Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-26
... Verification (EIV) System User Access Authorization Form and Rules of Behavior and User Agreement AGENCY... lists the following information: Title of Proposal: Enterprise Income Verification (EIV) System User Access, Authorization Form and Rules Of Behavior and User Agreement. OMB Approval Number: 2577-New. Form...
75 FR 65387 - Agency Information Collection Activities: Proposed Collections; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-22
..., Application for Employer Reporting Internet Access and Form G-440, Report Specifications Sheet. Form BA-12 is... access is obtained, authorized employees may submit reporting forms to the RRB via the Internet. The form.... Title and Purpose of Information Collection. Railroad Service and Compensation Reports/System Access...
47 CFR 1.20004 - Maintaining secure and accurate records.
Code of Federal Regulations, 2010 CFR
2010-10-01
... access to call-identifying information, made with or without appropriate authorization, in the form of... that the carrier enables the interception of communications or access to call identifying information; (iii) The identity of the law enforcement officer presenting the authorization; (iv) The name of the...
36 CFR 7.82 - Apostle Islands National Lakeshore.
Code of Federal Regulations, 2012 CFR
2012-07-01
... the purpose of providing access for legal forms of: (i) Ice fishing; (ii) Hunting and trapping; (iii... authorized solely for the purpose of providing access for legal forms of: (i) Ice fishing; (ii) Hunting and... park headquarters. (d) Ice augers and power engines. (1) Ice auger means a portable gasoline or...
36 CFR 7.82 - Apostle Islands National Lakeshore.
Code of Federal Regulations, 2010 CFR
2010-07-01
... the purpose of providing access for legal forms of: (i) Ice fishing; (ii) Hunting and trapping; (iii... authorized solely for the purpose of providing access for legal forms of: (i) Ice fishing; (ii) Hunting and... park headquarters. (d) Ice augers and power engines. (1) Ice auger means a portable gasoline or...
36 CFR 7.82 - Apostle Islands National Lakeshore.
Code of Federal Regulations, 2011 CFR
2011-07-01
... the purpose of providing access for legal forms of: (i) Ice fishing; (ii) Hunting and trapping; (iii... authorized solely for the purpose of providing access for legal forms of: (i) Ice fishing; (ii) Hunting and... park headquarters. (d) Ice augers and power engines. (1) Ice auger means a portable gasoline or...
36 CFR 7.82 - Apostle Islands National Lakeshore.
Code of Federal Regulations, 2013 CFR
2013-07-01
... the purpose of providing access for legal forms of: (i) Ice fishing; (ii) Hunting and trapping; (iii... authorized solely for the purpose of providing access for legal forms of: (i) Ice fishing; (ii) Hunting and... park headquarters. (d) Ice augers and power engines. (1) Ice auger means a portable gasoline or...
36 CFR 7.82 - Apostle Islands National Lakeshore.
Code of Federal Regulations, 2014 CFR
2014-07-01
... the purpose of providing access for legal forms of: (i) Ice fishing; (ii) Hunting and trapping; (iii... authorized solely for the purpose of providing access for legal forms of: (i) Ice fishing; (ii) Hunting and... park headquarters. (d) Ice augers and power engines. (1) Ice auger means a portable gasoline or...
48 CFR 401.170 - Electronic access to regulatory information.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false Electronic access to... AGRICULTURE GENERAL AGRICULTURE ACQUISITION REGULATION SYSTEM Purpose, Authority, Issuance 401.170 Electronic... guidance in electronic form. The Internet address for the Procurement Homepage is URL http://www.usda.gov...
48 CFR 401.170 - Electronic access to regulatory information.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false Electronic access to... AGRICULTURE GENERAL AGRICULTURE ACQUISITION REGULATION SYSTEM Purpose, Authority, Issuance 401.170 Electronic... guidance in electronic form. The Internet address for the Procurement Homepage is URL http://www.usda.gov...
48 CFR 401.170 - Electronic access to regulatory information.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Electronic access to... AGRICULTURE GENERAL AGRICULTURE ACQUISITION REGULATION SYSTEM Purpose, Authority, Issuance 401.170 Electronic... guidance in electronic form. The Internet address for the Procurement Homepage is URL http://www.usda.gov...
48 CFR 401.170 - Electronic access to regulatory information.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false Electronic access to... AGRICULTURE GENERAL AGRICULTURE ACQUISITION REGULATION SYSTEM Purpose, Authority, Issuance 401.170 Electronic... guidance in electronic form. The Internet address for the Procurement Homepage is URL http://www.usda.gov...
ERIC Educational Resources Information Center
Nevile, Liddy; McCathieNevile, Charles
This paper argues that a range of forms and modalities of resources should be provided to ensure accessibility and richness on the World Wide Web for all users. Based on experiences in developing virtual exhibitions of Quinkan Aboriginal Rock Art, the authors present a brief overview of the technology available for accessibility. Then they explore…
Policy reconciliation for access control in dynamic cross-enterprise collaborations
NASA Astrophysics Data System (ADS)
Preuveneers, D.; Joosen, W.; Ilie-Zudor, E.
2018-03-01
In dynamic cross-enterprise collaborations, different enterprises form a - possibly temporary - business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.
Alaska Department of Natural Resources
Mineral Property Records Mining Fact Sheets Mining Forms Municipal Entitlements Office Location Survey Plats & Land Records Unorganized Borough Platting Authority Trails & Public Access Index
17 CFR 269.7 - Form ID, uniform application for access codes to file on EDGAR.
Code of Federal Regulations, 2010 CFR
2010-04-01
... on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification Authorization Code (PMAC)—allows a filer, filing agent or training agent to change its Password. [69 FR 22710, Apr... Sections Affected, which appears in the Finding Aids section of the printed volume and on GPO Access. ...
17 CFR 249.446 - Form ID, uniform application for access codes to file on EDGAR.
Code of Federal Regulations, 2010 CFR
2010-04-01
... log on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification Authorization Code (PMAC)—allows a filer, filing agent or training agent to change its Password. [69 FR 22710... Sections Affected, which appears in the Finding Aids section of the printed volume and on GPO Access. ...
Holt, Thomas J; Fitzgerald, Sarah; Bossler, Adam M; Chee, Grace; Ng, Esther
2016-04-01
This study utilized routine activity theory to examine the relationships between online behaviors, target suitability, and cyber and mobile phone-based bullying victimization in a nationally representative sample of youth from nine schools across Singapore. Key measures in all three categories-access to technology, online routine behaviors, and target suitability-were significant predictors of both forms of bullying victimization. In particular, females and victims of physical bullying were more likely to experience both forms of victimization. Access to technology and online routine behaviors predicted cyber and mobile phone-based bullying victimization differently. These findings demonstrate that routine activity theory is a viable framework to understand online bullying in non-Western nations, consistent with the existing literature on Western nations. © The Author(s) 2014.
75 FR 16868 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-02
... access authorization. Personal history information which is submitted on applicants for relevant jobs is... minimized, including the use of automated collection techniques or other forms of information technology? A...
31 CFR 306.95 - Attorneys in fact.
Code of Federal Regulations, 2012 CFR
2012-07-01
... apparent benefit of either will not be accepted unless expressly authorized. (Form PD 1001 or 1003, as appropriate, may be used to appoint an attorney in fact. An attorney in fact may use Form PD 1006 or 1008 to... to by an officer who has access to the records: (1) A copy of the resolution of the governing body...
31 CFR 306.95 - Attorneys in fact.
Code of Federal Regulations, 2014 CFR
2014-07-01
... apparent benefit of either will not be accepted unless expressly authorized. (Form PD 1001 or 1003, as appropriate, may be used to appoint an attorney in fact. An attorney in fact may use Form PD 1006 or 1008 to... to by an officer who has access to the records: (1) A copy of the resolution of the governing body...
31 CFR 306.95 - Attorneys in fact.
Code of Federal Regulations, 2010 CFR
2010-07-01
... apparent benefit of either will not be accepted unless expressly authorized. (Form PD 1001 or 1003, as appropriate, may be used to appoint an attorney in fact. An attorney in fact may use Form PD 1006 or 1008 to... to by an officer who has access to the records: (1) A copy of the resolution of the governing body...
31 CFR 306.95 - Attorneys in fact.
Code of Federal Regulations, 2013 CFR
2013-07-01
... apparent benefit of either will not be accepted unless expressly authorized. (Form PD 1001 or 1003, as appropriate, may be used to appoint an attorney in fact. An attorney in fact may use Form PD 1006 or 1008 to... to by an officer who has access to the records: (1) A copy of the resolution of the governing body...
31 CFR 306.95 - Attorneys in fact.
Code of Federal Regulations, 2011 CFR
2011-07-01
... apparent benefit of either will not be accepted unless expressly authorized. (Form PD 1001 or 1003, as appropriate, may be used to appoint an attorney in fact. An attorney in fact may use Form PD 1006 or 1008 to... to by an officer who has access to the records: (1) A copy of the resolution of the governing body...
Doebler, Stefanie
2016-05-01
This article examines relationships between access to a car and the self-reported health and mental health of older people. The analysis is based on a sample of N = 65,601 individuals aged 65 years and older from the Northern Ireland Longitudinal Study linked to 2001 and 2011 census returns. The findings from hierarchical linear and binary logistic multilevel path models indicate that having no access to a car is related to a considerable health and mental health disadvantage particularly for older people who live alone. Rural-urban health and mental health differences are mediated by access to a car. The findings support approaches that emphasize the importance of autonomy and independence for the well-being of older people and indicate that not having access to a car can be a problem for older people not only in rural but also in intermediate and urban areas, if no sufficient alternative forms of mobility are provided. © The Author(s) 2015.
Does Increasing Textbook Portability Increase Reading Rates or Academic Performance?
ERIC Educational Resources Information Center
Stratton, Georgeana
2011-01-01
Since an alarming number of students do not read their textbooks, the author investigated whether students might more readily review their course information if it were available on MP3 files instead of in textbook form. Her hypotheses are that students who have access to textbook section summaries in MP3 form will cover more of the textbook…
Sills, Eric Scott; Vincent, Tina Thibault; Palermo, Gianpiero D
2005-01-13
Journal of Experimental & Clinical Assisted Reproduction is an Open Access, online, electronic journal published by BioMed Central with full contents available to the scientific and medical community free of charge to all readers. Authors maintain the copyright to their own work, a policy facilitating dissemination of data to the widest possible audience without requiring permission from the publisher. This Open Access publishing model is subsidized by authors (or their institutions/funding agencies) in the form of a single pound330 article processing charge (APC), due at the time of manuscript acceptance for publication. Payment of the APC is not a condition for formal peer review and does not apply to articles rejected after review. Additionally, this fee is waived for authors whose institutions are BioMed Central members or where genuine financial hardship exists. Considering ordinary publication fees related to page charges and reprints, the APC at Journal of Experimental & Clinical Assisted Reproduction is comparable to costs associated with publishing in some traditional print journals, and is less expensive than many. Implementation of the APC within this Open Access framework is envisioned as a modern research-friendly policy that supports networking among investigators, brings new research into reach rapidly, and empowers authors with greater control over their own scholarly publications.
10 CFR 25.15 - Access permitted under “Q” or “L” access authorization.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Access permitted under âQâ or âLâ access authorization. 25.15 Section 25.15 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION Access Authorizations § 25.15 Access permitted under “Q” or “L” access authorization. (a) A “Q” access authorization permits an...
10 CFR 25.15 - Access permitted under “Q” or “L” access authorization.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Access permitted under âQâ or âLâ access authorization. 25.15 Section 25.15 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION Access Authorizations § 25.15 Access permitted under “Q” or “L” access authorization. (a) A “Q” access authorization permits an...
10 CFR 25.15 - Access permitted under “Q” or “L” access authorization.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Access permitted under âQâ or âLâ access authorization. 25.15 Section 25.15 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION Access Authorizations § 25.15 Access permitted under “Q” or “L” access authorization. (a) A “Q” access authorization permits an...
10 CFR 25.15 - Access permitted under “Q” or “L” access authorization.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Access permitted under âQâ or âLâ access authorization. 25.15 Section 25.15 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION Access Authorizations § 25.15 Access permitted under “Q” or “L” access authorization. (a) A “Q” access authorization permits an...
Ittenbach, Richard F; Senft, Elizabeth C; Huang, Guixia; Corsmo, Jeremy J; Sieber, Joan E
2015-12-01
With passage and implementation of the Affordable Health Care Act, more vulnerable segments of the U.S. population will now have access to regular health care and increased opportunities to participate in biomedical research. Yet, access to new groups brings with it new responsibilities for investigators, most importantly, reducing burdens for participants. Data collected through this small pilot study suggest several preliminary but potentially important findings when working with adults from low-income populations: First, while all participants read some parts of the consent forms (55%), only a minority reported reading the entire form (45%); second, 73% of participants reported understanding the study very well whereas only 27% reported understanding the study "a little"; third, there was a slight reported advantage of the simplified form over the regular form; however, this difference varied by section. Relatedly, other research has shown a high incidence of persons reading none of the consent form, but signing a statement that they have read and understood the study. Why does this occur? What are we teaching people when we request that they sign a consent form they have chosen not to read? What are the ethical and regulatory implications? Embedded ethics studies such as this one, although pilot and preliminary in nature, offer a number of advantages, such as stimulating additional scientific inquiry as well as challenging established institutional practices. © The Author(s) 2015.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., password, and any other form(s) of authentication we may require. We will treat any transactions conducted using your password as having been authorized by you. We are not liable for any loss, liability, cost, or expense that you may incur as a result of transactions made using your password. [72 FR 30978...
International activity in the Cochrane Collaboration with particular reference to India.
Allen, Claire; Clarke, Mike; Tharyan, Prathap
2007-01-01
The Cochrane Collaboration is the world's largest organization dedicated to preparing, maintaining and promoting the accessibility of systematic reviews of the effects of healthcare interventions. It is an international organization with participants in more than 100 countries. Since the year 2000, a periodic audit has been done to count the number of active members in Cochrane Review Groups, categorized by the countries in which these people are based. At the beginning of 2007, there were more than 15 800 people involved, an increase from about 5500 in 2000. The South Asian Cochrane Network was formed in 2005 to raise awareness about the Cochrane Collaboration and evidence-based practice in South Asia, support review authors and contributors from countries within the region, promote access to The Cochrane Library and advocate high quality research in South Asia. The growth of activity in India has been dramatic, particularly authors of Cochrane reviews and protocols--from just 19 (with 11 authors) in 2000 to 126 (with 78 authors) in 2007. Increasing the uptake of relevant and reliable evidence in healthcare decisions in India and the South Asian region forms the core of the network's strategic plan. The continued growth of contributors from India and South Asia will help ensure that decisions regarding healthcare in the region are informed by reliable and relevant evidence.
2009-04-16
Report 110-335 accompanying the National Defense Authorization Act for Fiscal Year 2009. The Senate Report required the Comptroller General to... Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per...including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports , 1215 Jefferson Davis
75 FR 28777 - Information Collection; Financial Information Security Request Form
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-24
...;and investigations, committee meetings, agency decisions and rulings, #0;delegations of authority... at the National Finance Center (NFC). The Forest Service uses employees and contractors to maintain these financial records. The employees and contractors must have access to NFC to perform their duties...
An open repository of earthquake-triggered ground-failure inventories
Schmitt, Robert G.; Tanyas, Hakan; Nowicki Jessee, M. Anna; Zhu, Jing; Biegel, Katherine M.; Allstadt, Kate E.; Jibson, Randall W.; Thompson, Eric M.; van Westen, Cees J.; Sato, Hiroshi P.; Wald, David J.; Godt, Jonathan W.; Gorum, Tolga; Xu, Chong; Rathje, Ellen M.; Knudsen, Keith L.
2017-12-20
Earthquake-triggered ground failure, such as landsliding and liquefaction, can contribute significantly to losses, but our current ability to accurately include them in earthquake-hazard analyses is limited. The development of robust and widely applicable models requires access to numerous inventories of ground failures triggered by earthquakes that span a broad range of terrains, shaking characteristics, and climates. We present an openly accessible, centralized earthquake-triggered groundfailure inventory repository in the form of a ScienceBase Community to provide open access to these data with the goal of accelerating research progress. The ScienceBase Community hosts digital inventories created by both U.S. Geological Survey (USGS) and non-USGS authors. We present the original digital inventory files (when available) as well as an integrated database with uniform attributes. We also summarize the mapping methodology and level of completeness as reported by the original author(s) for each inventory. This document describes the steps taken to collect, process, and compile the inventories and the process for adding additional ground-failure inventories to the ScienceBase Community in the future.
Lucivero, Federica
2017-04-01
Increasing numbers of patients have direct access to their electronic health records (EHRs). Proponents of direct access argue that it empowers patients by making them more informed and offering them more control over their health and care. According to some proponents of patients' access to EHRs, clinicians' concerns about potential negative implications are grounded in a form of paternalism that protects clinicians' authority. This paper draws upon narratives from patients in the United Kingdom (UK) who have access to their EHRs and suggests strategies for moving beyond these controversies between proponents and critics of the system. It additionally shows that the very organizational, procedural, and technological infrastructure that promises patients' increased access to records can also exacerbate some patients' "difficult" behaviors. © 2017 American Medical Association. All Rights Reserved.
ERIC Educational Resources Information Center
Pember, Mary Annette
2012-01-01
Partnering with museums and Indiana University, the American Indian Higher Education Consortium (AIHEC) has helped create e-Humanity, an online cultural portal. Launched in June 2011, E-Humanity represents the beginning of a new form of cultural institution, one that will blur the lines between traditional museum authority and collections of…
Saunders, Brian; Lyon, Stephen; Day, Matthew; Riley, Brenda; Chenette, Emily; Subramaniam, Shankar
2008-01-01
The UCSD-Nature Signaling Gateway Molecule Pages (http://www.signaling-gateway.org/molecule) provides essential information on more than 3800 mammalian proteins involved in cellular signaling. The Molecule Pages contain expert-authored and peer-reviewed information based on the published literature, complemented by regularly updated information derived from public data source references and sequence analysis. The expert-authored data includes both a full-text review about the molecule, with citations, and highly structured data for bioinformatics interrogation, including information on protein interactions and states, transitions between states and protein function. The expert-authored pages are anonymously peer reviewed by the Nature Publishing Group. The Molecule Pages data is present in an object-relational database format and is freely accessible to the authors, the reviewers and the public from a web browser that serves as a presentation layer. The Molecule Pages are supported by several applications that along with the database and the interfaces form a multi-tier architecture. The Molecule Pages and the Signaling Gateway are routinely accessed by a very large research community. PMID:17965093
Saunders, Brian; Lyon, Stephen; Day, Matthew; Riley, Brenda; Chenette, Emily; Subramaniam, Shankar; Vadivelu, Ilango
2008-01-01
The UCSD-Nature Signaling Gateway Molecule Pages (http://www.signaling-gateway.org/molecule) provides essential information on more than 3800 mammalian proteins involved in cellular signaling. The Molecule Pages contain expert-authored and peer-reviewed information based on the published literature, complemented by regularly updated information derived from public data source references and sequence analysis. The expert-authored data includes both a full-text review about the molecule, with citations, and highly structured data for bioinformatics interrogation, including information on protein interactions and states, transitions between states and protein function. The expert-authored pages are anonymously peer reviewed by the Nature Publishing Group. The Molecule Pages data is present in an object-relational database format and is freely accessible to the authors, the reviewers and the public from a web browser that serves as a presentation layer. The Molecule Pages are supported by several applications that along with the database and the interfaces form a multi-tier architecture. The Molecule Pages and the Signaling Gateway are routinely accessed by a very large research community.
A Dialogue Concerning Ethics and the Media.
