Tag Content Access Control with Identity-based Key Exchange
NASA Astrophysics Data System (ADS)
Yan, Liang; Rong, Chunming
2010-09-01
Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.
Telerehabilitation Technologies: Accessibility and Usability
Pramuka, Michael; van Roosmalen, Linda
2009-01-01
In the fields of telehealth and telemedicine, phone and/or video technologies are key to the successful provision of services such as remote monitoring and visits. How do these technologies affect service accessibility, effectiveness, quality, and usefulness when applied to rehabilitation services in the field of telerehabilitation? To answer this question, we provide a overview of the complex network of available technologies and discuss how they link to rehabilitation applications, services, and practices as well as to the telerehabilitation end-user. This white paper will first present the numerous professional considerations that shape the use of technology in telerehabilitation service and set it somewhat apart from telemedicine. It will then provide an overview of concepts essential to usability analysis; present a summary of various telerehabilitation technologies and their strengths and limitations, and consider how the technologies interface with end users’ clinical needs for service accessibility, effectiveness, quality, and usefulness. The paper will highlight a conceptual framework (including task analyses and usability issues) that underlies a functional match between telerehabilitation technologies, clinical applications, and end-user capabilities for telerehabilitation purposes. Finally, we will discuss pragmatic issues related to user integration of telerehabilitation technology versus traditional face-to-face approaches. PMID:25945165
Baker, Paul M A; Moon, Nathan W
2008-01-01
The near universal deployment in the United States of a wide variety of information and communications technologies, both wired and wireless, creates potential barriers to use for several key populations, including the poor, people with disabilities, and the aging. Equal access to wireless technologies and services can be achieved through a variety of mechanisms, including legislation and regulations, market-based solutions, and awareness and outreach-based approaches. This article discusses the results of policy research conducted by the Rehabilitation Engineering Research Center on Wireless Technologies (Wireless RERC) using policy Delphi polling methodology to probe stakeholders' opinions on key access barrier issues and to explore potential policy responses. Participants included disability advocates, disability/wireless technology policy makers, and product developers/manufacturers. Respondent input informed subsequent development of potential policy initiatives to increase access to these technologies. The findings from the Delphi suggest that awareness issues remain most important, especially manufacturer awareness of user needs and availability of consumer information for selecting the most appropriate wireless devices and services. Other key issues included the ability of people with disabilities to afford technologies and inadequacies in legislation and policy making for ensuring their general accessibility, as well as usefulness in emergencies. Technical issues, including interoperability, speech-to-text conversion, and hearing aid compatibility, were also identified by participating stakeholders as important. To address all these issues, Delphi respondents favored goals and options congruent with voluntary market-driven solutions where possible but also supported federal involvement, where necessary, to aid this process.
Optical fiber cabling technologies for flexible access network
NASA Astrophysics Data System (ADS)
Tanji, Hisashi
2008-07-01
Fiber-to-the-home (FTTH) outside plant infrastructure should be so designed and constructed as to flexibly deal with increasing subscribers and system evolution to be expected in the future, taking minimization of total cost (CAPEX and OPEX) into consideration. With this in mind, fiber access architectures are reviewed and key technologies on optical fiber and cable for supporting flexible access network are presented. Low loss over wide wavelength (low water peak) and bend-insensitive single mode fiber is a future proof solution. Enhanced separable ribbon facilitates mid-span access to individual fibers in a cable installed, improving fiber utilizing efficiency and flexibility of distribution design. It also contributes to an excellent low PMD characteristic which could be required for video RF overlay system or high capacity long reach metro-access convergence network in the future. Bend-insensitive fiber based cabling technique including field installable connector greatly improves fiber/cable handling in installation and maintenance work.
RFID: A key technology for Humanity
NASA Astrophysics Data System (ADS)
Duroc, Yvan; Tedjini, Smail
2018-01-01
The RFID (Radio Frequency IDentification) technology is a well-known wireless application for traceability, logistics, and access control. It became ubiquitous in industry and our daily life (ticketing, payment, passports, car keys, etc.). RFID is nowadays a standardized technology; its inherent advantages, which are unitary, identification, wireless communication, and low cost of tags, provide it with decisive practical benefits that drive new developments in terms of concepts and applications. This trend is largely confirmed by the market forecast, but also by its implementation in the area of health (smart hospital), assistance to persons, anti-counterfeiting, as well as by its perspective in terms of new paradigms for distributed ambient intelligence and the Internet of Things. The first part of this paper briefly reviews the fundamental concepts of the RFID technology, and shows its link with the radio science. A state of the art including the presentation of current performance and developments is also summarized. The second part illustrates the impact of RFID to the service of our society with a focus of applications in the field of autonomy and handicap. Finally, the last part highlights a panorama of perspectives and the future directions of RFID applications dedicated to the service of Humanity. xml:lang="fr"
A free-access online key to identify Amazonian ferns.
Zuquim, Gabriela; Tuomisto, Hanna; Prado, Jefferson
2017-01-01
There is urgent need for more data on species distributions in order to improve conservation planning. A crucial but challenging aspect of producing high-quality data is the correct identification of organisms. Traditional printed floras and dichotomous keys are difficult to use for someone not familiar with the technical jargon. In poorly known areas, such as Amazonia, they also become quickly outdated as new species are described or ranges extended. Recently, online tools have allowed developing dynamic, interactive, and accessible keys that make species identification possible for a broader public. In order to facilitate identifying plants collected in field inventories, we developed an internet-based free-access tool to identify Amazonian fern species. We focused on ferns, because they are easy to collect and their edaphic affinities are relatively well known, so they can be used as an indicator group for habitat mapping. Our key includes 302 terrestrial and aquatic entities mainly from lowland Amazonian forests. It is a free-access key, so the user can freely choose which morphological features to use and in which order to assess them. All taxa are richly illustrated, so specimens can be identified by a combination of character choices, visual comparison, and written descriptions. The identification tool was developed in Lucid 3.5 software and it is available at http://keyserver.lucidcentral.org:8080/sandbox/keys.jsp.
A free-access online key to identify Amazonian ferns
Zuquim, Gabriela; Tuomisto, Hanna; Prado, Jefferson
2017-01-01
Abstract There is urgent need for more data on species distributions in order to improve conservation planning. A crucial but challenging aspect of producing high-quality data is the correct identification of organisms. Traditional printed floras and dichotomous keys are difficult to use for someone not familiar with the technical jargon. In poorly known areas, such as Amazonia, they also become quickly outdated as new species are described or ranges extended. Recently, online tools have allowed developing dynamic, interactive, and accessible keys that make species identification possible for a broader public. In order to facilitate identifying plants collected in field inventories, we developed an internet-based free-access tool to identify Amazonian fern species. We focused on ferns, because they are easy to collect and their edaphic affinities are relatively well known, so they can be used as an indicator group for habitat mapping. Our key includes 302 terrestrial and aquatic entities mainly from lowland Amazonian forests. It is a free-access key, so the user can freely choose which morphological features to use and in which order to assess them. All taxa are richly illustrated, so specimens can be identified by a combination of character choices, visual comparison, and written descriptions. The identification tool was developed in Lucid 3.5 software and it is available at http://keyserver.lucidcentral.org:8080/sandbox/keys.jsp. PMID:28781548
Ethernet access network based on free-space optic deployment technology
NASA Astrophysics Data System (ADS)
Gebhart, Michael; Leitgeb, Erich; Birnbacher, Ulla; Schrotter, Peter
2004-06-01
The satisfaction of all communication needs from single households and business companies over a single access infrastructure is probably the most challenging topic in communications technology today. But even though the so-called "Last Mile Access Bottleneck" is well known since more than ten years and many distribution technologies have been tried out, the optimal solution has not yet been found and paying commercial access networks offering all service classes are still rare today. Conventional services like telephone, radio and TV, as well as new and emerging services like email, web browsing, online-gaming, video conferences, business data transfer or external data storage can all be transmitted over the well known and cost effective Ethernet networking protocol standard. Key requirements for the deployment technology driven by the different services are high data rates to the single customer, security, moderate deployment costs and good scalability to number and density of users, quick and flexible deployment without legal impediments and high availability, referring to the properties of optical and wireless communication. We demonstrate all elements of an Ethernet Access Network based on Free Space Optic distribution technology. Main physical parts are Central Office, Distribution Network and Customer Equipment. Transmission of different services, as well as configuration, service upgrades and remote control of the network are handled by networking features over one FSO connection. All parts of the network are proven, the latest commercially available technology. The set up is flexible and can be adapted to any more specific need if required.
GuiaTreeKey, a multi-access electronic key to identify tree genera in French Guiana.
Engel, Julien; Brousseau, Louise; Baraloto, Christopher
2016-01-01
The tropical rainforest of Amazonia is one of the most species-rich ecosystems on earth, with an estimated 16000 tree species. Due to this high diversity, botanical identification of trees in the Amazon is difficult, even to genus, often requiring the assistance of parataxonomists or taxonomic specialists. Advances in informatics tools offer a promising opportunity to develop user-friendly electronic keys to improve Amazonian tree identification. Here, we introduce an original multi-access electronic key for the identification of 389 tree genera occurring in French Guiana terra-firme forests, based on a set of 79 morphological characters related to vegetative, floral and fruit characters. Its purpose is to help Amazonian tree identification and to support the dissemination of botanical knowledge to non-specialists, including forest workers, students and researchers from other scientific disciplines. The electronic key is accessible with the free access software Xper ², and the database is publicly available on figshare: https://figshare.com/s/75d890b7d707e0ffc9bf (doi: 10.6084/m9.figshare.2682550).
NASA Technical Reports Server (NTRS)
Rasky, Daniel J.
2004-01-01
The need for robust and reliable access from space is clearly demonstrated by the recent loss of the Space Shuttle Columbia; as well as the NASA s goals to get the Shuttle re-flying and extend its life, build new vehicles for space access, produce successful robotic landers and s a q k retrr? llisrions, and maximize the science content of ambitious outer planets missions that contain nuclear reactors which must be safe for re-entry after possible launch aborts. The technology lynch pin of access from space is hypersonic entry systems such the thermal protection system, along with navigation, guidance and control (NG&C). But it also extends to descent and landing systems such as parachutes, airbags and their control systems. Current space access technology maturation programs such as NASA s Next Generation Launch Technology (NGLT) program or the In-Space Propulsion (ISP) program focus on maturing laboratory demonstrated technologies for potential adoption by specific mission applications. A key requirement for these programs success is a suitable queue of innovative technologies and advanced concepts to mature, including mission concepts enabled by innovative, cross cutting technology advancements. When considering space access, propulsion often dominates the capability requirements, as well as the attention and resources. From the perspective of access from space some new cross cutting technology drivers come into view, along with some new capability opportunities. These include new miniature vehicles (micro, nano, and picosats), advanced automated systems (providing autonomous on-orbit inspection or landing site selection), and transformable aeroshells (to maximize capabilities and minimize weight). This paper provides an assessment of the technology drivers needed to meet future access from space mission requirements, along with the mission capabilities that can be envisioned from innovative, cross cutting access from space technology developments.
Crager, Sara Eve
2014-11-01
The 2012 World Health Assembly Global Vaccine Action Plan called for global access to new vaccines within 5 years of licensure. Current approaches have proven insufficient to achieve sustainable vaccine pricing within such a timeline. Paralleling the successful strategy of generic competition to bring down drug prices, a clear consensus is emerging that market entry of multiple suppliers is a critical factor in expeditiously bringing down prices of new vaccines. In this context, key target objectives for improving access to new vaccines include overcoming intellectual property obstacles, streamlining regulatory pathways for biosimilar vaccines, and reducing market entry timelines for developing-country vaccine manufacturers by transfer of technology and know-how. I propose an intellectual property, technology, and know-how bank as a new approach to facilitate widespread access to new vaccines in low- and middle-income countries by efficient transfer of patented vaccine technologies to multiple developing-country vaccine manufacturers.
Crager, Sara Eve
2015-01-01
The 2012 World Health Assembly Global Vaccine Action Plan called for global access to new vaccines within 5 years of licensure. Current approaches have proven insufficient to achieve sustainable vaccine pricing within such a timeline. Paralleling the successful strategy of generic competition to bring down drug prices, a clear consensus is emerging that market entry of multiple suppliers is a critical factor in expeditiously bringing down prices of new vaccines. In this context, key target objectives for improving access to new vaccines include overcoming intellectual property obstacles, streamlining regulatory pathways for biosimilar vaccines, and reducing market entry timelines for developing-country vaccine manufacturers by transfer of technology and know-how. I propose an intellectual property, technology, and know-how bank as a new approach to facilitate widespread access to new vaccines in low- and middle-income countries by efficient transfer of patented vaccine technologies to multiple developing-country vaccine manufacturers.
Data Access Technology Workshop Position Paper
NASA Technical Reports Server (NTRS)
Hinke, Thomas H.; Parks, John W. (Technical Monitor)
2002-01-01
This paper addresses the seven questions that were requested of attendees prior to attending the Data Access Technology Workshop that is scheduled for October 8-9,2002. Each of the questions is addressed in the following seven sections. The seven questions are: 1) What emerging technologies do you feel would best enhance user access to EOSDIS data and why? 2) How do you envision these technologies being used? How should they be used in combination with each other? 3) Can technologies be readily leveraged to achieve these results today? If not, when do you think they will be viable? 4) What investments do you think EOSDIS should make in these technologies today? Over the next 5 years? 5) What are reasonable cost expectations for leveraging these technologies as you've suggested? 6) What are the anticipated impacts on end users if these technologies are deployed, including investments required? 7) What unique researcher data access requirements need to be supported?
2014-01-01
The 2012 World Health Assembly Global Vaccine Action Plan called for global access to new vaccines within 5 years of licensure. Current approaches have proven insufficient to achieve sustainable vaccine pricing within such a timeline. Paralleling the successful strategy of generic competition to bring down drug prices, a clear consensus is emerging that market entry of multiple suppliers is a critical factor in expeditiously bringing down prices of new vaccines. In this context, key target objectives for improving access to new vaccines include overcoming intellectual property obstacles, streamlining regulatory pathways for biosimilar vaccines, and reducing market entry timelines for developing-country vaccine manufacturers by transfer of technology and know-how. I propose an intellectual property, technology, and know-how bank as a new approach to facilitate widespread access to new vaccines in low- and middle-income countries by efficient transfer of patented vaccine technologies to multiple developing-country vaccine manufacturers. PMID:25211753
Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi
2017-09-21
Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.
Han, Youn-Hee; Min, Sung-Gi
2017-01-01
Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism. PMID:28934152
A Novel Multiple-Access Correlation-Delay-Shift-Keying
NASA Astrophysics Data System (ADS)
Duan, J. Y.; Jiang, G. P.; Yang, H.
In Correlation-Delay-Shift-Keying (CDSK), the reference signal and the information-bearing signal are added together during a certain time delay. Because the reference signal is not strictly orthogonal to the information-bearing signal, the cross-correlation between the adjacent chaotic signal (Intra-signal Interference, ISI) will be introduced into the demodulation at the receiver. Therefore, the Bit-Error Ratio (BER) of CDSK is higher than that of Differential-Chaos-Shift-Keying (DCSK). To avoid the ISI component and enhance the BER performance of CDSK in multiuser scenario, Multiple-Access CDSK with No Intra-signal Interference (MA-CDSK-NII) is proposed. By constructing the repeated chaotic generator and applying the Walsh code sequence to modulate the reference signal, in MA-CDSK-NII, the ISI component will be eliminated during the demodulation. Gaussian approximation method is adopted here to obtain the exact performance analysis of MA-CDSK-NII over additive white Gaussian noise (AWGN) channel and Rayleigh multipath fading channels. Results show that, due to no ISI component and lower transmitting power, the BER performance of MA-CDSK-NII can be better than that of multiple-access CDSK and Code-Shifted Differential-Chaos-Shift-Keying (CS-DCSK).
K-12 Technology Accessibility: The Message from State Governments
ERIC Educational Resources Information Center
Shaheen, Natalie L.; Lazar, Jonathan
2018-01-01
This study examined state education technology plans and technology accessibility statutes to attempt to answer the question--is K-12 instructional technology accessibility discussed in state-level technology accessibility statutes and education technology plans across the 50 United States? When a K-12 school district is planning the construction…
Marginalized Student Access to Technology Education
NASA Astrophysics Data System (ADS)
Kurtcu, Wanda M.
The purpose of this paper is to investigate how a teacher can disrupt an established curriculum that continues the cycle of inequity of access to science, technology, engineering, and math (STEM) curriculum by students in alternative education. For this paper, I will focus on the technology components of the STEM curriculum. Technology in the United States, if not the world economy, is developing at a rapid pace. Many areas of day to day living, from applying for a job to checking one's bank account online, involve a component of science and technology. The 'gap' in technology education is emphasized between the 'haves and have-nots', which is delineated along socio-economic lines. Marginalized students in alternative education programs use this equipment for little else than remedial programs and credit recovery. This level of inequity further widens in alternative education programs and affects the achievement of marginalized students in credit recovery or alternative education classes instead of participation technology classes. For the purposes of this paper I focus on how can I decrease the inequity of student access to 21st century technology education in an alternative education program by addressing the established curriculum of the program and modifying structural barriers of marginalized student access to a technology focused curriculum.
Academic Primer Series: Key Papers About Teaching with Technology.
Boysen-Osborn, Megan; Cooney, Robert; Gottlieb, Michael; Chan, Teresa M; Brown, Aaron; King, Andrew; Tobias, Adam; Thoma, Brent
2017-06-01
Modern learners have immediate, unlimited access to a wide variety of online resources . To appeal to this current generation of learners, educators must embrace the use of technology. However, educators must balance newer, novel technologies with traditional methods to achieve the best learning outcomes. Therefore, we aimed to review several papers useful for faculty members wishing to incorporate technology into instructional design. We identified a broad list of papers relevant to teaching and learning with technology within the online discussions of the Academic Life in Emergency Medicine (ALiEM) Faculty Incubator. This list was augmented with suggestions by a guest expert (BT) and an open call on Twitter (tagged with the #meded and #FOAMed hashtags) yielding 24 papers. We then conducted a modified three-round Delphi process within the authorship group, including junior and senior faculty members, to identify the most impactful papers. We pared the list of 24 papers to five that were most highly rated. Two were research papers and three were commentaries or editorials. The authorship group reviewed and summarized these papers with specific consideration to their value to junior educators and faculty developers. This is a key reading list for junior faculty members and faculty developers interested in teaching with technology. The commentary contextualizes the importance of these papers for medical educators, to optimize use of technology in their teaching or incorporate into faculty development.
Academic Primer Series: Key Papers About Teaching with Technology
Boysen-Osborn, Megan; Cooney, Robert; Gottlieb, Michael; Chan, Teresa M.; Brown, Aaron; King, Andrew; Tobias, Adam; Thoma, Brent
2017-01-01
Introduction Modern learners have immediate, unlimited access to a wide variety of online resources. To appeal to this current generation of learners, educators must embrace the use of technology. However, educators must balance newer, novel technologies with traditional methods to achieve the best learning outcomes. Therefore, we aimed to review several papers useful for faculty members wishing to incorporate technology into instructional design. Methods We identified a broad list of papers relevant to teaching and learning with technology within the online discussions of the Academic Life in Emergency Medicine (ALiEM) Faculty Incubator. This list was augmented with suggestions by a guest expert (BT) and an open call on Twitter (tagged with the #meded and #FOAMed hashtags) yielding 24 papers. We then conducted a modified three-round Delphi process within the authorship group, including junior and senior faculty members, to identify the most impactful papers. Results We pared the list of 24 papers to five that were most highly rated. Two were research papers and three were commentaries or editorials. The authorship group reviewed and summarized these papers with specific consideration to their value to junior educators and faculty developers. Conclusion This is a key reading list for junior faculty members and faculty developers interested in teaching with technology. The commentary contextualizes the importance of these papers for medical educators, to optimize use of technology in their teaching or incorporate into faculty development. PMID:28611895
Ancker, Jessica S; Miller, Melissa C; Patel, Vaishali; Kaushal, Rainu
2014-01-01
Background Providing patients with access to their medical data is widely expected to help educate and empower them to manage their own health. Health information exchange (HIE) infrastructures could potentially help patients access records across multiple healthcare providers. We studied three HIE organizations as they developed portals to give consumers access to HIE data previously exchanged only among healthcare organizations. Objective To follow the development of new consumer portal technologies, and to identify barriers and facilitators to patient access to HIE data. Methods Semistructured interviews of 15 key informants over a 2-year period spanning the development and early implementation of three new projects, coded according to a sociotechnical framework. Results As the organizations tried to develop functionality that fully served the needs of both providers and patients, plans were altered by technical barriers (primarily related to data standardization) and cultural and legal issues surrounding data access. Organizational changes also played an important role in altering project plans. In all three cases, patient access to data was significantly scaled back from initial plans. Conclusions This prospective study revealed how sociotechnical factors previously identified as important in health information technology success and failure helped to shape the evolution of three novel consumer informatics projects. Barriers to providing patients with seamless access to their HIE data were multifactorial. Remedies will have to address technical, organizational, cultural, and other factors. PMID:24064443
Gabriel, Meghan Hufstader; Jones, Emily B; Samy, Leila; King, Jennifer
2014-07-01
Despite major national investments to support the adoption of health information technology (IT), concerns persist that barriers are inhibiting that adoption and the use of advanced health IT capabilities in rural areas in particular. Using a survey of Medicare-certified critical-access hospitals, we examined electronic health record (EHR) adoption, key EHR functionalities, telehealth, and teleradiology, as well as challenges to EHR adoption. In 2013, 89 percent of critical-access hospitals had implemented a full or partial EHR. Adoption of key EHR capabilities varied. Critical-access hospitals that had certain types of technical assistance and resources available to support health IT were more likely to have adopted health IT capabilities and less likely to report significant challenges to EHR implementation and use, compared to other hospitals in the survey. It is important to ensure that the necessary resources and support are available to critical-access hospitals, especially those that operate independently, to assist them in adopting health IT and becoming able to electronically link to the broader health care system. Project HOPE—The People-to-People Health Foundation, Inc.
NASA Astrophysics Data System (ADS)
Walton, A. L.
2015-12-01
In 2016, the National Science Foundation (NSF) will support a portfolio of activities and investments focused upon challenges in data access, interoperability, and sustainability. These topics are fundamental to science questions of increasing complexity that require multidisciplinary approaches and expertise. Progress has become tractable because of (and sometimes complicated by) unprecedented growth in data (both simulations and observations) and rapid advances in technology (such as instrumentation in all aspects of the discovery process, together with ubiquitous cyberinfrastructure to connect, compute, visualize, store, and discover). The goal is an evolution of capabilities for the research community based on these investments, scientific priorities, technology advances, and policies. Examples from multiple NSF directorates, including investments by the Advanced Cyberinfrastructure Division, are aimed at these challenges and can provide the geosciences research community with models and opportunities for participation. Implications for the future are highlighted, along with the importance of continued community engagement on key issues.
Marginalized Student Access to Technology Education
ERIC Educational Resources Information Center
Kurtcu, Wanda M.
2017-01-01
The purpose of this paper is to investigate how a teacher can disrupt an established curriculum that continues the cycle of inequity of access to science, technology, engineering, and math (STEM) curriculum by students in alternative education. For this paper, I will focus on the technology components of the STEM curriculum. Technology in the…
Accessible Electronic and Information Technology
This Policy establishes EPA's responsibilities and procedures for making its Electronic and Information Technology (EIT) products accessible to all people, including people with disabilities, in accordance with Section 508 of the Rehabilitation Act.
Student Technology Use in a Self-Access Center
ERIC Educational Resources Information Center
Castellano, Joachim; Mynard, Jo; Rubesch, Troy
2011-01-01
Technology has played an increasingly vital role in self-access learning over the past twenty years or so, yet little research has been conducted into learners' actual use of the technology both for self-directed learning and as part of everyday life. This paper describes an ongoing action research project at a self-access learning center (SALC)…
78 FR 23969 - Ewan 1, INC. n/k/a AccessKey IP, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-23
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Ewan 1, INC. n/k/a AccessKey IP, Inc.; Order of Suspension of Trading April 19, 2013. It appears to the Securities and Exchange Commission that... AccessKey IP, Inc. (``AccessKey'') because it has not filed a periodic report since it filed its...
NASA Astrophysics Data System (ADS)
Okamoto, Satoru; Sato, Takehiro; Yamanaka, Naoaki
2017-01-01
In this paper, flexible and highly reliable metro and access integrated networks with network virtualization and software defined networking technologies will be presented. Logical optical line terminal (L-OLT) technologies and active optical distribution networks (ODNs) are the key to introduce flexibility and high reliability into the metro and access integrated networks. In the Elastic Lambda Aggregation Network (EλAN) project which was started in 2012, a concept of the programmable optical line terminal (P-OLT) has been proposed. A role of the P-OLT is providing multiple network services that have different protocols and quality of service requirements by single OLT box. Accommodated services will be Internet access, mobile front-haul/back-haul, data-center access, and leased line. L-OLTs are configured within the P-OLT box to support the functions required for each network service. Multiple P-OLTs and programmable optical network units (P-ONUs) are connected by the active ODN. Optical access paths which have flexible capacity are set on the ODN to provide network services from L-OLT to logical ONUs (L-ONUs). The L-OLT to L-ONU path on the active ODN provides a logical connection. Therefore, introducing virtualization technologies becomes possible. One example is moving an L-OLT from one P-OLT to another P-OLT like a virtual machine. This movement is called L-OLT migration. The L-OLT migration provides flexible and reliable network functions such as energy saving by aggregating L-OLTs to a limited number of P-OLTs, and network wide optical access path restoration. Other L-OLT virtualization technologies and experimental results will be also discussed in the paper.
Access to augmentative and alternative communication: new technologies and clinical decision-making.
Fager, Susan; Bardach, Lisa; Russell, Susanne; Higginbotham, Jeff
2012-01-01
Children with severe physical impairments require a variety of access options to augmentative and alternative communication (AAC) and computer technology. Access technologies have continued to develop, allowing children with severe motor control impairments greater independence and access to communication. This article will highlight new advances in access technology, including eye and head tracking, scanning, and access to mainstream technology, as well as discuss future advances. Considerations for clinical decision-making and implementation of these technologies will be presented along with case illustrations.
Early access programs: Benefits, challenges, and key considerations for successful implementation
Patil, Sanjaykumar
2016-01-01
Early access programs, (EAPs) are adopted by an increasing number of pharma companies due to several benefits offered by these programs. EAPs offer ethical, compliant, and controlled mechanisms of access to investigational drugs outside of the clinical trial space and before the commercial launch of the drug, to patients with life-threatening diseases having no treatment options available. In addition to the development of positive relationships with key opinion leaders (KOL), patients, advocacy groups and regulators, the data captured from the implementation of EAPs supports in the formulation of global commercialization strategies. This white paper outlines various circumstances to be considered for the implementation of EAPs named patient programs, the regulatory landscape, the benefits and challenges associated with implementing these programs and the key considerations for their successful implementation. PMID:26955570
Technological Innovation and Cooperation for Foreign Information Access Program
ERIC Educational Resources Information Center
Office of Postsecondary Education, US Department of Education, 2012
2012-01-01
The Technological Innovation and Cooperation for Foreign Information Access (TICFIA) Program supports projects focused on developing innovative technologies for accessing, collecting, organizing, preserving, and disseminating information from foreign sources to address the U.S.' teaching and research needs in international education and foreign…
39 CFR 255.4 - Accessibility to electronic and information technology.
Code of Federal Regulations, 2013 CFR
2013-07-01
... AND INFORMATION TECHNOLOGY § 255.4 Accessibility to electronic and information technology. (a) In... burden, that the electronic and information technology the agency procures allows— (1) Individuals with... 39 Postal Service 1 2013-07-01 2013-07-01 false Accessibility to electronic and information...
39 CFR 255.4 - Accessibility to electronic and information technology.
Code of Federal Regulations, 2014 CFR
2014-07-01
... AND INFORMATION TECHNOLOGY § 255.4 Accessibility to electronic and information technology. (a) In... burden, that the electronic and information technology the agency procures allows— (1) Individuals with... 39 Postal Service 1 2014-07-01 2014-07-01 false Accessibility to electronic and information...
39 CFR 255.4 - Accessibility to electronic and information technology.
Code of Federal Regulations, 2012 CFR
2012-07-01
... AND INFORMATION TECHNOLOGY § 255.4 Accessibility to electronic and information technology. (a) In... burden, that the electronic and information technology the agency procures allows— (1) Individuals with... 39 Postal Service 1 2012-07-01 2012-07-01 false Accessibility to electronic and information...
39 CFR 255.4 - Accessibility to electronic and information technology.
Code of Federal Regulations, 2011 CFR
2011-07-01
... AND INFORMATION TECHNOLOGY § 255.4 Accessibility to electronic and information technology. (a) In... burden, that the electronic and information technology the agency procures allows— (1) Individuals with... 39 Postal Service 1 2011-07-01 2011-07-01 false Accessibility to electronic and information...
48 CFR 352.239-73 - Electronic information and technology accessibility.
Code of Federal Regulations, 2010 CFR
2010-10-01
... technology accessibility. 352.239-73 Section 352.239-73 Federal Acquisition Regulations System HEALTH AND... Clauses 352.239-73 Electronic information and technology accessibility. (a) As prescribed in 339.201-70(a), the Contracting Officer shall insert the following provision: Electronic and Information Technology...
48 CFR 352.239-73 - Electronic information and technology accessibility.
Code of Federal Regulations, 2013 CFR
2013-10-01
... technology accessibility. 352.239-73 Section 352.239-73 Federal Acquisition Regulations System HEALTH AND... Clauses 352.239-73 Electronic information and technology accessibility. (a) As prescribed in 339.201-70(a), the Contracting Officer shall insert the following provision: Electronic and Information Technology...
48 CFR 352.239-73 - Electronic information and technology accessibility.
Code of Federal Regulations, 2012 CFR
2012-10-01
... technology accessibility. 352.239-73 Section 352.239-73 Federal Acquisition Regulations System HEALTH AND... Clauses 352.239-73 Electronic information and technology accessibility. (a) As prescribed in 339.201-70(a), the Contracting Officer shall insert the following provision: Electronic and Information Technology...
48 CFR 352.239-73 - Electronic information and technology accessibility.
Code of Federal Regulations, 2014 CFR
2014-10-01
... technology accessibility. 352.239-73 Section 352.239-73 Federal Acquisition Regulations System HEALTH AND... Clauses 352.239-73 Electronic information and technology accessibility. (a) As prescribed in 339.201-70(a), the Contracting Officer shall insert the following provision: Electronic and Information Technology...
48 CFR 352.239-73 - Electronic information and technology accessibility.
Code of Federal Regulations, 2011 CFR
2011-10-01
... technology accessibility. 352.239-73 Section 352.239-73 Federal Acquisition Regulations System HEALTH AND... Clauses 352.239-73 Electronic information and technology accessibility. (a) As prescribed in 339.201-70(a), the Contracting Officer shall insert the following provision: Electronic and Information Technology...
ERIC Educational Resources Information Center
Stagg, Bethan C.; Donkin, Maria E.; Smith, Alison M.
2015-01-01
Bryophytes are a rewarding study group in field biology and the UK bryophyte flora has international importance to biodiversity conservation. We designed an identification key to common woodland moss species and compared the usability of two formats, web-based multi-access and printed dichotomous key, with undergraduate students. The rate of…
Computer Access. Tech Use Guide: Using Computer Technology.
ERIC Educational Resources Information Center
Council for Exceptional Children, Reston, VA. Center for Special Education Technology.
One of nine brief guides for special educators on using computer technology, this guide focuses on access including adaptations in input devices, output devices, and computer interfaces. Low technology devices include "no-technology" devices (usually modifications to existing devices), simple switches, and multiple switches. High technology input…
Patent law--balancing profit maximization and public access to technology.
Beckerman-Rodau, Andrew
2003-01-01
This article addresses the contemporary issue of balancing the need for patent protection for intellectual property with the resulting restriction of public access to new technology. The author argues that patent law protects private property rights rather than creating monopolies. Additionally, the author discusses how restricting access to patented technology, such as pharmaceuticals, can affect public health problems, such as the HIV/AIDS epidemic in developing nations. The author then concludes with some proposals for making patented technology available to people in developing nations who need access to such technology but who are unable to afford its high costs due to patent protection.
Technology for People, Not Disabilities: Ensuring Access and Inclusion
ERIC Educational Resources Information Center
Foley, Alan; Ferri, Beth A.
2012-01-01
The potential of technology to connect people and provide access to education, commerce, employment and entertainment has never been greater or more rapidly changing. Communication technologies and new media promise to "revolutionize our lives" by breaking down barriers and expanding access for disabled people. Yet, it is also true that technology…
Identity and Access Management: Technological Implementation of Policy
ERIC Educational Resources Information Center
von Munkwitz-Smith, Jeff; West, Ann
2004-01-01
Navigating the multiple processes for accessing ever-multiplying campus information systems can be a daunting task for students, faculty, and staff. This article provides a brief overview of Identity and Access Management Services. The authors review key characteristics and components of this new information architecture and address the issue of…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-14
... Telecommunications Act Accessibility Guidelines and its Electronic and Information Technology Accessibility Standards... electronic and information technology covered by Section 508 of the Rehabilitation Act Amendments of 1998. 76.... 2011-07] RIN 3014-AA37 Telecommunications Act Accessibility Guidelines; Electronic and Information...
NASA Astrophysics Data System (ADS)
Bigagli, Lorenzo; Sondervan, Jeroen
2014-05-01
The Policy RECommendations for Open Access to Research Data in Europe (RECODE) project, started in February 2013 with a duration of two years, has the objective to identify a series of targeted and over-arching policy recommendations for Open Access to European research data, based on existing good practice and addressing such hindering factors as stakeholder fragmentation, technical and infrastructural issues, ethical and legal issues, and financial and institutional policies. In this work we focus on the technical and infrastructural aspect, where by "infrastructure" we mean the technological assets (hardware and software), the human resources, and all the policies, processes, procedures and training for managing and supporting its continuous operation and evolution. The context targeted by RECODE includes heterogeneous networks, initiatives, projects and communities that are fragmented by discipline, geography, stakeholder category (publishers, academics, repositories, etc.) as well as other boundaries. Many of these organizations are already addressing key technical and infrastructural barriers to Open Access to research data. Such barriers may include: lack of automatic mechanisms for policy enforcement, lack of metadata and data models supporting open access, obsolescence of infrastructures, scarce awareness about new technological solutions, lack of training and/or expertise on IT and semantics aspects. However, these organizations are often heterogeneous and fragmented by discipline, geography, stakeholder category (publishers, academics, repositories, etc.) as well as other boundaries, and often work in isolation, or with limited contact with one another. RECODE has addressed these challenges, and the possible solutions to mitigate them, engaging all the identified stakeholders in a number of ways, including an online questionnaire, case studies interviews, literature review, a workshop. The conclusions have been validated by the RECODE Advisory Board and
Technology Adoption: Influence of Availability and Accessibility
ERIC Educational Resources Information Center
McConnell, William Stewart
2009-01-01
Farmers are small business leaders using available technology to remain competitive. The availability of technology is dependent on the suppliers' use of the marketing mix 4Ps theory--product, price, placement, and promotion. The purpose of this study was to determine how the relation between availability and accessibility influences the adoption…
Vulnerable Children's Access to Examinations at Key Stage 4. Research Report RR639
ERIC Educational Resources Information Center
Kendall, Sally; Johnson, Annie; Martin, Kerry; Kinder; Kay
2005-01-01
This research project was commissioned by the Department for Education and Skills (DfES) in 2004 to examine barriers to vulnerable children accessing examinations at the end of key stage 4 and to identify strategies employed to overcome these barriers. Key groups of vulnerable children identified by the DfES included: (1) Looked-after children;…
Instructional Technology for Rural Schools: Access and Acquisition
ERIC Educational Resources Information Center
Sundeen, Todd H.; Sundeen, Darrelanne M.
2013-01-01
Integrating instructional technology into all classrooms has the potential to transform modern education and student learning. However, access to technology is not equally available to all districts or schools. Decreased funding and budgetary restraints have had a direct impact on technology acquisition in many rural school districts. One of the…
Input from Key Stakeholders in the National Security Technology Incubator
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.
Key Problems in Science and Technology in Thailand.
ERIC Educational Resources Information Center
Yuthavong, Yongyuth; And Others
1985-01-01
Cites the need for promoting science/technology management and policy formation in Thailand, viewing contributions of science/technology to the socioeconomic development of the country as high priorities. Criteria for selecting priority areas and key problems are noted; they include relevance to development, availability of human resources, and…
Personalized medicine and access to genetic technologies.
den Exter, André
2010-01-01
Personalized medicine started after the Human Genome Project and is a relatively new concept that will dramatically change clinical practice. It offers clear clinical advantages by applying genetic diagnostic tests and then treating the patient with targeted medicines based on his or her genetic make-up. Its potential seems promising but there are quite a few legal concerns. One of these questions deals with the right to health care and access to genetic technologies. In this paper, the author explains the meaning of such a right to health care under international human rights law, its relevance for making genetic services eligible for public funding, how to cope with quality concerns of commercial testing, and finally, the patentability controversy and clinical access to genetic information. Apart from more traditional human rights concerns (consent, privacy, confidentiality) and genetics, States should be aware of the meaning of the equal access concept under international law and its consequences when introducing new technologies such genetic testing and services.
Quantum key distribution in multicore fibre for secure radio access networks
NASA Astrophysics Data System (ADS)
Llorente, Roberto; Provot, Antoine; Morant, Maria
2018-01-01
Broadband access in optical domain usually focuses in providing a pervasive cost-effective high bitrate communication in a given area. Nowadays, it is of utmost interest also to be able to provide a secure communication to the costumers in the area. Wireless access networks rely on optical domain for both fronthaul and backhaul of the radio access network (C-RAN). Multicore fiber (MCF) has been proposed as a promising candidate for the optical media of choice in nextgeneration wireless. The capacity demand of next-generation 5G networks makes interesting the use of high-capacity optical solutions as space-division multiplexing of different signals over MCF media. This work addresses secure MCF communication supporting C-RAN architectures. The paper proposes the use of one core in the MCF to transport securely an optical quantum key encoding altogether with end-to-end wireless signal transmitted in the remaining cores in radio-over-fiber (RoF). The RoF wireless signals are suitable for radio access fronthaul and backhaul. The theoretical principle and simulation analysis of quantum key distribution (QKD) are presented in this paper. The potential impact of optical RoF transmission crosstalk impairments is assessed experimentally considering different cellular signals on the remaining optical cores in the MCF. The experimental results report fronthaul performance over a four-core optical fiber with RoF transmission of full-standard CDMA signals providing 3.5G services in one core, HSPA+ signals providing 3.9G services in the second core and 3GPP LTEAdvanced signals providing 4G services in the third core, considering that the QKD signal is allocated in the fourth core.
The National Aerospace Initiative (NAI): Technologies For Responsive Space Access
NASA Technical Reports Server (NTRS)
Culbertson, Andrew; Bhat, Biliyar N.
2003-01-01
The Secretary of Defense has set new goals for the Department of Defense (DOD) to transform our nation's military forces. The Director for Defense Research and Engineering (DDR&E) has responded to this challenge by defining and sponsoring a transformational initiative in Science and Technology (S&T) - the National Aerospace Initiative (NAI) - which will have a fundamental impact on our nation's military capabilities and on the aerospace industry in general. The NAI is planned as a joint effort among the tri-services, DOD agencies and National Aeronautics and Space Administration (NASA). It is comprised of three major focus areas or pillars: 1) High Speed Hypersonics (HSH), 2) Space Access (SA), and 3) Space Technology (ST). This paper addresses the Space Access pillar. The NAI-SA team has employed a unique approach to identifying critical technologies and demonstrations for satisfying both military and civilian space access capabilities needed in the future. For planning and implementation purposes the NAI-SA is divided into five technology subsystem areas: Airframe, Propulsion, Flight Subsystems, Operations and Payloads. Detailed technology roadmaps were developed under each subsystem area using a time-phased, goal oriented approach that provides critical space access capabilities in a timely manner and involves subsystem ground and flight demonstrations. This S&T plan addresses near-term (2009), mid-term (2016), and long-term (2025) goals and objectives for space access. In addition, system engineering and integration approach was used to make sure that the plan addresses the requirements of the end users. This paper describes in some detail the technologies in NAI-Space Access pillar. Some areas of emphasis are: high temperature materials, thermal protection systems, long life, lightweight, highly efficient airframes, metallic and composite cryotanks, advanced liquid rocket engines, integrated vehicle health monitoring and management, highly operable systems and
Ensuring Equal Access to Technology: Providing Assistive Technology for Students with Disabilities
ERIC Educational Resources Information Center
Lee, Hwa; Templeton, Rosalyn
2008-01-01
With the passage of landmark federal laws, equal access to technology for all students, regardless of their abilities, has been getting increasing attention in the field of education. Although considering a continuum of assistive technology (AT) items and services for individuals with disabilities is a mandated practice, education and…
Hobson, Esther V; Baird, Wendy O; Cooper, Cindy L; Mawson, Sue; Shaw, Pamela J; Mcdermott, Christopher J
2016-01-01
Our objective was to review the evidence for using technology to improve access to specialist care for patients with amyotrophic lateral sclerosis (ALS) and their carers. Medline, Google Scholar and the Cochrane library were searched for articles describing technology that enabled clinical care of patients with ALS or their carers where the patient/carer and clinician were not in the same location. Two applications were identified: telemedicine to facilitate video conferencing as an alternative to outpatient consultations and telehealth monitoring for patients with respiratory failure. One randomized controlled trial using telehealth in patients with respiratory failure including 22 patients with ALS was identified. While rates of hospitalization were reduced, overall mortality was unchanged and there were too few patients with ALS in the study to detect significant benefit. In conclusion, there is limited evidence to support the use of telemedicine or telehealth in the care of patients with ALS. Future research needs to develop an understanding of the key beneficial aspects of the traditional specialist ALS service and how these factors could be delivered using technology. Successful evaluation and implementation of technologies to facilitate access to specialist care will only be possible if all the relevant impacts of an intervention are understood and measured.
Extending key sharing: how to generate a key tightly coupled to a network security policy
NASA Astrophysics Data System (ADS)
Kazantzidis, Matheos
2006-04-01
Current state of the art security policy technologies, besides the small scale limitation and largely manual nature of accompanied management methods, are lacking a) in real-timeliness of policy implementation and b) vulnerabilities and inflexibility stemming from the centralized policy decision making; even if, for example, a policy description or access control database is distributed, the actual decision is often a centralized action and forms a system single point of failure. In this paper we are presenting a new fundamental concept that allows implement a security policy by a systematic and efficient key distribution procedure. Specifically, we extend the polynomial Shamir key splitting. According to this, a global key is split into n parts, any k of which can re-construct the original key. In this paper we present a method that instead of having "any k parts" be able to re-construct the original key, the latter can only be reconstructed if keys are combined as any access control policy describes. This leads into an easily deployable key generation procedure that results a single key per entity that "knows" its role in the specific access control policy from which it was derived. The system is considered efficient as it may be used to avoid expensive PKI operations or pairwise key distributions as well as provides superior security due to its distributed nature, the fact that the key is tightly coupled to the policy, and that policy change may be implemented easier and faster.
Survey of Canadian Myotonic Dystrophy Patients' Access to Computer Technology.
Climans, Seth A; Piechowicz, Christine; Koopman, Wilma J; Venance, Shannon L
2017-09-01
Myotonic dystrophy type 1 is an autosomal dominant condition affecting distal hand strength, energy, and cognition. Increasingly, patients and families are seeking information online. An online neuromuscular patient portal under development can help patients access resources and interact with each other regardless of location. It is unknown how individuals living with myotonic dystrophy interact with technology and whether barriers to access exist. We aimed to characterize technology use among participants with myotonic dystrophy and to determine whether there is interest in a patient portal. Surveys were mailed to 156 participants with myotonic dystrophy type 1 registered with the Canadian Neuromuscular Disease Registry. Seventy-five participants (60% female) responded; almost half were younger than 46 years. Most (84%) used the internet; almost half of the responders (47%) used social media. The complexity and cost of technology were commonly cited reasons not to use technology. The majority of responders (76%) were interested in a myotonic dystrophy patient portal. Patients in a Canada-wide registry of myotonic dystrophy have access to and use technology such as computers and mobile phones. These patients expressed interest in a portal that would provide them with an opportunity to network with others with myotonic dystrophy and to access information about the disease.
Harper, Simon; Yesilada, Yeliz
2012-01-01
This is a technological review paper focussed on identifying both the research challenges and opportunities for further investigation arising from emerging technologies, and it does not aim to propose any recommendation or standard. It is focussed on blind and partially sighted World Wide Web (Web) users along with others who use assistive technologies. The Web is a fast moving interdisciplinary domain in which new technologies, techniques and research is in perpetual development. It is often difficult to maintain a holistic view of new developments within the multiple domains which together make up the Web. This suggests that knowledge of the current developments and predictions of future developments are additionally important for the accessibility community. Web accessibility has previously been characterised by the correction of our past mistakes to make the current Web fulfil the original vision of access for all. New technologies were not designed with accessibility in mind and technologies that could be useful for addressing accessibility issues were not identified or adopted by the accessibility community. We wish to enable the research community to undertake preventative measures and proactively address challenges, while recognising opportunities, before they become unpreventable or require retrospective technological enhancement. This article then reviews emerging trends within the Web and Web Accessibility domains.
Disabled Access to Technological Advances (DATA) Final Report.
ERIC Educational Resources Information Center
Cress, Cynthia J.
Disabled Access to Technological Advances (DATA) was a 3-year federally funded project to demonstrate how the application of computer technology can increase the employability of severely disabled persons. Services were provided through the integrated efforts of four agencies in Dane County, Wisconsin: an independent living center, a…
Programming and Technology for Accessibility in Geoscience
NASA Astrophysics Data System (ADS)
Sevre, E.; Lee, S.
