning in the conflict-affected area of eastern Democratic Republic of the Congo (DRC) has been reported to be as high as 38%, and women in such conflict settings are often the most at risk for maternal mortality. The International Rescue Committee implements the Family Planning and Post-Abortion Care in Emergencies program in 3 provinces of eastern DRC to provide women and couples access to family planning, including long-acting reversible contraceptives (LARCs). This article presents routine program data from June 2011 through December 2013 from 2 health zones as well as results from a qualitative assessment of family planning clients and of male and female non-users, conducted in 2013. It then describes how these findings were used to make program adjustments to improve access to family planning services and client informed choice and assesses the effects of the program design changes on family planning uptake and method mix using routine program data from January 2014 through December 2016. Between 2011 and 2013, 8,985 clients adopted family planning, with an average 14 clients adopting a method per facility, per month. The method mix remained stable during this period, with implants dominating at 48%. Barriers to uptake identified from the qualitative research were both supply- and demand-related, including misconceptions about certain modern contraceptive methods on the part of providers, users, and other community members. The program implemented several program changes based on the assessment findings, including clinical coaching and supportive supervision to improve provider skills and attitudes, introduction of immediate postpartum insertion of the intrauterine device (IUD) and the levonorgestrel-releasing intrauterine system (LNG-IUS), and behavior change communication campaigns to raise awareness about family planning. After these program changes, the mean number of clients adopting modern family planning per facility, per month

  17. Oxygen-doped zirconium nitride based transparent resistive random access memory devices fabricated by radio frequency sputtering method

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hee-Dong, E-mail: khd0708@sejong.ac.kr [Department of Electrical Engineering, Sejong University, Neungdong-ro 209, Gwangjin-gu, Seoul 143-747 (Korea, Republic of); Yun, Min Ju [Department of Electrical Engineering, Sejong University, Neungdong-ro 209, Gwangjin-gu, Seoul 143-747 (Korea, Republic of); Kim, Kyeong Heon [School of Electrical Engineering, Korea University, Anam-dong, Sungbuk-gu, Seoul 163-701 (Korea, Republic of); Kim, Sungho, E-mail: sungho85.kim@sejong.ac.kr [Department of Electrical Engineering, Sejong University, Neungdong-ro 209, Gwangjin-gu, Seoul 143-747 (Korea, Republic of)

    2016-08-05

    In this work, we present a feasibility of bipolar resistive switching (RS) characteristics for Oxygen-doped zirconium nitride (O-doped ZrN{sub x}) films, produced by sputtering method, which shows a high optical transmittance of approximately 78% in the visible region as well as near ultra-violet region. In addition, in a RS test, the device has a large current ratio of 5 × 10{sup 3} in positive bias region and 5 × 10{sup 5} in negative bias region. Then, to evaluate an ability of data storage for the proposed memory devices, we measured a retention time for 10{sup 4} s at room temperature (RT) and 85 °C as well. As a result, the set and reset states were stably maintained with a current ratio of ∼10{sup 2} at 85 °C to ∼10{sup 3} at RT. This result means that the transparent memory by controlling the working pressure during sputtering process to deposit the ZrN{sub x} films could be a milestone for future see-through electronic devices. - Highlights: • The resistive switching characteristics of the transparent O-doped ZrN{sub x}-based RRAM cells have investigated. • Oxygen doping concentration within ZrN{sub x} is optimized using working pressure of sputter. • Long retention time were observed.

  18. Oxygen-doped zirconium nitride based transparent resistive random access memory devices fabricated by radio frequency sputtering method

    International Nuclear Information System (INIS)

    Kim, Hee-Dong; Yun, Min Ju; Kim, Kyeong Heon; Kim, Sungho

    2016-01-01

    In this work, we present a feasibility of bipolar resistive switching (RS) characteristics for Oxygen-doped zirconium nitride (O-doped ZrN_x) films, produced by sputtering method, which shows a high optical transmittance of approximately 78% in the visible region as well as near ultra-violet region. In addition, in a RS test, the device has a large current ratio of 5 × 10"3 in positive bias region and 5 × 10"5 in negative bias region. Then, to evaluate an ability of data storage for the proposed memory devices, we measured a retention time for 10"4 s at room temperature (RT) and 85 °C as well. As a result, the set and reset states were stably maintained with a current ratio of ∼10"2 at 85 °C to ∼10"3 at RT. This result means that the transparent memory by controlling the working pressure during sputtering process to deposit the ZrN_x films could be a milestone for future see-through electronic devices. - Highlights: • The resistive switching characteristics of the transparent O-doped ZrN_x-based RRAM cells have investigated. • Oxygen doping concentration within ZrN_x is optimized using working pressure of sputter. • Long retention time were observed.

  19. Access to Difficult-to-reach Population Subgroups: A Family Midwife Based Home Visiting Service for Implementing Nutrition-related Preventive Activities - A Mixed Methods Explorative Study

    Directory of Open Access Journals (Sweden)

    Helena Walz

    2015-08-01

    Full Text Available Health and social inequality are tightly linked and still pose an important public health problem. However, vulnerable and disadvantaged populations are difficult to reach for health-related interventions. Given the long-lasting effects of an adverse, particular nutrition-related, intrauterine and neonatal environment on health development (perinatal programming, an early and easy access is essential for sustainable interventions. The goal of this explorative study was therefore to elucidate whether an existing access of family midwives (FMs to families in need of support could be an option to implement effective public health and nutrition interventions. To that end three research objectives were formulated: (1 to determine whether a discernible impact of home visits by FMs can be described; (2 to identify subgroups among these families in need of more specific interventions; (3 to determine how relevant nutrition-related topics are for both FMs and the supported families. For addressing these objectives a mixed methods design was used: Routine documentation data from 295 families visited by a family midwife (FM were analyzed (secondary analysis, and structured expert interviews with FMs were conducted and analyzed. Study reporting followed the STROBE (STrengthening the Reporting of OBservational studies in Epidemiology statement. Based on the FMs reports, a significant improvement (p < 0.001 regarding psycho-social variables could be determined after the home visits. Single mothers, however, seemed to benefit less from the FMs service compared to their counterparts (p = 0.015. Nutritional counseling was demanded by 89% of the families during the home visits. In addition, nutrition-related topics were reported in the interviews to be of high interest to both families and the FMs. Based on the obtained results it is concluded that FMs home visits offer a promising access to vulnerable and disadvantaged families for implementing nutrition

  20. Beverage consumption in an Alaska Native village: a mixed-methods study of behaviour, attitudes and access

    Directory of Open Access Journals (Sweden)

    Deena Elwan

    2016-02-01

    Full Text Available Background: American Indians/Alaska Natives (AI/AN have the highest prevalence of obesity for any racial/ethnic group. Previous studies examining risk factors for obesity have identified excessive sugar-sweetened beverage (SSB and inadequate water consumption as major risk factors for this population group. The historical scarcity of water in rural Alaska may explain consumption patterns including reliance on SSBs and other packaged drinks. Methods: Our study was designed to assess SSB, water and other beverage consumption and attitudes towards consumption in Alaska Native children and adults residing in rural Alaska. During summer 2014, 2 focus groups were conducted employing community members in a small rural village more than 200 air miles west of Fairbanks, Alaska. Interviews were completed with shop owners, Early Head Start and Head Start program instructors (n=7. SSB and total beverage intakes were measured using a modified version of the BEVQ-15, (n=69. Results: High rates of SSB consumption (defined as sweetened juice beverages, soda, sweet tea, energy drink or sports drinks and low rates of water consumption were reported for all age groups in the village. All adolescents and 81% of children reported drinking SSBs at least once per week in the last month, and 48% of adolescents and 29% of younger children reported daily consumption. Fifty-two per cent of adults reported consuming SSBs at least once per week and 20% reported daily consumption. Twenty-five per cent of adolescents reported never drinking water in the past month, and 19% of younger children and 21% of adults did not consume water daily. Conclusion: Alaska Native children and adults living in the Interior Alaska consume high amounts of SSBs including energy drinks and insufficient amounts of water. Interventions targeting beverage consumption are urgently needed for the Alaska Native population in rural Alaska.

  1. Access Contested

    International Development Research Centre (IDRC) Digital Library (Canada)

    Transforming Global Information and Communication Markets: The Political Economy of ... 8 Control and Resistance: Attacks on Burmese Opposition Media 153 ...... “Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet,” in Access ...

  2. Forbidden Access

    CERN Multimedia

    C. Colloca TS/FM

    2004-01-01

    TS/FM group informs you that, for the replacement of the door of the main entrance at bldg. 500, the access will be closed to the public between 19 and 30 July 2004. Access to the Main Building complex will be assured at any time through both of the side doors and from bldg. 64. For more information, please contact 73273. C. Colloca TS/FM

  3. Sophisticated approval voting, ignorance priors, and plurality heuristics: a behavioral social choice analysis in a Thurstonian framework.

    Science.gov (United States)

    Regenwetter, Michel; Ho, Moon-Ho R; Tsetlin, Ilia

    2007-10-01

    This project reconciles historically distinct paradigms at the interface between individual and social choice theory, as well as between rational and behavioral decision theory. The authors combine a utility-maximizing prescriptive rule for sophisticated approval voting with the ignorance prior heuristic from behavioral decision research and two types of plurality heuristics to model approval voting behavior. When using a sincere plurality heuristic, voters simplify their decision process by voting for their single favorite candidate. When using a strategic plurality heuristic, voters strategically focus their attention on the 2 front-runners and vote for their preferred candidate among these 2. Using a hierarchy of Thurstonian random utility models, the authors implemented these different decision rules and tested them statistically on 7 real world approval voting elections. They cross-validated their key findings via a psychological Internet experiment. Although a substantial number of voters used the plurality heuristic in the real elections, they did so sincerely, not strategically. Moreover, even though Thurstonian models do not force such agreement, the results show, in contrast to common wisdom about social choice rules, that the sincere social orders by Condorcet, Borda, plurality, and approval voting are identical in all 7 elections and in the Internet experiment. PsycINFO Database Record (c) 2007 APA, all rights reserved.

  4. Yersinia virulence factors - a sophisticated arsenal for combating host defences [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Steve Atkinson

    2016-06-01

    Full Text Available The human pathogens Yersinia pseudotuberculosis and Yersinia enterocolitica cause enterocolitis, while Yersinia pestis is responsible for pneumonic, bubonic, and septicaemic plague. All three share an infection strategy that relies on a virulence factor arsenal to enable them to enter, adhere to, and colonise the host while evading host defences to avoid untimely clearance. Their arsenal includes a number of adhesins that allow the invading pathogens to establish a foothold in the host and to adhere to specific tissues later during infection. When the host innate immune system has been activated, all three pathogens produce a structure analogous to a hypodermic needle. In conjunction with the translocon, which forms a pore in the host membrane, the channel that is formed enables the transfer of six ‘effector’ proteins into the host cell cytoplasm. These proteins mimic host cell proteins but are more efficient than their native counterparts at modifying the host cell cytoskeleton, triggering the host cell suicide response. Such a sophisticated arsenal ensures that yersiniae maintain the upper hand despite the best efforts of the host to counteract the infecting pathogen.

  5. The intracavitary ECG method for positioning the tip of central venous access devices in pediatric patients: results of an Italian multicenter study.

    Science.gov (United States)

    Rossetti, Francesca; Pittiruti, Mauro; Lamperti, Massimo; Graziano, Ugo; Celentano, Davide; Capozzoli, Giuseppe

    2015-01-01

    The Italian Group for Venous Access Devices (GAVeCeLT) has carried out a multicenter study investigating the safety and accuracy of intracavitary electrocardiography (IC-ECG) in pediatric patients. We enrolled 309 patients (age 1 month-18 years) candidate to different central venous access devices (VAD) - 56 peripherally inserted central catheters (PICC), 178 short term centrally inserted central catheters (CICC), 65 long term VADs, 10 VADs for dialysis - in five Italian Hospitals. Three age groups were considered: A (ECG was applicable in 307 cases. The increase of the P wave on IC-ECG was detected in all cases but two. The tip of the catheter was positioned at the cavo-atrial junction (CAJ) (i.e., at the maximal height of the P wave on IC-ECG) and the position was checked during the procedure by fluoroscopy or chest x-ray, considering the CAJ at 1-2 cm (group A), 1.5-3 cm (group B), or 2-4 cm (group C) below the carina. There were no complications related to IC-ECG. The overall match between IC-ECG and x-ray was 95.8% (96.2% in group A, 95% in group B, and 96.8% in group C). In 95 cases, the IC-ECG was performed with a dedicated ECG monitor, specifically designed for IC-ECG (Nautilus, Romedex): in this group, the match between IC-ECG and x-ray was 98.8%. We conclude that the IC-ECG method is safe and accurate in the pediatric patients. The applicability of the method is 99.4% and its feasibility is 99.4%. The accuracy is 95.8% and even higher (98.8%) when using a dedicated ECG monitor.

  6. Improving access to high-quality primary care for socioeconomically disadvantaged older people in rural areas: a mixed method study protocol.

    Science.gov (United States)

    Ford, John A; Jones, Andrew P; Wong, Geoff; Clark, Allan B; Porter, Tom; Shakespeare, Tom; Swart, Ann Marie; Steel, Nicholas

    2015-09-18

    The UK has an ageing population, especially in rural areas, where deprivation is high among older people. Previous research has identified this group as at high risk of poor access to healthcare. The aim of this study is to generate a theory of how socioeconomically disadvantaged older people from rural areas access primary care, to develop an intervention based on this theory and test it in a feasibility trial. On the basis of the MRC Framework for Developing and Evaluating Complex Interventions, three methods will be used to generate the theory. First, a realist review will elucidate the patient pathway based on existing literature. Second, an analysis of the English Longitudinal Study of Ageing will be completed using structural equation modelling. Third, 15 semistructured interviews will be undertaken with patients and four focus groups with health professionals. A triangulation protocol will be used to allow each of these methods to inform and be informed by each other, and to integrate data into one overall realist theory. Based on this theory, an intervention will be developed in discussion with stakeholders to ensure that the intervention is feasible and practical. The intervention will be tested within a feasibility trial, the design of which will depend on the intervention. Lessons from the feasibility trial will be used to refine the intervention and gather the information needed for a definitive trial. Ethics approval from the regional ethics committee has been granted for the focus groups with health professionals and interviews with patients. Ethics approval will be sought for the feasibility trial after the intervention has been designed. Findings will be disseminated to the key stakeholders involved in intervention development, to researchers, clinicians and health planners through peer-reviewed journal articles and conference publications, and locally through a dissemination event. Published by the BMJ Publishing Group Limited. For permission to

  7. Accessible Knowledge - Knowledge on Accessibility

    DEFF Research Database (Denmark)

    Kirkeby, Inge Mette

    2015-01-01

    Although serious efforts are made internationally and nationally, it is a slow process to make our physical environment accessible. In the actual design process, architects play a major role. But what kinds of knowledge, including research-based knowledge, do practicing architects make use of when...... designing accessible environments? The answer to the question is crucially important since it affects how knowledge is distributed and how accessibility can be ensured. In order to get first-hand knowledge about the design process and the sources from which they gain knowledge, 11 qualitative interviews...... were conducted with architects with experience of designing for accessibility. The analysis draws on two theoretical distinctions. The first is research-based knowledge versus knowledge used by architects. The second is context-independent knowledge versus context-dependent knowledge. The practitioners...

  8. Open access

    CERN Document Server

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder consent, and many authors, musicians, filmmakers, and other creators who depend on royalties are understandably unwilling to give their consent. But for 350 years, scholars have written peer-reviewed journal articles for impact, not for money, and are free to consent to open access without losing revenue. In this concise introduction, Peter Suber tells us what open access is and isn't, how it benefits authors and readers of research, how we pay for it, how it avoids copyright problems, how it has moved from the periphery to the mainstream, and what its future may hold. Distilling a decade of Suber's influential writing and thinking about open access, this is the indispe...

  9. A Snapshot of Serial Rape: An Investigation of Criminal Sophistication and Use of Force on Victim Injury and Severity of the Assault.

    Science.gov (United States)

    de Heer, Brooke

    2016-02-01

    Prior research on rapes reported to law enforcement has identified criminal sophistication and the use of force against the victim as possible unique identifiers to serial rape versus one-time rape. This study sought to contribute to the current literature on reported serial rape by investigating how the level of criminal sophistication of the rapist and use of force used were associated with two important outcomes of rape: victim injury and overall severity of the assault. In addition, it was evaluated whether rapist and victim ethnicity affected these relationships. A nation-wide sample of serial rape cases reported to law enforcement collected by the Federal Bureau of Investigation (FBI) was analyzed (108 rapists, 543 victims). Results indicated that serial rapists typically used a limited amount of force against the victim and displayed a high degree of criminal sophistication. In addition, the more criminally sophisticated the perpetrator was, the more sexual acts he performed on his victim. Finally, rapes between a White rapist and White victim were found to exhibit higher levels of criminal sophistication and were more severe in terms of number and types of sexual acts committed. These findings provide a more in-depth understanding of serial rape that can inform both academics and practitioners in the field about contributors to victim injury and severity of the assault. © The Author(s) 2014.

  10. Access French

    CERN Document Server

    Grosz, Bernard

    2014-01-01

    Access is the major new language series designed with the needs of today's generation of students firmly in mind. Whether learning for leisure or business purposes or working towards a curriculum qualification, Access French is specially designed for adults of all ages and gives students a thorough grounding in all the skills required to understand, speak, read and write contemporary French from scratch. The coursebook consists of 10 units covering different topic areas, each of which includes Language Focus panels explaining the structures covered and a comprehensive glossary. Learning tips

  11. Time dependent accessibility

    OpenAIRE

    Kaza, Nikhil

    2015-01-01

    Many place based accessibility studies ignore the time component. Relying on theoretical frameworks that treat distance between two fixed points as constant, these methods ignore the diurnal and seasonal changes in accessibility. Network distances between two nodes are dependent on the network structure and weight distribution on the edges. These weights can change quite frequently and the network structure itself is subject to modification because of availability and unavailability of links ...

  12. Rationale, design and methods for a randomised and controlled trial to investigate whether home access to electronic games decreases children's physical activity

    Directory of Open Access Journals (Sweden)

    Piek Jan P

    2009-06-01

    Full Text Available Abstract Background Many children are reported to have insufficient physical activity (PA placing them at greater risk of poor health outcomes. Participating in sedentary activities such as playing electronic games is widely believed to contribute to less PA. However there is no experimental evidence that playing electronic games reduces PA. There is also no evidence regarding the effect of different types of electronic games (traditional sedentary electronic games versus new active input electronic games on PA. Further, there is a poor understanding about how characteristics of children may moderate the impact of electronic game access on PA and about what leisure activities are displaced when children play electronic games. Given that many children play electronic games, a better understanding of the effect of electronic game use on PA is critical to inform child health policy and intervention. Methods This randomised and controlled trial will examine whether PA is decreased by access to electronic games and whether any effect is dependent on the type of game input or the child's characteristics. Children aged 10–12 years (N = 72, 36 females will be recruited and randomised to a balanced ordering of 'no electronic games', 'traditional' electronic games and 'active' electronic games. Each child will participate in each condition for 8 weeks, and be assessed prior to participation and at the end of each condition. The primary outcome is PA, assessed by Actical accelerometers worn for 7 days on the wrist and hip. Energy expenditure will be assessed by the doubly labelled water technique and motor coordination, adiposity, self-confidence, attitudes to technology and PA and leisure activities will also be assessed. A sample of 72 will provide a power of > 0.9 for detecting a 15 mins difference in PA (sd = 30 mins. Discussion This is the first such trial and will provide critical information to understand whether access to electronic games affects

  13. Evaluation of an open access echocardiography service in the Netherlands: a mixed methods study of indications, outcomes, patient management and trends

    Directory of Open Access Journals (Sweden)

    Streppel Marjolijn

    2010-02-01

    Full Text Available Abstract Background In our region (Eastern South Limburg, The Netherlands an open access echocardiography service started in 2002. It was the first service of this kind in The Netherlands. Our study aims were: (1 to evaluate demand for the service, participation, indications, echocardiography outcomes, and management by the general practitioner (GP; (2 to analyse changes in indications and outcomes over the years. Methods (1 Data from GP request forms, echocardiography reports and a retrospective GP questionnaire on management (response rate 83% of 625 consecutive patients (Dec. 2002 - March 2007 were analysed cross-sectionally. (2 For the analysis of changes over the years, data from GP request forms and echocardiography reports of the first and last 250 patients that visited the service between Dec. 2002 and Feb. 2008 (n = 1001 were compared. Results The echocardiography service was used by 81% of the regional GPs. On average, a GP referred one patient per year to the service. Intended indications for the service were dyspnoea (32%, cardiac murmur (59%, and peripheral oedema (17%. Of the other indications (22%, one-third was for evaluation of suspected left ventricular hypertrophy (LVH. Expected outcomes were left ventricular dysfunction (LVD (43%, predominantly diastolic and valve disease (25%. We also found a high proportion of LVH (50%. Only 24% of all echocardiograms showed no relevant disease. The GP followed the cardiologist's advice to refer the patient for further evaluation in 71%. In recent patients, more echocardiography requests were done for 'cardiac murmur' and 'other' indications, but less for 'dyspnoea'. The proportions of patients with LVD, LVH and valve disease decreased and the proportion of patients with no relevant disease increased. The number of advices by the cardiologists increased. Conclusion Overall, GPs used the open access echocardiography service efficiently (i.e. with a high chance of finding relevant pathology

  14. Gaining Access.

    Science.gov (United States)

    Wand, Sean; Thermos, Adam C.

    1998-01-01

    Explains the issues to consider before a college decides to purchase a card-access system. The benefits of automation, questions involving implementation, the criteria for technology selection, what typical card technology involves, privacy concerns, and the placement of card readers are discussed. (GR)

  15. A simple method using on-line continuous leaching and ion exchange chromatography coupled to inductively coupled plasma mass spectrometry for the speciation analysis of bio-accessible arsenic in rice.

    Science.gov (United States)

    Horner, Nolan S; Beauchemin, Diane

    2012-03-02

    A simple method for the speciation analysis of bio-accessible arsenic (As) in rice was developed using a continuous on-line leaching method to release the bio-accessible fraction. The continuous on-line leaching method has several advantages over commonly used batch methods including quicker and easier sample preparation, reduced risk of contamination and access to real time leaching data. The bio-accessibility of As in the samples was monitored using inductively coupled plasma mass spectrometry (ICP-MS). Results from a certified reference material as well as cooked and uncooked white rice showed that the majority of As was leached by saliva. Results obtained using the continuous on-line leaching method were comparable to those obtained using a batch method. Speciation analysis of the saliva leachate was performed using ion exchange chromatography coupled to ICP-MS. The four most toxic forms of As (As(III), monomethylarsonic acid (MMA), dimethylarsinic acid (DMA) and As(V)) were clearly separated within 5 min in a single chromatographic run. Over 92% of bio-accessible As in the certified reference material and uncooked white rice sample was in the form of DMA and As(V), whereas it was present as DMA and As(III) in the cooked white rice. Copyright © 2011 Elsevier B.V. All rights reserved.