ERIC Educational Resources Information Center
Zukowski, Sister Angela Ann
2001-01-01
Discusses the digital divide--the discrepancy between those with access to technology and those without--and what the author sees as the resulting new form of cultural imperialism. Asserts that mass media and the information industries are structures of power, while ordinary people are victims of this power. Suggests that Catholic educators…
Template Authoring Environment for the Automatic Generation of Narrative Content
ERIC Educational Resources Information Center
Caropreso, Maria Fernanda; Inkpen, Diana; Keshtkar, Fazel; Khan, Shahzad
2012-01-01
Natural Language Generation (NLG) systems can make data accessible in an easily digestible textual form; but using such systems requires sophisticated linguistic and sometimes even programming knowledge. We have designed and implemented an environment for creating and modifying NLG templates that requires no programming knowledge, and can operate…
7 CFR 274.11 - Issuance and inventory record retention, and forms security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... processed within the State agency. The State agency shall use numbers, batching, inventory control logs, or...) Secure storage; (iii) Access limited to authorized personnel; (iv) Bulk inventory control records; (v... validation of inventory controls and records by parties not otherwise involved in maintaining control records...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-01
... to Facility Vulnerability Assessments and the Integration of Security Systems AGENCY: Coast Guard...-sharing measures. Security System Integration Alternatives Require each MTSA-regulated facility owner or... other forms of security system integration. Information Requested 1. We request comments on the...
A Selective Group Authentication Scheme for IoT-Based Medical Information System.
Park, YoHan; Park, YoungHo
2017-04-01
The technology of IoT combined with medical systems is expected to support advanced medical services. However, unsolved security problems, such as misuse of medical devices, illegal access to the medical server and so on, make IoT-based medical systems not be applied widely. In addition, users have a high burden of computation to access Things for the explosive growth of IoT devices. Because medical information is critical and important, but users have a restricted computing power, IoT-based medical systems are required to provide secure and efficient authentication for users. In this paper, we propose a selective group authentication scheme using Shamir's threshold technique. The property of selectivity gives the right of choice to users to form a group which consists of things users select and access. And users can get an access authority for those Things at a time. Thus, our scheme provides an efficient user authentication for multiple Things and conditional access authority for safe IoT-based medical information system. To the best of our knowledge, our proposed scheme is the first in which selectivity is combined with group authentication in IoT environments.
J2ME implementation of system for storing and accessing of sensitive data on patient's mobile device
NASA Astrophysics Data System (ADS)
Zabołotny, Wojciech M.; Wielgórski, Radosław; Nowik, Marcin
2011-10-01
This paper presents a system allowing to use a patient's mobile phone or PDA for storing of biomedical data, which then, during medical consultation or intervention may be used by the medical staff. The presented solution is aimed on providing both: reliable protection to sensitive patient's data, and easy access to information for authorized medical staff. In the presented system, data are stored in an encrypted form, and the encryption key is available only for authorized persons. The central authentication server verifies the current access rights of the person trying to obtain the information, before providing him or her with the key needed to access the patient's data. The key provided by the server is valid only for the particular device, which minimizes the risk of its misuse. For rare situations when no connection to the authentication server is available (e.g. intervention in the mountains or rural area), system assures an additional "emergency" method to access the encryption key in controlled, registered way. The system has been implemented in Java language and tested in the simulated environment provided by Sun Java Wireless Toolkit for CLDC.
Kline, Jeffrey A; Johnson, Charles L; Webb, William B; Runyon, Michael S
2004-01-01
Background Design and test the reliability of a web-based system for multicenter, real-time collection of data in the emergency department (ED), under waiver of authorization, in compliance with HIPAA. Methods This was a phase I, two-hospital study of patients undergoing evaluation for possible pulmonary embolism. Data were collected by on-duty clinicians on an HTML data collection form (prospective e-form), populated using either a personal digital assistant (PDA) or personal computer (PC). Data forms were uploaded to a central, offsite server using secure socket protocol transfer. Each form was assigned a unique identifier, and all PHI data were encrypted, but were password-accessible by authorized research personnel to complete a follow-up e-form. Results From April 15, 2003-April 15 2004, 1022 prospective e-forms and 605 follow-up e-forms were uploaded. Complexities of PDA use compelled clinicians to use PCs in the ED for data entry for most forms. No data were lost and server log query revealed no unauthorized entry. Prospectively obtained PHI data, encrypted upon server upload, were successfully decrypted using password-protected access to allow follow-up without difficulty in 605 cases. Non-PHI data from prospective and follow-up forms were available to the study investigators via standard file transfer protocol. Conclusions Data can be accurately collected from on-duty clinicians in the ED using real-time, PC-Internet data entry in compliance with the Privacy Rule. Deidentification-reidentification of PHI was successfully accomplished by a password-protected encryption-deencryption mechanism to permit follow-up by approved research personnel. PMID:15479471
Nature Research journals reproducibility policies and initiatives in the Earth sciences
NASA Astrophysics Data System (ADS)
VanDecar, J. C.
2016-12-01
The Nature Research journals strongly support the long-term endeavour by funders, institutions, researchers and publishers toward increasing the reliability and reproducibility of published research. In the Earth, space and environmental sciences this mainly takes the form of ensuring that underlying data and methods in each manuscript are made as transparent and accessible as possible. Supporting data must be made available to editors and peer reviewers at the time of submission for the purposes of evaluating each manuscript. But the preferred way to share data sets is via public repositories. When appropriate community repositories are available, we strongly encourage authors to deposit their data prior to publication. We also now require that a statement be included in each manuscript, under the heading "Data availability", indicating whether and how the data can be accessed, including any restrictions to access. To allow authors to describe their experimental design and methods in as much detail as necessary, the Nature Research journals have effectively abolished space restrictions on online methods sections. To further increase transparency, we also encourage authors to provide tables of the data behind graphs and figures as Source Data. This builds on our established data-deposition policy for specific experiments and large data sets. The Source Data is made available directly from the figure legend, for easy access. We also require that details of geological samples and palaeontological specimens include clear provenance information to ensure full transparency of the research methods. Palaeontological and type specimens must be deposited in a recognised museum or collection to permit free access by other researchers in perpetuity. Finally, authors must make available upon request, to editors and reviewers, any previously unreported custom computer code used to generate results that are reported in the paper and central to its main claims. For all studies using custom code that is deemed central to the conclusions, a statement must be included, under the heading "Code availability", indicating whether and how the code can be accessed, including any restrictions to access.
10 CFR 25.17 - Approval for processing applicants for access authorization.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Approval for processing applicants for access... Authorizations § 25.17 Approval for processing applicants for access authorization. (a) Access authorizations... request by a letter that includes the name, Social Security number and level of access authorization. (c...
10 CFR Appendix A to Part 25 - Fees for NRC Access Authorization
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Fees for NRC Access Authorization A Appendix A to Part 25 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION Pt. 25, App. A Appendix A to Part 25—Fees for NRC Access Authorization The NRC application fee for an access authorization of type . . . Is the sum...
10 CFR Appendix A to Part 25 - Fees for NRC Access Authorization
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Fees for NRC Access Authorization A Appendix A to Part 25 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION Pt. 25, App. A Appendix A to Part 25—Fees for NRC Access Authorization The NRC application fee for an access authorization of type * * * Is the sum...
10 CFR Appendix A to Part 25 - Fees for NRC Access Authorization
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Fees for NRC Access Authorization A Appendix A to Part 25 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION Pt. 25, App. A Appendix A to Part 25—Fees for NRC Access Authorization The NRC application fee for an access authorization of type . . . Is the sum...
10 CFR Appendix A to Part 25 - Fees for NRC Access Authorization
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Fees for NRC Access Authorization A Appendix A to Part 25 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION Pt. 25, App. A Appendix A to Part 25—Fees for NRC Access Authorization The NRC application fee for an access authorization of type * * * Is the sum...
10 CFR Appendix A to Part 25 - Fees for NRC Access Authorization
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Fees for NRC Access Authorization A Appendix A to Part 25 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION Pt. 25, App. A Appendix A to Part 25—Fees for NRC Access Authorization The NRC application fee for an access authorization of type * * * Is the sum...
Development of American Sign Language Guidelines for K-12 Academic Assessments.
Higgins, Jennifer A; Famularo, Lisa; Cawthon, Stephanie W; Kurz, Christopher A; Reis, Jeanne E; Moers, Lori M
2016-10-01
The U.S. federal Every Student Succeeds Act (ESSA) was enacted with goals of closing achievement gaps and providing all students with access to equitable and high-quality instruction. One requirement of ESSA is annual statewide testing of students in grades 3-8 and once in high school. Some students, including many deaf or hard-of-hearing (D/HH) students, are eligible to use test supports, in the form of accommodations and accessibility tools, during state testing. Although technology allows accommodations and accessibility tools to be embedded within a digital assessment system, the success of this approach depends on the ability of test developers to appropriately represent content in accommodated forms. The Guidelines for Accessible Assessment Project (GAAP) sought to develop evidence- and consensus-based guidelines for representing test content in American Sign Language. In this article, we present an overview of GAAP, review of the literature, rationale, qualitative and quantitative research findings, and lessons learned. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
NASA Astrophysics Data System (ADS)
Treviranus, Jutta
Authoring tools that are accessible and that enable authors to produce accessible Web content play a critical role in web accessibility. Widespread use of authoring tools that comply to the W3C Authoring Tool Accessibility Guidelines (ATAG) would ensure that even authors who are neither knowledgeable about nor particularly motivated to produce accessible content do so by default. The principles and techniques of ATAG are discussed. Some examples of accessible authoring tools are described including authoring tool content management components such as TinyMCE. Considerations for creating an accessible collaborative environment are also covered. As part of providing accessible content, the debate between system-based personal optimization and one universally accessible site configuration is presented. The issues and potential solutions to address the accessibility crisis presented by the advent of rich internet applications are outlined. This challenge must be met to ensure that a large segment of the population is able to participate in the move toward the web as a two-way communication mechanism.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-30
... Proposed Information Collection to OMB; Enterprise Income Verification (EIV) System User Access Authorization Form and Rules of Behavior and User Agreement AGENCY: Office of the Chief Information Officer, HUD... user with information related to the Rules of Behavior for system usage and the user's responsibilities...
Involvement of Students in E-Learning
ERIC Educational Resources Information Center
Al Ya, Marwa; Aziz, Sheikha A.; Mohyuddin, Muhammad Raheel; Al Balushi, Nabila
2017-01-01
The involvement of E-learning activities for students in the classroom play an important role in the teaching and learning process. In this paper, the authors describe how we collected information from 3-different Colleges/Universities in Oman forming an online study with regard to the use of internet, e-library, online book access, and…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-01
... effective upon receipt of this filing by the Commission. The Commission is publishing this notice to solicit... FINRA Firm Gateway.\\5\\ As announced in Regulatory Notice 12-40, the Form, an abbreviated version of...\\ FINRA Firm Gateway is an online compliance tool that provides consolidated access to FINRA applications...
A Rewritable, Reprogrammable, Dual Light-Responsive Polymer Actuator.
Gelebart, Anne Helene; Mulder, Dirk J; Vantomme, Ghislaine; Schenning, Albertus P H J; Broer, Dirk J
2017-10-16
We report on the fabrication of a rewritable and reprogrammable dual-photoresponsive liquid crystalline-based actuator containing an azomerocyanine dye that can be locally converted into the hydroxyazopyridinium form by acid treatment. Each dye absorbs at a different wavelength giving access to programmable actuators, the folding of which can be controlled by using different colors of light. The acidic patterning is reversible and allows the erasing and rewriting of patterns in the polymer film, giving access to reusable, adjustable soft actuators. © 2017 The Authors. Published by Wiley-VCH Verlag GmbH & Co. KGaA.
Masic, Izet; Milinovic, Katarina
2012-01-01
Most of medical journals now has it’s electronic version, available over public networks. Although there are parallel printed and electronic versions, and one other form need not to be simultaneously published. Electronic version of a journal can be published a few weeks before the printed form and must not has identical content. Electronic form of a journals may have an extension that does not contain a printed form, such as animation, 3D display, etc., or may have available fulltext, mostly in PDF or XML format, or just the contents or a summary. Access to a full text is usually not free and can be achieved only if the institution (library or host) enters into an agreement on access. Many medical journals, however, provide free access for some articles, or after a certain time (after 6 months or a year) to complete content. The search for such journals provide the network archive as High Wire Press, Free Medical Journals.com. It is necessary to allocate PubMed and PubMed Central, the first public digital archives unlimited collect journals of available medical literature, which operates in the system of the National Library of Medicine in Bethesda (USA). There are so called on- line medical journals published only in electronic form. It could be searched over on-line databases. In this paper authors shortly described about 30 data bases and short instructions how to make access and search the published papers in indexed medical journals. PMID:23322957
10 CFR 25.27 - Reopening of cases in which requests for access authorizations are canceled.
Code of Federal Regulations, 2010 CFR
2010-01-01
... authorizations are canceled. 25.27 Section 25.27 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION Access Authorizations § 25.27 Reopening of cases in which requests for access authorizations are canceled. (a) In... cases were previously canceled, new fingerprint cards (FD-257) in duplicate and a new Security...
Open Access Publishing: What Authors Want
ERIC Educational Resources Information Center
Nariani, Rajiv; Fernandez, Leila
2012-01-01
Campus-based open access author funds are being considered by many academic libraries as a way to support authors publishing in open access journals. Article processing fees for open access have been introduced recently by publishers and have not yet been widely accepted by authors. Few studies have surveyed authors on their reasons for publishing…
Improving outpatient access and patient experiences in academic ambulatory care.
O'Neill, Sarah; Calderon, Sherry; Casella, Joanne; Wood, Elizabeth; Carvelli-Sheehan, Jayne; Zeidel, Mark L
2012-02-01
Effective scheduling of and ready access to doctor appointments affect ambulatory patient care quality, but these are often sacrificed by patients seeking care from physicians at academic medical centers. At one center, Beth Israel Deaconess Medical Center, the authors developed interventions to improve the scheduling of appointments and to reduce the access time between telephone call and first offered appointment. Improvements to scheduling included no redirection to voicemail, prompt telephone pickup, courteous service, complete registration, and effective scheduling. Reduced access time meant being offered an appointment with a physician in the appropriate specialty within three working days of the telephone call. Scheduling and access were assessed using monthly "mystery shopper" calls. Mystery shoppers collected data using standardized forms, rated the quality of service, and transcribed their interactions with schedulers. Monthly results were tabulated and discussed with clinical leaders; leaders and frontline staff then developed solutions to detected problems. Eighteen months after the beginning of the intervention (in June 2007), which is ongoing, schedulers had gone from using 60% of their registration skills to over 90%, customer service scores had risen from 2.6 to 4.9 (on a 5-point scale), and average access time had fallen from 12 days to 6 days. The program costs $50,000 per year and has been associated with a 35% increase in ambulatory volume across three years. The authors conclude that academic medical centers can markedly improve the scheduling process and access to care and that these improvements may result in increased ambulatory care volume.
Graphic Novels, Web Comics, and Creator Blogs: Examining Product and Process
ERIC Educational Resources Information Center
Carter, James Bucky
2011-01-01
Young adult literature (YAL) of the late 20th and early 21st century is exploring hybrid forms with growing regularity by embracing textual conventions from sequential art, video games, film, and more. As well, Web-based technologies have given those who consume YAL more immediate access to authors, their metacognitive creative processes, and…
What Do We Know and How Well Do We Know It? Identifying Practice-Based Insights in Education
ERIC Educational Resources Information Center
Miller, Barbara; Pasley, Joan
2012-01-01
Knowledge derived from practice forms a significant portion of the knowledge base in the education field, yet is not accessible using existing empirical research methods. This paper describes a systematic, rigorous, grounded approach to collecting and analysing practice-based knowledge using the authors' research in teacher leadership as an…
Invertebrates: Revealing a Hidden World in the Year of Biodiversity
ERIC Educational Resources Information Center
Sanders, Dawn
2010-01-01
Biodiversity means the variety of life in all its forms. It includes the variety of species and ecosystems in the world, and genetic variation. Invertebrates are one of the largest and most accessible groups of animals for primary children to study. In this article, the author explains why and how children should engage with the idea of…
ERIC Educational Resources Information Center
Bhattacharya, Arghya; Jackson, Paul; Jenkins, Brian C.
2018-01-01
The authors present a version of the Diamond-Mortensen-Pissarides model of unemployment that is accessible to undergraduates and preserve the dynamic structure of the original model. The model is solvable in closed form using basic algebra and admits a graphical representation useful for illustrating a variety of comparative statics. They show how…
Schroter, Sara; Tite, Leanne
2006-01-01
Objectives: We aimed to assess journal authors' current knowledge and perceptions of open access and author-pays publishing. Design: An electronic survey. Setting: Authors of research papers submitted to BMJ, Archives of Disease in Childhood, and Journal of Medical Genetics in 2004. Main outcome measures: Familiarity with and perceptions of open access and author-pays publishing. Results: 468/1113 (42%) responded. Prior to definitions being provided, 47% (222/468) and 38% (176/468) reported they were familiar with the terms `open access' and `author-pays' publishing, respectively. Some who did not at first recognize the terms, did claim to recognize them when they were defined. Only 10% (49/468) had submitted to an author-pays journal. Compared with non-open access subscription-based journals, 35% agreed that open access author-pays journals have a greater capacity to publish more content making it easier to get published, 27% thought they had lower impact factors, 31% thought they had faster and more timely publicaitons, and 46% agreed that people will think anyone can pay to get published. 55% (256/468) thought they would not continue to submit to their respective journal if it became open access and charged, largely because of the reputaiton of the journals. Half (54%, 255/468) said open access has `no impact' or was `low priority' in their submission decisions. Two-thirds (66%, 308/468) said they would prefer to submit to a non-open access subscription-based journal than an open access author-pays journal. Over half thought they would have to make a contribution or pay the full cost of an author charge (56%, 262/468). Conclusions: The survey yielded useful information about respondents' knowledge and perceptions of these publishing models. Authors have limited familiarity with the concept of open-access publishing and surrounding issues. Currently, open access policies have little impact on authors' decision of where to submit papers. PMID:16508053
Wastewater Characterization Survey, Little Rock AFB, Arizona
1989-05-01
ACCESSION NO •• 1 1 . TITLE (Include Security Clas~sficauton) Wastewater Characterization Survey, Little Rock AFB AR 12. PERSONAL AUTHOR(S) Scott...Rock AFB. 0.. 5., 1 ",.’ -- ’--: ... ’ Recommendations: ( 1 ) Cleaning of the grease traps at the dining facilities, i.e., the dining hall, NCO Club, and...USAF, BSC. I~ *8M/tt t("’O " ’ I 2(’t_/ ° DO Form 1473, JUN 86 Prr, ous editions -,e obsolete SE 1 4 k: (OfMTION OF T-,S PAGE i Item 19 Cont’d solids
17 CFR 249.446 - Form ID, uniform application for access codes to file on EDGAR.
Code of Federal Regulations, 2011 CFR
2011-04-01
... log on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification Authorization Code (PMAC)—allows a filer, filing agent or training agent to change its Password. [69 FR 22710... Sections Affected, which appears in the Finding Aids section of the printed volume and at at www.fdsys.gov. ...
17 CFR 269.7 - Form ID, uniform application for access codes to file on EDGAR.
Code of Federal Regulations, 2011 CFR
2011-04-01
... on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification Authorization Code (PMAC)—allows a filer, filing agent or training agent to change its Password. [69 FR 22710, Apr... Sections Affected, which appears in the Finding Aids section of the printed volume and at at www.fdsys.gov. ...
The Rank Hypothesis and Lexical Decision: A Reply to Adelman and Brown (2008)
ERIC Educational Resources Information Center
Murray, Wayne S.; Forster, Kenneth I.
2008-01-01
J. S. Adelman and G. D. A. Brown (2008) provided an extensive analysis of the form of word frequency and contextual diversity effects on lexical decision time. In this reply, the current authors suggest that their analysis provides a valuable tool for the evaluation of models of lexical access and that the results they report are broadly…
Peacock, Justin G; Grande, Joseph P
2016-01-01
The authors presented their results in effectively using a free and widely-accessible online app platform to manage and teach a first-year pathology course at Mayo Medical School. The authors utilized the Google "Blogger", "Forms", "Flubaroo", "Sheets", "Docs", and "Slides" apps to effectively build a collaborative classroom teaching and management system. Students were surveyed on the use of the app platform in the classroom, and 44 (94%) students responded. Thirty-two (73%) of the students reported that "Blogger" was an effective place for online discussion of pathology topics and questions. 43 (98%) of the students reported that the "Forms/Flubaroo" grade-reporting system was helpful. 40 (91%) of the students used the remote, collaborative features of "Slides" to create team-based learning presentations, and 39 (89%) of the students found those collaborative features helpful. "Docs" helped teaching assistants to collaboratively create study guides or grading rubrics. Overall, 41 (93%) of the students found that the app platform was helpful in establishing a collaborative, online classroom environment. The online app platform allowed faculty to build an efficient and effective classroom teaching and management system. The ease of accessibility and opportunity for collaboration allowed for collaborative learning, grading, and teaching.