2013-12-01
Many people, students and professors alike, shy away from learning to program because it is often believed to be something scary or unattainable. However, integration of programming into geoscience education can be a valuable tool for increasing the accessibility of content for all who are interested. It is my goal to dispel these myths and convince people that: 1) Students with disabilities can use programming to increase their role in the classroom, 2) Everyone can learn to write programs to simplify daily tasks, 3) With a deep understanding of the task, anyone can write a program to do a complex task, 4) Technology can be combined with programming to create an inclusive environment for all students of geoscience, and 5) More advanced knowledge of programming and technology can lead geoscientists to create software to serve as assistive technology in the classroom. It is my goal to share my experiences using technology to enhance the classroom experience as a way of addressing the aforementioned issues. Through my experience, I have found that programming skills can be included and learned by all to enhance the content of courses without detracting from curriculum. I hope that, through this knowledge, geoscience courses can become more accessible for people with disabilities by including programming and technology to the benefit of all involved.
Walton, Graham; Childs, Susan; Blenkinsopp, Elizabeth
2005-12-01
This article describes a project which explored the potential for mobile technologies to give health students in the community access to learning resources. The purpose included the need to identify possible barriers students could face in using mobile technologies. Another focus was to assess the students perceptions of the importance of being able to access learning resources in the community. This 1-year project used two main approaches for data collection. A review of the literature on mobile technologies in the health context was conducted. This was used in a systematic way to identify key issues and trends. The literature review was used to inform the design and production of a questionnaire. This was distributed to and completed by a group of community health students at Northumbria University, UK. The questionnaire was piloted and there was a 100% completion rate with 49 returned forms. The literature review indicated that most mobile technology applications were occurring in the US. At the time of the review the most prevalent mobile technologies were PDAs, laptops, WAP phones and portable radios with use being concentrated around doctors in the acute sector. A range of advantages and disadvantages to the technology were discovered. Mobile technologies were mainly being used for clinical rather than learning applications. The students showed a low level of awareness of the technology but placed great importance to accessing learning resources from the community. Significant development and changes are taking place in mobile technologies. Since the data collection for this work was completed in 2004 podcasting and videocasting have become significant in mobile learning for health professionals. Librarians will need to address the relevance and implications of m-learning for their practice. Care and consideration needs to be given on the time and resources librarians allocate for the necessary development work around mobile technologies. Collaboration and
39 CFR 255.4 - Accessibility to electronic and information technology.
Code of Federal Regulations, 2010 CFR
2010-07-01
... technology. 255.4 Section 255.4 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION... AND INFORMATION TECHNOLOGY § 255.4 Accessibility to electronic and information technology. (a) In... burden, that the electronic and information technology the agency procures allows— (1) Individuals with...
Key participants in codeveloped technology pose for group picture
NASA Technical Reports Server (NTRS)
1997-01-01
Following the presentation of the Universal Signal Conditioning Amplifier (USCA), a new piece of technology developed through a National Aeronautics and Space Administration (NASA) partnership with industry, to Kennedy Space Center (KSC) Director Roy Bridges, Jr., key participants in the partnership pose for a group portrait. They are (from left) Bill Larson, NASA; Dr. Pedro Medelius, INET; Roy Bridges, Jr., KSC Director; Ed Gladney and William Saputo, L-3 Communications; Pam Gillespi, representing Congressman Dave Weldon; and Frank Kinney, Technological Research and Development Authority. The USCA is a key component of the codeveloped Automated Data Acquisition System (ADAS) that measures temperature, pressure and vibration at KSC's launch pads. The breakthrough technology is expected to reduce sensor setup and configuration times from hours to seconds. KSC teamed up with Florida's Technological Research and Development Authority and manufacturer L-3 Communications to produce a system that would benefit the aerospace industry and other commercial markets.
Plun-Favreau, Juliette; Immonen-Charalambous, Kaisa; Steuten, Lotte; Strootker, Anja; Rouzier, Roman; Horgan, Denis; Lawler, Mark
2016-01-01
Molecular diagnostics can offer important benefits to patients and are a key enabler of the integration of personalised medicine into health care systems. However, despite their promise, few molecular diagnostics are embedded into clinical practice (especially in Europe) and access to these technologies remains unequal across countries and sometimes even within individual countries. If research translation and the regulatory environments have proven to be more challenging than expected, reimbursement and value assessment remain the main barriers to providing patients with equal access to molecular diagnostics. Unclear or non-existent reimbursement pathways, together with the lack of clear evidence requirements, have led to significant delays in the assessment of molecular diagnostics technologies in certain countries. Additionally, the lack of dedicated diagnostics budgets and the siloed nature of resource allocation within certain health care systems have significantly delayed diagnostics commissioning. This article will consider the perspectives of different stakeholders (patients, health care payers, health care professionals, and manufacturers) on the provision of a research-enabled, patient-focused molecular diagnostics platform that supports optimal patient care. Through the discussion of specific case studies, and building on the experience from countries that have successfully integrated molecular diagnostics into clinical practice, this article will discuss the necessary evolutions in policy and health technology assessment to ensure that patients can have equal access to appropriate molecular diagnostics. © 2016 S. Karger AG, Basel.
2016-06-09
C O R P O R A T I O N Research Report Air Force Officer Accession Planning Addressing Key Gaps in Meeting Career Field Academic Degree Requirements...various Air Force missions in particular career fields. Key to this goal for nonrated officers is establishing and enforcing academic degree...35 Developing Accession Targets by Academic Degree Type
Application of an access technology delivery protocol to two children with cerebral palsy.
Mumford, Leslie; Chau, Tom
2015-07-14
This study further delineates the merits and limitations of the Access Technology Delivery Protocol (ATDP) through its application to two children with severe disabilities. We conducted mixed methods case studies to demonstrate the ATDP with two children with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with custom access technologies. After 16 weeks, one child's switch offered improved response efficiency, high teacher satisfaction and increased participation. The other child's switch resulted in improved satisfaction and switch effectiveness but lower overall efficiency. The latter child was no longer using his switch by the end of the study. These contrasting findings indicate that changes to any contextual factors that may impact the user's switch performance should mandate a reassessment of the access pathway. Secondly, it is important to ensure that individuals who will be responsible for switch training be identified at the outset and engaged throughout the ATDP. Finally, the ATDP should continue to be tested with individuals with severe disabilities to build an evidence base for the delivery of response efficient access solutions. Implications for Rehabilitation A data-driven, comprehensive access technology delivery protocol for children with complex communication needs could help to mitigate technology abandonment. Successful adoption of an access technology requires personalized design, training of the technology user, the teaching staff, the caregivers and other communication partners, and integration with functional activities.
Smith, Emma M; Gowran, Rosemary Joan; Mannan, Hasheem; Donnelly, Brian; Alvarez, Liliana; Bell, Diane; Contepomi, Silvana; Ennion Wegner, Liezel; Hoogerwerf, Evert-Jan; Howe, Tracey; Jan, Yih-Kuen; Kagwiza, Jeanne; Layton, Natasha; Ledgerd, Ritchard; MacLachlan, Malcolm; Oggero, Giulia; Pettersson, Cecilia; Pousada, Thais; Scheffler, Elsje; Wu, Sam
2018-05-17
This paper reviews the current capacity of personnel in enabling access to assistive technology (AT) as well as the systems and processes within which they work, and was reviewed, discussed, and refined during and following the Global Research, Innovation, and Education in Assistive Technology (GREAT) Summit. Key concepts addressed include a person-centred team approach; sustainability indicators to monitor, measure, and respond to needs for service design and delivery; education, research, and training for competent practice, using the six rehab-workforce challenges framework; and credentialing frameworks. We propose development of a competence framework and associated education and training programs, and development and implementation of a certification framework for AT personnel. There is a resolve to address the challenges faced by People globally to access assistive technology. Context specific needs assessment is required to understand the AT Personnel landscape, to shape and strengthen credentialing frameworks through competencies and certification, acknowledging both general and specific skill mix requirements. Implications for Rehabilitation Personnel in assistive technology (AT) provision should be trained using a person-centred team approach, which emphasizes appropriate skill-mix to address multiple needs within the community. Sustainability indicators should be used which allow personnel to monitor, measure and respond to needs for service design and delivery. A competence framework with associated education and training program, coupled with the development and implementation of a certification framework for AT personnel needs, will promote quality in AT personnel training globally.
Key Health Information Technologies and Related Issues for Iran: A Qualitative Study.
Hemmat, Morteza; Ayatollahi, Haleh; Maleki, Mohammadreza; Saghafi, Fatemeh
2018-01-01
Planning for the future of Health Information Technology (HIT) requires applying a systematic approach when conducting foresight studies. The aim of this study was to identify key health information technologies and related issues for Iran until 2025. This was a qualitative study and the participants included experts and policy makers in the field of health information technology. In-depth semi-structured interviews were conducted and data were analyzed by using framework analysis and MAXQDA software. The findings revealed that the development of national health information network, electronic health records, patient health records, a cloud-based service center, interoperability standards, patient monitoring technologies, telehealth, mhealth, clinical decision support systems, health information technology and mhealth infrastructure were found to be the key technologies for the future. These technologies could influence the economic, organizational and individual levels. To achieve them, the economic and organizational obstacles need to be overcome. In this study, a number of key technologies and related issues were identified. This approach can help to focus on the most important technologies in the future and to priorities these technologies for better resource allocation and policy making.
Key Health Information Technologies and Related Issues for Iran: A Qualitative Study
Hemmat, Morteza; Ayatollahi, Haleh; Maleki, Mohammadreza; Saghafi, Fatemeh
2018-01-01
Background and Objective: Planning for the future of Health Information Technology (HIT) requires applying a systematic approach when conducting foresight studies. The aim of this study was to identify key health information technologies and related issues for Iran until 2025. Methods: This was a qualitative study and the participants included experts and policy makers in the field of health information technology. In-depth semi-structured interviews were conducted and data were analyzed by using framework analysis and MAXQDA software. Results: The findings revealed that the development of national health information network, electronic health records, patient health records, a cloud-based service center, interoperability standards, patient monitoring technologies, telehealth, mhealth, clinical decision support systems, health information technology and mhealth infrastructure were found to be the key technologies for the future. These technologies could influence the economic, organizational and individual levels. To achieve them, the economic and organizational obstacles need to be overcome. Conclusion: In this study, a number of key technologies and related issues were identified. This approach can help to focus on the most important technologies in the future and to priorities these technologies for better resource allocation and policy making. PMID:29854016
Roy-Chaudhury, P; Lee, T; Duncan, H; El-Khatib, M
2009-01-01
Hemodialysis (HD) vascular access dysfunction is currently a huge clinical problem for which there are no effective therapies. There are, however, a number of promising technologies that are currently at the experimental or clinical trial stage. We believe that the application of these novel technologies in combination with better clinical protocols for vascular access care could significantly reduce the current problems associated with HD vascular access.
NASA Technical Reports Server (NTRS)
Wang, C.-W.; Stark, W.
2005-01-01
This article considers a quaternary direct-sequence code-division multiple-access (DS-CDMA) communication system with asymmetric quadrature phase-shift-keying (AQPSK) modulation for unequal error protection (UEP) capability. Both time synchronous and asynchronous cases are investigated. An expression for the probability distribution of the multiple-access interference is derived. The exact bit-error performance and the approximate performance using a Gaussian approximation and random signature sequences are evaluated by extending the techniques used for uniform quadrature phase-shift-keying (QPSK) and binary phase-shift-keying (BPSK) DS-CDMA systems. Finally, a general system model with unequal user power and the near-far problem is considered and analyzed. The results show that, for a system with UEP capability, the less protected data bits are more sensitive to the near-far effect that occurs in a multiple-access environment than are the more protected bits.
Evaluating Microcomputer Access Technology for Use by Visually Impaired Students.
ERIC Educational Resources Information Center
Ruconich, Sandra
1984-01-01
The article outlines advantages and limitations of five types of access to microcomputer technology for visually impaired students: electronic braille, paper braille, Optacon, synthetic speech, and enlarged print. Additional considerations in access decisions are noted. (CL)
Research on Key Technology and Applications for Internet of Things
NASA Astrophysics Data System (ADS)
Chen, Xian-Yi; Jin, Zhi-Gang
The Internet of Things (IOT) has been paid more and more attention by the academe, industry, and government all over the world. The concept of IOT and the architecture of IOT are discussed. The key technologies of IOT, including Radio Frequency Identification technology, Electronic Product Code technology, and ZigBee technology are analyzed. The framework of digital agriculture application based on IOT is proposed.
10 CFR 603.875 - Foreign access to technology and U.S. competitiveness provisions.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false Foreign access to technology and U.S. competitiveness provisions. 603.875 Section 603.875 Energy DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS TECHNOLOGY... Foreign access to technology and U.S. competitiveness provisions. (a) Consistent with the objective of...
10 CFR 603.875 - Foreign access to technology and U.S. competitiveness provisions.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Foreign access to technology and U.S. competitiveness provisions. 603.875 Section 603.875 Energy DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS TECHNOLOGY... Foreign access to technology and U.S. competitiveness provisions. (a) Consistent with the objective of...
10 CFR 603.875 - Foreign access to technology and U.S. competitiveness provisions.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false Foreign access to technology and U.S. competitiveness provisions. 603.875 Section 603.875 Energy DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS TECHNOLOGY... Foreign access to technology and U.S. competitiveness provisions. (a) Consistent with the objective of...
10 CFR 603.875 - Foreign access to technology and U.S. competitiveness provisions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Foreign access to technology and U.S. competitiveness provisions. 603.875 Section 603.875 Energy DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS TECHNOLOGY... Foreign access to technology and U.S. competitiveness provisions. (a) Consistent with the objective of...
ERIC Educational Resources Information Center
DO-IT, 2009
2009-01-01
A series of activities were undertaken to understand the underrepresentation of people with disabilities in science, technology, engineering, and mathematics (STEM) careers and increase their participation in these fields. "AccessSTEM" collaborated with key stakeholders to conduct a "Capacity-Building Institute"…
Research on the architecture and key technologies of SIG
NASA Astrophysics Data System (ADS)
Fu, Zhongliang; Meng, Qingxiang; Huang, Yan; Liu, Shufan
2007-06-01
Along with the development of computer network, Grid has become one of the hottest issues of researches on sharing and cooperation of Internet resources throughout the world. This paper illustrates a new architecture of SIG-a five-hierarchy architecture (including Data Collecting Layer, Grid Layer, Service Layer, Application Layer and Client Layer) of SIG from the traditional three hierarchies (only including resource layer, service layer and client layer). In the paper, the author proposes a new mixed network mode of Spatial Information Grid which integrates CAG (Certificate Authority of Grid) and P2P (Peer to Peer) in the Grid Layer, besides, the author discusses some key technologies of SIG and analysis the functions of these key technologies.
Powering up Technology from Passive Access to Active Integration
ERIC Educational Resources Information Center
Taylor, Shay
2015-01-01
For many educators, working with students who were deaf or hard of hearing was the need to have "access." Access to technology was the tool of choice for providing integration that has come to be so much more than gadgets. It is intercurricular--math software incorporates reading, science websites support language skills. It is…
Key technology issues for space robotic systems
NASA Technical Reports Server (NTRS)
Schappell, Roger T.
1987-01-01
Robotics has become a key technology consideration for the Space Station project to enable enhanced crew productivity and to maximize safety. There are many robotic functions currently being studied, including Space Station assembly, repair, and maintenance as well as satellite refurbishment, repair, and retrieval. Another area of concern is that of providing ground based experimenters with a natural interface that they might directly interact with their hardware onboard the Space Station or ancillary spacecraft. The state of the technology is such that the above functions are feasible; however, considerable development work is required for operation in this gravity-free vacuum environment. Furthermore, a program plan is evolving within NASA that will capitalize on recent government, university, and industrial robotics research and development (R and D) accomplishments. A brief summary is presented of the primary technology issues and physical examples are provided of the state of the technology for the initial operational capability (IOC) system as well as for the eventual final operational capability (FOC) Space Station.
SMART-1: key technologies and autonomy implementations
NASA Astrophysics Data System (ADS)
Elfving, A.; Stagnaro, L.; Winton, A.
2003-01-01
SMART-1 is the first of the Small Missions for Advanced Research in Technology of the ESA Horizons 2000 Science Plan. The main mission objective of SMART-1 is to demonstrate innovative and key technologies for scientific deep-space missions. One of the key technologies is the solar electric propulsion used as primary propulsion. The electric propulsion will be using 1400 W to transfer the 350 kg spacecraft from an Ariane 5 standard GTO to an elliptic Moon polar orbit, 10000×300 km. The total mission time is 24 months including a maximum of 18 months transfer time. The spacecraft development entered the detailed design and implementation phase in October 1999, under the responsibility of the Swedish Space Cooperation as prime contractor, and the flight acceptance is targeted for the 3rd quarter of 2002. The committed total life cost budget is 84 million Euro. Apart from the in-orbit demonstration of electric propulsion as primary propulsion, SMART-1 is implementing many other enabling technologies for deep-space missions such as deep-space transponder with communication in X-band for uplink and in X- and Ka-band for downlink, highly integrated and radiation tolerant microprocessors, FPGAs and memories, high on-board autonomy driven by ground communication only once per 4 days, maximum available power to electric propulsion by centralised and software-controlled power management, minimum propellant consumption through innovative angular momentum management. In addition, the spacecraft avionics design is tailored to the low-cost philosophy by enabling flexible integration of commercial off the shelf (COTS) equipment. The scientific instruments, five in total, support characterisation of the electric propulsion thrust environment during the long transfer phase and detailed imaging and spectroscopy of the lunar surface in visible, infrared and X-ray during the Moon orbiting phase. Several of the instruments implement new enabling technologies, e.g. swept charge devices
Impacts of extension access and cooperative membership on technology adoption and household welfare.
Wossen, Tesfamicheal; Abdoulaye, Tahirou; Alene, Arega; Haile, Mekbib G; Feleke, Shiferaw; Olanrewaju, Adetunji; Manyong, Victor
2017-08-01
This paper examines the impacts of access to extension services and cooperative membership on technology adoption, asset ownership and poverty using household-level data from rural Nigeria. Using different matching techniques and endogenous switching regression approach, we find that both extension access and cooperative membership have a positive and statistically significant effect on technology adoption and household welfare. Moreover, we find that both extension access and cooperative membership have heterogeneous impacts. In particular, we find evidence of a positive selection as the average treatment effects of extension access and cooperative membership are higher for farmers with the highest propensity to access extension and cooperative services. The impact of extension services on poverty reduction and of cooperatives on technology adoption is significantly stronger for smallholders with access to formal credit than for those without access. This implies that expanding rural financial markets can maximize the potential positive impacts of extension and cooperative services on farmers' productivity and welfare.
Semiquantum key distribution with secure delegated quantum computation
Li, Qin; Chan, Wai Hong; Zhang, Shengyu
2016-01-01
Semiquantum key distribution allows a quantum party to share a random key with a “classical” party who only can prepare and measure qubits in the computational basis or reorder some qubits when he has access to a quantum channel. In this work, we present a protocol where a secret key can be established between a quantum user and an almost classical user who only needs the quantum ability to access quantum channels, by securely delegating quantum computation to a quantum server. We show the proposed protocol is robust even when the delegated quantum server is a powerful adversary, and is experimentally feasible with current technology. As one party of our protocol is the most quantum-resource efficient, it can be more practical and significantly widen the applicability scope of quantum key distribution. PMID:26813384
ACCESSING FEDERAL DATA BASES FOR CONTAMINATED SITE CLEAN-UP TECHNOLOGIES
The Federal Remediation Technologies Roundtable (Roundtable) eveloped this publication to provide information on accessing Federal data bases that contain data on innovative remediation technologies. The Roundtable includes representatives from the Department of Defense (DoD), En...
Access to the Arts through Assistive Technology.
ERIC Educational Resources Information Center
Frame, Charles
Personnel in the rehabilitation field have come to recognize the possibilities and implications of computers as assistive technology for disabled persons. This manual provides information on how to adapt the Unicorn Board, Touch Talker/Light Talker overlays, the Adaptive Firmware Card setup disk, and Trace-Transparent Access Module (T-TAM) to…
Remote Access to Wireless Communications Systems Laboratory--New Technology Approach
ERIC Educational Resources Information Center
Kafadarova, Nadezhda; Sotirov, Sotir; Milev, Mihail
2012-01-01
Technology nowadays enables the remote access to laboratory equipment and instruments via Internet. This is especially useful in engineering education, where students can conduct laboratory experiment remotely. Such remote laboratory access can enable students to use expensive laboratory equipment, which is not usually available to students. In…
Mumford, Leslie; Lam, Rachel; Wright, Virginia; Chau, Tom
2014-08-01
This study applied response efficiency theory to create the Access Technology Delivery Protocol (ATDP), a child and family-centred collaborative approach to the implementation of access technologies. We conducted a descriptive, mixed methods case study to demonstrate the ATDP method with a 12-year-old boy with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with a custom smile-based access technology. At the 16 week mark, the new access technology offered better response quality; teacher satisfaction was high; average technology usage was 3-4 times per week for up to 1 h each time; switch sensitivity and specificity reached 78% and 64%, respectively, and participation scores increased by 38%. This case supports further development and testing of the ATDP with additional children with multiple or severe disabilities.
NASA Astrophysics Data System (ADS)
Yue, S. S.; Wen, Y. N.; Lv, G. N.; Hu, D.
2013-10-01
In recent years, the increasing development of cloud computing technologies laid critical foundation for efficiently solving complicated geographic issues. However, it is still difficult to realize the cooperative operation of massive heterogeneous geographical models. Traditional cloud architecture is apt to provide centralized solution to end users, while all the required resources are often offered by large enterprises or special agencies. Thus, it's a closed framework from the perspective of resource utilization. Solving comprehensive geographic issues requires integrating multifarious heterogeneous geographical models and data. In this case, an open computing platform is in need, with which the model owners can package and deploy their models into cloud conveniently, while model users can search, access and utilize those models with cloud facility. Based on this concept, the open cloud service strategies for the sharing of heterogeneous geographic analysis models is studied in this article. The key technology: unified cloud interface strategy, sharing platform based on cloud service, and computing platform based on cloud service are discussed in detail, and related experiments are conducted for further verification.
Broadband Optical Access Technologies to Converge towards a Broadband Society in Europe
NASA Astrophysics Data System (ADS)
Coudreuse, Jean-Pierre; Pautonnier, Sophie; Lavillonnière, Eric; Didierjean, Sylvain; Hilt, Benoît; Kida, Toshimichi; Oshima, Kazuyoshi
This paper provides insights on the status of broadband optical access market and technologies in Europe and on the expected trends for the next generation optical access networks. The final target for most operators, cities or any other player is of course FTTH (Fibre To The Home) deployment although we can expect intermediate steps with copper or wireless technologies. Among the two candidate architectures for FTTH, PON (Passive Optical Network) is by far the most attractive and cost effective solution. We also demonstrate that Ethernet based optical access network is very adequate to all-IP networks without any incidence on the level of quality of service. Finally, we provide feedback from a FTTH pilot network in Colmar (France) based on Gigabit Ethernet PON technology. The interest of this pilot lies on the level of functionality required for broadband optical access networks but also on the development of new home network configurations.
Key Findings and Recommendations for Technology Transfer at the ITS JPO
DOT National Transportation Integrated Search
2011-03-18
This report provides key findings and recommendations for technology transfer at the Intelligent Transportation Systems Joint Program Office (ITS JPO) based upon an assessment of best practices in technology transfer in other industries, such as nati...
NASA Astrophysics Data System (ADS)
Tsaur, Woei-Jiunn; Pai, Haw-Tyng
2008-11-01
The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.
The Language of Information Technology: Accessibility in the Information Society.
ERIC Educational Resources Information Center
Warmkessel, Marjorie M.
The language of information technology is discussed, with a focus on accessibility in the information society. The metaphors of information technology as an "information superhighway" or "infobahn" are analyzed; limitations of the "road system" and developments of Internet systems are considered. The concept of…
Accessibility assessment of assistive technology for the hearing impaired.
Áfio, Aline Cruz Esmeraldo; Carvalho, Aline Tomaz de; Caravalho, Luciana Vieira de; Silva, Andréa Soares Rocha da; Pagliuca, Lorita Marlena Freitag
2016-01-01
to assess the automatic accessibility of assistive technology in online courses for the hearing impaired. evaluation study guided by the Assessment and Maintenance step proposed in the Model of Development of Digital Educational Material. The software Assessor and Simulator for the Accessibility of Sites (ASES) was used to analyze the online course "Education on Sexual and Reproductive Health: the use of condoms" according to the accessibility standards of national and international websites. an error report generated by the program identified, in each didactic module, one error and two warnings related to two international principles and six warnings involved with six national recommendations. The warnings relevant to hearing-impaired people were corrected, and the course was considered accessible by automatic assessment. we concluded that the pages of the course were considered, by the software used, appropriate to the standards of web accessibility.
An effective and secure key-management scheme for hierarchical access control in E-medicine system.
Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit
2013-04-01
Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.
Singaporean Parents' Views of Their Young Children's Access and Use of Technological Devices
ERIC Educational Resources Information Center
Ebbeck, Marjory; Yim, Hoi Yin Bonnie; Chan, Yvonne; Goh, Mandy
2016-01-01
Debates continue about the access young children have to technological devices, given the increasingly accessible and available technology in most developed countries. Concerns have been expressed by parents/caregivers and researchers, and questions have been raised about possible risks and benefits of these devices on young children who, in some…
Access to Technology and Readiness to Use It in Learning
ERIC Educational Resources Information Center
Kabonoki, S. K.
2008-01-01
This case study involved 429 distance education diploma students at the University of Botswana. The aim of the study was to find out whether these students had access to MP3 players and other technologies essential in distance learning. Findings show that, contrary to expectations, learners did not have access to MP3 digital audio devices.…
Project SMART (Summer Migrants Access Resources through Technology).
ERIC Educational Resources Information Center
Texas Education Agency, Austin. Div. of Migrant Education.
The SMART (Summer Migrants Access Resources through Technology) project provides Texas migrant students with supplemental instruction using a multi-media, nontraditional approach. Migrant students who remain in Texas during the summer are taught in their homes or other sites via televised instruction with additional instructional support from…
ERIC Educational Resources Information Center
Sandiford, Gladwyn A.
2013-01-01
There is a lack of access to technology blended with face-to-face instruction and learning in Haiti. Despite this lack of access, some Haitian college students have nevertheless leveraged technology to overcome the obstacles of poverty and obtain a higher education. This phenomenological study explored the lived experiences of 20 adult…
Does technology help doctors to access, use and share knowledge?
Bullock, Alison
2014-01-01
Given the power and pervasiveness of technology, this paper considers whether it can help doctors to access, use and share knowledge and thus contribute to their ability to uphold the part of the Hippocratic Oath concerned with respecting 'the hard-won scientific gains of those physicians in whose steps I walk' and sharing 'such knowledge as is mine with those who are to follow'. How technology supports connections between doctors and knowledge is considered by focusing on the use of mobile technology in the workplace and Web 2.0 tools. Sfard's 'acquisition' and 'participation' models are employed to help develop an understanding of what these uses of technology mean for learning and knowledge sharing. The employment of technology is not neutral in its effects. Issues relate to knowledge ownership, information overload, quality control and interpretations attached to the use of mobile devices in the workplace. These issues raise deeper questions about the nature of knowledge and social theory and socio-material research questions about the effect of technology on workplace learning. Although the empirical and theoretical evidence presented shows how technology has clear potential to contribute both to accessing evidence and sharing knowledge, there is need for further research that applies theoretical frameworks to the analysis of the impact of technology on workplace learning. © 2013 John Wiley & Sons Ltd.
Accessible Electronic and Information Technology: Standards, Procedures, and Guidance
Defines electronic and information technology (EIT), and the technical and functional performance criteria for EIT to comply with Section 508 accessibility standards. Includes EPA procedures for EIT approval, 508 complaints, and undue burden justification.
Active magnetic radiation shielding system analysis and key technologies.
Washburn, S A; Blattnig, S R; Singleterry, R C; Westover, S C
2015-01-01
Many active magnetic shielding designs have been proposed in order to reduce the radiation exposure received by astronauts on long duration, deep space missions. While these designs are promising, they pose significant engineering challenges. This work presents a survey of the major systems required for such unconfined magnetic field design, allowing the identification of key technologies for future development. Basic mass calculations are developed for each system and are used to determine the resulting galactic cosmic radiation exposure for a generic solenoid design, using a range of magnetic field strength and thickness values, allowing some of the basic characteristics of such a design to be observed. This study focuses on a solenoid shaped, active magnetic shield design; however, many of the principles discussed are applicable regardless of the exact design configuration, particularly the key technologies cited. Copyright © 2015 The Committee on Space Research (COSPAR). All rights reserved.
NASA Technical Reports Server (NTRS)
Johnson, Charles W.
2011-01-01
The vision of the Unmanned Aircraft System (UAS) Integration in the National Airspace System (NAS) Project is "A global transportation system which allows routine access for all classes of UAS." The goal of the UAS Integration in the NAS Project is to "contribute capabilities that reduce technical barriers related to the safety and operational challenges associated with enabling routine UAS access to the NAS." This goal will be accomplished through a two-phased approach based on development of system-level integration of key concepts, technologies and/or procedures, and demonstrations of integrated capabilities in an operationally relevant environment. Phase 1 will take place the first two years of the Project and Phase 2 will take place the following three years. The Phase 1 and 2 technical objectives are: Phase 1: Developing a gap analysis between current state of the art and the Next Generation Air Transportation System (NextGen) UAS Concept of Operations . Validating the key technical areas identified by this Project . Conducting initial modeling, simulation, and flight testing activities . Completing Sub-project Phase 1 deliverables (spectrum requirements, comparative analysis of certification methodologies, etc.) and continue Phase 2 preparation (infrastructure, tools, etc.) Phase 2: Providing regulators with a methodology for developing airworthiness requirements for UAS, and data to support development of certifications standards and regulatory guidance . Providing systems-level, integrated testing of concepts and/or capabilities that address barriers to routine access to the NAS. Through simulation and flight testing, address issues including separation assurance, communications requirements, and human systems integration in operationally relevant environments. The UAS in the NAS Project will demonstrate solutions in specific technology areas, which will address operational/safety issues related to UAS access to the NAS. Since the resource allocation for
The ECAR Study of Undergraduate Students and Information Technology, 2010. Key Findings
ERIC Educational Resources Information Center
Smith, Shannon D.; Caruso, Judith Borreson
2010-01-01
This document presents the key findings from "The ECAR Study of Undergraduate Students and Information Technology, 2010". Since 2004, the annual ECAR (EDUCAUSE Center for Applied Research) study of undergraduate students and information technology has sought to shed light on how information technology affects the college experience. We…
Evolving provider payment models and patient access to innovative medical technology.
Long, Genia; Mortimer, Richard; Sanzenbacher, Geoffrey
2014-12-01
Abstract Objective: To investigate the evolving use and expected impact of pay-for-performance (P4P) and risk-based provider reimbursement on patient access to innovative medical technology. Structured interviews with leading private payers representing over 110 million commercially-insured lives exploring current and planned use of P4P provider payment models, evidence requirements for technology assessment and new technology coverage, and the evolving relationship between the two topics. Respondents reported rapid increases in the use of P4P and risk-sharing programs, with roughly half of commercial lives affected 3 years ago, just under two-thirds today, and an expected three-quarters in 3 years. All reported well-established systems for evaluating new technology coverage. Five of nine reported becoming more selective in the past 3 years in approving new technologies; four anticipated that in the next 3 years there will be a higher evidence requirement for new technology access. Similarly, four expected it will become more difficult for clinically appropriate but costly technologies to gain coverage. All reported planning to rely more on these types of provider payment incentives to control costs, but didn't see them as a substitute for payer technology reviews and coverage limitations; they each have a role to play. Interviews limited to nine leading payers with models in place; self-reported data. Likely implications include a more uncertain payment environment for providers, and indirectly for innovative medical technology and future investment, greater reliance on quality and financial metrics, and increased evidence requirements for favorable coverage and utilization decisions. Increasing provider financial risk may challenge the traditional technology adoption paradigm, where payers assumed a 'gatekeeping' role and providers a countervailing patient advocacy role with regard to access to new technology. Increased provider financial risk may result in an
Access and accounting schemes of wireless broadband
NASA Astrophysics Data System (ADS)
Zhang, Jian; Huang, Benxiong; Wang, Yan; Yu, Xing
2004-04-01
In this paper, two wireless broadband access and accounting schemes were introduced. There are some differences in the client and the access router module between them. In one scheme, Secure Shell (SSH) protocol is used in the access system. The SSH server makes the authentication based on private key cryptography. The advantage of this scheme is the security of the user's information, and we have sophisticated access control. In the other scheme, Secure Sockets Layer (SSL) protocol is used the access system. It uses the technology of public privacy key. Nowadays, web browser generally combines HTTP and SSL protocol and we use the SSL protocol to implement the encryption of the data between the clients and the access route. The schemes are same in the radius sever part. Remote Authentication Dial in User Service (RADIUS), as a security protocol in the form of Client/Sever, is becoming an authentication/accounting protocol for standard access to the Internet. It will be explained in a flow chart. In our scheme, the access router serves as the client to the radius server.
ERIC Educational Resources Information Center
Linder, Kathryn E.; Fontaine-Rainen, Danielle L.; Behling, Kirsten
2015-01-01
This article reports on a national study conducted in the United States on the current institutional practices, structures, resources and policies that are needed to ensure online accessibility for all students at colleges and universities. Key findings include the need to better articulate who is responsible for online accessibility initiatives…
An Assessment of Pathology Resident Access to and Use of Technology: A Nationwide Survey.
Vallangeon, Bethany D; Hawley, Jeffrey S; Sloane, Richard; Bean, Sarah M
2017-03-01
- Current technologies including digital slide scanners and handheld devices can revolutionize clinical practice and pathology graduate medical education (GME). The extent to which these technologies are used in pathology GME is unknown. - To determine the types of technologies used, usage amount, and how they are integrated into pathology residency/fellowship programs nationwide. - A 40-question online survey for residents/fellows was developed and administered via the Research Electronic Data Capture System after institutional review board approval. - Fifty-two program directors (37%) gave permission for participation. One-hundred seventy-one responses were received (18% response rate). Most respondents have access to personal technology (laptop = 78% [134 of 171]), smartphone = 81% [139 of 171], tablet = 49% [84 of 171]), and Web-based digital slide collections (82%, 141 of 171). Few residents are provided electronic devices by their programs (laptop = 22% [38 of 171], smartphone = 0.5% [1 of 171], and tablet = 12% [21 of 171]). Fifty-nine percent have access to digital slide scanners, 33% have access to a program-created database of digitized slides, and 52% use telepathology. Fifteen percent have access to asynchronous learning. Of those with access to video-recorded conferences, 89% review them. Program size was significantly positively correlated with resident access to program-provided laptops (P = .02) and tablets (P < .001), digital slide scanners (P = .01), and telepathology (P = .001). Of all devices, program-provided laptops are used most for professional work (60.5% use this device for more than 5 hours per day). - Most residents report access to multiple types of innovative technology, but incorporation of these tools within pathology training programs is highly variable. Opportunities for incorporating innovative technologies exist and could be further explored.
DOT National Transportation Integrated Search
2016-01-01
The Accessible Transportation Technologies Research Initiative (ATTRI) improves the mobility of travelers with disabilities through research, development, and implementation of transformative technologies, applications, or systems for people of all a...
The Influence of Information Technology Access on Agricultural Research in Nigeria.
ERIC Educational Resources Information Center
Jimba, Samuel Wodi; Atinmo, Morayo Ibironke
2000-01-01
Examines the relationship between accessibility to information technology and research publications among users of agricultural libraries in Nigeria. Discusses results of a questionnaire that investigated the use of electronic information resources and considers the effects of information technology and globalization on the economies of developing…
ERIC Educational Resources Information Center
O'Reilly, Erin N.
2016-01-01
As access to information and communication technology grows, educators have increasing opportunities to experiment with and to adapt both hardware and software to their current practice. Technology's integration, however, can vary widely between teachers within the same program for numerous reasons. Understanding the challenges practitioners face…
Using Technology to Improve Access to Mental Health Services.
Cortelyou-Ward, Kendall; Rotarius, Timothy; Honrado, Jed C
Mental ill-health is a public health threat that is prevalent throughout the United States. Tens of millions of Americans have been diagnosed along the continuum of mental ill-health, and many more millions of family members and friends are indirectly affected by the pervasiveness of mental ill-health. Issues such as access and the societal stigma related to mental health issues serve as deterrents to patients receiving their necessary care. However, technological advances have shown the potential to increase access to mental health services for many patients.
Adaptive Technology for the Internet: Making Electronic Resources Accessible to All.
ERIC Educational Resources Information Center
Mates, Barbara T.
This book seeks to guide information providers in establishing accessible World Wide Web sites and acquiring the hardware and software needed by people with disabilities, focusing on access to the Internet using large print, voice, and Braille. The book also covers how to acquire the funds for adaptive technology, what type of equipment to choose,…
[Access to Assisted Reproductive Technologies, surrogacy, same sex couple parenting].
Belaisch Allart, J
2012-08-01
In France, access to Assisted Reproductive Technologies (ART) is strictly controlled. ART is only authorized for medical infertility. The revision of the law of bioethics has not modified access to ART. It is still forbidden to take charge of lesbian couples or gay-male couples, surrogacy is prohibited. The only change is that unmarried couples have no more to prove they live together since 2 years. Copyright © 2012 Elsevier Masson SAS. All rights reserved.
Survey of key technologies on millimeter-wave CMOS integrated circuits
NASA Astrophysics Data System (ADS)
Yu, Fei; Gao, Lei; Li, Lixiang; Cai, Shuo; Wang, Wei; Wang, Chunhua
2018-05-01
In order to provide guidance for the development of high performance millimeter-wave complementary metal oxide semiconductor (MMW-CMOS) integrated circuits (IC), this paper provides a survey of key technologies on MMW-CMOS IC. Technical background of MMW wireless communications is described. Then the recent development of the critical technologies of the MMW-CMOS IC are introduced in detail and compared. A summarization is given, and the development prospects on MMW-CMOS IC are also discussed.
Improving Information Access through Technology: A Plan for Louisiana's Public Libraries.
ERIC Educational Resources Information Center
Jaques, Thomas F.
Strengthening technology in Louisiana's public libraries will support equitable and convenient access to electronic information resources for all citizens at library sites, in homes, and in business. The plan presented in this document is intended to enhance and expand technology in the state's public libraries. After discussion of the crucial…
ERIC Educational Resources Information Center
Clyde, Albert
"Key technologies" is an umbrella term for appropriate technologies applied to give maximum economic benefit in particular circumstances that may cross traditional disciplinary boundaries. Development of the concept is necessitated by the rate of change of technological development. Key technologies may be classified in three groups related to…
Healthcare Information Technology (HIT) in an Anti-Access (A2) and Area Denial (AD) Environment
2014-03-01
OFFICE OF THE COMMAND SURGEON, AIR COMBAT COMMAND FELLOWSHIP PAPER HEALTHCARE INFORMATION TECHNOLOGY (HIT) IN AN ANTI-ACCESS (A2) AND AREA...expeditionary responses. A light and lean medical response that utilizes emerging technology , specifically HIT, enhances the AFMS’ readiness posture and...expeditionary medical capability. The new USAF reality in an A2/AD environment is impeded access, very little if any technological dominance
Variation in use of technology among vascular access specialists: an analysis of the PICC1 survey.
Chopra, Vineet; Kuhn, Latoya; Ratz, David; Winter, Suzanne; Carr, Peter J; Paje, David; Krein, Sarah L
2017-05-15
While the use of technologies such as ultrasound and electrocardiographic (ECG) guidance systems to place peripherally inserted central catheters (PICCs) has grown, little is known about the clinicians who use these tools or their work settings. Using data from a national survey of vascular access specialists, we identified technology users as PICC inserters that: (a) use ultrasound to find a suitable vein for catheter placement; (b) measure catheter-to-vein ratio; and (c) use ECG for PICC placement. Individual and organizational-level characteristics between technology users versus non-users were assessed. Bivariable comparisons were made using Chi-squared or Fisher's exact tests; two-sided alpha with p<0.05 was considered statistically significant. Of the 2762 PICC inserters who accessed the survey, 1518 (55%) provided information regarding technology use. Technology users reported greater experience than non-technology users, with a higher percentage stating they had placed >1000 PICCs (55% vs. 45%, p<0.001). A significantly greater percentage of technology users also reported being certified in vascular access by an external agency than non-technology users (75% vs. 63%, p<0.001). Technology users were more often part of vascular access teams with ≥10 members compared to non-technology users (35% vs. 22%, p<0.001). Some practices also varied between the two groups: for example, use of certain securement devices and dressings differed between technology users and non-users (p<0.001). Technology use by vascular access clinicians while placing PICCs is associated with clinician characteristics, work setting and practice factors. Understanding whether such differences influence clinical care or patient outcomes appears necessary.
Enabling Dedicated, Affordable Space Access Through Aggressive Technology Maturation
NASA Technical Reports Server (NTRS)
Jones, Jonathan E.; Kibbey, Timothy P.; Cobb, C. Brent; Harris, Lawanna L.
2014-01-01
A launch vehicle at the scale and price point which allows developers to take reasonable risks with high payoff propulsion and avionics hardware solutions does not exist today. Establishing this service provides a ride through the proverbial technology "valley of death" that lies between demonstration in laboratory and flight environments. NASA's NanoLaunch effort will provide the framework to mature both earth-to-orbit and on-orbit propulsion and avionics technologies while also providing affordable, dedicated access to low earth orbit for cubesat class payloads.
Accessing NASA Technology with the World Wide Web
NASA Technical Reports Server (NTRS)
Nelson, Michael L.; Bianco, David J.
1995-01-01
NASA Langley Research Center (LaRC) began using the World Wide Web (WWW) in the summer of 1993, becoming the first NASA installation to provide a Center-wide home page. This coincided with a reorganization of LaRC to provide a more concentrated focus on technology transfer to both aerospace and non-aerospace industry. Use of WWW and NCSA Mosaic not only provides automated information dissemination, but also allows for the implementation, evolution and integration of many technology transfer and technology awareness applications. This paper describes several of these innovative applications, including the on-line presentation of the entire Technology OPportunities Showcase (TOPS), an industrial partnering showcase that exists on the Web long after the actual 3-day event ended. The NASA Technical Report Server (NTRS) provides uniform access to many logically similar, yet physically distributed NASA report servers. WWW is also the foundation of the Langley Software Server (LSS), an experimental software distribution system which will distribute LaRC-developed software. In addition to the more formal technology distribution projects, WWW has been successful in connecting people with technologies and people with other people.
Implementing recovery: an analysis of the key technologies in Scotland
2011-01-01
Background Over the past ten years the promotion of recovery has become a stated aim of mental health policies within a number of English speaking countries, including Scotland. Implementation of a recovery approach involves a significant reorientation of mental health services and practices, which often poses significant challenges for reformers. This article examines how four key technologies of recovery have assisted in the move towards the creation of a recovery-oriented mental health system in Scotland. Methods Drawing on documentary analysis and a series of interviews we examine the construction and implementation of four key recovery 'technologies' as they have been put to use in Scotland: recovery narratives, the Scottish Recovery Indicator (SRI), Wellness Recovery Action Planning (WRAP) and peer support. Results Our findings illuminate how each of these technologies works to instantiate, exemplify and disseminate a 'recovery orientation' at different sites within the mental health system in order to bring about a 'recovery oriented' mental health system. They also enable us to identify some of the factors that facilitate or hinder the effectiveness of those technologies in bringing about a change in how mental health services are delivered in Scotland. These finding provide a basis for some general reflections on the utility of 'recovery technologies' to implement a shift towards recovery in mental health services in Scotland and elsewhere. Conclusions Our analysis of this process within the Scottish context will be valuable for policy makers and service coordinators wishing to implement recovery values within their own national mental health systems. PMID:21569633
Flight demonstrator concept for key technologies enabling future reusable launch vehicles
NASA Astrophysics Data System (ADS)
Ishimoto, Shinji; Fujii, Kenji; Mori, Takeshi
2005-07-01
A research center in JAXA has recently started research on reusable launch vehicles according to its plan placing emphasis on advanced launch technology. It is planned to demonstrate key technologies using a rocket-powered winged vehicle, and concept studies on the flight demonstrator have been conducted. This paper describes the present research plan and introduces the most compact vehicle concept among some versions under consideration.
Radiation immune RAM semiconductor technology for the 80's. [Random Access Memory
NASA Technical Reports Server (NTRS)
Hanna, W. A.; Panagos, P.
1983-01-01
This paper presents current and short term future characteristics of RAM semiconductor technologies which were obtained by literature survey and discussions with cognizant Government and industry personnel. In particular, total ionizing dose tolerance and high energy particle susceptibility of the technologies are addressed. Technologies judged compatible with spacecraft applications are ranked to determine the best current and future technology for fast access (less than 60 ns), radiation tolerant RAM.
Maximizing Access Technology Tools for the Library of the Future
ERIC Educational Resources Information Center
Pearson, Waynn
2003-01-01
The renovated Cerritos Public Library is a unique blending of traditional and hightech features. One of the key principles in its planning and design was to enable a range of convenient access services. This article summarizes the process of building this library and how it has been received by users. (Contains 5 figures.)
Newer Technologies for School Security. ERIC Digest Number 145.
ERIC Educational Resources Information Center
Schneider, Tod
This digest describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that allows for…
The ethics of attaching research conditions to access to new health technologies.
Holland, Stephen; Hope, Tony
2012-06-01
Decisions on which new health technologies to provide are controversial because of the scarcity of healthcare resources, the competing demands of payers, providers and patients and the uncertainty of the evidence base. Given this, additional information about new health technologies is often considered valuable. One response is to make access to a new health technology conditional on further research. Access can be restricted to patients who participate in a research study, such as a randomised controlled trial; alternatively, a new treatment can be made generally available, but only on condition that further evidence is collected (eg, on long-term outcomes and adverse events, in patient registries). The National Institute for Health and Clinical Excellence (NICE), which provides guidance on which new health technologies to make available under the UK's NHS, for example, has made some research conditional recommendations, and the current interest in such options suggests that they are likely to become more prevalent in the future. This paper identifies and discusses the main ethical issues created by this distinctive range of recommendations. We argue that decisions to put research conditions on access to new technologies are compatible with widely accepted values, principles and practices relevant to resource allocation. However, there are important features of these distinctive judgements that must be taken into account by resource allocation decision-making bodies and research ethics committees, and that require new sorts of empirical data.
NASA Astrophysics Data System (ADS)
Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin
2017-10-01
Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.