  16. Developing a Holistic Approach for E-Learning Accessibility

    Directory of Open Access Journals (Sweden)

    Brian Kelly

    2004-10-01

    Full Text Available The importance of accessibility to digital resources is now widely acknowledged. The W3C WAI has played a significant role in promoting the importance of accessibility and developing a framework for accessible Web resources. The accessibility of e-learning provides additional challenges that may not be faced when providing access to other Web resources. The authors argue that there is a need for a more sophisticated model for addressing e-learning accessibility which takes into account the usability of e-learning, pedagogic issues and student learning styles in addition to technical and resource issues. The authors expand on these issues and propose a holistic model for the development of accessible e-learning resources.

  17. Development of the relaxation-assisted 2DIR method for accessing structures of molecules and its application for studying the energy transport on a molecular level

    Science.gov (United States)

    Kasyanenko, Valeriy Mitrofanovich

    Measuring the three-dimensional structure of molecules, dynamics of structural changes, and energy transport on a molecular scale is important for many areas of natural science. Supplementing the widely used methods of x-ray diffraction, NMR, and optical spectroscopies, a two-dimensional infrared spectroscopy (2DIR) method was introduced about a decade ago. The 2DIR method measures pair-wise interactions between vibrational modes in molecules, thus acquiring molecular structural constraints such as distances between vibrating groups and the angles between their transition dipoles. The 2DIR method has been applied to a variety of molecular systems but in studying larger molecules such as proteins and peptides the method is facing challenges associated with the congestion of their vibrational spectra and delocalized character of their vibrational modes. To help extract structural information from such spectra and make efficient use of vibrational modes separated by large distances, a novel relaxation-assisted 2DIR method (RA 2DIR) has recently been proposed, which exploits the transport of excess vibrational energy from the initially excited mode. With the goal of further development of RA 2DIR, we applied it to a variety of molecular systems, including model compounds, transition-metal complexes, and isomers. The experiments revealed several novel effects which both enhance the power of RA 2DIR and bring a deeper understanding to the fundamental process of energy transport on a molecular level. We demonstrated that RA 2DIR can enhance greatly (27-fold) the cross-peak amplitude among spatially remote modes, which leads to an increase of the range of distances accessible for structural measurements by several fold. We demonstrated that the energy transport time correlates with the intermode distance. This correlation offers a new way for identifying connectivity patterns in molecules. We developed two models of energy transport in molecules. In one, a spatial overlap

  18. Bulk derivatization and cation exchange restricted access media-based trap-and-elute liquid chromatography–mass spectrometry method for determination of trace estrogens in serum

    International Nuclear Information System (INIS)

    Beinhauer, Jana; Bian, Liangqiao; Fan, Hui; Šebela, Marek; Kukula, Maciej; Barrera, Jose A.

    2015-01-01

    Highlights: • Analysis of estrogens in small volume samples at low parts-per-trillion concentration. • Charged bulk derivatization facilitates on-line ion exchange sample preparation. • On-line WCX restricted access media traps analytes, but not proteins and lipids. • Complete preparation and LC–MS/MS analysis completed in 30 min/sample. - Abstract: Estrone (E1), estradiols (α/β-E2), and estriol (E3) are four major metabolically active estrogens exerting strong biological activities at very low circulating concentrations. This paper reports a sensitive and efficient method with automated, on-line clean-up and detection to determine trace estrogens in a small volume of serum samples using liquid chromatography–electrospray ionization–tandem mass spectrometry directly, without off-line liquid–liquid or solid-phase extraction pretreatments. Serum aliquots (charcoal stripped fetal bovine serum, 100 μL) were spiked with four estrogen standards and their corresponding isotope-labeled internal standards, then bulk derivatized with 2-fluoro-1-methyl-pyridium p-toluenesulfonate (2-FMP) to establish the calibration curves and perform method validation. Calibration was established in the concentration ranges of 5–1000 pg mL −1 , and demonstrated good linearity of R 2 from 0.9944 to 0.9997 for the four derivatized estrogens. The lower detection limits obtained were 3–7 pg mL −1 . Good accuracy and precision in the range of 86–112% and 2.3–11.9%, respectively, were observed for the quality control (QC) samples at low, medium, and high concentration levels. The stability tests showed that the derivatized serum samples were stable 8 h after derivatization at room temperature and at least to 48 h if stored at −20 °C. The method was applied to measure trace estrogens in real human and bovine serum samples, and three of four estrogen compounds studied were observed and quantified

  19. Remote Access to Instrumental Analysis for Distance Education in Science

    Directory of Open Access Journals (Sweden)

    Dietmar Kennepohl

    2005-11-01

    Full Text Available Remote access to experiments offers distance educators another tool to integrate a strong laboratory component within a science course. Since virtually all modern chemical instrumental analysis in industry now use devices operated by a computer interface, remote control of instrumentation is not only relatively facile, it enhances students’ opportunity to learn the subject matter and be exposed to “real world” contents. Northern Alberta Institute of Technology (NAIT and Athabasca University are developing teaching laboratories based on the control of analytical instruments in real-time via an Internet connection. Students perform real-time analysis using equipment, methods, and skills that are common to modern analytical laboratories (or sophisticated teaching laboratories. Students obtain real results using real substances to arrive at real conclusions, just as they would if they were in a physical laboratory with the equipment; this approach allows students to access to conduct instrumental science experiments, thus providing them with an advantageous route to upgrade their laboratory skills while learning at a distance.

  20. Sophisticated Epistemologies of Physics versus High-Stakes Tests: How Do Elite High School Students Respond to Competing Influences about How to Learn Physics?

    Science.gov (United States)

    Yerdelen-Damar, Sevda; Elby, Andrew

    2016-01-01

    This study investigates how elite Turkish high school physics students claim to approach learning physics when they are simultaneously (i) engaged in a curriculum that led to significant gains in their epistemological sophistication and (ii) subject to a high-stakes college entrance exam. Students reported taking surface (rote) approaches to…

  1. Error free physically unclonable function with programmed resistive random access memory using reliable resistance states by specific identification-generation method

    Science.gov (United States)

    Tseng, Po-Hao; Hsu, Kai-Chieh; Lin, Yu-Yu; Lee, Feng-Min; Lee, Ming-Hsiu; Lung, Hsiang-Lan; Hsieh, Kuang-Yeu; Chung Wang, Keh; Lu, Chih-Yuan

    2018-04-01

    A high performance physically unclonable function (PUF) implemented with WO3 resistive random access memory (ReRAM) is presented in this paper. This robust ReRAM-PUF can eliminated bit flipping problem at very high temperature (up to 250 °C) due to plentiful read margin by using initial resistance state and set resistance state. It is also promised 10 years retention at the temperature range of 210 °C. These two stable resistance states enable stable operation at automotive environments from -40 to 125 °C without need of temperature compensation circuit. The high uniqueness of PUF can be achieved by implementing a proposed identification (ID)-generation method. Optimized forming condition can move 50% of the cells to low resistance state and the remaining 50% remain at initial high resistance state. The inter- and intra-PUF evaluations with unlimited separation of hamming distance (HD) are successfully demonstrated even under the corner condition. The number of reproduction was measured to exceed 107 times with 0% bit error rate (BER) at read voltage from 0.4 to 0.7 V.

  2. Using shared goal setting to improve access and equity: a mixed methods study of the Good Goals intervention in children’s occupational therapy

    Directory of Open Access Journals (Sweden)

    Kolehmainen Niina

    2012-08-01

    Full Text Available Abstract Background Access and equity in children’s therapy services may be improved by directing clinicians’ use of resources toward specific goals that are important to patients. A practice-change intervention (titled ‘Good Goals’ was designed to achieve this. This study investigated uptake, adoption, and possible effects of that intervention in children’s occupational therapy services. Methods Mixed methods case studies (n = 3 services, including 46 therapists and 558 children were conducted. The intervention was delivered over 25 weeks through face-to-face training, team workbooks, and ‘tools for change’. Data were collected before, during, and after the intervention on a range of factors using interviews, a focus group, case note analysis, routine data, document analysis, and researchers’ observations. Results Factors related to uptake and adoptions were: mode of intervention delivery, competing demands on therapists’ time, and leadership by service manager. Service managers and therapists reported that the intervention: helped therapists establish a shared rationale for clinical decisions; increased clarity in service provision; and improved interactions with families and schools. During the study period, therapists’ behaviours changed: identifying goals, odds ratio 2.4 (95% CI 1.5 to 3.8; agreeing goals, 3.5 (2.4 to 5.1; evaluating progress, 2.0 (1.1 to 3.5. Children’s LoT decreased by two months [95% CI −8 to +4 months] across the services. Cost per therapist trained ranged from £1,003 to £1,277, depending upon service size and therapists’ salary bands. Conclusions Good Goals is a promising quality improvement intervention that can be delivered and adopted in practice and may have benefits. Further research is required to evaluate its: (i impact on patient outcomes, effectiveness, cost-effectiveness, and (ii transferability to other clinical contexts.

  3. Web accessibility standards and disability: developing critical perspectives on accessibility.

    Science.gov (United States)

    Lewthwaite, Sarah

    2014-01-01

    accessibility blending digital and physical solutions, the use of BS 8878 and mixed-method approaches to accessibility benchmarking. Web standards and accessibility conformance should be considered together with user input and the recognition and development of local accessibility and rehabilitation expertize.

  4. Accessing Sexual and Reproductive Health Information and ...

    African Journals Online (AJOL)

    Accessing Sexual and Reproductive Health Information and Services: A Mixed Methods Study of Young ... PROMOTING ACCESS TO AFRICAN RESEARCH ... and services in Soweto, South Africa using quantitative and qualitative methods.

  5. Bulk derivatization and cation exchange restricted access media-based trap-and-elute liquid chromatography–mass spectrometry method for determination of trace estrogens in serum

    Energy Technology Data Exchange (ETDEWEB)

    Beinhauer, Jana [Department of Biochemistry, Faculty of Science, Palacký University, Šlechtitelů 11, CZ-783 71 Olomouc (Czech Republic); Centre of the Region Haná for Biotechnological and Agricultural Research - Department of Protein Biochemistry and Proteomics, Faculty of Science, Palacký University, Šlechtitelů 11, CZ-783 71 Olomouc (Czech Republic); Bian, Liangqiao [Shimadzu Center for Advanced Analytical Chemistry, The University of Texas at Arlington, Arlington, TX (United States); Shimadzu Institute for Research Technologies, The University of Texas at Arlington, Arlington, TX (United States); Fan, Hui [Department of Chemistry and Biochemistry, The University of Texas at Arlington, Arlington, TX (United States); Šebela, Marek [Department of Biochemistry, Faculty of Science, Palacký University, Šlechtitelů 11, CZ-783 71 Olomouc (Czech Republic); Centre of the Region Haná for Biotechnological and Agricultural Research - Department of Protein Biochemistry and Proteomics, Faculty of Science, Palacký University, Šlechtitelů 11, CZ-783 71 Olomouc (Czech Republic); Kukula, Maciej [Shimadzu Center for Advanced Analytical Chemistry, The University of Texas at Arlington, Arlington, TX (United States); Shimadzu Institute for Research Technologies, The University of Texas at Arlington, Arlington, TX (United States); Barrera, Jose A. [Shimadzu Institute for Research Technologies, The University of Texas at Arlington, Arlington, TX (United States); and others

    2015-02-09

    Highlights: • Analysis of estrogens in small volume samples at low parts-per-trillion concentration. • Charged bulk derivatization facilitates on-line ion exchange sample preparation. • On-line WCX restricted access media traps analytes, but not proteins and lipids. • Complete preparation and LC–MS/MS analysis completed in 30 min/sample. - Abstract: Estrone (E1), estradiols (α/β-E2), and estriol (E3) are four major metabolically active estrogens exerting strong biological activities at very low circulating concentrations. This paper reports a sensitive and efficient method with automated, on-line clean-up and detection to determine trace estrogens in a small volume of serum samples using liquid chromatography–electrospray ionization–tandem mass spectrometry directly, without off-line liquid–liquid or solid-phase extraction pretreatments. Serum aliquots (charcoal stripped fetal bovine serum, 100 μL) were spiked with four estrogen standards and their corresponding isotope-labeled internal standards, then bulk derivatized with 2-fluoro-1-methyl-pyridium p-toluenesulfonate (2-FMP) to establish the calibration curves and perform method validation. Calibration was established in the concentration ranges of 5–1000 pg mL{sup −1}, and demonstrated good linearity of R{sup 2} from 0.9944 to 0.9997 for the four derivatized estrogens. The lower detection limits obtained were 3–7 pg mL{sup −1}. Good accuracy and precision in the range of 86–112% and 2.3–11.9%, respectively, were observed for the quality control (QC) samples at low, medium, and high concentration levels. The stability tests showed that the derivatized serum samples were stable 8 h after derivatization at room temperature and at least to 48 h if stored at −20 °C. The method was applied to measure trace estrogens in real human and bovine serum samples, and three of four estrogen compounds studied were observed and quantified.

  6. Access control system operation

    International Nuclear Information System (INIS)

    Barnes, L.D.

    1981-06-01

    An automated method for the control and monitoring of personnel movement throughout the site was developed under contract to the Department of Energy by Allied-General Nuclear Services (AGNS) at the Barnwell Nuclear Fuel Plant (BNFP). These automated features provide strict enforcement of personnel access policy without routine patrol officer involvement. Identification methods include identification by employee ID number, identification by voice verification and identification by physical security officer verification. The ability to grant each level of access authority is distributed over the organization to prevent any single individual at any level in the organization from being capable of issuing an authorization for entry into sensitive areas. Each access event is recorded. As access events occur, the inventory of both the entered and the exited control area is updated so that a current inventory is always available for display. The system has been operated since 1979 in a development mode and many revisions have been implemented in hardware and software as areas were added to the system. Recent changes have involved the installation of backup systems and other features required to achieve a high reliability. The access control system and recent operating experience are described

  7. Kinds of Access

    DEFF Research Database (Denmark)

    Overgaard, Morten; Sandberg, Kristian

    2014-01-01

    that there is not only a theoretical, but also an empirical difference between different methods of reporting. We hypothesise that differences in the sensitivity of different scales may reveal that different types of access are used to issue direct reports about experiences and metacognitive reports about...

  8. "They just scraped off the calluses": a mixed methods exploration of foot care access and provision for people with rheumatoid arthritis in south-western Sydney, Australia.

    Science.gov (United States)

    Hendry, Gordon J; Gibson, Kathryn A; Pile, Kevin; Taylor, Luke; Du Toit, Verona; Burns, Joshua; Rome, Keith

    2013-08-13

    There is little indication that foot health services in Australia are meeting modern day recommendations for Rheumatoid Arthritis (RA) patients. The overall objective of this study was to explore the current state of foot health services for patients with RA with an emphasis on identifying barriers to the receipt of appropriate foot care in South-West Sydney, New South Wales, Australia. A mixed (quantitative and qualitative) approach was adopted. Indications for appropriate access to foot care were determined by comparing the foot health, disease and socio-demographic characteristics of patients with unmet foot care demands, foot care users and patients with no demands for foot care. Perceptions of provision of, and access to, foot care were explored by conducting telephone-based interviews using an interpretative phenomenology approach with thematic analysis. Twenty-nine participants took part in the cross-sectional quantitative research study design, and 12 participants took part in the interpretative phenomenological approach (qualitative study). Foot care access appeared to be driven predominantly by the presence of rearfoot deformity, which was significantly worse amongst participants in the foot care user group (p = 0.02). Five main themes emerged from the qualitative data: 1) impact of disease-related foot symptoms, 2) footwear difficulties, 3) medical/rheumatology encounters, 4) foot and podiatry care access and experiences, and 5) financial hardship. Foot care provision does not appear to be driven by appropriate foot health characteristics such as foot pain or foot-related disability. There may be significant shortfalls in footwear and foot care access and provision in Greater Western Sydney. Several barriers to adequate foot care access and provision were identified and further efforts are required to improve access to and the quality of foot care for people who have RA. Integration of podiatry services within rheumatology centres could resolve unmet

  9. Improving access to health care for chronic hepatitis B among migrant Chinese populations: A systematic mixed methods review of barriers and enablers

    OpenAIRE

    Vedio, A.; Liu, E. Z. H.; Lee, A. C. K.; Salway, S.

    2017-01-01

    Summary Migrant Chinese populations in Western countries have a high prevalence of chronic hepatitis B but often experience poor access to health care and late diagnosis. This systematic review aimed to identify obstacles and supports to timely and appropriate health service use among these populations. Systematic searches resulted in 48 relevant studies published between 1996 and 2015. Data extraction and synthesis were informed by models of healthcare access that highlight the interplay of ...

  10. Atomic memory access hardware implementations

    Science.gov (United States)

    Ahn, Jung Ho; Erez, Mattan; Dally, William J

    2015-02-17

    Atomic memory access requests are handled using a variety of systems and methods. According to one example method, a data-processing circuit having an address-request generator that issues requests to a common memory implements a method of processing the requests using a memory-access intervention circuit coupled between the generator and the common memory. The method identifies a current atomic-memory access request from a plurality of memory access requests. A data set is stored that corresponds to the current atomic-memory access request in a data storage circuit within the intervention circuit. It is determined whether the current atomic-memory access request corresponds to at least one previously-stored atomic-memory access request. In response to determining correspondence, the current request is implemented by retrieving data from the common memory. The data is modified in response to the current request and at least one other access request in the memory-access intervention circuit.

  11. Accessibility of long-term family planning methods: a comparison study between Output Based Approach (OBA) clients verses non-OBA clients in the voucher supported facilities in Kenya.

    Science.gov (United States)

    Oyugi, Boniface; Kioko, Urbanus; Kaboro, Stephen Mbugua; Gikonyo, Shadrack; Okumu, Clarice; Ogola-Munene, Sarah; Kalsi, Shaminder; Thiani, Simon; Korir, Julius; Odundo, Paul; Baltazaar, Billy; Ranji, Moses; Muraguri, Nicholas; Nzioka, Charles

    2017-03-27

    The study seeks to evaluate the difference in access of long-term family planning (LTFP) methods among the output based approach (OBA) and non-OBA clients within the OBA facility. The study utilises a quasi experimental design. A two tailed unpaired t-test with unequal variance is used to test for the significance variation in the mean access. The difference in difference (DiD) estimates of program effect on long term family planning methods is done to estimate the causal effect by exploiting the group level difference on two or more dimensions. The study also uses a linear regression model to evaluate the predictors of choice of long-term family planning methods. Data was analysed using SPSS version 17. All the methods (Bilateral tubal ligation-BTL, Vasectomy, intrauterine contraceptive device -IUCD, Implants, and Total or combined long-term family planning methods -LTFP) showed a statistical significant difference in the mean utilization between OBA versus non-OBA clients. The difference in difference estimates reveal that the difference in access between OBA and non OBA clients can significantly be attributed to the implementation of the OBA program for intrauterine contraceptive device (p = 0.002), Implants (p = 0.004), and total or combined long-term family planning methods (p = 0.001). The county of residence is a significant determinant of access to all long-term family planning methods except vasectomy and the year of registration is a significant determinant of access especially for implants and total or combined long-term family planning methods. The management level and facility type does not play a role in determining the type of long-term family planning method preferred; however, non-governmental organisations (NGOs) as management level influences the choice of all methods (Bilateral tubal ligation, intrauterine contraceptive device, Implants, and combined methods) except vasectomy. The adjusted R 2 value, representing the percentage of

  12. Biostatistical methods [Methods in molecular biology, v. 184

    National Research Council Canada - National Science Library

    Looney, Steven W

    2002-01-01

    .... In the case of genetic effects in human populations, the authors describe sophisticated statistical methods to control the overall false-positive rate when many statistical tests are used in linking...

  13. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  14. Resource Allocation for Cloud Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama

    2016-04-01

    Cloud-radio access network (CRAN) is expected to be the core network architecture for next generation mobile radio system. In CRANs, joint signal processing is performed at multiple cloud computing centers (clouds) that are connected to several base stations (BSs) via high capacity backhaul links. As a result, large-scale interference management and network power consumption reduction can be effectively achieved. Unlike recent works on CRANs which consider a single cloud processing and treat inter-cloud interference as background noise, the first part of this thesis focuses on the more practical scenario of the downlink of a multi-cloud radio access network where BSs are connected to each cloud through wireline backhaul links. Assume that each cloud serves a set of pre-known single-antenna mobile users (MUs). This part focuses on minimizing the network total power consumption subject to practical constraints. The problems are solved using sophisticated techniques from optimization theory (e.g. Dual Decomposition-based algorithm and the alternating direction method of multipliers (ADMM)-based algorithm). One highlight of this part is that the proposed solutions can be implemented in a distributed fashion by allowing a reasonable information exchange between the coupled clouds. Additionally, feasible solutions of the considered optimization problems can be estimated locally at each iteration. Simulation results show that the proposed distributed algorithms converge to the centralized algorithms in a reasonable number of iterations. To further account of the backhaul congestion due to densification in CRANs, the second part of this thesis considers the downlink of a cache-enabled CRAN where each BS is equipped with a local-cache with limited size used to store the popular files without the need for backhauling. Further, each cache-enabled BS is connected to the cloud via limited capacity backhaul link and can serve a set of pre-known single antenna MUs. This part

  15. Enterprise wide transparent information access

    International Nuclear Information System (INIS)

    Brown, J.

    1995-05-01

    The information management needs of the Department of Energy (DOE) represents a fertile domain for the development of highly sophisticated yet intuitive enterprise-wide computing solutions. These solutions must support business operations, research agendas, technology development efforts, decision support, and other application areas with a user base ranging from technical staff to the highest levels of management. One area of primary interest is in the Environmental Restoration and Waste Management Branch of DOE. In this arena, the issue of tracking and managing nuclear waste related to the long legacy of prior defense production and research programs is one of high visibility and great concern. The Tank Waste Information Network System (TWINS) application has been created by the Pacific Northwest Laboratory (PNL) for the DOE to assist in managing and accessing the information related to this mission. The TWINS solution addresses many of the technical issues faced by other efforts to provide integrated information access to a wide variety of stakeholders. TWINS provides secure transparent access to distributed heterogeneous multimedia information sources from around the DOE complex. The users interact with the information through a consistent user interface that presents the desired data in a common format regardless of the structure of the source information. The solutions developed by the TWINS project represent an integration of several technologies and products that can be applied to other mission areas within DOE and other government agencies. These solutions are now being applied to public and private sector problem domains as well. The successful integration and inter-operation of both commercial and custom modules into a flexible and extensible information architecture will help ensure that new problems facing DOE and other clients can be addressed more rapidly in the future by re-use of existing tools and techniques proven viable through the TWINS efforts

  16. Comparison of basic laboratory test results with more sophisticated laboratory and in-situ tests methods on soils in southeastern Wisconsin : final report, March 21, 2009.

    Science.gov (United States)

    2009-03-21

    This study investigates all of the generated soils data in an attempt to use the more 'routine' laboratory tests to determine geotechnical design parameters (such as phiangle, cohesion, wet unit weight, unconfined compression, consolidation character...

  17. 5 CFR 2606.203 - Granting access.

    Science.gov (United States)

    2010-01-01

    ... Access to Records and Accounting of Disclosures § 2606.203 Granting access. (a) The methods for allowing... documentation will be required for the disclosure to the data subject of information required to be made...