PIQMIe: a web server for semi-quantitative proteomics data management and analysis.
Kuzniar, Arnold; Kanaar, Roland
2014-07-01
We present the Proteomics Identifications and Quantitations Data Management and Integration Service or PIQMIe that aids in reliable and scalable data management, analysis and visualization of semi-quantitative mass spectrometry based proteomics experiments. PIQMIe readily integrates peptide and (non-redundant) protein identifications and quantitations from multiple experiments with additional biological information on the protein entries, and makes the linked data available in the form of a light-weight relational database, which enables dedicated data analyses (e.g. in R) and user-driven queries. Using the web interface, users are presented with a concise summary of their proteomics experiments in numerical and graphical forms, as well as with a searchable protein grid and interactive visualization tools to aid in the rapid assessment of the experiments and in the identification of proteins of interest. The web server not only provides data access through a web interface but also supports programmatic access through RESTful web service. The web server is available at http://piqmie.semiqprot-emc.cloudlet.sara.nl or http://www.bioinformatics.nl/piqmie. This website is free and open to all users and there is no login requirement. © The Author(s) 2014. Published by Oxford University Press on behalf of Nucleic Acids Research.
Code of Federal Regulations, 2012 CFR
2012-10-01
... identification media that one or more airports accepts as airport-approved media for unescorted access authority... identification media that one or more airports accepts as airport-approved media for unescorted access authority... aircraft operator identification medium to that individual; (3) Authorizing that individual to perform...
Code of Federal Regulations, 2013 CFR
2013-10-01
... identification media that one or more airports accepts as airport-approved media for unescorted access authority... identification media that one or more airports accepts as airport-approved media for unescorted access authority... aircraft operator identification medium to that individual; (3) Authorizing that individual to perform...
Code of Federal Regulations, 2014 CFR
2014-10-01
... identification media that one or more airports accepts as airport-approved media for unescorted access authority... identification media that one or more airports accepts as airport-approved media for unescorted access authority... aircraft operator identification medium to that individual; (3) Authorizing that individual to perform...
Code of Federal Regulations, 2010 CFR
2010-10-01
... identification media that one or more airports accepts as airport-approved media for unescorted access authority... identification media that one or more airports accepts as airport-approved media for unescorted access authority... aircraft operator identification medium to that individual; (3) Authorizing that individual to perform...
Code of Federal Regulations, 2011 CFR
2011-10-01
... identification media that one or more airports accepts as airport-approved media for unescorted access authority... identification media that one or more airports accepts as airport-approved media for unescorted access authority... aircraft operator identification medium to that individual; (3) Authorizing that individual to perform...
Energy-microfinance intervention for low income households in India
NASA Astrophysics Data System (ADS)
Rao, P. Sharath Chandra
In India, limited energy access and energy inequity hamper the lives of low income households. Traditional fuels such as firewood and dung cake account for 84 percent and 32 percent of the rural and urban household cooking energy (NSSO, 2007). With 412 million people without access to electricity in 2005, India hosts the world's largest such population (IEA, 2007). But, low income households still spend 9 - 11.7 percent1 of their incomes on inefficient forms of energy while wealthy households spend less than 5 percent on better energy products (Saghir, 2005). Renewable energy technologies coupled with innovative financial products can address the energy access problem facing the low income households in India (MacLean & Siegel, 2007; REEEP, 2009). Nevertheless, the low income households continue to face low access to mainstream finance for purchasing renewable energy technology at terms that meet their monthly energy related expenditure (ESMAP, 2004a; SEEP, 2008a) and low or no access to energy services (Ailawadi & Bhattacharyya, 2006; Modi et. al., 2006). The lack of energy-finance options has left the marginalized population with little means to break the dependence on traditional fuels. This dissertation proposes an energy microfinance intervention to address the present situation. It designed a loan product dedicated to the purchase of renewable energy technologies while taking into account the low and irregular cash flows of the low income households. The arguments presented in this dissertation are based on a six-month pilot project using this product designed and developed by the author in conjunction with a microfinance institution and its low income clients and Energy Service Companies in the state of Karnataka. Finding the right stakeholders and establishing a joint agreement, obtaining grant money for conducting the technology dissemination workshops and forming a clear procedure for commissioning the project, are the key lessons learnt from this study. 1The study was conducted by the author across 32 households having a monthly income of 99-199 in the town of Shimoga, Karnataka.
Johnson, Heather L; Fontelo, Paul; Olsen, Cara H; Jones, Kenneth D; Gimbel, Ronald W
2013-11-01
To assess family nurse practitioner (FNP) student perception of research abstract usefulness in clinical decision making. A randomized controlled trial conducted in a simulated environment with graduate FNP students of the Graduate School of Nursing, Uniformed Services University of the Health Sciences. Given a clinical case study and modified MEDLINE search tool accessible via an iPad device, participants were asked to develop a treatment plan and complete a data collection form. The primary measure was perceived usefulness of the research abstracts in clinical decision making regarding a simulated obese patient seeking to prevent type 2 diabetes. Secondary measures related to participant demographics and accessibility and usefulness of full-text manuscripts. The majority of NP students identified readily available research abstracts as useful in shaping their clinical decision making. The presence or absence of full-text manuscripts associated with the abstracts did not appear to influence the perceived abstract usefulness. The majority of students with full-text manuscript access in the timed simulated clinical encounter read at least one paper, but cited insufficient time to read full-text as a constraint. Research abstracts at point of care may be valuable to FNPs if easily accessible and integrated into clinical workflow. ©2013 The Author(s) ©2013 American Association of Nurse Practitioners.
ERIC Educational Resources Information Center
Jenkins, Celia; Probets, Steve; Oppenheim, Charles; Hubbard, Bill
2007-01-01
Purpose: The purpose of this research is to show how the self-archiving of journal papers is a major step towards providing open access to research. However, copyright transfer agreements (CTAs) that are signed by an author prior to publication often indicate whether, and in what form, self-archiving is allowed. The SHERPA/RoMEO database enables…
Code of Federal Regulations, 2014 CFR
2014-01-01
... authorizations or clearances will be defined. (1) “Q” access authorizations or clearances are based upon full... quantities as required in the performance of duties. (2) “Q(X)” access authorizations or clearances are based...” access authorizations or clearances are based upon National Agency Checks and Inquiries (NACI) for...
Code of Federal Regulations, 2012 CFR
2012-01-01
... authorizations or clearances will be defined. (1) “Q” access authorizations or clearances are based upon full... quantities as required in the performance of duties. (2) “Q(X)” access authorizations or clearances are based...” access authorizations or clearances are based upon National Agency Checks and Inquiries (NACI) for...
An evaluation of emergency medicine investigators' views on open access to medical literature.
Rodriguez, R M; Wong, J; Hardy, J; Frankel, E
2006-12-01
Scientists and governmental agencies have called for free universal access to research publications via the internet--open access. To examine the current medical literature reading practices of emergency medicine investigators (EMIs) and their views towards open access. Surveys were mailed to the 212 corresponding authors of all original research articles published in years 2002 and 2003 in the Annals of Emergency Medicine, Academic Emergency Medicine and The Journal of Emergency Medicine. The most commonly read forms of medical literature reported by the 129 (61%) EMI respondents were hard-copy medical journals and online literature review services. 59% of EMIs were in favour of open access; 58% stated they would read a wider variety of medical literature; 21% believed open access would improve the quality of publications and 39% thought it would decrease the quality. When asked how a US 1500 dollars fee for open access would affect their ability to publish research, 69% said it would greatly impede and 19% said it would slightly impede their research. Despite concerns that open access may impede their ability to publish research and decrease the quality of publications, most EMIs surveyed favoured open access. They believed open access would increase and broaden their medical literature reading.
A contextual role-based access control authorization model for electronic patient record.
Motta, Gustavo H M B; Furuie, Sergio S
2003-09-01
The design of proper models for authorization and access control for electronic patient record (EPR) is essential to a wide scale use of EPR in large health organizations. In this paper, we propose a contextual role-based access control authorization model aiming to increase the patient privacy and the confidentiality of patient data, whereas being flexible enough to consider specific cases. This model regulates user's access to EPR based on organizational roles. It supports a role-tree hierarchy with authorization inheritance; positive and negative authorizations; static and dynamic separation of duties based on weak and strong role conflicts. Contextual authorizations use environmental information available at access time, like user/patient relationship, in order to decide whether a user is allowed to access an EPR resource. This enables the specification of a more flexible and precise authorization policy, where permission is granted or denied according to the right and the need of the user to carry out a particular job function.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-18
...] Agency Information Collection Activities: Proposed Collection; Comments Requested; eForm 6 Access Request... Form/Collection: eForm 6 Access Request. (3) Agency form number, if any, and the applicable component...: Respondents must complete the eForm 6 Access Request form in order to receive a user ID and password to obtain...
17 CFR 160.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2011 CFR
2011-04-01
... form of access number or access code, does not include a number or code in an encrypted form, as long... consumer reporting agency, an account number or similar form of access number or access code for a consumer... similar form of access number or access code: (1) To your agent or service provider solely in order to...
12 CFR 716.12 - Limits on sharing of account number information for marketing purposes.
Code of Federal Regulations, 2012 CFR
2012-01-01
... form of access number or access code, does not include a number or code in an encrypted form, as long... consumer reporting agency, an account number or similar form of access number or access code for a consumer... similar form of access number or access code: (1) To your agent or service provider solely in order to...
12 CFR 716.12 - Limits on sharing of account number information for marketing purposes.
Code of Federal Regulations, 2011 CFR
2011-01-01
... form of access number or access code, does not include a number or code in an encrypted form, as long... consumer reporting agency, an account number or similar form of access number or access code for a consumer... similar form of access number or access code: (1) To your agent or service provider solely in order to...
12 CFR 716.12 - Limits on sharing of account number information for marketing purposes.
Code of Federal Regulations, 2013 CFR
2013-01-01
... form of access number or access code, does not include a number or code in an encrypted form, as long... consumer reporting agency, an account number or similar form of access number or access code for a consumer... similar form of access number or access code: (1) To your agent or service provider solely in order to...
32 CFR 147.19 - The three standards.
Code of Federal Regulations, 2010 CFR
2010-07-01
...) The investigation standard for“Q” access authorizations and for access to top secret (including top secret Special Access Programs) and Sensitive Compartmented Information; (c) The reinvestigation standard... authorizations and for access to confidential and secret (including all secret-level Special Access Programs not...
“Free Full Text Articles”: Where to Search for Them?
Singh, Ashish; Singh, Manish; Singh, Ajai Kumar; Singh, Deepti; Singh, Pratibha; Sharma, Abhishek
2011-01-01
References form the backbone of any medical literature. Presently, because of high inflation, it is very difficult for any library/organization/college to purchase all journals. The condition is even worse for an individual person, such as private practitioners. The solution lies in the free availability of full-text articles. Here, the authors share their experiences about the accessibility of free full-text articles. PMID:22223965
Bonfoh, B; Fokou, G; Crump, L; Zinsstag, J; Schelling, E
2016-11-01
Pastoralists are among the most politically and economically marginalised communities in the world. They have less and less access to the natural resources on which their livelihoods depend and very limited access to basic socio-economic services and infrastructure. This paper builds on a number of studies carried out in the Sahel, the Horn of Africa, Central Asia and the Swiss Alps to address the institutional dynamics required for sustainable pastoralism. Specifically, the authors question the way in which institutions and policies are currently shaped and suggest that reforming these could contribute to new avenues for pastoralism. Among the main drivers of pastoralist marginalisation are poor public and private institutional arrangements. The consequences are violent conflict and increased mobility and relocation. Responses to the current weaknesses of pastoralism must encompass inclusive, comprehensive institutions which allow access to resources, economic viability and integration in the new socio-ecological space. The authors argue that those involved in pastoral development in national as well as international arenas, including pastoralist groups, states and agencies, are creatively engaged in a process of innovation for pastoralism, and this will contribute towards new forms of governance and improved institutional and policy frameworks.
[Pocket computers. Applications for personal digital assistants, PDAs].
Anton i Riera, Josep; Juárez Giménez, Juan Carlos; Aznar Sorribes, Noemí; Boixadera Vendrell, Mireia; Ibáñez Collado, Cristina; Monterde Junyent, Josep
2008-01-01
In the sanitary environment there is a constant flow of all types of information; this fact obliges professionals to have at this disposition the tools which permit them to store, update, and have easy consultation access to this information. Personal Digital Assistants (PDAs) form part of these technologies which can improve both access to and storage of this information. In this article, the authors review some general techniques these PDAs have, as well as data bases which can be useful to professional practices in nursing. The authors carried out a bibliographical search over the years 1999-2006 and an Internet search for sites which describe the uses of PDAs. The authors found 94 useful applications which include: planning and management of nursing practices; nursing techniques and procedures; filing clinical data or clinical histories; surgical nursing care, pediatric nursing and geriatric nursing; pharmacology calculating and administration of drugs and fluid therapy; reference values for diagnostic tests; medical guides and treatment (diagnostic and treatment) and for surgical nursing; medical dictionaries; medical specialties; miscellaneous. For each reference, the authors provide a description of the content, bibliographical sources, operating system, memory requirements, cost, website, and the possibility to download a test version or a demo. The authors conclude that PDAs make available a wide range of useful applications in the distinct phases where nurses perform their duties, offering many possibilities to the user.
76 FR 66089 - Access Authorization Program for Nuclear Power Plants
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-25
... NUCLEAR REGULATORY COMMISSION [NRC-2011-0245] Access Authorization Program for Nuclear Power... Program for Nuclear Power Plants.'' This guide describes a method that NRC staff considers acceptable to... Regulations (10 CFR), section 73.56, ``Personnel Access Authorization Requirements for Nuclear Power Plants...
[Analysis of the accessibility of short acting oral opioids in Hungary].
Lovas, Kornélia; Hadnagy, László; Jobban, Eszter; Kullmann, Tamás
2016-05-01
Short acting oral formulas make part of optimal opioid analgesia. The use of short acting oral morphine has not widely spread in Hungary, and these drugs completely lacked from the market for three years. Since December 2015 short acting morphine-sulphate has again been commercialised. The causes of the market failure are analysed in this article. The aim of the retrospective analysis is to help the accessibility of the medicine to every patient in need. Prescription morphine use depends on the harmonised cooperation of a number of actors. Besides regulating and financing authorities and professional organisations, patients and the opinion forming media are also responsible for building up the right routine.
10 CFR 1046.14 - Access authorization.
Code of Federal Regulations, 2010 CFR
2010-01-01
... authorization for the highest level of classified matter to which they potentially have access. Security police... by the site security organization and approved by the Head of the Field Element. Security police officers shall possess a minimum of an “L” or DOE Secret access authorization. Security police officers...
[Child-juvenile prostitution: a systematic literature review].
Ribeiro, Moneda Oliveira; Dias, Aretuzza de Fátima
2009-06-01
The purpose of this study was to understand how infant-juvenile prostitution is being explained by researchers through an extensive bibliographical survey on national and international scientific sources. It was possible to access 20 references in full text form, which were analyzed according to the Content Analysis method. The analysis consisted in answering how infant-juvenile prostitution is represented by the author in relation to the concepts, causes, effects and solutions described in the references. It was found that the authors approached the subject as a way of survival, resulting from an unequal society, adult-centered and male chauvinist causing mental and physical diseases in children.
Charbonneau, Deborah H; McGlone, Jonathan
2013-01-01
The research assessed faculty awareness of the National Institutes of Health (NIH) public access policy and faculty experiences with the copyright terms in their author agreements with publishers. During the fall of 2011, 198 faculty members receiving funding from NIH at a large urban academic institution were invited to participate in an anonymous online survey. A total of 94 faculty members responded to the survey, representing a response rate of 47%. Thirty percent of the survey respondents were either unaware of or not familiar with the NIH policy. Further, a significant number of faculty members (97.8%) indicated that they usually signed their copyright forms "as is." The findings show that time, confusing instructions, and unclear journal policies are challenges experienced by NIH-funded faculty in complying with the federal mandate. There is a need to educate faculty with respect to the value of retaining their copyrights and self-archiving their publications to help advance public access and open access scholarship.
10 CFR 1016.38 - Suspension or revocation of access authorization.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Suspension or revocation of access authorization. 1016.38 Section 1016.38 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Control of Information § 1016.38 Suspension or revocation of access authorization. In any case where the...
10 CFR 1016.38 - Suspension or revocation of access authorization.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Suspension or revocation of access authorization. 1016.38 Section 1016.38 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Control of Information § 1016.38 Suspension or revocation of access authorization. In any case where the...
Publishing in Open Access Education Journals: The Authors' Perspectives
ERIC Educational Resources Information Center
Coonin, Bryna; Younce, Leigh M.
2010-01-01
Open access publishing is now an accepted method of scholarly communication. However, the greatest traction for open access publishing thus far has been in the sciences. Penetration of open access publishing has been much slower among the social sciences. This study surveys 309 authors from recent issues of open access journals in education to…
Effects of Form Perception and Meaning on the Visual Evoked Potential with Author’s Update
2009-09-01
2001. Controlling binocular rivalry. Vision Research. 41: 2943-2950. Freud , S. 1995. The Basic Writings of Sigmund Freud (Psychopathology of... Freud , S. 1990. The Ego and the Id (The Standard Edition of the Complete Psychological Works of Sigmund Freud ). P. Gay, Introduction. New York...1935), and psychoanalytic talk therapies associated with S. Freud (1995, 1990), gave results that were less accessible to scientific method. In short
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-23
...] Draft Guidance for Industry: Food and Drug Administration Records Access Authority Under the Federal... industry entitled ``FDA Records Access Authority Under Sections 414 and 704 of the Federal Food, Drug...). This updated draft guidance is intended to provide individuals in the human and animal food industries...
10 CFR 10.21 - Suspension of access authorization and/or employment clearance.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Suspension of access authorization and/or employment clearance. 10.21 Section 10.21 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.21 Suspension of access authorization and/or employment clearance. In those cases where...
10 CFR 10.21 - Suspension of access authorization and/or employment clearance.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Suspension of access authorization and/or employment clearance. 10.21 Section 10.21 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.21 Suspension of access authorization and/or employment clearance. In those cases where...
10 CFR 10.21 - Suspension of access authorization and/or employment clearance.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Suspension of access authorization and/or employment clearance. 10.21 Section 10.21 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.21 Suspension of access authorization and/or employment clearance. In those cases where...
Mathias, Kaaren; Pant, Hira; Marella, Manjula; Singh, Lawrence; Murthy, Gvs; Grills, Nathan
2018-02-27
This study used a population-based cross-sectional survey to describe the prevalence of psychosocial disability and unmet need for access to services in North India. This study was conducted in Dehradun district, Uttarakhand, in 2014. A population-based sample of 2441 people over the age of 18 years. The Rapid Assessment of Disability survey tool identified people with disability and used an adapted version of the Kessler scale to identify those with psychosocial disability. It additionally collected information on socioeconomic variables, access to community services and barriers to participation. Prevalence of psychosocial disability and unmet needs and descriptions of barriers to services were calculated, and multivariable logistic regression was used to assess associations between risk factors and psychosocial disability. Prevalence of psychosocial disability was 4.8% and 75% of participants with psychological distress also reported comorbid functional impairments. Adjusted ORs for depression of more than two were found for people who were unschooled, unemployed and of moderate or poor socioeconomic status. The unmet need for access to services was significantly higher in every domain for people with psychosocial disability and was more than 25% in the areas of employment, health service access and community consultation. People with psychosocial disability encountered greater barriers in each domain compared with controls. People who are poor, uneducated and unemployed are two to four times more likely to have psychosocial disability in Dehradun district. They face unmet needs in accessing community services and perceive negative social attitudes, lack of physical accessibility and lack of information as barriers limiting their participation. Social policy must increase access to education and reduce poverty but additionally ensure action is taken in all community services to increase information, physical accessibility and social inclusion of people with psychosocial and other forms of disability. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
17 CFR 248.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2014 CFR
2014-04-01
..., or similar form of access number or access code, does not include a number or code in an encrypted... consumer reporting agency, an account number or similar form of access number or access code for a consumer... similar form of access number or access code: (1) To your agent or service provider solely in order to...