Digital security technology simplified.
Scaglione, Bernard J
2007-01-01
Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.
Research on key technology of space laser communication network
NASA Astrophysics Data System (ADS)
Chang, Chengwu; Huang, Huiming; Liu, Hongyang; Gao, Shenghua; Cheng, Liyu
2016-10-01
Since the 21st century, Spatial laser communication has made a breakthrough development. Europe, the United States, Japan and other space powers have carried out the test of spatial laser communication technology on-orbit, and put forward a series of plans. In 2011, China made the first technology demonstration of satellite-ground laser communication carried by HY-2 satellite. Nowadays, in order to improve the transmission rate of spatial network, the topic of spatial laser communication network is becoming a research hotspot at home and abroad. This thesis, from the basic problem of spatial laser communication network to solve, analyzes the main difference between spatial network and ground network, which draws forth the key technology of spatial laser communication backbone network, and systematically introduces our research on aggregation, addressing, architecture of spatial network. From the perspective of technology development status and trends, the thesis proposes the development route of spatial laser communication network in stages. So as to provide reference about the development of spatial laser communication network in China.
Claxton, Karl; Palmer, Stephen; Longworth, Louise; Bojke, Laura; Griffin, Susan; Soares, Marta; Spackman, Eldon; Rothery, Claire
The value of evidence about the performance of a technology and the value of access to a technology are central to policy decisions regarding coverage with, without, or only in research and managed entry (or risk-sharing) agreements. We aim to outline the key principles of what assessments are needed to inform "only in research" (OIR) or "approval with research" (AWR) recommendations, in addition to approval or rejection. We developed a comprehensive algorithm to inform the sequence of assessments and judgments that lead to different types of guidance: OIR, AWR, Approve, or Reject. This algorithm identifies the order in which assessments might be made, how similar guidance might be arrived at through different combinations of considerations, and when guidance might change. The key principles are whether the technology is expected to be cost-effective; whether the technology has significant irrecoverable costs; whether additional research is needed; whether research is possible with approval and whether there are opportunity costs that once committed by approval cannot be recovered; and whether there are effective price reductions. Determining expected cost-effectiveness is only a first step. In addition to AWR for technologies expected to be cost-effective and OIR for those not expected to be cost-effective, there are other important circumstances when OIR should be considered. These principles demonstrate that cost-effectiveness is a necessary but not sufficient condition for approval. Even when research is possible with approval, OIR may be appropriate when a technology is expected to be cost-effective due to significant irrecoverable costs. Copyright © 2016 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.
High-Performance Secure Database Access Technologies for HEP Grids
DOE Office of Scientific and Technical Information (OSTI.GOV)
Matthew Vranicar; John Weicher
2006-04-17
The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysismore » capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where
Developing Guidelines for Evaluating the Adaptation of Accessible Web-Based Learning Materials
ERIC Educational Resources Information Center
Radovan, Marko; Perdih, Mojca
2016-01-01
E-learning is a rapidly developing form of education. One of the key characteristics of e-learning is flexibility, which enables easier access to knowledge for everyone. Information and communications technology (ICT), which is e-learning's main component, enables alternative means of accessing the web-based learning materials that comprise the…
Code of Federal Regulations, 2013 CFR
2013-10-01
... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive Information...
Code of Federal Regulations, 2010 CFR
2010-10-01
... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive Information...
Code of Federal Regulations, 2014 CFR
2014-10-01
... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive Information...
Code of Federal Regulations, 2011 CFR
2011-10-01
... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive Information...
Code of Federal Regulations, 2012 CFR
2012-10-01
... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive Information...
ERIC Educational Resources Information Center
Burke, Paul F.; Schuck, Sandy; Aubusson, Peter; Kearney, Matthew; Frischknecht, Bart
2018-01-01
This research examines how the pedagogical orientations of teachers affect technology adoption in the classroom. At the same time, the authors account for the stage of concern that teachers are experiencing regarding the use of the technology, their access to the technology and the level of schooling at which they teach.The authors' investigation…
Multiple access techniques and spectrum utilization of the GLOBALSTAR mobile satellite system
NASA Astrophysics Data System (ADS)
Louie, Ming; Cohen, Michel; Rouffet, Denis; Gilhousen, Klein S.
The GLOBALSTAR System is a Low Earth Orbit (LEO) satellite-based mobile communications system that is interoperable with the current and future Public Land Mobile Network (PLMN). The GLOBALSTAR System concept is based upon technological advancement in two key areas: (1) the advancement in LEO satellite technology; (2) the advancement in cellular telephone technology, including the commercial applications of Code Division Multiple Access (CDMA) technologies, and of the most recent progress in Time Division Multiple Access technologies. The GLOBALSTAR System uses elements of CDMA, Frequency Division Multiple Access (FDMA), and Time Division Multiple Access (TDMA) technology, combining with satellite Multiple Beam Antenna (MBA) technology, to arrive at one of the most efficient modulation and multiple access system ever proposed for a satellite communications system. The technology used in GLOBALSTAR exploits the following techniques in obtaining high spectral efficiency and affordable cost per channel, with minimum coordination among different systems: power control, in open and closed loops, voice activation, spot beam satellite antenna for frequency reuse, weighted satellite antenna gain, multiple satellite coverage, and handoff between satellites. The GLOBALSTAR system design will use the following frequency bands: 1610-1626.5 MHz for up-link and 2483.5-2500 MHz for down-link.
Grommon, Eric
2018-02-01
Cell phones in correctional facilities have emerged as one of the most pervasive forms of modern contraband. This issue has been identified as a top priority for many correctional administrators in the United States. Managed access, a technology that utilizes cellular signals to capture transmissions from contraband phones, has received notable attention as a promising tool to combat this problem. However, this technology has received little evaluative attention. The present study offers a foundational process evaluation and draws upon output measures and stakeholder interviews to identify salient operational challenges and subsequent lessons learned about implementing and maintaining a managed access system. Findings suggest that while managed access captures large volumes of contraband cellular transmissions, the technology requires significant implementation planning, personnel support, and complex partnerships with commercial cellular carriers. Lessons learned provide guidance for practitioners to navigate these challenges and for scholars to improve future evaluations of managed access. Copyright © 2017 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Zheng, Jun; Ansari, Nirwan
2005-02-01
Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or
Key Technologies of Phone Storage Forensics Based on ARM Architecture
NASA Astrophysics Data System (ADS)
Zhang, Jianghan; Che, Shengbing
2018-03-01
Smart phones are mainly running Android, IOS and Windows Phone three mobile platform operating systems. The android smart phone has the best market shares and its processor chips are almost ARM software architecture. The chips memory address mapping mechanism of ARM software architecture is different with x86 software architecture. To forensics to android mart phone, we need to understand three key technologies: memory data acquisition, the conversion mechanism from virtual address to the physical address, and find the system’s key data. This article presents a viable solution which does not rely on the operating system API for a complete solution to these three issues.
47 CFR 64.619 - VRS Access Technology Reference Platform and administrator.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Access Technology Reference Platform shall be a software product that performs consistently with the...) Compensation. The TRS Fund, as defined by § 64.604(a)(5)(iii) of this subpart, may be used to compensate the...
47 CFR 64.619 - VRS Access Technology Reference Platform and administrator.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Access Technology Reference Platform shall be a software product that performs consistently with the...) Compensation. The TRS Fund, as defined by § 64.604(a)(5)(iii) of this subpart, may be used to compensate the...
IMPACT OF HEALTH TECHNOLOGY ASSESSMENT IN LITIGATION CONCERNING ACCESS TO HIGH-COST DRUGS.
Aleman, Alicia; Perez Galan, Ana
2017-01-01
The impact of health technology assessment (HTA) in the judicialization of the right of health has not been deeply studied in Latin American countries. The purpose of this study is to review the process of judicialization of the access to high cost drugs in Uruguay and assess the impact HTAs have had on this process. The methodology used for this study included a comprehensive literature search in electronic databases, local journals, internal documents developed in the Ministry of Health, as well as conducting interviews with key informants. Judicialization of the access of high cost drugs has been increasing since 2010. The strategy of the Ministry of Health of Uruguay to decrease this problem included the organization of roundtables with judges and other stakeholders on the basis of HTA, the training of defense lawyers in the use and interpretation of HTA, and the participation of a professional who develops HTA in the preparation of the defense arguments. A year after the implementation of this strategy, 25 percent of writs of protection were won by the Ministry of Health. Even though the strategy implemented was effective in reducing the loss of litigations, it was not effective in reducing the growing number of writs of protection. It is essential to address this problem in a broad debate and to promote understanding between the parties.
ERIC Educational Resources Information Center
Emerson, Judith; Bishop, John
2012-01-01
Introduction: Seeing the Possibilities with Videophone Technology began as research project funded by the National Center for Technology Innovation. The project implemented a face-to-face social networking program for students with deaf-blindness to investigate the potential for increasing access and communication using videophone technology.…
ERIC Educational Resources Information Center
Stock, S. E.; Davies, D. K.; Wehmeyer, M. L.; Palmer, S. B.
2008-01-01
Background: There are over two billion telephones in use worldwide. Yet, for millions of Americans with intellectual disabilities (ID), access to the benefits of cellphone technology is limited because of deficits in literacy, numerical comprehension, the proliferation of features and shrinking size of cellphone hardware and user interfaces.…
NASA Astrophysics Data System (ADS)
Paladini, D.; Mello, A. B.
2016-07-01
Inmetro's data about the conformity of certificated products, process and services are, usually, displayed at fragmented databases of difficult access for several reasons, for instance, the lack of computational solutions which allow this kind of access to its users. A discussion about some of the technological solutions to support supervisory activities by the appropriate regulatory bodies and also to provide information access to society in general is herein presented, along with a theoretical explanation of the pros and cons of such technologies to the conclusion that a mobile platform seems to be the best tool for the requirements of Inmetro.
A brief review on key technologies in the battery management system of electric vehicles
NASA Astrophysics Data System (ADS)
Liu, Kailong; Li, Kang; Peng, Qiao; Zhang, Cheng
2018-04-01
Batteries have been widely applied in many high-power applications, such as electric vehicles (EVs) and hybrid electric vehicles, where a suitable battery management system (BMS) is vital in ensuring safe and reliable operation of batteries. This paper aims to give a brief review on several key technologies of BMS, including battery modelling, state estimation and battery charging. First, popular battery types used in EVs are surveyed, followed by the introduction of key technologies used in BMS. Various battery models, including the electric model, thermal model and coupled electro-thermal model are reviewed. Then, battery state estimations for the state of charge, state of health and internal temperature are comprehensively surveyed. Finally, several key and traditional battery charging approaches with associated optimization methods are discussed.
What Is the Impact of Full Access to Technology on the Achievement of the Hispanic Student?
ERIC Educational Resources Information Center
Carr, John E., Jr.
2013-01-01
The problem studied in this research was whether the impact of full access to technology both at home and in school would affect the achievement of Hispanic students. The purpose of this study was to examine the relationship between the access to technology and the achievement of the Hispanic students at a suburban middle school. What are the…
Developing hybrid near-space technologies for affordable access to suborbital space
NASA Astrophysics Data System (ADS)
Badders, Brian David
High power rockets and high altitude balloons are two near-space technologies that could be combined in order to provide access to the mesosphere and, eventually, suborbital space. This "rockoon" technology has been used by several large budget space programs before being abandoned in favor of even more expensive, albeit more accurate, ground launch systems. With the increased development of nano-satellites and atmospheric sensors, combined with rising interest in global atmospheric data, there is an increase in desire for affordable access to extreme altitudes that does not necessarily require the precision of ground launches. Development of hybrid near-space technologies for access to over 200k ft. on a small budget brings many challenges within engineering, systems integration, cost analysis, market analysis, and business planning. This research includes the design and simulation testing of all the systems needed for a safe and reusable launch system, the cost analysis for initial production, the development of a business plan, and the development of a marketing plan. This project has both engineering and scientific significance in that it can prove the space readiness of new technologies, raise their technology readiness levels (TRLs), expedite the development process, and also provide new data to the scientific community. It also has the ability to stimulate university involvement in the aerospace industry and help to inspire the next generation of workers in the space sector. Previous development of high altitude balloon/high power rocket hybrid systems have been undertaken by government funded military programs or large aerospace corporations with varying degrees of success. However, there has yet to be a successful flight with this type of system which provides access to the upper mesosphere in a university setting. This project will aim to design and analyze a viable system while testing the engineering process under challenging budgetary constraints. The
Weiler, Gabriele; Schröder, Christina; Schera, Fatima; Dobkowicz, Matthias; Kiefer, Stephan; Heidtke, Karsten R; Hänold, Stefanie; Nwankwo, Iheanyi; Forgó, Nikolaus; Stanulla, Martin; Eckert, Cornelia; Graf, Norbert
2014-01-01
Biobanks represent key resources for clinico-genomic research and are needed to pave the way to personalised medicine. To achieve this goal, it is crucial that scientists can securely access and share high-quality biomaterial and related data. Therefore, there is a growing interest in integrating biobanks into larger biomedical information and communication technology (ICT) infrastructures. The European project p-medicine is currently building an innovative ICT infrastructure to meet this need. This platform provides tools and services for conducting research and clinical trials in personalised medicine. In this paper, we describe one of its main components, the biobank access framework p-BioSPRE (p-medicine Biospecimen Search and Project Request Engine). This generic framework enables and simplifies access to existing biobanks, but also to offer own biomaterial collections to research communities, and to manage biobank specimens and related clinical data over the ObTiMA Trial Biomaterial Manager. p-BioSPRE takes into consideration all relevant ethical and legal standards, e.g., safeguarding donors’ personal rights and enabling biobanks to keep control over the donated material and related data. The framework thus enables secure sharing of biomaterial within open and closed research communities, while flexibly integrating related clinical and omics data. Although the development of the framework is mainly driven by user scenarios from the cancer domain, in this case, acute lymphoblastic leukaemia and Wilms tumour, it can be extended to further disease entities. PMID:24567758
Mobile access to the Internet: from personal bubble to satellites
NASA Astrophysics Data System (ADS)
Gerla, Mario
2001-10-01
Mobile, wireless access and networking has emerged in the last few years as one of the most important directions of Internet growth. The popularity of mobile, and, more generally, nomadic Internet access is due to many enabling factors including: (a) emergence of meaningful applications tailored to the individual on the move; (b) small form factor and long battery life; (c) efficient middleware designed to support mobility; and, (d) efficient wireless networking technologies. A key player in the mobile Internet access is the nomad, i.e. the individual equipped with various computing and I/O gadgets (cellular phone, earphones, GPS navigator, palm pilot, beeper, portable scanner, digital camera, etc.). These devices form his/her Personal Area Network or PAN or personal bubble. The connectivity within the bubble is wireless (using for example a low cost, low power wireless LAN such as Bluetooth). The bubble can expand and contract dynamically depending on needs. It may temporarily include sensors and actuators as the nomad walks into a new environment. In this paper, we identify the need for the interconnection of the PAN with other wireless networks in order to achieve costeffective mobile access to the Internet. We will overview some key networking technologies required to support the PAN (eg, Bluetooth). We will also discuss an emerging technology, Ad Hoc wireless networking which is the natural complement of the PAN in sparsely populated areas. Finally, we will identify the need for intelligent routers to assist the mobile user in the selection of the best Internet access strategy.
Folan, Alyce; Barclay, Linda; Cooper, Cathy; Robinson, Merren
2015-01-01
Assistive technology for computer access can be used to facilitate people with a spinal cord injury to utilize mainstream computer applications, thereby enabling participation in a variety of meaningful occupations. The aim of this study was to gain an understanding of the experiences of clients with tetraplegia trialing assistive technologies for computer access during different stages in a public rehabilitation service. In order to explore the experiences of clients with tetraplegia trialing assistive technologies for computer use, qualitative methodology was selected. Data were collected from seven participants using semi-structured interviews, which were audio-taped, transcribed and analyzed thematically. Three main themes were identified. These were: getting back into life, assisting in adjusting to injury and learning new skills. The findings from this study demonstrated that people with tetraplegia can be assisted to return to previous life roles or engage in new roles, through developing skills in the use of assistive technology for computer access. Being able to use computers for meaningful activities contributed to the participants gaining an enhanced sense of self-efficacy, and thereby quality of life. Implications for Rehabilitation Findings from this pilot study indicate that people with tetraplegia can be assisted to return to previous life roles, and develop new roles that have meaning to them through the use of assistive technologies for computer use. Being able to use the internet to socialize, and complete daily tasks, contributed to the participants gaining a sense of control over their lives. Early introduction to assistive technology is important to ensure sufficient time for newly injured people to feel comfortable enough with the assistive technology to use the computers productively by the time of discharge. Further research into this important and expanding area is indicated.
Easy access to a cyclic key intermediate for the synthesis of trisporic acids and related compounds.
González-Delgado, José A; Escobar, Gustavo; Arteaga, Jesús F; Barrero, Alejandro F
2014-02-03
The synthesis of a cyclohexane skeleton possessing different oxygenated functional groups at C-3, C-8 and C-9, and a D1,6-double bond has been accomplished in 10 steps with an overall 17% yield. This compound is a key intermediate for access to a wide range of compounds of the bioactive trisporoid family. The synthetic sequence consists of the preparation of a properly functionalized epoxygeraniol derivative, and its subsequent stereoselective cyclization mediated by Ti(III). This last step implies a domino process that starts with a homolytic epoxide opening followed by a radical cyclization and regioselective elimination. This concerted process gives access to the cyclohexane moiety with stereochemical control of five of its six carbon atoms.
Soomro, Kamal Ahmed; Kale, Ugur; Curtis, Reagan; Akcaoglu, Mete; Bernstein, Malayna
2018-01-01
The phenomenon of "digital divide" is complex and multidimensional, extending beyond issues of physical access. The purpose of this study was to develop a scale to measure a range of factors related to digital divide among higher education faculty and to evaluate its reliability and validity. Faculty's Information and Communication Technology Access (FICTA) scale was tested and validated with 322 faculty teaching in public and private sector universities. Principal components analysis with varimax rotation confirmed an 8-factor solution corresponding to various dimensions of ICT access. The 57-item FICTA scale demonstrated good psychometric properties and offers researchers a tool to examine faculty's access to ICT at four levels - motivational, physical, skills, and usage access.
Accelerating global access to plant diversity information.
Lughadha, Eimear Nic; Miller, Chuck
2009-11-01
Botanic gardens play key roles in the development and dissemination of plant information resources. Drivers for change have included progress in information technology, growing public expectations of electronic access and international conservation policy. Great advances have been made in the quantity, quality and accessibility of plant information in digital form and the extent to which information from multiple providers can be accessed through a single portal. However, significant challenges remain to be addressed in making botanic gardens resources maximally accessible and impactful, not least the overwhelming volume of material which still awaits digitisation. The year 2010 represents an opportunity for botanic gardens to showcase their collaborative achievements in delivery of electronic plant information and reinforce their relevance to pressing environmental issues.
Testing new technology to restrict wildlife access to highways : phase 1.
DOT National Transportation Integrated Search
2016-06-01
Wildlife mitigation systems are as good as the weakest link. Often this is the wildlife exclusion barriers at vehicle access points in wildlife exclusion fencing (8 feet, 2.4 m high). The objective of this research was to find new technology solution...
Enhancing Ear and Hearing Health Access for Children With Technology and Connectivity.
Swanepoel, De Wet
2017-10-12
Technology and connectivity advances are demonstrating increasing potential to improve access of service delivery to persons with hearing loss. This article demonstrates use cases from community-based hearing screening and automated diagnosis of ear disease. This brief report reviews recent evidence for school- and home-based hearing testing in underserved communities using smartphone technologies paired with calibrated headphones. Another area of potential impact facilitated by technology and connectivity is the use of feature extraction algorithms to facilitate automated diagnosis of most common ear conditions from video-otoscopic images. Smartphone hearing screening using calibrated headphones demonstrated equivalent sensitivity and specificity for school-based hearing screening. Automating test sequences with a forced-choice response paradigm allowed persons with minimal training to offer screening in underserved communities. The automated image analysis and diagnosis system for ear disease demonstrated an overall accuracy of 80.6%, which is up to par and exceeds accuracy rates previously reported for general practitioners and pediatricians. The emergence of these tools that capitalize on technology and connectivity advances enables affordable and accessible models of service delivery for community-based ear and hearing care.
ERIC Educational Resources Information Center
Talley, Gregory Keith
2012-01-01
This study investigates the relationship between access, use of technology and student achievement in public middle schools in Maryland. The objective of this study was to determine whether a digital divide (differences in access and utilization of technology based on student characteristics of race, socioeconomic status, and gender) exists among…
Green survivability in Fiber-Wireless (FiWi) broadband access network
NASA Astrophysics Data System (ADS)
Liu, Yejun; Guo, Lei; Gong, Bo; Ma, Rui; Gong, Xiaoxue; Zhang, Lincong; Yang, Jiangzi
2012-03-01
Fiber-Wireless (FiWi) broadband access network is a promising "last mile" access technology, because it integrates wireless and optical access technologies in terms of their respective merits, such as high capacity and stable transmission from optical access technology, and easy deployment and flexibility from wireless access technology. Since FiWi is expected to carry a large amount of traffic, numerous traffic flows may be interrupted by the failure of network components. Thus, survivability in FiWi is a key issue aiming at reliable and robust service. However, the redundant deployment of backup resource required for survivability usually causes huge energy consumption, which aggravates the global warming and accelerates the incoming of energy crisis. Thus, the energy-saving issue should be considered when it comes to survivability design. In this paper, we focus on the green survivability in FiWi, which is an innovative concept and remains untouched in the previous works to our best knowledge. We first review and discuss some challenging issues about survivability and energy-saving in FiWi, and then we propose some instructive solutions for its green survivability design. Therefore, our work in this paper will provide the technical references and research motivations for the energy-efficient and survivable FiWi development in the future.
Addressing Energy Poverty through Smarter Technology
ERIC Educational Resources Information Center
Oldfield, Eddie
2011-01-01
Energy poverty is a key detriment to labor productivity, economic growth, and social well-being. This article presents a qualitative review of literature on the potential role of intelligent communication technology, web-based standards, and smart grid technology to alleviate energy costs and improve access to clean distributed energy in developed…
Medical technology as a key driver of rising health expenditure: disentangling the relationship
Sorenson, Corinna; Drummond, Michael; Bhuiyan Khan, Beena
2013-01-01
Health care spending has risen steadily in most countries, becoming a concern for decision-makers worldwide. Commentators often point to new medical technology as the key driver for burgeoning expenditures. This paper critically appraises this conjecture, based on an analysis of the existing literature, with the aim of offering a more detailed and considered analysis of this relationship. Several databases were searched to identify relevant literature. Various categories of studies (eg, multivariate and cost-effectiveness analyses) were included to cover different perspectives, methodological approaches, and issues regarding the link between medical technology and costs. Selected articles were reviewed and relevant information was extracted into a standardized template and analyzed for key cross-cutting themes, ie, impact of technology on costs, factors influencing this relationship, and methodological challenges in measuring such linkages. A total of 86 studies were reviewed. The analysis suggests that the relationship between medical technology and spending is complex and often conflicting. Findings were frequently contingent on varying factors, such as the availability of other interventions, patient population, and the methodological approach employed. Moreover, the impact of technology on costs differed across technologies, in that some (eg, cancer drugs, invasive medical devices) had significant financial implications, while others were cost-neutral or cost-saving. In light of these issues, we argue that decision-makers and other commentators should extend their focus beyond costs solely to include consideration of whether medical technology results in better value in health care and broader socioeconomic benefits. PMID:23807855
King, Elizabeth J; Maksymenko, Kateryna M; Almodovar-Diaz, Yadira; Johnson, Sarah
2016-01-01
The HIV epidemic continues to grow in Tajikistan, especially among people who inject drugs, sex workers, men who have sex with men and incarcerated populations. Despite their susceptibility to HIV, members of these groups do not always have access to HIV prevention, testing and treatment. The purpose of this study was to identify and understand the gender constraints in accessing HIV services for key populations in Tajikistan. Using focus-group discussions and key-informant interviews the assessment team collected information from members of key populations and those who work with them. Several themes emerged from the data, including: low levels of HIV knowledge, gender constraints to condom use and safer drug use, gender constraints limit HIV testing opportunities, gender-based violence, stigma and discrimination, and the lack of female spaces in the HIV response. The results of this study show that there are well-defined gender norms in Tajikistan, and these gender norms influence key populations' access to HIV services. Addressing these gender constraints may offer opportunities for more equitable access to HIV services in Tajikistan.
Pomerantz, Andrew; Cole, Brady H; Watts, Bradley V; Weeks, William B
2008-01-01
To provide an example of implementation of a new program that enhances access to mental health care in primary care. A general and specialized mental health service was redesigned to introduce open access to comprehensive mental health care in a primary care clinic. Key variables measured before and after implementation of the clinic included numbers of completed referrals, waiting time for appointments and clinic productivity. Workload and pre/post-implementation waiting time data were gathered through a computerized electronic monitoring system. Waiting time for new appointments was shortened from a mean of 33 days to 19 min. Clinician productivity and evaluations of new referrals more than doubled. These improvements have been sustained for 4 years. Moving mental health services into primary care, initiating open access and increasing use of technological aids led to dramatic improvements in access to mental health care and efficient use of resources. Implementation and sustainability of the program were enhanced by using a quality improvement approach.
McCarty, Elizabeth; Morress, Claire
2009-08-01
Children with a diagnosis of cerebral palsy often have significant physical limitations that prevent exploration and full participation in the environment. Assistive technology systems can provide opportunities for children with physical limitations to interact with their world, enabling play, communication, and daily living skills. Efficient access to and control of the technology is critical for successful use; however, establishing consistent access is often difficult because of the nature of the movement patterns exhibited by children with cerebral palsy. This article describes a 3-phase model of evaluation and intervention developed and used by Assistive Technology Services at the Aaron W. Perlman Center, Cincinnati Children's Hospital Medical Center, to establish successful access to technology systems in children with cerebral palsy.
Improving collaboration between Primary Care Research Networks using Access Grid technology.
Nagykaldi, Zsolt; Fox, Chester; Gallo, Steve; Stone, Joseph; Fontaine, Patricia; Peterson, Kevin; Arvanitis, Theodoros
2008-01-01
Access Grid (AG) is an Internet2-driven, high performance audio-visual conferencing technology used worldwide by academic and government organisations to enhance communication, human interaction and group collaboration. AG technology is particularly promising for improving academic multi-centre research collaborations. This manuscript describes how the AG technology was utilised by the electronic Primary Care Research Network (ePCRN) that is part of the National Institutes of Health (NIH) Roadmap initiative to improve primary care research and collaboration among practice-based research networks (PBRNs) in the USA. It discusses the design, installation and use of AG implementations, potential future applications, barriers to adoption, and suggested solutions.
Application and the key technology on high power fiber-optic laser in laser weapon
NASA Astrophysics Data System (ADS)
Qu, Zhou; Li, Qiushi; Meng, Haihong; Sui, Xin; Zhang, Hongtao; Zhai, Xuhua
2014-12-01
The soft-killing laser weapon plays an important role in photoelectric defense technology. It can be used for photoelectric detection, search, blinding of photoelectric sensor and other devices on fire control and guidance devices, therefore it draws more and more attentions by many scholars. High power fiber-optic laser has many virtues such as small volume, simple structure, nimble handling, high efficiency, qualified light beam, easy thermal management, leading to blinding. Consequently, it may be used as the key device of soft-killing laser weapon. The present study introduced the development of high power fiber-optic laser and its main features. Meanwhile the key technology of large mode area (LMA) optical fiber design, the beam combination technology, double-clad fiber technology and pumping optical coupling technology was stated. The present study is aimed to design high doping LMA fiber, ensure single mode output by increasing core diameter and decrease NA. By means of reducing the spontaneous emission particle absorbed by fiber core and Increasing the power density in the optical fiber, the threshold power of nonlinear effect can increase, and the power of single fiber will be improved. Meantime, high power will be obtained by the beam combination technology. Application prospect of high power fiber laser in photoelectric defense technology was also set forth. Lastly, the present study explored the advantages of high power fiber laser in photoelectric defense technology.
ERIC Educational Resources Information Center
Dwyer, David C.; And Others
Beginning in 1985, Apple Computer, Inc., and several school districts began a collaboration to examine the impact of computer saturation on instruction and learning in K-12 classrooms. The initial guiding question was simply put: What happens when teachers and students have constant access to technology? To provide "constant access,"…
A Method for Selection of Appropriate Assistive Technology for Computer Access
ERIC Educational Resources Information Center
Jenko, Mojca
2010-01-01
Assistive technologies (ATs) for computer access enable people with disabilities to be included in the information society. Current methods for assessment and selection of the most appropriate AT for each individual are nonstandardized, lengthy, subjective, and require substantial clinical experience of a multidisciplinary team. This manuscript…
Schooley, Benjamin L; Horan, Thomas A; Lee, Pamela W; West, Priscilla A
2010-01-01
This multimethod pilot study examined patient and practitioner perspectives on the influence of spatial barriers to healthcare access and the role of health information technology in overcoming these barriers. The study included a survey administered to patients attending a Department of Veterans Affairs (VA) health visit, and a focus group with VA care providers. Descriptive results and focus group findings are presented. Spatial distance is a significant factor for many rural veterans when seeking healthcare. For this sample of rural veterans, a range of telephone, computer, and Internet technologies may become more important for accessing care as Internet access becomes more ubiquitous and as younger veterans begin using the VA health system. The focus group highlighted the negative impact of distance, economic considerations, geographic barriers, and specific medical conditions on access to care. Lack of adequate technology infrastructure was seen as an obstacle to utilization. This study discusses the need to consider distance, travel modes, age, and information technology infrastructure and adoption when designing health information technology to care for rural patients. PMID:20697468
DOT National Transportation Integrated Search
2016-05-01
The Accessible Transportation Technologies Research Initiative (ATTRI) is a joint U.S. Department of Transportation (U.S. DOT) initiative that is co-led by the Federal Highway Administration (FHWA) and the Federal Transit Administration (FTA). ATTRI ...
Key findings on legal and regulatory barriers to HIV testing and access to care across Europe.
Power, L; Hows, J; Jakobsen, S F
2018-02-01
The aim of this work within OptTEST by HiE has been to demonstrate the role of legal and regulatory barriers in hindering access to HIV testing, treatment and care across Europe and to produce tools to help dismantle them. An online survey to assess country-specific data on legal and regulatory barriers distributed widely across the WHO Europe region. Literature reviews conducted in January-October 2015 in English, in November 2015 in Russian, and updated in April 2017. Semi-structured interviews were conducted with 25 key actors within the HIV field to feed into case studies and tip sheets on how to dismantle legal and regulatory barriers. More than 160 individuals and organisations from 49 countries across the WHO European region provided responses which were analysed and cross checked with other data sources and a searchable database produced (legalbarriers.peoplewithhiveurope.org). The conducted literature reviews yielded 88 papers and reports which identify legal and regulatory barriers to key populations' access to HV testing and care. Based on the interviews with key actors, ranging from PLHIV activists to government officials, on lessons-learned, a series of tip sheets and ten case studies were written-up intended to inform and inspire the HIV community to address and overcome existing barriers (opttest.eu/Tools). While some of the barriers identified may require major changes to wider health systems, or long term legal reform, many are open to a simple change in regulations or custom and practice. We have the tools. Why can't we finish the job? © 2018 British HIV Association.
A fingerprint key binding algorithm based on vector quantization and error correction
NASA Astrophysics Data System (ADS)
Li, Liang; Wang, Qian; Lv, Ke; He, Ning
2012-04-01
In recent years, researches on seamless combination cryptosystem with biometric technologies, e.g. fingerprint recognition, are conducted by many researchers. In this paper, we propose a binding algorithm of fingerprint template and cryptographic key to protect and access the key by fingerprint verification. In order to avoid the intrinsic fuzziness of variant fingerprints, vector quantization and error correction technique are introduced to transform fingerprint template and then bind with key, after a process of fingerprint registration and extracting global ridge pattern of fingerprint. The key itself is secure because only hash value is stored and it is released only when fingerprint verification succeeds. Experimental results demonstrate the effectiveness of our ideas.
Newman-Casey, Paula Anne; Killeen, Olivia J; Renner, Morgan; Robin, Alan L; Lee, Paul; Heisler, Michele
2018-04-23
As online health information becomes common, it is important to assess patients' access to and experiences with online resources. We examined whether glaucoma patients' technology usage differs by medication adherence and whether adherence is associated with online education experiences. We included 164 adults with glaucoma taking ≥1 glaucoma medication. Participants completed a survey including demographic and health information, the Morisky Adherence Scale, and questions about online glaucoma resource usage. Differences in technology access, adherence, and age were compared with chi-squared, Fisher exact, and two-sample t-tests. Mean age was 66 years. Twenty-six percent reported poor adherence. Eighty percent had good technology access. Seventy-three percent of subjects with greater technology access wanted online glaucoma information and yet only 14% of patients had been directed to online resources by physicians. There was no relationship between technological connectivity and adherence (p = 0.51). Nonadherent patients were younger (mean age 58 years vs. 66 years for adherent patients, p = 0.002). Nonadherence was associated with negative feelings about online searches (68% vs. 42%, p = 0.06). Younger, poorly adherent patients navigate online glaucoma resources without physician input. These online searches are often unsatisfying. Technology should be leveraged to create high quality, online glaucoma resources that physicians can recommend to provide guidance for disease self-management.
NASA Technical Reports Server (NTRS)
Wallett, Thomas M.
2009-01-01
This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.
Literacy disparities in patient access and health-related use of Internet and mobile technologies.
Bailey, Stacy C; O'Conor, Rachel; Bojarski, Elizabeth A; Mullen, Rebecca; Patzer, Rachel E; Vicencio, Daniel; Jacobson, Kara L; Parker, Ruth M; Wolf, Michael S
2015-12-01
Age and race-related disparities in technology use have been well documented, but less is known about how health literacy influences technology access and use. To assess the association between patients' literacy skills and mobile phone ownership, use of text messaging, Internet access, and use of the Internet for health-related purposes. A secondary analysis utilizing data from 1077 primary care patients enrolled in two, multisite studies from 2011-2013. Patients were administered an in-person, structured interview. Patients with adequate health literacy were more likely to own a mobile phone or smartphone in comparison with patients having marginal or low literacy (mobile phone ownership: 96.8 vs. 95.2 vs. 90.1%, respectively, P < 0.001; smartphone ownership: 70.6 vs. 62.5 vs. 40.1%, P < 0.001) and to report text messaging (78.6 vs. 75.2 vs. 53.1%, P < 0.001). They were also more likely to have access to the Internet from their home (92.1 vs. 74.7 vs. 44.9%, P < 0.001) and to report using the Internet for email (93.0 vs. 75.7 vs. 38.5%, P < 0.001), browsing the web (93.9 vs. 80.2 vs. 44.5%, P < 0.001), accessing health information (86.3 vs. 75.5 vs. 40.8%, P < 0.001), and communicating with providers (54.2 vs. 29.8 vs. 13.0%, P < 0.001). Relationships remained significant in multivariable analyses controlling for relevant covariates. Results reveal that literacy-related disparities in technology access and use are widespread, with lower literate patients being less likely to own smartphones or to access and use the Internet, particularly for health reasons. Future interventions should consider these disparities and ensure that health promotion activities do not further exacerbate disparities. © 2014 John Wiley & Sons Ltd.
Quantin, Catherine; Coatrieux, Gouenou; Allaert, François André; Fassa, Maniane; Bourquard, Karima; Boire, Jean-Yves; de Vlieger, Paul; Maigne, Lydia; Breton, Vincent
2009-01-01
The main problem for health professionals and patients in accessing information is that this information is very often distributed over many medical records and locations. This problem is particularly acute in cancerology because patients may be treated for many years and undergo a variety of examinations. Recent advances in technology make it feasible to gain access to medical records anywhere and anytime, allowing the physician or the patient to gather information from an “ephemeral electronic patient record”. However, this easy access to data is accompanied by the requirement for improved security (confidentiality, traceability, integrity, ...) and this issue needs to be addressed. In this paper we propose and discuss a decentralised approach based on recent advances in information sharing and protection: Grid technologies and watermarking methodologies. The potential impact of these technologies for oncology is illustrated by the examples of two experimental cases: a cancer surveillance network and a radiotherapy treatment plan. It is expected that the proposed approach will constitute the basis of a future secure “google-like” access to medical records. PMID:19718446
Open access for ALICE analysis based on virtualization technology
NASA Astrophysics Data System (ADS)
Buncic, P.; Gheata, M.; Schutz, Y.
2015-12-01
Open access is one of the important leverages for long-term data preservation for a HEP experiment. To guarantee the usability of data analysis tools beyond the experiment lifetime it is crucial that third party users from the scientific community have access to the data and associated software. The ALICE Collaboration has developed a layer of lightweight components built on top of virtualization technology to hide the complexity and details of the experiment-specific software. Users can perform basic analysis tasks within CernVM, a lightweight generic virtual machine, paired with an ALICE specific contextualization. Once the virtual machine is launched, a graphical user interface is automatically started without any additional configuration. This interface allows downloading the base ALICE analysis software and running a set of ALICE analysis modules. Currently the available tools include fully documented tutorials for ALICE analysis, such as the measurement of strange particle production or the nuclear modification factor in Pb-Pb collisions. The interface can be easily extended to include an arbitrary number of additional analysis modules. We present the current status of the tools used by ALICE through the CERN open access portal, and the plans for future extensions of this system.
Open Access, Retention and Throughput at the Central University of Technology
ERIC Educational Resources Information Center
de Beer, K. J.
2006-01-01
The most debatable question in higher education today is: Why first "open access" to promote massafication and now "capping" to restrict learner intake? (cf. SA Media Information 2004). Concerning the managing of this difficult and extremely sensitive issue, the Central University of Technology, Free State (CUT) has come a long…
New Technology and Digital Worlds: Analyzing Evidence of Equity in Access, Use, and Outcomes
ERIC Educational Resources Information Center
Warschauer, Mark; Matuchniak, Tina
2010-01-01
In this chapter, the authors take a broad perspective on how to analyze issues of technology and equity for youth in the United States. They begin with "access" as a starting point, but consider not only whether diverse groups of youth have digital media available to them but also how that access is supported or constrained by…
The Key Technologies. Some Implications for Education and Training. An Occasional Paper.
ERIC Educational Resources Information Center
Mansell, Jack; And Others
National competitiveness depends in large part on the practical application of technologies. Educational planners must, therefore, identify key (newly emerging) topics in science and engineering that are likely to have a major evolutionary effect on industry and incorporate these areas into existing vocational and technical curricula. Because…
NASA Astrophysics Data System (ADS)
Zheng, Jun; Ansari, Nirwan
2005-03-01
Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or
NSSDC provides network access to key data via NDADS
NASA Technical Reports Server (NTRS)
Behnke, Jeanne; King, Joseph
1994-01-01
The National Space Science Data Center (NSSDC) is making a growing fraction of its most customer-desirable data electronically accessible via both the local and wide area networks. NSSDC is witnessing a great increase in its data dissemination owing to this network accessibility. To provide its customers the best data accessibility, the NSSDC makes data available from a nearline, mass storage system, the NSSDC Data Archive and Dissemination Service (NDADS). The NDADS, the initial version was made available in January 1992, is a customized system of hardware and software that provides users access to the nearline data via ANONYMOUS FTP, an e-mail interface (ARMS), and a C-based software library. In January 1992, the NDADS registered 416 requests for 1,957 files. By December of 1994, NDADS had been populated with 800 gigabytes of electronically accessible data and had registered 1458 requests for 20,887 files. In this report we describe the NDADS system, both hardware and software. Later in the report, we discuss some of the lessons that were learned as a result of operating NDADS, particularly in the area of ingest and dissemination.
Safety management of Ethernet broadband access based on VLAN aggregation
NASA Astrophysics Data System (ADS)
Wang, Li
2004-04-01
With broadband access network development, the Ethernet technology is more and more applied access network now. It is different from the private network -LAN. The differences lie in four points: customer management, safety management, service management and count-fee management. This paper mainly discusses the safety management related questions. Safety management means that the access network must secure the customer data safety, isolate the broad message which brings the customer private information, such as ARP, DHCP, and protect key equipment from attack. Virtue LAN (VLAN) technology can restrict network broadcast flow. We can config each customer port with a VLAN, so each customer is isolated with others. The IP address bound with VLAN ID can be routed rightly. But this technology brings another question: IP address shortage. VLAN aggregation technology can solve this problem well. Such a mechanism provides several advantages over traditional IPv4 addressing architectures employed in large switched LANs today. With VLAN aggregation technology, we introduce the notion of sub-VLANs and super-VLANs, a much more optimal approach to IP addressing can be realized. This paper will expatiate the VLAN aggregation model and its implementation in Ethernet access network. It is obvious that the customers in different sub-VLANs can not communication to each other because the ARP packet is isolated. Proxy ARP can enable the communication among them. This paper will also expatiate the proxy ARP model and its implementation in Ethernet access network.
ERIC Educational Resources Information Center
Schneider, Tod
This digest in Spanish describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that…
The research and application of Ethernet over RPR technology
NASA Astrophysics Data System (ADS)
Feng, Xiancheng; Yun, Xiang
2008-11-01
With service competitions of carriers aggravating and client's higher service experience requirement, it urges the MAN technology develops forward. When the Core Layer and Distribution Layer technology are mature, all kinds of reliability technologies of MAN access Layer are proposed. EoRPR is one of reliability technologies for MAN access network service protection. This paper elaborates Ethernet over RPR technology's many advantages through analyzing basic principle, address learning and key technologies of Ethernet over RPR. EpRPR has quicker replacing speed, plug and play, stronger QoS ability, convenient service deployment, band fairly sharing, and so on. At the same time the paper proposed solution of Ethernet over RPR in MAN, NGN network and enterprise Private network. So, among many technologies of MAN access network, EoRPR technology has higher reliability and manageable and highly effectiveness and lower costive of Ethernet. It is not only suitable for enterprise interconnection, BTV and NGN access services and so on, but also can meet the requirement of carriers' reducing CAPEX and OPEX's and increase the rate of investment.
Access to digital technology among families coming to urban pediatric primary care clinics.
Demartini, Tori L; Beck, Andrew F; Klein, Melissa D; Kahn, Robert S
2013-07-01
Digital technologies offer new platforms for health promotion and disease management. Few studies have evaluated the use of digital technology among families receiving care in an urban pediatric primary care setting. A self-administered survey was given to a convenience sample of caregivers bringing their children to 2 urban pediatric primary care centers in spring 2012. The survey assessed access to home Internet, e-mail, smartphone, and social media (Facebook and Twitter). A "digital technology" scale (0-4) quantified the number of available digital technologies and connections. Frequency of daily use and interest in receiving medical information digitally were also assessed. The survey was completed by 257 caregivers. The sample was drawn from a clinical population that was 73% African American and 92% Medicaid insured with a median patient age of 2.9 years (interquartile range 0.8-7.4). Eighty percent of respondents reported having Internet at home, and 71% had a smartphone. Ninety-one percent reported using e-mail, 78% Facebook, and 27% Twitter. Ninety-seven percent scored ≥1 on the digital technology scale; 49% had a digital technology score of 4. The digital technology score was associated with daily use of digital media in a graded fashion (P < .0001). More than 70% of respondents reported that they would use health care information supplied digitally if approved by their child's medical provider. Caregivers in an urban pediatric primary care setting have access to and frequently use digital technologies. Digital connections may help reach a traditionally hard-to-reach population.
Access to assisted reproductive technologies in France: the emergence of the patients' voice.
Fournier, Véronique; Berthiau, Denis; d'Haussy, Julie; Bataille, Philippe
2013-02-01
Is there any ethical justification for limiting the reproductive autonomy and not make assisted reproductive technologies available to certain prospective parents? We present and discuss the results of an interdisciplinary clinical ethics study concerning access to assisted reproductive technologies (ART) in situations which are considered as ethically problematic in France (overage or sick parents, surrogate motherhood). The study focused on the arguments that people in these situations put forward when requesting access to ART. It shows that requester's arguments are based on sound ethical values, and that their legitimacy is at least as strong as that of those used by doctors to question access to ART. Results reveal that the three implicit normative arguments that founded the law in 1994, which are still in force after the bioethics law revision in July 2011-the welfare of the child, the illegitimacy of a "right to a child," and the defense of the so called "social order"-are challenged on several grounds by requesters as reasons for limiting their reproductive autonomy. Although these results are limited to exceptional situations, they are of special interest insofar as they give voice to the requesters' own ethical concerns in the ongoing political debate over access to ART.
Analysis of key technologies for virtual instruments metrology
NASA Astrophysics Data System (ADS)
Liu, Guixiong; Xu, Qingui; Gao, Furong; Guan, Qiuju; Fang, Qiang
2008-12-01
Virtual instruments (VIs) require metrological verification when applied as measuring instruments. Owing to the software-centered architecture, metrological evaluation of VIs includes two aspects: measurement functions and software characteristics. Complexity of software imposes difficulties on metrological testing of VIs. Key approaches and technologies for metrology evaluation of virtual instruments are investigated and analyzed in this paper. The principal issue is evaluation of measurement uncertainty. The nature and regularity of measurement uncertainty caused by software and algorithms can be evaluated by modeling, simulation, analysis, testing and statistics with support of powerful computing capability of PC. Another concern is evaluation of software features like correctness, reliability, stability, security and real-time of VIs. Technologies from software engineering, software testing and computer security domain can be used for these purposes. For example, a variety of black-box testing, white-box testing and modeling approaches can be used to evaluate the reliability of modules, components, applications and the whole VI software. The security of a VI can be assessed by methods like vulnerability scanning and penetration analysis. In order to facilitate metrology institutions to perform metrological verification of VIs efficiently, an automatic metrological tool for the above validation is essential. Based on technologies of numerical simulation, software testing and system benchmarking, a framework for the automatic tool is proposed in this paper. Investigation on implementation of existing automatic tools that perform calculation of measurement uncertainty, software testing and security assessment demonstrates the feasibility of the automatic framework advanced.