  18. Global Market Access in the Internet Era: South Africa's Wood Furniture Industry.

    Science.gov (United States)

    Moodley, Sagren

    2002-01-01

    Explores the link between Internet connectivity and access to global markets, and uses the South African wood furniture producers as they are integrated into global value chains and exposed to the demands of more sophisticated markets. Articulates policy recommendations to promote greater diffusion of e-commerce technologies in the wood furniture…

  19. EU-Korea FTA and Its Impact on V4 Economies. A Comparative Analysis of Trade Sophistication and Intra-Industry Trade

    Directory of Open Access Journals (Sweden)

    Michalski Bartosz

    2018-03-01

    Full Text Available This paper investigates selected short- and mid-term effects in trade in goods between the Visegrad countries (V4: the Czech Republic, Hungary, Poland and the Slovak Republic and the Republic of Korea under the framework of the Free Trade Agreement between the European Union and the Republic of Korea. This Agreement is described in the “Trade for All” (2015: 9 strategy as the most ambitious trade deal ever implemented by the EU. The primary purpose of our analysis is to identify, compare, and evaluate the evolution of the technological sophistication of bilateral exports and imports. Another dimension of the paper concentrates on the developments within intra-industry trade. Moreover, these objectives are approached taking into account the context of the South Korean direct investment inflow to the V4. The evaluation of technological sophistication is based on UNCTAD’s methodology, while the intensity of intra-industry trade is measured by the GL-index and identification of its subcategories (horizontal and vertical trade. The analysis covers the timespan 2001–2015. The novelty of the paper lies in the fact that the study of South Korean-V4 trade relations has not so far been carried out from this perspective. Thus this paper investigates interesting phenomena identified in the trade between the Republic of Korea (ROK and V4 economies. The main findings imply an impact of South Korean direct investments on trade. This is represented by the trade deficit of the V4 with ROK and the structure of bilateral trade in terms of its technological sophistication. South Korean investments might also have had positive consequences for the evolution of IIT, particularly in the machinery sector. The political interpretation indicates that they may strengthen common threats associated with the middle-income trap, particularly the technological gap and the emphasis placed on lower costs of production.

  20. Doing Business in Czech Republic after Accession to the EU

    Directory of Open Access Journals (Sweden)

    Dusan Litva

    2017-11-01

    Full Text Available Purpose of the article: European Union can be considered as a full integration process including political, safety, social or economic aspects. Economic integration is process of interconnection otherwise separated national markets (by removal of economic borders. This assumes removal of all obstacles (in economy, trade, tax, administration or industrial area and establishment of common rules for market competition. Basic benefit of economic integration is occurrences of real or potential competitiveness effects. Methodology/methods: European integration influenced number of factors of business environment mainly in area of legislation, taxes, public competition or harmonization of norms which can result in overall Czech Republic competitiveness abroad. In these papers have been used DB and GCI indexes and their subsequent indicators to analyze competitiveness and business environment in CR. Scientific aim: The aim of this article is research on impact of European integration on business environment and competitiveness of Czech Republic. Findings: Growing DTF trend for DB index since 2004 shows improvement of business environment after accession to the EU in contrast with non- EU members (Switzerland, Norway which remains flat. The biggest benefit for Czech business environment seems to be trade liberalization as Czech companies were able to compete successfully at foreign markets. On the other hand, according to GCI remains biggest challenge non- effective bureaucracy, tax regulation, corruption, political instability and low business sophistication. Conclusions: Czech Republic should focus, consistently with Lisbon strategy, on qualification of labour forces, increase o

  1. Rapid, Efficient and Versatile Strategies for Functionally Sophisticated Polymers and Nanoparticles: Degradable Polyphosphoesters and Anisotropic Distribution of Chemical Functionalities

    Science.gov (United States)

    Zhang, Shiyi

    The overall emphasis of this dissertation research included two kinds of asymmetrically-functionalized nanoparticles with anisotropic distributions of chemical functionalities, three degradable polymers synthesized by organocatalyzed ring-opening polymerizations, and two polyphosphoester-based nanoparticle systems for various biomedical applications. Inspired by the many hierarchical assembly processes that afford complex materials in Nature, the construction of asymmetrically-functionalized nanoparticles with efficient surface chemistries and the directional organization of those building blocks into complex structures have attracted much attention. The first method generated a Janus-faced polymer nanoparticle that presented two orthogonally click-reactive surface chemistries, thiol and azido. This robust method involved reactive functional group transfer by templating against gold nanoparticle substrates. The second method produced nanoparticles with sandwich-like distribution of crown ether functionalities through a stepwise self-assembly process that utilized crown ether-ammonium supramolecular interactions to mediate inter-particle association and the local intra-particle phase separation of unlike hydrophobic polymers. With the goal to improve the efficiency of the production of degradable polymers with tunable chemical and physical properties, a new type of reactive polyphosphoester was synthesized bearing alkynyl groups by an organocatalyzed ring-opening polymerization, the chemical availability of the alkyne groups was investigated by employing "click" type azide-alkyne Huisgen cycloaddition and thiol-yne radical-mediated reactions. Based on this alkyne-functionalized polyphosphoester polymer and its two available "click" type reactions, two degradable nanoparticle systems were developed. To develop the first system, the well defined poly(ethylene oxide)-block-polyphosphester diblock copolymer was transformed into a multifunctional Paclitaxel drug

  2. Study of intramolecular isotope heterogeneity of organic oxy acids in order to detect sophisticated wines and juice drinks

    Directory of Open Access Journals (Sweden)

    Kuzmina Helen

    2014-01-01

    Full Text Available According to International Code of Oenological Practices it is allowed to use acide L(+tartrique for wine acidification, while use of synthetic dihydroxysuccinic acid is forbidden. Today it is impossible to differentiate natural dihydroxysuccinic acid from synthetic one by standard techniques. Even by using very sensitive method of isotope mass spectrometry certain difficulties emerge because total isotope characteristics of carbon of dihydroxysuccinic acid of different nature have the same values. However, isotope characteristics of carbon of intramolecular structural groups of dihydroxysuccinic acid made of different raw materials differ significantly. This allows specifying the nature of dihydroxysuccinic acid that is used for making of wines and juice drinks. In Russia, scientific and research institute of beer brewing and wine-making industry carried out a work for studying isotope characteristics of intramolecular isotope heterogeneity of dihydroxysuccinic acid from different origins in order to identify wines and juice drinks. Isotope characteristics of organic oxy acids from different origins were studied including them obtained by synthetic way and numeric range of value δ13 C,‰ were specified. The obtained results allow performing identification tests of wines and juice drinks to find out the products that contain not specified additives as that allowed for its use in production process.

  3. Estimation of the bio-accessible fraction of Cr, As, Cd and Pb in locally available bread using on-line continuous leaching method coupled to inductively coupled plasma mass spectrometry.

    Science.gov (United States)

    Lamsal, Ram P; Beauchemin, Diane

    2015-03-31

    A previously developed, efficient and simple on-line leaching method was used to assess the maximum bio-accessible fraction (assuming no synergistic effect from other food and beverage) of potentially toxic elements (Cr, As, Cd and Pb) in whole wheat brown and white bread samples. Artificial saliva, gastric juice and intestinal juice were successively pumped into a mini-column, packed with bread (maintained at 37 °C) connected on-line to the nebulizer of an inductively coupled plasma mass spectrometry (ICP-MS) instrument equipped with a collision-reaction interface (CRI) using hydrogen as reaction gas to minimize carbon- and chlorine-based polyatomic interferences. In contrast to the conventional batch method to which it was compared, this approach provides real-time monitoring of potentially toxic elements that are continuously released during leaching. Mass balance for both methods was verified at the 95% confidence level. Results obtained from the whole wheat brown and white bread showed that the majority of Cr, Cd and Pb was leached by gastric juice but, in contrast, the majority of As was leached by saliva. While there was higher total content for elements in whole wheat bread than in white bread, a higher percentage of elements were bio-accessible in white bread than in whole wheat bread. Both the on-line and batch methods indicate that 40-98% of toxic elements in bread samples are bio-accessible. While comparison of total analyte concentrations with provisional tolerable daily intake values may indicate some serious health concern for children, when accounting for the bio-accessibility of these elements, bread consumption is found to be safe for all ages. Copyright © 2015 Elsevier B.V. All rights reserved.

  4. Moving toward a universally accessible web: Web accessibility and education.

    Science.gov (United States)

    Kurt, Serhat

    2017-12-08

    The World Wide Web is an extremely powerful source of information, inspiration, ideas, and opportunities. As such, it has become an integral part of daily life for a great majority of people. Yet, for a significant number of others, the internet offers only limited value due to the existence of barriers which make accessing the Web difficult, if not impossible. This article illustrates some of the reasons that achieving equality of access to the online world of education is so critical, explores the current status of Web accessibility, discusses evaluative tools and methods that can help identify accessibility issues in educational websites, and provides practical recommendations and guidelines for resolving some of the obstacles that currently hinder the achievability of the goal of universal Web access.

  5. “They just scraped off the calluses”: a mixed methods exploration of foot care access and provision for people with rheumatoid arthritis in south-western Sydney, Australia

    Science.gov (United States)

    2013-01-01

    Background There is little indication that foot health services in Australia are meeting modern day recommendations for Rheumatoid Arthritis (RA) patients. The overall objective of this study was to explore the current state of foot health services for patients with RA with an emphasis on identifying barriers to the receipt of appropriate foot care in South-West Sydney, New South Wales, Australia. Methods A mixed (quantitative and qualitative) approach was adopted. Indications for appropriate access to foot care were determined by comparing the foot health, disease and socio-demographic characteristics of patients with unmet foot care demands, foot care users and patients with no demands for foot care. Perceptions of provision of, and access to, foot care were explored by conducting telephone-based interviews using an interpretative phenomenology approach with thematic analysis. Results Twenty-nine participants took part in the cross-sectional quantitative research study design, and 12 participants took part in the interpretative phenomenological approach (qualitative study). Foot care access appeared to be driven predominantly by the presence of rearfoot deformity, which was significantly worse amongst participants in the foot care user group (p = 0.02). Five main themes emerged from the qualitative data: 1) impact of disease-related foot symptoms, 2) footwear difficulties, 3) medical/rheumatology encounters, 4) foot and podiatry care access and experiences, and 5) financial hardship. Conclusions Foot care provision does not appear to be driven by appropriate foot health characteristics such as foot pain or foot-related disability. There may be significant shortfalls in footwear and foot care access and provision in Greater Western Sydney. Several barriers to adequate foot care access and provision were identified and further efforts are required to improve access to and the quality of foot care for people who have RA. Integration of podiatry services within

  6. Access to Research Inputs

    DEFF Research Database (Denmark)

    Czarnitzki, Dirk; Grimpe, Christoph; Pellens, Maikel

    2015-01-01

    The viability of modern open science norms and practices depends on public disclosure of new knowledge, methods, and materials. However, increasing industry funding of research can restrict the dissemination of results and materials. We show, through a survey sample of 837 German scientists in life...... sciences, natural sciences, engineering, and social sciences, that scientists who receive industry funding are twice as likely to deny requests for research inputs as those who do not. Receiving external funding in general does not affect denying others access. Scientists who receive external funding...... of any kind are, however, 50 % more likely to be denied access to research materials by others, but this is not affected by being funded specifically by industry...

  7. Access to Research Inputs

    DEFF Research Database (Denmark)

    Czarnitzki, Dirk; Grimpe, Christoph; Pellens, Maikel

    The viability of modern open science norms and practices depend on public disclosure of new knowledge, methods, and materials. However, increasing industry funding of research can restrict the dissemination of results and materials. We show, through a survey sample of 837 German scientists in life...... sciences, natural sciences, engineering, and social sciences, that scientists who receive industry funding are twice as likely to deny requests for research inputs as those who do not. Receiving external funding in general does not affect denying others access. Scientists who receive external funding...... of any kind are, however, 50% more likely to be denied access to research materials by others, but this is not affected by being funded specifically by industry....

  8. Evaluation of an open access echocardiography service in the Netherlands: a mixed methods study of indications, outcomes, patient management and trends.

    Science.gov (United States)

    van Heur, Leanne M S G; Baur, Leo H B; Tent, Marleen; Lodewijks-van der Bolt, Cara L B; Streppel, Marjolijn; Winkens, Ron A G; Stoffers, Henri E J H

    2010-02-10

    In our region (Eastern South Limburg, The Netherlands) an open access echocardiography service started in 2002. It was the first service of this kind in The Netherlands. Our study aims were: (1) to evaluate demand for the service, participation, indications, echocardiography outcomes, and management by the general practitioner (GP); (2) to analyse changes in indications and outcomes over the years. (1) Data from GP request forms, echocardiography reports and a retrospective GP questionnaire on management (response rate 83%) of 625 consecutive patients (Dec. 2002-March 2007) were analysed cross-sectionally. (2) For the analysis of changes over the years, data from GP request forms and echocardiography reports of the first and last 250 patients that visited the service between Dec. 2002 and Feb. 2008 (n = 1001) were compared. The echocardiography service was used by 81% of the regional GPs. On average, a GP referred one patient per year to the service. Intended indications for the service were dyspnoea (32%), cardiac murmur (59%), and peripheral oedema (17%). Of the other indications (22%), one-third was for evaluation of suspected left ventricular hypertrophy (LVH). Expected outcomes were left ventricular dysfunction (LVD) (43%, predominantly diastolic) and valve disease (25%). We also found a high proportion of LVH (50%). Only 24% of all echocardiograms showed no relevant disease. The GP followed the cardiologist's advice to refer the patient for further evaluation in 71%. In recent patients, more echocardiography requests were done for 'cardiac murmur' and 'other' indications, but less for 'dyspnoea'. The proportions of patients with LVD, LVH and valve disease decreased and the proportion of patients with no relevant disease increased. The number of advices by the cardiologists increased. Overall, GPs used the open access echocardiography service efficiently (i.e. with a high chance of finding relevant pathology), but efficiency decreased slightly over the years

  9. Improving access to medicines for non-communicable diseases in rural India: a mixed methods study protocol using quasi-experimental design.

    Science.gov (United States)

    Prashanth, N S; Elias, Maya Annie; Pati, Manoj Kumar; Aivalli, Praveenkumar; Munegowda, C M; Bhanuprakash, Srinath; Sadhana, S M; Criel, Bart; Bigdeli, Maryam; Devadasan, Narayanan

    2016-08-22

    India has the distinction of financing its healthcare mainly through out-of-pocket expenses by individual families contributing to catastrophic health expenditure and impoverishment. Nearly 70 % of the expenditure is on medicines purchased at private pharmacies. Patients with chronic ailments are especially affected, as they often need lifelong medicines. Over the past years in India, there have been several efforts to improve drug availability at government primary health centres. In this study, we aim to understand health system factors that affect utilisation and access to generic medicines for people with non-communicable diseases. This study aims to understand if (and how) a package of interventions targeting primary health centres and community participation platforms affect utilisation and access to generic medicines for people with non-communicable diseases in the current district context in India. This study will employ a quasi-experimental design and a qualitative theory-driven approach. PHCs will be randomly assigned to one of three arms of the intervention. In one arm, PHCs will receive inputs to optimise service delivery for non-communicable diseases, while the second arm will receive an additional package of interventions to strengthen community participation platforms for improving non-communicable disease care. The third arm will be the control. We will conduct household and facility surveys, before and after the intervention and will estimate the effect of the intervention by difference-in-difference analysis. Sample size for measuring effects was calculated based on obtaining at least 30 households for each primary health centre spread across three distance-based clusters. Primary outcomes include availability and utilisation of medicines at primary health centres and out-of-pocket expenditure for medicines by non-communicable disease households. Focus group discussions with patients and in-depth interviews with health workers will also be

  10. Improving access to health care for chronic hepatitis B among migrant Chinese populations: A systematic mixed methods review of barriers and enablers.

    Science.gov (United States)

    Vedio, A; Liu, E Z H; Lee, A C K; Salway, S

    2017-07-01

    Migrant Chinese populations in Western countries have a high prevalence of chronic hepatitis B but often experience poor access to health care and late diagnosis. This systematic review aimed to identify obstacles and supports to timely and appropriate health service use among these populations. Systematic searches resulted in 48 relevant studies published between 1996 and 2015. Data extraction and synthesis were informed by models of healthcare access that highlight the interplay of patient, provider and health system factors. There was strong consistent evidence of low levels of knowledge among patients and community members; but interventions that were primarily focused on increasing knowledge had only modest positive effects on testing and/or vaccination. There was strong consistent evidence that Chinese migrants tend to misunderstand the need for health care for hepatitis B and have low satisfaction with services. Stigma was consistently associated with hepatitis B, and there was weak but consistent evidence of stigma acting as a barrier to care. However, available evidence on the effects of providing culturally appropriate services for hepatitis B on increasing uptake is limited. There was strong consistent evidence that health professionals miss opportunities for testing and vaccination. Practitioner education interventions may be important, but evidence of effectiveness is limited. A simple prompt in patient records for primary care physicians improved the uptake of testing, and a dedicated service increased targeted vaccination coverage for newborns. Further development and more rigorous evaluation of more holistic approaches that address patient, provider and system obstacles are needed. © 2017 The Authors. Journal of Viral Hepatitis Published by John Wiley & Sons Ltd.

  11. A multi-level intervention in subsidized housing sites to increase fruit and vegetable access and intake: Rationale, design and methods of the ‘Live Well, Viva Bien’ cluster randomized trial

    Directory of Open Access Journals (Sweden)

    Kim M. Gans

    2016-06-01

    Full Text Available Abstract Background Adequate fruit and vegetable (F&V intake is important for disease prevention. Yet, most Americans, especially low-income and racial/ethnic minorities, do not eat adequate amounts. These disparities are partly attributable to food environments in low-income neighborhoods where residents often have limited access to affordable, healthful food and easy access to inexpensive, unhealthful foods. Increasing access to affordable healthful food in underserved neighborhoods through mobile markets is a promising, year-round strategy for improving dietary behaviors and reducing F&V intake disparities. However, to date, there have been no randomized controlled trials studying their effectiveness. The objective of the ‘Live Well, Viva Bien’ (LWVB cluster randomized controlled trial is to evaluate the efficacy of a multicomponent mobile market intervention at increasing F&V intake among residents of subsidized housing complexes. Methods/Design One housing complex served as a pilot site for the intervention group and the remaining 14 demographically-matched sites were randomized into either the intervention or control group. The intervention group received bimonthly, discount, mobile, fresh F&V markets in conjunction with a nutrition education intervention (two F&V campaigns, newsletters, DVDs and cooking demonstrations for 12 months. The control group received physical activity and stress reduction interventions. Outcome measures include F&V intake (measured by two validated F&V screeners at baseline, six-month and twelve-months along with potential psychosocial mediating variables. Extensive quantitative and qualitative process evaluation was also conducted throughout the study. Discussion Modifying neighborhood food environments in ways that increase access to affordable, healthful food is a promising strategy for improving dietary behaviors among low-income, racial and ethnic minority groups at increased risk for obesity and other

  12. Plato's patricide in the sophist

    Directory of Open Access Journals (Sweden)

    Deretić Irina J.

    2012-01-01

    Full Text Available In this paper, the author attempts to elucidate validity of Plato's criticism of Parmenides' simplified monistic ontology, as well as his concept of non-being. In contrast to Parmenides, Plato introduces a more complex ontology of the megista gene and redefines Parmenides' concept of non-being as something absolutely different from being. According to Plato, not all things are in the same sense, i. e. they have the different ontological status. Additionally, he redefines Parmenides' concept of absolute non-being as 'difference' or 'otherness.' .

  13. Sophisticated fuel handling system evolved

    International Nuclear Information System (INIS)

    Ross, D.A.

    1988-01-01

    The control systems at Sellafield fuel handling plant are described. The requirements called for built-in diagnostic features as well as the ability to handle a large sequencing application. Speed was also important; responses better than 50ms were required. The control systems are used to automate operations within each of the three main process caves - two Magnox fuel decanners and an advanced gas-cooled reactor fuel dismantler. The fuel route within the fuel handling plant is illustrated and described. ASPIC (Automated Sequence Package for Industrial Control) which was developed as a controller for the plant processes is described. (U.K.)

  14. From spatial to social accessibility: How socio-economic factors can affect accessibility?

    OpenAIRE

    Mercier , Aurélie

    2016-01-01

    The concept of accessibility cannot only focus on " spatial accessibility " measurement but has to integer a " social accessibility " level to take into account individual inequalities and socioeconomic disparities to access to urban opportunities. In this context, this contribution focuses on socioeconomic disparities integration on accessibility measurement, considering the Lyon case study. The paper is divided into three parts The first part aims to present a method for integrating the soc...

  15. Direct access to INIS

    International Nuclear Information System (INIS)

    Zheludev, I.S.; Romanenko, A.G.

    1981-01-01

    Librarians, researchers, and information specialists throughout the world now have the opportunity for direct access to coverage of almost 95% of the world's literature dealing with the peaceful uses of atomic energy and nuclear science. This opportunity has been provided by the International Nuclear Information System (INIS) of the IAEA. INIS, with the voluntary collaboration of more than 60 of the Agency's Member States, maintains a comprehensive, computer-resident data-base, containing the bibliographic details plus informative abstracts of the bulk of the world's literature on nuclear science and technology. Since this data-base is growing at a rate of 75,000 items per year, and already contains more than 500,000 items, it is obviously important to be able to search this collection conveniently and efficiently. The usefulness of this ability is enhanced when other data-bases on related subjects are made available on an information network. During the early 1970s, on-line interrogation of large bibliographic data-bases became the accepted method for searching this type of information resource. Direct interaction between the searcher and the data-base provides quick feed-back resulting in improved literature listings for launching research and development projects. On-line access enables organizations which cannot store a large data-base on their own computer to expand the information resources at their command. Because of these advantages, INIS undertook to extend to interested Member States on-line access to its data-base in Vienna

  16. Fishing Access Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — The Vermont Fish & Wildlife Department maintains developed fishing access areas. These sites provide public access to waters in Vermont for shore fishing...

  17. Accessibility and sensory experiences

    DEFF Research Database (Denmark)

    Ryhl, Camilla

    2010-01-01

    and accessibility. Sensory accessibility accommodates aspects of a sensory disability and describes architectural design requirements needed to ensure access to architectural experiences. In the context of architecture accessibility has become a design concept of its own. It is generally described as ensuring...... physical access to the built environment by accommodating physical disabilities. While the existing concept of accessibility ensures the physical access of everyone to a given space, sensory accessibility ensures the choice of everyone to stay and be able to participate and experience....

  18. Catalogue of methods of calculation, interpolation, smoothing, and reduction for the physical, chemical, and biological parameters of deep hydrology (CATMETH) (NODC Accession 7700442)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The document presents the methods, formulas and citations used by the BNDO to process physical, chemical, and biological data for deep hydrology including...