10 CFR 710.10 - Suspension of access authorization.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false Suspension of access authorization. 710.10 Section 710.10 Energy DEPARTMENT OF ENERGY CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO CLASSIFIED MATTER OR SPECIAL NUCLEAR MATERIAL General Criteria and Procedures for Determining Eligibility for Access...
10 CFR 710.10 - Suspension of access authorization.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Suspension of access authorization. 710.10 Section 710.10 Energy DEPARTMENT OF ENERGY CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO CLASSIFIED MATTER OR SPECIAL NUCLEAR MATERIAL General Criteria and Procedures for Determining Eligibility for Access...
10 CFR 710.10 - Suspension of access authorization.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Suspension of access authorization. 710.10 Section 710.10 Energy DEPARTMENT OF ENERGY CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO CLASSIFIED MATTER OR SPECIAL NUCLEAR MATERIAL General Criteria and Procedures for Determining Eligibility for Access...
10 CFR 710.10 - Suspension of access authorization.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false Suspension of access authorization. 710.10 Section 710.10 Energy DEPARTMENT OF ENERGY CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO CLASSIFIED MATTER OR SPECIAL NUCLEAR MATERIAL General Criteria and Procedures for Determining Eligibility for Access...
10 CFR 710.10 - Suspension of access authorization.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Suspension of access authorization. 710.10 Section 710.10 Energy DEPARTMENT OF ENERGY CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO CLASSIFIED MATTER OR SPECIAL NUCLEAR MATERIAL General Criteria and Procedures for Determining Eligibility for Access...
Intersection of Hip-Hop and Geoscience: Changes in The Climate
NASA Astrophysics Data System (ADS)
López, R. D.; Heraldo, S. E.; Nawman, M. A.; Gerry, V. R.; Gerry, M. A.
2017-12-01
Professionals and educators in the science, technology, engineering, art, and mathematics (STEAM) field rely heavily on scientific communication to convey innovations, concepts, and evidence-based policy. The geosciences presents itself as a unique field to communicate respective scientific endeavors, as research efforts have direct impacts on the Earth's resources and understanding natural processes. Several of the authors have previously composed musical pieces that integrated Earth Sciences with music, utilizing this as mechanism to not only foster creativity, but to also establish more dynamic outreach efforts. Unfortunately, geoscience does not readily present itself as a field that is easily accessible to minorities - particularly women, people of color, and those from disadvantaged communities. However, music is somewhat of a universal form of communication that is accessible to everyone. It is through the intersection of hip-hop and geoscience, that topics can be introduced to communities in unique ways. Flows in Hydrogeology was a previous project that several of the authors produced as a means to connect with youth who identify with the hip-hop community, while encouraging inquiry in the STEAM fields. Several of the authors grew up and still reside in some of the most violent cities in the United States of America. The authors have utilized their respective backgrounds in both upbringing and career endeavors to help bridge the gap between science and disadvantaged communities. The musical piece, Changes in the Climate, illustrates the power of understanding the changes in one's life and surrounding world via delivery of concepts with hip-hop and rap. Therefore this musical composition not only integrates STEAM and music, but also serves as mechanism for outreach and encouraging diversity. Such actions could yield the success of accessing untapped potential, while fostering unique opportunities for future collaboration between professionals in geoscience and youth from various communities.
75 FR 63161 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-14
... access. Records are accessible only to authorized persons with a valid need-to-know, who are... need-to-know are allowed access to JPAS. Additionally, access to JPAS is based on a user's specific...). (Signature).' Attorneys or other persons acting on behalf of an individual must provide written authorization...
10 CFR 25.15 - Access permitted under “Q” or “L” access authorization.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Confidential National Security Information including intelligence information, CRYPTO (i.e., cryptographic... official business when the employee has the appropriate level of NRC access authorization and need-to-know...
From Web accessibility to Web adaptability.
Kelly, Brian; Nevile, Liddy; Sloan, David; Fanou, Sotiris; Ellison, Ruth; Herrod, Lisa
2009-07-01
This article asserts that current approaches to enhance the accessibility of Web resources fail to provide a solid foundation for the development of a robust and future-proofed framework. In particular, they fail to take advantage of new technologies and technological practices. The article introduces a framework for Web adaptability, which encourages the development of Web-based services that can be resilient to the diversity of uses of such services, the target audience, available resources, technical innovations, organisational policies and relevant definitions of 'accessibility'. The article refers to a series of author-focussed approaches to accessibility through which the authors and others have struggled to find ways to promote accessibility for people with disabilities. These approaches depend upon the resource author's determination of the anticipated users' needs and their provision. Through approaches labelled as 1.0, 2.0 and 3.0, the authors have widened their focus to account for contexts and individual differences in target audiences. Now, the authors want to recognise the role of users in determining their engagement with resources (including services). To distinguish this new approach, the term 'adaptability' has been used to replace 'accessibility'; new definitions of accessibility have been adopted, and the authors have reviewed their previous work to clarify how it is relevant to the new approach. Accessibility 1.0 is here characterised as a technical approach in which authors are told how to construct resources for a broadly defined audience. This is known as universal design. Accessibility 2.0 was introduced to point to the need to account for the context in which resources would be used, to help overcome inadequacies identified in the purely technical approach. Accessibility 3.0 moved the focus on users from a homogenised universal definition to recognition of the idiosyncratic needs and preferences of individuals and to cater for them. All of these approaches placed responsibility within the authoring/publishing domain without recognising the role the user might want to play, or the roles that other users in social networks, or even Web services might play. Adaptability shifts the emphasis and calls for greater freedom for the users to facilitate individual accessibility in the open Web environment.
Access to data and the information explosion: oral contraceptives and risk of cancer.
Weiner, J M; Shirley, S; Gilman, N J; Stowe, S M; Wolf, R M
1981-09-01
This report describes a technically feasible method to deal with the enormous volume of literature published regarding oral contraceptives. This subject was discussed in 3735 publications during the period from November 1977 through October 1980. Our findings showed that those papers reporting original, numeric relationships involving risk of cancer and use of oral contraceptives were one percent of the total 3735 publications. However, only seven of the 27 articles involved were authored by individuals from departments of obstetrics and gynecology. Further, only four of the 27 were published in journals devoted to obstetrics and gynecology. The analyses suggest a form of censorship taking place, in that the obstetrics/gynecology specialists do not have ready access to the primary data.
Airport Ground Access Planning Guide
DOT National Transportation Integrated Search
1980-07-01
Airport access has been identified by some airport authorities as a potential threat to the growth of aviation. In order to help airport planners and local authorities define the critical elements of an access problem and identify improvement project...
German National Galileo Public Regulated Service (PRS) Testing Activities
NASA Astrophysics Data System (ADS)
Habrich, Heinz; Söhne, Wolfgang
2013-04-01
The European Global Navigation System (GNSS) Galileo is going to be established in the near future. Currently, four satellites are in place forming the In-Orbit-Testing (IOT) phase. Within the next years, the constellation will be filled. Full Operational Capability (FOC) will be reached 2019. Beside the Open Service (OS) which is comparable to other OS of existing GNSS, e.g., GPS C/A, there is a so-called Public Regulated Service (PRS) included in the IOT satellites already. The PRS will have improved robustness, i.e. robust signals which will be resistant against involuntary interferences, jamming and spoofing. The PRS signal is encrypted and there will be a restricted access to authorized users, e.g. safety and emergency services, authorities with security task, critical infrastructure organizations etc. The access to the PRS which will be controlled through a special key management will be managed and supervised within the European Union (EU) Member States (MS) by national authorities, the Competent PRS Authority (CPA). But a set of Common Minimum Standards (CMS) will define the minimum requirements applicable to each PRS participant. Nevertheless, each MS is responsible for its national key management. This presentation will inform about the testing activities for Galileo PRS in Germany. The coarse concept for the testing is explained, the schedule is outlined. Finally, the paper will formulate some expectations to the Galileo PRS, e.g. for international cooperation.
Code of Federal Regulations, 2010 CFR
2010-01-01
... authority to order use of procedures for access by potential parties to certain sensitive unclassified... authority to order use of procedures for access by potential parties to certain sensitive unclassified... Commission or the presiding officer. (b) If this part does not prescribe a time limit for an action to be...
Due diligence in the open-access explosion era: choosing a reputable journal for publication.
Masten, Yondell; Ashcraft, Alyce
2017-11-15
Faculty are required to publish. Naïve and "in-a-hurry-to-publish" authors seek to publish in journals where manuscripts are rapidly accepted. Others may innocently submit to one of an increasing number of questionable/predatory journals, where predatory is defined as practices of publishing journals for exploitation of author-pays, open-access publication model by charging authors publication fees for publisher profit without provision of expected services (expert peer review, editing, archiving, and indexing published manuscripts) and promising almost instant publication. Authors may intentionally submit manuscripts to predatory journals for rapid publication without concern for journal quality. A brief summary of the open access "movement," suggestions for selecting reputable open access journals, and suggestion for avoiding predatory publishers/journals are described. The purpose is to alert junior and seasoned faculty about predatory publishers included among available open access journal listings. Brief review of open access publication, predatory/questionable journal characteristics, suggestions for selecting reputable open access journals and avoiding predatory publishers/journals are described. Time is required for intentionally performing due diligence in open access journal selection, based on publisher/journal quality, prior to manuscript submission or authors must be able to successfully withdraw manuscripts when submission to a questionable or predatory journal is discovered. © FEMS 2017.
Due diligence in the open-access explosion era: choosing a reputable journal for publication
Ashcraft, Alyce
2017-01-01
Abstract Faculty are required to publish. Naïve and “in-a-hurry-to-publish” authors seek to publish in journals where manuscripts are rapidly accepted. Others may innocently submit to one of an increasing number of questionable/predatory journals, where predatory is defined as practices of publishing journals for exploitation of author-pays, open-access publication model by charging authors publication fees for publisher profit without provision of expected services (expert peer review, editing, archiving, and indexing published manuscripts) and promising almost instant publication. Authors may intentionally submit manuscripts to predatory journals for rapid publication without concern for journal quality. A brief summary of the open access “movement,” suggestions for selecting reputable open access journals, and suggestion for avoiding predatory publishers/journals are described. The purpose is to alert junior and seasoned faculty about predatory publishers included among available open access journal listings. Brief review of open access publication, predatory/questionable journal characteristics, suggestions for selecting reputable open access journals and avoiding predatory publishers/journals are described. Time is required for intentionally performing due diligence in open access journal selection, based on publisher/journal quality, prior to manuscript submission or authors must be able to successfully withdraw manuscripts when submission to a questionable or predatory journal is discovered. PMID:29040536
Palmer, Jane E; Renner, Lynette M; Goodman, Lisa A; Dutton, Mary Ann
2016-03-01
We examined whether risks to children of intimate partner violence survivors affected the type of legal assistance accessed. We hypothesized that the level and type of perceived child risk would be associated with whether women sought a protection order in civil court or filed charges against a current or former intimate partner in criminal court. Using data from a sample of predominantly African American women (N=293), we found that some forms of child risk were positively associated with seeking a civil order of protection but negatively associated with pressing criminal charges. Implications for practice, policy, and future research are presented. © The Author(s) 2015.
Mutekwa, V T; Gambiza, J
2017-08-01
In this literature review based paper we explored the concept of exclusion of local communities from accessing resources in forest protected areas (FPAs) in Zimbabwe. We discussed the colonial and post-colonial forms, causes and mechanisms of exclusion and their social, economic and ecological outcomes. We examined the range of powers embodied in and exercised through various mechanisms, processes and social relations and their impact on local communities' access to FPA resources and associated benefits along the historical trajectory of forest governance in Zimbabwe. Results showed that the forms and extent of exclusion changed over time in tandem with the shifting political and economic landscape. During the colonial period, it was total exclusion whereby people were evicted from forest land as well as being denied access to basic resources for their livelihoods. Local communities' access to low value FPA resources improved during the post-colonial period but access to high value resources like commercial timber as well as sharing income benefits derived from FPA commercial activities remained a pipe dream. Regulation, legitimation, force and markets constituted the mixture of the power elements that FPA governing authorities used to exclude local communities. These powers remained intact despite attempts at collaborative governance in the 1990s. However, from the year 2000, local communities expressed their dissatisfaction with the centralised exclusionary governance system by invading the FPAs rendering them ungovernable. There is therefore a need for policy reform within the FPA sector to improve the current dire situation. Copyright © 2017 Elsevier Ltd. All rights reserved.
12 CFR 40.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2011 CFR
2011-01-01
... similar form of access number or access code, does not include a number or code in an encrypted form, as... reporting agency, an account number or similar form of access number or access code for a consumer's credit... number or access code: (1) To the bank's agent or service provider solely in order to perform marketing...
12 CFR 40.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2014 CFR
2014-01-01
... similar form of access number or access code, does not include a number or code in an encrypted form, as... reporting agency, an account number or similar form of access number or access code for a consumer's credit... number or access code: (1) To the bank's agent or service provider solely in order to perform marketing...
12 CFR 40.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2012 CFR
2012-01-01
... similar form of access number or access code, does not include a number or code in an encrypted form, as... reporting agency, an account number or similar form of access number or access code for a consumer's credit... number or access code: (1) To the bank's agent or service provider solely in order to perform marketing...
12 CFR 40.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2013 CFR
2013-01-01
... similar form of access number or access code, does not include a number or code in an encrypted form, as... reporting agency, an account number or similar form of access number or access code for a consumer's credit... number or access code: (1) To the bank's agent or service provider solely in order to perform marketing...
77 FR 26213 - Access Authorization Fees
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-03
... and Regulations section of this Federal Register. List of Subjects 10 CFR Part 11 Hazardous materials--transportation, Investigations, Nuclear materials, Reporting and recordkeeping requirements, Security measures... amend its access authorization fees charged to licensees for work performed under the Material Access...
ERIC Educational Resources Information Center
Tenopir, Carol; Dalton, Elizabeth D.; Christian, Lisa; Jones, Misty K.; McCabe, Mark; Smith, MacKenzie; Fish, Allison
2017-01-01
The viability of gold open access publishing models into the future will depend, in part, on the attitudes of authors toward open access (OA). In a survey of academics at four major research universities in North America, we examine academic authors' opinions and behaviors toward gold OA. The study allows us to see what academics know and perceive…
77 FR 26149 - Access Authorization Fees
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-03
... Regulatory Affairs of OMB. List of Subjects 10 CFR Part 11 Hazardous materials--transportation... licensees for work performed under the Material Access Authorization Program (MAAP) and the Information... assigned duties which require access to special nuclear material (plutonium, uranium-233, and uranium...
Statistical Analysis in Dental Research Papers.
1983-08-08
AD A136, 019 STATISTICAL ANALYSS IN DENTAL RESEARCH PAPERS(Ul ARMY I INS OF DENTAL NESEARCH WASHINGTON DC L LORTON 0R AUG983 UNCL ASS FED F/S 6/5 IEE...BEFORE COSTL’,..G FORM 2. GOVT ACCESSION NO 3. RECIPIENTS CATALOG NUbER d Ste S. TYPE OF REPORT A PERIOD COVERED ,cistical Analysis in Dental Research ...Papers Submission of papaer Jan- Aue 1983 X!t AUTHOR(&) ". COTACO.RATN Lewis Lorton 9. PERFORMING ORGANIZATION NAME AND ADDRESS 10. PROGRAM ELEMENT
Masic, Izet; Begic, Edin
2016-12-01
Information technologies have found their application in virtually every branch of health care. In recent years they have demonstrated their potential in the development of online library, where scientists and researchers can share their latest findings. Academia.edu, ResearchGate, Mendeley, Kudos, with the support of platform GoogleScholar, have indeed increased the visibility of scientific work of one author, and enable a much greater availability of the scientific work to the broader audience. Online libraries have allowed free access to the scientific content to the countries that could not follow the economic costs of getting access to certain scientific bases. Especially great benefit occurred in countries in transition and developing countries. Online libraries have great potential in terms of expanding knowledge, but they also present a major problem for many publishers, because their rights can be violated, which are signed by the author when publishing the paper. In the future it will lead to a major conflict of the author, the editorial board and online database, about the right to scientific content This question certainly represents one of the most pressing issues of publishing, whose future in printed form is already in the past, and the future of the online editions will be a problem of large-scale.
Masic, Izet; Begic, Edin
2016-01-01
Information technologies have found their application in virtually every branch of health care. In recent years they have demonstrated their potential in the development of online library, where scientists and researchers can share their latest findings. Academia.edu, ResearchGate, Mendeley, Kudos, with the support of platform GoogleScholar, have indeed increased the visibility of scientific work of one author, and enable a much greater availability of the scientific work to the broader audience. Online libraries have allowed free access to the scientific content to the countries that could not follow the economic costs of getting access to certain scientific bases. Especially great benefit occurred in countries in transition and developing countries. Online libraries have great potential in terms of expanding knowledge, but they also present a major problem for many publishers, because their rights can be violated, which are signed by the author when publishing the paper. In the future it will lead to a major conflict of the author, the editorial board and online database, about the right to scientific content This question certainly represents one of the most pressing issues of publishing, whose future in printed form is already in the past, and the future of the online editions will be a problem of large-scale. PMID:28077905
77 FR 46257 - Access Authorization Fees; Correction
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-03
[email protected] . List of Subjects 10 CFR Part 11 Hazardous materials--transportation, Investigations, Nuclear materials, Reporting and recordkeeping requirements, Security measures, Special nuclear... authorization fees charged to licensees for work performed under the Material Access Authorization Program (MAAP...
ERIC Educational Resources Information Center
Grandbois, Jennifer; Beheshti, Jamshid
2014-01-01
Introduction: This study aims to gain a greater understanding of the development of open access practices amongst library and information science authors, since their role is integral to the success of the broader open access movement. Method: Data were collected from scholarly articles about open access by library and information science authors…
Bodina, Annalisa; Brizzolara, Antonella; Vadruccio, Gianluca; Castaldi, Silvana
2012-01-01
This paper describes the experience of a hospital which has introduced a system of computerized management of letters of authorization for healthcare workers to access sensitive health data, through the use of open source software. A new corporate intranet portal was created with access given only to the privacy contacts of each operational unit of the hospital. Once the privacy contact has entered the relevant user authorization, these must be approved first by the Directors of the respective operational units and finally by the privacy officer. The introduction of this system has allowed a systematic approach to the management of authorization for access to health data by hospital staff, regular updating and monitoring of the authorization and the start of a process of digitalization of documents.
10 CFR 10.21 - Suspension of access authorization and/or employment clearance.
Code of Federal Regulations, 2014 CFR
2014-01-01
... ELIGIBILITY FOR ACCESS TO RESTRICTED DATA OR NATIONAL SECURITY INFORMATION OR AN EMPLOYMENT CLEARANCE... access authorization and/or an employment clearance, the Director, Division of Facilities and Security... Corporate Management and Chief Information Officer or other Deputy Executive Director, his or her...
10 CFR 10.21 - Suspension of access authorization and/or employment clearance.
Code of Federal Regulations, 2013 CFR
2013-01-01
... ELIGIBILITY FOR ACCESS TO RESTRICTED DATA OR NATIONAL SECURITY INFORMATION OR AN EMPLOYMENT CLEARANCE... access authorization and/or an employment clearance, the Director, Division of Facilities and Security... Corporate Management and Chief Information Officer or other Deputy Executive Director, his or her...
12 CFR 1016.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2013 CFR
2013-01-01
... encrypted form, as long as you do not provide the recipient with a means to decode the number or code. (2... reporting agency, an account number or similar form of access number or access code for a consumer's credit... similar form of access number or access code: (1) To your agent or service provider solely in order to...