ERIC Educational Resources Information Center
Kellogg, Wendy A.; Mathur, Anjali
2003-01-01
Studies suggest that urban residents in low-income and minority communities are subject to an unequal amount of environmental pollution and inequitable enforcement practices. Projects such as Sustainable Cleveland show that key components of implementing policies are access to Internet-based information and participation community-based…
Zimlichman, Eyal; Rozenblum, Ronen; Salzberg, Claudia A; Jang, Yeona; Tamblyn, Melissa; Tamblyn, Robyn; Bates, David W
2012-01-01
To summarize the Canadian health information technology (HIT) policy experience and impart lessons learned to the US as it determines its policy in this area. Qualitative analysis of interviews with identified key stakeholders followed by an electronic survey. We conducted semi-structured interviews with 29 key Canadian HIT policy and opinion leaders and used a grounded theory approach to analyze the results. The informant sample was chosen to provide views from different stakeholder groups including national representatives and regional representatives from three Canadian provinces. Canadian informants believed that much of the current US direction is positive, especially regarding incentives and meaningful use, but that there are key opportunities for the US to emphasize direct engagement with providers, define a clear business case for them, sponsor large scale evaluations to assess HIT impact in a broad array of settings, determine standards but also enable access to resources needed for mid-course corrections of standards when issues are identified, and, finally, leverage implementation of digital imaging systems. Not all stakeholder groups were included, such as providers or patients. In addition, as in all qualitative research, a selection bias could be present due to the relatively small sample size. Based on Canadian experience with HIT policy, stakeholders identified as lessons for the US the need to increase direct engagement with providers and the importance of defining the business case for HIT, which can be achieved through large scale evaluations, and of recognizing and leveraging successes as they emerge.
Koch, Marcus A
2015-01-01
To take inventory of the current state of affairs of Market Access Launch Excellence in the life sciences industry. To identify key gaps and challenges for Market Access (MA) and discuss how they can be addressed. To generate a baseline for benchmarking MA launch excellence. An online survey was conducted with pharmaceutical executives primarily working in MA, marketing, or general management. The survey aimed to evaluate MA excellence prerequisites across the product life cycle (rated by importance and level of implementation) and to describe MA activity models in the respective companies. Composite scores were calculated from respondents' ratings and answers. Implementation levels of MA excellence prerequisites generally lagged behind their perceived importance. Item importance and the respective level of implementation correlated well, which can be interpreted as proof of the validity of the questionnaire. The following areas were shown to be particularly underimplemented: 1) early integration of MA and health economic considerations in research and development decision making, 2) developing true partnerships with payers, including the development of services 'beyond the pill', and 3) consideration of human resource and talent management. The concept of importance-adjusted implementation levels as a hybrid parameter was introduced and shown to be a viable tool for benchmarking purposes. More than 70% of respondents indicated that their companies will invest broadly in MA in terms of capital and headcount within the next 3 years. MA (launch) excellence needs to be further developed in order to close implementation gaps across the entire product life cycle. As MA is a comparatively young pharmaceutical discipline in a complex and dynamic environment, this effort will require strategic focus and dedication. The Market Access Launch Excellence Inventory benchmarking tool may help guide decision makers to prioritize their endeavors.
Disruptive technological advances in vascular access for dialysis: an overview.
Yeo, Wee-Song; Ng, Qin Xiang
2017-11-29
End-stage kidney disease (ESKD), one of the most prevalent diseases in the world and with increasing incidence, is associated with significant morbidity and mortality. Current available modes of renal replacement therapy (RRT) include dialysis and renal transplantation. Though renal transplantation is the preferred and ideal mode of RRT, this modality may not be available to all patients with ESKD. Moreover, renal transplant recipients are constantly at risk of complications associated with immunosuppression and immunosuppressant use, and posttransplant lymphoproliferative disorder. Dialysis may be the only available modality in certain patients. However, dialysis has its limitations, which include issues associated with lack of vascular access, risks of infections and vascular thrombosis, decreased quality of life, and absence of biosynthetic functions of the kidney. In particular, the creation and maintenance of hemodialysis vascular access in children poses a unique set of challenges to the pediatric nephrologist owing to the smaller vessel diameters and vascular hyperreactivity compared with adult patients. Vascular access issues continue to be one of the major limiting factors prohibiting the delivery of adequate dialysis in ESKD patients and is the Achilles' heel of hemodialysis. This review aims to provide a critical overview of disruptive technological advances and innovations for vascular access. Novel strategies in preventing neointimal hyperplasia, novel bioengineered products, grafts and devices for vascular access will be discussed. The potential impact of these solutions on improving the morbidity encountered by dialysis patients will also be examined.
NASA Astrophysics Data System (ADS)
Zheng, Jun; Ansari, Nirwan
2005-06-01
Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or
NASA Astrophysics Data System (ADS)
Zheng, Jun; Ansari, Nirwan; Jersey Inst Ansari, New; Jersey Inst, New
2005-04-01
Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or
NASA Astrophysics Data System (ADS)
Zheng, Jun; Ansari, Nirwan
2005-05-01
Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or
Accessibility, Textbooks, and Access Services
ERIC Educational Resources Information Center
Kahler, Janice E.
2017-01-01
Putting access in Access Services is the goal. The Course Reserves unit is the place. Textbooks are the focus. Electronic technologies are the future. Patron-centric services will be our standard. Access to textbooks by all patrons will be the achievement. Course Reserves located in Library West at the University of Florida George A. Smathers…
Fast access to the CMS detector condition data employing HTML5 technologies
NASA Astrophysics Data System (ADS)
Pierro, Giuseppe Antonio; Cavallari, Francesca; Di Guida, Salvatore; Innocente, Vincenzo
2011-12-01
This paper focuses on using HTML version 5 (HTML5) for accessing condition data for the CMS experiment, evaluating the benefits and risks posed by the use of this technology. According to the authors of HTML5, this technology attempts to solve issues found in previous iterations of HTML and addresses the needs of web applications, an area previously not adequately covered by HTML. We demonstrate that employing HTML5 brings important benefits in terms of access performance to the CMS condition data. The combined use of web storage and web sockets allows increasing the performance and reducing the costs in term of computation power, memory usage and network bandwidth for client and server. Above all, the web workers allow creating different scripts that can be executed using multi-thread mode, exploiting multi-core microprocessors. Web workers have been employed in order to substantially decrease the web page rendering time to display the condition data stored in the CMS condition database.
Automated secured cost effective key refreshing technique to enhance WiMAX privacy key management
NASA Astrophysics Data System (ADS)
Sridevi, B.; Sivaranjani, S.; Rajaram, S.
2013-01-01
In all walks of life the way of communication is transformed by the rapid growth of wireless communication and its pervasive use. A wireless network which is fixed and richer in bandwidth is specified as IEEE 802.16, promoted and launched by an industrial forum is termed as Worldwide Interoperability for Microwave Access (WiMAX). This technology enables seamless delivery of wireless broadband service for fixed and/or mobile users. The obscurity is the long delay which occurs during the handoff management in every network. Mobile WiMAX employs an authenticated key management protocol as a part of handoff management in which the Base Station (BS) controls the distribution of keying material to the Mobile Station (MS). The protocol employed is Privacy Key Management Version 2- Extensible Authentication Protocol (PKMV2-EAP) which is responsible for the normal and periodical authorization of MSs, reauthorization as well as key refreshing. Authorization key (AK) and Traffic Encryption key (TEK) plays a vital role in key exchange. When the lifetime of key expires, MS has to request for a new key to BS which in turn leads to repetition of authorization, authentication as well as key exchange. To avoid service interruption during reauthorization , two active keys are transmitted at the same time by BS to MS. The consequences of existing work are hefty amount of bandwidth utilization, time consumption and large storage. It is also endured by Man in the Middle attack and Impersonation due to lack of security in key exchange. This paper designs an automatic mutual refreshing of keys to minimize bandwidth utilization, key storage and time consumption by proposing Previous key and Iteration based Key Refreshing Function (PKIBKRF). By integrating PKIBKRF in key generation, the simulation results indicate that 21.8% of the bandwidth and storage of keys are reduced and PKMV2 mutual authentication time is reduced by 66.67%. The proposed work is simulated with Qualnet model and
Ad Hoc Access Gateway Selection Algorithm
NASA Astrophysics Data System (ADS)
Jie, Liu
With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. For mobile nodes in Ad Hoc network to internet, internet communications in the peer nodes must be achieved through the gateway. Therefore, the key Ad Hoc Access Networks will focus on the discovery gateway, as well as gateway selection in the case of multi-gateway and handover problems between different gateways. This paper considers the mobile node and the gateway, based on the average number of hops from an average access time and the stability of routes, improved gateway selection algorithm were proposed. An improved gateway selection algorithm, which mainly considers the algorithm can improve the access time of Ad Hoc nodes and the continuity of communication between the gateways, were proposed. This can improve the quality of communication across the network.
Scalable Lunar Surface Networks and Adaptive Orbit Access
NASA Technical Reports Server (NTRS)
Wang, Xudong
2015-01-01
Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.
Advanced Key Technologies for Hot Control Surfaces in Space Re- Entry Vehicles
NASA Astrophysics Data System (ADS)
Dogigli, Michael; Pradier, Alain; Tumino, Giorgio
2002-01-01
(1)MAN Technologie AG, D- 86153 Augsburg, Germany (2,3) ESA, 2200 Noordwijk ZH, The Netherlands Current space re-entry vehicles (e.g. X-38 vehicle 201, the prototype of the International Space Station's Crew Return Vehicle (CRV)) require advanced control surfaces (so called body flaps). Such control surfaces allow the design of smaller and lighter vehicles as well as faster re-entries (compared to the US Shuttle). They are designed as light-weight structures that need no metallic parts, need no mass or volume consuming heat sinks to protect critical components (e.g. bearings) and that can be operated at temperatures of more than 1600 "C in air transferring high mechanical loads (dynamic 40 kN, static 70 kN) at the same time. Because there is a need for CRV and also for Reusable Launch Vehicles (RLV) in future, the European Space Agency (ESA) felt compelled to establish a "Future European Space Transportation and Investigation Program,, (FESTIP) and a "General Support for Technology Program,, (GSTP). One of the main goals of these programs was to develop and qualify key-technologies that are able to master the above mentioned challenging requirements for advanced hot control surfaces and that can be applied for different vehicles. In 1996 MAN Technologie has started the development of hot control surfaces for small lifting bodies in the national program "Heiü Strukturen,,. One of the main results of this program was that especially the following CMC (Ceramic Matrix Composite) key technologies need to be brought up to space flight standard: Complex CMC Structures, CMC Bearings, Metal-to-CMC Joining Technologies, CMC Fasteners, Oxidation Protection Systems and Static and Dynamic Seals. MAN Technologie was contracted by ESA to continue the development and qualification of these key technologies in the frame of the FESTIP and the GSTP program. Development and qualification have successfully been carried out. The key technologies have been applied for the X-38 vehicle
32 CFR 37.875 - Should my TIA include a provision concerning foreign access to technology?
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 1 2013-07-01 2013-07-01 false Should my TIA include a provision concerning foreign access to technology? 37.875 Section 37.875 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Award Terms...
32 CFR 37.875 - Should my TIA include a provision concerning foreign access to technology?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Should my TIA include a provision concerning foreign access to technology? 37.875 Section 37.875 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Award Terms...
32 CFR 37.875 - Should my TIA include a provision concerning foreign access to technology?
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 1 2012-07-01 2012-07-01 false Should my TIA include a provision concerning foreign access to technology? 37.875 Section 37.875 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Award Terms...
32 CFR 37.875 - Should my TIA include a provision concerning foreign access to technology?
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 1 2014-07-01 2014-07-01 false Should my TIA include a provision concerning foreign access to technology? 37.875 Section 37.875 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Award Terms...
32 CFR 37.875 - Should my TIA include a provision concerning foreign access to technology?
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false Should my TIA include a provision concerning foreign access to technology? 37.875 Section 37.875 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Award Terms...
Ehlers, Shawn G; Field, William E
2018-02-14
This research focused on the advancements made in enabling agricultural workers with impaired mobility to access and operate off-road agricultural machinery. Although not a new concept, technological advancements in remote-controlled lifts, electronic actuators, electric over hydraulic controllers, and various modes of hand controls have advanced significantly, allowing operators with limited mobility to resume a high level of productivity in agricultural-related enterprises. In the United States, approximately 1.7% of the population is living with some form of paralysis or significant mobility impairment. When paired with the 2012 USDA Agriculture Census of 3.2 million farmers, it can be extrapolated that these technologies could impact 54,000 agricultural workers who have encountered disabling injuries or disease, which inhibit their ability to access and operate tractors, combines, and other self-propelled agricultural machines. Advancements in agricultural-specific technologies can allow for many of these individuals to regain the ability to effectively operate machinery once more.
Kim, Jeehoon; Lee, Hee Yun; Christensen, M Candace; Merighi, Joseph R
2017-09-01
To examine how information and communication technology (ICT) access and use are conceptually incorporated in the Successful Aging 2.0 framework. Using data from the 2011 National Health and Aging Trends Study (N = 6,476), we examined how ICT access and use for different purposes are associated with social engagement (i.e., informal and formal social participation) by gender. Weighted logistic regression analyses were performed. Findings revealed that men were more likely to access and use ICT than women. ICT access was positively associated with all types of women's social engagement, but only with men's informal social participation. Information technology (IT) use for health matters was positively associated with formal social participation for women and with informal social participation for men. IT use for personal tasks was negatively associated with formal social participation for older adults. Communication technology use was positively associated with formal and informal social participation for women and men. This study supports the expansion of the successful aging model by incorporating ICT access and use. Further, it assists in the identification of specific technologies that promote active engagement in later life for women and men. © The Author 2016. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Research and application of key technology of electric submersible plunger pump
NASA Astrophysics Data System (ADS)
Qian, K.; Sun, Y. N.; Zheng, S.; Du, W. S.; Li, J. N.; Pei, G. Z.; Gao, Y.; Wu, N.
2018-06-01
Electric submersible plunger pump is a new generation of rodless oil production equipment, whose improvements and upgrades of key technologies are conducive to its large-scale application and reduce the cost and improve the efficiency. In this paper, the operating mechanism of the unit in-depth study, aimed at the problems existing in oilfield production, to propose an optimization method creatively, including the optimal design of a linear motor for submersible oil, development of new double-acting load-relief pump, embedded flexible closed-loop control technology, research and development of low-cost power cables. 90 oil wells were used on field application, the average pump inspection cycle is 608 days, the longest pump check cycle has exceeded 1037 days, the average power saving rate is 45.6%. Application results show that the new technology of optimization and upgrading can further improve the reliability and adaptability of electric submersible plunger pump, reduce the cost of investment.
Integrated quantum key distribution sender unit for daily-life implementations
NASA Astrophysics Data System (ADS)
Mélen, Gwenaelle; Vogl, Tobias; Rau, Markus; Corrielli, Giacomo; Crespi, Andrea; Osellame, Roberto; Weinfurter, Harald
2016-03-01
Unlike currently implemented encryption schemes, Quantum Key Distribution provides a secure way of generating and distributing a key among two parties. Although a multitude of research platforms has been developed, the integration of QKD units within classical communication systems remains a tremendous challenge. The recently achieved maturity of integrated photonic technologies could be exploited to create miniature QKD add-ons that could extend the primary function of various existing systems such as mobile devices or optical stations. In this work we report on an integrated optics module enabling secure short-distance communication for, e.g., quantum access schemes. Using BB84-like protocols, Alice's mobile low-cost device can exchange secure key and information everywhere within a trusted node network. The new optics platform (35×20×8mm) compatible with current smartphone's technology generates NIR faint polarised laser pulses with 100MHz repetition rate. Fully automated beam tracking and live basis-alignment on Bob's side ensure user-friendly operation with a quantum link efficiency as high as 50% stable over a few seconds.
The applied technologies to access clean water for remote communities
NASA Astrophysics Data System (ADS)
Rabindra, I. B.
2018-01-01
A lot of research is done to overcome the remote communities to access clean water, yet very little is utilized and implemented by the community. Various reasons can probably be made for, which is the application of research results is assessed less practical. The aims of this paper is seeking a practical approach, how to establish criteria for the design can be easier applied, at the proper locations, the simple construction, effectively producing a volume and quality of clean water designation. The methods used in this paper is a technological model assessment of treatment/filtering clean water produced a variety of previous research, to establish a model of appropriate technology for remote communities. Various research results collected from the study of literature, while the identification of opportunities and threats to its application is done using a SWOT analysis. This article discussion is looking for alternative models of clean water filtration technology from the previous research results, to be selected as appropriate technology, easily applied and bring of many benefits to the remote communities. The conclusions resulting from the discussion in this paper, expected to be used as the basic criteria of design model of clean water filtration technologies that can be accepted and applied effectively by the remote communities.
An overview of key technology thrusts at Bell Helicopter Textron
NASA Technical Reports Server (NTRS)
Harse, James H.; Yen, Jing G.; Taylor, Rodney S.
1988-01-01
Insight is provided into several key technologies at Bell. Specific topics include the results of ongoing research and development in advanced rotors, methodology development, and new configurations. The discussion on advanced rotors highlight developments on the composite, bearingless rotor, including the development and testing of full scale flight hardware as well as some of the design support analyses and verification testing. The discussion on methodology development concentrates on analytical development in aeromechanics, including correlation studies and design application. New configurations, presents the results of some advanced configuration studies including hardware development.
Kim, Jong Bae; Brienza, David M
2006-01-01
A Remote Accessibility Assessment System (RAAS) that uses three-dimensional (3-D) reconstruction technology is being developed; it enables clinicians to assess the wheelchair accessibility of users' built environments from a remote location. The RAAS uses commercial software to construct 3-D virtualized environments from photographs. We developed custom screening algorithms and instruments for analyzing accessibility. Characteristics of the camera and 3-D reconstruction software chosen for the system significantly affect its overall reliability. In this study, we performed an accuracy assessment to verify that commercial hardware and software can construct accurate 3-D models by analyzing the accuracy of dimensional measurements in a virtual environment and a comparison of dimensional measurements from 3-D models created with four cameras/settings. Based on these two analyses, we were able to specify a consumer-grade digital camera and PhotoModeler (EOS Systems, Inc, Vancouver, Canada) software for this system. Finally, we performed a feasibility analysis of the system in an actual environment to evaluate its ability to assess the accessibility of a wheelchair user's typical built environment. The field test resulted in an accurate accessibility assessment and thus validated our system.
Erasmus, Daniel J; Brewer, Sharon E; Cinel, Bruno
2015-01-01
The use of internet-based technologies in the teaching of laboratories has emerged as a promising education tool. This study evaluated the effectiveness of using remote access technology to operate an atomic absorption spectrophotometer in analyzing the iron content in a crude myoglobin extract. Sixty-two students were surveyed on their level of engagement, learning, and overall experience. Feedback from students suggests that the use of remote access technology is effective in teaching students the principles of chemical analysis by atomic absorption spectroscopy. © 2014 The International Union of Biochemistry and Molecular Biology.
Enhancing access to health information in Africa: a librarian's perspective.
Gathoni, Nasra
2012-01-01
In recent years, tremendous progress has been made toward providing health information in Africa, in part because of technological advancements. Nevertheless, ensuring that information is accessible, comprehensible, and usable remains problematic, and there remain needs in many settings to address issues such as computer skills, literacy, and the infrastructure to access information. To determine how librarians might play a more strategic role in meeting information needs of health professionals in Africa, the author reviewed key components of information systems pertinent to knowledge management for the health sector, including access to global online resources, capacity to use computer technology for information retrieval, information literacy, and the potential for professional networks to play a role in improving access to and use of information. The author concluded that, in regions that lack adequate information systems, librarians could apply their knowledge and skills to facilitate access and use by information seekers. Ensuring access to and use of health information can also be achieved by engaging organizations and associations working to enhance access to health information, such as the Association for Health Information and Libraries in Africa. These groups can provide assistance through training, dissemination, information repackaging, and other approaches known to improve information literacy.
2012-06-01
technology originally developed on the Java platform. The Hibernate framework supports rapid development of a data access layer without requiring a...31 viii 2. Hibernate ................................................................................ 31 3. Database Design...protect from security threats; o Easy aggregate management operations via file tags; 2. Hibernate We recommend using Hibernate technology for object
Tomaszewski, Brian; Dusabejambo, Vincent; Ndayiragije, Vincent; Gonsalves, Snedden; Sawant, Aishwarya; Mumararungu, Angeline; Gasana, George; Amendezo, Etienne; Haake, Anne; Mutesa, Leon
2016-01-01
Background Lack of access to health and medical education resources for doctors in the developing world is a serious global health problem. In Rwanda, with a population of 11 million, there is only one medical school, hence a shortage in well-trained medical staff. The growth of interactive health technologies has played a role in the improvement of health care in developed countries and has offered alternative ways to offer continuous medical education while improving patient's care. However, low and middle-income countries (LMIC) like Rwanda have struggled to implement medical education technologies adapted to local settings in medical practice and continuing education. Developing a user-centered mobile computing approach for medical and health education programs has potential to bring continuous medical education to doctors in rural and urban areas of Rwanda and influence patient care outcomes. Objective The aim of this study is to determine user requirements, currently available resources, and perspectives for potential medical education technologies in Rwanda. Methods Information baseline and needs assessments data collection were conducted in all 44 district hospitals (DHs) throughout Rwanda. The research team collected qualitative data through interviews with 16 general practitioners working across Rwanda and 97 self-administered online questionnaires for rural areas. Data were collected and analyzed to address two key questions: (1) what are the currently available tools for the use of mobile-based technology for medical education in Rwanda, and (2) what are user's requirements for the creation of a mobile medical education technology in Rwanda? Results General practitioners from different hospitals highlighted that none of the available technologies avail local resources such as the Ministry of Health (MOH) clinical treatment guidelines. Considering the number of patients that doctors see in Rwanda, an average of 32 patients per day, there is need for a
Rusatira, Jean Christophe; Tomaszewski, Brian; Dusabejambo, Vincent; Ndayiragije, Vincent; Gonsalves, Snedden; Sawant, Aishwarya; Mumararungu, Angeline; Gasana, George; Amendezo, Etienne; Haake, Anne; Mutesa, Leon
2016-06-01
Lack of access to health and medical education resources for doctors in the developing world is a serious global health problem. In Rwanda, with a population of 11 million, there is only one medical school, hence a shortage in well-trained medical staff. The growth of interactive health technologies has played a role in the improvement of health care in developed countries and has offered alternative ways to offer continuous medical education while improving patient's care. However, low and middle-income countries (LMIC) like Rwanda have struggled to implement medical education technologies adapted to local settings in medical practice and continuing education. Developing a user-centered mobile computing approach for medical and health education programs has potential to bring continuous medical education to doctors in rural and urban areas of Rwanda and influence patient care outcomes. The aim of this study is to determine user requirements, currently available resources, and perspectives for potential medical education technologies in Rwanda. Information baseline and needs assessments data collection were conducted in all 44 district hospitals (DHs) throughout Rwanda. The research team collected qualitative data through interviews with 16 general practitioners working across Rwanda and 97 self-administered online questionnaires for rural areas. Data were collected and analyzed to address two key questions: (1) what are the currently available tools for the use of mobile-based technology for medical education in Rwanda, and (2) what are user's requirements for the creation of a mobile medical education technology in Rwanda? General practitioners from different hospitals highlighted that none of the available technologies avail local resources such as the Ministry of Health (MOH) clinical treatment guidelines. Considering the number of patients that doctors see in Rwanda, an average of 32 patients per day, there is need for a locally adapted mobile education app
NASA Astrophysics Data System (ADS)
Zheng, Jun; Ansari, Nirwan
2005-01-01
Submission Deadline: 1 June 2005
Koch, Marcus A.
2015-01-01
Objectives To take inventory of the current state of affairs of Market Access Launch Excellence in the life sciences industry. To identify key gaps and challenges for Market Access (MA) and discuss how they can be addressed. To generate a baseline for benchmarking MA launch excellence. Methodology An online survey was conducted with pharmaceutical executives primarily working in MA, marketing, or general management. The survey aimed to evaluate MA excellence prerequisites across the product life cycle (rated by importance and level of implementation) and to describe MA activity models in the respective companies. Composite scores were calculated from respondents’ ratings and answers. Results Implementation levels of MA excellence prerequisites generally lagged behind their perceived importance. Item importance and the respective level of implementation correlated well, which can be interpreted as proof of the validity of the questionnaire. The following areas were shown to be particularly underimplemented: 1) early integration of MA and health economic considerations in research and development decision making, 2) developing true partnerships with payers, including the development of services ‘beyond the pill’, and 3) consideration of human resource and talent management. The concept of importance-adjusted implementation levels as a hybrid parameter was introduced and shown to be a viable tool for benchmarking purposes. More than 70% of respondents indicated that their companies will invest broadly in MA in terms of capital and headcount within the next 3 years. Conclusions MA (launch) excellence needs to be further developed in order to close implementation gaps across the entire product life cycle. As MA is a comparatively young pharmaceutical discipline in a complex and dynamic environment, this effort will require strategic focus and dedication. The Market Access Launch Excellence Inventory benchmarking tool may help guide decision makers to prioritize
ERIC Educational Resources Information Center
Hong, Sunggye
2012-01-01
Technology provides equal access to information and helps people with visual impairments to complete tasks more independently. Among various assistive technology options for people with visual impairments, braille notetakers have been considered the most significant because of their technological innovation. Braille notetakers allow users who are…
Cases on Technological Adaptability and Transnational Learning: Issues and Challenges
ERIC Educational Resources Information Center
Mukerji, Siran, Ed.; Tripathi, Purnendu, Ed.
2010-01-01
Technology holds the key for bridging the gap between access to quality education and the need for enhanced learning experiences. This book contains case studies on divergent themes of personalized learning environments, inclusive learning for social change, innovative learning and assessment techniques, technology and international partnership…
Critical Technology Accessibility
ERIC Educational Resources Information Center
National Academies Press, 2006
2006-01-01
In 2003, the Defense Intelligence Agency asked the NRC to form a standing committee to help develop study topics about technology warning. One issue that was identified was the growing dependence on foreign suppliers of critical technology as a result of the increase in globalization of economic activity. Two important questions emerged for study:…
Is the digitization of laparoscopic movement using accessible alternative technologies possible?
Lorias Espinoza, Daniel; Gutiérrez Gnecchi, José Antonio; Martínez, Arturo Minor
2012-05-01
It is widely documented that laparoscopic surgeons require training, and an objective evaluation of the training that they receive. The most advanced evaluation systems integrate the digitization of the movement of laparoscopic tools. A great number of these systems, however, do not permit the use of real tools and their high cost limits their academic impact. Likewise, it is documented that new and accessible systems need to be developed. The aim of this article is to explore the possibility of digitizing the movement of laparoscopic tools in a three-dimensional workspace, using accessible alternative technology. Our proposal uses a commercial Wii video game control in conjunction with a program for determining kinematic variables during the execution of a recognition task.
Access control based on attribute certificates for medical intranet applications.
Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M
2001-01-01
Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.
Access Control based on Attribute Certificates for Medical Intranet Applications
Georgiadis, Christos; Pangalos, George; Khair, Marie
2001-01-01
Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951
A Trustworthy Key Generation Prototype Based on DDR3 PUF for Wireless Sensor Networks
Liu, Wenchao; Zhang, Zhenhua; Li, Miaoxin; Liu, Zhenglin
2014-01-01
Secret key leakage in wireless sensor networks (WSNs) is a high security risk especially when sensor nodes are deployed in hostile environment and physically accessible to attackers. With nowadays semi/fully-invasive attack techniques attackers can directly derive the cryptographic key from non-volatile memory (NVM) storage. Physically Unclonable Function (PUF) is a promising technology to resist node capture attacks, and it also provides a low cost and tamper-resistant key provisioning solution. In this paper, we designed a PUF based on double-data-rate SDRAM Type 3 (DDR3) memory by exploring its memory decay characteristics. We also described a prototype of 128-bit key generation based on DDR3 PUF with integrated fuzzy extractor. Due to the wide adoption of DDR3 memory in WSN, our proposed DDR3 PUF technology with high security levels and no required hardware changes is suitable for a wide range of WSN applications. PMID:24984058
Increasing College Access through the Implementation of Naviance: An Exploratory Study
ERIC Educational Resources Information Center
Christian, David; Lawrence, Amy; Dampman, Nicole
2017-01-01
High school counselors play a key role in increasing students' access to college. With increasing student-to-counselor ratios as well as demands on their time, school counselors often lack the ability to provide adequate college counseling. In this article, we explored how school counselors can use educational technology, specifically the online…
ERIC Educational Resources Information Center
Noguerón-Liu, Silvia
2017-01-01
Initiatives to integrate technology in schools are continuously increasing, with efforts to bridge the "homework gap" and provide technology access in low-income households. However, it is critical to include nondominant parents in technology adoption decisions in order to avoid mirroring past patterns of inequality in home-school…
Use of CDMA access technology in mobile satellite systems
NASA Technical Reports Server (NTRS)
Ramasastry, Jay; Wiedeman, Bob
1995-01-01
Use of Code Division Multiple Access (CDMA) technology in terrestrial wireless systems is fairly well understood. Similarly, design and operation of Power Control in a CDMA-based system in a terrestrial environment is also well established. Terrestrial multipath characteristics, and optimum design of the CDMA receiver to deal with multipath and fading conditions are reliably established. But the satellite environment is different. When the CDMA technology is adopted to the satellite environment, other design features need to be incorporated (for example; interleaving, open-loop and closed-loop power control design, diversity characteristics) to achieve comparable level of system performance. In fact, the GLOBALSTAR LEO/MSS system has incorporated all these features. Contrary to some published reports, CDMA retains the advantages in the satellite environment that are similar to those achieved in the terrestrial environment. This document gives a description of the CDMA waveform and other design features adopted for mobile satellite applications.
Development of the public information and communication technology assessment tool.
Ripat, Jacquie; Watzke, James; Birch, Gary
2008-09-01
Public information and communication technologies, such as information kiosks, automated banking machines and ticket dispensers, allow people to access services in a convenient and timely manner. However, the development of these technologies has occurred largely without consideration of access by people with disabilities. Inaccessible technical features make operation of a public technology difficult and barriers in the environment create navigational challenges, limiting the opportunity of people with disabilities to use these devices and access the services they provide. This paper describes the development of a tool that individuals, disability advocacy groups, business owners, healthcare providers, and urban planners can use to evaluate the accessibility of public technologies and the surrounding environment. Evaluation results can then be used to develop recommendations and advocate for technical and environmental changes to improve access. Tool development consisted of a review of the literature and key Canadian Standards Association documents, task analysis, and consultation with accessibility experts. Studies of content validity, tool usability, inter-rater and test-retest reliability were conducted in sites across Canada. Accessibility experts verified the content validity of the tool. The current version of the tool has incorporated the findings of a usability study. Initial testing indicated excellent agreement for inter-rater and test-retest reliability scores. Social exclusion can arise when public technologies are not accessible. This newly developed instrument provides detailed information that can be used to advocate for more accessible and inclusive public information and communication technologies.
Jitngernmadan, Prajaks; Miesenberger, Klaus
2015-01-01
For an interactive application, supporting and guiding the user in fulfilling tasks is most important. The behavior of the application that will guide users through the procedures until they finish the task has to be designed intuitively and well guiding, especially if the users has only restricted or no access to the visual and spatial arrangement on the screen. Therefore, the focus/cursor management plays an important role for orientation and navigating through the interaction. In the frame of ongoing research on a software tool supporting blind people in more efficiently doing mathematical calculations, we researched how Java technologies support implementing an accessible Graphical User Interface (GUI) with an additional focus on usable accessibility in terms of guiding blind users through the process of solving mathematical calculations. We used Java Swing [1] and Eclipse SWT [2] APIs for creating a series of prototypes. We tested a) accessibility and usability of the prototypes for blind people when using screen reader software and refreshable Braille display and b) the implementation support to developers provided by both technologies. It turned out that Eclipse SWT API delivered best results under Windows operating system.
NASA Astrophysics Data System (ADS)
Ando, K.; Fujita, S.; Ito, J.; Yuasa, S.; Suzuki, Y.; Nakatani, Y.; Miyazaki, T.; Yoda, H.
2014-05-01
Most parts of present computer systems are made of volatile devices, and the power to supply them to avoid information loss causes huge energy losses. We can eliminate this meaningless energy loss by utilizing the non-volatile function of advanced spin-transfer torque magnetoresistive random-access memory (STT-MRAM) technology and create a new type of computer, i.e., normally off computers. Critical tasks to achieve normally off computers are implementations of STT-MRAM technologies in the main memory and low-level cache memories. STT-MRAM technology for applications to the main memory has been successfully developed by using perpendicular STT-MRAMs, and faster STT-MRAM technologies for applications to the cache memory are now being developed. The present status of STT-MRAMs and challenges that remain for normally off computers are discussed.
An SSH key management system: easing the pain of managing key/user/account associations
NASA Astrophysics Data System (ADS)
Arkhipkin, D.; Betts, W.; Lauret, J.; Shiryaev, A.
2008-07-01
Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins.
Gibson, Shannon G; Axler, Renata E; Lemmens, Trudo
2017-12-01
A key issue impacting public trust in biobanks is how these resources are utilized, including who is given access to biobank data and samples. To assess the conditions under which researchers are given access to Canadian biobanks, we reviewed websites and contacted Canadian biobanks to determine the availability of information on access policies and procedures; research resulting from access biobank data and samples; and conditions on private industry access to biobanks. We also conducted expert interviews with key Canadian stakeholders ( n = 11) to obtain their perspectives on biobank transparency and access policies. Among 21 Canadian biobanks, there was wide variation in the access information made publicly available, and the majority of these allowed access by industry applicants. Biobanks should be governed by the principles of transparency, accountability, and accessibility, and attention must be given to the conditions around the commercialization of biobank-based research.
Social Media Use and Access to Digital Technology in US Young Adults in 2016
Johnson, Amanda L; Ilakkuvan, Vinu; Jacobs, Megan A; Graham, Amanda L; Rath, Jessica M
2017-01-01
Background In 2015, 90% of US young adults with Internet access used social media. Digital and social media are highly prevalent modalities through which young adults explore identity formation, and by extension, learn and transmit norms about health and risk behaviors during this developmental life stage. Objective The purpose of this study was to provide updated estimates of social media use from 2014 to 2016 and correlates of social media use and access to digital technology in data collected from a national sample of US young adults in 2016. Methods Young adult participants aged 18-24 years in Wave 7 (October 2014, N=1259) and Wave 9 (February 2016, N=989) of the Truth Initiative Young Adult Cohort Study were asked about use frequency for 11 social media sites and access to digital devices, in addition to sociodemographic characteristics. Regular use was defined as using a given social media site at least weekly. Weighted analyses estimated the prevalence of use of each social media site, overlap between regular use of specific sites, and correlates of using a greater number of social media sites regularly. Bivariate analyses identified sociodemographic correlates of access to specific digital devices. Results In 2014, 89.42% (weighted n, 1126/1298) of young adults reported regular use of at least one social media site. This increased to 97.5% (weighted n, 965/989) of young adults in 2016. Among regular users of social media sites in 2016, the top five sites were Tumblr (85.5%), Vine (84.7%), Snapchat (81.7%), Instagram (80.7%), and LinkedIn (78.9%). Respondents reported regularly using an average of 7.6 social media sites, with 85% using 6 or more sites regularly. Overall, 87% of young adults reported access or use of a smartphone with Internet access, 74% a desktop or laptop computer with Internet access, 41% a tablet with Internet access, 29% a smart TV or video game console with Internet access, 11% a cell phone without Internet access, and 3% none of these
Chen, Meilan; Guo, Lanping; Yang, Guang; Chen, Min; Yang, Li; Huang, Luqi
2011-11-01
Applications of arbuscular mycorrhizal fungi in research of medicinal plant cultivation are increased in recent years. Medicinal plants habitat is complicated and many inclusions are in root, however crop habitat is simple and few inclusions in root. So appraisal methods and key technologies about the symbiotic system of crop and arbuscular mycorrhizal fungi can't completely suitable for the symbiotic system of medicinal plants and arbuscular mycorrhizal fungi. This article discuss the appraisal methods and key technologies about the symbiotic system of medicinal plant and arbuscular mycorrhizal fungi from the isolation and identification of arbuscular mycorrhiza, and the appraisal of colonization intensity. This article provides guidance for application research of arbuscular mycorrhizal fungi in cultivation of medicinal plants.
Non-unique key B-Tree implementation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ries, D.R.
1980-12-23
The B-Trees are an indexed method to allow fast retrieval and order preserving updates to a FRAMIS relation based on a designated set of keys in the relation. A B-Tree access method is being implemented to provide indexed and sequential (in index order) access to FRAMIS relations. The implementation modifies the basic B-Tree structure to correctly allow multiple key values and still maintain the balanced page fill property of B-Trees. The data structures of the B-Tree are presented first, including the FRAMIS solution to the duplicate key value problem. Then the access level routines and utilities are presented. These routinesmore » include the original B-Tree creation; searching the B-Tree; and inserting, deleting, and replacing tuples on the B-Tree. In conclusion, the uses of the B-Tree access structures at the semantic level to enhance the FRAMIS performance are discussed. 10 figures.« less
ERIC Educational Resources Information Center
Fichten, Catherine S.; Asuncion, Jennison V.; Barile, Maria; Ferraro, Vittoria; Wolforth, Joan
2009-01-01
This article presents the results of two studies on the accessibility of e-learning materials and other information and computer and communication technologies for 143 Canadian college and university students with low vision and 29 who were blind. It offers recommendations for enhancing access, creating new learning opportunities, and eliminating…
A Future Large-Aperture UVOIR Space Observatory: Key Technologies and Capabilities
NASA Technical Reports Server (NTRS)
Bolcar, Matthew Ryan; Stahle, Carl M.; Balasubramaniam, Kunjithapatham; Clampin, Mark; Feinberg, Lee D.; Mosier, Gary E.; Quijada, Manuel A.; Rauscher, Bernard J.; Redding, David C.; Rioux, Norman M.;
2015-01-01
We present the key technologies and capabilities that will enable a future, large-aperture ultravioletopticalinfrared (UVOIR) space observatory. These include starlight suppression systems, vibration isolation and control systems, lightweight mirror segments, detector systems, and mirror coatings. These capabilities will provide major advances over current and near-future observatories for sensitivity, angular resolution, and starlight suppression. The goals adopted in our study for the starlight suppression system are 10-10 contrast with an inner working angle of 20 milliarcsec and broad bandpass. We estimate that a vibration and isolation control system that achieves a total system vibration isolation of 140 dB for a vibration-isolated mass of 5000 kg is required to achieve the high wavefront error stability needed for exoplanet coronagraphy. Technology challenges for lightweight mirror segments include diffraction-limited optical quality and high wavefront error stability as well as low cost, low mass, and rapid fabrication. Key challenges for the detector systems include visible-blind, high quantum efficiency UV arrays, photon counting visible and NIR arrays for coronagraphic spectroscopy and starlight wavefront sensing and control, and detectors with deep full wells with low persistence and radiation tolerance to enable transit imaging and spectroscopy at all wavelengths. Finally, mirror coatings with high reflectivity ( 90), high uniformity ( 1) and low polarization ( 1) that are scalable to large diameter mirror substrates will be essential for ensuring that both high throughput UV observations and high contrast observations can be performed by the same observatory.
Convergence of broadband optical and wireless access networks
NASA Astrophysics Data System (ADS)
Chang, Gee-Kung; Jia, Zhensheng; Chien, Hung-Chang; Chowdhury, Arshad; Hsueh, Yu-Ting; Yu, Jianjun
2009-01-01
This paper describes convergence of optical and wireless access networks for delivering high-bandwidth integrated services over optical fiber and air links. Several key system technologies are proposed and experimentally demonstrated. We report here, for the first ever, a campus-wide field trial demonstration of radio-over-fiber (RoF) system transmitting uncompressed standard-definition (SD) high-definition (HD) real-time video contents, carried by 2.4-GHz radio and 60- GHz millimeter-wave signals, respectively, over 2.5-km standard single mode fiber (SMF-28) through the campus fiber network at Georgia Institute of Technology (GT). In addition, subsystem technologies of Base Station and wireless tranceivers operated at 60 GHz for real-time video distribution have been developed and tested.
Airframe Technology Development for Next Generation Launch Vehicles
NASA Technical Reports Server (NTRS)
Glass, David E.
2004-01-01
The Airframe subproject within NASA's Next Generation Launch Technology (NGLT) program has the responsibility to develop airframe technology for both rocket and airbreathing vehicles for access to space. The Airframe sub-project pushes the state-of-the-art in airframe technology for low-cost, reliable, and safe space transportation. Both low and medium technology readiness level (TRL) activities are being pursued. The key technical areas being addressed include design and integration, hot and integrated structures, cryogenic tanks, and thermal protection systems. Each of the technologies in these areas are discussed in this paper.
ERIC Educational Resources Information Center
VanBiervliet, Alan, Ed.; Parette, Phil, Ed.
This proceedings provides the text of 17 conference presentations on access to technology for persons with disabilities. Titles and authors include: "There Is Funding Out There" (Anna C. Hofmann); "Assessment and Prescription for Adaptive Driving Controls" (Michael K. Shipp); "Technology Transfer for the Community Dwelling…
Math and science technology access and use in South Dakota public schools grades three through five
NASA Astrophysics Data System (ADS)
Schwietert, Debra L.
The development of K-12 technology standards, soon to be added to state testing of technology proficiency, and the increasing presence of computers in homes and classrooms reflects the growing importance of technology in current society. This study examined math and science teachers' responses on a survey of technology use in grades three through five in South Dakota. A researcher-developed survey instrument was used to collect data from a random sample of 100 public schools throughout the South Dakota. Forced choice and open-ended responses were recorded. Most teachers have access to computers, but they lack resources to purchase software for their content areas, especially in science areas. Three-fourths of teachers in this study reported multiple computers in their classrooms and 67% reported access to labs in other areas of the school building. These numbers are lower than the national average of 84% of teachers with computers in their classrooms and 95% with access to computers elsewhere in the building (USDOE, 2000). Almost eight out of 10 teachers noted time as a barrier to learning more about educational software. Additional barriers included lack of school funds (38%), access to relevant training (32%), personal funds (30%), and poor quality of training (7%). Teachers most often use math and science software as supplemental, with practice tutorials cited as another common use. The most common interest for software was math for both boys and girls. The second most common choice for boys was science and for girls, language arts. Teachers reported that there was no preference for either individual or group work on computers for girls or boys. Most teachers do not systematically evaluate software for gender preferences, but review software over subjectively.
ERIC Educational Resources Information Center
Lahm, Elizabeth A.; Morrissette, Sandra K.
This collection of materials describes different types of computer applications and software that can help students with disabilities. It contains information on: (1) Easy Access, a feature of the systems software on every Macintosh computer that allows use of the keypad instead of the mouse, options for slow keys, and options for sticky keys; (2)…
ERIC Educational Resources Information Center
Segers, Kathryn S.
2014-01-01
Technology is used in almost every school and classroom today and motivates and intrigues students with vision. This same technology is often not accessible to students with visual impairments and blindness. Assistive technology must be used by students with visual impairments and blindness in order to access a computer, the Internet, and print…
DOT National Transportation Integrated Search
2017-02-16
This report summarizes the research and findings of the Accessible Transportation Technologies Research Initiative (ATTRI) Institutional and Policy Assessment. The objective of this project is to identify and analyze the policy, institutional, and le...
DOT National Transportation Integrated Search
2017-02-16
This report summarizes the research and findings of the Accessible Transportation Technologies Research Initiative (ATTRI) Institutional and Policy Assessment. The objective of this project is to identify and analyze the policy, institutional, and le...
Technology transfer for adaptation
NASA Astrophysics Data System (ADS)
Biagini, Bonizella; Kuhl, Laura; Gallagher, Kelly Sims; Ortiz, Claudia
2014-09-01
Technology alone will not be able to solve adaptation challenges, but it is likely to play an important role. As a result of the role of technology in adaptation and the importance of international collaboration for climate change, technology transfer for adaptation is a critical but understudied issue. Through an analysis of Global Environment Facility-managed adaptation projects, we find there is significantly more technology transfer occurring in adaptation projects than might be expected given the pessimistic rhetoric surrounding technology transfer for adaptation. Most projects focused on demonstration and early deployment/niche formation for existing technologies rather than earlier stages of innovation, which is understandable considering the pilot nature of the projects. Key challenges for the transfer process, including technology selection and appropriateness under climate change, markets and access to technology, and diffusion strategies are discussed in more detail.
SIPP ACCESS: Information Tools Improve Access to National Longitudinal Panel Surveys.
ERIC Educational Resources Information Center
Robbin, Alice; David, Martin
1988-01-01
A computer-based, integrated information system incorporating data and information about the data, SIPP ACCESS systematically links technologies of laser disk, mainframe computer, microcomputer, and electronic networks, and applies relational technology to provide access to information about complex statistical data collections. Examples are given…
CICT Computing, Information, and Communications Technology Program
NASA Technical Reports Server (NTRS)
Laufenberg, Lawrence; Tu, Eugene (Technical Monitor)
2002-01-01
The CICT Program is part of the NASA Aerospace Technology Enterprise's fundamental technology thrust to develop tools. processes, and technologies that enable new aerospace system capabilities and missions. The CICT Program's four key objectives are: Provide seamless access to NASA resources- including ground-, air-, and space-based distributed information technology resources-so that NASA scientists and engineers can more easily control missions, make new scientific discoveries, and design the next-generation space vehicles, provide high-data delivery from these assets directly to users for missions, develop goal-oriented human-centered systems, and research, develop and evaluate revolutionary technology.
NASA Technical Reports Server (NTRS)
Bennett, Gary L.; Brandhorst, Henry W., Jr.; Atkins, Kenneth L.
1991-01-01
In July 1989, President Bush announced his space exploration initiative of going back to the Moon to stay and then going to Mars. Building upon its ongoing research and technology base, NASA has established an exploration technology program to develop the technologies needed for piloted missions to the Moon and Mars. A key element for the flights and for the planned bases is power. The NASA research and technology program on space power encompasses power sources, energy storage, and power management.