  19. JISC Open Access Briefing Paper

    OpenAIRE

    Swan, Alma

    2005-01-01

    What Open Access is. What Open Access is not. How is Open Access provided? Open Access archives or repositories. Open Access journals. Why should authors provide Open Access to their work? Further information and resources

  20. Respondent-driven sampling (rds as a new method to access vulnerable populations to hiv: its application in men who have sex with men

    Directory of Open Access Journals (Sweden)

    John H. Estrada M

    2010-11-01

    Full Text Available Approximately 30 million people are living with hiv all around the world in 2010. The most vulnerable hiv/aids groups are sex workers, intravenous drug users, transgender people and population of men who have sex with men (msm. Up to now, the surveillance and behavioral studies on sexual transmitted diseases (sti and hiv have been conducted using intentional sampling methods like the snowball methodology, but this kind of sampling does not achieve representation and does not represent a conclusive method for the study of hidden populations in order to extend and apply its results to the general population. Furthermore, it is necessary to add to this limitation the lack of knowledge about the size of these groups that must face situations of stigma and discrimination. A decade ago a new method was designed to sample hidden and hard to reach populations based on Markov theories and on chain recruitment. This new method is known as respondent-driven sampling (rds and it has been used in several behavioral and hiv prevalence studies. This review article presents the background, the theoretical support and a description of the method. It also analyzes some studies carried out using this new methodology.

  1. A Patient Advocate to facilitate access and improve communication, care, and outcomes in adults with moderate or severe asthma: Rationale, design, and methods of a randomized controlled trial

    Science.gov (United States)

    Apter, Andrea J.; Morales, Knashawn H.; Han, Xiaoyan; Perez, Luzmercy; Huang, Jingru; Ndicu, Grace; Localio, Anna; Nardi, Alyssa; Klusaritz, Heather; Rogers, Marisa; Phillips, Alexis; Cidav, Zuleyha; Schwartz, J. Sanford

    2017-01-01

    Few interventions to improve asthma outcomes have targeted low-income minority adults. Even fewer have focused on the real-world practice where care is delivered. We adapted a patient navigator, here called a Patient Advocate (PA), a term preferred by patients, to facilitate and maintain access to chronic care for adults with moderate or severe asthma and prevalent co-morbidities recruited from clinics serving low-income urban neighborhoods. We describe the planning, design, methodology (informed by patient and provider focus groups), baseline results, and challenges of an ongoing randomized controlled trial of 312 adults of a PA intervention implemented in a variety of practices. The PA coaches, models, and assists participants with preparations for a visit with the asthma clinician; attends the visit with permission of participant and provider; and confirms participants’ understanding of what transpired at the visit. The PA facilitates scheduling, obtaining insurance coverage, overcoming patients’ unique social and administrative barriers to carrying out medical advice and transfer of information between providers and patients. PA activities are individualized, take account of comorbidities, and are generalizable to other chronic diseases. PAs are recent college graduates interested in health-related careers, research experience, working with patients, and generally have the same race/ethnicity distribution as potential participants. We test whether the PA intervention, compared to usual care, is associated with improved and sustained asthma control and other asthma outcomes (prednisone bursts, ED visits, hospitalizations, quality of life, FEV1) relative to baseline. Mediators and moderators of the PA-asthma outcome relationship are examined along with the intervention’s cost-effectiveness. PMID:28315481

  2. Expanding Access to a New, More Affordable Levonorgestrel Intrauterine System in Kenya: Service Delivery Costs Compared With Other Contraceptive Methods and Perspectives of Key Opinion Leaders.

    Science.gov (United States)

    Rademacher, Kate H; Solomon, Marsden; Brett, Tracey; Bratt, John H; Pascual, Claire; Njunguru, Jesse; Steiner, Markus J

    2016-08-11

    The levonorgestrel intrauterine system (LNG IUS) is one of the most effective forms of contraception and offers important non-contraceptive health benefits. However, it is not widely available in developing countries, largely due to the high price of existing products. Medicines360 plans to introduce its new, more affordable LNG IUS in Kenya. The public-sector transfer price will vary by volume between US$12 to US$16 per unit; for an order of 100,000 units, the public-sector transfer price will be approximately US$15 per unit. We calculated the direct service delivery cost per couple-years of protection (CYP) of various family planning methods. The model includes the costs of contraceptive commodities, consumable supplies, instruments per client visit, and direct labor for counseling, insertion, removal, and resupply, if required. The model does not include costs of demand creation or training. We conducted interviews with key opinion leaders in Kenya to identify considerations for scale-up of a new LNG IUS, including strategies to overcome barriers that have contributed to low uptake of the copper intrauterine device. The direct service delivery cost of Medicines360's LNG IUS per CYP compares favorably with other contraceptive methods commonly procured for public-sector distribution in Kenya. The cost is slightly lower than that of the 3-month contraceptive injectable, which is currently the most popular method in Kenya. Almost all key opinion leaders agreed that introducing a more affordable LNG IUS could increase demand and uptake of the method. They thought that women seeking the product's non-contraceptive health benefits would be a key market segment, and most agreed that the reduced menstrual bleeding associated with the method would likely be viewed as an advantage. The key opinion leaders indicated that myths and misconceptions among providers and clients about IUDs must be addressed, and that demand creation and provider training should be prioritized

  3. Professional Access 2013 programming

    CERN Document Server

    Hennig, Teresa; Hepworth, George; Yudovich, Dagi (Doug)

    2013-01-01

    Authoritative and comprehensive coverage for building Access 2013 Solutions Access, the most popular database system in the world, just opened a new frontier in the Cloud. Access 2013 provides significant new features for building robust line-of-business solutions for web, client and integrated environments.  This book was written by a team of Microsoft Access MVPs, with consulting and editing by Access experts, MVPs and members of the Microsoft Access team. It gives you the information and examples to expand your areas of expertise and immediately start to develop and upgrade projects. Exp

  4. Comparison of Radial Access, Guided Femoral Access, and Non-Guided Femoral Access Among Women Undergoing Percutaneous Coronary Intervention.

    Science.gov (United States)

    Koshy, Linda M; Aberle, Laura H; Krucoff, Mitchell W; Hess, Connie N; Mazzaferri, Ernest; Jolly, Sanjit S; Jacobs, Alice; Gibson, C Michael; Mehran, Roxana; Gilchrist, Ian C; Rao, Sunil V

    2018-01-01

    This study was conducted to determine the association between radial access, guided femoral access, and non-guided femoral access on postprocedural bleeding and vascular complications after percutaneous coronary intervention (PCI). Bleeding events and major vascular complications after PCI are associated with increased morbidity, mortality, and cost. While the radial approach has been shown to be superior to the femoral approach in reducing bleeding and vascular complications, whether the use of micropuncture, fluoroscopy, or ultrasound mitigates these differences is unknown. We conducted a post hoc analysis of women in the SAFE-PCI for Women trial who underwent PCI and had the access method identified (n = 643). The primary endpoint of postprocedure bleeding or vascular complications occurring within 72 hours or at discharge was adjudicated by an independent clinical events committee and was compared based on three categories of access technique: radial, guided femoral (fluoroscopy, micropuncture, ultrasound), or non-guided femoral (none of the aforementioned). Differences between the groups were determined using multivariate logistic regression using radial access as the reference. Of the PCI population, 330 underwent radial access, 228 underwent guided femoral access, and 85 underwent non-guided femoral access. There was a statistically significant lower incidence of the primary endpoint with radial access vs non-guided femoral access; however, there was no significant difference between radial approach and femoral access guided by fluoroscopy, micropuncture, or ultrasound. This post hoc analysis demonstrates that while radial access is safer than non-guided femoral access, guided femoral access appears to be associated with similar bleeding events or vascular complications as radial access.

  5. A study on the influence of eWOM using content analysis: how do comments on value for money, product sophistication and experiential feeling affect our choices?

    Science.gov (United States)

    Cho, Vincent; Chan, Alpha

    2017-07-01

    The influence of electronic word of mouth (eWOM) has been heavily investigated in relation to online ratings. However, only a few studies examined the content of eWOM. From the perspective of the consideration sets model, consumers formulate an awareness set, a consideration set and a choice set before making a purchase. We argue that the formulation of these sets is influenced by eWOM based on its volume, valance and content relating to product attributes such as value for money, product sophistication and experiential feeling. In this study, the content of posts relating to Shure professional earphones in the online forum Mingo (www.mingo-hmw.com/forum) was captured and annotated. During the data collection period, Mingo was the sole online forum relating to professional earphones. Without much interference from other online forums, the circumstances of this study closely approximate a laboratory setting. In addition, we collected the actual sales, marketing costs, fault rates and number of retail stores selling the Shure professional earphones for 126 weeks. Our findings show that the weekly volume of posts, their relative number of positive (negative) comments, especially regarding value for money and sound quality, and those posts from the earlier week impinged strongly on weekly sales of Shure products. From the regression models, the explained variance in sales jumps from 0.236 to 0.732 due to the influence of eWOM.

  6. Method

    Directory of Open Access Journals (Sweden)

    Ling Fiona W.M.

    2017-01-01

    Full Text Available Rapid prototyping of microchannel gain lots of attention from researchers along with the rapid development of microfluidic technology. The conventional methods carried few disadvantages such as high cost, time consuming, required high operating pressure and temperature and involve expertise in operating the equipment. In this work, new method adapting xurography method is introduced to replace the conventional method of fabrication of microchannels. The novelty in this study is replacing the adhesion film with clear plastic film which was used to cut the design of the microchannel as the material is more suitable for fabricating more complex microchannel design. The microchannel was then mold using polymethyldisiloxane (PDMS and bonded with a clean glass to produce a close microchannel. The microchannel produced had a clean edge indicating good master mold was produced using the cutting plotter and the bonding between the PDMS and glass was good where no leakage was observed. The materials used in this method is cheap and the total time consumed is less than 5 hours where this method is suitable for rapid prototyping of microchannel.

  7. Overview: Routes to Open Access

    OpenAIRE

    Tullney, Marco; van Wezenbeek, Wilma

    2017-01-01

    Slides of an overview presentation given at a CESAER workshop on Open Access, February 2nd, 2017, in Brussels Cover major routes to more open access as discussed in the Task Force Open Science of CESAER: (national) open access strategies open access mandates open access incentives open access awareness open access publishing open access infrastructure

  8. Physical Access Control Database -

    Data.gov (United States)

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  9. Design for Accessibility

    DEFF Research Database (Denmark)

    Herriott, Richard

    2012-01-01

    A report on how nine rail builder, operators and transport designers deal with design for accessibility......A report on how nine rail builder, operators and transport designers deal with design for accessibility...

  10. Information on Open Access

    African Journals Online (AJOL)

    Open Access (OA), defined most simply, means free full text online. There are over 130 Open Access journals hosted on the AJOL website. You can find a full list of these journals here: OA journals on AJOL ...

  11. Access Customized Forms

    OpenAIRE

    Cosma Emil; Jeflea Victor

    2010-01-01

    By using Word, Excel or PowerPoint one can automate routine operations using the VBA language (Visual Basic for Applications). This language is also used in Access, allowing access to data stored in tables or queries. Thus, Access and VBA resources can be used together. Access is designed for programming forms and reports (among other things), so there won’t be found any of the VBA editor’s specific forms.

  12. Contraceptive use and method preference among women in Soweto, South Africa: the influence of expanding access to HIV care and treatment services.

    Directory of Open Access Journals (Sweden)

    Angela Kaida

    2010-11-01

    Full Text Available Preventing unintended pregnancy among HIV-positive women constitutes a critical and cost-effective approach to primary prevention of mother-to-child transmission of HIV and is a global public health priority for addressing the desperate state of maternal and child health in HIV hyper-endemic settings. We sought to investigate whether the prevalence of contraceptive use and method preferences varied by HIV status and receipt of highly active antiretroviral therapy (HAART among women in Soweto, South Africa.We used survey data from 563 sexually active, non-pregnant women (18-44 years recruited from the Perinatal HIV Research Unit in Soweto (May-December, 2007; 171 women were HIV-positive and receiving HAART (median duration of use = 31 months; IQR = 28, 33, 178 were HIV-positive and HAART-naïve, and 214 were HIV-negative. Medical record review was conducted to confirm HIV status and clinical variables. Logistic regression models estimated adjusted associations between HIV status, receipt of HAART, and contraceptive use.Overall, 78% of women reported using contraception, with significant variation by HIV status: 86% of HAART users, 82% of HAART-naïve women, and 69% of HIV-negative women (p<0.0001. In adjusted models, compared with HIV-negative women, women receiving HAART were significantly more likely to use contraception while HAART-naïve women were non-significantly more likely (AOR: 2.40; 95% CI: 1.25, 4.62 and AOR: 1.59; 95% CI: 0.88, 2.85; respectively. Among HIV-positive women, HAART users were non-significantly more likely to use contraception compared with HAART-naïve women (AOR: 1.55; 95% CI: 0.84, 2.88. Similar patterns held for specific use of barrier (primarily male condoms, permanent, and dual protection contraceptive methods.Among HIV-positive women receiving HAART, the observed higher prevalence of contraceptive use overall and condoms in particular promises to yield fewer unintended pregnancies and reduced risks of

  13. Contraceptive use and method preference among women in Soweto, South Africa: the influence of expanding access to HIV care and treatment services.

    Science.gov (United States)

    Kaida, Angela; Laher, Fatima; Strathdee, Steffanie A; Money, Deborah; Janssen, Patricia A; Hogg, Robert S; Gray, Glenda

    2010-11-05

    Preventing unintended pregnancy among HIV-positive women constitutes a critical and cost-effective approach to primary prevention of mother-to-child transmission of HIV and is a global public health priority for addressing the desperate state of maternal and child health in HIV hyper-endemic settings. We sought to investigate whether the prevalence of contraceptive use and method preferences varied by HIV status and receipt of highly active antiretroviral therapy (HAART) among women in Soweto, South Africa. We used survey data from 563 sexually active, non-pregnant women (18-44 years) recruited from the Perinatal HIV Research Unit in Soweto (May-December, 2007); 171 women were HIV-positive and receiving HAART (median duration of use = 31 months; IQR = 28, 33), 178 were HIV-positive and HAART-naïve, and 214 were HIV-negative. Medical record review was conducted to confirm HIV status and clinical variables. Logistic regression models estimated adjusted associations between HIV status, receipt of HAART, and contraceptive use. Overall, 78% of women reported using contraception, with significant variation by HIV status: 86% of HAART users, 82% of HAART-naïve women, and 69% of HIV-negative women (pwomen, women receiving HAART were significantly more likely to use contraception while HAART-naïve women were non-significantly more likely (AOR: 2.40; 95% CI: 1.25, 4.62 and AOR: 1.59; 95% CI: 0.88, 2.85; respectively). Among HIV-positive women, HAART users were non-significantly more likely to use contraception compared with HAART-naïve women (AOR: 1.55; 95% CI: 0.84, 2.88). Similar patterns held for specific use of barrier (primarily male condoms), permanent, and dual protection contraceptive methods. Among HIV-positive women receiving HAART, the observed higher prevalence of contraceptive use overall and condoms in particular promises to yield fewer unintended pregnancies and reduced risks of vertical and sexual HIV transmission. These findings highlight the

  14. Accessing Electronic Journals.

    Science.gov (United States)

    McKay, Sharon Cline

    1999-01-01

    Discusses issues librarians need to consider when providing access to electronic journals. Topics include gateways; index and abstract services; validation and pay-per-view; title selection; integration with OPACs (online public access catalogs)or Web sites; paper availability; ownership versus access; usage restrictions; and services offered…

  15. method

    Directory of Open Access Journals (Sweden)

    L. M. Kimball

    2002-01-01

    Full Text Available This paper presents an interior point algorithm to solve the multiperiod hydrothermal economic dispatch (HTED. The multiperiod HTED is a large scale nonlinear programming problem. Various optimization methods have been applied to the multiperiod HTED, but most neglect important network characteristics or require decomposition into thermal and hydro subproblems. The algorithm described here exploits the special bordered block diagonal structure and sparsity of the Newton system for the first order necessary conditions to result in a fast efficient algorithm that can account for all network aspects. Applying this new algorithm challenges a conventional method for the use of available hydro resources known as the peak shaving heuristic.

  16. Access 2013 for dummies

    CERN Document Server

    Ulrich Fuller, Laurie

    2013-01-01

    The easy guide to Microsoft Access returns with updates on the latest version! Microsoft Access allows you to store, organize, view, analyze, and share data; the new Access 2013 release enables you to build even more powerful, custom database solutions that integrate with the web and enterprise data sources. Access 2013 For Dummies covers all the new features of the latest version of Accessand serves as an ideal reference, combining the latest Access features with the basics of building usable databases. You'll learn how to create an app from the Welcome screen, get support

  17. Pro Access 2010 Development

    CERN Document Server

    Collins, Mark

    2011-01-01

    Pro Access 2010 Development is a fundamental resource for developing business applications that take advantage of the features of Access 2010 and the many sources of data available to your business. In this book, you'll learn how to build database applications, create Web-based databases, develop macros and Visual Basic for Applications (VBA) tools for Access applications, integrate Access with SharePoint and other business systems, and much more. Using a practical, hands-on approach, this book will take you through all the facets of developing Access-based solutions, such as data modeling, co

  18. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  19. Controlling Access to Suicide Means

    Directory of Open Access Journals (Sweden)

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  20. Teenagers’ access to contraception in Mexico City

    Directory of Open Access Journals (Sweden)

    Sofía Gómez-Inclán

    2017-05-01

    Full Text Available Objective. To study and understand the phenomenon of access to contraceptive methods in Mexican teenages, through the use of the Levesque model, which allows for the observation of both the system and the system and the user´s participation in the access process. Materials and methods. A qualitative study was conducted with focus groups technique in a middle and high school of Mexico City. Results. The perception of ability to access to health care is limited, teenagers do not know the mechanisms of care or supply of contraceptive methods. Prejudices of service providers provoke a negative reaction. The family is a source of information for adolescents to make decisions. Conclusions. The model allowed the assessment of access to contraceptive methods in teenagers. It were identified dif­ferent aspects that act as barriers to access and may inform health care providers about this population in their sexual and reproductive health.

  1. Open Access @ DTU

    DEFF Research Database (Denmark)

    Ekstrøm, Jeannette

    Open Access is high on the agenda in Denmark and internationally. Denmark has announced a national strategy for Open Access that aims to achieve Open Access to 80% in 2017 and 100% in 2022 to peer review research articles. All public Danish funders as well as H2020 requires that all peer review...... articles that is an outcome of their funding will be Open Access. Uploading your full texts (your final author manuscript after review ) to DTU Orbit is a fundamental part of providing Open Access to your research. We are here to answer all your questions with regards to Open Access and related topics...... such as copyright, DTU Orbit, Open Access journals, APCs, Vouchers etc....

  2. Publishing in Open Access Education Journals: The Authors' Perspectives

    Science.gov (United States)

    Coonin, Bryna; Younce, Leigh M.

    2010-01-01

    Open access publishing is now an accepted method of scholarly communication. However, the greatest traction for open access publishing thus far has been in the sciences. Penetration of open access publishing has been much slower among the social sciences. This study surveys 309 authors from recent issues of open access journals in education to…

  3. Accessing remote data bases using microcomputers

    OpenAIRE

    Saul, Peter D.

    1985-01-01

    General practitioners' access to remote data bases using microcomputers is increasing, making even the most obscure information readily available. Some of the systems available to general practitioners in the UK are described and the methods of access are outlined. General practitioners should be aware of the advances in technology; data bases are increasing in size, the cost of access is falling and their use is becoming easier.

  4. Accessible solitons of fractional dimension

    Energy Technology Data Exchange (ETDEWEB)

    Zhong, Wei-Ping, E-mail: zhongwp6@126.com [Department of Electronic and Information Engineering, Shunde Polytechnic, Guangdong Province, Shunde 528300 (China); Texas A& M University at Qatar, P.O. Box 23874, Doha (Qatar); Belić, Milivoj [Texas A& M University at Qatar, P.O. Box 23874, Doha (Qatar); Zhang, Yiqi [Key Laboratory for Physical Electronics and Devices of the Ministry of Education & Shaanxi Key Lab of Information Photonic Technique, Xi’an Jiaotong University, Xi’an 710049 (China)

    2016-05-15

    We demonstrate that accessible solitons described by an extended Schrödinger equation with the Laplacian of fractional dimension can exist in strongly nonlocal nonlinear media. The soliton solutions of the model are constructed by two special functions, the associated Legendre polynomials and the Laguerre polynomials in the fraction-dimensional space. Our results show that these fractional accessible solitons form a soliton family which includes crescent solitons, and asymmetric single-layer and multi-layer necklace solitons. -- Highlights: •Analytic solutions of a fractional Schrödinger equation are obtained. •The solutions are produced by means of self-similar method applied to the fractional Schrödinger equation with parabolic potential. •The fractional accessible solitons form crescent, asymmetric single-layer and multilayer necklace profiles. •The model applies to the propagation of optical pulses in strongly nonlocal nonlinear media.

  5. Norway's ICT Accessibility Legislation, Methods and Indicators.

    Science.gov (United States)

    Rygg, Malin; Rømen, Dagfinn; Sterri, Brynhild Runa

    2016-01-01

    This paper gives an overview of the Norwegian legislation on Universal Design of information and communication technology (ICT) and how the Norwegian Authority for Universal Design of ICT works to enforce and achieve the goals behind the legislation. The Authority uses indicators to check websites for compliance with the regulations. This paper describes the rationale and intended use for the indicators and how they are used for both supervision and benchmarks as well as a way of gathering data to give an overview of the current state of Universal Design of websites in Norway.

  6. Strategic Accessibility Competition

    OpenAIRE

    Bacchiega, Emanuele; Randon, Emanuela; Zirulia, Lorenzo

    2010-01-01

    We analyze the effect of competition in market-accessibility enhancement among quality-differentiated firms. Firms are located in regions with different ex-ante transport costs to reach the final market. We characterize the equilibrium of the two-stage game in which firms first invest to improve market accessibility and then compete in prices. Efforts in accessibility improvement crucially depend on the interplay between the willingness to pay for the quality premium of the median consumer an...

  7. Are PDF Documents Accessible?

    Directory of Open Access Journals (Sweden)

    Mireia Ribera Turró

    2008-09-01

    Full Text Available Adobe PDF is one of the most widely used formats in scientific communications and in administrative documents. In its latest versions it has incorporated structural tags and improvements that increase its level of accessibility. This article reviews the concept of accessibility in the reading of digital documents and evaluates the accessibility of PDF according to the most widely established standards.

  8. Open Access Monitor - DK

    DEFF Research Database (Denmark)

    Svendsen, Michael; Hansen, Lars Asger Juel; Andersen, Dorte

    2017-01-01

    Open Access Monitor - DK (OAM-DK) is a 2-year DEFF funded [DEFF.2016-0018] national project running in 2017-2018 with the aim of collecting, documenting and administrating Open Access publishing costs. OAM-DK is lead by Copenhagen University Library under the Royal Danish Library with participation...... of all Danish University Libraries. This poster presents the first results of Open Access costs related to 2015 publications at the The University of Copenhagen....

  9. Librarians and Libraries Supporting Open Access Publishing

    Science.gov (United States)

    Richard, Jennifer; Koufogiannakis, Denise; Ryan, Pam

    2009-01-01

    As new models of scholarly communication emerge, librarians and libraries have responded by developing and supporting new methods of storing and providing access to information and by creating new publishing support services. This article will examine the roles of libraries and librarians in developing and supporting open access publishing…

  10. Demystifying Open Access

    International Nuclear Information System (INIS)

    Mele, Salvatore

    2007-01-01

    The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

  11. OGIS Access System

    Data.gov (United States)

    National Archives and Records Administration — The OGIS Access System (OAS) provides case management, stakeholder collaboration, and public communications activities including a web presence via a web portal.