12 CFR 1016.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2014 CFR
2014-01-01
... encrypted form, as long as you do not provide the recipient with a means to decode the number or code. (2... reporting agency, an account number or similar form of access number or access code for a consumer's credit... similar form of access number or access code: (1) To your agent or service provider solely in order to...
12 CFR 216.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2012 CFR
2012-01-01
... code in an encrypted form, as long as you do not provide the recipient with a means to decode the... than to a consumer reporting agency, an account number or similar form of access number or access code... account number or similar form of access number or access code: (1) To your agent or service provider...
16 CFR 313.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2013 CFR
2013-01-01
... encrypted form, as long as you do not provide the recipient with a means to decode the number or code. (2... consumer reporting agency, an account number or similar form of access number or access code for a consumer... similar form of access number or access code: (1) To your agent or service provider solely in order to...
16 CFR 313.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2011 CFR
2011-01-01
... encrypted form, as long as you do not provide the recipient with a means to decode the number or code. (2... consumer reporting agency, an account number or similar form of access number or access code for a consumer... similar form of access number or access code: (1) To your agent or service provider solely in order to...
17 CFR 160.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2013 CFR
2013-04-01
... a number or code in an encrypted form, as long as you do not provide the recipient with a means to... form of access number or access code for a consumer's credit card account, deposit account or... apply if you disclose an account number or similar form of access number or access code: (1) To your...
12 CFR 216.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2014 CFR
2014-01-01
... code in an encrypted form, as long as you do not provide the recipient with a means to decode the... than to a consumer reporting agency, an account number or similar form of access number or access code... account number or similar form of access number or access code: (1) To your agent or service provider...
17 CFR 160.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2012 CFR
2012-04-01
... a number or code in an encrypted form, as long as you do not provide the recipient with a means to... form of access number or access code for a consumer's credit card account, deposit account or... apply if you disclose an account number or similar form of access number or access code: (1) To your...
16 CFR 313.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2012 CFR
2012-01-01
... encrypted form, as long as you do not provide the recipient with a means to decode the number or code. (2... consumer reporting agency, an account number or similar form of access number or access code for a consumer... similar form of access number or access code: (1) To your agent or service provider solely in order to...
12 CFR 216.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2013 CFR
2013-01-01
... code in an encrypted form, as long as you do not provide the recipient with a means to decode the... than to a consumer reporting agency, an account number or similar form of access number or access code... account number or similar form of access number or access code: (1) To your agent or service provider...
12 CFR 1016.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2012 CFR
2012-01-01
... encrypted form, as long as you do not provide the recipient with a means to decode the number or code. (2... reporting agency, an account number or similar form of access number or access code for a consumer's credit... similar form of access number or access code: (1) To your agent or service provider solely in order to...
12 CFR 332.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2013 CFR
2013-01-01
... encrypted form, as long as you do not provide the recipient with a means to decode the number or code. (2... consumer reporting agency, an account number or similar form of access number or access code for a consumer... similar form of access number or access code: (1) To your agent or service provider solely in order to...
12 CFR 332.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2011 CFR
2011-01-01
... encrypted form, as long as you do not provide the recipient with a means to decode the number or code. (2... consumer reporting agency, an account number or similar form of access number or access code for a consumer... similar form of access number or access code: (1) To your agent or service provider solely in order to...
12 CFR 332.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2014 CFR
2014-01-01
... encrypted form, as long as you do not provide the recipient with a means to decode the number or code. (2... consumer reporting agency, an account number or similar form of access number or access code for a consumer... similar form of access number or access code: (1) To your agent or service provider solely in order to...
12 CFR 216.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2011 CFR
2011-01-01
... code in an encrypted form, as long as you do not provide the recipient with a means to decode the... than to a consumer reporting agency, an account number or similar form of access number or access code... account number or similar form of access number or access code: (1) To your agent or service provider...
12 CFR 332.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2012 CFR
2012-01-01
... encrypted form, as long as you do not provide the recipient with a means to decode the number or code. (2... consumer reporting agency, an account number or similar form of access number or access code for a consumer... similar form of access number or access code: (1) To your agent or service provider solely in order to...
16 CFR 313.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2014 CFR
2014-01-01
... encrypted form, as long as you do not provide the recipient with a means to decode the number or code. (2... consumer reporting agency, an account number or similar form of access number or access code for a consumer... similar form of access number or access code: (1) To your agent or service provider solely in order to...
17 CFR 160.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2014 CFR
2014-04-01
... a number or code in an encrypted form, as long as you do not provide the recipient with a means to... similar form of access number or access code for a consumer's credit card account, deposit account or... apply if you disclose an account number or similar form of access number or access code: (1) To your...
Hesselman, Marlies; Toebes, Brigit
2017-07-15
This Commentary forms a response to Nikogosian's and Kickbusch's forward-looking perspective about the legal strength of international health instruments. Building on their arguments, in this commentary we consider what we can learn from the Framework Convention on Tobacco Control (FCTC) for the adoption of new legal international health instruments. © 2018 The Author(s); Published by Kerman University of Medical Sciences. This is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
10 CFR 11.16 - Cancellation of request for special nuclear material access authorization.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Cancellation of request for special nuclear material access authorization. 11.16 Section 11.16 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for...
10 CFR 11.15 - Application for special nuclear material access authorization.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Application for special nuclear material access authorization. 11.15 Section 11.15 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for Special Nuclear Material...
10 CFR 11.15 - Application for special nuclear material access authorization.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Application for special nuclear material access authorization. 11.15 Section 11.15 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for Special Nuclear Material...
10 CFR 11.16 - Cancellation of request for special nuclear material access authorization.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Cancellation of request for special nuclear material access authorization. 11.16 Section 11.16 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for...
10 CFR 11.16 - Cancellation of request for special nuclear material access authorization.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Cancellation of request for special nuclear material access authorization. 11.16 Section 11.16 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for...
10 CFR 11.15 - Application for special nuclear material access authorization.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Application for special nuclear material access authorization. 11.15 Section 11.15 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for Special Nuclear Material...
10 CFR 11.15 - Application for special nuclear material access authorization.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Application for special nuclear material access authorization. 11.15 Section 11.15 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for Special Nuclear Material...
10 CFR 11.15 - Application for special nuclear material access authorization.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Application for special nuclear material access authorization. 11.15 Section 11.15 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for Special Nuclear Material...
Cuschieri, Sarah
2018-06-01
Academics have a duty towards peers and scholars alike to engage in research work and to publish their findings. This also assists in establishing personal academic success as well as the attainment of research grants. In the past, authors used to publish their research articles for free but access to these articles was restricted to subscription users only. Recently, open access publishing has gained momentum, whereby such articles are made freely accessible online. However open access publishing comes with a price tag for the author through article processing charges. Open access may also question a journal's credibility within the academic world if improperly implemented. This is particularly so following the unsolicited bombardment of researchers' email accounts with invitations for submissions to predatory open access journals. For these reasons, authors needs to rigorously weigh the pros and cons of whether to choose a subscription based or an open access journal for publication. Copyright © 2018 Elsevier B.V. All rights reserved.
AccessMRS: integrating OpenMRS with smart forms on Android.
Fazen, Louis E; Chemwolo, Benjamin T; Songok, Julia J; Ruhl, Laura J; Kipkoech, Carolyne; Green, James M; Ikemeri, Justus E; Christoffersen-Deb, Astrid
2013-01-01
We present a new open-source Android application, AccessMRS, for interfacing with an electronic medical record system (OpenMRS) and loading 'Smart Forms' on a mobile device. AccessMRS functions as a patient-centered interface for viewing OpenMRS data; managing patient information in reminders, task lists, and previous encounters; and launching patient-specific 'Smart Forms' for electronic data collection and dissemination of health information. We present AccessMRS in the context of related software applications we developed to serve Community Health Workers, including AccessInfo, AccessAdmin, AccessMaps, and AccessForms. The specific features and design of AccessMRS are detailed in relationship to the requirements that drove development: the workflows of the Kenyan Ministry of Health Community Health Volunteers (CHVs) supported by the AMPATH Primary Health Care Program. Specifically, AccessMRS was designed to improve the quality of community-based Maternal and Child Health services delivered by CHVs in Kosirai Division. AccessMRS is currently in use by more than 80 CHVs in Kenya and undergoing formal assessment of acceptability, effectiveness, and cost.
Our land, our language: connecting dispossession and health equity in an indigenous context.
Brown, Helen J; McPherson, Gladys; Peterson, Ruby; Newman, Vera; Cranmer, Barbara
2012-06-01
For contemporary Indigenous people, colonial relations (past and present) intersect with neoliberal policies and practices to create subtle forms of dispossession.These undermine the health of Indigenous peoples and create barriers restricting access to appropriate health services. Integrating insights from the critical geographer David Harvey, the authors demonstrate how the dispossession of land and language threaten health and well-being and worsen existing illness conditions. Drawing on the qualitative findings from a program of community-based research with the 'Namgis First Nation in the Canadian province of British Columbia, the authors argue for an account of how neoliberal mechanisms operate to further the "accumulation by dispossession" associated with historical and ongoing colonialism. Specifically, they show how neoliberal ideologies operate to sustain medical colonialism and health inequities for Indigenous peoples. The authors discuss the implications for nursing actions to achieve health equity in rural First Nations communities.
Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley
2010-10-01
Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.
75 FR 3721 - Combined Notice of Filings #1
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-22
..., LLC submits amended application for market based rate authority, associated waivers, blanket approvals... authorization to market-based sales of energy and capacity at wholesale. Filed Date: 01/11/2010. Accession... Notice of Cancellation re the market based rate authority. Filed Date: 01/13/2010. Accession Number...
10 CFR 710.9 - Action on derogatory information.
Code of Federal Regulations, 2010 CFR
2010-01-01
... information shall be regarded as derogatory and create a question as to the individual's access authorization eligibility. (b) If a question arises as to the individual's access authorization eligibility, the Local Director of Security shall authorize the conduct of an interview with the individual, or other appropriate...
10 CFR 710.9 - Action on derogatory information.
Code of Federal Regulations, 2011 CFR
2011-01-01
... information shall be regarded as derogatory and create a question as to the individual's access authorization eligibility. (b) If a question arises as to the individual's access authorization eligibility, the Local Director of Security shall authorize the conduct of an interview with the individual, or other appropriate...
ERIC Educational Resources Information Center
Cusker, Jeremy; Rauh, Anne E.
2014-01-01
Discussions of the potential of open access publishing frequently must contend with the skepticism of research authors regarding the need to pay author fees (also known as publication fees). With that in mind, the authors undertook a survey of faculty, postdocs, and graduate students in physical science, mathematics, and engineering fields at two…
Patent law--balancing profit maximization and public access to technology.
Beckerman-Rodau, Andrew
2003-01-01
This article addresses the contemporary issue of balancing the need for patent protection for intellectual property with the resulting restriction of public access to new technology. The author argues that patent law protects private property rights rather than creating monopolies. Additionally, the author discusses how restricting access to patented technology, such as pharmaceuticals, can affect public health problems, such as the HIV/AIDS epidemic in developing nations. The author then concludes with some proposals for making patented technology available to people in developing nations who need access to such technology but who are unable to afford its high costs due to patent protection.
10 CFR 73.56 - Personnel access authorization requirements for nuclear power plants.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Personnel access authorization requirements for nuclear power plants. 73.56 Section 73.56 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION... authorization requirements for nuclear power plants. (a) Introduction. (1) By March 31, 2010, each nuclear power...
10 CFR 73.56 - Personnel access authorization requirements for nuclear power plants.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Personnel access authorization requirements for nuclear power plants. 73.56 Section 73.56 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION... authorization requirements for nuclear power plants. (a) Introduction. (1) By March 31, 2010, each nuclear power...
10 CFR 73.56 - Personnel access authorization requirements for nuclear power plants.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Personnel access authorization requirements for nuclear power plants. 73.56 Section 73.56 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION... authorization requirements for nuclear power plants. (a) Introduction. (1) By March 31, 2010, each nuclear power...
10 CFR 73.56 - Personnel access authorization requirements for nuclear power plants.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Personnel access authorization requirements for nuclear power plants. 73.56 Section 73.56 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION... authorization requirements for nuclear power plants. (a) Introduction. (1) By March 31, 2010, each nuclear power...
A federated capability-based access control mechanism for internet of things (IoTs)
NASA Astrophysics Data System (ADS)
Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe
2018-05-01
The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.
A Preliminary Study of Reducing the Cost of Blast Shelter for Critical Workers
1983-08-01
ArD-A2’ 3 •’ ORNL -5953 UNIONA Preliminary Study CARBJCEof Reducing the Cost of Blast Shelter for Critical Workers C. V. Chester D. W. Holladay ~s...DOCUMENTATION PAGE READ INSTRUCTIONS BEFORE COMPLETING FORM Ŗ. REPORT NUMBER 2. GOVT ACCESSION NO. 3. RECIPIENT’S CATALOG NUMBER ORNL (5958 .).4 ’I L...WORKERS 6. PERFORMING ORG. REPORT NUMBER ORNL /n5958 7. AUTHOR(a) 8. CONTRACT OR GRANT NUMBER(e) C. V. CHESTER, D. W. HOLLADAY FEMA EMW E 0.739 9
1984-12-01
official Department of the Army position, policy, or decision unless so designated by other official documentation. DUTIMDWON UTEMNA ftvfd b publc nIj" s ...DOCUMENTATION PAGES CONSRPR M T OPAEBEFOR COM PLETING FORM "- 0. HRUMUSR 2. GOVT ACCESSION NO. RECIPIENT’S CATALOG MUMUER 4. TITLE (and Subttle) S ...PERFORING ORG. REPORT MUMMER USAESC-R-84-11- 7. AUTHOR( s ) 4. CONTRACT ON GRANT NUMlUER() Ms. Jill M. Davis NA Ms. G. Leslie Geiger Mr. Robert B
Code of Federal Regulations, 2014 CFR
2014-10-01
... issuing an access authorization to mining claims or other valid occupancies wholly surrounded by... permit the reasonable use of the non-Federal land, valid mining claim, or other valid occupancy; and (3) The location, construction, maintenance, and use of the access route that BLM approves will be as...
Code of Federal Regulations, 2011 CFR
2011-10-01
... issuing an access authorization to mining claims or other valid occupancies wholly surrounded by... permit the reasonable use of the non-Federal land, valid mining claim, or other valid occupancy; and (3) The location, construction, maintenance, and use of the access route that BLM approves will be as...
Code of Federal Regulations, 2013 CFR
2013-10-01
... issuing an access authorization to mining claims or other valid occupancies wholly surrounded by... permit the reasonable use of the non-Federal land, valid mining claim, or other valid occupancy; and (3) The location, construction, maintenance, and use of the access route that BLM approves will be as...
Code of Federal Regulations, 2012 CFR
2012-10-01
... issuing an access authorization to mining claims or other valid occupancies wholly surrounded by... permit the reasonable use of the non-Federal land, valid mining claim, or other valid occupancy; and (3) The location, construction, maintenance, and use of the access route that BLM approves will be as...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kang, Dae Yun; Lee, Tae-Ho; Kim, Tae Geun, E-mail: tgkim1@korea.ac.kr
The authors report an improvement in resistive switching (RS) characteristics of amorphous indium-gallium-zinc-oxide (a-IGZO)-based resistive random access memory devices using hydrogen post-annealing. Because this a-IGZO thin film has oxygen off-stoichiometry in the form of deficient and excessive oxygen sites, the film properties can be improved by introducing hydrogen atoms through the annealing process. After hydrogen post-annealing, the device exhibited a stable bipolar RS, low-voltage set and reset operation, long retention (>10{sup 5 }s), good endurance (>10{sup 6} cycles), and a narrow distribution in each current state. The effect of hydrogen post-annealing is also investigated by analyzing the sample surface using X-raymore » photon spectroscopy and atomic force microscopy.« less
Automated Rocket Propulsion Test Management
NASA Technical Reports Server (NTRS)
Walters, Ian; Nelson, Cheryl; Jones, Helene
2007-01-01
The Rocket Propulsion Test-Automated Management System provides a central location for managing activities associated with Rocket Propulsion Test Management Board, National Rocket Propulsion Test Alliance, and the Senior Steering Group business management activities. A set of authorized users, both on-site and off-site with regard to Stennis Space Center (SSC), can access the system through a Web interface. Web-based forms are used for user input with generation and electronic distribution of reports easily accessible. Major functions managed by this software include meeting agenda management, meeting minutes, action requests, action items, directives, and recommendations. Additional functions include electronic review, approval, and signatures. A repository/library of documents is available for users, and all items are tracked in the system by unique identification numbers and status (open, closed, percent complete, etc.). The system also provides queries and version control for input of all items.
Peer Review and Publication of Research Protocols and Proposals: A Role for Open Access Journals
2004-01-01
Peer-review and publication of research protocols offer several advantages to all parties involved. Among these are the following opportunities for authors: external expert opinion on the methods, demonstration to funding agencies of prior expert review of the protocol, proof of priority of ideas and methods, and solicitation of potential collaborators. We think that review and publication of protocols is an important role for Open Access journals. Because of their electronic form, openness for readers, and author-pays business model, they are better suited than traditional journals to ensure the sustainability and quality of protocol reviews and publications. In this editorial, we describe the workflow for investigators in eHealth research, from protocol submission to a funding agency, to protocol review and (optionally) publication at JMIR, to registration of trials at the International eHealth Study Registry (IESR), and to publication of the report. One innovation at JMIR is that protocol peer reviewers will be paid a honorarium, which will be drawn partly from a new submission fee for protocol reviews. Separating the article processing fee into a submission and a publishing fee will allow authors to opt for “peer-review only” (without subsequent publication) at reduced costs, if they wish to await a funding decision or for other reasons decide not to make the protocol public. PMID:15471763
Peer-review and publication of research protocols and proposals: a role for open access journals.
Eysenbach, Gunther
2004-09-30
Peer-review and publication of research protocols offer several advantages to all parties involved. Among these are the following opportunities for authors: external expert opinion on the methods, demonstration to funding agencies of prior expert review of the protocol, proof of priority of ideas and methods, and solicitation of potential collaborators. We think that review and publication of protocols is an important role for Open Access journals. Because of their electronic form, openness for readers, and author-pays business model, they are better suited than traditional journals to ensure the sustainability and quality of protocol reviews and publications. In this editorial, we describe the workflow for investigators in eHealth research, from protocol submission to a funding agency, to protocol review and (optionally) publication at JMIR, to registration of trials at the International eHealth Study Registry (IESR), and to publication of the report. One innovation at JMIR is that protocol peer reviewers will be paid a honorarium, which will be drawn partly from a new submission fee for protocol reviews. Separating the article processing fee into a submission and a publishing fee will allow authors to opt for "peer-review only" (without subsequent publication) at reduced costs, if they wish to await a funding decision or for other reasons decide not to make the protocol public.
32 CFR Appendix B to Part 504 - Customer Consent and Authorization For Access-Sample Format
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 3 2010-07-01 2010-07-01 true Customer Consent and Authorization For Access-Sample Format B Appendix B to Part 504 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS OBTAINING INFORMATION FROM FINANCIAL...
32 CFR Appendix B to Part 504 - Customer Consent and Authorization For Access-Sample Format
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 3 2011-07-01 2009-07-01 true Customer Consent and Authorization For Access-Sample Format B Appendix B to Part 504 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS OBTAINING INFORMATION FROM FINANCIAL...
ERIC Educational Resources Information Center
Horn, Marguerite E.
2002-01-01
Discusses the difference in subject access in OPACs (online public access catalogs) between subject searching (authority, alphabetic, or controlled vocabulary) versus keyword searching (uncontrolled, free text, natural language vocabulary). Compares a query on the term "garbage" in two online catalogs and discusses results. (Author/LRW)
12 CFR 573.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2014 CFR
2014-01-01
... access number or access code, does not include a number or code in an encrypted form, as long as you do... account number or similar form of access number or access code for a consumer's credit card account... or access code: (1) To your agent or service provider solely in order to perform marketing for your...
12 CFR 573.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2012 CFR
2012-01-01
... access number or access code, does not include a number or code in an encrypted form, as long as you do... reporting agency, an account number or similar form of access number or access code for a consumer's credit... number or access code: (1) To your agent or service provider solely in order to perform marketing for...