NASA Astrophysics Data System (ADS)
Dutheil, Sylvain; Pibarot, Julien; Tran, Dac; Vallee, Jean-Jacques; Tribot, Jean-Pierre
2016-07-01
With the aim of placing Europe among the world's space players in the strategic area of atmospheric re-entry, several studies on experimental vehicle concepts and improvements of critical re-entry technologies have paved the way for the flight of an experimental space craft. The successful flight of the Intermediate eXperimental Vehicle (IXV), under ESA's Future Launchers Preparatory Programme (FLPP), is definitively a significant step forward from the Atmospheric Reentry Demonstrator flight (1998), establishing Europe as a key player in this field. The IXV project objectives were the design, development, manufacture and ground and flight verification of an autonomous European lifting and aerodynamically controlled reentry system, which is highly flexible and maneuverable. The paper presents, the role of aerodynamics aerothermodynamics as part of the key technologies for designing an atmospheric re-entry spacecraft and securing a successful flight.
NASA Astrophysics Data System (ADS)
Pan, Tianheng
2018-01-01
In recent years, the combination of workflow management system and Multi-agent technology is a hot research field. The problem of lack of flexibility in workflow management system can be improved by introducing multi-agent collaborative management. The workflow management system adopts distributed structure. It solves the problem that the traditional centralized workflow structure is fragile. In this paper, the agent of Distributed workflow management system is divided according to its function. The execution process of each type of agent is analyzed. The key technologies such as process execution and resource management are analyzed.
Research on key technology of planning and design for AC/DC hybrid distribution network
NASA Astrophysics Data System (ADS)
Shen, Yu; Wu, Guilian; Zheng, Huan; Deng, Junpeng; Shi, Pengjia
2018-04-01
With the increasing demand of DC generation and DC load, the development of DC technology, AC and DC distribution network integrating will become an important form of future distribution network. In this paper, the key technology of planning and design for AC/DC hybrid distribution network is proposed, including the selection of AC and DC voltage series, the design of typical grid structure and the comprehensive evaluation method of planning scheme. The research results provide some ideas and directions for the future development of AC/DC hybrid distribution network.
ERIC Educational Resources Information Center
Flanagin, Jimmie
2013-01-01
Students with print disabilities continue to face inaccessible information and information technologies in higher education institutions despite federal and state legislation and local policies. Although most individuals responsible for making their course materials accessible often express support for the egalitarian principles of such policies,…
RSA Key Development Using Fingerprint Image on Text Message
NASA Astrophysics Data System (ADS)
Rahman, Sayuti; Triana, Indah; Khairani, Sumi; Yasir, Amru; Sundari, Siti
2017-12-01
Along with the development of technology today, humans are very facilitated in accessing information and Communicate with various media, including through the Internet network . Messages are sent by media such as text are not necessarily guaranteed security. it is often found someone that wants to send a secret message to the recipient, but the messages can be known by irresponsible people. So the sender feels dissappointed because the secret message that should be known only to the recipient only becomes known by the irresponsible people . It is necessary to do security the message by using the RSA algorithm, Using fingerprint image to generate RSA key.This is a solution to enrich the security of a message,it is needed to process images firstly before generating RSA keys with feature extraction.
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. House Committee on Education and Labor.
Key issues affecting Hispanic participation in higher education are evaluated, with attention to access, retention, and transfer. Societal factors influencing access are also covered: migration, technology, employment and income levels, and secondary schooling. In addition, postsecondary education in Puerto Rico is addressed. Hispanics constitute…
Social Media Use and Access to Digital Technology in US Young Adults in 2016.
Villanti, Andrea C; Johnson, Amanda L; Ilakkuvan, Vinu; Jacobs, Megan A; Graham, Amanda L; Rath, Jessica M
2017-06-07
In 2015, 90% of US young adults with Internet access used social media. Digital and social media are highly prevalent modalities through which young adults explore identity formation, and by extension, learn and transmit norms about health and risk behaviors during this developmental life stage. The purpose of this study was to provide updated estimates of social media use from 2014 to 2016 and correlates of social media use and access to digital technology in data collected from a national sample of US young adults in 2016. Young adult participants aged 18-24 years in Wave 7 (October 2014, N=1259) and Wave 9 (February 2016, N=989) of the Truth Initiative Young Adult Cohort Study were asked about use frequency for 11 social media sites and access to digital devices, in addition to sociodemographic characteristics. Regular use was defined as using a given social media site at least weekly. Weighted analyses estimated the prevalence of use of each social media site, overlap between regular use of specific sites, and correlates of using a greater number of social media sites regularly. Bivariate analyses identified sociodemographic correlates of access to specific digital devices. In 2014, 89.42% (weighted n, 1126/1298) of young adults reported regular use of at least one social media site. This increased to 97.5% (weighted n, 965/989) of young adults in 2016. Among regular users of social media sites in 2016, the top five sites were Tumblr (85.5%), Vine (84.7%), Snapchat (81.7%), Instagram (80.7%), and LinkedIn (78.9%). Respondents reported regularly using an average of 7.6 social media sites, with 85% using 6 or more sites regularly. Overall, 87% of young adults reported access or use of a smartphone with Internet access, 74% a desktop or laptop computer with Internet access, 41% a tablet with Internet access, 29% a smart TV or video game console with Internet access, 11% a cell phone without Internet access, and 3% none of these. Access to all digital devices with
Accessing multimedia content from mobile applications using semantic web technologies
NASA Astrophysics Data System (ADS)
Kreutel, Jörn; Gerlach, Andrea; Klekamp, Stefanie; Schulz, Kristin
2014-02-01
We describe the ideas and results of an applied research project that aims at leveraging the expressive power of semantic web technologies as a server-side backend for mobile applications that provide access to location and multimedia data and allow for a rich user experience in mobile scenarios, ranging from city and museum guides to multimedia enhancements of any kind of narrative content, including e-book applications. In particular, we will outline a reusable software architecture for both server-side functionality and native mobile platforms that is aimed at significantly decreasing the effort required for developing particular applications of that kind.
Mathieson, Kathleen; Leafman, Joan S; Horton, Mark B
2017-01-01
Health care access for medically underserved patients managing chronic conditions is challenging. While telemedicine can support patient education and engagement, the "digital divide" may be particularly problematic among the medically underserved. This study evaluated physical access to digital devices, use of e-mail and social media tools, and perceptions of telemedicine among American Indian (AI) patients with diabetes mellitus (DM). Survey data were collected from AI patients with DM during teleophthalmology exams. Eighty-eight percent of patients had access to digital device(s), 70% used e-mail, and 56% used social media. Younger age and greater education were positively associated with e-mail and social media use (p < .05). Most (60%) considered telemedicine an excellent medium for health-related patient education. American Indian patients with DM had access enabling patient education via telemedicine. Future work should examine patient technology preferences and effectiveness of technology-based education in improving outcomes among medically underserved populations.
Research of the key technology in satellite communication networks
NASA Astrophysics Data System (ADS)
Zeng, Yuan
2018-02-01
According to the prediction, in the next 10 years the wireless data traffic will be increased by 500-1000 times. Not only the wireless data traffic will be increased exponentially, and the demand for diversified traffic will be increased. Higher requirements for future mobile wireless communication system had brought huge market space for satellite communication system. At the same time, the space information networks had been greatly developed with the depth of human exploration of space activities, the development of space application, the expansion of military and civilian application. The core of spatial information networks is the satellite communication. The dissertation presented the communication system architecture, the communication protocol, the routing strategy, switch scheduling algorithm and the handoff strategy based on the satellite communication system. We built the simulation platform of the LEO satellites networks and simulated the key technology using OPNET.
Research on Key Technologies of Cloud Computing
NASA Astrophysics Data System (ADS)
Zhang, Shufen; Yan, Hongcan; Chen, Xuebin
With the development of multi-core processors, virtualization, distributed storage, broadband Internet and automatic management, a new type of computing mode named cloud computing is produced. It distributes computation task on the resource pool which consists of massive computers, so the application systems can obtain the computing power, the storage space and software service according to its demand. It can concentrate all the computing resources and manage them automatically by the software without intervene. This makes application offers not to annoy for tedious details and more absorbed in his business. It will be advantageous to innovation and reduce cost. It's the ultimate goal of cloud computing to provide calculation, services and applications as a public facility for the public, So that people can use the computer resources just like using water, electricity, gas and telephone. Currently, the understanding of cloud computing is developing and changing constantly, cloud computing still has no unanimous definition. This paper describes three main service forms of cloud computing: SAAS, PAAS, IAAS, compared the definition of cloud computing which is given by Google, Amazon, IBM and other companies, summarized the basic characteristics of cloud computing, and emphasized on the key technologies such as data storage, data management, virtualization and programming model.
Daneback, Kristian; Månsson, Sven-Axel; Ross, Michael W
2012-08-01
The aim of this study was to investigate whether demographic characteristics and sexual behavior online and offline were associated with private, respectively, nonprivate access to the Internet in a Web sample of people who use the Internet for sexual purposes. A total of 1,913 respondents completed an online questionnaire about Internet sexuality, and 1,614 reported using the Internet for sexual purposes. The majority of these respondents reported having access to an Internet-connected computer no one else had access to (62 percent women and 70 percent men). The results showed that it is possible to differentiate between those who have access to an Internet-connected computer no one else has access to and those who have shared access to an Internet-connected computer. Not only did they differ in demographic characteristics, but also in the sexual activities they engaged in on the Internet. Different patterns were found for women and men. For example, men who had private access to Internet-connected computers were more likely than those who had shared access to seek information about sexual issues. Thus, having access to Internet computers no one else has access to may promote sexual knowledge and health for men. The results of this study along with the technological development implies that in future research, attention should be paid to where and how people access the Internet in relation to online behavior in general and online sexual behavior in particular.
Månsson, Sven-Axel; Ross, Michael W.
2012-01-01
Abstract The aim of this study was to investigate whether demographic characteristics and sexual behavior online and offline were associated with private, respectively, nonprivate access to the Internet in a Web sample of people who use the Internet for sexual purposes. A total of 1,913 respondents completed an online questionnaire about Internet sexuality, and 1,614 reported using the Internet for sexual purposes. The majority of these respondents reported having access to an Internet-connected computer no one else had access to (62 percent women and 70 percent men). The results showed that it is possible to differentiate between those who have access to an Internet-connected computer no one else has access to and those who have shared access to an Internet-connected computer. Not only did they differ in demographic characteristics, but also in the sexual activities they engaged in on the Internet. Different patterns were found for women and men. For example, men who had private access to Internet-connected computers were more likely than those who had shared access to seek information about sexual issues. Thus, having access to Internet computers no one else has access to may promote sexual knowledge and health for men. The results of this study along with the technological development implies that in future research, attention should be paid to where and how people access the Internet in relation to online behavior in general and online sexual behavior in particular. PMID:22823598
Three-Dimensional Integrated Circuit (3D IC) Key Technology: Through-Silicon Via (TSV).
Shen, Wen-Wei; Chen, Kuan-Neng
2017-12-01
3D integration with through-silicon via (TSV) is a promising candidate to perform system-level integration with smaller package size, higher interconnection density, and better performance. TSV fabrication is the key technology to permit communications between various strata of the 3D integration system. TSV fabrication steps, such as etching, isolation, metallization processes, and related failure modes, as well as other characterizations are discussed in this invited review paper.
ERIC Educational Resources Information Center
Oyedemi, Toks; Mogano, Saki
2018-01-01
Considering the importance of digital skills in university education, this article reports on a study which examined access to technology among first year students at a rural South African university. The study focused on the digital readiness of students prior to their admission to the university, since many universities provide access to…
NASA Astrophysics Data System (ADS)
Yu, Xu; Shao, Quanqin; Zhu, Yunhai; Deng, Yuejin; Yang, Haijun
2006-10-01
With the development of informationization and the separation between data management departments and application departments, spatial data sharing becomes one of the most important objectives for the spatial information infrastructure construction, and spatial metadata management system, data transmission security and data compression are the key technologies to realize spatial data sharing. This paper discusses the key technologies for metadata based on data interoperability, deeply researches the data compression algorithms such as adaptive Huffman algorithm, LZ77 and LZ78 algorithm, studies to apply digital signature technique to encrypt spatial data, which can not only identify the transmitter of spatial data, but also find timely whether the spatial data are sophisticated during the course of network transmission, and based on the analysis of symmetric encryption algorithms including 3DES,AES and asymmetric encryption algorithm - RAS, combining with HASH algorithm, presents a improved mix encryption method for spatial data. Digital signature technology and digital watermarking technology are also discussed. Then, a new solution of spatial data network distribution is put forward, which adopts three-layer architecture. Based on the framework, we give a spatial data network distribution system, which is efficient and safe, and also prove the feasibility and validity of the proposed solution.
NASA Astrophysics Data System (ADS)
Nikolopoulos, Georgios M.
2018-01-01
We consider a recently proposed entity authentication protocol in which a physical unclonable key is interrogated by random coherent states of light, and the quadratures of the scattered light are analyzed by means of a coarse-grained homodyne detection. We derive a sufficient condition for the protocol to be secure against an emulation attack in which an adversary knows the challenge-response properties of the key and moreover, he can access the challenges during the verification. The security analysis relies on Holevo's bound and Fano's inequality, and suggests that the protocol is secure against the emulation attack for a broad range of physical parameters that are within reach of today's technology.
The Development Status and Key Technologies of Solar Powered Unmanned Air Vehicle
NASA Astrophysics Data System (ADS)
Sai, Li; Wei, Zhou; Xueren, Wang
2017-03-01
By analyzing the development status of several typical solar powered unmanned aerial vehicles (UAV) at home and abroad, the key technologies involved in the design and manufacture of solar powered UAV and the technical difficulties need to be solved at present are obtained. It is pointed out that with the improvement of energy system efficiency, advanced aerodynamic configuration design, realization of high applicability flight stability and control system, breakthrough of efficient propulsion system, the application prospect of solar powered UAV will be more extensive.
Ahmadi, Maryam; Khorrami, Farid; Dehnad, Afsaneh; Golchin, Mohammad H; Azad, Mohsen; Rahimi, Shafei
2018-01-01
The challenges of using health information systems in developing countries are different from developed countries for various reasons such as infrastructure and data culture of organizations. The aim of this study is to assess managers' access to key performance indicators (KPI) via Hospital Information System (HIS) in teaching hospitals of Iran. All managers (Census method) of the four teaching hospitals affiliated to Hormozgan University of Medical Sciences (HUMS) were included in this study. KPIs which are linked to the strategic objectives of organizations were adopted from the strategic plan of HUMS. The questionnaire used in this study included three categories: Financial, Human Resources and clinical. One-sample t-test was used and the significant difference score was calculated for the acceptable level. We found that HIS cannot facilitate access to KPIs for managers in the main categories, but it was effective in two subcategories of income (p = 0.314) and salary (P = 0.289)). A study of barriers to the use of managers of HIS in hospitals is suggested.
Foley, Alan R; Masingila, Joanna O
2015-07-01
In this paper, the authors explore the use of mobile devices as assistive technology for students with visual impairments in resource-limited environments. This paper provides initial data and analysis from an ongoing project in Kenya using tablet devices to provide access to education and independence for university students with visual impairments in Kenya. The project is a design-based research project in which we have developed and are refining a theoretically grounded intervention--a model for developing communities of practice to support the use of mobile technology as an assistive technology. We are collecting data to assess the efficacy and improve the model as well as inform the literature that has guided the design of the intervention. In examining the impact of the use of mobile devices for the students with visual impairments, we found that the devices provide the students with (a) access to education, (b) the means to participate in everyday life and (c) the opportunity to create a community of practice. Findings from this project suggest that communities of practice are both a viable and a valuable approach for facilitating the diffusion and support of mobile devices as assistive technology for students with visual impairments in resource-limited environments. Implications for Rehabilitation The use of mobile devices as assistive technology in resource-limited environments provides students with visual impairments access to education and enhanced means to participate in everyday life. Communities of practice are both a viable and a valuable approach for facilitating the diffusion and support of mobile devices as assistive technology for students with visual impairments in resource-limited environments. Providing access to assistive technology early and consistently throughout students' schooling builds both their skill and confidence and also demonstrates the capabilities of people with visual impairments to the larger society.
ERIC Educational Resources Information Center
Angkananon, Kewalin; Wald, Mike; Gilbert, Lester
2014-01-01
This paper focuses on the development and evaluation of a Technology Enhanced Interaction Framework and Method that can help with designing accessible mobile learning interactions involving disabled people. This new framework and method were developed to help design technological support for communication and interactions between people,…
ERIC Educational Resources Information Center
Johanson, Joyce; Clark, Letha; Daytner, Katrina; Robinson, Linda
2009-01-01
Accessing Curriculum through Technology Tools (ACTTT), a model development project, was developed and tested by staff of the Center for Best Practices in Early Childhood (the Center), a research and development unit within the College of Education and Human Services at Western Illinois University. The major goal of ACTTT was to develop,…
Hill, Jason H; Burge, Sandra; Haring, Anna; Young, Richard A
2012-01-01
The digital revolution is changing the manner in which patients communicate with their health care providers, yet many patients still lack access to communication technology. We conducted this study to evaluate access to, use of, and preferences for using communication technology among a predominantly low-income patient population. We determined whether access, use, and preferences were associated with type of health insurance, sex, age, and ethnicity. In 2011, medical student researchers administered questionnaires to patients of randomly selected physicians within 9 primary care clinics in the Residency Research Network of Texas. Surveys addressed access to and use of cell phones and home computers and preferences for communicating with health care providers. In this sample of 533 patients (77% response rate), 448 (84%) owned a cell phone and 325 (62%) owned computers. Only 48% reported conducting Internet searches, sending and receiving E-mails, and looking up health information on the Internet. Older individuals, those in government sponsored insurance programs, and individuals from racial/ethnic minority groups had the lowest levels of technology adoption. In addition, more than 60% of patients preferred not to send and receive health information over the Internet, by instant messaging, or by text messaging. Many patients in this sample did not seek health information electronically nor did they want to communicate electronically with their physicians. This finding raises concerns about the vision of the patient-centered medical home to enhance the doctor-patient relationship through communication technology. Our patients represent some of the more vulnerable populations in the United States and, as such, deserve attention from health care policymakers who are promoting widespread use of communication technology.
Leyens, Lada; Brand, Angela
National and international medicines agencies have developed innovative methods to expedite promising new medicines to the market and facilitate early patient access. Some of these approval pathways are the conditional approval and the adaptive pathways by the European Medicines Agency (EMA); the Promising Innovative Medicine (PIM) designation and the Early Access to Medicines Scheme (EAMS) by the Medicines and Healthcare Products Regulatory Agency (MHRA), as well as the Fast Track, Breakthrough or Accelerated Approval methods by the Food and Drug Administration (FDA). However, at least in Europe, these methods cannot achieve the goal of improving timely access for patients to new medicines on their own; the reimbursement process also has to become adaptive and flexible. In the past 2 years, the effective access (national patient access) to newly approved oncology drugs ranged from 1 to 30 months, with an extremely high variability between European countries. The goal of early patient access in Europe can only be achieved if the national health technology assessment bodies, such as NICE (ENG), HAS (FR), G-BA (DE) or AIFA (IT), provide harmonized, transparent, flexible, conditional and adaptive methods that adopt the level of evidence accepted by the medicines agencies. The efforts from medicines agencies are welcome but will be in vain if health technology assessments do not follow with similar initiatives, and the European 'postcode' lottery will continue. © 2016 S. Karger AG, Basel.
Development of a Novel Brayton-Cycle Cryocooler and Key Component Technologies
NASA Astrophysics Data System (ADS)
Nieczkoski, S. J.; Mohling, R. A.
2004-06-01
Brayton-cycle cryocoolers are being developed to provide efficient cooling in the 6 K to 70 K temperature range. The cryocoolers are being developed for use in space and in terrestrial applications where combinations of long lifetime, high efficiency, compactness, low mass, low vibration, flexible interfacing, load variability, and reliability are essential. The key enabling technologies for these systems are a mesoscale expander and an advanced oil-free scroll compressor. Both these components are nearing completion of their prototype development phase. The emphasis on the component and system development has been on invoking fabrication processes and techniques that can be evolved to further reduction in scale tending toward cryocooler miniaturization.
NASA Astrophysics Data System (ADS)
Zhang, Junwen; Yu, Jianjun; Wang, Jing; Xu, Mu; Cheng, Lin; Lu, Feng; Shen, Shuyi; Yan, Yan; Cho, Hyunwoo; Guidotti, Daniel; Chang, Gee-kung
2017-01-01
Fifth-generation (5G) wireless access network promises to support higher access data rate with more than 1,000 times capacity with respect to current long-term evolution (LTE) systems. New radio-access-technologies (RATs) based on higher carrier frequencies to millimeter-wave (MMW) radio-over-fiber, and carrier-aggregation (CA) using multi-band resources are intensively studied to support the high data rate access and effectively use of frequency resources in heterogeneous mobile network (Het-Net). In this paper, we investigate several enabling technologies for MMW RoF systems in 5G Het-Net. Efficient mobile fronthaul (MFH) solutions for 5G centralized radio access network (C-RAN) and beyond are proposed, analyzed and experimentally demonstrated based on the analog scheme. Digital predistortion based on memory polynomial for analog MFH linearization are presented with improved EVM performances and receiver sensitivity. We also propose and experimentally demonstrate a novel inter-/intra- RAT CA scheme for 5G Het- Net. The real-time standard 4G-LTE signal is carrier-aggregated with three broadband 60GHz MMW signals based on proposed optical-domain band-mapping method. RATs based on new waveforms have also been studied here to achieve higher spectral-efficiency (SE) in asynchronous environments. Full-duplex asynchronous quasi-gapless carrier aggregation scheme for MMW ROF inter-/intra-RAT based on the FBMC is also presented with 4G-LTE signals. Compared with OFDM-based signals with large guard-bands, FBMC achieves higher spectral-efficiency with better EVM performance at less received power and smaller guard-bands.
ERIC Educational Resources Information Center
King-Sears, Margaret E.; Evmenova, Anya S.; Johnson, Todd M.
2017-01-01
High school students with and without learning disabilities in two chemistry classes accessed technologically-enhanced worksheets, called Pencasts, when completing homework assignments. In this action research study, feedback from students was gathered via questionnaires and interviews. Students most frequently used Pencasts to figure out how to…
ERIC Educational Resources Information Center
Dolan, Robert P.; Burling, Kelly; Harms, Michael; Strain-Seymour, Ellen; Way, Walter; Rose, David H.
2013-01-01
The increased capabilities offered by digital technologies offer new opportunities to evaluate students' deeper knowledge and skills and on constructs that are difficult to measure using traditional methods. Such assessments can also incorporate tools and interfaces that improve accessibility for diverse students, as well as inadvertently…
Imaging Exoplanets with the Exo-S Starshade Mission: Key Enabling Technologies
NASA Astrophysics Data System (ADS)
Kasdin, N. Jeremy; Lisman, Doug; Shaklan, Stuart; Thomson, Mark; Webb, David; Cady, Eric; Exo-S Science; Technology Definition Team, Exoplanet Program Probe Study Design Team
2015-01-01
There is increasing interest in the use of a starshade, a spacecraft employing a large screen flying in formation with a space telescope, for providing the starlight suppression needed to detect and characterize exoplanets. In particular, Exo-S is a NASA study directed at designing a probe-scale exoplanet mission employing a starshade. In this poster we present the enabling technologies needed to make a starshade mission a reality: flight-like petals, a deployable truss to support the petals, optical edges, optical diffraction studies, and formation sensing and control. We show the status of each technology gap and summarize our progress over the past 5 years with plans for the next 3 years in demonstrating feasibility in all these areas. In particular, since no optical end-to-end test is possible, it is necessary to both show that a starshade can be built and deployed to the required accuracy and, via laboratory experiments at smaller scale, that the optical modeling upon which the accuracy requirements are based is validated. We show our progress verifying key enabling technologies, including demonstrating that a starshade petal made from flight-like materials can be manufactured to the needed accuracy and that a central truss with attached petals can be deployed with the needed precision. We also summarize our sub-scale lab experiments that demonstrate we can achieve the contrast predicted by our optical models.
Maximizing the benefits of antiretroviral therapy for key affected populations.
Grubb, Ian R; Beckham, Sarah W; Kazatchkine, Michel; Thomas, Ruth M; Albers, Eliot R; Cabral, Mauro; Lange, Joep; Vella, Stefano; Kurian, Manoj; Beyrer, Chris
2014-01-01
Scientific research has demonstrated the clinical benefits of earlier initiation of antiretroviral treatment (ART), and that ART can markedly reduce HIV transmission to sexual partners. Ensuring universal access to ART for those who need it has long been a core principle of the HIV response, and extending the benefits of ART to key populations is critical to increasing the impact of ART and the overall effectiveness of the HIV response. However, this can only be achieved through coordinated efforts to address political, social, legal and economic barriers that key populations face in accessing HIV services. Recent analyses show that HIV prevalence levels among key populations are far higher than among the general population, and they experience a range of biological and behavioural factors, and social, legal and economic barriers that increase their vulnerability to HIV and have resulted in alarmingly low ART coverage. World Health Organization 2014 consolidated guidance on HIV among key populations offers the potential for increased access to ART by key populations, following the same principles as for the general adult population. However, it should not be assumed that key populations will achieve greater access to ART unless stigma, discrimination and punitive laws, policies and practices that limit access to ART and other HIV interventions in many countries are addressed. Rights-based approaches and investments in critical enablers, such as supportive legal and policy environments, are essential to enable wider access to ART and other HIV interventions for key populations. The primary objective of ART should always be to treat the person living with HIV; prevention is an important, additional benefit. ART should be provided only with informed consent. The preventive benefits of treatment must not be used as a pretext for failure to provide other necessary HIV programming for key populations, including comprehensive harm reduction and other prevention
Key technologies for expeditions to Mars.
NASA Astrophysics Data System (ADS)
French, J. R., Jr.
A round-trip manned Mars landing mission, while difficult, is within the realm of today's technology. However, better understood and more practical advanced technologies offer promising improvements in mass performance, and some also enhance certain aspects of self-reliance for manned missions.
Chi-Ham, Cecilia L; Boettiger, Sara; Figueroa-Balderas, Rosa; Bird, Sara; Geoola, Josef N; Zamora, Pablo; Alandete-Saez, Monica; Bennett, Alan B
2012-06-01
The Public Intellectual Property Resource for Agriculture (PIPRA) was founded in 2004 by the Rockefeller Foundation in response to concerns that public investments in agricultural biotechnology benefiting developing countries were facing delays, high transaction costs and lack of access to important technologies due to intellectual property right (IPR) issues. From its inception, PIPRA has worked broadly to support a wide range of research in the public sector, in specialty and minor acreage crops as well as crops important to food security in developing countries. In this paper, we review PIPRA's work, discussing the failures, successes, and lessons learned during its years of operation. To address public sector's limited freedom-to-operate, or legal access to third-party rights, in the area of plant transformation, we describe PIPRA's patent 'pool' approach to develop open-access technologies for plant transformation which consolidate patent and tangible property rights in marker-free vector systems. The plant transformation system has been licensed and deployed for both commercial and humanitarian applications in the United States (US) and Africa, respectively. © 2012 The Authors. Plant Biotechnology Journal © 2012 Society for Experimental Biology, Association of Applied Biologists and Blackwell Publishing Ltd.
ERIC Educational Resources Information Center
Erasmus, Daniel J.; Brewer, Sharon E.; Cinel, Bruno
2015-01-01
The use of internet-based technologies in the teaching of laboratories has emerged as a promising education tool. This study evaluated the effectiveness of using remote access technology to operate an atomic absorption spectrophotometer in analyzing the iron content in a crude myoglobin extract. Sixty-two students were surveyed on their level of…
Research on key technology of prognostic and health management for autonomous underwater vehicle
NASA Astrophysics Data System (ADS)
Zhou, Zhi
2017-12-01
Autonomous Underwater Vehicles (AUVs) are non-cable and autonomous motional underwater robotics. With a wide range of activities, it can reach thousands of kilometers. Because it has the advantages of wide range, good maneuverability, safety and intellectualization, it becomes an important tool for various underwater tasks. How to improve diagnosis accuracy of the AUVs electrical system faults, and how to repair AUVs by the information are the focus of navy in the world. In turn, ensuring safe and reliable operation of the system has very important significance to improve AUVs sailing performance. To solve these problems, in the paper the prognostic and health management(PHM) technology is researched and used to AUV, and the overall framework and key technology are proposed, such as data acquisition, feature extraction, fault diagnosis, failure prediction and so on.
ERIC Educational Resources Information Center
Omona, Walter; Ikoja-Odongo, Robert
2006-01-01
This paper reports on a study which assessed the application of information and communication technologies (ICT) in health information access and dissemination in Uganda. The project focused not only on information obtainable through libraries for research, teaching, learning and practice, but also on ICT applications concerned with the…
Student Access to and Skills in Using Technology in an Open and Distance Learning Context
ERIC Educational Resources Information Center
Liebenberg, Hanlie; Chetty, Yuraisha; Prinsloo, Paul
2012-01-01
Amidst the different challenges facing higher education, and particularly distance education (DE) and open distance learning (ODL), access to information and communication technology (ICT) and students' abilities to use ICTs are highly contested issues in the South African higher education landscape. While there are various opinions about the…
Abdel-Baki, Amal; Lal, Shalini; D-Charron, Olivier; Stip, Emmanuel; Kara, Nadjia
2017-02-01
Computers, video games and technological devices are part of young people's everyday lives. However, their use in first-episode psychosis (FEP) treatment is rare. The purpose of this study was to better understand the access and use of technology among individuals with FEP, including gaming activities, to inform future development of technology-enabled therapeutic applications. Self-administered survey on use of technological tools in 71 FEP individuals. PCs/laptops were used by all participants; cellphones/smartphones by 92%, consoles by 83% (mainly male and younger participants). Women texted and used social networks more frequently; men played games (mainly action) more often. The younger individuals reported playing games frequently (32% daily) with less use of the Web and social networks (favourite: Facebook). These data will be useful for developing Web-based psychoeducation tools and cognitive remediation video games for youth with FEP. © 2015 Wiley Publishing Asia Pty Ltd.
NASA Astrophysics Data System (ADS)
Du, Jian; Sheng, Wanxing; Lin, Tao; Lv, Guangxian
2018-05-01
Nowadays, the smart distribution network has made tremendous progress, and the business visualization becomes even more significant and indispensable. Based on the summarization of traditional visualization technologies and demands of smart distribution network, a panoramic visualization application is proposed in this paper. The overall architecture, integrated architecture and service architecture of panoramic visualization application is firstly presented. Then, the architecture design and main functions of panoramic visualization system are elaborated in depth. In addition, the key technologies related to the application is discussed briefly. At last, two typical visualization scenarios in smart distribution network, which are risk warning and fault self-healing, proves that the panoramic visualization application is valuable for the operation and maintenance of the distribution network.
Deployment of a Testbed in a Brazilian Research Network using IPv6 and Optical Access Technologies
NASA Astrophysics Data System (ADS)
Martins, Luciano; Ferramola Pozzuto, João; Olimpio Tognolli, João; Chaves, Niudomar Siqueira De A.; Reggiani, Atilio Eduardo; Hortêncio, Claudio Antonio
2012-04-01
This article presents the implementation of a testbed and the experimental results obtained with it on the Brazilian Experimental Network of the government-sponsored "GIGA Project." The use of IPv6 integrated to current and emerging optical architectures and technologies, such as dense wavelength division multiplexing and 10-gigabit Ethernet on the core and gigabit capable passive optical network and optical distribution network on access, were tested. These protocols, architectures, and optical technologies are promising and part of a brand new worldwide technological scenario that has being fairly adopted in the networks of enterprises and providers of the world.
Notes on a Continuous-Variable Quantum Key Distribution Scheme
NASA Astrophysics Data System (ADS)
Ichikawa, Tsubasa; Hirano, Takuya; Matsubara, Takuto; Ono, Motoharu; Namiki, Ryo
2017-09-01
We develop a physical model to describe the signal transmission for a continuous-variable quantum key distribution scheme and investigate its security against a couple of eavesdropping attacks assuming that the eavesdropper's power is partly restricted owing to today's technological limitations. We consider an eavesdropper performing quantum optical homodyne measurement on the signal obtained by a type of beamsplitting attack. We also consider the case in which the eavesdropper Eve is unable to access a quantum memory and she performs heterodyne measurement on her signal without performing a delayed measurement. Our formulation includes a model in which the receiver's loss and noise are unaccessible by the eavesdropper. This setup enables us to investigate the condition that Eve uses a practical fiber differently from the usual beamsplitting attack where she can deploy a lossless transmission channel. The secret key rates are calculated in both the direct and reverse reconciliation scenarios.
Delivery of agricultural technology to resource-poor farmers in Africa.
Mignouna, Hodeba D; Abang, Mathew M; Omanya, Gospel; Nang'ayo, Francis; Bokanga, Mpoko; Boadi, Richard; Muchiri, Nancy; Terry, Eugene
2008-01-01
Recent developments in agricultural science and technology have the potential to transform the agricultural sector in the developing world. These technological advances constitute key drivers of economic growth and hold great promise for poverty reduction in sub-Saharan Africa (SSA). Agricultural research and development in Africa is undergoing a major paradigm shift. Until recently, public-sector institutions in Africa worked in isolation to create and disseminate agricultural technologies to smallholder farmers. However, they need access to improved proprietary technologies developed for the most part by the private sector in developed countries. These technologies are currently concentrated in the hands of a few large corporations and are protected by intellectual property rights. The African Agricultural Technology Foundation (AATF) is a new initiative addressing the challenges associated with the access, development, and deployment of agricultural technologies to smallholder farmers in SSA. This article describes the AATF model of facilitating the creation of partnership alliances dedicated to promote and support collaboration among a wide variety of public- and private-sector organizations around shared agricultural research and development goals for the public good. It explains AATF's public-private partnership framework for technology delivery in the light of market failures, institutional constraints, and systemic weaknesses, which impede public-sector organizations from accessing and delivering pro-poor knowledge and technology to farmers. The article provides policy makers, research managers, and business decision makers with an understanding of how access to, and delivery of, proprietary technologies could contribute to food security and the improvement of farmers' livelihoods in Africa.
electronic and information technologies accessible to individuals with disabilities in accordance with Section 508 of the Rehabilitation Act (29 U.S.C. 794d), as amended in 1998. Contact us with feedback or concerns related to the accessibility of this website.
ERIC Educational Resources Information Center
Freeland, Amy L.; Emerson, Robert Wall; Curtis, Amy B.; Fogarty, Kieran
2010-01-01
This article presents the findings of a secondary analysis of the National Longitudinal Transition Study 2 that explored the predictive association between training in access technology and performance on the Woodcock-Johnson Tests of Academic Achievement: III. The results indicated that the use of access technology had a limited predictive…
Research Issues in Information Access.
ERIC Educational Resources Information Center
Molholt, Pat
1989-01-01
Discusses traditional library approaches to access to information and the possible impact of information technologies, library automation, and artificial intelligence. Access issues raised by these technologies are identified and a research agenda to explore these issues is outlined. (31 references) (CLB)
Black and White Women Managers: Access to Opportunity
ERIC Educational Resources Information Center
Hite, Linda M.
2004-01-01
This study explores the differing views of Black and White female managers regarding access to key career opportunities for White women and women of color. Items addressed include access to hiring, promotions, key assignments, salary increases, acknowledgment for work, and mentors. Access to each is described by comparing White women and women of…
ERIC Educational Resources Information Center
Howe, Grant
2009-01-01
With money tight, more and more districts are considering remote access as a way to reduce expenses and budget information technology costs more effectively. Remote access allows staff members to work with a hosted software application from any school campus without being tied to a specific physical location. Each school can access critical…
McInnes, D Keith; Li, Alice E; Hogan, Timothy P
2013-12-01
We systematically reviewed the health and social science literature on access to and use of information technologies by homeless persons by searching 5 bibliographic databases. Articles were included if they were in English, represented original research, appeared in peer-reviewed publications, and addressed our research questions. Sixteen articles met our inclusion criteria. We found that mobile phone ownership ranged from 44% to 62%; computer ownership, from 24% to 40%; computer access and use, from 47% to 55%; and Internet use, from 19% to 84%. Homeless persons used technologies for a range of purposes, some of which were health related. Many homeless persons had access to information technologies, suggesting possible health benefits to developing programs that link homeless persons to health care through mobile phones and the Internet.
Mooney, Karen; McElnay, James C; Donnelly, Ryan F
2015-08-01
Microneedle (MN) arrays could offer an alternative method to traditional drug delivery and blood sampling methods. However, acceptance among key end-users is critical for new technologies to succeed. MNs have been advocated for use in children and so, paediatricians are key potential end-users. However, the opinions of paediatricians on MN use have been previously unexplored. The aim of this study was to investigate the views of UK paediatricians on the use of MN technology within neonatal and paediatric care. An online survey was developed and distributed among UK paediatricians to gain their opinions of MN technology and its use in the neonatal and paediatric care settings, particularly for MN-mediated monitoring. A total of 145 responses were obtained, with a completion response rate of 13.7 %. Respondents believed an alternative monitoring technique to blood sampling in children was required. Furthermore, 83 % of paediatricians believed there was a particular need in premature neonates. Overall, this potential end-user group approved of the MN technology and a MN-mediated monitoring approach. Minimal pain and the perceived ease of use were important elements in gaining favour. Concerns included the need for confirmation of correct application and the potential for skin irritation. The findings of this study provide an initial indication of MN acceptability among a key potential end-user group. Furthermore, the concerns identified present a challenge to those working within the MN field to provide solutions to further improve this technology. The work strengthens the rationale behind MN technology and facilitates the translation of MN technology from lab bench into the clinical setting.
Code of Federal Regulations, 2011 CFR
2011-01-01
... INFORMATION AND RESTRICTED DATA Physical Security § 95.18 Key personnel. The senior management official and... Clearance. Other key management officials, as determined by the CSA, must be granted an access authorization... organization's policies or practices in the performance of activities involving classified information. This...
Crucial design issues for special access technology; a Delphi study.
O'Rourke, Pearl; Ekins, Ray; Timmins, Bernard; Timmins, Fiona; Long, Siobhan; Coyle, Eugene
2014-01-01
To develop and demonstrate a method to involve professional users of assistive technology (AT) in the development process of customisable products. Employing the ideas of user participation and mass customisation, this research addresses the need for reduced product costs and optimised product flexibility. An adaptable six-question Delphi study was developed to establish consensus among AT professionals on design issues relating to a specified AT domain requiring innovation. The study is demonstrated for the special access technology (SAT) domain. A modified morphological matrix structures the application of the study results to the product design process. Fourteen professionals from the Republic of Ireland and the UK participated. Consensus was reached on prevalent parts of SAT that malfunction, primary reasons for SAT malfunction, characteristics of clients associated with SAT selection, client needs regarding SAT use and training, desirable traits of SAT and clinicians' frustrations with SAT. The study revealed a range of problems related to SAT, highlighting the complexities of successful SAT adoption. The questions led to differentiated insights and enabled design solution conceptualisation from various perspectives. The approach was found to help facilitate efficient generation and application of professional users' knowledge during the design process of customisable AT.
Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G
2016-04-01
Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.
Introduction. Information, knowledge and technology.
MacFarlane, Alistair G J
2003-08-15
Technology is the sum of the ways in which social groups manipulate order in the world to achieve their ends. It enables our active engagement with the world. Technology is central to our present well-being and vital for our future survival. As such it needs a coherent world view, a conceptual framework which will enable the fundamental problems that it poses for society to be approached in an illuminating way. Furthermore, such an approach, while remaining convincing, must not be overwhelmed by an ever-increasing welter of specialization and diversity of application. It is the purpose of the set of papers presented here to examine some key aspects of such a conceptual framework; not in the sense of offering a fully worked out philosophy of technology--that would be a huge and complex undertaking--but rather by considering some key topics. Subsidiary aims are to survey important relevant areas, to identify key sources that can provide access points for further study, and to consider some possible future developments. Major, coherent domains of activity are characterized by a few, fundamental, extensively used and essentially unifying concepts. Technology is such a domain, and its fundamental concepts are information, knowledge and agency. The following sections give a synoptic overview of the material presented in this theme issue, and set it within a wider context.
Maximizing the benefits of antiretroviral therapy for key affected populations
Grubb, Ian R; Beckham, Sarah W; Kazatchkine, Michel; Thomas, Ruth M; Albers, Eliot R; Cabral, Mauro; Lange, Joep; Vella, Stefano; Kurian, Manoj; Beyrer, Chris
2014-01-01
Introduction Scientific research has demonstrated the clinical benefits of earlier initiation of antiretroviral treatment (ART), and that ART can markedly reduce HIV transmission to sexual partners. Ensuring universal access to ART for those who need it has long been a core principle of the HIV response, and extending the benefits of ART to key populations is critical to increasing the impact of ART and the overall effectiveness of the HIV response. However, this can only be achieved through coordinated efforts to address political, social, legal and economic barriers that key populations face in accessing HIV services. Discussion Recent analyses show that HIV prevalence levels among key populations are far higher than among the general population, and they experience a range of biological and behavioural factors, and social, legal and economic barriers that increase their vulnerability to HIV and have resulted in alarmingly low ART coverage. World Health Organization 2014 consolidated guidance on HIV among key populations offers the potential for increased access to ART by key populations, following the same principles as for the general adult population. However, it should not be assumed that key populations will achieve greater access to ART unless stigma, discrimination and punitive laws, policies and practices that limit access to ART and other HIV interventions in many countries are addressed. Conclusions Rights-based approaches and investments in critical enablers, such as supportive legal and policy environments, are essential to enable wider access to ART and other HIV interventions for key populations. The primary objective of ART should always be to treat the person living with HIV; prevention is an important, additional benefit. ART should be provided only with informed consent. The preventive benefits of treatment must not be used as a pretext for failure to provide other necessary HIV programming for key populations, including comprehensive harm
ERIC Educational Resources Information Center
Zhou, Guangli; Zha, Qiang
2010-01-01
China's key science and technology universities are modelled on the French "Ecole Polytechnique". As such, they are utilitarian institutions, rooted in the concept of cultivating manpower for society's economic progress, and tending to ignore the development of the individual. As China's elite higher education system took in a rapidly…
NASA Technical Reports Server (NTRS)
Chien, E. S. K.; Marinho, J. A.; Russell, J. E., Sr.
1988-01-01
The Cellular Access Digital Network (CADN) is the access vehicle through which cellular technology is brought into the mainstream of the evolving integrated telecommunications network. Beyond the integrated end-to-end digital access and per call network services provisioning of the Integrated Services Digital Network (ISDN), the CADN engenders the added capability of mobility freedom via wireless access. One key element of the CADN network architecture is the standard user to network interface that is independent of RF transmission technology. Since the Mobile Satellite System (MSS) is envisioned to not only complement but also enhance the capabilities of the terrestrial cellular telecommunications network, compatibility and interoperability between terrestrial cellular and mobile satellite systems are vitally important to provide an integrated moving telecommunications network of the future. From a network standpoint, there exist very strong commonalities between the terrestrial cellular system and the mobile satellite system. Therefore, the MSS architecture should be designed as an integral part of the CADN. This paper describes the concept of the CADN, the functional architecture of the MSS, and the user-network interface signaling protocols.
ERIC Educational Resources Information Center
Wand, Sean; Thermos, Adam C.
1998-01-01
Explains the issues to consider before a college decides to purchase a card-access system. The benefits of automation, questions involving implementation, the criteria for technology selection, what typical card technology involves, privacy concerns, and the placement of card readers are discussed. (GR)
ERIC Educational Resources Information Center
Mayisela, Tabisa
2013-01-01
Mobile technology is increasingly being used to support blended learning beyond computer centres. It has been considered as a potential solution to the problem of a shortage of computers for accessing online learning materials (courseware) in a blended learning course. The purpose of the study was to establish how the use of mobile technology…
Pu, Y-F; Jiang, N.; Chang, W.; Yang, H-X; Li, C.; Duan, L-M
2017-01-01
To realize long-distance quantum communication and quantum network, it is required to have multiplexed quantum memory with many memory cells. Each memory cell needs to be individually addressable and independently accessible. Here we report an experiment that realizes a multiplexed DLCZ-type quantum memory with 225 individually accessible memory cells in a macroscopic atomic ensemble. As a key element for quantum repeaters, we demonstrate that entanglement with flying optical qubits can be stored into any neighboring memory cells and read out after a programmable time with high fidelity. Experimental realization of a multiplexed quantum memory with many individually accessible memory cells and programmable control of its addressing and readout makes an important step for its application in quantum information technology. PMID:28480891
Pu, Y-F; Jiang, N; Chang, W; Yang, H-X; Li, C; Duan, L-M
2017-05-08
To realize long-distance quantum communication and quantum network, it is required to have multiplexed quantum memory with many memory cells. Each memory cell needs to be individually addressable and independently accessible. Here we report an experiment that realizes a multiplexed DLCZ-type quantum memory with 225 individually accessible memory cells in a macroscopic atomic ensemble. As a key element for quantum repeaters, we demonstrate that entanglement with flying optical qubits can be stored into any neighboring memory cells and read out after a programmable time with high fidelity. Experimental realization of a multiplexed quantum memory with many individually accessible memory cells and programmable control of its addressing and readout makes an important step for its application in quantum information technology.
Mobilising Open Access to Research Data: Recommendations from the RECODE project
NASA Astrophysics Data System (ADS)
Finn, Rachel; Sveinsdottir, Thordis
2015-04-01
This paper will introduce the findings and policy recommendations from the FP7 project RECODE (Policy RECommendations for Open Access to Research Data in Europe) which aims to leverage existing networks, communities and projects to address challenges within the open access and data dissemination and preservation sector. We will introduce the key recommendations, which provide solutions relevant to opening access to PSI. The project is built on case study research of five scientific disciplines with the aim of recognizing and working with disciplinary fragmentation associated with open access to research data. The RECODE findings revealed that the mobilisation of open access to research data requires a partnership approach for developing a coherent and flexible ecosystem that is easy and transparent to embed in research practice and process. As such, the development of open access to research data needs to be: • Informed by research practices and processes in different fields • Supported by an integrated institutional and technological data infrastructure and guided by ethical and regulatory frameworks • Underpinned by infrastructure and guiding frameworks that allow for differences in disciplinary research and data management practices • Characterised by a partnership approach involving the key stakeholders, researchers, and institutions The proposed presentation will examine each of these aspects in detail and use information and good practices from the RECODE project to consider how stakeholders within the PSI movement might action each of these points. It will also highlight areas where RECODE findings and good practice recommendations have clear relevance for the PSI sector.