  12. Access 2013 bible

    CERN Document Server

    Alexander, Michael

    2013-01-01

    A comprehensive reference to the updated and new features of Access 2013 As the world's most popular database management tool, Access enables you to organize, present, analyze, and share data as well as build powerful database solutions. However, databases can be complex. That's why you need the expert guidance in this comprehensive reference. Access 2013 Bible helps you gain a solid understanding of database purpose, construction, and application so that whether you're new to Access or looking to upgrade to the 2013 version, this well-rounded resource provides you with a th

  13. Web Accessibility and Guidelines

    Science.gov (United States)

    Harper, Simon; Yesilada, Yeliz

    Access to, and movement around, complex online environments, of which the World Wide Web (Web) is the most popular example, has long been considered an important and major issue in the Web design and usability field. The commonly used slang phrase ‘surfing the Web’ implies rapid and free access, pointing to its importance among designers and users alike. It has also been long established that this potentially complex and difficult access is further complicated, and becomes neither rapid nor free, if the user is disabled. There are millions of people who have disabilities that affect their use of the Web. Web accessibility aims to help these people to perceive, understand, navigate, and interact with, as well as contribute to, the Web, and thereby the society in general. This accessibility is, in part, facilitated by the Web Content Accessibility Guidelines (WCAG) currently moving from version one to two. These guidelines are intended to encourage designers to make sure their sites conform to specifications, and in that conformance enable the assistive technologies of disabled users to better interact with the page content. In this way, it was hoped that accessibility could be supported. While this is in part true, guidelines do not solve all problems and the new WCAG version two guidelines are surrounded by controversy and intrigue. This chapter aims to establish the published literature related to Web accessibility and Web accessibility guidelines, and discuss limitations of the current guidelines and future directions.

  14. A Framework for Federated Two-Factor Authentication Enabling Cost-Effective Secure Access to Distributed Cyberinfrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ezell, Matthew A [ORNL; Rogers, Gary L [University of Tennessee, Knoxville (UTK); Peterson, Gregory D. [University of Tennessee, Knoxville (UTK)

    2012-01-01

    As cyber attacks become increasingly sophisticated, the security measures used to mitigate the risks must also increase in sophistication. One time password (OTP) systems provide strong authentication because security credentials are not reusable, thus thwarting credential replay attacks. The credential changes regularly, making brute-force attacks significantly more difficult. In high performance computing, end users may require access to resources housed at several different service provider locations. The ability to share a strong token between multiple computing resources reduces cost and complexity. The National Science Foundation (NSF) Extreme Science and Engineering Discovery Environment (XSEDE) provides access to digital resources, including supercomputers, data resources, and software tools. XSEDE will offer centralized strong authentication for services amongst service providers that leverage their own user databases and security profiles. This work implements a scalable framework built on standards to provide federated secure access to distributed cyberinfrastructure.

  15. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  16. Validation of Housing Standards Addressing Accessibility

    DEFF Research Database (Denmark)

    Helle, Tina

    2013-01-01

    The aim was to explore the use of an activity-based approach to determine the validity of a set of housing standards addressing accessibility. This included examination of the frequency and the extent of accessibility problems among older people with physical functional limitations who used...... participant groups were examined. Performing well-known kitchen activities was associated with accessibility problems for all three participant groups, in particular those using a wheelchair. The overall validity of the housing standards examined was poor. Observing older people interacting with realistic...... environments while performing real everyday activities seems to be an appropriate method for assessing accessibility problems....

  17. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  18. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  19. Access Agent Improving The Performance Of Access Control Lists

    Directory of Open Access Journals (Sweden)

    Thelis R. S.

    2015-08-01

    Full Text Available The main focus of the proposed research is maintaining the security of a network. Extranet is a popular network among most of the organizations where network access is provided to a selected group of outliers. Limiting access to an extranet can be carried out using Access Control Lists ACLs method. However handling the workload of ACLs is an onerous task for the router. The purpose of the proposed research is to improve the performance and to solidify the security of the ACLs used in a small organization. Using a high performance computer as a dedicated device to share and handle the router workload is suggested in order to increase the performance of the router when handling ACLs. Methods of detecting and directing sensitive data is also discussed in this paper. A framework is provided to help increase the efficiency of the ACLs in an organization network using the above mentioned procedures thus helping the organizations ACLs performance to be improved to be more secure and the system to perform faster. Inbuilt methods of Windows platform or Software for open source platforms can be used to make a computer function as a router. Extended ACL features allow the determining of the type of packets flowing through the router. Combining these mechanisms allows the ACLs to be improved and perform in a more efficient manner.

  20. Accessibility of public services

    NARCIS (Netherlands)

    Poort, J.P.; Groot, I.; Kok, L.; de Graaf, D.; Hof, B.J.F.

    2005-01-01

    The accessibility of certain products and services to all people, irrespective of their income, age, health and geographical location is considered to be of great social importance. Think for instance of health care, education, electricity, and sanitation. Accessibility can be secured in a variety

  1. Market Access and Welfare

    DEFF Research Database (Denmark)

    Raimondos-Møller, Pascalis; Woodland, Alan D.

    2015-01-01

    Well known tariff reform rules that are guaranteed to increase welfare will not necessarily increase market access, while rules that are guaranteed to increase market access will not necessarily increase welfare. The present paper proposes a new set of tariff reforms that can achieve both...

  2. Standards and Access.

    Science.gov (United States)

    Fox, Tom

    1993-01-01

    Argues that easy claims about the relationship between language mastery and academic or economic access (made by both conservative commentators on education and mainstream writing teachers) are false and obscure real social and political boundaries, such as racism, sexism, elitism, and homophobia, that really do prevent access. (SR)

  3. A remark on accessibility

    International Nuclear Information System (INIS)

    Wu, Xinxing; Wang, Jianjun

    2016-01-01

    Highlights: • Obtain some characteristics of accessibility and Kato’s chaos. • Answer negatively a question in [Li R, Wang H, Zhao Y. Kato’s chaos in duopoly games. Chaos Solit Fract 2016;84:69–72]. • A dynamical system is indecomposable if and only if it is weakly transitive. - Abstract: This note obtains some characteristics of accessibility and Kato’s chaos. Applying these results, an accessible dynamical system whose product system is not accessible is constructed, giving a negative answer to a question in [Li R, Wang H, Zhao Y. Kato’s chaos in duopoly games. Chaos Solit Fract 2016;84:69–72]. Besides, it is proved that every transitive interval self-map is accessible.

  4. Remote direct memory access

    Science.gov (United States)

    Archer, Charles J.; Blocksome, Michael A.

    2012-12-11

    Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

  5. Pay More Attention: a national mixed methods study to identify the barriers and facilitators to ensuring equal access to high-quality hospital care and services for children and young people with and without learning disabilities and their families.

    Science.gov (United States)

    Oulton, Kate; Wray, Jo; Carr, Lucinda; Hassiotis, Angela; Jewitt, Carey; Kerry, Sam; Tuffrey-Wijne, Irene; Gibson, Faith

    2016-12-09

    Despite evidence of health inequalities for adults with intellectual disability (ID) there has yet to be a comprehensive review of how well hospital services are meeting the needs of children and young people (CYP) with ID and their families. We do not know how relevant existing recommendations and guidelines are to CYP, whether these are being applied in the paediatric setting or what difference they are making. Evidence of parental dissatisfaction with the quality, safety and accessibility of hospital care for CYP with ID exists. However, the extent to which their experience differs from parents of CYP without ID is not known and the views and experiences of CYP with ID have not been investigated. We will compare how services are delivered to, and experienced by CYP aged 5-15 years with and without ID and their families to see what inequalities exist, for whom, why and under what circumstances. We will use a transformative, mixed methods case study design to collect data over four consecutive phases. We will involve CYP, parents and hospital staff using a range of methods; interviews, parental electronic diary, hospital and community staff questionnaire, patient and parent satisfaction questionnaire, content analysis of hospital documents and a retrospective mapping of patient hospital activity. Qualitative data will be managed and analysed using NVivo and quantitative data will be analysed using parametric and non-parametric descriptive statistics. The study will run from December 2015 to November 2018. We have Health Authority Approval (IRAS project ID: 193932) for phase 1 involving staff only and ethical and Health Authority Approval for phases 2-4 (IRAS project ID: 178525). We will disseminate widely to relevant stakeholders, using a range of accessible formats, including social media. We will publish in international peer-reviewed journals and present to professional, academic and lay audiences through national and international conferences. Published by

  6. Information-flow-based Access Control for Virtualized Systems

    Directory of Open Access Journals (Sweden)

    Dmitriy Aleksandrovich Postoev

    2014-12-01

    Full Text Available The article is devoted to the method of information-flow-based access control, adopted for virtualized systems. General structure of access control system for virtual infrastructure is proposed.

  7. Pediatric vascular access

    International Nuclear Information System (INIS)

    Donaldson, James S.

    2006-01-01

    Pediatric interventional radiologists are ideally suited to provide vascular access services to children because of inherent safety advantages and higher success from using image-guided techniques. The performance of vascular access procedures has become routine at many adult interventional radiology practices, but this service is not as widely developed at pediatric institutions. Although interventional radiologists at some children's hospitals offer full-service vascular access, there is little or none at others. Developing and maintaining a pediatric vascular access service is a challenge. Interventionalists skilled in performing such procedures are limited at pediatric institutions, and institutional support from clerical staff, nursing staff, and technologists might not be sufficiently available to fulfill the needs of such a service. There must also be a strong commitment by all members of the team to support such a demanding service. There is a slippery slope of expected services that becomes steeper and steeper as the vascular access service grows. This review is intended primarily as general education for pediatric radiologists learning vascular access techniques. Additionally, the pediatric or adult interventional radiologist seeking to expand services might find helpful tips. The article also provides education for the diagnostic radiologist who routinely interprets radiographs containing vascular access devices. (orig.)

  8. Access to scientific publications: the scientist's perspective.

    Directory of Open Access Journals (Sweden)

    Yegor Voronin

    Full Text Available BACKGROUND: Scientific publishing is undergoing significant changes due to the growth of online publications, increases in the number of open access journals, and policies of funders and universities requiring authors to ensure that their publications become publicly accessible. Most studies of the impact of these changes have focused on the growth of articles available through open access or the number of open-access journals. Here, we investigated access to publications at a number of institutes and universities around the world, focusing on publications in HIV vaccine research--an area of biomedical research with special importance to the developing world. METHODS AND FINDINGS: We selected research papers in HIV vaccine research field, creating: 1 a first set of 50 most recently published papers with keywords "HIV vaccine" and 2 a second set of 200 articles randomly selected from those cited in the first set. Access to the majority (80% of the recently published articles required subscription, while cited literature was much more accessible (67% freely available online. Subscriptions at a number of institutions around the world were assessed for providing access to subscription-only articles from the two sets. The access levels varied widely, ranging among institutions from 20% to 90%. Through the WHO-supported HINARI program, institutes in low-income countries had access comparable to that of institutes in the North. Finally, we examined the response rates for reprint requests sent to corresponding authors, a method commonly used before internet access became widespread. Contacting corresponding authors with requests for electronic copies of articles by email resulted in a 55-60% success rate, although in some cases it took up to 1.5 months to get a response. CONCLUSIONS: While research articles are increasingly available on the internet in open access format, institutional subscriptions continue to play an important role. However

  9. Facilitating Full-text Access to Biomedical Literature Using Open Access Resources.

    Science.gov (United States)

    Kang, Hongyu; Hou, Zhen; Li, Jiao

    2015-01-01

    Open access (OA) resources and local libraries often have their own literature databases, especially in the field of biomedicine. We have developed a method of linking a local library to a biomedical OA resource facilitating researchers' full-text article access. The method uses a model based on vector space to measure similarities between two articles in local library and OA resources. The method achieved an F-score of 99.61%. This method of article linkage and mapping between local library and OA resources is available for use. Through this work, we have improved the full-text access of the biomedical OA resources.

  10. Access 2010 for dummies

    CERN Document Server

    Ulrich Fuller, Laurie

    2010-01-01

    A friendly, step-by-step guide to the Microsoft Office database application Access may be the least understood and most challenging application in the Microsoft Office suite. This guide is designed to help anyone who lacks experience in creating and managing a database learn to use Access 2010 quickly and easily. In the classic For Dummies tradition, the book provides an education in Access, the interface, and the architecture of a database. It explains the process of building a database, linking information, sharing data, generating reports, and much more.As the Micr

  11. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology Submission Deadline: 1 June 2005 Background With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks

  12. Brain Sciences – An Open Access Journal

    Directory of Open Access Journals (Sweden)

    Germán Barrionuevo

    2010-07-01

    Full Text Available During the first ten years that followed “The Decade of the Brain”, the quest of neuroscience for understanding brain function in health and disease has greatly expanded to include molecular, developmental, cognitive and evolutionary aspects of the nervous system. This increased multidisciplinary effort has been complemented by the spectacular development of highly sophisticated experimental methods. Neuroscientists can now perform studies ranging from molecular and imaging analysis of single pre- and postsynaptic neuronal processes to imaging of neural activity in the whole brain during perceptual and motor behavioral tasks. At the same time, theoretical advances in neuroscience have been aided by the rapid development of mathematical and computational simulations of biologically and functionally realistic single cells and complex neural networks across multiple spatiotemporal scales. Therefore, neuroscientists are more than ever in a position to deliver answers to basic, medical and biotechnological questions related to brain function and dysfunction. [...

  13. Roundabouts and access management.

    Science.gov (United States)

    2014-03-01

    Transportation engineers and planners are becoming more interested in using roundabouts to address access : management and safety concerns in the transportation system. While roundabouts are being used increasingly in a : variety of contexts, existin...

  14. Market Access and Welfare

    DEFF Research Database (Denmark)

    Raimondos-Møller, Pascalis; Woodland, Alan D.

    According to the literature, well known tariff reform rules that are guaranteed to increase welfare will not necessarily increase market access, while rules that are guaranteed to increase market access will not necessarily increase welfare. Such conflict between welfare and market access...... objectives of trade policy is problematic and calls for finding alternative tariff reform rules that can achieve both objectives at the same time. The present paper contributes to this aim by using a new set of tariff reforms that are based on local optimality. Using such reforms it is shown that market...... access and consumer welfare will always be weakly compatible, in the sense that reforms based on each objective have the same signed effect on the other objective. For strong compatibility, whereby both objectives increase as a result of a locally optimal tariff reform, we derive both a necessary...

  15. KAUST Open Access policy

    KAUST Repository

    Baessa, Mohamed A.

    2017-01-01

    The library plays a critical role in facilitating open access for their researchers, from managing a repository to providing support and information on the OA publication process to their authors. Janis Tyhurst and Dr Imad

  16. Access to the city

    DEFF Research Database (Denmark)

    Andreasen, Manja Hoppe; Møller-Jensen, Lasse

    2017-01-01

    This paper is concerned with access to the city for urban residents living in the periphery of Dar es Salaam, Tanzania. The paper presents an analysis of the mobility practices of residents and investigates the mobility constraints they experience in relation to the limited accessibility provided...... mobility and access to the city for residents in the periphery. Regular mobility is an ingrained part of residents' livelihood strategies. The majority of households rely on one or more members regularly travelling to central parts of the city in relation to their livelihood activities. The analysis...... by road and traffic conditions and highlights how accessibility problems of peripheral settlements are not easily understood separately from the general dysfunctions of the overall mobility system of city....

  17. Critical Access Hospitals (CAH)

    Science.gov (United States)

    ... for Success Am I Rural? Evidence-based Toolkits Economic Impact Analysis Tool Community Health Gateway Sustainability Planning ... hospitals and improve access to healthcare by keeping essential services in rural communities. To accomplish this goal, ...

  18. Remote Network Access (RNA)

    National Research Council Canada - National Science Library

    2002-01-01

    .... Remote Network Access (RNA) includes or is associated with all communication devices/software, firewalls, intrusion detection systems and virus protection applications to ensure security of the OIG, DoD, Network from remote...

  19. Access/AML -

    Data.gov (United States)

    Department of Transportation — The AccessAML is a web-based internet single application designed to reduce the vulnerability associated with several accounts assinged to a single users. This is a...

  20. Access road reclamation

    International Nuclear Information System (INIS)

    Manson, T.; Blok, M.

    1997-01-01

    A general review of the measures involved in restoring abandoned access road sites in British Columbia was presented. Permits and licences are needed for the use of crown land for roads used by the petroleum and natural gas industry for exploration activities. However, the regulatory framework for road site reclamation is not well developed. The nature of access road reclamation is very site-specific. Some of the issues that are considered for all reclamation projects include slope stability, water control, revegetation, soil rehabilitation, access management and monitoring. The primary objective of reclaiming access road sites is to return the site to conditions that are equal or better than pre-disturbance conditions. Restoration measures must be approved by BC Environment and by the Department of Fisheries and Oceans where federal fisheries responsibilities are involved. 54 refs., 5 tabs., 3 figs

  1. Accessible Geoscience - Digital Fieldwork

    Science.gov (United States)

    Meara, Rhian

    2017-04-01

    Accessible Geoscience is a developing field of pedagogic research aimed at widening participation in Geography, Earth and Environmental Science (GEES) subjects. These subjects are often less commonly associated with disabilities, ethnic minorities, low income socio-economic groups and females. While advancements and improvements have been made in the inclusivity of these subject areas in recent years, access and participation of disabled students remains low. While universities are legally obligated to provide reasonable adjustments to ensure accessibility, the assumed incompatibility of GEES subjects and disability often deters students from applying to study these courses at a university level. Instead of making reasonable adjustments if and when they are needed, universities should be aiming to develop teaching materials, spaces and opportunities which are accessible to all, which in turn will allow all groups to participate in the GEES subjects. With this in mind, the Swansea Geography Department wish to enhance the accessibility of our undergraduate degree by developing digital field work opportunities. In the first instance, we intend to digitise three afternoon excursions which are run as part of a 1st year undergraduate module. Each of the field trips will be digitized into English- and Welsh-medium formats. In addition, each field trip will be digitized into British Sign Language (BSL) to allow for accessibility for D/deaf and hard of hearing students. Subtitles will also be made available in each version. While the main focus of this work is to provide accessible fieldwork opportunities for students with disabilities, this work also has additional benefits. Students within the Geography Department will be able to revisit the field trips, to revise and complete associated coursework. The use of digitized field work should not replace opportunities for real field work, but its use by the full cohort of students will begin to "normalize" accessible field

  2. CERN access cards

    CERN Multimedia

    HR Department

    2007-01-01

    Holders of CERN access cards are reminded that the card is an official document. It is important to carry it with you at all times when you are on the site. This applies also to those on standby duty who are called out for emergency interventions. As announced in Weekly Bulletin 13/2006, any loss or theft of access cards must be declared to the competent external authorities.

  3. Mixing stream and datagram traffic on satellite: A FIFO Order-based Demand Assignment (FODA) Time Division Multiple Access (TDMA) scheme

    Science.gov (United States)

    Beltrame, R.; Bonito, A. B.; Celandroni, N.; Ferro, E.

    1985-11-01

    A FIFO Order based Demand Assignment (FODA) access scheme was designed to handle packetized data and voice traffic in a multiple access satellite broadcast channel of Mbits band. The channel is shared by as many as 64 simultaneously active stations in a range of 255 addressable stations. A sophisticated traffic environment is assumed, including different types of service requirements and an arbitrary load distribution among the stations. The results of 2Mbit/sec simulation tests for an existing hardware environment are presented.

  4. Vascular Access in Children

    International Nuclear Information System (INIS)

    Krishnamurthy, Ganesh; Keller, Marc S.

    2011-01-01

    Establishment of stable vascular access is one of the essential and most challenging procedures in a pediatric hospital. Many clinical specialties provide vascular service in a pediatric hospital. At the top of the “expert procedural pyramid” is the pediatric interventional radiologist, who is best suited and trained to deliver this service. Growing awareness regarding the safety and high success rate of vascular access using image guidance has led to increased demand from clinicians to provide around-the-clock vascular access service by pediatric interventional radiologists. Hence, the success of a vascular access program, with the pediatric interventional radiologist as the key provider, is challenging, and a coordinated multidisciplinary team effort is essential for success. However, there are few dedicated pediatric interventional radiologists across the globe, and also only a couple of training programs exist for pediatric interventions. This article gives an overview of the technical aspects of pediatric vascular access and provides useful tips for obtaining vascular access in children safely and successfully using image guidance.

  5. Monitoring crack growth by a potential drop method

    International Nuclear Information System (INIS)

    Tomlinson, J.R.

    1978-01-01

    A theoretical model has been developed for the surface current flow and potential distribution around a surface breaking crack. This model's predictions have been confirmed in the laboratory and the method applied on site. It proved possible by careful design and rigorous testing to overcome the problems of interference in an electrically noisy environment. The principal weaknesses of the technique are that it is only capable of detecting cracks that break the accessible surface of the component, and that there may be problems with conductive bridging across the crack. On the other hand, the lack of any sophisticated probe in contact with the component makes the method suitable for high temperature use, and, being an electrical method, it is capable of continuous use. The use of a.c., as opposed to d.c., enables lower currents to be used. Given good access to the crack tip, a high sensitivity can be obtained, which enables noise rejection to be achieved with the use of a high threshold. (orig.) [de

  6. Youth access to tobacco.

    Science.gov (United States)

    Rigotti, N A

    1999-01-01

    To start smoking, young people need a supply of tobacco products. Reducing youth access to tobacco is a new approach to preventing tobacco use that has been a focus of federal, state, and local tobacco control efforts over the past decade. All 50 states ban tobacco sales to minors, but compliance is poor because laws are not enforced. Consequently, young people have little trouble obtaining tobacco products. Commercial sources of tobacco (stores and vending machines) are important for underage smokers, who often purchase their own cigarettes. Underage youths also obtain tobacco from noncommercial sources such as friends, relatives, older adolescents, and adults. Educating retailers about tobacco sales laws has not produced long-term improvement in their compliance. Active enforcement of tobacco sales laws changes retailer behavior, but whether this reduces young people's access to tobacco or their tobacco use is not clear. The effectiveness of new local, state, and federal actions that aim to reduce youth access to tobacco remains to be determined. Can enforcing tobacco sales laws reduce young people's access to tobacco? If so, will this prevent or delay the onset of their tobacco use? How will youths' sources of tobacco change as commercial sources are restricted? What are the social (noncommercial) sources of tobacco for minors and how can youths' access to tobacco from these sources be reduced? What is the impact of the new federal policies aimed at reducing youth access to tobacco? Do new state and local laws that ban youth possession or use of tobacco have a net positive or negative impact on youth attitudes, access to tobacco, or tobacco use? What is the relative effectiveness and cost-effectiveness of efforts to reduce the supply of tobacco compared to those that aim to reduce demand for tobacco? Will either work alone or are both necessary to achieve reductions in youth smoking?

  7. Availability and Accessibility in an Open Access Institutional Repository: A Case Study

    Science.gov (United States)

    Lee, Jongwook; Burnett, Gary; Vandegrift, Micah; Baeg, Jung Hoon; Morris, Richard

    2015-01-01

    Introduction: This study explores the extent to which an institutional repository makes papers available and accessible on the open Web by using 170 journal articles housed in DigiNole Commons, the institutional repository at Florida State University. Method: To analyse the repository's impact on availability and accessibility, we conducted…

  8. A Sophisticated Architecture Is Indeed Necessary for the Implementation of Health in All Policies but not Enough Comment on "Understanding the Role of Public Administration in Implementing Action on the Social Determinants of Health and Health Inequities".