12 CFR 573.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2011 CFR
2011-01-01
... access number or access code, does not include a number or code in an encrypted form, as long as you do... reporting agency, an account number or similar form of access number or access code for a consumer's credit... number or access code: (1) To your agent or service provider solely in order to perform marketing for...
12 CFR 573.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2013 CFR
2013-01-01
... access number or access code, does not include a number or code in an encrypted form, as long as you do... account number or similar form of access number or access code for a consumer's credit card account... or access code: (1) To your agent or service provider solely in order to perform marketing for your...
River landscapes and optimal channel networks.
Balister, Paul; Balogh, József; Bertuzzo, Enrico; Bollobás, Béla; Caldarelli, Guido; Maritan, Amos; Mastrandrea, Rossana; Morris, Robert; Rinaldo, Andrea
2018-06-26
We study tree structures termed optimal channel networks (OCNs) that minimize the total gravitational energy loss in the system, an exact property of steady-state landscape configurations that prove dynamically accessible and strikingly similar to natural forms. Here, we show that every OCN is a so-called natural river tree, in the sense that there exists a height function such that the flow directions are always directed along steepest descent. We also study the natural river trees in an arbitrary graph in terms of forbidden substructures, which we call k-path obstacles, and OCNs on a d-dimensional lattice, improving earlier results by determining the minimum energy up to a constant factor for every [Formula: see text] Results extend our capabilities in environmental statistical mechanics. Copyright © 2018 the Author(s). Published by PNAS.
DNA replication through a chromatin environment.
Bellush, James M; Whitehouse, Iestyn
2017-10-05
Compaction of the genome into the nuclear space is achieved by wrapping DNA around octameric assemblies of histone proteins to form nucleosomes, the fundamental repeating unit of chromatin. Aside from providing a means by which to fit larger genomes into the cell, chromatinization of DNA is a crucial means by which the cell regulates access to the genome. While the complex role that chromatin plays in gene transcription has been appreciated for a long time, it is now also apparent that crucial aspects of DNA replication are linked to the biology of chromatin. This review will focus on recent advances in our understanding of how the chromatin environment influences key aspects of DNA replication.This article is part of the themed issue 'Chromatin modifiers and remodellers in DNA repair and signalling'. © 2017 The Author(s).
The treatment of Sylvia Plath.
Firestone, L; Catlett, J
1998-01-01
Although Sylvia Plath apparently sought psychotherapeutic help following her first suicide attempt in her twenties, she did not have access to specialized forms of suicide assessment and intervention available in the present day. In this 'thought experiment,' the authors drew on material available in her journals and literary work to formulate a treatment plan for Plath, were she to be seen by a contemporary psychotherapist skilled in voice therapy. In particular, they focused on her inwardness, her preference for fantasy gratification, her self-denial, her addictive attachment to her mother and husband, and her negative thoughts toward self and cynicism toward others. The authors then sketched out suicide risk assessment procedures as they might be applied in her case, and illustrated a hypothetical voice therapy session designed to ameliorate her pertubation and lethality during her last suicidal crisis.
ERIC Educational Resources Information Center
Wisconsin Univ., Madison. Trace Center.
This document brings together eight papers presented at a rehabilitation technology conference, authored by individuals affiliated with the Trace R & D Center on Communication, Control and Computer Access for Handicapped Individuals. Titles and authors of the papers are as follows: "Current Initiatives in Accessible Computing" (Jane Berliss);…
Brandstetter, Thomas
2012-10-01
The aim of this article is to show how, and in which context, astrobiological reasoning was employed before the establishment of astrobiology as a scientific discipline. By way of an example, I will discuss a popular science book published in 1931 by the Hungarian journalist Desiderius Papp. The author claims that this book represents an innovation in astrobiological reasoning, as it draws on contemporary biological research to conduct thought experiments, thereby coming up with concrete forms of possible extraterrestrial life. One of the most interesting of these forms was crystalline life. After a short overview on the history of this concept, this article will show how Papp drew on recent research by Otto Lehmann on liquid crystals to convey the idea that life may be based on other elements than carbon. The author concludes by arguing that popular science did not only make specialist knowledge accessible to a general public but also served to probe the limits of knowledge and point toward the situatedness of established categories and definitions.
Gambling involvement and increased risk of gambling problems.
Phillips, James G; Ogeil, Rowan; Chow, Yang-Wai; Blaszczynski, Alex
2013-12-01
The opportunity to gamble has undergone rapid expansion with technology allowing for access to gambling products 24 h a day. This increased online availability challenges governments' abilities to restrict access to gambling. Indeed, the ready access to multiple forms of gambling may potentially contribute to impaired control over urges for problem gamblers. The present study considered whether problem gamblers manifested a tendency to engage in multiple forms of gambling and identified forms of gambling which were more strongly related to problem gambling. In reanalyses of two surveys (Sample 1, N = 464, Sample 2, N = 1141), significant relationships accounting for between 11.3 and 13.5% of the variance were found between the numbers of forms of gambling accessed and degree of problem. Participation in online poker, playing cards and sports wagering were linked to problem gambling. Access to multiple forms of gambling may pose difficulties for the tracking and control of gambling.
Structural precaution: the application of premarket approval schemes in EU food legislation.
van der Meulen, Bernd M J; Bremmers, Harry J; Wijnands, Jo H M; Poppe, Krijn J
2012-01-01
Structural precaution refers to legal requirements by which food products (whether as ingredients, additives, genetically modified or innovative in some other form) are only admitted to the market after authorization by public authorities and till then are presumed unsafe. In the EU such authorization is granted after provision of conclusive scientific evidence of the product's safety by the applicant. The objective of this article is to critically evaluate structural precaution in the EU against the general principles of European and international law. Moreover, it addresses the positive and negative side-effects of structural precaution for food businesses. The methods which are applied are legal-systematic and empirical. Legal-systematic research shows that the European system of structural precaution may come into conflict with the principles of free trade. Empirical research on the effects of structural precaution shows that the barriers to market access impede food innovations, negatively impact competitiveness, and induce opportunistic strategic responses by food businesses. Among the opportunistic strategic responses that were identified are window-dressing, trespassing and circumventing. These may have adverse effects on food safety. This is remarkable since food safety is the key driving force behind the application of structural precaution. The article advocates an overhaul of the present European risk prevention framework. It argues that the newly proposed European legal framework for innovative foods only partly addresses the identified problems with which the food industry is confronted. Supplementary to legal-systematic overhaul, authorities should invest in accessibility and transparency of the legal framework and provide compliance assistance to reduce regulatory burdens.
Achieving open access to conservation science.
Fuller, Richard A; Lee, Jasmine R; Watson, James E M
2014-12-01
Conservation science is a crisis discipline in which the results of scientific enquiry must be made available quickly to those implementing management. We assessed the extent to which scientific research published since the year 2000 in 20 conservation science journals is publicly available. Of the 19,207 papers published, 1,667 (8.68%) are freely downloadable from an official repository. Moreover, only 938 papers (4.88%) meet the standard definition of open access in which material can be freely reused providing attribution to the authors is given. This compares poorly with a comparable set of 20 evolutionary biology journals, where 31.93% of papers are freely downloadable and 7.49% are open access. Seventeen of the 20 conservation journals offer an open access option, but fewer than 5% of the papers are available through open access. The cost of accessing the full body of conservation science runs into tens of thousands of dollars per year for institutional subscribers, and many conservation practitioners cannot access pay-per-view science through their workplace. However, important initiatives such as Research4Life are making science available to organizations in developing countries. We urge authors of conservation science to pay for open access on a per-article basis or to choose publication in open access journals, taking care to ensure the license allows reuse for any purpose providing attribution is given. Currently, it would cost $51 million to make all conservation science published since 2000 freely available by paying the open access fees currently levied to authors. Publishers of conservation journals might consider more cost effective models for open access and conservation-oriented organizations running journals could consider a broader range of options for open access to nonmembers such as sponsorship of open access via membership fees. © 2014 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of the Society for Conservation Biology.
NASA Technical Reports Server (NTRS)
Tolzman, Jean M.
1993-01-01
The potential for expanded communication among researchers, scholars, and students is supported by growth in the capabilities for electronic communication as well as expanding access to various forms of electronic interchange and computing capabilities. Increased possibilities for information exchange, collegial dialogue, collaboration, and access to remote resources exist as high-speed networks, increasingly powerful workstations, and large, multi-user computational facilities are more frequently linked and more commonly available. Numerous writers speak of the telecommunications revolution and its impact on the development and dissemination of knowledge and learning. One author offers the phrase 'Scholarly skywriting' to represent a new form of scientific communication that he envisions using electronic networks. In the United States (U.S.), researchers associated with the National Science Foundation (NSF) are exploring 'nationwide collaboratories' and 'digital collaboration.' Research supported by the U.S. National Aeronautics and Space Administration (NASA) points to a future where workstations with built-in audio, video monitors, and screen sharing protocols are used to support collaborations with colleagues located throughout the world. Instruments and sensors located worldwide will produce data streams that will be brought together, analyzed, and distributed as new findings. Researchers will have access to machines that can supply domain-specific information in addition to locator and directory assistance. New forms of electronic journals will emerge and provide opportunities for researchers and scientists to exchange information electronically and interactively in a range of structures and formats. Ultimately, the wide-scale use of these technologies in the dissemination of research results and the stimulation of collegial dialogue will change the way we represent and express our knowledge of the world. A new paradigm will evolve--perhaps a truly worldwide 'invisible college.'
Koduah, Augustina; Agyepong, Irene Akua; van Dijk, Han
2016-10-01
This paper seeks to advance our understanding of health policy agenda setting and formulation processes in a lower middle income country, Ghana, by exploring how and why maternal health policies and programmes appeared and evolved on the health sector programme of work agenda between 2002 and 2012. We theorized that the appearance of a policy or programme on the agenda and its fate within the programme of work is predominately influenced by how national level decision makers use their sources of power to define maternal health problems and frame their policy narratives. National level decision makers used their power sources as negotiation tools to frame maternal health issues and design maternal health policies and programmes within the framework of the national health sector programme of work. The power sources identified included legal and structural authority; access to authority by way of political influence; control over and access to resources (mainly financial); access to evidence in the form of health sector performance reviews and demographic health surveys; and knowledge of national plans such as Ghana Poverty Reduction Strategy. Understanding of power sources and their use as negotiation tools in policy development should not be ignored in the pursuit of transformative change and sustained improvement in health systems in low- and middle income countries (LMIC). Copyright © 2016 Elsevier Ltd. All rights reserved.
17 CFR 274.402 - Form ID, uniform application for access codes to file on EDGAR.
Code of Federal Regulations, 2010 CFR
2010-04-01
... for access codes to file on EDGAR. 274.402 Section 274.402 Commodity and Securities Exchanges... Forms for Electronic Filing § 274.402 Form ID, uniform application for access codes to file on EDGAR..., filing agent or training agent to log on to the EDGAR system, submit filings, and change its CCC. (d...
17 CFR 239.63 - Form ID, uniform application for access codes to file on EDGAR.
Code of Federal Regulations, 2011 CFR
2011-04-01
... for access codes to file on EDGAR. 239.63 Section 239.63 Commodity and Securities Exchanges SECURITIES... Statements § 239.63 Form ID, uniform application for access codes to file on EDGAR. Form ID must be filed by... log on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification...
17 CFR 239.63 - Form ID, uniform application for access codes to file on EDGAR.
Code of Federal Regulations, 2010 CFR
2010-04-01
... for access codes to file on EDGAR. 239.63 Section 239.63 Commodity and Securities Exchanges SECURITIES... Statements § 239.63 Form ID, uniform application for access codes to file on EDGAR. Form ID must be filed by... log on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification...
17 CFR 274.402 - Form ID, uniform application for access codes to file on EDGAR.
Code of Federal Regulations, 2011 CFR
2011-04-01
... for access codes to file on EDGAR. 274.402 Section 274.402 Commodity and Securities Exchanges... Forms for Electronic Filing § 274.402 Form ID, uniform application for access codes to file on EDGAR..., filing agent or training agent to log on to the EDGAR system, submit filings, and change its CCC. (d...
Access control for electronic patient records.
Glagola, M J
1998-01-01
The transition from hardcopy records to electronic records is in the forefront for healthcare today. For healthcare facilities, a major issue is determining who can access patients' medical information and how access to this information can be controlled. There are three components to access control: identification, authentication and authorization. Checking proof of identity is a means of authenticating someone--through a driver's license, passport or their fingerprints. Similar processes are needed in a computer environment, through the use of passwords, one-time passwords or smartcards, encryption and kerberos, and call-back procedures. New in the area of access control are biometric devices, which are hardware/software combinations that digitize a physical characteristic and compare the sample with previously stored samples. Fingerprints, voiceprints and facial features are examples. Their cost is currently prohibitive, but in time, they may become more common. Digital certificates and certification authorities are other means used to authenticate identify. When a system challenges a user's identity at log on, the user provides a certification that tells the system to go to the issuing certification authority and find proof the user's claim is valid. Low-level certifications offer little value for sensitive data, but high-level certification is now being introduced. It requires more specific, detailed information on the applicant. Authorization, the final component of access control, establishes what a specific user can and cannot access. To have effective access control, transaction logging and system monitoring are needed to ensure the various techniques are being used and performing properly.
A human rights approach to the WHO Model List of Essential Medicines.
Seuba, Xavier
2006-01-01
Since the first WHO Model List of Essential Medicines was adopted in 1977, it has become a popular tool among health professionals and Member States. WHO's joint effort with the United Nations Committee on Economic, Social and Cultural Rights has resulted in the inclusion of access to essential medicines in the core content of the right to health. The Committee states that the right to health contains a series of elements, such as availability, accessibility, acceptability and quality of health goods, services and programmes, which are in line with the WHO statement that essential medicines are intended to be available within the context of health systems in adequate amounts at all times, in the appropriate dosage forms, with assured quality and information, and at a price that the individual and the community can afford. The author considers another perspective by looking at the obligations to respect, protect and fulfil the right to health undertaken by the states adhering to the International Covenant of Economic, Social and Cultural Rights (ICESCR) and explores the relationship between access to medicines, the protection of intellectual property, and human rights. PMID:16710552
Matroids and quantum-secret-sharing schemes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sarvepalli, Pradeep; Raussendorf, Robert
A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previousmore » work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.« less
Nurse practitioners and controlled substances prescriptive authority: improving access to care.
Ambrose, Michelle A; Tarlier, Denise S
2013-03-01
In 2007, Health Canada proposed a new framework to regulate prescriptive authority for controlled substances, titled New Classes of Practitioners Regulations (NCPR). The new regulatory framework was passed in November 2012; it gives nurse practitioners (NPs), midwives and podiatrists the authority to prescribe controlled medications under the Controlled Drugs and Substances Act. It is expected that authorizing NPs to write prescriptions for certain controlled substances commonly used in primary care will enhance flexibility and timeliness in primary care service delivery. Studies from the United States have shown positive outcomes in primary care access, decreased healthcare costs and the evolution and advancement of the NP role when prescriptive authority was expanded to include controlled substances. The purpose of this paper is to examine how NPs' prescriptive authority for controlled substances affects access to primary care and NP role development. Three key issues identified from the experience of one group of NPs in the United States (access to care, professional autonomy and prescriber knowledge) offer insight into the practice changes that may be anticipated for NPs in Canada now that they have acquired prescriptive authority for controlled substances. Recommendations are offered to assist nurse leaders and educators to best support NPs as they take on this new and important role responsibility.
NASA Aeroelasticity Handbook Volume 2: Design Guides Part 2
NASA Technical Reports Server (NTRS)
Ramsey, John K. (Editor)
2006-01-01
The NASA Aeroelasticity Handbook comprises a database (in three formats) of NACA and NASA aeroelasticity flutter data through 1998 and a collection of aeroelasticity design guides. The Microsoft Access format provides the capability to search for specific data, retrieve it, and present it in a tabular or graphical form unique to the application. The full-text NACA and NASA documents from which the data originated are provided in portable document format (PDF), and these are hyperlinked to their respective data records. This provides full access to all available information from the data source. Two other electronic formats, one delimited by commas and the other by spaces, are provided for use with other software capable of reading text files. To the best of the author s knowledge, this database represents the most extensive collection of NACA and NASA flutter data in electronic form compiled to date by NASA. Volume 2 of the handbook contains a convenient collection of aeroelastic design guides covering fixed wings, turbomachinery, propellers and rotors, panels, and model scaling. This handbook provides an interactive database and design guides for use in the preliminary aeroelastic design of aerospace systems and can also be used in validating or calibrating flutter-prediction software.
17 CFR 9.11 - Form, contents and delivery of notice of disciplinary or access denial action.
Code of Federal Regulations, 2010 CFR
2010-04-01
... notice of disciplinary or access denial action. 9.11 Section 9.11 Commodity and Securities Exchanges... OTHER ADVERSE ACTIONS Notice and Effective Date of Disciplinary Action or Access Denial Action § 9.11 Form, contents and delivery of notice of disciplinary or access denial action. (a) When required...
Poor Access for African Researchers to African Emergency Care Publications: A Cross-sectional Study
Bruijns, Stevan R.; Maesela, Mmapeladi; Sinha, Suniti; Banner, Megan
2017-01-01
Introduction Based on relative population size and burden of disease, emergency care publication outputs from low- and middle-income regions are disproportionately lower than those of high-income regions. Ironically, outputs from regions with higher publication rates are often less relevant in the African context. As a result, the dissemination of and access to local research is essential to local researchers, but the cost of this access (actual and cost-wise) remains unknown. The aim of this study was to describe access to African emergency care publications in terms of publisher-based access (open access or subscription) and alternate access (self-archived or author provided), as well as the cost of access. Methods We conducted a retrospective, cross-sectional study using all emergency medicine publications included in Scopus between 2011 and 2015. A sequential search strategy described access to each article, and we calculated mean article charges against the purchasing power parity index (used to describe out-of-pocket expense). Results We included 666 publications from 49 journals, of which 395 (59.3%) were open access. For subscription-based articles, 106 (39.1%) were self-archived, 60 (22.1%) were author-provided, and 105 (38.8%) were inaccessible. Mean article access cost was $36.44, and mean processing charge was $2,319.34. Using the purchasing power parity index it was calculated that equivalent out-of-pocket expenditure for South African, Ghanaian and Tanzanian authors would respectively be $15.77, $10.44 and $13.04 for access, and $1,004.02, $664.36 and $830.27 for processing. Based on this, the corrected cost of a single-unit article access or process charge for South African, Ghanaian and Tanzanian authors, respectively, was 2.3, 3.5 and 2.8 times higher than the standard rate. Conclusion One in six African emergency care publications are inaccessible outside institutional library subscriptions; additionally, the cost of access to publications in low- and middle-income countries appears prohibitive. Publishers should strongly consider revising pricing for more equitable access for researchers from low- and middle-income countries. PMID:29085532
Poor Access for African Researchers to African Emergency Care Publications: A Cross-sectional Study.
Bruijns, Stevan R; Maesela, Mmapeladi; Sinha, Suniti; Banner, Megan
2017-10-01
Based on relative population size and burden of disease, emergency care publication outputs from low- and middle-income regions are disproportionately lower than those of high-income regions. Ironically, outputs from regions with higher publication rates are often less relevant in the African context. As a result, the dissemination of and access to local research is essential to local researchers, but the cost of this access (actual and cost-wise) remains unknown. The aim of this study was to describe access to African emergency care publications in terms of publisher-based access (open access or subscription) and alternate access (self-archived or author provided), as well as the cost of access. We conducted a retrospective, cross-sectional study using all emergency medicine publications included in Scopus between 2011 and 2015. A sequential search strategy described access to each article, and we calculated mean article charges against the purchasing power parity index (used to describe out-of-pocket expense). We included 666 publications from 49 journals, of which 395 (59.3%) were open access. For subscription-based articles, 106 (39.1%) were self-archived, 60 (22.1%) were author-provided, and 105 (38.8%) were inaccessible. Mean article access cost was $36.44, and mean processing charge was $2,319.34. Using the purchasing power parity index it was calculated that equivalent out-of-pocket expenditure for South African, Ghanaian and Tanzanian authors would respectively be $15.77, $10.44 and $13.04 for access, and $1,004.02, $664.36 and $830.27 for processing. Based on this, the corrected cost of a single-unit article access or process charge for South African, Ghanaian and Tanzanian authors, respectively, was 2.3, 3.5 and 2.8 times higher than the standard rate. One in six African emergency care publications are inaccessible outside institutional library subscriptions; additionally, the cost of access to publications in low- and middle-income countries appears prohibitive. Publishers should strongly consider revising pricing for more equitable access for researchers from low- and middle-income countries.