NASA Astrophysics Data System (ADS)
Tong, Xiaohui; Liu, Jingao; Wang, Zhenghao; Wang, Shuxian
2004-03-01
This paper presents several key technologies in the Mobile Location Based Service (MLBS) system of Shanghai. In the paper, the author presents a solution of handset mobile terminal, PDA+GPS+GSM/GPRS. The paper particularly introduces the hardware of the terminal and the acquirement of GPS information at the terminal. The paper also introduces how the terminal communicates with the special service center.
de Brito, Silvana Rossy; da Silva, Aleksandra do Socorro; Cruz, Adejard Gaia; Monteiro, Maurílio de Abreu; Vijaykumar, Nandamudi Lankalapalli; da Silva, Marcelino Silva; Costa, João Crisóstomo Weyl Albuquerque; Francês, Carlos Renato Lisboa
2016-01-01
This study fills demand for data on access and use of information and communication technologies (ICT) in the Brazilian legal Amazon, a region of localities with identical economic, political, and social problems. We use the 2010 Brazilian Demographic Census to compile data on urban and rural households (i) with computers and Internet access, (ii) with mobile phones, and (iii) with fixed phones. To compare the concentration of access to ICT in the municipalities of the Brazilian Amazon with other regions of Brazil, we use a concentration index to quantify the concentration of households in the following classes: with computers and Internet access, with mobile phones, with fixed phones, and no access. These data are analyzed along with municipal indicators on income, education, electricity, and population size. The results show that for urban households, the average concentration in the municipalities of the Amazon for computers and Internet access and for fixed phones is lower than in other regions of the country; meanwhile, that for no access and mobile phones is higher than in any other region. For rural households, the average concentration in the municipalities of the Amazon for computers and Internet access, mobile phones, and fixed phones is lower than in any other region of the country; meanwhile, that for no access is higher than in any other region. In addition, the study shows that education and income are determinants of inequality in accessing ICT in Brazilian municipalities and that the existence of electricity in rural households is directly associated with the ownership of ICT resources.
de Brito, Silvana Rossy; da Silva, Aleksandra do Socorro; Cruz, Adejard Gaia; Monteiro, Maurílio de Abreu; Vijaykumar, Nandamudi Lankalapalli; da Silva, Marcelino Silva; Costa, João Crisóstomo Weyl Albuquerque; Francês, Carlos Renato Lisboa
2016-01-01
This study fills demand for data on access and use of information and communication technologies (ICT) in the Brazilian legal Amazon, a region of localities with identical economic, political, and social problems. We use the 2010 Brazilian Demographic Census to compile data on urban and rural households (i) with computers and Internet access, (ii) with mobile phones, and (iii) with fixed phones. To compare the concentration of access to ICT in the municipalities of the Brazilian Amazon with other regions of Brazil, we use a concentration index to quantify the concentration of households in the following classes: with computers and Internet access, with mobile phones, with fixed phones, and no access. These data are analyzed along with municipal indicators on income, education, electricity, and population size. The results show that for urban households, the average concentration in the municipalities of the Amazon for computers and Internet access and for fixed phones is lower than in other regions of the country; meanwhile, that for no access and mobile phones is higher than in any other region. For rural households, the average concentration in the municipalities of the Amazon for computers and Internet access, mobile phones, and fixed phones is lower than in any other region of the country; meanwhile, that for no access is higher than in any other region. In addition, the study shows that education and income are determinants of inequality in accessing ICT in Brazilian municipalities and that the existence of electricity in rural households is directly associated with the ownership of ICT resources. PMID:27035577
Sequential data access with Oracle and Hadoop: a performance comparison
NASA Astrophysics Data System (ADS)
Baranowski, Zbigniew; Canali, Luca; Grancher, Eric
2014-06-01
The Hadoop framework has proven to be an effective and popular approach for dealing with "Big Data" and, thanks to its scaling ability and optimised storage access, Hadoop Distributed File System-based projects such as MapReduce or HBase are seen as candidates to replace traditional relational database management systems whenever scalable speed of data processing is a priority. But do these projects deliver in practice? Does migrating to Hadoop's "shared nothing" architecture really improve data access throughput? And, if so, at what cost? Authors answer these questions-addressing cost/performance as well as raw performance- based on a performance comparison between an Oracle-based relational database and Hadoop's distributed solutions like MapReduce or HBase for sequential data access. A key feature of our approach is the use of an unbiased data model as certain data models can significantly favour one of the technologies tested.
Li, Alice E.; Hogan, Timothy P.
2013-01-01
We systematically reviewed the health and social science literature on access to and use of information technologies by homeless persons by searching 5 bibliographic databases. Articles were included if they were in English, represented original research, appeared in peer-reviewed publications, and addressed our research questions. Sixteen articles met our inclusion criteria. We found that mobile phone ownership ranged from 44% to 62%; computer ownership, from 24% to 40%; computer access and use, from 47% to 55%; and Internet use, from 19% to 84%. Homeless persons used technologies for a range of purposes, some of which were health related. Many homeless persons had access to information technologies, suggesting possible health benefits to developing programs that link homeless persons to health care through mobile phones and the Internet. PMID:24148036
NASA Astrophysics Data System (ADS)
Hagerty, J. J.
2017-12-01
The role of the NASA Regional Planetary Image Facility (RPIF) Network is evolving as new science-ready spatial data products continue to be created and as key historical planetary data sets are digitized. Specifically, the RPIF Network is poised to serve specialized knowledge and services in a user-friendly manner that removes most barriers to locating, accessing, and exploiting planetary spatial data, thus providing a critical data access role within a spatial data infrastructure. The goal of the Network is to provide support and training to a broad audience of planetary spatial data users. In an effort to meet the planetary science community's evolving needs, we are focusing on the following objectives: Maintain and improve the delivery of historical data accumulated over the past four decades so as not to lose critical, historical information. This is being achieved by systematically digitizing fragile materials, allowing increased access and preserving them at the same time. Help users locate, access, visualize, and exploit planetary science data. Many of the facilities have begun to establish Guest User Facilities that allow researchers to use and/or be trained on GIS equipment and other specialized tools like Socet Set/GXP photogrammetry workstations for generating digital elevation maps. Improve the connection between the Network nodes while also leveraging the unique resources of each node. To achieve this goal, each facility is developing and sharing searchable databases of their collections, including robust metadata in a standards compliant way. Communicate more effectively and regularly with the planetary science community in an effort to make potential users aware of resources and services provided by the Network, while also engaging community members in discussions about community needs. Provide a regional resource for the science community, colleges, universities, museums, media, and the public to access planetary data. Introduce new strategies for
Virtual Mission Operations Center -Explicit Access to Small Satellites by a Net Enabled User Base
NASA Astrophysics Data System (ADS)
Miller, E.; Medina, O.; Paulsen, P.; Hopkins, J.; Long, C.; Holloman, K.
2008-08-01
The Office of Naval Research (ON R), The Office of the Secr etary of Defense (OSD) , Th e Operationally Responsive Space Off ice (ORS) , and th e National Aeronautics and Space Administration (NASA) are funding the development and integration of key technologies and new processes that w ill allow users across th e bread th of operations the ab ility to access, task , retr ieve, and collaborate w ith data from various sensors including small satellites v ia the Intern et and the SIPRnet. The V irtual Mission Oper ations Center (VMO C) facilitates the dynamic apportionmen t of space assets, allows scalable mission man agement of mu ltiple types of sensors, and provid es access for non-space savvy users through an intu itive collaborative w eb site. These key technologies are b eing used as experimentation pathfinders fo r th e Do D's Operationally Responsiv e Sp ace (O RS) initiative and NASA's Sensor W eb. The O RS initiative seeks to provide space assets that can b e rapid ly tailored to meet a commander's in telligen ce or commun ication needs. For the DoD and NASA the V MO C provid es ready and scalab le access to space b ased assets. To the commercial space sector the V MO C may provide an analog to the innovativ e fractional ownersh ip approach represen ted by FlexJet. This pap er delves in to the technology, in tegration, and applicability of th e V MO C to th e DoD , NASA , and co mmer cial sectors.
A Key Establishment Protocol for RFID User in IPTV Environment
NASA Astrophysics Data System (ADS)
Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho
In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.
Key Performance Parameter Driven Technology Goals for Electric Machines and Power Systems
NASA Technical Reports Server (NTRS)
Bowman, Cheryl; Jansen, Ralph; Brown, Gerald; Duffy, Kirsten; Trudell, Jeffrey
2015-01-01
Transitioning aviation to low carbon propulsion is one of the crucial strategic research thrust and is a driver in the search for alternative propulsion system for advanced aircraft configurations. This work requires multidisciplinary skills coming from multiple entities. The feasibility of scaling up various electric drive system technologies to meet the requirements of a large commercial transport is discussed in terms of key parameters. Functional requirements are identified that impact the power system design. A breakeven analysis is presented to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.
Oral Health in the US: Key Facts
... Policy Oral Health in the U.S.: Key Facts Oral Health in the U.S.: Key Facts Published: Jun 01, ... Email Print This fact sheet provides data on oral health care coverage and access for children, nonelderly adults ...
Technology transfer: the key to fusion commercialization
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burnett, S.C.
1981-01-01
The paper brings to light some of the reasons why technology transfer is difficult in fusion, examines some of the impediments to the process, and finally looks at a successful example of technology transfer. The paper considers some subjective features of fusion - one might call them the sociology of fusion - that are none the less real and that serve as impediments to technology transfer.
An Open-Source and Java-Technologies Approach to Web Applications
2003-09-01
program for any purpose (Freedom 0). • The freedom to study how the program works, and adapt it to individual needs (Freedom 1). Access to the source...manage information for many purposes. Today a key technology that allows developers to make Web applications is server-side programming to generate a
ERIC Educational Resources Information Center
Zinser, Richard W.; Hanssen, Carl E.
2006-01-01
This article presents an analysis of national data from the Advanced Technological Education (ATE) program regarding articulation agreements for the transfer of 2-year technical degrees to baccalaureate degrees. Quantitative and qualitative data are illustrated to help explain the extent to which ATE projects improve access to universities for…
ERIC Educational Resources Information Center
Kenney, Anne R.; Personius, Lynne K.
In cooperation with the Commission on Preservation and Access, Xerox Corporation, Sun Microsystems, Inc., and the New York State Program for the Conservation and Preservation of Library Research Materials, Cornell University (New York) studied and established the effectiveness of digital technology to preserve and make available research library…
Component improvement of free-piston Stirling engine key technology for space power
NASA Technical Reports Server (NTRS)
Alger, Donald L.
1988-01-01
The successful performance of the 25 kW Space Power Demonstrator (SPD) engine during an extensive testing period has provided a baseline of free piston Stirling engine technology from which future space Stirling engines may evolve. Much of the success of the engine was due to the initial careful selection of engine materials, fabrication and joining processes, and inspection procedures. Resolution of the few SPD engine problem areas that did occur has resulted in the technological advancement of certain key free piston Stirling engine components. Derivation of two half-SPD, single piston engines from the axially opposed piston SPD engine, designated as Space Power Research (SPR) engines, has made possible the continued improvement of these engine components. The two SPR engines serve as test bed engines for testing of engine components. Some important fabrication and joining processes are reviewed. Also, some component deficiencies that were discovered during SPD engine testing are described and approaches that were taken to correct these deficiencies are discussed. Potential component design modifications, based upon the SPD and SPR engine testing, are also reported.
Access: Exceptional Children and Technology.
ERIC Educational Resources Information Center
North Carolina State Dept. of Public Instruction, Raleigh. Div. for Exceptional Children.
The Exceptional Children and New Technology project sought to meet the instructional needs of physically handicapped, emotionally disturbed, learning disabled, and mentally handicapped children through the use of computer technology. The goals of the project were to test the instructional value of adaptive/assistive devices with exceptional…
Advanced technologies for scalable ATLAS conditions database access on the grid
NASA Astrophysics Data System (ADS)
Basset, R.; Canali, L.; Dimitrov, G.; Girone, M.; Hawkings, R.; Nevski, P.; Valassi, A.; Vaniachine, A.; Viegas, F.; Walker, R.; Wong, A.
2010-04-01
During massive data reprocessing operations an ATLAS Conditions Database application must support concurrent access from numerous ATLAS data processing jobs running on the Grid. By simulating realistic work-flow, ATLAS database scalability tests provided feedback for Conditions Db software optimization and allowed precise determination of required distributed database resources. In distributed data processing one must take into account the chaotic nature of Grid computing characterized by peak loads, which can be much higher than average access rates. To validate database performance at peak loads, we tested database scalability at very high concurrent jobs rates. This has been achieved through coordinated database stress tests performed in series of ATLAS reprocessing exercises at the Tier-1 sites. The goal of database stress tests is to detect scalability limits of the hardware deployed at the Tier-1 sites, so that the server overload conditions can be safely avoided in a production environment. Our analysis of server performance under stress tests indicates that Conditions Db data access is limited by the disk I/O throughput. An unacceptable side-effect of the disk I/O saturation is a degradation of the WLCG 3D Services that update Conditions Db data at all ten ATLAS Tier-1 sites using the technology of Oracle Streams. To avoid such bottlenecks we prototyped and tested a novel approach for database peak load avoidance in Grid computing. Our approach is based upon the proven idea of pilot job submission on the Grid: instead of the actual query, an ATLAS utility library sends to the database server a pilot query first.
NASA Technical Reports Server (NTRS)
Kovarik, Madeline
1993-01-01
Intelligent computer aided training systems hold great promise for the application of this technology to mainstream education and training. Yet, this technology, which holds such a vast potential impact for the future of education and training, has had little impact beyond the enclaves of government research labs. This is largely due to the inaccessibility of the technology to those individuals in whose hands it can have the greatest impact, teachers and educators. Simply throwing technology at an educator and expecting them to use it as an effective tool is not the answer. This paper provides a background into the use of technology as a training tool. MindLink, developed by HyperTech Systems, provides trainers with a powerful rule-based tool that can be integrated directly into a Windows application. By embedding expert systems technology it becomes more accessible and easier to master.
Broadband and scalable mobile satellite communication system for future access networks
NASA Astrophysics Data System (ADS)
Ohata, Kohei; Kobayashi, Kiyoshi; Nakahira, Katsuya; Ueba, Masazumi
2005-07-01
Due to the recent market trends, NTT has begun research into next generation satellite communication systems, such as broadband and scalable mobile communication systems. One service application objective is to provide broadband Internet access for transportation systems, temporal broadband access networks and telemetries to remote areas. While these are niche markets the total amount of capacity should be significant. We set a 1-Gb/s total transmission capacity as our goal. Our key concern is the system cost, which means that the system should be unified system with diversified services and not tailored for each application. As satellites account for a large portion of the total system cost, we set the target satellite size as a small, one-ton class dry mass with a 2-kW class payload power. In addition to the payload power and weight, the mobile satellite's frequency band is extremely limited. Therefore, we need to develop innovative technologies that will reduce the weight and maximize spectrum and power efficiency. Another challenge is the need for the system to handle up to 50 dB and a wide data rate range of other applications. This paper describes the key communication system technologies; the frequency reuse strategy, multiplexing scheme, resource allocation scheme, and QoS management algorithm to ensure excellent spectrum efficiency and support a variety of services and quality requirements in the mobile environment.
Torterolo, Livia; Ruffino, Francesco
2012-01-01
In the proposed demonstration we will present DCV (Desktop Cloud Visualization): a unique technology that allows users to remote access 2D and 3D interactive applications over a standard network. This allows geographically dispersed doctors work collaboratively and to acquire anatomical or pathological images and visualize them for further investigations.
ERIC Educational Resources Information Center
Beauchamp, Fiona; Bourke-Taylor, Helen; Brown, Ted
2018-01-01
Background: Many children with cerebral palsy learn to use technology to access their environments and communicate; however, minimal research informs practice. Methods: A descriptive qualitative study with purposive sampling recruited 10 therapists (occupational, speech, and physiotherapists) from one early intervention service. Data were…
Utilizing Fission Technology to Enable Rapid and Affordable Access to any Point in the Solar System
NASA Technical Reports Server (NTRS)
Houts, Mike; Bonometti, Joe; Morton, Jeff; Hrbud, Ivana; Bitteker, Leo; VanDyke, Melissa; Godfroy, T.; Pedersen, K.; Dobson, C.; Patton, B.;
2000-01-01
Fission technology can enable rapid, affordable access to any point in the solar system. Potential fission-based transportation options include bimodal nuclear thermal rockets, high specific energy propulsion systems, and pulsed fission propulsion systems. In-space propellant re-supply enhances the effective performance of all systems, but requires significant infrastructure development. Safe, timely, affordable utilization of first-generation space fission propulsion systems will enable the development of more advanced systems. First generation systems can build on over 45 years of US and international space fission system technology development to minimize cost.
Neumann, Peter J; Drummond, Michael F; Jönsson, Bengt; Luce, Bryan R; Schwartz, J Sanford; Siebert, Uwe; Sullivan, Sean D
2010-01-01
Previously, our group-the International Working Group for HTA Advancement-proposed a set of fifteen Key Principles that could be applied to health technology assessment (HTA) programs in different jurisdictions and across a range of organizations and perspectives. In this commentary, we investigate the extent to which these principles are supported and used by fourteen selected HTA organizations worldwide. We find that some principles are broadly supported: examples include being explicit about HTA goals and scope; considering a wide range of evidence and outcomes; and being unbiased and transparent. Other principles receive less widespread support: examples are addressing issues of generalizability and transferability; being transparent on the link between HTA findings and decision-making processes; considering a full societal perspective; and monitoring the implementation of HTA findings. The analysis also suggests a lack of consensus in the field about some principles--for example, considering a societal perspective. Our study highlights differences in the uptake of key principles for HTA and indicates considerable room for improvement for HTA organizations to adopt principles identified to reflect good HTA practices. Most HTA organizations espouse certain general concepts of good practice--for example, assessments should be unbiased and transparent. However, principles that require more intensive follow-up--for example, monitoring the implementation of HTA findings--have received little support and execution.
Vásquez-Silva, Luis; Ticse, Ray; Alfaro-Carballido, Luz; Guerra-Castañon, Felix
2015-01-01
We assessed the access, use and preferences of information and communication technology (ICT) by physicians who practice at Cayetano Heredia National Hospital. The questionnaire explored the availability and skills of ICT, time, educational activities, search engines and technological applications most used as well as ICT preferences in education.211 physicians were surveyed; laptop use was 93%, tablet and smartphone use was 66% and 88%.68% have mobile Internet. Differences were evident in the frequency of use of ICT in 25-34 year old age group as well as a higher level of skills (p<0.05). 86% use PubMed, Facebook and WhatsApp as a means of exchanging images and data related to health, 50% participated in medical blogs, online courses or videoconferences. The use and access of ICT is common among doctors in this hospital and there is positive interest in its use in education.
Attigala, Lakshmi; De Silva, Nuwan I.; Clark, Lynn G.
2016-01-01
Premise of the study: Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. Methods and Results: A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). Conclusions: WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus. PMID:27144109
Features and selection of vascular access devices.
Sansivero, Gail Egan
2010-05-01
To review venous anatomy and physiology, discuss assessment parameters before vascular access device (VAD) placement, and review VAD options. Journal articles, personal experience. A number of VAD options are available in clinical practice. Access planning should include comprehensive assessment, with attention to patient participation in the planning and selection process. Careful consideration should be given to long-term access needs and preservation of access sites. Oncology nurses are uniquely suited to perform a key role in VAD planning and placement. With knowledge of infusion therapy, anatomy and physiology, device options, and community resources, nurses can be key leaders in preserving vascular access and improving the safety and comfort of infusion therapy. Copyright 2010 Elsevier Inc. All rights reserved.
Mendoza-Avelares, Milton O.; Milton, Evan C.; Lange, Ilta; Fajardo, Roosevelt
2010-01-01
Abstract Objectives: Patients in underdeveloped countries may be left behind by advances in telehealthcare. We surveyed chronically ill patients with low incomes in Honduras to measure their use of mobile technologies and willingness to participate in mobile disease management support. Materials and Methods: 624 chronically ill primary care patients in Honduras were surveyed. We examined variation in telephone access across groups defined by patients' sociodemographic characteristics, diagnoses, and access to care. Logistic regression was used to identify independent correlates of patients' interest in automated telephonic support for disease management. Results: Participants had limited education (mean 4.8 years), and 65% were unemployed. Eighty-four percent had telephone access, and 78% had cell phones. Most respondents had voicemail (61%) and text messaging (58%). Mobile technologies were particularly common among patients who had to forego clinic visits and medications due to cost concerns (each p < 0.05). Most patients (>80%) reported that they would be willing to receive automated calls focused on appointment reminders, medication adherence, health status monitoring, and self-care education. Patients were more likely to be willing to participate in automated telemedicine services if they had to cancel a clinic appointment due to transportation problems or forego medication due to cost pressures. Conclusions: Even in this poor region of Honduras, most chronically ill patients have access to mobile technology, and most are willing to participate in automated telephone disease management support. Given barriers to in-person care, new models of mobile healthcare should be developed for chronically ill patients in developing countries. PMID:21062234
ERIC Educational Resources Information Center
Access Group, Atlanta, GA.
Two brief fact sheets for people with disabilities provide information on: (1) modifying a trailer to make it accessible for persons with mobility impairments, especially those in wheelchairs, and (2) accessibility considerations for home buyers or home owners with mobility impairments. The first fact sheet identifies inherent problems in…
Chen, Diane W; Davis, Rachel W; Balentine, Courtney J; Scott, Aaron R; Gao, Yue; Tapia, Nicole M; Berger, David H; Suliburk, James W
2014-08-01
The value of routine postoperative visits after general surgery remains unclear. The objective of this study was to evaluate the utility of routine postoperative visits after appendectomy and cholecystectomy and to determine access to mobile technology as an alternative platform for follow-up. Retrospective review of 219 appendectomies and 200 cholecystectomies performed at a safety net hospital. One patient underwent both surgeries. Patient demographics, duration of clinic visit, and need for additional imaging, tests or readmissions were recorded. Access to mobile technology was surveyed by a validated questionnaire. Of 418 patients, 84% percent completed a postoperative visit. At follow-up, 58 patients (14%) required 70 interventions, including staple removal (16, 23%), suture removal (4, 6%), drain removal (8, 11%), additional follow-up (20, 28%), medication action (16, 21%), additional imaging (3, 4%), and readmission (1, 1%). Occupational paperwork (62) and nonsurgical clinic referrals (28) were also performed. Average check-in to check-out time was 100 ± 54 min per patient. One intervention was performed for every 7.8 h of time in the clinic. Additionally, 88% of the surveyed population reported access to cell phone technology, and 69% of patients <40 y had smartphone access. Routine in-person follow-up after surgery consumes significant time and resources for patients and healthcare systems but has little impact on patient care. Most of the work done in the clinic is administrative and could be completed using mobile technology, which is pervasive in our population. Copyright © 2014 Elsevier Inc. All rights reserved.
Triple symmetric key cryptosystem for data security
NASA Astrophysics Data System (ADS)
Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.
2017-11-01
As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.
Alternative treatment technology information center computer database system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sullivan, D.
1995-10-01
The Alternative Treatment Technology Information Center (ATTIC) computer database system was developed pursuant to the 1986 Superfund law amendments. It provides up-to-date information on innovative treatment technologies to clean up hazardous waste sites. ATTIC v2.0 provides access to several independent databases as well as a mechanism for retrieving full-text documents of key literature. It can be accessed with a personal computer and modem 24 hours a day, and there are no user fees. ATTIC provides {open_quotes}one-stop shopping{close_quotes} for information on alternative treatment options by accessing several databases: (1) treatment technology database; this contains abstracts from the literature on all typesmore » of treatment technologies, including biological, chemical, physical, and thermal methods. The best literature as viewed by experts is highlighted. (2) treatability study database; this provides performance information on technologies to remove contaminants from wastewaters and soils. It is derived from treatability studies. This database is available through ATTIC or separately as a disk that can be mailed to you. (3) underground storage tank database; this presents information on underground storage tank corrective actions, surface spills, emergency response, and remedial actions. (4) oil/chemical spill database; this provides abstracts on treatment and disposal of spilled oil and chemicals. In addition to these separate databases, ATTIC allows immediate access to other disk-based systems such as the Vendor Information System for Innovative Treatment Technologies (VISITT) and the Bioremediation in the Field Search System (BFSS). The user may download these programs to their own PC via a high-speed modem. Also via modem, users are able to download entire documents through the ATTIC system. Currently, about fifty publications are available, including Superfund Innovative Technology Evaluation (SITE) program documents.« less
Federal laws, including Section 508 of the Rehabilitation Act, mandate that people with disabilities have access to the same information that someone without a disability would have. 508 standards cover electronic and information technology (EIT) products.
Multi terabits/s optical access transport technologies
NASA Astrophysics Data System (ADS)
Binh, Le Nguyen; Wang Tao, Thomas; Livshits, Daniil; Gubenko, Alexey; Karinou, Fotini; Liu Ning, Gordon; Shkolnik, Alexey
2016-02-01
Tremendous efforts have been developed for multi-Tbps over ultra-long distance and metro and access optical networks. With the exponential increase demand on data transmission, storage and serving, especially the 5G wireless access scenarios, the optical Internet networking has evolved to data-center based optical networks pressuring on novel and economical access transmission systems. This paper reports (1) Experimental platforms and transmission techniques employing band-limited optical components operating at 10G for 100G based at 28G baud. Advanced modulation formats such as PAM-4, DMT, duo-binary etc are reported and their advantages and disadvantages are analyzed so as to achieve multi-Tbps optical transmission systems for access inter- and intra- data-centered-based networks; (2) Integrated multi-Tbps combining comb laser sources and micro-ring modulators meeting the required performance for access systems are reported. Ten-sub-carrier quantum dot com lasers are employed in association with wideband optical intensity modulators to demonstrate the feasibility of such sources and integrated micro-ring modulators acting as a combined function of demultiplexing/multiplexing and modulation, hence compactness and economy scale. Under the use of multi-level modulation and direct detection at 56 GBd an aggregate of higher than 2Tbps and even 3Tbps can be achieved by interleaved two comb lasers of 16 sub-carrier lines; (3) Finally the fundamental designs of ultra-compacts flexible filters and switching integrated components based on Si photonics for multi Tera-bps active interconnection are presented. Experimental results on multi-channels transmissions and performances of optical switching matrices and effects on that of data channels are proposed.
Reusable launch vehicle: Technology development and test program
NASA Technical Reports Server (NTRS)
1995-01-01
The National Aeronautics and Space Administration (NASA) requested that the National Research Council (NRC) assess the Reusable Launch Vehicle (RLV) technology development and test programs in the most critical component technologies. At a time when discretionary government spending is under close scrutiny, the RLV program is designed to reduce the cost of access to space through a combination of robust vehicles and a streamlined infrastructure. Routine access to space has obvious benefits for space science, national security, commercial technologies, and the further exploration of space. Because of technological challenges, knowledgeable people disagree about the feasibility of a single-stage-to-orbit (SSTO) vehicle. The purpose of the RLV program proposed by NASA and industry contractors is to investigate the status of existing technology and to identify and advance key technology areas required for development and validation of an SSTO vehicle. This report does not address the feasibility of an SSTO vehicle, nor does it revisit the roles and responsibilities assigned to NASA by the National Transportation Policy. Instead, the report sets forth the NRC committee's findings and recommendations regarding the RLV technology development and test program in the critical areas of propulsion, a reusable cryogenic tank system (RCTS), primary vehicle structure, and a thermal protection system (TPS).
Universities Have a Key Role in Global Access to Medicines
ERIC Educational Resources Information Center
Panjabi, Rajesh; Rajkumar, Rahul; Kim, Jim Yong
2008-01-01
Around the world, the fight for affordable medical treatment is intensifying. Headline-grabbing battles are being waged in India, where the Chennai High Court recently decided a major constitutional case over access to lifesaving cancer medication. In Thailand, Abbott Laboratories, a multinational pharmaceutical giant, has withdrawn registration…
Fiber in access technologies and network convergence: an opportunity for optical integration
NASA Astrophysics Data System (ADS)
Ghiggino, Pierpaolo C.
2008-11-01
Broadband networks are among the fastest growing segment in telecom. The initial and still very significant push originated with xDSL technologies and indeed a significant amount of research and development is still occurring in this field with impressive results and allowing for a remarkable use of the installed copper infrastructure way beyond its originally planned bandwidth capabilities. However it is clear that ultimately a more suitable fiber based infrastructure will be needed in order to reduce both operational and network technology costs. Such cost reduction in inevitable as the added value to end users is only related to services and these cannot be priced outside a sensible window, whilst the related bandwidth increase is much more dramatic and its huge variability must be met with little or no cost impact by the network and its operation. Fiber in access has indeed the potential to cope with a huge bandwidth demand for many years to come as its inherent bandwidth capabilities are only just tapped by current service requirements. However the whole technology supply chain must follow in line. In particular optical technology must brace itself to cope with the required much larger deployment and greater cost effectiveness, whilst at the same time deliver performance suitable to the bandwidth increase offered in the longer term by the fiber medium. This paper looks at this issues and debates the opportunities for a new class of optical devices making use of the progress in optical integration
Naef, Olivier
2012-01-01
This short paper presents the abstracts of the different presentations during 10. Freiburger Symposium 2011 der SCG-Division Industrielle Chemie: Technology Progress, Success key for our production sites held Thursday and Friday, September 29 and 30, 2011 at the Ecole d'ingénieurs et d'architectes de Fribourg (Switzerland).
Emerging technologies and their impact on disability.
Wise, Paul H
2012-01-01
Technological innovation is transforming the prevalence and functional impact of child disability, the scale of social disparities in child disability, and perhaps the essential meaning of disability in an increasingly technology-dominated world. In this article, Paul Wise investigates several specific facets of this transformation. He begins by showing how technological change influences the definition of disability, noting that all technology attempts to address some deficiency in human capacity or in the human condition. Wise then looks at the impact of technology on childhood disabilities. Technical improvements in the physical environment, such as better housing, safer roads, and poison-prevention packaging, have significantly reduced childhood injury and disability. Other technological breakthroughs, such as those that identify genetic disorders that may lead to pregnancy termination, raise difficult moral and ethical issues. Technologies that identify potential health risks are also problematic in the absence of any efficient treatment. Wise stresses the imbalance in the existing health care delivery system, which is geared toward treating childhood physical illnesses that are declining in prevalence at a time when mental and emotional conditions, many of which are not yet well understood, are on the rise. This mismatch, Wise says, poses complex challenges to caring for disabled children, particularly in providing them with highly coordinated and integrated systems of care. Technology can also widen social disparities in health care for people, including children with disabilities. As Wise observes, efficacy--the ability of a technology to change health outcomes--is key to understanding the relationship of technology to social disparities. As technological innovation enhances efficacy, access to that technology becomes more important. Health outcomes may improve for those who can afford the technology, for example, but not for others. Hence, as efficacy
Telementoring in education of laparoscopic surgeons: An emerging technology
Bogen, Etai M; Augestad, Knut M; Patel, Hiten RH; Lindsetmo, Rolv-Ole
2014-01-01
Laparoscopy, minimally invasive and minimal access surgery with more surgeons performing these advanced procedures. We highlight in the review several key emerging technologies such as the telementoring and virtual reality simulators, that provide a solid ground for delivering surgical education to rural area and allow young surgeons a safety net and confidence while operating on a newly learned technique. PMID:24944728
The Techy Teacher/Access: Let's Get Creative
ERIC Educational Resources Information Center
Tucker, Catlin
2016-01-01
Some teachers fear that using technology will create an even larger divide between the haves and the have nots, but the reality is that kids "must" leave schools technology literate to access information and opportunities beyond school. Teachers who do not have easy access to technology must get creative to give students opportunities to…
1998-03-01
guidelines. 14. SUBJECT TERMS Efficiency, health care issues, medical services, military medicine, military standards, Navy, patients , scheduling...Rev. 2-89) Prescribed by ANSI Std. 239-18 299-01 Patient Access Study Sponsor: Assistant Chief for Health Care Operations (MED 03) March 1998...Michelle Dolfini-Reed Derek Shia In today’s highly competitive health care market, patient access to care is the key ingredient to a practice’s
ERIC Educational Resources Information Center
Britton, Todd Alan
2014-01-01
Purpose: The purpose of this study was to examine the key considerations of community, scalability, supportability, security, and functionality for selecting open-source software in California universities as perceived by technology leaders. Methods: After a review of the cogent literature, the key conceptual framework categories were identified…
Woo, Karen; Lok, Charmaine E
2016-08-08
Optimal vascular access planning begins when the patient is in the predialysis stages of CKD. The choice of optimal vascular access for an individual patient and determining timing of access creation are dependent on a multitude of factors that can vary widely with each patient, including demographics, comorbidities, anatomy, and personal preferences. It is important to consider every patient's ESRD life plan (hence, their overall dialysis access life plan for every vascular access creation or placement). Optimal access type and timing of access creation are also influenced by factors external to the patient, such as surgeon experience and processes of care. In this review, we will discuss the key determinants in optimal access type and timing of access creation for upper extremity arteriovenous fistulas and grafts. Copyright © 2016 by the American Society of Nephrology.
Manganello, Jennifer A; Gerstner, Gena; Pergolino, Kristen; Graham, Yvonne; Strogatz, David
2016-01-01
Many state and local health departments, as well as community organizations, have been using new technologies to disseminate health information to targeted populations. Yet little data exist that show access and use patterns, as well as preferences for receiving health information, at the state level. This study was designed to obtain information about media and technology use, and health information seeking patterns, from a sample of New York State (NYS) residents. A cross-sectional telephone survey (with mobile phones and landlines) was developed to assess media and technology access, use patterns, and preferences for receiving health information among a sample of 1350 residents in NYS. The survey used random digit dialing methodology. A weighted analysis was conducted utilizing Stata/SE software. Data suggest that NYS residents have a high level of computer and Internet use; 82% have at least one working computer at home, and 85% use the Internet at least sometimes. Mobile phone use is also high; 90% indicated having a mobile phone, and of those 63% have a smartphone. When asked about preferences for receiving health information from an organization, many people preferred websites (49%); preferences for other sources varied by demographic characteristics. Findings suggest that the Internet and other technologies are viable ways to reach NYS residents, but agencies and organizations should still consider using traditional methods of communication in some cases, and determine appropriate channels based on the population of interest.
Gerstner, Gena; Pergolino, Kristen; Graham, Yvonne; Strogatz, David
2016-01-01
Background Many state and local health departments, as well as community organizations, have been using new technologies to disseminate health information to targeted populations. Yet little data exist that show access and use patterns, as well as preferences for receiving health information, at the state level. Objective This study was designed to obtain information about media and technology use, and health information seeking patterns, from a sample of New York State (NYS) residents. Methods A cross-sectional telephone survey (with mobile phones and landlines) was developed to assess media and technology access, use patterns, and preferences for receiving health information among a sample of 1350 residents in NYS. The survey used random digit dialing methodology. A weighted analysis was conducted utilizing Stata/SE software. Results Data suggest that NYS residents have a high level of computer and Internet use; 82% have at least one working computer at home, and 85% use the Internet at least sometimes. Mobile phone use is also high; 90% indicated having a mobile phone, and of those 63% have a smartphone. When asked about preferences for receiving health information from an organization, many people preferred websites (49%); preferences for other sources varied by demographic characteristics. Conclusions Findings suggest that the Internet and other technologies are viable ways to reach NYS residents, but agencies and organizations should still consider using traditional methods of communication in some cases, and determine appropriate channels based on the population of interest. PMID:27227163
Needs and Beliefs in Construct Accessibility: Keys to New Understanding.
ERIC Educational Resources Information Center
Culbertson, Hugh M.; Denbow, Carl J.; Stempel, Guido H., III
1998-01-01
Surveyed 390 Ohioans who rated five concepts as to closeness of linkage with osteopathic medicine. Finds, as suggested by the storage-bin concept in construct accessibility theory, that those who had experience with these concepts were most apt to use them in assessing osteopathic medicine--this held even though most respondents reported no…
ERIC Educational Resources Information Center
Solomon, Paul
1994-01-01
Examines elementary school students' use of an online public access catalog to investigate the interaction between children, technology, curriculum, instruction, and learning. Highlights include patterns of successes and breakdowns; search strategies; instructional approaches and childrens' interests; structure of interaction; search terms; and…
ERIC Educational Resources Information Center
Norris, Marcia; Vasquez, Laurie
This paper discusses the role of libraries as the hub of information literacy in college and the need for professional collaboration to ensure library access for students with disabilities at California community college campuses. A working plan for developing assistive technology (AT) capabilities is provided which includes the following steps:…
NASA Astrophysics Data System (ADS)
Qu, Zhou; Xing, Hao; Wang, Dawei; Wang, Qiugui
2015-10-01
High-energy Laser weapon is a new-style which is developing rapidly nowadays. It is a one kind of direction energy weapon which can destroy the targets or make them invalid. High-energy Laser weapon has many merits such as concentrated energy, fast transmission, long operating range, satisfied precision, fast shift fire, anti-electromagnetic interference, reusability, cost-effectiveness. High-energy Laser weapon has huge potential for modern warfare since its laser beam launch attack to the target by the speed of light. High-energy Laser weapon can be deployed by multiple methods such as skyborne, carrier borne, vehicle-mounted, foundation, space platform. Besides the connection with command and control system, High-energy Laser weapon is consist of high-energy laser and beam steering. Beam steering is comprised of Large diameter launch system and Precision targeting systems. Meanwhile, beam steering includes the distance measurement of target location, detection system of television and infrared sensor, adaptive optical system of Laser atmospheric distortion correction. The development of laser technology is very fast in recent years. A variety of laser sources have been regarded as the key component in many optoelectronic devices. For directed energy weapon, the progress of laser technology has greatly improved the tactical effectiveness, such as increasing the range and strike precision. At the same time, the modern solid-state laser has become the ideal optical source for optical countermeasure, because it has high photoelectric conversion efficiency and small volume or weight. However, the total performance is limited by the mutual cooperation between different subsystems. The optical countermeasure is a complex technique after many years development. The key factor to evaluate the laser weapon can be formulated as laser energy density to target. This article elaborated the laser device technology of optoelectronic countermeasure and Photoelectric tracking
Antoine, Denis; Heffernan, Sean; Chaudhry, Amina; King, Van; Strain, Eric C
2016-12-01
Technology-assisted treatment (TAT) can be an effective supplement to established face-to-face therapy modalities with a growing literature in substance use disorder (SUD) treatment. TAT access, interest, and familiarity are potential limitations to the use and efficacy of these approaches to treatment. 174 participants in outpatient SUD treatment were administered a survey regarding technology device and Internet access, and interest in engaging in TAT SUD counseling (SUDC). The group was dichotomized by mean age and gender to examine potential variations in in these subgroups. Forty-three (43%) of participants were female, and the mean age was 44.8 years, and 89% of participants had Internet access. 83% of participants were interested in TAT for SUD counseling; 81% expected it to be at least "moderately helpful." 34% of participants noted they would choose to continue face-to-face therapy exclusively. 91% of participants had cell phones, but only 50% could access data or the Internet via their handheld device. 80% of participants stated they would be interested in trying SUDC via their phone. Women had a higher preference for computer-based SUDC than men, with gender being significantly correlated with TAT perceive helpfulness. These findings suggest that patients in outpatient SUD treatment have access to resources for TAT implementation, although access was not always readily available. Future research will be needed to determine whether the technology that this population possesses will be able to support the evolving TAT modalities and whether interest in TAT across age and gender groups equalizes over time.
Badawy, Sherif M; Thompson, Alexis A; Liem, Robert I
2016-05-01
Hydroxyurea is the only Food and Drug Administration approved medication for sickle cell disease (SCD) with short- and long-term benefits for both morbidity and mortality. However, hydroxyurea underutilization and adherence remain challenges for patients with SCD. The objectives of this study were to determine access to technology among adolescents and young adults (AYA) with SCD and to identify their preferred technology-based strategies for improving medication adherence. A cross-sectional survey was administered in a variety of clinical settings from October 2014 through May 2015 to AYA (12-22 years) with SCD (all genotypes) followed in a Comprehensive Sickle Cell Program. Eighty of 107 eligible participants completed the survey for a 75% response rate. Participants (51% female, 94% Black) had a mean age of 15.3 ± 2.8 years. Most participants (75%) were on a daily medication with about half on hydroxyurea. Forgetfulness (67%) was the most common barrier to medication adherence. The majority of participants (85%) owned smartphones and either owned or had access to electronic tablets (83%), laptops (72%), or desktops (70%). Of the proposed smartphone app features, daily medication reminders were ranked first most frequently, followed by education about SCD, adherence text prompts, education about SCD medications, and medication log. The majority of our AYA with SCD owned smartphones and had access to other electronic devices. Our survey results provided valuable insight into the preferred app features and optimal strategies for developing technology-based interventions, such as a multicomponent app, to increase medication adherence for AYA with SCD or other chronic conditions. © 2016 Wiley Periodicals, Inc.
Rodger, D; Skuse, A; Wilmore, M; Humphreys, S; Dalton, J; Flabouris, M; Clifton, V L
2013-01-01
This paper examines how pregnant women living in South Australia use information and communication technologies (ICTs), principally Internet and mobile phones, to access pregnancy-related information. It draws on 35 semistructured interviews conducted as part of the 'Health-e Baby' project, a qualitative study designed to assess the information needs and ICT preferences of pregnant women cared for at a South Australian metropolitan teaching hospital. Our research shows that although ICTs offer exciting possibilities for health promotion and the potential for new forms of communication, networking and connection, we cannot assume the effectiveness of communicating through such channels, despite near universal levels of ICT access. In turn, this highlights that if e-mediated health promotion is to be effective, health promoters and practitioners need to better understand ICT access, usage and content preferences of their clients.
Tapping Into Water: Key Considerations for Achieving Excellence in School Drinking Water Access
Hecht, Kenneth; Hampton, Karla E.; Grumbach, Jacob M.; Braff-Guajardo, Ellen; Brindis, Claire D.
2014-01-01
Objectives. We examined free drinking water access in schools. Methods. We conducted cross-sectional interviews with administrators from 240 California public schools from May to November 2011 to examine the proportion of schools that met excellent water access criteria (i.e., location, density, type, maintenance, and appeal of water sources), school-level characteristics associated with excellent water access, and barriers to improvements. Results. No schools met all criteria for excellent water access. High schools and middle schools had lower fountain:student ratios than elementary schools (odds ratio [OR] = 0.06; 95% confidence interval [CI] = 0.02, 0.20; OR = 0.30, 95% CI = 0.12, 0.70). Rural schools were more likely to offer a nonfountain water source than city schools (OR = 5.0; 95% CI = 1.74, 14.70). Newer schools were more likely to maintain water sources than older schools (OR = 0.98; 95% CI = 0.97, 1.00). Schools that offered free water in food service areas increased from pre- to postimplementation of California’s school water policy (72%–83%; P < .048). Barriers to improving school water included cost of programs and other pressing concerns. Conclusions. Awareness of the benefits related to school drinking water provision and funding may help communities achieve excellence in drinking water access. PMID:24832141
Segers, Laurent; Van Bavegem, David; De Winne, Sam; Braeken, An; Touhafi, Abdellah; Steenhaut, Kris
2015-01-01
This paper describes a new approach and implementation methodology for indoor ranging based on the time difference of arrival using code division multiple access with ultrasound signals. A novel implementation based on a field programmable gate array using finite impulse response filters and an optimized correlation demodulator implementation for ultrasound orthogonal signals is developed. Orthogonal codes are modulated onto ultrasound signals using frequency shift keying with carrier frequencies of 24.5 kHz and 26 kHz. This implementation enhances the possibilities for real-time, embedded and low-power tracking of several simultaneous transmitters. Due to the high degree of parallelism offered by field programmable gate arrays, up to four transmitters can be tracked simultaneously. The implementation requires at most 30% of the available logic gates of a Spartan-6 XC6SLX45 device and is evaluated on accuracy and precision through several ranging topologies. In the first topology, the distance between one transmitter and one receiver is evaluated. Afterwards, ranging analyses are applied between two simultaneous transmitters and one receiver. Ultimately, the position of the receiver against four transmitters using trilateration is also demonstrated. Results show enhanced distance measurements with distances ranging from a few centimeters up to 17 m, while keeping a centimeter-level accuracy. PMID:26263986
NASA Astrophysics Data System (ADS)
Chen, Yongrui; Wei, Wei; Dai, Jie
2017-04-01
Main cable is one of the most important structure of suspension Bridges, which bear all the dead and live load from upper structure. Cable erection is one of the most critical process in suspension bridge construction. Key points about strand erection are studied in this paper, including strand traction, lateral movement, section adjustment, placing into saddle, anchoring, line shape adjustment and keeping, and tension control. The technology has helped a long-span suspension bridge in Yunnan Province, China get a ideal finished state.
ERIC Educational Resources Information Center
Krause, Lorinda M.
2014-01-01
This study utilized a mixed methods approach to examine the issue of how parents, students, and teachers (stakeholders) perceive accessibility and the utilization of computer and Internet technology within the Selinsgrove, Pennsylvania Area School District. Quantitative data was collected through the use of questionnaires distributed to the…
Key Technologies and Applications of Gas Drainage in Underground Coal Mine
NASA Astrophysics Data System (ADS)
Zhou, Bo; Xue, Sheng; Cheng, Jiansheng; Li, Wenquan; Xiao, Jiaping
2018-02-01
It is the basis for the long-drilling directional drilling, precise control of the drilling trajectory and ensuring the effective extension of the drilling trajectory in the target layer. The technology can be used to complete the multi-branch hole construction and increase the effective extraction distance of the coal seam. The gas drainage and the bottom grouting reinforcement in the advanced area are realized, and the geological structure of the coal seam can be proved accurately. It is the main technical scheme for the efficient drainage of gas at home and abroad, and it is applied to the field of geological structure exploration and water exploration and other areas. At present, the data transmission method is relatively mature in the technology and application, including the mud pulse and the electromagnetic wave. Compared with the mud pulse transmission mode, the electromagnetic wave transmission mode has obvious potential in the data transmission rate and drilling fluid, and it is suitable for the coal mine. In this paper, the key technologies of the electromagnetic wave transmission mode are analyzed, including the attenuation characteristics of the electromagnetic transmission channel, the digital modulation scheme, the channel coding method and the weak signal processing technology. A coal mine under the electromagnetic wave drilling prototype is developed, and the ground transmission experiments and down hole transmission test are carried out. The main work includes the following aspects. First, the equivalent transmission line method is used to establish the electromagnetic transmission channel model of coal mine drilling while drilling, and the attenuation of the electromagnetic signal is measured when the electromagnetic channel measured. Second, the coal mine EM-MWD digital modulation method is developed. Third, the optimal linear block code which suitable for EM-MWD communication channel in coal mine is proposed. Fourth, the noise characteristics
Empowering citizens with access control mechanisms to their personal health resources.