    Science.gov (United States)

    Breton, Eric

    2016-02-29

    In this commentary, I argue that beyond a sophisticated supportive architecture to facilitate implementation of actions on the social determinants of health (SDOH) and health inequities, the Health in All Policies (HiAP) project faces two main barriers: lack of awareness within policy networks on the social determinants of population health, and a tendency of health actors to neglect investing in other sectors' complex problems. © 2016 by Kerman University of Medical Sciences.

  9. Enterprise Dynamic Access Control (EDAC)

    National Research Council Canada - National Science Library

    Fernandez, Richard

    2005-01-01

    .... Resources can represent software applications, web services and even facility access. An effective access control model should be capable of evaluating resource access based on user characteristics and environmentals...

  10. Accessible Website Content Guidelines for Users with Intellectual Disabilities

    NARCIS (Netherlands)

    Karreman, Joyce; van der Geest, Thea; Buursink, Esmee

    2007-01-01

    Background: The W3C Web Accessibility Initiative has issued guidelines for making websites better and easier to access for people with various disabilities (W3C Web Accessibility Initiative guidelines 1999). - Method: The usability of two versions of a website (a non-adapted site and a site that was

  11. Accessibility of women farmers to agricultural information in South ...

    African Journals Online (AJOL)

    Furthermore, the women farmers were accessible to technical information on improved seeds (x = 2.59), storage methods (x = 2.44), but poor access to operating farm machinery (x =0.49) and weather forecast (x =0.68). With regard to economic information they were accessible to market locations (x =2.40), but had low ...

  12. Electronic doors to education: study of high school website accessibility in Iowa.

    Science.gov (United States)

    Klein, David; Myhill, William; Hansen, Linda; Asby, Gary; Michaelson, Susan; Blanck, Peter

    2003-01-01

    The Americans with Disabilities Act (ADA), and Sections 504 and 508 of the Rehabilitation Act, prohibit discrimination against people with disabilities in all aspects of daily life, including education, work, and access to places of public accommodations. Increasingly, these antidiscrimination laws are used by persons with disabilities to ensure equal access to e-commerce, and to private and public Internet websites. To help assess the impact of the anti-discrimination mandate for educational communities, this study examined 157 website home pages of Iowa public high schools (52% of high schools in Iowa) in terms of their electronic accessibility for persons with disabilities. We predicted that accessibility problems would limit students and others in obtaining information from the web pages as well as limiting ability to navigate to other web pages. Findings show that although many web pages examined included information in accessible formats, none of the home pages met World Wide Web Consortium (W3C) standards for accessibility. The most frequent accessibility problem was lack of alternative text (ALT tags) for graphics. Technical sophistication built into pages was found to reduce accessibility. Implications are discussed for schools and educational institutions, and for laws, policies, and procedures on website accessibility. Copyright 2003 John Wiley & Sons, Ltd.

  13. Nuclear information access system

    International Nuclear Information System (INIS)

    Ham, C. H.; Yang, M. H.; Yoon, S. W.

    1998-01-01

    The energy supply in the countries, which have abundant energy resources, may not be affected by accepting the assertion of anti-nuclear and environment groups. Anti-nuclear movements in the countries which have little energy resources may cause serious problem in securing energy supply. Especially, it is distinct in Korea because she heavily depends on nuclear energy in electricity supply(nuclear share in total electricity supply is about 40%).The cause of social trouble surrounding nuclear energy is being involved with various circumstances. However, it is very important that we are not aware of the importance of information access and prepared for such a situation from the early stage of nuclear energy's development. In those matter, this paper analyzes the contents of nuclear information access system in France and Japan which have dynamic nuclear development program and presents the direction of the nuclear access regime through comparing Korean status and referring to progresses of the regime

  14. Joint control algorithm in access network

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    To deal with long probing delay and inaccurate probing results in the endpoint admission control method,a joint local and end-to-end admission control algorithm is proposed,which introduces local probing of access network besides end-to-end probing.Through local probing,the algorithm accurately estimated the resource status of the access network.Simulation shows that this algorithm can improve admission control performance and reduce users' average waiting time when the access network is heavily loaded.

  15. Suspect online sellers and contraceptive access.

    Science.gov (United States)

    Liang, Bryan A; Mackey, Tim K; Lovett, Kimberly M

    2012-11-01

    Issues surrounding contraception access have been a national focus. During this debate, adolescent and adult women may seek these products online. Due to safety concerns, including potential counterfeit forms, we wished to assess whether online "no prescription" contraceptives were available. We assessed online availability of reversible, prescription contraceptive methods resulting in online pharmacy marketing is shifting from direct search engine access to social media (Facebook, Twitter, Slidehare, flickr). Online contraceptive sales represent patient safety risks and a parallel system of high-risk product access absent professional guidance. Providers should educate patients, while policy makers employ legal strategies to address these systemic risks. Copyright © 2012 Elsevier Inc. All rights reserved.

  16. Sprawl and Accessibility

    Directory of Open Access Journals (Sweden)

    Robert Bruegmann

    2008-07-01

    Full Text Available This essay argues that many of the assumptions that have been made about sprawl are misleading or just wrong. Nowhere has this been more the case than in debates about transportation and access. Because of this, it is not surprising that a good many of the policies advocated by proponents of Smart Growth would almost certainly lead to reduced mobility and impaired accessibility for a large part of the population. At very least, the debates over sprawl have pitted private vs. public transportation in a way that has contributed to serious underfunding of transportation infrastructure of all kinds.

  17. Quantum random access memory

    OpenAIRE

    Giovannetti, Vittorio; Lloyd, Seth; Maccone, Lorenzo

    2007-01-01

    A random access memory (RAM) uses n bits to randomly address N=2^n distinct memory cells. A quantum random access memory (qRAM) uses n qubits to address any quantum superposition of N memory cells. We present an architecture that exponentially reduces the requirements for a memory call: O(log N) switches need be thrown instead of the N used in conventional (classical or quantum) RAM designs. This yields a more robust qRAM algorithm, as it in general requires entanglement among exponentially l...

  18. Disruption - Access cards service

    CERN Multimedia

    2014-01-01

    We would like to inform you that between 10 November and 15 December 2014, the access cards service in Building 55 will be disrupted, as the GS Department has decided to improve the facilities for users of this building. During the work, you will find the registration, biometric registration and dosimeter exchange services on the second floor of Building 55 and the vehicle sticker service on the ground floor along with the access cards service. We thank you for your understanding and apologise for any inconvenience caused.

  19. Central Venous Access

    International Nuclear Information System (INIS)

    Ganeshan, Arul; Warakaulle, Dinuke R.; Uberoi, Raman

    2007-01-01

    Central venous access plays an important role in the management of an ever-increasing population of patients ranging from those that are critically ill to patients with difficult clinical access. Interventional radiologists are key in delivering this service and should be familiar with the wide range of techniques and catheters now available to them. A comprehensive description of these catheters with regard to indications, technical aspects of catheterization, success rates, and associated early and late complications, as well as a review of various published guidelines on central venous catheter insertion are given in this article

  20. FINANCIAL DEPTH AND FINANCIAL ACCESS IN INDONESIA

    OpenAIRE

    Sigit Setiawan

    2015-01-01

    This study is intended to analyze the current levels of financial depth and financial access in Indonesia and to analyze the factors affecting them. The analysis method used was a combination of descriptive quantitative, benchmarking, and literature reviews. The conclusion is that the financial depth in Indonesia has not shown a satisfactory level since it was the lowest, or the second lowest ranked country among the sampled countries. Meanwhile, the financial access in Indonesia is relativel...

  1. Editorial - Open Access and accessing openness

    Directory of Open Access Journals (Sweden)

    Yngve Nordkvelle

    2008-12-01

    Full Text Available Seminar.net enters it’s fourth year, and has reached a state of maturity in a number of meanings: it receives manuscripts from all continents, the articles are read from 134 countries, of which India represents the highest number of readers, a number of articles have been read by more than 10 000 interested persons, and the frequency of issues is now three per year, and will reach four by next year. Interested parties now approach us in order to learn about our policies and practices.It takes time to become established and influential in the sense that articles are cited and referred to in prestigious publications. Still, the most prestigious publications are on paper. Many countries now embark on a policy that rewards researchers that publish in international journals, preferably in English. National languages are rendered less significant. In the UK, the research assessment exercise (RAE, and several other countries with a publication or citation based reward system in research, tend to favour quantitative dimensions at the expense of the quality of the publication. International publishing houses are huge profit-making companies that over years have increased their profit rates, charging increasingly economically pressured higher education institution with high subscription rates. With the advent of electronic publishing their position is severely challenged. It has been noted that the most significant publication of the last couple of decades was an electronic publication: Tim Berners Lee published the protocol for the World Wide Web in 1990. It was never refereed, nor was controlled by appointed gatekeepers of the “establishment”. The number of Open Access publications is rising every day, and the number of e-journals for academic publishing is reaching higher and higher numbers. In a recent case The Faculty of Arts and Sciences at Harvard University decided, that Harvard employees must publish all their material simultaneously on the

  2. Regression methods for medical research

    CERN Document Server

    Tai, Bee Choo

    2013-01-01

    Regression Methods for Medical Research provides medical researchers with the skills they need to critically read and interpret research using more advanced statistical methods. The statistical requirements of interpreting and publishing in medical journals, together with rapid changes in science and technology, increasingly demands an understanding of more complex and sophisticated analytic procedures.The text explains the application of statistical models to a wide variety of practical medical investigative studies and clinical trials. Regression methods are used to appropriately answer the

  3. Complication with intraosseous access

    DEFF Research Database (Denmark)

    Hallas, Peter; Brabrand, Mikkel; Folkestad, Lars

    2013-01-01

    with aspiration of bone marrow (12.3%), and bended/broken needle (4.0%). When using an established IO access the reported complications were difficulties with injection fluid and drugs after IO insertion (7.4%), slow infusion (despite use of pressure bag) (8.8%), displacement after insertion (8...

  4. College Access Marketing

    Science.gov (United States)

    Tremblay, Christopher W.

    2011-01-01

    College Access Marketing (CAM) is a relatively new phenomenon that seeks to positively influence the college-going rate. This report defines CAM, describes CAM examples, and discusses how CAM seeks to counter barriers to college. It explores four main elements of CAM: information, marketing, advocacy, and social mobilization. Further, it…

  5. Funding scientific open access

    International Nuclear Information System (INIS)

    Canessa, E.; Fonda, C.; Zennaro, M.

    2006-11-01

    In order to reduce the knowledge divide, more Open Access Journals (OAJ) are needed in all languages and scholarly subject areas that exercise peer-review or editorial quality control. To finance needed costs, it is discussed why and how to sell target specific advertisement by associating ads to given scientific keywords. (author)

  6. Accessing vs Sourcing Knowledge

    DEFF Research Database (Denmark)

    Awate, Snehal; Larsen, Marcus M.; Mudambi, Ram

    2015-01-01

    to get on par with industry leaders. An in-depth comparison of knowledge flows reveals that within AMNEs, headquarters often serves the primary source of knowledge for R&D subsidiaries. In contrast, within EMNEs, headquarters accesses knowledge from R&D subsidiaries in advanced economies for innovation...

  7. KAUST Open Access policy

    KAUST Repository

    Baessa, Mohamed A.

    2017-03-07

    The transition to open access (OA) is being driven by funders, libraries, researchers and publishers around the world, and is having an impact on us all. It is inevitable that different countries, organisations and disciplines are moving at different rates towards an OA model, and it is this that we will focus on in this session. Drawing on experiences from across Europe and the Middle East we will provide perspectives from both a global publisher and institutions based in the region. Taylor & Francis take a flexible, evidence-based approach to open access, providing a choice of publication routes for our authors, and a choice of agreements for our library customers. Carolyn will outline some of the open access developments, opportunities and challenges at Taylor & Francis. The library plays a critical role in facilitating open access for their researchers, from managing a repository to providing support and information on the OA publication process to their authors. Janis Tyhurst and Dr Imad Bachir will each give an overview of how this is being managed by their institution. There will be an opportunity for questions and discussion with the panel.

  8. Open access to transmission

    International Nuclear Information System (INIS)

    Keith, D.M.

    1996-01-01

    For the past 12 to 15 years, the US electric power and energy industry and its federal regulators have been going through a prolonged exercise leading to opening up the national interconnected transmission grid for all qualified wholesale users to have open and equal access. The debates have been painful in a sense that not all parties - especially some of the transmission system owning utilities - believe that the concept of Open Access is achievable, due to technical constraints on the systems. The present Open Access activity is limited to wholesales transaction under the federal jurisdiction, but several states are either experimenting with or considering retail wheeling. In fact, the FERC - Federal Energy Regulatory Commission - has already expanded its view to embrace retail transmission, if the retail transaction involves the use of the interstate transmission systems which are under FERC's jurisdiction. This paper delves into some of the results of the technical cost and pricing analysis for open access. The statutes and resulting regulations are not addressed herein. (author). 1 fig

  9. The Open Access Dilemma

    Science.gov (United States)

    Pratt, Timothy

    2017-01-01

    Community colleges, with their commitment to open access, admit millions of students each year who are unprepared for college-level work, even though they have earned a high-school diploma. For decades the schools had a built-in base of students attracted to their open doors and relative affordability. But enrollment at public two-year college has…

  10. Access Rights Distribution

    Directory of Open Access Journals (Sweden)

    T. M. Pestunova

    2011-03-01

    Full Text Available The main aspects of the development of the information system, which grants users the rights for access to automated information system resources on the basis of the organization business-processes, are considered. The conceptual, informational, functional models of the system, as well as a model, which allows to realize control while using various formal models (RBAC, DAC, MAC, are described.

  11. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi

    2015-01-01

    The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered as ...

  12. Planning for Accessibility.

    Science.gov (United States)

    Spoor, Dana L.

    1997-01-01

    Argues that barrier-free designs should be incorporated in the first steps of school facility planning to avoid the difficulties in meeting Americans with Disabilities Act (ADA) guidelines during renovations. Explains why not all barriers need be removed to make a facility accessible to everyone. Discusses issues involving ADA guidelines and child…

  13. ACCESS Project: Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Weller, Heiko [Robert Bosch, LLC, Farmington Hills, MI (United States)

    2015-04-01

    The ACCESS project addressed the development, testing, and demonstration of the proposed advanced technologies and the associated emission and fuel economy improvement at an engine dynamometer and on a full-scale vehicle. Improve fuel economy by 25% with minimum performance penalties Achieve SULEV level emissions with gasoline Demonstrate multi-mode combustion engine management system

  14. Multiple Access Communications

    DEFF Research Database (Denmark)

    This book constitutes the proceedings of the 9th International Workshop on Multiple Access Communications, MACOM 2016, held in Aalborg, Denmark, in November 2016. The 10 full papers presented in this volume were carefully reviewed and selected from 12 submissions. They were organized in topical...

  15. Fixed Access Network Sharing

    Science.gov (United States)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  16. Digital Scholarship and Open Access

    Science.gov (United States)

    Losoff, Barbara; Pence, Harry E.

    2010-01-01

    Open access publications provide scholars with unrestricted access to the "conversation" that is the basis for the advancement of knowledge. The large number of open access journals, archives, and depositories already in existence demonstrates the technical and economic viability of providing unrestricted access to the literature that is the…

  17. Platonic Dialogue, Maieutic Method and Critical Thinking

    Science.gov (United States)

    Leigh, Fiona

    2007-01-01

    In this paper I offer a reading of one of Plato's later works, the "Sophist", that reveals it to be informed by principles comparable on the face of it with those that have emerged recently in the field of critical thinking. As a development of the famous Socratic method of his teacher, I argue, Plato deployed his own pedagogical method, a…

  18. Support open access publishing

    DEFF Research Database (Denmark)

    Ekstrøm, Jeannette

    2013-01-01

    Projektet Support Open Access Publishing har til mål at få opdateret Sherpa/Romeo databasen (www.sherpa.ac.uk/romeo) med fagligt relevante, danske tidsskrifter. Projektet skal endvidere undersøge mulighederne for at få udviklet en database, hvor forskere på tværs af relevante tidsskriftsinformati......Projektet Support Open Access Publishing har til mål at få opdateret Sherpa/Romeo databasen (www.sherpa.ac.uk/romeo) med fagligt relevante, danske tidsskrifter. Projektet skal endvidere undersøge mulighederne for at få udviklet en database, hvor forskere på tværs af relevante...

  19. Analysing Access Control Specifications

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof

    2009-01-01

    When prosecuting crimes, the main question to answer is often who had a motive and the possibility to commit the crime. When investigating cyber crimes, the question of possibility is often hard to answer, as in a networked system almost any location can be accessed from almost anywhere. The most...... common tool to answer this question, analysis of log files, faces the problem that the amount of logged data may be overwhelming. This problems gets even worse in the case of insider attacks, where the attacker’s actions usually will be logged as permissible, standard actions—if they are logged at all....... Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set...

  20. IMPROVING ACCESS TO DRUGS

    Directory of Open Access Journals (Sweden)

    Max Joseph Herman

    2012-11-01

    Full Text Available Although essentially not all therapies need drug intervention, drugs is still an important components in health sector, either in preventive, curative, rehabilitative or promotion efforts. Hence the access to drugs is a main problem, either in international or national scale even to the smallest unit. The problem on access to drugs is very complicated and cannot be separated especially from pharmacy management problems; moreover in general from the overall lack of policy development and effective of health policy, and also the implementation process. With the policy development and effective health policy, rational drug uses, sufficient health service budget so a country can overcome the health problems. Besides infrastructures, regulations, distribution and cultural influences; the main obstacles for drug access is drugs affordability if the price of drugs is an important part and determined by many factors, especially the drug status whether is still patent orgenerics that significantly decrease cost of health cares and enhance the drugs affordability. The determination of essential drug prices in developing countries should based on equity principal so that poor people pay cheaper and could afford the essential drugs. WHO predicts two third of world population can not afford the essential drugs in which in developing countries, some are because of in efficient budget allocation in consequence of drug distribution management, including incorrect selection and allocation and also irrational uses. In part these could be overcome by enhancing performances on the allocation pharmacy needs, including the management of information system, inventory management, stock management and the distribution. Key words: access, drugs, essential drugs, generic drugs

  1. Telecommunication access to INIS

    International Nuclear Information System (INIS)

    Scheel, H.; Breitfeld, B.; Huebner, B.

    1983-01-01

    Proceeding from the features of on-line retrieval from the INIS data base, a description is given of the technical and organizational conditions established by the national INIS Centre of the GDR in using the INIS direct access service. Data are presented on the structure of search queries, retrieval precision, and connect time to the computer. Experience has shown that efficient dialogue searching necessitates the searcher's skill and familiarity with the system. (author)

  2. ADOPT Open Access

    CERN Multimedia

    2007-01-01

    Are you writing a theoretical paper? An experimental one? Or one about instrumentation? You can publish it in Open Access. Now. Read how... You might have heard about Open Access, the next big thing in scientific publishing. The idea is to make the results of your (publicly funded) research free to read for everyone out there ... not only those lucky ones who work in places where libraries can afford to purchase the expensive subscriptions to scientific journals. CERN, DESY and other particle physics institutes have accepted an offer by one of the leading journals in High Energy Physics, JHEP: our libraries will pay a special subscription fee, and, in exchange, all articles with at least one author from our institutes will be published in Open Access. Anyone, anywhere and anytime will be able to read them, without any financial barrier! If you are writing an instrumentation paper, you can submit it to JINST and benefit from the same offer. This is a major step forward in the planned conversion of existi...

  3. Open-Access Publishing

    Directory of Open Access Journals (Sweden)

    Nedjeljko Frančula

    2013-06-01

    Full Text Available Nature, one of the most prominent scientific journals dedicated one of its issues to recent changes in scientific publishing (Vol. 495, Issue 7442, 27 March 2013. Its editors stressed that words technology and revolution are closely related when it comes to scientific publishing. In addition, the transformation of research publishing is not as much a revolution than an attrition war in which all sides are buried. The most important change they refer to is the open-access model in which an author or an institution pays in advance for publishing a paper in a journal, and the paper is then available to users on the Internet free of charge.According to preliminary results of a survey conducted among 23 000 scientists by the publisher of Nature, 45% of them believes all papers should be published in open access, but at the same time 22% of them would not allow the use of papers for commercial purposes. Attitudes toward open access vary according to scientific disciplines, leading the editors to conclude the revolution still does not suit everyone.

  4. Making of epistemologically sophisticated physics teachers: A cross-sequential study of epistemological progression from preservice to in-service teachers

    Science.gov (United States)

    Ding, Lin; Zhang, Ping

    2016-12-01

    Previous literature on learners' epistemological beliefs about physics has almost exclusively focused on analysis of university classroom instruction and its effects on students' views. However, little is known about other populations or factors other than classroom instruction on learners' epistemologies. In this study, we used a cross-sequential method, combining both longitudinal and cross-sectional designs, to investigate an epistemological progression trend from preservice to in-service teachers. Six cohorts of participants were studied, who either were then attending or had completed an undergraduate teacher preparation program in physics at a major Chinese university. These cohorts were incoming freshmen, end-of-year freshmen, end-of-year sophomores, end-of-year juniors, end-of-year seniors, and 1st-year high school physics teachers who were about to enter the 2nd year of teaching. We used the Colorado Learning Attitudes about Science Survey (CLASS) as both a pretest and a post-test to gauge the changes in the participants' epistemological views over an entire academic year. Follow-up interviews were also conducted to explore factors responsible for such changes. Results showed that the epistemological trend as measured by CLASS did not increase monotonically. Instead, there was a decrease in the epistemological trend among the incoming freshmen in their first year undergraduate studies, followed by a long stasis until the end of the senior year. Then, there was a rebound for the end-of-year seniors in their 1st year of teaching, followed by another plateau. Interviews revealed that the competitive learning environment, increased content difficulty, and unfamiliar pedagogies in college were major factors that negatively influenced incoming freshmen's views about physics. Conversely, a role change from student to teacher and relatively easy content in high school positively impacted end-of-year seniors' views about physics and learning.