McCormick, Carol; Pickard, Alison Jane
2013-06-01
Carol McCormick was Learning Resources Advisor in the library at James Cook University Hospital, South Teesside when she completed her BSc (Hons) Librarianship (Work Based Learning) degree at Northumbria University. She gained a 1st Class Honours and is now Learning Resources Librarian. Carol's dissertation formed part of a wider action research project into the provision of current awareness services at James Cook University Hospital. This article reports on the evaluation which was conducted after a Web 2.0 Startpage, or portal, had been introduced to improve access to current awareness information for all staff within the Trust. It is the second article in the Dissertations into practice series to examine the use of web-based tools to improve access to information for NHS staff. AM. © 2013 The authors. Health Information and Libraries Journal © 2013 Health Libraries Group.
New Author Choice for Open Access
NASA Astrophysics Data System (ADS)
2007-04-01
AGU journals now offer authors the opportunity to make their articles open for others to read for free. Authors choosing this option pay a fee based on article length and number of figures; these charges are designed to offset the potential loss of subscription income. This new option, called Author Choice, provides •Unlimited access to the article for all readers from the moment of publication. • Permission to deposit the PDF version in institutional repositories so long as the repository accepts AGU copyright permissions. • Continued copyright protection to prevent unauthorized uses of the author's work.
Memorandum "Open Metadata". Open Access to Documentation Forms and Item Catalogs in Healthcare.
Dugas, M; Jöckel, K-H; Friede, T; Gefeller, O; Kieser, M; Marschollek, M; Ammenwerth, E; Röhrig, R; Knaup-Gregori, P; Prokosch, H-U
2015-01-01
At present, most documentation forms and item catalogs in healthcare are not accessible to the public. This applies to assessment forms of routine patient care as well as case report forms (CRFs) of clinical and epidemiological studies. On behalf of the German chairs for Medical Informatics, Biometry and Epidemiology six recommendations to developers and users of documentation forms in healthcare were developed. Open access to medical documentation forms could substantially improve information systems in healthcare and medical research networks. Therefore these forms should be made available to the scientific community, their use should not be unduly restricted, they should be published in a sustainable way using international standards and sources of documentation forms should be referenced in scientific publications.
2009-09-01
Tele-maintenance Capability with Remote Serial Console Access and Proactive Monitoring of Medical Devices PRINCIPAL INVESTIGATOR...Remote Serial Console Access and Proactive Monitoring of Medical Devices 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d...ORGANIZATION REPORT NUMBER Concepteers LLC 880 Bergen Avenue, Suite 403 Jersey City, NJ 07306 9. SPONSORING / MONITORING
Multinational Experiment 7. Protecting Access to Space: Presentation to Senior Leaders
2013-07-08
Multinational Experiment 7: Outcome 3: Space Access Briefing to SLS 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d...operations Consequence management Ship status during search & rescue Tele-medicine Broadband internet TV signal distribution Satellite radio Rural...military-usage • Significant economic & societal consequences Access to space at risk • Current approach unsustainable • Broad range of threats
76 FR 35197 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-16
... access to the database is restricted to authorized System Administrators (SAs) only. Server access is..., examination and lesson grades, student academic status, curricula, course description. Authority for... student academic status; course and sub-course descriptions; produce course completion certificates and...
17 CFR 248.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2012 CFR
2012-04-01
... number or access code, does not include a number or code in an encrypted form, as long as you do not... agency, an account number or similar form of access number or access code for a consumer's credit card... number or access code: (1) To your agent or service provider solely in order to perform marketing for...
17 CFR 248.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2013 CFR
2013-04-01
... number or access code, does not include a number or code in an encrypted form, as long as you do not... agency, an account number or similar form of access number or access code for a consumer's credit card... number or access code: (1) To your agent or service provider solely in order to perform marketing for...
17 CFR 248.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2011 CFR
2011-04-01
... number or access code, does not include a number or code in an encrypted form, as long as you do not... agency, an account number or similar form of access number or access code for a consumer's credit card... number or access code: (1) To your agent or service provider solely in order to perform marketing for...
1978-11-01
DOCUMENTATION PAGE BEFORE COMPLE kING FORM 1. REPORT NUMBER 12. GOVT ACCESSION NO. 3. RECIPIENT’S CATALOG NUMBER 4. TITLE (and Subtitle) S. TYPE OF REPORT... NUMBER Perry County, Missouri 7. AUTHOR() 3. CONTRACT OR GRANT NUMBER (a) Kenneth Balk and Associates, Inc. DACW4 3-7 8-C-0169 S. PERFORMING ORGANIZATION...Louis November 1978 Dam Inventory and Inspection Section, LMSED-PD Is NUMBER OF PAGES 210 Tucker Blvd., North, St. Louis, Mo. 63101 Approximately 80 14
Dunbar, R I M; MacCarron, Padraig; Robertson, Cole
2018-03-01
Group-living offers both benefits (protection against predators, access to resources) and costs (increased ecological competition, the impact of group size on fertility). Here, we use cluster analysis to detect natural patternings in a comprehensive sample of baboon groups, and identify a geometric sequence with peaks at approximately 20, 40, 80 and 160. We suggest (i) that these form a set of demographic oscillators that set habitat-specific limits to group size and (ii) that the oscillator arises from a trade-off between female fertility and predation risk. © 2018 The Authors.
Access to scientific publications: the scientist's perspective.
Voronin, Yegor; Myrzahmetov, Askar; Bernstein, Alan
2011-01-01
Scientific publishing is undergoing significant changes due to the growth of online publications, increases in the number of open access journals, and policies of funders and universities requiring authors to ensure that their publications become publicly accessible. Most studies of the impact of these changes have focused on the growth of articles available through open access or the number of open-access journals. Here, we investigated access to publications at a number of institutes and universities around the world, focusing on publications in HIV vaccine research--an area of biomedical research with special importance to the developing world. We selected research papers in HIV vaccine research field, creating: 1) a first set of 50 most recently published papers with keywords "HIV vaccine" and 2) a second set of 200 articles randomly selected from those cited in the first set. Access to the majority (80%) of the recently published articles required subscription, while cited literature was much more accessible (67% freely available online). Subscriptions at a number of institutions around the world were assessed for providing access to subscription-only articles from the two sets. The access levels varied widely, ranging among institutions from 20% to 90%. Through the WHO-supported HINARI program, institutes in low-income countries had access comparable to that of institutes in the North. Finally, we examined the response rates for reprint requests sent to corresponding authors, a method commonly used before internet access became widespread. Contacting corresponding authors with requests for electronic copies of articles by email resulted in a 55-60% success rate, although in some cases it took up to 1.5 months to get a response. While research articles are increasingly available on the internet in open access format, institutional subscriptions continue to play an important role. However, subscriptions do not provide access to the full range of HIV vaccine research literature. Access to papers through subscriptions is complemented by a variety of other means, including emailing corresponding authors, joint affiliations, use of someone else's login information and posting requests on message boards. This complex picture makes it difficult to assess the real ability of scientists to access literature, but the observed differences in access levels between institutions suggest an unlevel playing field, in which some researchers have to spend more efforts than others to obtain the same information.
75 FR 5867 - Proposed Collection; Comment Request for Form 8879-C and Form 8879-I
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-04
... Form 8879-C, IRS e-file Signature Authorization for Form 1120, and Form 8879-I, IRS e-file Signature...: Title: IRS e-file Signature Authorization for Form 1120; IRS e-file Signature Authorization for Form... Signature Authorization for Form 1120, and Form 8879-I, IRS e-file Signature Authorization for Form 1120-F...
The future of academic publishing: what is open access?
Collins, Jannette
2005-04-01
For more than 200 years, publishers have been charging users (i.e., subscribers) for access to scientific information to make a profit. Authors have been required to grant copyright ownership to the publisher. This system was not questioned until the Internet popularized electronic publishing. The Internet allows for rapid dissemination of information to millions of readers. Some people have seen this as an opportunity to revolutionize the system of scientific publishing and to make it one that provides free, open access to all scientific information to all persons everywhere in the world. Such systems have been launched and have instigated a wave of dialogue among proponents and opponents alike. At the center of the controversy is the issue of who will pay for the costs of publishing, because an open-access system is not free, and this threatens the backbone of the traditional publishing industry. Currently, open-access publishers charge authors a fee to have their articles published. Because of this and the uncertainty of the sustainability of the open-access system, some authors are hesitant to participate in the new system. This article reviews the events that led to the creation of open-access publishing, the arguments for and against it, and the implications of open access for the future of academic publishing.
2017-09-01
AWARD NUMBER: W81XWH-16-1-0395 TITLE: Reactivating Neural Circuits with Clinically Accessible Stimulation to Restore Hand Function in...estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data...Clinically Accessible Stimulation to Restore Hand Function in Persons with Tetraplegia 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S
Cardea: Dynamic Access Control in Distributed Systems
NASA Technical Reports Server (NTRS)
Lepro, Rebekah
2004-01-01
Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.
Rudner Lugo, Nancy; O'Grady, Eileen T; Hodnicki, Donna; Hanson, Charlene
2010-01-01
The widely varied regulations in the 50 states often limit consumer access to nurse practitioners (NPs). In 22 states, the Board of Nursing (BON) must share NP regulatory authority with another profession, usually physicians. This study examines the relationship between the BON as the sole authority regulating NPs or sharing that authority with another profession and the NP regulatory environment. Independent t tests compared the NP regulatory environments for consumer access and choice in states with sole BON regulation with those in states with involvement of another profession. The states' NP regulatory environments were quantified with an 11-measure tool assessing domains of consumer access to NPs, NP patients' access to service, and NP patients' access to prescription medications. BON-regulated states were less restrictive (P < .01, effect size 1.02) and supported NP professional autonomy. Entry into practice regulations did not differ in the two groups of states. Having another profession involved in regulation correlates with more restrictions on consumer access to NPs and more restrictions to the full deployment of NPs. Copyright 2010 Elsevier Inc. All rights reserved.
Access to digital library databases in higher education: design problems and infrastructural gaps.
Oswal, Sushil K
2014-01-01
After defining accessibility and usability, the author offers a broad survey of the research studies on digital content databases which have thus far primarily depended on data drawn from studies conducted by sighted researchers with non-disabled users employing screen readers and low vision devices. This article aims at producing a detailed description of the difficulties confronted by blind screen reader users with online library databases which now hold most of the academic, peer-reviewed journal and periodical content essential for research and teaching in higher education. The approach taken here is borrowed from descriptive ethnography which allows the author to create a complete picture of the accessibility and usability problems faced by an experienced academic user of digital library databases and screen readers. The author provides a detailed analysis of the different aspects of accessibility issues in digital databases under several headers with a special focus on full-text PDF files. The author emphasizes that long-term studies with actual, blind screen reader users employing both qualitative and computerized research tools can yield meaningful data for the designers and developers to improve these databases to a level that they begin to provide an equal access to the blind.
McKee, Amy E; Markon, André O; Chan-Tack, Kirk M; Lurie, Peter
2017-10-01
In this review of individual patient expanded-access requests to the Center for Drug Evaluation and Research for the period Fiscal Year 2010 to Fiscal Year 2014, we evaluated the number of applications received and the number allowed to proceed. We also evaluated whether drugs and certain biologics obtained under expanded access went on to be approved by the Food and Drug Administration. Finally, we considered concerns that adverse events occurring during expanded access might place sponsors at risk for legal liability. Overall, 98% of individual patient expanded-access requests were allowed to proceed. During the study period, among drugs without a previous approval for any indication or dosage form, 24% of unique drugs (ie, multiple applications for access to the same drug were considered to relate to 1 unique drug), and 20% of expanded-access applications received marketing approval by 1 year after initial submission; 43% and 33%, respectively, were approved by 5 years after initial submission. A search of 3 legal databases and a database of news articles did not appear to identify any product liability cases arising from the use of a product in expanded access. Our analyses seek to give physicians and patients a realistic perspective on the likelihood of a drug's approval as well as certain information regarding the product liability risks for commercial sponsors when providing expanded access to investigational drugs. The US Food and Drug Administration (FDA)'s expanded-access program maintains a careful balance between authorizing patient access to potentially beneficial drugs and protecting them from drugs that may have unknown risks. At the same time, the agency wishes to maintain the integrity of the clinical trials process, ultimately the best way to get safe and effective drugs to patients. © 2017, The American College of Clinical Pharmacology.
12 CFR Appendix F to Part 225 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2012 CFR
2012-01-01
... only to authorized individuals and controls to prevent employees from providing customer information to unauthorized individuals who may seek to obtain this information through fraudulent means. b. Access... records storage facilities to permit access only to authorized individuals; c. Encryption of electronic...
12 CFR Appendix F to Part 225 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2014 CFR
2014-01-01
... only to authorized individuals and controls to prevent employees from providing customer information to unauthorized individuals who may seek to obtain this information through fraudulent means. b. Access... records storage facilities to permit access only to authorized individuals; c. Encryption of electronic...
10 CFR 710.7 - Application of the criteria.
Code of Federal Regulations, 2010 CFR
2010-01-01
... involved in the decision-making process shall consider: the nature, extent, and seriousness of the conduct... decision as to access authorization is a comprehensive, common-sense judgment, made after consideration of... will be made as to access authorization eligibility. (b) To assist in making these determinations, on...
77 FR 53194 - Combined Notice of Filings #1
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-31
... Market Based Tariff filings. Filed Date: 8/17/12. Accession Number: 20120817-5103. Comments Due: 5 p.m..., 2012 Application for market-based rate authorization. Filed Date: 8/17/12. Accession Number: 20120817... Wholesale, LLC. Description: Amendment to Application for Market-Based Rate Authority of Energy Alternatives...
48 CFR 252.241-7001 - Government access.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Government access. 252.241... Clauses 252.241-7001 Government access. As prescribed in 241.501-70(b), use the following clause: Government Access (DEC 1991) Authorized representatives of the Government may have access to the Contractor's...
48 CFR 252.241-7001 - Government access.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Government access. 252.241... Clauses 252.241-7001 Government access. As prescribed in 241.501-70(b), use the following clause: Government Access (DEC 1991) Authorized representatives of the Government may have access to the Contractor's...
48 CFR 252.241-7001 - Government access.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Government access. 252.241... Clauses 252.241-7001 Government access. As prescribed in 241.501-70(b), use the following clause: Government Access (DEC 1991) Authorized representatives of the Government may have access to the Contractor's...
48 CFR 252.241-7001 - Government access.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Government access. 252.241... Clauses 252.241-7001 Government access. As prescribed in 241.501-70(b), use the following clause: Government Access (DEC 1991) Authorized representatives of the Government may have access to the Contractor's...
48 CFR 252.241-7001 - Government access.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Government access. 252.241... Clauses 252.241-7001 Government access. As prescribed in 241.501-70(b), use the following clause: Government Access (DEC 1991) Authorized representatives of the Government may have access to the Contractor's...
What makes a chemical an allergen?
Kimber, Ian; Dearman, Rebecca J
2003-05-01
To consider the factors that confer on chemicals the ability to cause allergic sensitization, with particular emphasis on the induction of skin sensitization. Original and review articles available in the scientific literature. The expert opinion of the authors was used to select studies for inclusion in this review. A number of requirements must be met if a chemical is to induce skin sensitization. The most important requirements are access to the viable epidermis, the formation of stable conjugates with proteins, elicitation of cytokine production by skin cells, and the initiation of T-lymphocyte responses. In addition, qualitative aspects of induced immune responses influence the form of allergic sensitization. An increasingly sophisticated understanding of the factors required for the development of skin sensitization and other forms of chemical-induced allergy provides new opportunities for toxicological investigation and clinical management.
Rejected Manuscripts in Publishers' Archives: Legal Rights and Access
ERIC Educational Resources Information Center
Hamburger, Susan
2011-01-01
This article focuses on an analysis of how various archival repositories deal with rejected manuscripts in publishers' archives as part of existing collections and as potential donations, and includes suggestions for ways to provide access while maintaining the author's legal rights. Viewpoints from the journal editor, author, archivist, and…
10 CFR 710.22 - Initial decision process.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) The Manager shall make an initial decision as to the individual's access authorization eligibility... Officer refers the individual's case to the Manager in accordance with § 710.25(e) or § 710.26(b). (b..., the Manager's initial decision as to the individual's access authorization eligibility shall be made...
ERIC Educational Resources Information Center
Zoch, Melody; Langston-DeMott, Brooke; Adams-Budde, Melissa
2014-01-01
Elementary students find themselves engaged and learning at a digital writing camp. The authors find that such elementary students usually have limited access to technology at home and school, and posit that teachers should do all they can to give them more access to and experience in digital composing. Students were motivated and learned to use…
Evolution of Nursing Science: Is Open Access the Answer?
Clarke, Pamela N; Garcia, Jenny
2015-10-01
The open access movement where journal content is made freely available over the Internet is purported to increase scientific exchange, yet has pros and cons. There are issues related to quality that need to be examined in relation to evolution of nursing science. © The Author(s) 2015.
32 CFR 1909.18 - Termination of access.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Requests for Historical Access § 1909.18 Termination of access. The Coordinator shall cancel any authorization whenever the Director of Personnel Security cancels the security clearance of a requester (or...
RNApdbee--a webserver to derive secondary structures from pdb files of knotted and unknotted RNAs.
Antczak, Maciej; Zok, Tomasz; Popenda, Mariusz; Lukasiak, Piotr; Adamiak, Ryszard W; Blazewicz, Jacek; Szachniuk, Marta
2014-07-01
In RNA structural biology and bioinformatics an access to correct RNA secondary structure and its proper representation is of crucial importance. This is true especially in the field of secondary and 3D RNA structure prediction. Here, we introduce RNApdbee-a new tool that allows to extract RNA secondary structure from the pdb file, and presents it in both textual and graphical form. RNApdbee supports processing of knotted and unknotted structures of large RNAs, also within protein complexes. The method works not only for first but also for high order pseudoknots, and gives an information about canonical and non-canonical base pairs. A combination of these features is unique among existing applications for RNA structure analysis. Additionally, a function of converting between the text notations, i.e. BPSEQ, CT and extended dot-bracket, is provided. In order to facilitate a more comprehensive study, the webserver integrates the functionality of RNAView, MC-Annotate and 3DNA/DSSR, being the most common tools used for automated identification and classification of RNA base pairs. RNApdbee is implemented as a publicly available webserver with an intuitive interface and can be freely accessed at http://rnapdbee.cs.put.poznan.pl/. © The Author(s) 2014. Published by Oxford University Press on behalf of Nucleic Acids Research.
The base rates and factors associated with reported access to firearms in psychiatric inpatients.
Kolla, Bhanu Prakash; O'Connor, Stephen S; Lineberry, Timothy W
2011-01-01
The aim of this study was to define whether specific patient demographic groups, diagnoses or other factors are associated with psychiatric inpatients reporting firearms access. A retrospective medical records review study was conducted using information on access to firearms from electronic medical records for all patients 16 years and older admitted between July 2007 and May 2008 at the Mayo Clinic Psychiatric Hospital in Rochester, MN. Data were obtained only on patients providing authorization for record review. Data were analyzed using univariate and multivariate logistic regression analyses accounting for gender, diagnostic groups, comorbid substance use, history of suicide attempts and family history of suicide/suicide attempts. Seventy-four percent (1169/1580) of patients provided research authorization. The ratio of men to women was identical in both research and nonresearch authorization groups. There were 14.6% of inpatients who reported firearms access. In univariate analysis, men were more likely (P<.0001) to report access than women, and a history of previous suicide attempt(s) was associated with decreased access (P=.02). Multiple logistic regression analyses controlling for other factors found females and patients with history of previous suicide attempt(s) less likely to report access, while patients with a family history of suicide or suicide attempts reported increased firearms access. Diagnostic groups were not associated with access on univariate or multiple logistic regression analyses. Men and inpatients with a family history of suicide/suicide attempts were more likely to report firearms access. Clinicians should develop standardized systems of identification of firearms access and provide guidance on removal. Copyright © 2011 Elsevier Inc. All rights reserved.