Calvillo, J; Román, I; Roa, L M
2013-01-01
are essential keys for this approach and they are accomplished by using semantic technologies (i.e., ontologies, rule languages, and inference engines). The results are mainly focused on the security and access control of the proposed scenario. An ontology has been designed and developed for the POVO covering the terminology of the scenario and easing the automation of administration tasks. Over that ontology, an access control mechanism based on rule languages allows specifying access control policies, and an inference engine performs the decision making process automatically. The usability of solutions to ease administration tasks to the SoC is improved by the Me-As-An-Admin (M3A) application. This guides the SoC through the specification of personal access control policies to his/her distributed resources by using semantic technologies (e.g., metamodeling, model-to-text transformations, etc.). All results are developed as services and included in an architecture in accordance with standards and principles of openness and interoperability. Current technology can bring health, social and well-being care actually centered on citizens, and granting each person the management of his/her health information. However, the application of technology without adopting methodologies or normalized guidelines will reduce the interoperability of solutions developed, failing in the development of advanced services and improved scenarios for health delivery. Standards and reference architectures can be cornerstones for future-proof and powerful developments. Finally, not only technology must follow citizen-centric approaches, but also the gaps needing legislative efforts that support these new paradigms of healthcare delivery must be identified and addressed. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
Structuring Broadcast Audio for Information Access
NASA Astrophysics Data System (ADS)
Gauvain, Jean-Luc; Lamel, Lori
2003-12-01
One rapidly expanding application area for state-of-the-art speech recognition technology is the automatic processing of broadcast audiovisual data for information access. Since much of the linguistic information is found in the audio channel, speech recognition is a key enabling technology which, when combined with information retrieval techniques, can be used for searching large audiovisual document collections. Audio indexing must take into account the specificities of audio data such as needing to deal with the continuous data stream and an imperfect word transcription. Other important considerations are dealing with language specificities and facilitating language portability. At Laboratoire d'Informatique pour la Mécanique et les Sciences de l'Ingénieur (LIMSI), broadcast news transcription systems have been developed for seven languages: English, French, German, Mandarin, Portuguese, Spanish, and Arabic. The transcription systems have been integrated into prototype demonstrators for several application areas such as audio data mining, structuring audiovisual archives, selective dissemination of information, and topic tracking for media monitoring. As examples, this paper addresses the spoken document retrieval and topic tracking tasks.
A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP.
Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander
2017-11-17
The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.
A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP
Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander
2017-01-01
The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN. PMID:29149040
Key technologies for manufacturing and processing sheet materials: A global perspective
NASA Astrophysics Data System (ADS)
Demeri, Mahmoud Y.
2001-02-01
Modern industrial technologies continue to seek new materials and processes to produce products that meet design and functional requirements. Sheet materials made from ferrous and non-ferrous metals, laminates, composites, and reinforced plastics constitute a large percentage of today’s products, components, and systems. Major manufacturers of sheet products include automotive, aerospace, appliance, and food-packaging industries. The Second Global Symposium on Innovations in Materials Processing & Manufacturing: Sheet Materials is organized to provide a forum for presenting advances in sheet processing and manufacturing by worldwide researchers and engineers from industrial, research, and academic centers. The symposium, sponsored by the TMS Materials Processing & Manufacturing Division (MPMD), was planned for the 2001 TMS Annual Meeting, New Orleans, Louisiana, February 11 15, 2001. This article is a review of key papers submitted for publication in the concurrent volume. The selected papers present significant developments in the rapidly expanding areas of advanced sheet materials, innovative forming methods, industrial applications, primary and secondary processing, composite processing, and numerical modeling of manufacturing processes.
NASA Astrophysics Data System (ADS)
Chen, Zhibin; Xiao, Cheng; Xiao, Wenjian; Qin, Mengze; Liu, Xianhong
2016-01-01
To prevent tragic disasters caused by terror acts and warfare threats, security check personnel must be capable of discovering, distinguishing and eliminating the explosives at multiple circumstances. Standoff technology for the remote detection of explosives and their traces on contaminated surfaces is a research field that has become a heightened priority in recent years for homeland security and counter-terrorism applications. There has been a huge increase in research within this area, the improvement of standoff trace explosives detection by optical-related technology. This paper provides a consolidation of information relating to recent advances in several key problems of, without being limited to one specific research area or explosive type. Working laser wavelength of detection system is discussed. Generation and collection of explosives spectra signal are summarized. Techniques for analysing explosives spectra signal are summed up.
Ramsey, Alex; Lord, Sarah; Torrey, John; Marsch, Lisa; Lardiere, Michael
2016-01-01
This study aimed to identify barriers to use of technology for behavioral health care from the perspective of care decision makers at community behavioral health organizations. As part of a larger survey of technology readiness, 260 care decision makers completed an open-ended question about perceived barriers to use of technology. Using the Consolidated Framework for Implementation Research (CFIR), qualitative analyses yielded barrier themes related to characteristics of technology (e.g., cost and privacy), potential end users (e.g., technology literacy and attitudes about technology), organization structure and climate (e.g., budget and infrastructure), and factors external to organizations (e.g., broadband accessibility and reimbursement policies). Number of reported barriers was higher among respondents representing agencies with lower annual budgets and smaller client bases relative to higher budget, larger clientele organizations. Individual barriers were differentially associated with budget, size of client base, and geographic location. Results are discussed in light of implementation science frameworks and proactive strategies to address perceived obstacles to adoption and use of technology-based behavioral health tools.
Ramsey, Alex; Lord, Sarah; Torrey, John; Marsch, Lisa; Lardiere, Michael
2014-01-01
This study aimed to identify barriers to use of technology for behavioral health care from the perspective of care decision-makers at community behavioral health organizations. As part of a larger survey of technology readiness, 260 care decision-makers completed an open-ended question about perceived barriers to use of technology. Using the Consolidated Framework for Implementation Research (CFIR), qualitative analyses yielded barrier themes related to characteristics of technology (e.g., cost, privacy), potential end-users (e.g., technology literacy, attitudes about technology), organization structure and climate (e.g., budget, infrastructure), and factors external to organizations (e.g., broadband accessibility, reimbursement policies). Number of reported barriers was higher among respondents representing agencies with lower annual budgets and smaller client bases relative to higher budget, larger clientele organizations. Individual barriers were differentially associated with budget, size of client base, and geographic location. Results are discussed in light of implementation science frameworks and proactive strategies to address perceived obstacles to adoption and use of technology-based behavioral health tools. PMID:25192755
NASA Astrophysics Data System (ADS)
Zhao, Y.; Zhang, L.; Ma, W.; Zhang, P.; Zhao, T.
2018-04-01
The First National Geographical Condition Survey is a predecessor task to dynamically master basic situations of the nature, ecology and human activities on the earth's surface and it is the brand-new mapping geographic information engineering. In order to ensure comprehensive, real and accurate survey results and achieve the quality management target which the qualified rate is 100 % and the yield is more than 80 %, it is necessary to carry out the quality control and result inspection for national geographical conditions survey on a national scale. To ensure that achievement quality meets quality target requirements, this paper develops the key technology method of "five-in-one" quality control that is constituted by "quality control system of national geographical condition survey, quality inspection technology system, quality evaluation system, quality inspection information management system and national linked quality control institutions" by aiming at large scale, wide coverage range, more undertaking units, more management levels, technical updating, more production process and obvious regional differences in the national geographical condition survey and combining with novel achievement manifestation, complicated dependency, more special reference data, and large data size. This project fully considering the domestic and foreign related research results and production practice experience, combined with the technology development and the needs of the production, it stipulates the inspection methods and technical requirements of each stage in the quality inspection of the geographical condition survey results, and extends the traditional inspection and acceptance technology, and solves the key technologies that are badly needed in the first national geographic survey.
Data publication and dissemination of interactive keys under the open access model
USDA-ARS?s Scientific Manuscript database
The concepts of publication, citation and dissemination of interactive keys and other online keys are discussed and illustrated by a sample paper published in the present issue (doi: 10.3897/zookeys.21.271). The present model is based on previous experience with several existing examples of publishi...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Safeguarding.... (c) The Director, Office of Science and Technology Policy may create special access programs to...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Safeguarding.... (c) The Director, Office of Science and Technology Policy may create special access programs to...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Safeguarding.... (c) The Director, Office of Science and Technology Policy may create special access programs to...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Safeguarding.... (c) The Director, Office of Science and Technology Policy may create special access programs to...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Safeguarding.... (c) The Director, Office of Science and Technology Policy may create special access programs to...
Advanced Information Technology Investments at the NASA Earth Science Technology Office
NASA Astrophysics Data System (ADS)
Clune, T.; Seablom, M. S.; Moe, K.
2012-12-01
The NASA Earth Science Technology Office (ESTO) regularly makes investments for nurturing advanced concepts in information technology to enable rapid, low-cost acquisition, processing and visualization of Earth science data in support of future NASA missions and climate change research. In 2012, the National Research Council published a mid-term assessment of the 2007 decadal survey for future spacemissions supporting Earth science and applications [1]. The report stated, "Earth sciences have advanced significantly because of existing observational capabilities and the fruit of past investments, along with advances in data and information systems, computer science, and enabling technologies." The report found that NASA had responded favorably and aggressively to the decadal survey and noted the role of the recent ESTO solicitation for information systems technologies that partnered with the NASA Applied Sciences Program to support the transition into operations. NASA's future missions are key stakeholders for the ESTO technology investments. Also driving these investments is the need for the Agency to properly address questions regarding the prediction, adaptation, and eventual mitigation of climate change. The Earth Science Division has championed interdisciplinary research, recognizing that the Earth must be studied as a complete system in order toaddress key science questions [2]. Information technology investments in the low-mid technology readiness level (TRL) range play a key role in meeting these challenges. ESTO's Advanced Information Systems Technology (AIST) program invests in higher risk / higher reward technologies that solve the most challenging problems of the information processing chain. This includes the space segment, where the information pipeline begins, to the end user, where knowledge is ultimatelyadvanced. The objectives of the program are to reduce the risk, cost, size, and development time of Earth Science space-based and ground
ERIC Educational Resources Information Center
Proctor, Michael D.; Marks, Yaela
2013-01-01
This research reports and analyzes for archival purposes surveyed perceptions, use, and access by 259 United States based exemplar Primary and Secondary educators of computer-based games and technology for classroom instruction. Participating respondents were considered exemplary as they each won the Milken Educator Award during the 1996-2009…
ERIC Educational Resources Information Center
Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Alberti, Gloria; Bellini, Domencio; Oliva, Doretta; Boccasini, Adele; La Martire, Maria L.; Signorino, Mario
2013-01-01
A variety of technology-aided programs have been developed to help persons with congenital or acquired multiple disabilities access preferred stimuli or choose among stimulus options. The application of those programs may pose problems when the participants have very limited behavior repertoires and are unable to use conventional responses and…
ERIC Educational Resources Information Center
Hulela, K.; Rammolai, M.; Mpatane, W.
2014-01-01
This study examines the availability, accessibility and usability of computer as a form of information and communication technologies (ICTs) by student teachers in secondary schools. 44 out of 51 student teachers of Agriculture responded to the questionnaire. Means and percentages were used to analyze the data to establish the availability,…
Magasi, Susan; Harniss, Mark; Heinemann, Allen W
2018-01-01
Principles of fairness in testing require that all test takers, including people with disabilities, have an equal opportunity to demonstrate their capacity on the construct being measured. Measurement design features and assessment protocols can pose barriers for people with disabilities. Fairness in testing is a fundamental validity issue at all phases in the design, administration, and interpretation of measurement instruments in clinical practice and research. There is limited guidance for instrument developers on how to develop and evaluate the accessibility and usability of measurement instruments. This article describes a 6-stage iterative process for developing accessible computer-administered measurement instruments grounded in the procedures implemented across several major measurement initiatives. A key component of this process is interdisciplinary teams of accessibility experts, content and measurement experts, information technology experts, and people with disabilities working together to ensure that measurement instruments are accessible and usable by a wide range of users. The development of accessible measurement instruments is not only an ethical requirement, it also ensures better science by minimizing measurement bias, missing data, and attrition due to mismatches between the target population and test administration platform and protocols. Copyright © 2017 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.
Quantum key distribution without the wavefunction
NASA Astrophysics Data System (ADS)
Niestegge, Gerd
A well-known feature of quantum mechanics is the secure exchange of secret bit strings which can then be used as keys to encrypt messages transmitted over any classical communication channel. It is demonstrated that this quantum key distribution allows a much more general and abstract access than commonly thought. The results include some generalizations of the Hilbert space version of quantum key distribution, but are based upon a general nonclassical extension of conditional probability. A special state-independent conditional probability is identified as origin of the superior security of quantum key distribution; this is a purely algebraic property of the quantum logic and represents the transition probability between the outcomes of two consecutive quantum measurements.
Aerospace laser communications technology as enabler for worldwide quantum key distribution
NASA Astrophysics Data System (ADS)
Moll, Florian; Weinfurter, Harald; Rau, Markus; Schmidt, Christopher; Melén, Gwen; Vogl, Tobias; Nauerth, Sebastian; Fuchs, Christian
2016-04-01
A worldwide growing interest in fast and secure data communications pushes technology development along two lines. While fast communications can be realized using laser communications in fiber and free-space, inherently secure communications can be achieved using quantum key distribution (QKD). By combining both technologies in a single device, many synergies can be exploited, therefore reducing size, weight and power of future systems. In recent experiments we demonstrated quantum communications over large distances as well as between an aircraft and a ground station which proved the feasibility of QKD between moving partners. Satellites thus may be used as trusted nodes in combination with QKD receiver stations on ground, thereby enabling fast and secure communications on a global scale. We discuss the previous experiment with emphasis on necessary developments to be done and corresponding ongoing research work of German Aerospace Center (DLR) and Ludwig Maximilians University Munich (LMU). DLR is performing research on satellite and ground terminals for the high-rate laser communication component, which are enabling technologies for the QKD link. We describe the concept and hardware of three generations of OSIRIS (Optical High Speed Infrared Link System) laser communication terminals for low Earth orbiting satellites. The first type applies laser beam pointing solely based on classical satellite control, the second uses an optical feedback to the satellite bus and the third, currently being in design phase, comprises of a special coarse pointing assembly to control beam direction independent of satellite orientation. Ongoing work also targets optical terminals for CubeSats. A further increase of beam pointing accuracy can be achieved with a fine pointing assembly. Two ground stations will be available for future testing, an advanced stationary ground station and a transportable ground station. In parallel the LMU QKD source size will be reduced by more than an
Are current insulin pumps accessible to blind and visually impaired people?
Burton, Darren M; Uslan, Mark M; Blubaugh, Morgan V; Clements, Charles W
2009-05-01
In 2004, Uslan and colleagues determined that insulin pumps (IPs) on the market were largely inaccessible to blind and visually impaired persons. The objective of this study is to determine if accessibility status changed in the ensuing 4 years. Five IPs on the market in 2008 were acquired and analyzed for key accessibility traits such as speech and other audio output, tactual nature of control buttons, and the quality of visual displays. It was also determined whether or not a blind or visually impaired person could independently complete tasks such as programming the IP for insulin delivery, replacing batteries, and reading manuals and other documentation. It was found that IPs have not improved in accessibility since 2004. None have speech output, and with the exception of the Animas IR 2020, no significantly improved visual display characteristics were found. Documentation is still not completely accessible. Insulin pumps are relatively complex devices, with serious health consequences resulting from improper use. For IPs to be used safely and independently by blind and visually impaired patients, they must include voice output to communicate all the information presented on their display screens. Enhancing display contrast and the size of the displayed information would also improve accessibility for visually impaired users. The IPs must also come with accessible user documentation in alternate formats. 2009 Diabetes Technology Society.
FTTH: the overview of existing technologies
NASA Astrophysics Data System (ADS)
Nowak, Dawid; Murphy, John
2005-06-01
The growing popularity of the Internet is the key driver behind the development of new access methods which would enable a customer to experience a true broadband. Amongst various technologies, the access methods based on the optical fiber are getting more and more attention as they offer the ultimate solution in delivering different services to the customers' premises. Three different architectures have been proposed that facilitate the roll out of Fiber-to-the-Home (FTTH) infrastructure. Point-to-point Ethernet networks are the most straightforward and already matured solution. Different flavors of Passive Optical Networks (PONs) with Time Division Multiplexing Access (TDMA) are getting more widespread as necessary equipment is becoming available on the market. The third main contender are PONs withWavelength DivisionMultiplexing Access (WDMA). Although still in their infancy, the laboratory tests show that they have many advantages over present solutions. In this paper we show a brief comparison of these three access methods. In our analysis the architecture of each solution is presented. The applicability of each system is looked at from different viewpoint and their advantages and disadvantages are highlighted.
Nkosi, Z Z; Asah, F; Pillay, P
2011-10-01
Nurses are exposed to the changing demands in technology as they execute their patient-related duties in the workplace. Integration of Information Technology (IT) in healthcare systems improves the quality of care provided. Nursing students with prior exposure to computers tend to have a positive influence IT. A descriptive study design using a quantitative approach and structured questionnaire was used to measure the nurses' attitudes towards computer usage. A census of 45 post-basic first year nursing management students were participated in this study. The students demonstrated a positive attitude towards the use of a computer. But access to and use of a computer and IT was limited and nurses in clinics had no access to IT. A lack of computer skills was identified as a factor that hinders access to IT. Nursing students agreed that computer literacy should be included in the curriculum to allow them to become independent computer users. The Department of Health should have IT in all health-care facilities and also train all health-care workers to use IT. With the positive attitudes expressed by the students, nurse managers need to create a conducive environment to ensure such a positive attitude continues to excel. © 2011 Blackwell Publishing Ltd.
Delivering on the promise of Plato's academy: educational accessibility for the 21st century.
Wheatly, Michele G; Flach, John; Shingledecker, Clark; Golshani, Forouzan
2010-01-01
This special volume is dedicated to eight updated and expanded communications selected from 33 refereed papers presented at the inaugural international conference on Technology-based Learning with Disability (LWD-07) which took place on July 19-20, 2007 at Wright State University in Dayton, Ohio. Approximately 140 researchers and practitioners attended LWD-07 representing a cross-section of K-12 and higher education, pure and applied research, disability-related industry and rehabilitation agencies with common interests in facilitating educational attainment for people with all types of disabilities through use of technology. The communications selected for publication are representative of the breadth of interest at the nexus of disability, assistive technology, and the pedagogy of individualized learning. Access to education is a key component for quality of life and rehabilitation of any individual with a disability.
Key technologies and concepts for beyond-3G networks
NASA Astrophysics Data System (ADS)
Pehkonen, Kari; Uskela, Sami; Kalliojarvi, Kari; Oksanen, Lauri; Rikkinen, Kari
2001-10-01
Standardization of 3rd Generation (3G) mobile communication systems has produced the first specification releases and the commercial deployment of the 3G systems has started. Whereas 1G and 2G focused on efficiently providing voice services, in 3G a lot of attention has been devoted to solutions that support both Circuit Switched (CS) and Packet Switched (PS) communication. That has called for very flexible air interface and network solutions. 3G will continue to evolve and there are already on-going standardization activities that will, for example, boost the peak data rates up to 5-10 Mbps and improve spectral efficiency by 2-4 times. In the future, 3G evolution will be going towards 10/100 Mbps peak data rates in wide/local are coverage, respectively. This will take place partly because of technical improvements of 3G radio interface solutions, but also due to network evolution which will allow the integration other radio access methods like radio LANs into the 3G system. In longer term the 3G network evolution will be going towards ALL-IP networks. As 3G evolution seems to be going towards 10 Mbps/100 Mbps peak data rates and ALL-IP networks any beyond 3G air interface or network solution should be clearly better in order to justify its technical and commercial feasibility. Given the long evolution time of 3G and integration of other radio access schemes with 3G radio we may not even see a new, complete beyond 3G system being developed. Maybe we will just witness the emergence of a new, more advanced radio access solution which will then be connected to the evolving 3G network. As 3G evolution will continue for several years to come the research targets for any beyond 3G solutions must be set very high. When it comes to air interface, we should aim at 100 Mbps peak data rates for wide area access with high mobility, and at 1 Gbps for local area access with low mobility. Regarding possible commercial launches of any beyond 3G systems or solutions they could then
ERIC Educational Resources Information Center
Missouri Univ., Columbia. Dept. of Practical Arts and Vocational-Technical Education.
This document contains business and office occupations-related materials to help teachers and parents teach access skills to Missouri junior high and high school special needs students who want to pursue a vocational program in secretarial and office technology, bookkeeping, accounting, and payroll, or data entry. Access skills are defined as…
Key Emerging Technologies for Postsecondary Education
ERIC Educational Resources Information Center
Johnson, Laurence F.; Levine, Alan; Smith, Rachel S.; Haywood, Keene
2010-01-01
The annual "Horizon Report" describes the continuing work of the New Media Consortium's Horizon Project, a qualitative research project established in 2002 that identifies and describes emerging technologies likely to have a large impact on teaching, learning, or creative inquiry on college and university campuses within the next five years. The…
Key Emerging Technologies for Postsecondary Education
ERIC Educational Resources Information Center
Johnson, Laurence F.; Levine, Alan; Smith, Rachel S.; Haywood, Keene
2010-01-01
The annual "Horizon Report" describes the continuing work of the New Media Consortium's Horizon Project, a qualitative research project established in 2002 that identifies and describes emerging technologies likely to have a large impact on teaching, learning, or creative inquiry on college and university campuses within the next five years. This…
Gossett, Andrea; Mirza, Mansha; Barnds, Ann Kathleen; Feidt, Daisy
2009-11-01
A growing emphasis has been placed on providing equal opportunities for all people, particularly people with disabilities, to support participation. Barriers to participation are represented in part by physical space restrictions. This article explores the decision-making process during the construction of a new office building housing a disability-rights organization. The building project featured in this study was developed on the principles of universal design, maximal accessibility, and sustainability to support access and participation. A qualitative case study approach was used involving collection of data through in-depth interviews with key decision-makers; non-participant observations at design meetings; and on-site tours. Qualitative thematic analysis along with the development of a classification system was used to understand specific building elements and the relevant decision processes from which they resulted. Recording and analyzing the design process revealed several key issues including grassroots involvement of stakeholders; interaction between universal design and sustainable design; addressing diversity through flexibility and universality; and segregationist accessibility versus universal design. This case study revealed complex interactions between accessibility, universal design, and sustainability. Two visual models were proposed to understand and analyze these complexities.
ERIC Educational Resources Information Center
McCain, Mary L.
2009-01-01
There is a highly compelling case for using technology on a large scale to increase access to and improve America's adult education and workforce skills enterprise. By the reckoning of the National Commission on Adult Literacy and others, the nation must reach many more millions of adults with effective college- and job-readiness skills programs…
Server-Controlled Identity-Based Authenticated Key Exchange
NASA Astrophysics Data System (ADS)
Guo, Hua; Mu, Yi; Zhang, Xiyong; Li, Zhoujun
We present a threshold identity-based authenticated key exchange protocol that can be applied to an authenticated server-controlled gateway-user key exchange. The objective is to allow a user and a gateway to establish a shared session key with the permission of the back-end servers, while the back-end servers cannot obtain any information about the established session key. Our protocol has potential applications in strong access control of confidential resources. In particular, our protocol possesses the semantic security and demonstrates several highly-desirable security properties such as key privacy and transparency. We prove the security of the protocol based on the Bilinear Diffie-Hellman assumption in the random oracle model.
Enabling Dedicated, Affordable Space Access Through Aggressive Technology Maturation
NASA Technical Reports Server (NTRS)
Jones, Jonathan; Kibbey, Tim; Lampton, Pat; Brown, Thomas
2014-01-01
demonstration in laboratory and flight environments. This effort will provide the framework to mature both on-orbit and earth-to-orbit avionics and propulsion technologies while also providing dedicated, affordable access to LEO for cubesat class payloads.
Supporting the spread of health technology in community services.
Sitton-Kent, Lucy; Humphreys, Catriona; Miller, Phillip
2018-03-02
Health technology has been proposed as a route to financial savings and improved patient safety for many years within the NHS. Nurses have a key role to play in transforming care through such technology but, despite high-level endorsement, implementation of health technology has been uneven across NHS community services. This article looks at three promising applications of health technology in community nursing: mobile access to digital care records; digital imaging; and remote face-to-face consultations. Current evidence for these technologies gives some indication of what is required before health technologies can benefit patients. Rapidly changing health technologies make it difficult for community services to make fully informed decisions when implementing them. There are challenges in predicting the full financial and efficiency impacts, in making robust estimates of costs and workload implications and in anticipating the effects on patient care and staff experience. Despite these problems, there is mounting evidence of the benefits of technological innovations available to community nurses and their patients.
ERIC Educational Resources Information Center
Dean, Peter J.
1993-01-01
Provides a review of the key ethical theories and relevant empirical research relating to the practice of human performance technology. Topics addressed include ethics, morals, business ethics, ethics officers, empiricism versus normative ethical theory, consequentialism, utilitarianism, nonconsequentialism, Kohlberg model of cognitive moral…
Leadership for Access to Technology-Based Assessments
ERIC Educational Resources Information Center
Christensen, Laurene L.; Rogers, Christopher M.
2013-01-01
In this brave new world of education that has so much technology in it, there are many questions educational leaders must consider: (1) How can educational leaders keep up with the changes in technologies with educational applications? (2) How can technologies be used to level the playing field for students with disabilities, English language…
Access to Data Accelerates Innovation and Adoption of Geothermal
Technologies | News | NREL Access to Data Accelerates Innovation and Adoption of Geothermal Technologies Access to Data Accelerates Innovation and Adoption of Geothermal Technologies May 18, 2018 A map of the continental U.S. is overlaid with a colored map showing deep geothermal heat potential. NREL's
Ramsey, Alex
2015-01-01
The past decade has witnessed revolutionary changes to the delivery of health services, ushered in to a great extent by the introduction of electronic health record systems. More recently, a new class of technological advancements—technology-based behavioral health interventions, which involve the delivery of evidence-informed practices via computers, web-based applications, mobile phones, wearable sensors, or other technological platforms—has emerged and is primed to once again radically shift current models for behavioral healthcare. Despite the promise and potential of these new therapeutic approaches, a greater understanding of the impact of technology-based interventions on cornerstone issues of mental health and addiction services—namely access, quality, and cost—is needed. The current review highlights 1) relevant conceptual frameworks that guide this area of research, 2) key studies that inform the relevance of technology-based interventions for behavioral healthcare access, quality, and cost, 3) pressing methodological issues that require attention, 4) unresolved questions that warrant further investigation, and 5) practical implications that underscore important new directions for this emerging area of research. PMID:26161047
Ramsey, Alex
2015-08-01
The past decade has witnessed revolutionary changes to the delivery of health services, ushered in to a great extent by the introduction of electronic health record systems. More recently, a new class of technological advancements-technology-based behavioral health interventions, which involve the delivery of evidence-informed practices via computers, web-based applications, mobile phones, wearable sensors, or other technological platforms-has emerged and is primed to once again radically shift current models for behavioral healthcare. Despite the promise and potential of these new therapeutic approaches, a greater understanding of the impact of technology-based interventions on cornerstone issues of mental health and addiction services-namely access, quality, and cost -is needed. The current review highlights 1) relevant conceptual frameworks that guide this area of research, 2) key studies that inform the relevance of technology-based interventions for behavioral healthcare access, quality, and cost, 3) pressing methodological issues that require attention, 4) unresolved questions that warrant further investigation, and 5) practical implications that underscore important new directions for this emerging area of research.
Public perceptions of key performance indicators of healthcare in Alberta, Canada.
Northcott, Herbert C; Harvey, Michael D
2012-06-01
To examine the relationship between public perceptions of key performance indicators assessing various aspects of the health-care system. Cross-sequential survey research. Annual telephone surveys of random samples of adult Albertans selected by random digit dialing and stratified according to age, sex and region (n = 4000 for each survey year). The survey questionnaires included single-item measures of key performance indicators to assess public perceptions of availability, accessibility, quality, outcome and satisfaction with healthcare. Cronbach's α and factor analysis were used to assess the relationship between key performance indicators focusing on the health-care system overall and on a recent interaction with the health-care system. The province of Alberta, Canada during the years 1996-2004. Four thousand adults randomly selected each survey year. Survey questions measuring public perceptions of healthcare availability, accessibility, quality, outcome and satisfaction with healthcare. Factor analysis identified two principal components with key performance indicators focusing on the health system overall loading most strongly on the first component and key performance indicators focusing on the most recent health-care encounter loading most strongly on the second component. Assessments of the quality of care most recently received, accessibility of that care and perceived outcome of care tended to be higher than the more general assessments of overall health system quality and accessibility. Assessments of specific health-care encounters and more general assessments of the overall health-care system, while related, nevertheless comprise separate dimensions for health-care evaluation.
Radical Transparency: Open Access as a Key Concept in Wiki Pedagogy
ERIC Educational Resources Information Center
Baltzersen, Rolf K.
2010-01-01
Educators have just started to use wikis and most of the educational research to date has focused primarily on the use of local wikis with access limitations. There seems to be little research related to how students can contribute in global, transparent wiki communities such as "Wikipedia" and "Wikibooks". The purpose of this…
Space division multiplexing chip-to-chip quantum key distribution.
Bacco, Davide; Ding, Yunhong; Dalgaard, Kjeld; Rottwitt, Karsten; Oxenløwe, Leif Katsuo
2017-09-29
Quantum cryptography is set to become a key technology for future secure communications. However, to get maximum benefit in communication networks, transmission links will need to be shared among several quantum keys for several independent users. Such links will enable switching in quantum network nodes of the quantum keys to their respective destinations. In this paper we present an experimental demonstration of a photonic integrated silicon chip quantum key distribution protocols based on space division multiplexing (SDM), through multicore fiber technology. Parallel and independent quantum keys are obtained, which are useful in crypto-systems and future quantum network.
Key Emerging Technologies for Elementary and Secondary Education
ERIC Educational Resources Information Center
Johnson, Laurence F.; Levine, Alan; Smith, Rachel S.; Haywood, Keene
2010-01-01
The Horizon Report series is the most visible outcome of the New Media Consortium's Horizon Project, an ongoing research effort that identifies and describes emerging technologies likely to have a large impact on teaching, learning, research, or creative expression within education around the globe. The report examines emerging technologies for…
Key Emerging Technologies for Elementary and Secondary Education
ERIC Educational Resources Information Center
Johnson, Laurence F.; Levine, Alan; Smith, Rachel S.; Haywood, Keene
2010-01-01
The "Horizon Report" series is the most visible outcome of the New Media Consortium's Horizon Project, an ongoing research effort that identifies and describes emerging technologies likely to have a large impact on teaching, learning, research, or creative expression within education around the globe. The report examines emerging technologies for…
ERIC Educational Resources Information Center
Goble, Don
2009-01-01
This article describes the many learning opportunities that broadcast technology students at Ladue Horton Watkins High School in St. Louis, Missouri, experience because of their unique access to technology and methods of learning. Through scaffolding, stepladder techniques, and trial by fire, students learn to produce multiple television programs,…
Baumel, Amit; Baker, Justin; Birnbaum, Michael L; Christensen, Helen; De Choudhury, Munmun; Mohr, David C; Muench, Fred; Schlosser, Danielle; Titov, Nick; Kane, John M
2018-05-01
Technology provides an unparalleled opportunity to remove barriers to earlier identification and engagement in services for mental and addictive disorders by reaching people earlier in the course of illness and providing links to just-in-time, cost-effective interventions. Achieving this opportunity, however, requires stakeholders to challenge underlying assumptions about traditional pathways to mental health care. In this Open Forum, the authors highlight key issues discussed in the Technology for Early Awareness of Addiction and Mental Illness (TEAAM-I) meeting-held October 13-14, 2016, in New York City-that are related to three identified areas in which technology provides important and unique opportunities to advance early identification, increase service engagement, and decrease the duration of untreated mental and addictive disorders.
Information Theoretic Secret Key Generation: Structured Codes and Tree Packing
ERIC Educational Resources Information Center
Nitinawarat, Sirin
2010-01-01
This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…
Wozney, Lori; Newton, Amanda S; Gehring, Nicole D; Bennett, Kathryn; Huguet, Anna; Hartling, Lisa; Dyson, Michele P; McGrath, Patrick
2017-06-02
The use of technology such as computers, tablets, and smartphones to improve access to and the delivery of mental health care (eMental Health care) is growing worldwide. However, despite the rapidly expanding evidence base demonstrating the efficacy of eMental Health care, its implementation in clinical practice and health care systems remains fragmented. To date, no peer-reviewed, key-informant studies have reported on the perspectives of decision-makers concerned with whether and how to implement eMental Health care. From September to November 2015, we conducted 31 interviews with key informants responsible for leadership, policy, research, and/ or information technology in organizations influential in the adoption of technology for eMental Health care. Deductive and inductive thematic analyses of transcripts were conducted using the Behavior Change Wheel as an organizing framework. Frequency and intensity effect sizes were calculated for emerging themes to further explore patterns within the data. Key informant responses (n = 31) representing 6 developed countries and multiple organizations showed consensus on common factors impacting implementation: individual and organizational capacities (e.g., computer literacy skills [patients and providers], knowledge gaps about cyber security, limited knowledge of available services); motivational drivers of technology-based care (e.g., extending care, data analytics); and opportunities for health systems to advance eMental Health care implementation (e.g., intersectoral research, rapid testing cycles, sustainable funding). Frequency effect sizes showed strong associations between implementation and credibility, knowledge, workflow, patient empowerment, electronic medical record (EMR) integration, sustained funding and intersectoral networks. Intensity effect sizes showed the highest concentration of statements (>10% of all comments) related to funding, credibility, knowledge gaps, and patient empowerment. This study
Enabling Communication and Navigation Technologies for Future Near Earth Science Missions
NASA Technical Reports Server (NTRS)
Israel, David J.; Heckler, Gregory; Menrad, Robert; Hudiburg, John; Boroson, Don; Robinson, Bryan; Cornwell, Donald
2016-01-01
In 2015, the Earth Regimes Network Evolution Study (ERNESt) proposed an architectural concept and technologies that evolve to enable space science and exploration missions out to the 2040 timeframe. The architectural concept evolves the current instantiations of the Near Earth Network and Space Network with new technologies to provide a global communication and navigation network that provides communication and navigation services to a wide range of space users in the near Earth domain. The technologies included High Rate Optical Communications, Optical Multiple Access (OMA), Delay Tolerant Networking (DTN), User Initiated Services (UIS), and advanced Position, Navigation, and Timing technology. This paper describes the key technologies and their current technology readiness levels. Examples of science missions that could be enabled by the technologies and the projected operational benefits of the architecture concept to missions are also described.
Yang, Shu; Qiu, Yuyan; Shi, Bo
2016-09-01
This paper explores the methods of building the internet of things of a regional ECG monitoring, focused on the implementation of ECG monitoring center based on cloud computing platform. It analyzes implementation principles of automatic identifi cation in the types of arrhythmia. It also studies the system architecture and key techniques of cloud computing platform, including server load balancing technology, reliable storage of massive smalfi les and the implications of quick search function.
Introducing an AT Passport: A Key to Managing Transitions Across the Lifespan.
Long, Siobhán; Banes, David; O'Donnell, Joan; Richardson, Pierce
2017-01-01
The service delivery of Assistive Technology for access to information and communications technology is frequently fragmented and inconsistent as evidenced by experience in the US and much of Europe (AAATE 2012). AT users can experience hiatuses in their access to appropriate assistive technologies as they transition from home to education, to employment and in the community. An AT Passport can provide a record of Assistive Technology requirement and use across the lifespan.
Mobile technologies and the holistic management of chronic diseases.
Mirza, Farhaan; Norris, Tony; Stockdale, Rosemary
2008-12-01
Ageing populations and unhealthy lifestyles have led to some chronic conditions such as diabetes and heart disease reaching epidemic proportions in many developed nations. This paper explores the potential of mobile technologies to improve this situation. The pervasive nature of these technologies can contribute holistically across the whole spectrum of chronic care ranging from public information access and awareness, through monitoring and treatment of chronic disease, to support for patient carers. A related study to determine the perceptions of healthcare providers to m-health confirmed the view that attitudes were likely to be more important barriers to progress than technology. A key finding concerned the importance of seamless and integrated m-health processes across the spectrum of chronic disease management.
EPA is committed to making its websites and other electronic and information technology (EIT) accessible to the widest possible audience, including people with disabilities, in accordance with Section 508 of the Rehabilitation Act.
NASA Astrophysics Data System (ADS)
Ma, Yi; Zhang, Jie; Zhang, Jingyu
2016-01-01
The coastal wetland, a transitional zone between terrestrial ecosystems and marine ecosystems, is the type of great value to ecosystem services. For the recent 3 decades, area of the coastal wetland is decreasing and the ecological function is gradually degraded with the rapid development of economy, which restricts the sustainable development of economy and society in the coastal areas of China in turn. It is a major demand of the national reality to carry out the monitoring of coastal wetlands, to master the distribution and dynamic change. UAV, namely unmanned aerial vehicle, is a new platform for remote sensing. Compared with the traditional satellite and manned aerial remote sensing, it has the advantage of flexible implementation, no cloud cover, strong initiative and low cost. Image-spectrum merging is one character of high spectral remote sensing. At the same time of imaging, the spectral curve of each pixel is obtained, which is suitable for quantitative remote sensing, fine classification and target detection. Aimed at the frontier and hotspot of remote sensing monitoring technology, and faced the demand of the coastal wetland monitoring, this paper used UAV and the new remote sensor of high spectral imaging instrument to carry out the analysis of the key technologies of monitoring coastal wetlands by UAV on the basis of the current situation in overseas and domestic and the analysis of developing trend. According to the characteristic of airborne hyperspectral data on UAV, that is "three high and one many", the key technology research that should develop are promoted as follows: 1) the atmosphere correction of the UAV hyperspectral in coastal wetlands under the circumstance of complex underlying surface and variable geometry, 2) the best observation scale and scale transformation method of the UAV platform while monitoring the coastal wetland features, 3) the classification and detection method of typical features with high precision from multi scale
Estevez, Claudio; Kailas, Aravind
2012-01-01
Millimeter-wave technology shows high potential for future wireless personal area networks, reaching over 1 Gbps transmissions using simple modulation techniques. Current specifications consider dividing the spectrum into effortlessly separable spectrum ranges. These low requirements open a research area in time and space multiplexing techniques for millimeter-waves. In this work a process-stacking multiplexing access algorithm is designed for single channel operation. The concept is intuitive, but its implementation is not trivial. The key to stacking single channel events is to operate while simultaneously obtaining and handling a-posteriori time-frame information of scheduled events. This information is used to shift a global time pointer that the wireless access point manages and uses to synchronize all serviced nodes. The performance of the proposed multiplexing access technique is lower bounded by the performance of legacy TDMA and can significantly improve the effective throughput. Work is validated by simulation results.
Improving access to learning in the workplace using technology in an accredited course.
Munro, Kathleen M; Peacock, Susi
2005-03-01
This article gives an account of a case study which seeks to explore the potential for using technology to deliver learning in the workplace: a syringe driver course for nurses. We provide a brief overview of workplace learning, continuing professional development and learning technology in the health sciences. The paper then draws upon a three-year project that involved the transition of a traditionally taught, institution-based face-to-face course to work-based learning using technology. Through the evaluation and discussion of the case study we address key issues that have emerged, such as, marketing of the product; in our case it was decided that the most cost-effective way to provide the course and recuperate some costs was to accredit the course by the Institution. Registered practitioners in the workplace assess learning and are linked to the quality assurance mechanisms of the Institution. We also consider some of the major barriers to implementation, highlighting critical areas for consideration for those undertaking a similar project. These include the lack of technical knowledge in the Group, which resulted in a steep learning curve for all members. This and numerous iterations of materials (including video and animations) lengthened the project considerably whilst technological advances meant other more sophisticated technological solutions that became available during the production process were incorporated. A cost benefit analysis would show that the product has been delivered across Scotland and production costs covered and that there have been unquantifiable gains, including improving the external profile of the academic institution and the NHS Trust, developing the technical skills of the Group and providing invaluable experience of working in a cross-disciplinary collaborative working environment.
NASA Astrophysics Data System (ADS)
Pathak, S. K.; Deshpande, N. J.
2007-10-01
The present scenario of the INDEST Consortium among engineering, science and technology (including astronomy and astrophysics) libraries in India is discussed. The Indian National Digital Library in Engineering Sciences & Technology (INDEST) Consortium is a major initiative of the Ministry of Human Resource Development, Government of India. The INDEST Consortium provides access to 16 full text e-resources and 7 bibliographic databases for 166 institutions as members who are taking advantage of cost effective access to premier resources in engineering, science and technology, including astronomy and astrophysics. Member institutions can access over 6500 e-journals from 1092 publishers. Out of these, over 150 e-journals are exclusively for the astronomy and physics community. The current study also presents a comparative analysis of the key features of nine major services, viz. ACM Digital Library, ASCE Journals, ASME Journals, EBSCO Databases (Business Source Premier), Elsevier's Science Direct, Emerald Full Text, IEEE/IEE Electronic Library Online (IEL), ProQuest ABI/INFORM and Springer Verlag's Link. In this paper, the limitations of this consortium are also discussed.
Cancer researchers nationwide now have access to the latest technology in the field of cryo-electron microscopy (cryo-EM)—the study of protein structures at atomic resolution—at the Frederick National Lab for Cancer Research. The emerging technol
Under Lock and Key: Preventing Campus Theft of Electronic Equipment.
ERIC Educational Resources Information Center
Harrison, J. Phil
1996-01-01
A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ramuhalli, Pradeep; Hirt, Evelyn H.; Pitman, Stan G.
The harsh environments in advanced reactors (AdvRx) increase the possibility of degradation of safety-critical passive components, and therefore pose a particular challenge for deployment and extended operation of these concepts. Nondestructive evaluation technologies are an essential element for obtaining information on passive component condition in AdvRx, with the development of sensor technologies for nondestructively inspecting AdvRx passive components identified as a key need. Given the challenges posed by AdvRx environments and the potential needs for reducing the burden posed by periodic in-service inspection of hard-to-access and hard-to-replace components, a viable solution may be provided by online condition monitoring of components.more » This report identifies the key challenges that will need to be overcome for sensor development in this context, and documents an experimental plan for sensor development, test, and evaluation. The focus of initial research and development is on sodium fast reactors, with the eventual goal of the research being developing the necessary sensor technology, quantifying sensor survivability and long-term measurement reliability for nondestructively inspecting critical components. Materials for sensor development that are likely to withstand the harsh environments are described, along with a status on the fabrication of reference specimens, and the planned approach for design and evaluation of the sensor and measurement technology.« less
Brian, Leung; Jessica A, Brian; Tom, Chau
2013-09-01
The present descriptive case study documents the behaviours of a child single-switch user in the community setting and draws attention to learning and mastery behaviours as risk factors to single-switch abandonment. Our observations were interpreted in the context of a longer term school-based evaluation of an advanced single-switch access technology with a nine year-old user with severe spastic quadriplegic cerebral palsy. The child completed 25 experiment sessions averaging a rate of three sessions every two weeks. During each session he worked on several blocks of single-switch computer activity using his vocal cord vibration switch. Despite high levels of single-switch sensitivity and specificity that suggested a good fit between the participant and the technology, the participant perceived a lower proficiency level of his own abilities, demonstrated impatience and intolerance to interaction errors, and was apprehensive of making mistakes when using his switch in public. The benefit of gaining some degree of independent physical access might not necessarily enhance resilience to interaction errors or bouts of poor task performance. On the other hand, the participant's behaviours were consistent with those of a typically developing child learning or mastering any new skill or task. Implications for Rehabilitation The attitude and behaviour of a paediatric switch user towards skill development can be risk factors to abandonment of an access technology, despite successful clinical trial with the device. Children with severe disabilities can be associated with the same types of skill development behaviour patterns and achievement motivation as their typically developing peers. Empirical observations of the case participant's switch use behaviours suggest that user training could be adaptive in order to account for individual differences in skill development and achievement motivation.
ERIC Educational Resources Information Center
Dogbey, James; Quigley, Cassie; Che, Megan; Hallo, Jeffrey
2014-01-01
This study engaged key stakeholders in an economically and environmentally fragile region in Kenya in a unique, interdisciplinary, and integrative approach to explore the extent to which the use of smartphone technology helps access the environmental values and sustainability perspectives of the people of the Maasai land. The results of the study…
Leveraging Open Standards and Technologies to Enhance Community Access to Earth Science Lidar Data
NASA Astrophysics Data System (ADS)
Crosby, C. J.; Nandigam, V.; Krishnan, S.; Cowart, C.; Baru, C.; Arrowsmith, R.
2011-12-01
Lidar (Light Detection and Ranging) data, collected from space, airborne and terrestrial platforms, have emerged as an invaluable tool for a variety of Earth science applications ranging from ice sheet monitoring to modeling of earth surface processes. However, lidar present a unique suite of challenges from the perspective of building cyberinfrastructure systems that enable the scientific community to access these valuable research datasets. Lidar data are typically characterized by millions to billions of individual measurements of x,y,z position plus attributes; these "raw" data are also often accompanied by derived raster products and are frequently terabytes in size. As a relatively new and rapidly evolving data collection technology, relevant open data standards and software projects are immature compared to those for other remote sensing platforms. The NSF-funded OpenTopography Facility project has developed an online lidar data access and processing system that co-locates data with on-demand processing tools to enable users to access both raw point cloud data as well as custom derived products and visualizations. OpenTopography is built on a Service Oriented Architecture (SOA) in which applications and data resources are deployed as standards compliant (XML and SOAP) Web services with the open source Opal Toolkit. To develop the underlying applications for data access, filtering and conversion, and various processing tasks, OpenTopography has heavily leveraged existing open source software efforts for both lidar and raster data. Operating on the de facto LAS binary point cloud format (maintained by ASPRS), open source libLAS and LASlib libraries provide OpenTopography data ingestion, query and translation capabilities. Similarly, raster data manipulation is performed through a suite of services built on the Geospatial Data Abstraction Library (GDAL). OpenTopography has also developed our own algorithm for high-performance gridding of lidar point cloud data
Study on Global GIS architecture and its key technologies
NASA Astrophysics Data System (ADS)
Cheng, Chengqi; Guan, Li; Lv, Xuefeng
2009-09-01
Global GIS (G2IS) is a system, which supports the huge data process and the global direct manipulation on global grid based on spheroid or ellipsoid surface. Based on global subdivision grid (GSG), Global GIS architecture is presented in this paper, taking advantage of computer cluster theory, the space-time integration technology and the virtual reality technology. Global GIS system architecture is composed of five layers, including data storage layer, data representation layer, network and cluster layer, data management layer and data application layer. Thereinto, it is designed that functions of four-level protocol framework and three-layer data management pattern of Global GIS based on organization, management and publication of spatial information in this architecture. Three kinds of core supportive technologies, which are computer cluster theory, the space-time integration technology and the virtual reality technology, and its application pattern in the Global GIS are introduced in detail. The primary ideas of Global GIS in this paper will be an important development tendency of GIS.