  5. Making of epistemologically sophisticated physics teachers: A cross-sequential study of epistemological progression from preservice to in-service teachers

    Directory of Open Access Journals (Sweden)

    Lin Ding

    2016-11-01

    Full Text Available Previous literature on learners’ epistemological beliefs about physics has almost exclusively focused on analysis of university classroom instruction and its effects on students’ views. However, little is known about other populations or factors other than classroom instruction on learners’ epistemologies. In this study, we used a cross-sequential method, combining both longitudinal and cross-sectional designs, to investigate an epistemological progression trend from preservice to in-service teachers. Six cohorts of participants were studied, who either were then attending or had completed an undergraduate teacher preparation program in physics at a major Chinese university. These cohorts were incoming freshmen, end-of-year freshmen, end-of-year sophomores, end-of-year juniors, end-of-year seniors, and 1st-year high school physics teachers who were about to enter the 2nd year of teaching. We used the Colorado Learning Attitudes about Science Survey (CLASS as both a pretest and a post-test to gauge the changes in the participants’ epistemological views over an entire academic year. Follow-up interviews were also conducted to explore factors responsible for such changes. Results showed that the epistemological trend as measured by CLASS did not increase monotonically. Instead, there was a decrease in the epistemological trend among the incoming freshmen in their first year undergraduate studies, followed by a long stasis until the end of the senior year. Then, there was a rebound for the end-of-year seniors in their 1st year of teaching, followed by another plateau. Interviews revealed that the competitive learning environment, increased content difficulty, and unfamiliar pedagogies in college were major factors that negatively influenced incoming freshmen’s views about physics. Conversely, a role change from student to teacher and relatively easy content in high school positively impacted end-of-year seniors’ views about physics and

  6. Code-Expanded Random Access for Machine-Type Communications

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Stefanovic, Cedomir

    2012-01-01

    Abstract—The random access methods used for support of machine-type communications (MTC) in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. Motivated by the random access method employed in LTE, we propose...

  7. The AAS Working Group on Accessibility and Disability (WGAD) Year 1 Highlights and Database Access

    Science.gov (United States)

    Knierman, Karen A.; Diaz Merced, Wanda; Aarnio, Alicia; Garcia, Beatriz; Monkiewicz, Jacqueline A.; Murphy, Nicholas Arnold

    2017-06-01

    The AAS Working Group on Accessibility and Disability (WGAD) was formed in January of 2016 with the express purpose of seeking equity of opportunity and building inclusive practices for disabled astronomers at all educational and career stages. In this presentation, we will provide a summary of current activities, focusing on developing best practices for accessibility with respect to astronomical databases, publications, and meetings. Due to the reliance of space sciences on databases, it is important to have user centered design systems for data retrieval. The cognitive overload that may be experienced by users of current databases may be mitigated by use of multi-modal interfaces such as xSonify. Such interfaces would be in parallel or outside the original database and would not require additional software efforts from the original database. WGAD is partnering with the IAU Commission C1 WG Astronomy for Equity and Inclusion to develop such accessibility tools for databases and methods for user testing. To collect data on astronomical conference and meeting accessibility considerations, WGAD solicited feedback from January AAS attendees via a web form. These data, together with upcoming input from the community and analysis of accessibility documents of similar conferences, will be used to create a meeting accessibility document. Additionally, we will update the progress of journal access guidelines and our social media presence via Twitter. We recommend that astronomical journals form committees to evaluate the accessibility of their publications by performing user-centered usability studies.

  8. A modified method using a two-port approach for accessing the hilar vasculature without transferring an endostapler from camera port to utility port during thoracoscopic right upper lobectomy.

    Science.gov (United States)

    Jiao, W; Zhao, Y; Xuan, Y; Wang, M

    2015-02-01

    For thoracoscopic upper lobectomies, most cutting endostaplers must be inserted through the camera port when using a two-port approach. Access to the hilar vasculature through only the utility port remains a challenge. In this study, we describe a procedure to access the hilar vasculature without transferring the endostapler site during a thoracoscopic right upper lobectomy. A 2.5-cm utility anterior incision was made in the fourth intercostal space. The posterior mediastinal visceral pleura were dissected to expose the posterior portion of the right upper bronchus and the anterior trunk of the right pulmonary artery. The pleura over the right hilar vasculature were then peeled with an electrocoagulation hook. The anterior trunk of the right pulmonary artery was then transected with a cutting endostapler through the utility port firstly. This crucial maneuver allowed the endostapler access to the right upper lobe pulmonary vein. The hilar structures were then easily handled in turn. This novel technique was performed successfully in 32 patients, with no perioperative deaths. The average operation time was 120.6 min (range 75-180 min). This novel technique permits effective control of the hilar vessels through the utility port, enabling simple, safe, quick and effective resection.

  9. Park Accessibility Impacts Housing Prices in Seoul

    Directory of Open Access Journals (Sweden)

    Jin Han Park

    2017-01-01

    Full Text Available Housing prices are determined by a variety of factors, including the features of the building and the neighborhood environment, and a potential buyer decides to buy a house after reviewing these factors and concluding that it is worth the price. We used Hedonic Price Methods to find the relationship between monetary value of house and access conditions to urban parks. Two meaningful results were discovered in this study: first, as the distance from the park increases, the value of the park inherent in the housing price decreases; second, the greater walking accessibility, to the park, the higher the park value inherent in housing prices. Despite presenting shorter distances to walk and more entrances, poorly accessible zones were deemed as such due to the necessity of crossing an arterial road. This indicates that the results can define accessibility not as the Euclidian distance but as the shortest walking distance while considering crossroads and park entrances. The results of this study have significant implications for urban park economic impact analyses in Seoul. Also, the increase in housing prices closer to parks supports the idea that access is dependent on the residents’ socioeconomic status. Lastly, the results of this study can improve walking accessibility to the park.

  10. Experimental protocol to assess the tourism vehicles accessibility based on heart rate and access time measurements

    Energy Technology Data Exchange (ETDEWEB)

    Alcala Fazio, E.; Alvarez Fernandez, N.

    2016-07-01

    The objective of the Project is to define an experimental protocol for the accessibility assessment of the transport vehicles, by analysing the evolution of the effort and time variables consumed by a target group –Persons of Reduced Mobility (PMRs). This protocol consisted in tests of accessibility on a sample of 6 passenger cars (class M1) by 8 elderly people carrying a heart rate monitor, and whose access manoeuvres were recorded by video cameras. Based on the Hilloskorpi et al. [1] model and by developing a method of truncation of the heart rate (HR) tests records - eliminating the component of the work biologically needed by the organism to keep its basal metabolic rate from the work each person performed – it was possible to evaluate how much energy each individual invested in each access manoeuver. Immediately after each test, and after the whole round of vehicles, each participant was surveyed for a subjective assessment of the difficulty of accessing to the cars. According to each of the above results, the HR objective measurements and the subjective opinion about the ease of access experienced by each individual, the vehicles were ranked by order of accessibility to the front and rear seats. The result of both rankings showed the orders of the similar vehicles, the potential of the method and a fair closeness between its results and the subjective, but real and unequivocal, judgments of the participants. (Author)

  11. Accessibility and inclusion informational

    Directory of Open Access Journals (Sweden)

    Mônica Sena de Souza

    2013-06-01

    Full Text Available Introduction: Discusses the role of information professionals in meeting the informational demands of people with disabilities in the information society. The librarian is crucial for the effectiveness and success in the informational inclusion of people with disabilities, considering also continuing education for their professional qualification.Objective: To provide reflections on the role of the librarian in serving users with disabilities, highlighting the need for improvement in information units, identified in the scientific literature with regard to accessibility.Methodology: Literature search, based on a review of literature in books and scientific papers, highlighting the main authors: Adams (2000, Mazzoni (2001 and Sassaki (1997, 2002, 2005.Results: The lack of informational access for people with disabilities hampers their social and political participation, hence, reduces its condition of citizenship.Conclusion: The librarian responsible for seeking continuing education, greater involvement in the events of the area and the constant search for job training, which will reflect on the best service the information needs of users with disabilities.

  12. Art : accessible, renewable technology

    International Nuclear Information System (INIS)

    Middleton, C.D.

    2004-01-01

    This paper focuses on the role of non-governmental organization (NGO) citizen groups in Ontario in the use and production of electricity. NGOs have the potential to act both directly on their own accord, and indirectly by pressuring government and others. Current demand for electricity is divided between industrial, commercial and residential users. Citizens have an important role to play in reducing energy demand. On the supply side, there is a revival of interest in renewable energy based on wind, photovoltaic and local-hydro technologies as a result of the escalating environmental and economic costs of coal and nuclear generation. However, citizen groups have greater interest and enthusiasm than technical expertise, creating a mismatch between technological solutions and human need or use of them. This paper discusses how this mismatch applies to renewable-energy technologies, many of which are not especially user-friendly, or accessible. While alternative technologies are increasingly welcomed by government, industry is developing a large and growing array of technological devices. In between this is the citizen, who, despite keen interest, can be overwhelmed by the complexity of the situation. This paper links the theoretical perspective to the real world with a discussion of the dynamics between people and renewable energy in citizen groups and makes particular reference to one group, Citizens for Renewable Energy, that has been making renewable energy technology more accessible to its members for over a decade

  13. EPICS: Channel Access security design

    International Nuclear Information System (INIS)

    Kraimer, M.; Hill, J.

    1994-05-01

    This document presents the design for implementing the requirements specified in: EPICS -- Channel Access Security -- functional requirements, Ned. D. Arnold, 03/09/92. Use of the access security system is described along with a summary of the functional requirements. The programmer's interface is given. Security protocol is described and finally aids for reading the access security code are provided

  14. NLM Emergency Access Initiative: FAQs

    Science.gov (United States)

    Facebook Visit us on Twitter Visit us on Youtube Emergency Access Initiative Home | Journals | Books | Online Databases | FAQs Take Short Survey FAQ What is the Emergency Access Initiative? The Emergency Access Initiative (EAI) is a collaborative partnership between NLM and participating publishers to

  15. Evaluating Access. Research Brief. Edition 9

    Science.gov (United States)

    Sutton Trust, 2015

    2015-01-01

    This report reviews national and international research on widening participation and access programmes to find out which methods are most likely to help disadvantaged pupils get into higher education. Analysis of existing research in the United States and United Kingdom suggests that summer schools, tutoring, and mentoring are among five methods…

  16. 29 CFR 32.27 - Accessibility.

    Science.gov (United States)

    2010-07-01

    ..., Classroom Training and On-the-Job-Training, when each part is viewed in its entirety, is readily accessible... method of complying with § 32.27(a) at a particular Job Corps Center, other than by making a significant alteration in its existing facilities or in its training, assign that individual to another Job Corps Center...

  17. A Bayesian modelling method for post-processing daily sub-seasonal to seasonal rainfall forecasts from global climate models and evaluation for 12 Australian catchments

    Directory of Open Access Journals (Sweden)

    A. Schepen

    2018-03-01

    Full Text Available Rainfall forecasts are an integral part of hydrological forecasting systems at sub-seasonal to seasonal timescales. In seasonal forecasting, global climate models (GCMs are now the go-to source for rainfall forecasts. For hydrological applications however, GCM forecasts are often biased and unreliable in uncertainty spread, and calibration is therefore required before use. There are sophisticated statistical techniques for calibrating monthly and seasonal aggregations of the forecasts. However, calibration of seasonal forecasts at the daily time step typically uses very simple statistical methods or climate analogue methods. These methods generally lack the sophistication to achieve unbiased, reliable and coherent forecasts of daily amounts and seasonal accumulated totals. In this study, we propose and evaluate a Rainfall Post-Processing method for Seasonal forecasts (RPP-S, which is based on the Bayesian joint probability modelling approach for calibrating daily forecasts and the Schaake Shuffle for connecting the daily ensemble members of different lead times. We apply the method to post-process ACCESS-S forecasts for 12 perennial and ephemeral catchments across Australia and for 12 initialisation dates. RPP-S significantly reduces bias in raw forecasts and improves both skill and reliability. RPP-S forecasts are also more skilful and reliable than forecasts derived from ACCESS-S forecasts that have been post-processed using quantile mapping, especially for monthly and seasonal accumulations. Several opportunities to improve the robustness and skill of RPP-S are identified. The new RPP-S post-processed forecasts will be used in ensemble sub-seasonal to seasonal streamflow applications.

  18. A Bayesian modelling method for post-processing daily sub-seasonal to seasonal rainfall forecasts from global climate models and evaluation for 12 Australian catchments

    Science.gov (United States)

    Schepen, Andrew; Zhao, Tongtiegang; Wang, Quan J.; Robertson, David E.

    2018-03-01

    Rainfall forecasts are an integral part of hydrological forecasting systems at sub-seasonal to seasonal timescales. In seasonal forecasting, global climate models (GCMs) are now the go-to source for rainfall forecasts. For hydrological applications however, GCM forecasts are often biased and unreliable in uncertainty spread, and calibration is therefore required before use. There are sophisticated statistical techniques for calibrating monthly and seasonal aggregations of the forecasts. However, calibration of seasonal forecasts at the daily time step typically uses very simple statistical methods or climate analogue methods. These methods generally lack the sophistication to achieve unbiased, reliable and coherent forecasts of daily amounts and seasonal accumulated totals. In this study, we propose and evaluate a Rainfall Post-Processing method for Seasonal forecasts (RPP-S), which is based on the Bayesian joint probability modelling approach for calibrating daily forecasts and the Schaake Shuffle for connecting the daily ensemble members of different lead times. We apply the method to post-process ACCESS-S forecasts for 12 perennial and ephemeral catchments across Australia and for 12 initialisation dates. RPP-S significantly reduces bias in raw forecasts and improves both skill and reliability. RPP-S forecasts are also more skilful and reliable than forecasts derived from ACCESS-S forecasts that have been post-processed using quantile mapping, especially for monthly and seasonal accumulations. Several opportunities to improve the robustness and skill of RPP-S are identified. The new RPP-S post-processed forecasts will be used in ensemble sub-seasonal to seasonal streamflow applications.

  19. Purchasing portfolio usage and purchasing sophistication

    NARCIS (Netherlands)

    Gelderman, C.J.; Weele, van A.J.

    2005-01-01

    Purchasing portfolio models have caused considerable controversy in literature. Many advantages and disadvantages have been put forward, revealing a strong disagreement on the merits of portfolio models. This study addresses the question whether or not the use of purchasing portfolio models should

  20. STAF: A Powerful and Sophisticated CAI System.

    Science.gov (United States)

    Loach, Ken

    1982-01-01

    Describes the STAF (Science Teacher's Authoring Facility) computer-assisted instruction system developed at Leeds University (England), focusing on STAF language and major program features. Although programs for the system emphasize physical chemistry and organic spectroscopy, the system and language are general purpose and can be used in any…

  1. Butler's sophisticated constructivism: A critical assessment

    NARCIS (Netherlands)

    Vasterling, V.L.M.

    1999-01-01

    This paper aims to investigate whether and in what respects the conceptions of the body and of agency that Judith Butler develops in Bodies That Matter are useful contributions to feminist theory. The discussion focuses on the clarification and critical assessment of the arguments Butler presents to

  2. Sophisticated digestive systems in early arthropods.

    Science.gov (United States)

    Vannier, Jean; Liu, Jianni; Lerosey-Aubril, Rudy; Vinther, Jakob; Daley, Allison C

    2014-05-02

    Understanding the way in which animals diversified and radiated during their early evolutionary history remains one of the most captivating of scientific challenges. Integral to this is the 'Cambrian explosion', which records the rapid emergence of most animal phyla, and for which the triggering and accelerating factors, whether environmental or biological, are still unclear. Here we describe exceptionally well-preserved complex digestive organs in early arthropods from the early Cambrian of China and Greenland with functional similarities to certain modern crustaceans and trace these structures through the early evolutionary lineage of fossil arthropods. These digestive structures are assumed to have allowed for more efficient digestion and metabolism, promoting carnivory and macrophagy in early arthropods via predation or scavenging. This key innovation may have been of critical importance in the radiation and ecological success of Arthropoda, which has been the most diverse and abundant invertebrate phylum since the Cambrian.

  3. Endothelial microparticles: Sophisticated vesicles modulating vascular function

    Science.gov (United States)

    Curtis, Anne M; Edelberg, Jay; Jonas, Rebecca; Rogers, Wade T; Moore, Jonni S; Syed, Wajihuddin; Mohler, Emile R

    2015-01-01

    Endothelial microparticles (EMPs) belong to a family of extracellular vesicles that are dynamic, mobile, biological effectors capable of mediating vascular physiology and function. The release of EMPs can impart autocrine and paracrine effects on target cells through surface interaction, cellular fusion, and, possibly, the delivery of intra-vesicular cargo. A greater understanding of the formation, composition, and function of EMPs will broaden our understanding of endothelial communication and may expose new pathways amenable for therapeutic manipulation. PMID:23892447

  4. Single access laparoscopic nephrectomy

    Directory of Open Access Journals (Sweden)

    Jay D Raman

    2008-01-01

    Full Text Available Laparoscopic nephrectomy has assumed a central role in the management of benign and malignant kidney diseases. While laparoscopy is less morbid than open surgery, it still requires several incisions each at least 1-2 cm in length. Each incision carries morbidity risks of bleeding, hernia and/or internal organ damage, and incrementally decreases cosmesis. An alternative to conventional laparoscopy is single access or keyhole surgery, which utilizes magnetic anchoring and guidance system (MAGS technology or articulating laparoscopic instruments. These technical innovations obviate the need to externally space trocars for triangulation, thus allowing for the creation of a small, solitary portal of entry into the abdomen. Laboratory and early clinical series demonstrate feasibility as well as safe and successful completion of keyhole nephrectomy. Future work is necessary to improve existing instrumentation, increase clinical experience, assess benefits of this surgical approach, and explore other potential applications for this technique.

  5. Accessibility Long Term Perspectives

    Directory of Open Access Journals (Sweden)

    Kay Axhausen

    2008-11-01

    Full Text Available Improved accessibility and its correlate lower generalized cost of contact, travel and transport have been sought by dynamic human societies for their economic and social benefits through- out recorded history. The paper will reflect about this process at a number of different spatial and temporal scales based on a conceptual model. Looking back at European history, it will trace the interaction between Christaller's logic of local market areas and the idea of (low contact cost network cities. Focusing on Switzerland since 1950 it will show how network investment changed the relative distribution of population and employment and how this interacted with changes in the preferences of the travelers. Using a recent snapshot of how a substantial sample of Swiss maintain their social networks over often very large areas, it will try to answer the question of what will happen in the future, if the current trend of ever lower costs of contact will persist.

  6. AccessCulture

    DEFF Research Database (Denmark)

    Valtysson, Bjarki

    of the European Union, and how its cultural policy responds to the changes that the digital paradigm has brought upon the field. The self-publishing features of various Web 2.0 platforms, along with the interactive and distributional potentials that the Internet offers, have given rise to what is referred to here...... in cultural production and consumption. The first part of this works looks at how these changes respond to the field of cultural policy, as well as suggesting a possible culturepolitical reaction in a model which I refer to as access culture. In terms of theoretical approach, the notion of digital cultural...... of YouTube, MySpace, Facebook and Flickr, along with lesser known platforms such as the animated short film Elephants Dream, the BBC's Creative Archive, various Internet artworks and the Internet Archive. I furthermore introduce the copyright system Creative Commons in order to suggest legal, widely...

  7. Access For All

    DEFF Research Database (Denmark)

    Andersen, Ove Kjeld; Hjulmand, Christian

    2005-01-01

    Approximately 30% of the Danish population has severe problems in reading everyday text. In the light of the increasing amount of text available on the Internet this poses a democratic challenge to ensure “equal access” to information. The Talking Internet service - Access For All (AFA) - offers...... a free Internet-based tool for reading aloud any marked text with a synthetic voice. The only requirements are a standard equipped PC running a recent Windows OS and an Internet connection. Experiences gathered from running the service for more than 28 months underline the viability of the concept....... There is a clear need for a free internet based Danish text-to-speech synthesizer. Furthermore, the current state of technology i.e. internet bandwidth, response time and server technology is sufficient for setting up an online automatic reading service that is used by steadily growing number of individuals...

  8. Chemists, Access, Statistics

    Science.gov (United States)

    Holmes, Jon L.

    2000-06-01

    New JCE Internet Feature at JCE Online Biographical Snapshots of Famous Chemists is a new JCE Internet feature on JCE Online. Edited by Barbara Burke, this feature provides biographical information on leading chemists, especially women and minority chemists, fostering the attitude that the practitioners of chemistry are as human as those who endeavor to learn about it. Currently, the column features biographical "snapshots" of 30 chemists. Each snapshot includes keywords and bibliography and several contain links to additional online information about the chemist. More biographical snapshots will appear in future installments. In addition, a database listing over 140 women and minority chemists is being compiled and will be made available online with the snapshots in the near future. The database includes the years of birth and death, gender and ethnicity, major and minor discipline, keywords to facilitate searching, and references to additional biographical information. We welcome your input into what we think is a very worthwhile resource. If you would like to provide additional biographical snapshots, see additional chemists added to the database, or know of additional references for those that are already in the database, please contact JCE Online or the feature editor. Your feedback is welcome and appreciated. You can find Biographical Snapshots of Famous Chemists starting from the JCE Online home page-- click the Features item under JCE Internet and then the Chemist Bios item. Access JCE Online without Name and Password We have recently been swamped by libraries requesting IP-number access to JCE Online. With the great benefit IP-number authentication gives to librarians (no user names and passwords to administer) and to their patrons (no need to remember and enter valid names and passwords) this is not surprising. If you would like access to JCE Online without the need to remember and enter a user name and password, you should tell your librarian about our

  9. The Delphi Method in Rehabilitation Counseling Research

    Science.gov (United States)

    Vazquez-Ramos, Robinson; Leahy, Michael; Estrada Hernandez, Noel

    2007-01-01

    Rehabilitation researchers have found in the application of the Delphi method a more sophisticated way of obtaining consensus from experts in the field on certain matters. The application of this research methodology has affected and certainly advanced the body of knowledge of the rehabilitation counseling practice. However, the rehabilitation…

  10. Sign Compute Resolve for Random Access

    DEFF Research Database (Denmark)

    Goseling, Jasper; Stefanovic, Cedomir; Popovski, Petar

    2014-01-01

    users collide. We measure the performance of the proposed method in terms of user resolution rate as well as overall throughput of the system. The results show that our approach significantly increases the performance of the system even compared to coded random access, where collisions are not wasted......We present an approach to random access that is based on three elements: physical-layer network coding, signature codes and tree splitting. Upon occurrence of a collision, physical-layer network coding enables the receiver to decode the sum of the information that was transmitted by the individual...

  11. FINANCIAL DEPTH AND FINANCIAL ACCESS IN INDONESIA

    OpenAIRE

    Sigit Setiawan

    2015-01-01

    This study is intended to analyse the current levels of financial depth and financial access in Indonesia and to analyse the factors affecting them. The analysis method used was a combination of descriptive quantitative, benchmarking, and literature reviews. The conclusion is that the financial depth in Indonesia has not shown a satisfactory level since it was the lowest, or the second lowest ranked country among the sampled countries. Meanwhile, the financial access in Indonesia is relativel...

  12. Financial Depth and Financial Access in Indonesia

    OpenAIRE

    Setiawan, Sigit

    2015-01-01

    This study is intended to analyse the current levels of financial depth and financial access in Indonesia and to analyse the factors affecting them. The analysis method used was a combination of descriptive quantitative, benchmarking, and literature reviews. The conclusion is that the financial depth in Indonesia has not shown a satisfactory level since it was the lowest, or the second lowest ranked country among the sampled countries. Meanwhile, the financial access in Indonesia is relativel...

  13. Scientific information: technology, will and access

    Directory of Open Access Journals (Sweden)

    Ana M. B. Pavani

    2007-12-01

    Full Text Available This article addresses the access to information from a point of view that relates the evolution of technology to the methods of treating information and to the desire for knowledge. The first part introduces some important events in ancient times, the end of the middle ages/beginning of the modern age and the XIX century. Then, it presents an overview of the current situation of traditional libraries and compares some characteristics with the corresponding ones for digital libraries. It ends by mentioning the international efforts towards open archives and open access to information; it shows examples of positive results.