Study on Global GIS architecture and its key technologies
NASA Astrophysics Data System (ADS)
Cheng, Chengqi; Guan, Li; Lv, Xuefeng
2010-11-01
Global GIS (G2IS) is a system, which supports the huge data process and the global direct manipulation on global grid based on spheroid or ellipsoid surface. Based on global subdivision grid (GSG), Global GIS architecture is presented in this paper, taking advantage of computer cluster theory, the space-time integration technology and the virtual reality technology. Global GIS system architecture is composed of five layers, including data storage layer, data representation layer, network and cluster layer, data management layer and data application layer. Thereinto, it is designed that functions of four-level protocol framework and three-layer data management pattern of Global GIS based on organization, management and publication of spatial information in this architecture. Three kinds of core supportive technologies, which are computer cluster theory, the space-time integration technology and the virtual reality technology, and its application pattern in the Global GIS are introduced in detail. The primary ideas of Global GIS in this paper will be an important development tendency of GIS.
Statistical Inference and Simulation with StatKey
ERIC Educational Resources Information Center
Quinn, Anne
2016-01-01
While looking for an inexpensive technology package to help students in statistics classes, the author found StatKey, a free Web-based app. Not only is StatKey useful for students' year-end projects, but it is also valuable for helping students learn fundamental content such as the central limit theorem. Using StatKey, students can engage in…
Big Data Discovery and Access Services through NOAA OneStop
NASA Astrophysics Data System (ADS)
Casey, K. S.; Neufeld, D.; Ritchey, N. A.; Relph, J.; Fischman, D.; Baldwin, R.
2017-12-01
The NOAA OneStop Project was created as a pathfinder effort to to improve the discovery of, access to, and usability of NOAA's vast and diverse collection of big data. OneStop is led by the NOAA/NESDIS National Centers for Environmental Information (NCEI), and is seen as a key NESDIS contribution to NOAA's open data and data stewardship efforts. OneStop consists of an entire framework of services, from storage and interoperable access services at the base, through metadata and catalog services in the middle, to a modern user interface experience at the top. Importantly, it is an open framework where external tools and services can connect at whichever level is most appropriate. Since the beta release of the OneStop user interface at the 2016 Fall AGU meeting, significant progress has been made improving and modernizing many NOAA data collections to optimize their use within the framework. In addition, OneStop has made progress implementing robust metadata management and catalog systems at the collection and granule level and improving the user experience with the web interface. This progress will be summarized and the results of extensive user testing including professional usability studies will be reviewed. Key big data technologies supporting the framework will be presented and a community input sought on the future directions of the OneStop Project.
Five Steps to an Accessible Classroom Website
ERIC Educational Resources Information Center
Amundson, Linda
2009-01-01
When teachers or technology coordinators publish a website, they are providing a product for a diverse group of people. That's why website design should follow accessibility guidelines. Websites should be accessible to those with visual, hearing, movement, cognitive, and speech disabilities. Good design means greater accessibility for all. This…
Automatically Producing Accessible Learning Objects
ERIC Educational Resources Information Center
Di Iorio, Angelo; Feliziani, Antonio Angelo; Mirri, Silvia; Salomoni, Paola; Vitali, Fabio
2006-01-01
The "Anywhere, Anytime, Anyway" slogan is frequently associated to e-learning with the aim to emphasize the wide access offered by on-line education. Otherwise, learning materials are currently created to be used with a specific technology or configuration, leaving out from the virtual classroom students who have limited access capabilities and,…
Accessing key steps of human tumor progression in vivo by using an avian embryo model
NASA Astrophysics Data System (ADS)
Hagedorn, Martin; Javerzat, Sophie; Gilges, Delphine; Meyre, Aurélie; de Lafarge, Benjamin; Eichmann, Anne; Bikfalvi, Andreas
2005-02-01
Experimental in vivo tumor models are essential for comprehending the dynamic process of human cancer progression, identifying therapeutic targets, and evaluating antitumor drugs. However, current rodent models are limited by high costs, long experimental duration, variability, restricted accessibility to the tumor, and major ethical concerns. To avoid these shortcomings, we investigated whether tumor growth on the chick chorio-allantoic membrane after human glioblastoma cell grafting would replicate characteristics of the human disease. Avascular tumors consistently formed within 2 days, then progressed through vascular endothelial growth factor receptor 2-dependent angiogenesis, associated with hemorrhage, necrosis, and peritumoral edema. Blocking of vascular endothelial growth factor receptor 2 and platelet-derived growth factor receptor signaling pathways by using small-molecule receptor tyrosine kinase inhibitors abrogated tumor development. Gene regulation during the angiogenic switch was analyzed by oligonucleotide microarrays. Defined sample selection for gene profiling permitted identification of regulated genes whose functions are associated mainly with tumor vascularization and growth. Furthermore, expression of known tumor progression genes identified in the screen (IL-6 and cysteine-rich angiogenic inducer 61) as well as potential regulators (lumican and F-box-only 6) follow similar patterns in patient glioma. The model reliably simulates key features of human glioma growth in a few days and thus could considerably increase the speed and efficacy of research on human tumor progression and preclinical drug screening. angiogenesis | animal model alternatives | glioblastoma
Technology platforms for remote monitoring of vital signs in the new era of telemedicine.
Zhao, Fang; Li, Meng; Tsien, Joe Z
2015-07-01
Driven by healthcare cost and home healthcare need, the development of remote monitoring technologies is poised to improve and revolutionize healthcare delivery and accessibility. This paper reviews the recent progress in the field of remote monitoring technologies that may have the potential to become the basic platforms for telemedicine. In particular, key techniques and devices for monitoring cardiorespiratory activity, blood pressure and blood glucose concentration are summarized and discussed. In addition, the US FDA approved remote vital signs monitoring devices currently available on the market are presented.
NASA Astrophysics Data System (ADS)
Meyer, K.; Malin, R.; Rich, R. L.; Pierce, S. A.
2011-12-01
Shortening the cycle from data collection to research publications is a competitive advantage for researchers. Existing technologies for inventory systems such as UPC barcoding systems can be coupled with flexible mobile or handheld devices to advance efficiency, productivity, automation, and integrity in data flows, from data collection to sample processing to database management and analysis, and finally publication. At the University of Texas, the Data Flow Infrastructure Initiative (DFII) has introduced handheld devices with integrated barcode scanners as a mechanism to enhance research productivity and information access. These devices are established technology and provide a flexible but consistent platform for research data collection and data management. They are not in widespread use yet in the research community. Additional application benefits will accrue by using handheld devices to deliver data on demand in teaching applications. Introducing research scientists, graduate students, and the UT community to the merits and flexibility of these data collection technologies will provide avenues for innovation as well as improving efficiency. The objective of this project is to bring the technology and expertise with handheld systems to a diverse set of pilot projects and establish proficiency at The University of Texas at Austin necessary for widespread application. We have implemented a pilot project in three research labs covering the fields of microbial ecology, water resources decision support, and biogeochemistry to introduce these technologies. We used NautizX5 handheld devices that feature: barcode scanning, bluetooth, stylus, and keypad data inputs coupled with Pendragon Forms Software, a program that allows users to create custom data collection forms structured into an SQL or Access platform thus allowing concurrent data management, data collection and analysis in field and lab settings. Results include the elimination of most manual data entry
Making Microcomputers Accessible to Blind Persons.
ERIC Educational Resources Information Center
Ruconich, Sandra K.; And Others
1986-01-01
The article considers advantages and limitations of tactile, auditory, and visual means of microcomputer access for blind students. Discussed are electronic braille, paper braille, the Optacon, synthesized speech, and enlarged print. Improved multimedia access technology is predicted for the future. (Author/DB)
Technology Usage of Tennessee Agriculture Teachers
ERIC Educational Resources Information Center
Coley, Michael D.; Warner, Wendy J.; Stair, Kristin S.; Flowers, James L.; Croom, D. Barry
2015-01-01
This study examined the accessibility and use of instructional technologies by agriculture teachers in Tennessee. Data were collected using a survey instrument to investigate teachers' adoption of technology, sources of acquired technology skills, accessibility and use of technological equipment, and barriers to technology integration. The study…
IP access networks with QoS support
NASA Astrophysics Data System (ADS)
Sargento, Susana; Valadas, Rui J. M. T.; Goncalves, Jorge; Sousa, Henrique
2001-07-01
The increasing demand of new services and applications is pushing for drastic changes on the design of access networks targeted mainly for residential and SOHO users. Future access networks will provide full service integration (including multimedia), resource sharing at the packet level and QoS support. It is expected that using IP as the base technology, the ideal plug-and-play scenario, where the management actions of the access network operator are kept to a minimum, will be achieved easily. This paper proposes an architecture for access networks based on layer 2 or layer 3 multiplexers that allows a number of simplifications in the network elements and protocols (e.g. in the routing and addressing functions). We discuss two possible steps in the evolution of access networks towards a more efficient support of IP based services. The first one still provides no QoS support and was designed with the goal of reusing as much as possible current technologies; it is based on tunneling to transport PPP sessions. The second one introduces QoS support through the use of emerging technologies and protocols. We illustrate the different phases of a multimedia Internet access session, when using SIP for session initiation, COPS for the management of QoS policies including the AAA functions and RSVP for resource reservation.
ERIC Educational Resources Information Center
Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Alberti, Gloria; Oliva, Doretta; Megna, Gianfranco; Iliceto, Carla; Damiani, Sabino; Ricci, Irene; Spica, Antonella
2011-01-01
The present two studies extended research evidence on the use of microswitch technology by post-coma persons with multiple disabilities. Specifically, Study I examined whether three adults with a diagnosis of minimally conscious state and multiple disabilities could use microswitches as tools to access brief, selected stimulus events. Study II…
ERIC Educational Resources Information Center
Björk, Bo-Christer; Turk, Žiga
2006-01-01
Introduction: This case study is based on the experiences with the Electronic Journal of Information Technology in Construction (ITcon), founded in 1995. Development: This journal is an example of a particular category of open access journals, which use neither author charges nor subscriptions to finance their operations, but rely largely on…
Mars-Learning AN Open Access Educational Database
NASA Astrophysics Data System (ADS)
Kolankowski, S. M.; Fox, P. A.
2016-12-01
Schools across America have begun focusing more and more on science and technology, giving their students greater opportunities to learn about planetary science and engineering. With the development of rovers and advanced scientific instrumentation, we are learning about Mars' geologic history on a daily basis. These discoveries are crucial to our understanding of Earth and our solar system. By bringing these findings into the classroom, students can learn key concepts about Earth and Planetary sciences while focusing on a relevant current event. However, with an influx of readily accessible information, it is difficult for educators and students to find accurate and relevant material. Mars-Learning seeks to unify these discoveries and resources. This site will provide links to educational resources, software, and blogs with a focus on Mars. Activities will be grouped by grade for the middle and high school levels. Programs and software will be labeled, open access, free, or paid to ensure users have the proper tools to get the information they need. For new educators or those new to the subject, relevant blogs and pre-made lesson plans will be available so instructors can ensure their success. The expectation of Mars-Learning is to provide stress-free access to learning materials that falls within a wide range of curriculum. By providing a thorough and encompassing site, Mars-Learning hopes to further our understanding of the Red Planet and equip students with the knowledge and passion to continue this research.
Uncovering patterns of technology use in consumer health informatics
Hung, Man; Conrad, Jillian; Hon, Shirley D.; Cheng, Christine; Franklin, Jeremy D.; Tang, Philip
2014-01-01
Internet usage and accessibility has grown at a staggering rate, influencing technology use for healthcare purposes. The amount of health information technology (Health IT) available through the Internet is immeasurable and growing daily. Health IT is now seen as a fundamental aspect of patient care as it stimulates patient engagement and encourages personal health management. It is increasingly important to understand consumer health IT patterns including who is using specific technologies, how technologies are accessed, factors associated with use, and perceived benefits. To fully uncover consumer patterns it is imperative to recognize common barriers and which groups they disproportionately affect. Finally, exploring future demand and predictions will expose significant opportunities for health IT. The most frequently used health information technologies by consumers are gathering information online, mobile health (mHealth) technologies, and personal health records (PHRs). Gathering health information online is the favored pathway for healthcare consumers as it is used by more consumers and more frequently than any other technology. In regard to mHealth technologies, minority Americans, compared with White Americans utilize social media, mobile Internet, and mobile applications more frequently. Consumers believe PHRs are the most beneficial health IT. PHR usage is increasing rapidly due to PHR integration with provider health systems and health insurance plans. Key issues that have to be explicitly addressed in health IT are privacy and security concerns, health literacy, unawareness, and usability. Privacy and security concerns are rated the number one reason for the slow rate of health IT adoption. PMID:24904713
Energy access and sustainable development
NASA Astrophysics Data System (ADS)
Kammen, Daniel M.; Alstone, Peter; Gershenson, Dimitry
2015-03-01
With 1.4 billion people lacking electricity to light their homes and provide other basic services, or to conduct business, and all of humanity (and particularly the poor) are in need of a decarbonized energy system can close the energy access gap and protect the global climate system. With particular focus on addressing the energy needs of the underserved, we present an analytical framework informed by historical trends and contemporary technological, social, and institutional conditions that clarifies the heterogeneous continuum of centralized on-grid electricity, autonomous mini- or community grids, and distributed, individual energy services. We find that the current day is a unique moment of innovation in decentralized energy networks based on super-efficient end-use technology and low-cost photovoltaics, supported by rapidly spreading information technology, particularly mobile phones. Collectively these disruptive technology systems could rapidly increase energy access, contributing to meeting the Millennium Development Goals for quality of life, while simultaneously driving action towards low-carbon, Earth-sustaining, energy systems.
Souliotis, Kyriakos; Hasardzhiev, Stanimir; Agapidaki, Eirini
Research evidence suggests that access to health care is the key influential factor for improved population health outcomes and health care system sustainability. Although the importance of addressing barriers in access to health care across European countries is well documented, little has been done to improve the situation. This is due to different definitions, approaches and policies, and partly due to persisting disparities in access within and between European countries. To bridge this gap, the Patient Access Partnership (PACT) developed (a) the '5As' definition of access, which details the five critical elements (adequacy, accessibility, affordability, appropriateness, and availability) of access to health care, (b) a multi-stakeholders' approach for mapping access, and (c) a 13-item questionnaire based on the 5As definition in an effort to address these obstacles and to identify best practices. These tools are expected to contribute effectively to addressing access barriers in practice, by suggesting a common framework and facilitating the exchange of knowledge and expertise, in order to improve access to health care between and within European countries. © 2016 S. Karger AG, Basel.
Planning Multitechnology Access Networks with Performance Constraints
NASA Astrophysics Data System (ADS)
Chamberland, Steven
Considering the number of access network technologies and the investment needed for the “last mile” of a solution, in today’s highly competitive markets, planning tools are crucial for the service providers to optimize the network costs and accelerate the planning process. In this paper, we propose to tackle the problem of planning access networks composed of four technologies/architectures: the digital subscriber line (xDSL) technologies deployed directly from the central office (CO), the fiber-to-the-node (FTTN), the fiber-to-the-micro-node (FTTn) and the fiber-to-the-premises (FTTP). A mathematical programming model is proposed for this planning problem that is solved using a commercial implementation of the branch-and-bound algorithm. Next, a detailed access network planning example is presented followed by a systematic set of experiments designed to assess the performance of the proposed approach.
Learn about CHP technologies, including reciprocating engines, combustion turbines, steam turbines, microturbines, fuel cells, and waste heat to power. Access the Catalog of CHP Technologies and the Biomass CHP Catalog of Technologies.
Key Working for Families with Young Disabled Children
Carter, Bernie; Thomas, Megan
2011-01-01
For families with a disabled child, the usual challenges of family life can be further complicated by the need to access a wide range of services provided by a plethora of professionals and agencies. Key working aims to support children and their families in navigating these complexities ensuring easy access to relevant, high quality, and coordinated care. The aim of this paper is to explore the key worker role in relation to “being a key worker” and “having a key worker”. The data within this paper draw on a larger evaluation study of the Blackpool Early Support Pilot Programme. The qualitative study used an appreciative and narrative approach and utilised mixed methods (interviews, surveys and a nominal group workshop). Data were collected from 43 participants (parents, key workers, and other stakeholders). All stakeholders who had been involved with the service were invited to participate. In the paper we present and discuss the ways in which key working made a difference to the lives of children and their families. We also consider how key working transformed the perspectives of the key workers creating a deeper and richer understanding of family lives and the ways in which other disciplines and agencies worked. Key working contributed to the shift to a much more family-centred approach, and enhanced communication and information sharing between professionals and agencies improved. This resulted in families feeling more informed. Key workers acted in an entrepreneurial fashion, forging new relationships with families and between families and other stakeholders. Parents of young disabled children and their service providers benefited from key working. Much of the benefit accrued came from strong, relational, and social-professional networking which facilitated the embedding of new ways of working into everyday practice. Using an appreciative inquiry approach provided an effective and relevant way of engaging with parents, professionals, and other
Twin-bit via resistive random access memory in 16 nm FinFET logic technologies
NASA Astrophysics Data System (ADS)
Shih, Yi-Hong; Hsu, Meng-Yin; King, Ya-Chin; Lin, Chrong Jung
2018-04-01
A via resistive random access memory (RRAM) cell fully compatible with the standard CMOS logic process has been successfully demonstrated for high-density logic nonvolatile memory (NVM) modules in advanced FinFET circuits. In this new cell, the transition metal layers are formed on both sides of a via, given two storage bits per via. In addition to its compact cell area (1T + 14 nm × 32 nm), the twin-bit via RRAM cell features a low operation voltage, a large read window, good data retention, and excellent cycling capability. As fine alignments between mask layers become possible, the twin-bit via RRAM cell is expected to be highly scalable in advanced FinFET technology.
Formal Analysis of Key Integrity in PKCS#11
NASA Astrophysics Data System (ADS)
Falcone, Andrea; Focardi, Riccardo
PKCS#11 is a standard API to cryptographic devices such as smarcards, hardware security modules and usb crypto-tokens. Though widely adopted, this API has been shown to be prone to attacks in which a malicious user gains access to the sensitive keys stored in the devices. In 2008, Delaune, Kremer and Steel proposed a model to formally reason on this kind of attacks. We extend this model to also describe flaws that are based on integrity violations of the stored keys. In particular, we consider scenarios in which a malicious overwriting of keys might fool honest users into using attacker's own keys, while performing sensitive operations. We further enrich the model with a trusted key mechanism ensuring that only controlled, non-tampered keys are used in cryptographic operations, and we show how this modified API prevents the above mentioned key-replacement attacks.
Hudec, John C.; MacDougall, Steven; Rankin, Elaine
2010-01-01
ABSTRACT OBJECTIVE To examine the effects of advanced access (same-day physician appointments) on patient and provider satisfaction and to determine its association with other variables such as physician income and patient emergency department use. DESIGN Patient satisfaction survey and semistructured interviews with physicians and support staff; analysis of physician medical insurance billings and patient emergency department visits. SETTING Cape Breton, NS. PARTICIPANTS Patients, physicians, and support staff of 3 comparable family physician practices that had not implemented advanced access and an established advanced access practice. MAIN OUTCOME MEASURES Self-reported provider and patient satisfaction, physician office income, and patients’ emergency department use. RESULTS The key benefits of implementation of advanced access were an increase in provider and patient satisfaction levels, same or greater physician office income, and fewer less urgent (triage level 4) and nonurgent (triage level 5) emergency department visits by patients. CONCLUSION Currently within the Central Cape Breton Region, 33% of patients wait 4 or more days for urgent appointments. Findings from this study can be used to enhance primary care physician practice redesign. This research supports many benefits of transitioning to an advanced access model of patient booking. PMID:20944024
Exploration Medical Capability - Technology Watch
NASA Technical Reports Server (NTRS)
Krihak, Michael; Watkins, Sharmila; Barr, Yael; Barsten, Kristina; Fung, Paul; Baumann, David
2011-01-01
The objectives of the Technology Watch process are to identify emerging, high-impact technologies that augment current ExMC development efforts, and to work with academia, industry, and other government agencies to accelerate the development of medical care and research capabilities for the mitigation of potential health issues that could occur during space exploration missions. The establishment of collaborations with these entities is beneficial to technology development, assessment and/or insertion. Such collaborations also further NASA s goal to provide a safe and healthy environment for human exploration. The Tech Watch project addresses requirements and capabilities identified by knowledge and technology gaps that are derived from a discrete set of medical conditions that are most likely to occur on exploration missions. These gaps are addressed through technology readiness level assessments, market surveys, collaborations and distributed innovation opportunities. Ultimately, these gaps need to be closed with respect to exploration missions, and may be achieved through technology development projects. Information management is a key aspect to this process where Tech Watch related meetings, research articles, collaborations and partnerships are tracked by the HRP s Exploration Medical Capabilities (ExMC) Element. In 2011, ExMC will be introducing the Tech Watch external website and evidence wiki that will provide access to ExMC technology and knowledge gaps, technology needs and requirements documents.
Exploring dimensions of access to medical care.
Andersen, R M; McCutcheon, A; Aday, L A; Chiu, G Y; Bell, R
1983-01-01
This paper examines the dimensions of the access concept with particular attention to the extent to which more parsimonious indicators of access can be developed. This process is especially useful to health policy makers, planners and researchers in need of cost-effective social indicators of access to monitor the need for and impact of innovative health care programs. Three stages of data reduction are used in the analysis, resulting in a reduced set of key indicators of the concept. Implication for subsequent data collection and measurement of access are discussed. PMID:6841113
Makuch, M Y; Bahamondes, L
2012-01-01
In Brazil, access to infertility care, including assisted reproductive technologies (ARTs), is restricted. This is the third report of a study on access to infertility care and ARTs within the public sector, focusing on the barriers to these services. The study was anchored on quantitative and qualitative methods. For the quantitative study interviews were conducted with health authorities in each of the 26 states, the Federal District, the state capitals and 16 cities with ≥ 500,000 inhabitants and directors of infertility referral centres within the public sector. Qualitative case studies-- were conducted in five ART centres. Overall, 63.5% of the authorities reported that complex infertility treatments were unavailable. Barriers identified consisted of "lack of political decision to implement them", and "lack of financial resources". In addition, 75% reported to have "no plans to implement them over the next 12 months". At the facilities offering ART, the barriers to these procedures were the high costs, long waiting times, complex scheduling processes and lack of initiative to implement low cost ARTs. Infertile couples' access to ART procedures is restricted due to the insufficient services and lack of political commitment to support existing and new services..
JPRS Report, Science & Technology, Japan, Key Tech Center Advanced Communications Research
1990-02-26
networks. 27 b. Fuzzy access Even when correct information regarding the connection destination is not available, this makes it possible to establish...a connection based on the stored fuzzy information. c. Logical accessing Makes it possible to effect a connection based on the logical name (indivi...understand fuzzy indications from the user. (b) Normality check tests The following tests should be conducted to check the normality of user- defined services
Research on key technologies of LADAR echo signal simulator
NASA Astrophysics Data System (ADS)
Xu, Rui; Shi, Rui; Ye, Jiansen; Wang, Xin; Li, Zhuo
2015-10-01
LADAR echo signal simulator is one of the most significant components of hardware-in-the-loop (HWIL) simulation systems for LADAR, which is designed to simulate the LADAR return signal in laboratory conditions. The device can provide the laser echo signal of target and background for imaging LADAR systems to test whether it is of good performance. Some key technologies are investigated in this paper. Firstly, the 3D model of typical target is built, and transformed to the data of the target echo signal based on ranging equation and targets reflection characteristics. Then, system model and time series model of LADAR echo signal simulator are established. Some influential factors which could induce fixed delay error and random delay error on the simulated return signals are analyzed. In the simulation system, the signal propagating delay of circuits and the response time of pulsed lasers are belong to fixed delay error. The counting error of digital delay generator, the jitter of system clock and the desynchronized between trigger signal and clock signal are a part of random delay error. Furthermore, these system insertion delays are analyzed quantitatively, and the noisy data are obtained. The target echo signals are got by superimposing of the noisy data and the pure target echo signal. In order to overcome these disadvantageous factors, a method of adjusting the timing diagram of the simulation system is proposed. Finally, the simulated echo signals are processed by using a detection algorithm to complete the 3D model reconstruction of object. The simulation results reveal that the range resolution can be better than 8 cm.
This document describes the key barriers to improving access to safe drinking water and wastewater disposal in Indian country and offers recommendations on how to reduce these barriers to increase access.
Noninvasive Imaging Technologies Reveal Edema Toxin as a Key Virulence Factor in Anthrax
Dumetz, Fabien; Jouvion, Grégory; Khun, Huot; Glomski, Ian Justin; Corre, Jean-Philippe; Rougeaux, Clémence; Tang, Wei-Jen; Mock, Michèle; Huerre, Michel; Goossens, Pierre Louis
2011-01-01
Powerful noninvasive imaging technologies enable real-time tracking of pathogen-host interactions in vivo, giving access to previously elusive events. We visualized the interactions between wild-type Bacillus anthracis and its host during a spore infection through bioluminescence imaging coupled with histology. We show that edema toxin plays a central role in virulence in guinea pigs and during inhalational infection in mice. Edema toxin (ET), but not lethal toxin (LT), markedly modified the patterns of bacterial dissemination leading, to apparent direct dissemination to the spleen and provoking apoptosis of lymphoid cells. Each toxin alone provoked particular histological lesions in the spleen. When ET and LT are produced together during infection, a specific temporal pattern of lesion developed, with early lesions typical of LT, followed at a later stage by lesions typical of ET. Our study provides new insights into the complex spatial and temporal effects of B. anthracis toxins in the infected host, suggesting a greater role than previously suspected for ET in anthrax and suggesting that therapeutic targeting of ET contributes to protection. PMID:21641378
ERIC Educational Resources Information Center
VanBiervliet, Alan; Parette, Howard P., Jr.
The Technology Access for Arkansans (TAARK) project has focused on identifying the need for and quality of technology provisions for the disabled in the state, disseminating information, and developing a state plan. This paper summarizes meetings held by six study groups formed to facilitate the planning process. Each group was assigned a specific…
Continuous-variable quantum key distribution with 1 Mbps secure key rate.
Huang, Duan; Lin, Dakai; Wang, Chao; Liu, Weiqi; Fang, Shuanghong; Peng, Jinye; Huang, Peng; Zeng, Guihua
2015-06-29
We report the first continuous-variable quantum key distribution (CVQKD) experiment to enable the creation of 1 Mbps secure key rate over 25 km standard telecom fiber in a coarse wavelength division multiplexers (CWDM) environment. The result is achieved with two major technological advances: the use of a 1 GHz shot-noise-limited homodyne detector and the implementation of a 50 MHz clock system. The excess noise due to noise photons from local oscillator and classical data channels in CWDM is controlled effectively. We note that the experimental verification of high-bit-rate CVQKD in the multiplexing environment is a significant step closer toward large-scale deployment in fiber networks.
75 FR 75188 - Listening Session Regarding Improving the Accessibility of Government Information
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-02
... technology (EIT) that is accessible. The July memo directs agencies to take stronger steps toward improving the acquisition and implementation of accessible technology. In order to better understand the needs... expressing concerns and proposing ideas. Persons with disabilities, their advocates, technology companies...
Accessing remote data bases using microcomputers
Saul, Peter D.
1985-01-01
General practitioners' access to remote data bases using microcomputers is increasing, making even the most obscure information readily available. Some of the systems available to general practitioners in the UK are described and the methods of access are outlined. General practitioners should be aware of the advances in technology; data bases are increasing in size, the cost of access is falling and their use is becoming easier. PMID:4020756
The burden of rheumatoid arthritis and access to treatment: determinants of access.
Lundqvist, J; Kastäng, F; Kobelt, G; Jönsson, B
2008-01-01
As part of the study "The Burden of Rheumatoid Arthritis (RA) and Patient Access to Treatment", this paper reviews the impact on access to RA drugs of the approval processes, pricing and funding decisions and times to market (access) in different countries. In addition, an overview of health technology assessments (HTA) and the economic literature related to RA treatments is provided. The time from approval to market access ranged from immediate to over 500 days in the countries included in the study. A total of 55 HTA reports were identified, 40 of them in the period between 2002 and 2006; 29 were performed by European HTA agencies, 14 in Canada and 7 in the United States. A total of 239 economic evaluations related to RA were identified in a specialized health economic database (HEED).
Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT
Guo, Yunchuan; Yin, Lihua; Li, Chao
2014-01-01
Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model. PMID:25177731
Spatiotemporal access model based on reputation for the sensing layer of the IoT.
Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan
2014-01-01
Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.
Using Technology to Create and Administer Accessible Tests
ERIC Educational Resources Information Center
Salend, Spencer
2009-01-01
Technology is transforming many aspects of society including the ways teachers teach and students learn. Although technology has been firmly established as a teaching tool across a range of content areas, educators are realizing that technology also offers innovative ways to help their students take standardized tests that comply with the mandates…
Computers, Technology, and Disability. [Update.
ERIC Educational Resources Information Center
American Council on Education, Washington, DC. HEATH Resource Center.
This paper describes programs and resources that focus on access of postsecondary students with disabilities to computers and other forms of technology. Increased access to technological devices and services is provided to students with disabilities under the Technology-Related Assistance for Individuals with Disabilities Act (Tech Act). Section…
Technology Resources: Mathematics Accessibility for All Not Accommodation for Some
ERIC Educational Resources Information Center
Duranczyk, Irene M.
2009-01-01
When faculty and learning assistance staff create teaching documents and web pages envisioning the widest range of users they can save time while achieving access for all. There are tools and techniques available to make mathematics visual, orally, and dynamically more accessible through multimodal presentation forms. Resources from Design…
Public key infrastructure for DOE security research
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aiken, R.; Foster, I.; Johnston, W.E.
This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-keymore » infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.« less
Accessing Electronic Theses: Progress?
ERIC Educational Resources Information Center
Tennant, Roy
2000-01-01
Describes various ways by which universities provide access to their electronic theses and dissertations (ETDs), discussing UMI (University Microfilms International), XML (eXtensible Markup Language), and other formats. Discusses key leaders--national and international--in the ETD effort. Outlines the two main methods for locating ETDs. Presents a…
Tian, He; Chen, Hong-Yu; Ren, Tian-Ling; Li, Cheng; Xue, Qing-Tang; Mohammad, Mohammad Ali; Wu, Can; Yang, Yi; Wong, H-S Philip
2014-06-11
Laser scribing is an attractive reduced graphene oxide (rGO) growth and patterning technology because the process is low-cost, time-efficient, transfer-free, and flexible. Various laser-scribed rGO (LSG) components such as capacitors, gas sensors, and strain sensors have been demonstrated. However, obstacles remain toward practical application of the technology where all the components of a system are fabricated using laser scribing. Memory components, if developed, will substantially broaden the application space of low-cost, flexible electronic systems. For the first time, a low-cost approach to fabricate resistive random access memory (ReRAM) using laser-scribed rGO as the bottom electrode is experimentally demonstrated. The one-step laser scribing technology allows transfer-free rGO synthesis directly on flexible substrates or non-flat substrates. Using this time-efficient laser-scribing technology, the patterning of a memory-array area up to 100 cm(2) can be completed in 25 min. Without requiring the photoresist coating for lithography, the surface of patterned rGO remains as clean as its pristine state. Ag/HfOx/LSG ReRAM using laser-scribing technology is fabricated in this work. Comprehensive electrical characteristics are presented including forming-free behavior, stable switching, reasonable reliability performance and potential for 2-bit storage per memory cell. The results suggest that laser-scribing technology can potentially produce more cost-effective and time-effective rGO-based circuits and systems for practical applications.
Interfaces to PeptideAtlas: a case study of standard data access systems
Handcock, Jeremy; Robinson, Thomas; Deutsch, Eric W.; Boyle, John
2012-01-01
Access to public data sets is important to the scientific community as a resource to develop new experiments or validate new data. Projects such as the PeptideAtlas, Ensembl and The Cancer Genome Atlas (TCGA) offer both access to public data and a repository to share their own data. Access to these data sets is often provided through a web page form and a web service API. Access technologies based on web protocols (e.g. http) have been in use for over a decade and are widely adopted across the industry for a variety of functions (e.g. search, commercial transactions, and social media). Each architecture adapts these technologies to provide users with tools to access and share data. Both commonly used web service technologies (e.g. REST and SOAP), and custom-built solutions over HTTP are utilized in providing access to research data. Providing multiple access points ensures that the community can access the data in the simplest and most effective manner for their particular needs. This article examines three common access mechanisms for web accessible data: BioMart, caBIG, and Google Data Sources. These are illustrated by implementing each over the PeptideAtlas repository and reviewed for their suitability based on specific usages common to research. BioMart, Google Data Sources, and caBIG are each suitable for certain uses. The tradeoffs made in the development of the technology are dependent on the uses each was designed for (e.g. security versus speed). This means that an understanding of specific requirements and tradeoffs is necessary before selecting the access technology. PMID:22941959
An end-to-end secure patient information access card system.
Alkhateeb, A; Singer, H; Yakami, M; Takahashi, T
2000-03-01
The rapid development of the Internet and the increasing interest in Internet-based solutions has promoted the idea of creating Internet-based health information applications. This will force a change in the role of IC cards in healthcare card systems from a data carrier to an access key medium. At the Medical Informatics Department of Kyoto University Hospital we are developing a smart card patient information project where patient databases are accessed via the Internet. Strong end-to-end data encryption is performed via Secure Socket Layers, transparent to transmit patient information. The smart card is playing the crucial role of access key to the database: user authentication is performed internally without ever revealing the actual key. For easy acceptance by healthcare professionals, the user interface is integrated as a plug-in for two familiar Web browsers, Netscape Navigator and MS Internet Explorer.
Training to use a commercial brain-computer interface as access technology: a case study.
Taherian, Sarvnaz; Selitskiy, Dmitry; Pau, James; Davies, T Claire; Owens, R Glynn
2016-01-01
This case study describes how an individual with spastic quadriplegic cerebral palsy was trained over a period of four weeks to use a commercial electroencephalography (EEG)-based brain-computer interface (BCI). The participant spent three sessions exploring the system, and seven sessions playing a game focused on EEG feedback training of left and right arm motor imagery and a customised, training game paradigm was employed. The participant showed improvement in the production of two distinct EEG patterns. The participant's performance was influenced by motivation, fatigue and concentration. Six weeks post-training the participant could still control the BCI and used this to type a sentence using an augmentative and alternative communication application on a wirelessly linked device. The results from this case study highlight the importance of creating a dynamic, relevant and engaging training environment for BCIs. Implications for Rehabilitation Customising a training paradigm to suit the users' interests can influence adherence to assistive technology training. Mood, fatigue, physical illness and motivation influence the usability of a brain-computer interface. Commercial brain-computer interfaces, which require little set up time, may be used as access technology for individuals with severe disabilities.
Technology Literacy: A Key to the New Basic Skills.
ERIC Educational Resources Information Center
Brown, Richard
The United States needs a vocational educational system that delivers, in an applied technological setting, the new basic skills that industry needs, as well as a general education system that provides creative instruction in applied math, physics, and science. To be effective, technological training should encompass, along with machine-specific…
Privacy authentication using key attribute-based encryption in mobile cloud computing
NASA Astrophysics Data System (ADS)
Mohan Kumar, M.; Vijayan, R.
2017-11-01
Mobile Cloud Computing is becoming more popular in nowadays were users of smartphones are getting increased. So, the security level of cloud computing as to be increased. Privacy Authentication using key-attribute based encryption helps the users for business development were the data sharing with the organization using the cloud in a secured manner. In Privacy Authentication the sender of data will have permission to add their receivers to whom the data access provided for others the access denied. In sender application, the user can choose the file which is to be sent to receivers and then that data will be encrypted using Key-attribute based encryption using AES algorithm. In which cipher created, and that stored in Amazon Cloud along with key value and the receiver list.
Makes Key Appointments Staffing for Distributed Energy and Tech Management Announced For more information contact: Gary Schmitz, 303-275-4050 email: Gary Schmitz Golden, Colo., Feb. 28, 2001 - Two reorganized Planning and Technology Management Division. Anthony Schaffhauser has been selected to become
A Systematic Scheme for Multiple Access in Ethernet Passive Optical Access Networks
NASA Astrophysics Data System (ADS)
Ma, Maode; Zhu, Yongqing; Hiang Cheng, Tee
2005-11-01
While backbone networks have experienced substantial changes in the last decade, access networks have not changed much. Recently, passive optical networks (PONs) seem to be ready for commercial deployment as access networks, due to the maturity of a number of enabling technologies. Among the PON technologies, Ethernet PON (EPON) standardized by the IEEE 802.3ah Ethernet in the First Mile (EFM) Task Force is the most attractive one because of its high speed, low cost, familiarity, interoperability, and low overhead. In this paper, we consider the issue of upstream channel sharing in the EPONs. We propose a novel multiple-access control scheme to provide bandwidth-guaranteed service for high-demand customers, while providing best effort service to low-demand customers according to the service level agreement (SLA). The analytical and simulation results prove that the proposed scheme performs best in what it is designed to do compared to another well-known scheme that has not considered providing differentiated services. With business customers preferring premium services with guaranteed bandwidth and residential users preferring low-cost best effort services, our scheme could benefit both groups of subscribers, as well as the operators.
Study on the key technology of grain logistics tracking system
NASA Astrophysics Data System (ADS)
Zhen, Tong; Ge, Hongyi; Jiang, Yuying; Che, Yi
2010-07-01
In recent year, with the rapid development of GIS technology, more and more programming problems depend on the GIS technology and professional model system. The solution of auxiliary programming problem by using GIS technology, which has become very popular. GIS is an important tool and technology, that captures, stores, analyzes, manages, and presents data that are linked to location. A grain logistics distribution system based on GIS is established, which provides a visualization scheme during the process of grain circulation and supports users making decision and analyzing for grain logistics enterprise.
Airframe Research and Technology for Hypersonic Airbreathing Vehicles
NASA Technical Reports Server (NTRS)
Glass, David E.; Merski, N. Ronald; Glass, Christopher E.
2002-01-01
The Hypersonics Investment Area (HIA) within NASA's Advanced Space Transportation Program (ASTP) has the responsibility to develop hypersonic airbreathing vehicles for access to space. The Airframe Research and Technology (AR and T) Project, as one of six projects in the HIA, will push the state-of-the-art in airframe and vehicle systems for low-cost, reliable, and safe space transportation. The individual technologies within the project are focused on advanced, breakthrough technologies in airframe and vehicle systems and cross-cutting activities that are the basis for improvements in these disciplines. Both low and medium technology readiness level (TRL) activities are being pursued. The key technical areas that will be addressed by the project include analysis and design tools, integrated vehicle health management (IVHM), composite (polymer, metal, and ceramic matrix) materials development, thermal/structural wall concepts, thermal protection systems, seals, leading edges, aerothermodynamics, and airframe/propulsion flowpath technology. Each of the technical areas or sub-projects within the Airframe R and T Project is described in this paper.
Does Technology Integration "Work" when Key Barriers Are Removed?
ERIC Educational Resources Information Center
Lowther, Deborah L.; Inan, Fethi A.; Strahl, J. Daniel; Ross, Steven M.
2008-01-01
The effectiveness of Tennessee EdTech Launch (TnETL), a statewide technology program designed to meet the No Child Left Behind (NCLB) mandate, was investigated in this matched treatment-control quasi-experimental study. The goal of the program was to provide full-time, on-site technology coaches to prepare teachers to create lessons that engage…
Accessibility of insulin pumps for blind and visually impaired people.
Uslan, Mark M; Burton, Darren M; Chertow, Bruce S; Collins, Ronda
2004-10-01
Continuous subcutaneous insulin infusion using an insulin pump (IP) more closely mimics the normal pancreas than multiple insulin injections. It is an effective, and often a preferred, means of maintaining normal blood glucose levels, but IPs were not designed to be fully accessible to blind or visually impaired people. This study will identify accessibility issues related to the design of IPs and focus on the key improvements required in the user interface to provide access for people who are blind or visually impaired. IPs that are commercially available were evaluated, and features and functions such as operating procedures, user interface design, and user manuals were tabulated and analyzed. Potential failures and design priorities were identified through a Failure Modes and Effects Analysis (FMEA). Although the IPs do provide some limited audio output, in general, it was found to be of minimal use to people who are blind or visually impaired. None of the IPs uses high-contrast displays with consistently large fonts preferred by people who are visually impaired. User manuals were also found to be of minimal use. Results of the FMEA emphasize the need to focus design improvements on communicating and verifying information so that errors and failures can be detected and corrected. The most important recommendation for future IP development is speech output capability, which, more than any other improvement, would break down accessibility barriers and allow blind and visually impaired people to take advantage of the benefits of IP technology.
Trends in communicative access solutions for children with cerebral palsy.
Myrden, Andrew; Schudlo, Larissa; Weyand, Sabine; Zeyl, Timothy; Chau, Tom
2014-08-01
Access solutions may facilitate communication in children with limited functional speech and motor control. This study reviews current trends in access solution development for children with cerebral palsy, with particular emphasis on the access technology that harnesses a control signal from the user (eg, movement or physiological change) and the output device (eg, augmentative and alternative communication system) whose behavior is modulated by the user's control signal. Access technologies have advanced from simple mechanical switches to machine vision (eg, eye-gaze trackers), inertial sensing, and emerging physiological interfaces that require minimal physical effort. Similarly, output devices have evolved from bulky, dedicated hardware with limited configurability, to platform-agnostic, highly personalized mobile applications. Emerging case studies encourage the consideration of access technology for all nonverbal children with cerebral palsy with at least nascent contingency awareness. However, establishing robust evidence of the effectiveness of the aforementioned advances will require more expansive studies. © The Author(s) 2014.
33 CFR 165.767 - Security Zone; Manbirtee Key, Port of Manatee, Florida.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED ACCESS AREAS Specific Regulated Navigation Areas and Limited Access Areas Seventh Coast Guard District § 165.767 Security Zone; Manbirtee Key, Port of Manatee, Florida. (a) Regulated area. The following area...
NASA Astrophysics Data System (ADS)
Hassan, Waleed K.; Al-Assam, Hisham
2017-05-01
The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.
Optimizing Requirements Decisions with KEYS
NASA Technical Reports Server (NTRS)
Jalali, Omid; Menzies, Tim; Feather, Martin
2008-01-01
Recent work with NASA's Jet Propulsion Laboratory has allowed for external access to five of JPL's real-world requirements models, anonymized to conceal proprietary information, but retaining their computational nature. Experimentation with these models, reported herein, demonstrates a dramatic speedup in the computations performed on them. These models have a well defined goal: select mitigations that retire risks which, in turn, increases the number of attainable requirements. Such a non-linear optimization is a well-studied problem. However identification of not only (a) the optimal solution(s) but also (b) the key factors leading to them is less well studied. Our technique, called KEYS, shows a rapid way of simultaneously identifying the solutions and their key factors. KEYS improves on prior work by several orders of magnitude. Prior experiments with simulated annealing or treatment learning took tens of minutes to hours to terminate. KEYS runs much faster than that; e.g for one model, KEYS ran 13,000 times faster than treatment learning (40 minutes versus 0.18 seconds). Processing these JPL models is a non-linear optimization problem: the fewest mitigations must be selected while achieving the most requirements. Non-linear optimization is a well studied problem. With this paper, we challenge other members of the PROMISE community to improve on our results with other techniques.
Key Reconciliation for High Performance Quantum Key Distribution
Martinez-Mateo, Jesus; Elkouss, David; Martin, Vicente
2013-01-01
Quantum Key Distribution is carving its place among the tools used to secure communications. While a difficult technology, it enjoys benefits that set it apart from the rest, the most prominent is its provable security based on the laws of physics. QKD requires not only the mastering of signals at the quantum level, but also a classical processing to extract a secret-key from them. This postprocessing has been customarily studied in terms of the efficiency, a figure of merit that offers a biased view of the performance of real devices. Here we argue that it is the throughput the significant magnitude in practical QKD, specially in the case of high speed devices, where the differences are more marked, and give some examples contrasting the usual postprocessing schemes with new ones from modern coding theory. A good understanding of its implications is very important for the design of modern QKD devices. PMID:23546440
NASA Astrophysics Data System (ADS)
Bursztyn, N.; Pederson, J. L.; Shelton, B.
2012-12-01
question. The students must answer each question correctly in order to proceed to the next location and accrue points in the game and multiple attempts reduce the number of points earned when the correct answer is found. The questions are either multiple choice or involve touch-screen interaction to identify a specific geologic feature. Initial testing of the prototype game in Historical and Physical geology courses at Utah State University indicate that students enjoy the mobile "exploration" nature of the game as well as experiencing photographs of geologic features rather than traditional cartoons. Qualitative evaluation using anonymous surveys was conducted to help determine the usability of the game and the potential effectiveness of this technology-based approach. Students were asked about the degree of fun and difficulty of the game, content learned, and their overall response to features they liked/disliked about it. The results of these early assessments are positive, both in regard to the improvement of students' understanding of key geology concepts and their enjoyment of learning with the technology in a mobile orienteering manner. This is a positive first step in an innovative teaching tool with the power to overcome the pervasive problem of the boring first year STEM course and make world-class field trips accessible to all.