  14. Database Access through Java Technologies

    Directory of Open Access Journals (Sweden)

    Nicolae MERCIOIU

    2010-09-01

    Full Text Available As a high level development environment, the Java technologies offer support to the development of distributed applications, independent of the platform, providing a robust set of methods to access the databases, used to create software components on the server side, as well as on the client side. Analyzing the evolution of Java tools to access data, we notice that these tools evolved from simple methods that permitted the queries, the insertion, the update and the deletion of the data to advanced implementations such as distributed transactions, cursors and batch files. The client-server architectures allows through JDBC (the Java Database Connectivity the execution of SQL (Structured Query Language instructions and the manipulation of the results in an independent and consistent manner. The JDBC API (Application Programming Interface creates the level of abstractization needed to allow the call of SQL queries to any DBMS (Database Management System. In JDBC the native driver and the ODBC (Open Database Connectivity-JDBC bridge and the classes and interfaces of the JDBC API will be described. The four steps needed to build a JDBC driven application are presented briefly, emphasizing on the way each step has to be accomplished and the expected results. In each step there are evaluations on the characteristics of the database systems and the way the JDBC programming interface adapts to each one. The data types provided by SQL2 and SQL3 standards are analyzed by comparison with the Java data types, emphasizing on the discrepancies between those and the SQL types, but also the methods that allow the conversion between different types of data through the methods of the ResultSet object. Next, starting from the metadata role and studying the Java programming interfaces that allow the query of result sets, we will describe the advanced features of the data mining with JDBC. As alternative to result sets, the Rowsets add new functionalities that

  15. Factorization method of quadratic template

    Science.gov (United States)

    Kotyrba, Martin

    2017-07-01

    Multiplication of two numbers is a one-way function in mathematics. Any attempt to distribute the outcome to its roots is called factorization. There are many methods such as Fermat's factorization, Dixońs method or quadratic sieve and GNFS, which use sophisticated techniques fast factorization. All the above methods use the same basic formula differing only in its use. This article discusses a newly designed factorization method. Effective implementation of this method in programs is not important, it only represents and clearly defines its properties.

  16. Simple and inexpensive method for CT-guided stereotaxy

    Energy Technology Data Exchange (ETDEWEB)

    Wester, K; Sortland, O; Hauglie-Hanssen, E

    1981-01-01

    A simple and inexpensive method for CT-guided stereotaxy is described. The method requires neither sophisticated computer programs nor additional stereotactic equipment, such as special head holders for the CT, and can be easily obtained without technical assistance. The method is designed to yield the vertical coordinates.

  17. Sierra Stars Observatory Network: An Accessible Global Network

    Science.gov (United States)

    Williams, Richard; Beshore, Edward

    2011-03-01

    The Sierra Stars Observatory Network (SSON) is a unique partnership among professional observatories that provides its users with affordable high-quality calibrated image data. SSON comprises observatories in the Northern and Southern Hemisphere and is in the process of expanding to a truly global network capable of covering the entire sky 24 hours a day in the near future. The goal of SSON is to serve the needs of science-based projects and programs. Colleges, universities, institutions, and individuals use SSON for their education and research projects. The mission of SSON is to promote and expand the use of its facilities among the thousands of colleges and schools worldwide that do not have access to professional-quality automated observatory systems to use for astronomy education and research. With appropriate leadership and guidance educators can use SSON to help teach astronomy and do meaningful scientific projects. The relatively small cost of using SSON for this type of work makes it affordable and accessible for educators to start using immediately. Remote observatory services like SSON need to evolve to better support education and research initiatives of colleges, institutions and individual investigators. To meet these needs, SSON is developing a sophisticated interactive scheduling system to integrate among the nodes of the observatory network. This will enable more dynamic observations, including immediate priority interrupts, acquiring moving objects using ephemeris data, and more.

  18. Detecting Inappropriate Access to Electronic Health Records Using Collaborative Filtering.

    Science.gov (United States)

    Menon, Aditya Krishna; Jiang, Xiaoqian; Kim, Jihoon; Vaidya, Jaideep; Ohno-Machado, Lucila

    2014-04-01

    Many healthcare facilities enforce security on their electronic health records (EHRs) through a corrective mechanism: some staff nominally have almost unrestricted access to the records, but there is a strict ex post facto audit process for inappropriate accesses, i.e., accesses that violate the facility's security and privacy policies. This process is inefficient, as each suspicious access has to be reviewed by a security expert, and is purely retrospective, as it occurs after damage may have been incurred. This motivates automated approaches based on machine learning using historical data. Previous attempts at such a system have successfully applied supervised learning models to this end, such as SVMs and logistic regression. While providing benefits over manual auditing, these approaches ignore the identity of the users and patients involved in a record access. Therefore, they cannot exploit the fact that a patient whose record was previously involved in a violation has an increased risk of being involved in a future violation. Motivated by this, in this paper, we propose a collaborative filtering inspired approach to predicting inappropriate accesses. Our solution integrates both explicit and latent features for staff and patients, the latter acting as a personalized "finger-print" based on historical access patterns. The proposed method, when applied to real EHR access data from two tertiary hospitals and a file-access dataset from Amazon, shows not only significantly improved performance compared to existing methods, but also provides insights as to what indicates an inappropriate access.

  19. FINANCIAL DEPTH AND FINANCIAL ACCESS IN INDONESIA

    Directory of Open Access Journals (Sweden)

    Sigit Setiawan

    2015-05-01

    Full Text Available This study is intended to analyze the current levels of financial depth and financial access in Indonesia and to analyze the factors affecting them. The analysis method used was a combination of descriptive quantitative, benchmarking, and literature reviews. The conclusion is that the financial depth in Indonesia has not shown a satisfactory level since it was the lowest, or the second lowest ranked country among the sampled countries. Meanwhile, the financial access in Indonesia is relatively better than its financial depth, especially for financial markets, in which Indonesia ranks in the lower average group. From literature reviews, it can be inferred that the main factor driving the poor financial depth in Indonesia is non-competitiveness of the institutions; whereas the driving force of poor financial access in Indonesia are geographical constraints, poverty, a high income gap, and a less than effective national financial development policy.

  20. New method of digital angiography

    International Nuclear Information System (INIS)

    Hashiya, Junichi; Korenaga, Takeo; Sakurai, Kenji; Sakai, Fumikazu; Kato, Hisatoyo; Takano, Masao.

    1982-01-01

    New experience of digital angiography using Fuji Intelligent Diagnostic X-ray System was reported. The system utilizes newly developed high sensitivity imaging plate in conjunction with computerized image processor instead of image intensifier-TV series, thus drastically improving image quality. Initial clinical trial was made in 46 cases including intravenous digital subtraction angiography and transcatheter digital arteriography. The advantages of this method were summerized as: 1. better resolution, 2. wider field size, 3. more sophisticated image manipulation program. (author)

  1. Public Access and Open Access: Is There a Difference? | Poster

    Science.gov (United States)

    By Robin Meckley, Contributing Writer, and Tracie Frederick, Guest Writer Open access and public access—are they different concepts or are they the same? What do they mean for the researchers at NCI at Frederick? “Open-access (OA) literature is digital, online, free of charge, and free of most copyright and licensing restrictions. What makes it possible is the Internet and the consent of the author or copyright-holder,” according to an open access website maintained by Peter Suber, director, Harvard Open Access Project.

  2. Access to surgical assistance: challenges and perspectives

    Directory of Open Access Journals (Sweden)

    Maria Fernanda do Prado Tostes

    2016-01-01

    Full Text Available Objective to characterize the access to surgical assistance in Brazil. Method documentary study, with a quantitative approach, developed from information of the Caixa Preta da Saúde [Health Black Box] database, of the Brazilian Medical Association. Results in the one-year period 3773 cases related to health care in Brazil were recorded. There were 458 (12.3% records on surgical assistance. Of these, most, 339 (74.1%, involved the lack of access in all regions of Brazil. The main access constraint was the prolonged waiting time for surgery. Other constraints were the excessive waiting for medical appointment with experts, doing examinations and cancellation of surgeries. Conclusion the access to surgical assistance, by users of the Brazilian health system, is not widely guaranteed, reinforcing the need for integrated governmental actions, organization of the health care network, management of health care and human resources to overcome the challenges imposed to achieve the Universal Access to Health and Universal Health Coverage.

  3. NESDIS OSPO Data Access Policy and CRM

    Science.gov (United States)

    Seybold, M. G.; Donoho, N. A.; McNamara, D.; Paquette, J.; Renkevens, T.

    2012-12-01

    The Office of Satellite and Product Operations (OSPO) is the NESDIS office responsible for satellite operations, product generation, and product distribution. Access to and distribution of OSPO data was formally established in a Data Access Policy dated February, 2011. An extension of the data access policy is the OSPO Customer Relationship Management (CRM) Database, which has been in development since 2008 and is reaching a critical level of maturity. This presentation will provide a summary of the data access policy and standard operating procedure (SOP) for handling data access requests. The tangential CRM database will be highlighted including the incident tracking system, reporting and notification capabilities, and the first comprehensive portfolio of NESDIS satellites, instruments, servers, applications, products, user organizations, and user contacts. Select examples of CRM data exploitation will show how OSPO is utilizing the CRM database to more closely satisfy the user community's satellite data needs with new product promotions, as well as new data and imagery distribution methods in OSPO's Environmental Satellite Processing Center (ESPC). In addition, user services and outreach initiatives from the Satellite Products and Services Division will be highlighted.

  4. Making Astronomy Accessible

    Science.gov (United States)

    Grice, Noreen A.

    2011-05-01

    A new semester begins, and your students enter the classroom for the first time. You notice a student sitting in a wheelchair or walking with assistance from a cane. Maybe you see a student with a guide dog or carrying a Braille computer. Another student gestures "hello” but then continues hand motions, and you realize the person is actually signing. You wonder why another student is using an electronic device to speak. Think this can't happen in your class? According to the U.S. Census, one out of every five Americans has a disability. And some disabilities, such as autism, dyslexia and arthritis, are considered "invisible” disabilities. This means you have a high probability that one of your students will have a disability. As an astronomy instructor, you have the opportunity to reach a wide variety of learners by using creative teaching strategies. I will share some suggestions on how to make astronomy and your part of the universe more accessible for everyone.

  5. Monographs and Open Access

    Directory of Open Access Journals (Sweden)

    Geoffrey Crossick

    2016-03-01

    Full Text Available This article presents the project that I led for HEFCE on the implications of OA (open access for monographs and other long-form research publications. The likely requirement that books should be OA if submitted to the REF (Research Excellence Framework after next means that OA development must be based on an understanding of the importance of the monograph in the AHSS (arts, humanities and social sciences as well as the challenges involved in making the transition to online OA. The project focused on three issues and each is summarized in turn in the article: What is the place of the monograph and other long-form publications in AHSS disciplines that makes it so important? What is happening to the monograph and is there a crisis as some suggest? What are the issues involved in moving monographs into a digital and OA environment – not just the challenge of effective business models but also many other aspects of sustaining and enhancing the qualities of the monograph? These include third-party rights, technical challenges, licences and the need for international collaboration.

  6. Study of the Reproductive Characteristics of Nine Cassava Accessions

    African Journals Online (AJOL)

    User

    need to use different planting dates for different accessions to ensure synchronization of flowering. The accessions also differed significantly (P < 0.05) with ... Materials and methods. The experiment was carried out at the. Research Farm ... Minitab Statistical Software (version 15.0) was used where Chi-square analysis was.

  7. Open Access Publishing in Indian Premier Research Institutions

    Science.gov (United States)

    Bhat, Mohammad Hanief

    2009-01-01

    Introduction: Publishing research findings in open access journals is a means of enhancing visibility and consequently increasing the impact of publications. This study provides an overview of open access publishing in premier research institutes of India. Method: The publication output of each institution from 2003 to 2007 was ascertained through…

  8. 43 CFR 36.10 - Access to inholdings.

    Science.gov (United States)

    2010-10-01

    ... barriers prevent adequate and feasible access to State or private lands or valid interests in lands except across an area(s). Physical barriers include but are not limited to rugged mountain terrain, extensive... method of access would cause significant adverse impacts on natural or other values of the area and...

  9. File access prediction using neural networks.

    Science.gov (United States)

    Patra, Prashanta Kumar; Sahu, Muktikanta; Mohapatra, Subasish; Samantray, Ronak Kumar

    2010-06-01

    One of the most vexing issues in design of a high-speed computer is the wide gap of access times between the memory and the disk. To solve this problem, static file access predictors have been used. In this paper, we propose dynamic file access predictors using neural networks to significantly improve upon the accuracy, success-per-reference, and effective-success-rate-per-reference by using neural-network-based file access predictor with proper tuning. In particular, we verified that the incorrect prediction has been reduced from 53.11% to 43.63% for the proposed neural network prediction method with a standard configuration than the recent popularity (RP) method. With manual tuning for each trace, we are able to improve upon the misprediction rate and effective-success-rate-per-reference using a standard configuration. Simulations on distributed file system (DFS) traces reveal that exact fit radial basis function (RBF) gives better prediction in high end system whereas multilayer perceptron (MLP) trained with Levenberg-Marquardt (LM) backpropagation outperforms in system having good computational capability. Probabilistic and competitive predictors are the most suitable for work stations having limited resources to deal with and the former predictor is more efficient than the latter for servers having maximum system calls. Finally, we conclude that MLP with LM backpropagation algorithm has better success rate of file prediction than those of simple perceptron, last successor, stable successor, and best k out of m predictors.

  10. Vehicle barrier with access delay

    Science.gov (United States)

    Swahlan, David J; Wilke, Jason

    2013-09-03

    An access delay vehicle barrier for stopping unauthorized entry into secure areas by a vehicle ramming attack includes access delay features for preventing and/or delaying an adversary from defeating or compromising the barrier. A horizontally deployed barrier member can include an exterior steel casing, an interior steel reinforcing member and access delay members disposed within the casing and between the casing and the interior reinforcing member. Access delay members can include wooden structural lumber, concrete and/or polymeric members that in combination with the exterior casing and interior reinforcing member act cooperatively to impair an adversarial attach by thermal, mechanical and/or explosive tools.

  11. Barriers to accessing urethroplasty.

    Science.gov (United States)

    Consolo, Michael J; Syed, Kirin K; Robison, Christopher; McFadden, Jacob; Shalowitz, David I; Brown, Gordon A; Sussman, David O; Figler, Bradley D

    2016-01-01

    Urethroplasty is an effective treatment for men with anterior urethral strictures, but is utilized less frequently than ineffective treatments such as internal urethrotomy. We sought to identify provider-level barriers to urethroplasty. An anonymous online survey was emailed to all Mid-Atlantic American Urological Association members. Six scenarios in which urethroplasty was the most appropriate treatment were presented. Primary outcome was recommendation for urethroplasty in ≥ three clinical scenarios. Other factors measured include practice zip code, urethroplasty training, and proximity to a urethroplasty surgeon. Multivariate logistic regression identified factors associated with increased likelihood of urethroplasty recommendation. Of 670 members emailed, 109 (16%) completed the survey. Final analysis included 88 respondents. Mean years in practice was 17.2. Most respondents received formal training in urethroplasty: 43 (49%) in residency, 5 (6%) in fellowship, and 10 (11%) in both; 48 respondents (55%) had a urethroplasty surgeon in their practice, whereas 18 (20%) had a urethroplasty surgeon within 45 minutes of his or her primary practice location. The only covariate that was associated with an increased likelihood of recommending urethroplasty in ≥ three scenarios was formal urethroplasty training. Most members (68%) reported no barriers to referring patients for urethroplasty; the most common barriers cited were long distance to urethroplasty surgeon (n 5 13, 15%) and concern about complications (n 5 8, 9%). Urethroplasty continues to be underutilized in men with anterior urethral strictures, potentially due to lack of knowledge dissemination and access to a urethroplasty surgeon. Appropriate urethroplasty utilization may increase with greater exposure to urethroplasty in training.

  12. Reported Design Processes for Accessibility in Rail Transport

    DEFF Research Database (Denmark)

    Herriott, Richard; Cook, Sharon

    2014-01-01

    requirements with the aim of maximising accessibility in products and services. A review of ID literature has mainly developed in the arena of product design and design for assistive technology. Accessibility is a fundamental requirement in public transport (PT) yet there exists little research on design...... for accessibility or ID in this area. How is accessibility and the needs of users accounted for in rail transport design? This paper analyses interviews with rolling stock producers, operators and design consultancies. These conducted to determine if ID design methods are used explicitly and the extent to which...

  13. A Novel and Cost-Effective Method for Evaluating Cardiopulmonary Auscultation Skills in Student Physical Therapists.

    Science.gov (United States)

    Sword, David O; Thomas, K Jackson; Wise, Holly H; Brown, Deborah D

    2017-01-01

    Sophisticated high-fidelity human simulation (HFHS) manikins allow for practice of both evaluation and treatment techniques in a controlled environment in which real patients are not put at risk. However, due to high demand, access to HFHS by students has been very competitive and limited. In the present study, a basic CPR manikin with a speaker implanted in the chest cavity and internet access to a variety of heart and breath sounds was used. Students were evaluated on their ability to locate and identify auscultation sites and heart/breath sounds. A five-point Likert scale survey was administered to gain insight into student perceptions on the use of this simulation method. Our results demonstrated that 95% of students successfully identified the heart and breath sounds. Furthermore, survey results indicated that 75% of students agreed or strongly agreed that this manner of evaluation was an effective way to assess their auscultation skills. Based on performance and perception, we conclude that a simulation method as described in this paper is a viable and cost-effective means of evaluating auscultation competency in not only student physical therapists but across other health professions as well.

  14. Barriers to Maori sole mothers’ primary health care access

    Directory of Open Access Journals (Sweden)

    Lee R

    2013-12-01

    Full Text Available INTRODUCTION: International research consistently shows that sole mothers experience poorer health and suboptimal health care access. New Zealand studies on sole mothers' health report similar findings. The aim of this exploratory research was to better understand the experiences of Maori sole mothers' access to health services, particularly primary health care, for personal health needs. METHODS: This qualitative study employed a general inductive design informed by a Kaupapa Maori approach, providing guidance on appropriate cultural protocols for recruiting and engaging Maori participants. Distributing written information and snowballing techniques were used to purposively recruit seven Maori sole mothers. Data collection involved semi-structured interviews which were digitally recorded and transcribed verbatim. Data were analysed using general inductive thematic analysis to identify commonalities and patterns in participants' experiences. FINDINGS: The dominant themes that emerged captured and described participants' experiences in accessing health care. The major barrier to access reported was cost. Compounding cost, transport difficulties and location or scheduling of services were additional barriers to health service accessibility. Child-related issues also posed a barrier, including prioritising children's needs and childcare over personal health needs. CONCLUSION: The findings illuminate Maori sole mothers' experiences of accessing health care and the complex socioeconomic inequalities affecting access options and uptake of services. Further investigation of barriers to access is needed. The study has implications for addressing barriers to access at policy, funding and practice levels to improve health outcomes and equitable health care access for Maori sole mothers.

  15. Characterization of coded random access with compressive sensing based multi user detection

    DEFF Research Database (Denmark)

    Ji, Yalei; Stefanovic, Cedomir; Bockelmann, Carsten

    2014-01-01

    The emergence of Machine-to-Machine (M2M) communication requires new Medium Access Control (MAC) schemes and physical (PHY) layer concepts to support a massive number of access requests. The concept of coded random access, introduced recently, greatly outperforms other random access methods...... coded random access with CS-MUD on the PHY layer and show very promising results for the resulting protocol....

  16. Direct access: how is it working?

    Science.gov (United States)

    Turner, S; Ross, M

    2017-02-10

    Aim The aim of this study was to identify and survey dental hygienists and therapists working in direct access practices in the UK, obtain their views on its benefits and disadvantages, establish which treatments they provided, and what barriers they had encountered.Method The study used a purposive sample of GDC-registered hygienists and therapists working in practices offering direct access, identified through a 'Google' search. An online survey was set up through the University of Edinburgh, and non-responses followed up by post.Results The initial search identified 243 individuals working in direct access practices. Where a practice listed more than one hygienist/therapist, one was randomly selected. This gave a total of 179 potential respondents. Eighty-six responses were received, representing a response rate of 48%. A large majority of respondents (58, 73%) were favourable in their view of the GDC decision to allow direct access, and most thought advantages outnumbered disadvantages for patients, hygienists, therapists and dentists. There were no statistically significant differences in views between hygienists and therapists. Although direct access patients formed a small minority of their caseload for most respondents, it is estimated that on average respondents saw approximately 13 per month. Treatment was mainly restricted to periodontal work, irrespective of whether the respondent was singly or dually qualified. One third of respondents reported encountering barriers to successful practice, including issues relating to teamwork and dentists' unfavourable attitudes. However, almost two thirds (64%) felt that direct access had enhanced their job satisfaction, and 45% felt their clinical skills had increased.Discussion Comments were mainly positive, but sometimes raised worrying issues, for example in respect to training, lack of dental nurse support and the limited availability of periodontal treatment under NHS regulations.

  17. Resistive switching mechanism of ZnO/ZrO2-stacked resistive random access memory device annealed at 300 °C by sol-gel method with forming-free operation

    Science.gov (United States)

    Jian, Wen-Yi; You, Hsin-Chiang; Wu, Cheng-Yen

    2018-01-01

    In this work, we used a sol-gel process to fabricate a ZnO-ZrO2-stacked resistive switching random access memory (ReRAM) device and investigated its switching mechanism. The Gibbs free energy in ZnO, which is higher than that in ZrO2, facilitates the oxidation and reduction reactions of filaments in the ZnO layer. The current-voltage (I-V) characteristics of the device revealed a forming-free operation because of nonlattice oxygen in the oxide layer. In addition, the device can operate under bipolar or unipolar conditions with a reset voltage of 0 to ±2 V, indicating that in this device, Joule heating dominates at reset and the electric field dominates in the set process. Furthermore, the characteristics reveal why the fabricated device exhibits a greater discrete distribution phenomenon for the set voltage than for the reset voltage. These results will enable the fabrication of future ReRAM devices with double-layer oxide structures with improved characteristics.

  18. Funding and Implementing Universal Access

    International Development Research Centre (IDRC) Digital Library (Canada)

    The principles for the subsidy awards are based not only on the experience of ... the best-practice model for special funding to support access to communications .... Malaysia, Russia, Mongolia and elsewhere).5 The Ugandan model uses the ...... services or serve additional areas, access to radio spectrum and lower taxes.

  19. IV access in dental practice.

    LENUS (Irish Health Repository)

    Fitzpatrick, J J

    2009-04-01

    Intravenous (IV) access is a valuable skill for dental practitioners in emergency situations and in IV sedation. However, many people feel some apprehension about performing this procedure. This article explains the basic principles behind IV access, and the relevant anatomy and physiology, as well as giving a step-by-step guide to placing an IV cannula.

  20. Research Issues in Information Access.

    Science.gov (United States)

    Molholt, Pat

    1989-01-01

    Discusses traditional library approaches to access to information and the possible impact of information technologies, library automation, and artificial intelligence. Access issues raised by these technologies are identified and a research agenda to explore these issues is outlined. (31 references) (CLB)