Perilous terra incognita--open-access journals.
Balon, Richard
2014-04-01
The author focuses on a new rapidly spreading practice of publication in open-access journals. The pros and cons of open-access journals are discussed. Publishing in these journals may be cost prohibitive for educators and junior faculty members. Some authors may be lured by the ease of publishing in open-access journals (and their, at times, inflated self-description, e.g., "international", "scientific"), and their possibly valuable contributions will escape the attention of Academic Psychiatry readership in the vast sea of open-access journals. The readership may be flooded with a large number of low-quality articles (maybe not even properly peer-reviewed) from open-access journals. It may take some time to sort out what is and what is not relevant and useful. Open-access publishing represents a problematic and controversial practice and may be associated with a conflict of interest for the editors and publishers of these journals.
7 CFR 1468.32 - Access to operating unit.
Code of Federal Regulations, 2010 CFR
2010-01-01
... the contract. Access shall include the right to provide technical assistance and inspect any work... § 1468.32 Access to operating unit. Any authorized CCC representative shall have the right to enter an... participant prior to the exercise of this right to access. ...
31 CFR 363.16 - How do I access my account?
Code of Federal Regulations, 2010 CFR
2010-07-01
... SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT REGULATIONS GOVERNING SECURITIES HELD IN TREASURYDIRECT General Provisions Governing Securities Held in TreasuryDirect § 363.16 How do I access my account? You may access your account online using your account number, password, and any other form(s) of...
Dickey, Lore M; Singh, Anneliese A
2017-08-01
This article explores some of the challenges faced by trans and gender diverse (TGD) individuals who not only are attempting to access trans-affirmative care, but who are also members of the very profession from which they are seeking services. The authors explore challenges related to finding supervision, accessing care for assessment services, and finding a provider for personal counseling. With each example, the authors unpack the challenges and also address the implications for training for all involved. Based on these challenges that TGD psychologists and trainees face in attempting to access care, the authors provide recommendations related to trans-affirmative training for psychologists. © 2017 Wiley Periodicals, Inc.
Quantum secret sharing for a general quantum access structure
NASA Astrophysics Data System (ADS)
Bai, Chen-Ming; Li, Zhi-Hui; Si, Meng-Meng; Li, Yong-Ming
2017-10-01
Quantum secret sharing is a procedure for sharing a secret among a number of participants such that only certain subsets of participants can collaboratively reconstruct it, which are called authorized sets. The quantum access structure of a secret sharing is a family of all authorized sets. Firstly, in this paper, we propose the concept of decomposition of quantum access structure to design a quantum secret sharing scheme. Secondly, based on a maximal quantum access structure (MQAS) [D. Gottesman, Phys. Rev. A 61, 042311 (2000)], we propose an algorithm to improve a MQAS and obtain an improved maximal quantum access structure (IMQAS). Then, we present a sufficient and necessary condition about IMQAS, which shows the relationship between the minimal authorized sets and the players. In accordance with properties, we construct an efficient quantum secret sharing scheme with a decomposition and IMQAS. A major advantage of these techniques is that it allows us to construct a method to realize a general quantum access structure. Finally, we present two kinds of quantum secret sharing schemes via the thought of concatenation or a decomposition of quantum access structure. As a consequence, we find that the application of these techniques allows us to save more quantum shares and reduces more cost than the existing scheme.
Best practices for scholarly authors in the age of predatory journals.
Beall, J
2016-02-01
'Continuous effort, not strength or intelligence, is the key to understanding our potential.' Margaret J Wheatley. The focus of any academic or research author is to share his or her findings, and to gain respect and reward for publishing. The ideal journal is one that not only publishes an article quickly but also helps the author to improve the article before publication through peer review, selects only the best research so that the author's article lies alongside other high quality articles, and provides maximum (and long-term) visibility and access to the article. Unfortunately, in the real world, authors need to make tradeoffs between high quality journals, those that work quickly, those that are willing to accept the article and those that provide the best access. Into this mix has come the potential of open access as a means of increasing visibility: journals publish the article without a subscription barrier so anyone, anywhere, can read the article. However, the growth of open access (pushed by institutions, grant bodies and governments as a means of improving human health and knowledge) has come with some unforeseen consequences. In this article, Jeffrey Beall discusses one recent phenomenon that has arisen from the open access movement: that of 'predatory publishers'. These are individuals or companies that use the open access financial system (author pays, rather than library subscribes) to defraud authors and readers by promising reputable publishing platforms but delivering nothing of the sort. They frequently have imaginary editorial boards, do not operate any peer review or quality control, are unclear about payment requirements and opaque about ownership or location, include plagiarised content and publish whatever somebody will pay them to publish. Predatory publishers generally make false promises to authors and behave unethically. They also undermine the scholarly information and publishing environment with a deluge of poor quality, unchecked and invalidated articles often published on temporary sites, thus losing the scholarly record. Jeffrey Beall, a librarian in Denver, US, has watched the rise of such fraudulent practice, and manages a blog site that names publishers and journals that he has identified as predatory. While Beall's lists can provide librarians and knowledgeable authors with information on which journals and publishers to be cautious about, several legitimate publishers, library groups and others have joined forces to educate and inform authors in what to look for when selecting journals to publish in (or read). This initiative, called Think. Check. Submit. (http://thinkchecksubmit.org/), was launched in the latter half of 2015 and hopes to raise awareness of disreputable journals while clearly separating them from valid, high quality, open access journals (of which there are many). PIPPA SMART Guest Editor.
ERIC Educational Resources Information Center
Borden, P. A.; And Others
Summaries are presented of five conference papers on communication, control, and computer access for handicapped individuals. Papers have the following titles and authors: "Accessibility of Graphically Based User Interface Computer Systems for Individuals with Visual Impairments" (Charles Lee and Gregg Vanderheiden); "Data Base vs. Information…
Access to Higher Education for Disadvantaged Groups in China: A Summary Report
ERIC Educational Resources Information Center
Hong, Shen
2004-01-01
This article discusses a summary report of the disadvantaged groups' access to higher education in China. In this article, the author discusses the definition of "disadvantaged groups" as defined by economists, jurists, and sociologists. The author also discusses the analysis of the direct and indirect causes for China's disadvantaged…
42 CFR 51.41 - Access to records.
Code of Federal Regulations, 2010 CFR
2010-10-01
... THE PROTECTION AND ADVOCACY FOR INDIVIDUALS WITH MENTAL ILLNESS PROGRAM Access to Records, Facilities... individuals with mental illness: (1) An individual who is a client of the P&A system if authorized by that...) The individual, due to his or her mental or physical condition, is unable to authorize the P&A system...
Taylor, Steven J
2014-06-01
The historiography of asylums and insanity is dense, and some topics have received much scholarly attention but others, such as insanity among children, have been largely neglected. Children by no means formed the majority of asylum populations, but they still suffered from mental impairment and were admitted to these institutions in significant numbers. Identifying the various experiences of insane children is the central goal of this research, but the asylum will not be the sole emphasis. The focus is to place child mental deficiency within a broader context of extramural care. By examining workhouses, the role of family, and philanthropic attempts to deal with insane children, this article will move beyond current historical thinking on the topic; traditional views of childhood, insanity and charity will be challenged, and will show that a much wider world than the locality was accessible to the insane child. © The Author(s) 2014.
Review and Synthesize Completed Research Through Systematic Review.
Hopp, Lisa; Rittenmeyer, Leslie
2015-10-01
The evidence-based health care movement has generated new opportunity for scholars to generate synthesized sources of evidence. Systematic reviews are rigorous forms of synthesized evidence that scholars can conduct if they have requisite skills, time, and access to excellent library resources. Systematic reviews play an important role in synthesizing what is known and unknown about a particular health issue. Thus, they have a synergistic relationship with primary research. They can both inform clinical decisions when the evidence is adequate and identify gaps in knowledge to inform research priorities. Systematic reviews can be conducted of quantitative and qualitative evidence to answer many types of questions. They all share characteristics of rigor that arise from a priori protocol development, transparency, exhaustive searching, dual independent reviewers who critically appraise studies using standardized tools, rigor in synthesis, and peer review at multiple stages in the conduct and reporting of the systematic review. © The Author(s) 2015.
Group Membership Based Authorization to CADC Resources
NASA Astrophysics Data System (ADS)
Damian, A.; Dowler, P.; Gaudet, S.; Hill, N.
2012-09-01
The Group Membership Service (GMS), implemented at the Canadian Astronomy Data Centre (CADC), is a prototype of what could eventually be an IVOA standard for a distributed and interoperable group membership protocol. Group membership is the core authorization concept that enables teamwork and collaboration amongst astronomers accessing distributed resources and services. The service integrates and complements other access control related IVOA standards such as single-sign-on (SSO) using X.509 proxy certificates and the Credential Delegation Protocol (CDP). The GMS has been used at CADC for several years now, initially as a subsystem and then as a stand-alone Web service. It is part of the authorization mechanism for controlling the access to restricted Web resources as well as the VOSpace service hosted by the CADC. We present the role that GMS plays within the access control system at the CADC, including the functionality of the service and how the different CADC services make use of it to assert user authorization to resources. We also describe the main advantages and challenges of using the service as well as future work to increase its robustness and functionality.
Spatiotemporal access model based on reputation for the sensing layer of the IoT.
Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan
2014-01-01
Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.
Goldrick-Rab, Sara; Sorensen, Kia
2010-01-01
Noting that access to higher education has expanded dramatically in the past several decades, Sara Goldrick-Rab and Kia Sorensen focus on how unmarried parents fare once they enter college. Contrary to the expectation that access to college consistently promotes family stability and economic security, the authors argue that deficiencies in current policy lead college attendance to have adverse consequences for some families headed by unmarried parents. Although rates of college attendance have increased substantially among unmarried parents, their college completion rates are low. One explanation is inadequate academic preparation. Another is financial constraints, which can force unmarried students to interrupt their studies or increase their work hours, both of which compromise the quality of their educational experiences and the outcomes for their children. The authors point out that although many public programs offer support to unmarried parents attending college, the support is neither well coordinated nor easily accessed. Over the past three decades, loans have increasingly replaced grants as the most common form of federal and state financial aid. Confusion about what is available leads many low-income students to the two most "straightforward" sources of income--loans and work, both of which involve significant costs and can operate at cross-purposes with public forms of support. Too much work can lead to reductions in public benefits, and earnings do not always replace the lost income. A growing body of experimental evidence shows that providing social, financial, and academic supports to vulnerable community college students can improve achievement and attainment. Contextualized learning programs, for example, have enabled participants not only to move on from basic skills to credit-bearing coursework, but also to complete credits, earn certificates, and make gains on basic skills tests. Another successful initiative provided low-performing students with special counseling services and a small stipend of $150 per semester when they used those services. And researchers are conducting experimental performance-based financial aid programs at community colleges to test their effectiveness. Goldrick-Rab and Sorensen conclude that more effective support could enable unmarried students to complete college degree and certificate programs.
Illicit Internet availability of drugs subject to recall and patient safety consequences.
Mackey, Tim K; Aung, Phyo; Liang, Bryan A
2015-12-01
Permanently recalled drugs are a public health concern if they remain accessible in violation of applicable regulation. Illicit online pharmacies act as an alternative form of access and have been associated with the sale to patients of counterfeit/falsified/fraudulent/substandard drugs. We wished to determine if permanently recalled and significantly restricted drugs were illegally marketed for sale online. The study was conducted in two phases with two objectives. The first phase attempted to identify drugs subject to permanent recall in certain major pharmaceutical markets as well as those listed as recalled or significantly restricted by the United Nations. We also examined the market authorization status of identified drugs in China and India. The second phase used structured searches on the Internet to determine if identified drugs were marketed for sale online. The World Wide Web. After identification of permanently recalled and restricted drugs we conducted Internet searches for illegal "no prescription" marketing events. We assessed the form of marketing, whether a site offered direct-to-patient sale, use of social media marketing, and the site's compliance status with external monitoring bodies. Number of recalled drugs marketed as available for purchase on the Internet. We identified 16 class I equivalent permanently recalled or restricted drugs, 56.3 % (n = 9) of which maintained market authorization in either China or India. Half (n = 8) were marketed for sale online without a prescription direct-to-patient. Use of social media marketing was mixed, with only 18.8 % (n = 3) of recalled drugs having a presence on Facebook, though 50.0 % (n = 8) had content on Twitter. We also found the majority (68.8 %, n = 11) were available and marketed for sale by vendors on the wholesale/business-to-business website alibaba.com primarily as active pharmaceutical ingredient. Despite efforts in several countries to restrict access to these drugs or permanently remove them from the market, our study indicates that various sources actively market recalled drugs for sale online. Drug regulators, public health agencies, and law enforcement officials should act with urgency to appropriately restrict and regulate these sales to protect global patients and consumers.
Zarrei, M.; Wilkin, P.; Fay, M. F.; Ingrouille, M. J.; Zarre, S.; Chase, M. W.
2009-01-01
Background and Aims Gagea is a Eurasian genus of petaloid monocots, with a few species in North Africa, comprising between 70 and approximately 275 species depending on the author. Lloydia (thought to be the closest relative of Gagea) consists of 12–20 species that have a mostly eastern Asian distribution. Delimitation of these genera and their subdivisions are unresolved questions in Liliaceae taxonomy. The objective of this study is to evaluate generic and infrageneric circumscription of Gagea and Lloydia using DNA sequence data. Methods A phylogenetic study of Gagea and Lloydia (Liliaceae) was conducted using sequences of nuclear ribosomal internal transcribed spacer (ITS) and plastid (rpl16 intron, trnL intron, trnL-F spacer, matK and the psbA-trnH spacer) DNA regions. This included 149 accessions (seven as outgroups), with multiple accessions of some taxa; 552 sequences were included, of which 393 were generated as part of this research. Key Results A close relationship of Gagea and Lloydia was confirmed in analyses using different datasets, but neither Gagea nor Lloydia forms a monophyletic group as currently circumscribed; however, the ITS and plastid analyses did not produce congruent results for the placement of Lloydia relative to the major groups within Gagea. Gagea accessions formed five moderately to strongly supported clades in all trees, with most Lloydia taxa positioned at the basal nodes; in the strict consensus trees from the combined data a basal polytomy occurs. There is limited congruence between the classical, morphology-derived infrageneric taxonomy in Gagea (including Lloydia) and clades in the present phylogenetic analyses. Conclusions The analyses support monophyly of Gagea/Lloydia collectively, and they clearly comprise a single lineage, as some previous authors have hypothesized. The results provide the basis for a new classification of Gagea that has support from some morphological features. Incongruence between plastid and nuclear ITS results is interpreted as potentially due to ancient hybridization and/or paralogy of ITS rDNA. PMID:19451146
Code of Federal Regulations, 2012 CFR
2012-07-01
... services for victims of severe forms of trafficking in persons. 1100.33 Section 1100.33 Judicial Administration DEPARTMENT OF JUSTICE AND DEPARTMENT OF STATE TRAFFICKING IN PERSONS Victims of Severe Forms of Trafficking in Persons § 1100.33 Access to information and translation services for victims of severe forms of...
Code of Federal Regulations, 2013 CFR
2013-07-01
... services for victims of severe forms of trafficking in persons. 1100.33 Section 1100.33 Judicial Administration DEPARTMENT OF JUSTICE AND DEPARTMENT OF STATE TRAFFICKING IN PERSONS Victims of Severe Forms of Trafficking in Persons § 1100.33 Access to information and translation services for victims of severe forms of...
Code of Federal Regulations, 2014 CFR
2014-07-01
... services for victims of severe forms of trafficking in persons. 1100.33 Section 1100.33 Judicial Administration DEPARTMENT OF JUSTICE AND DEPARTMENT OF STATE TRAFFICKING IN PERSONS Victims of Severe Forms of Trafficking in Persons § 1100.33 Access to information and translation services for victims of severe forms of...
45 CFR 164.524 - Access of individuals to protected health information.
Code of Federal Regulations, 2010 CFR
2010-10-01
... individual with access to the protected health information in the form or format requested by the individual, if it is readily producible in such form or format; or, if not, in a readable hard copy form or such other form or format as agreed to by the covered entity and the individual. (ii) The covered entity may...
Anatomical connections of the visual word form area.
Bouhali, Florence; Thiebaut de Schotten, Michel; Pinel, Philippe; Poupon, Cyril; Mangin, Jean-François; Dehaene, Stanislas; Cohen, Laurent
2014-11-12
The visual word form area (VWFA), a region systematically involved in the identification of written words, occupies a reproducible location in the left occipitotemporal sulcus in expert readers of all cultures. Such a reproducible localization is paradoxical, given that reading is a recent invention that could not have influenced the genetic evolution of the cortex. Here, we test the hypothesis that the VWFA recycles a region of the ventral visual cortex that shows a high degree of anatomical connectivity to perisylvian language areas, thus providing an efficient circuit for both grapheme-phoneme conversion and lexical access. In two distinct experiments, using high-resolution diffusion-weighted data from 75 human subjects, we show that (1) the VWFA, compared with the fusiform face area, shows higher connectivity to left-hemispheric perisylvian superior temporal, anterior temporal and inferior frontal areas; (2) on a posterior-to-anterior axis, its localization within the left occipitotemporal sulcus maps onto a peak of connectivity with language areas, with slightly distinct subregions showing preferential projections to areas respectively involved in grapheme-phoneme conversion and lexical access. In agreement with functional data on the VWFA in blind subjects, the results suggest that connectivity to language areas, over and above visual factors, may be the primary determinant of VWFA localization. Copyright © 2014 the authors 0270-6474/14/3415402-13$15.00/0.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 1 2013-07-01 2013-07-01 false Temporary eligibility for access at the confidential and secret levels and temporary eligibility for âLâ access authorization. 147.30 Section 147.30... Temporary Access § 147.30 Temporary eligibility for access at the confidential and secret levels and...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 1 2012-07-01 2012-07-01 false Temporary eligibility for access at the confidential and secret levels and temporary eligibility for âLâ access authorization. 147.30 Section 147.30... Temporary Access § 147.30 Temporary eligibility for access at the confidential and secret levels and...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Temporary eligibility for access at the confidential and secret levels and temporary eligibility for âLâ access authorization. 147.30 Section 147.30... Temporary Access § 147.30 Temporary eligibility for access at the confidential and secret levels and...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false Temporary eligibility for access at the confidential and secret levels and temporary eligibility for âLâ access authorization. 147.30 Section 147.30... Temporary Access § 147.30 Temporary eligibility for access at the confidential and secret levels and...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 1 2014-07-01 2014-07-01 false Temporary eligibility for access at the confidential and secret levels and temporary eligibility for âLâ access authorization. 147.30 Section 147.30... Temporary Access § 147.30 Temporary eligibility for access at the confidential and secret levels and...
Positioning Your Library in an Open-Access Environment
ERIC Educational Resources Information Center
Bhatt, Anjana H.
2010-01-01
This paper is a summary of the project that the author completed at Florida Gulf Coast University (FGCU) library for providing online access to 80 open access E-journals and digital collections. Although FGCU uses SerialsSolutions products to establish online access, any one can provide access to these collections as they are free for all. Paper…
15. CONSTRUCTION PROGRESS PHOTO SHOWING FORMS GOING UP ON ACCESS ...
15. CONSTRUCTION PROGRESS PHOTO SHOWING FORMS GOING UP ON ACCESS CORRIDOR. INEEL PHOTO NUMBER NRTS-59-336. - Idaho National Engineering Laboratory, Old Waste Calcining Facility, Scoville, Butte County, ID
Consensus statement on round window vibroplasty.
Beltrame, Achille M; Todt, Ingo; Sprinzl, Georg; Profant, Milan; Schwab, Burkhard
2014-10-01
This study aimed to review current knowledge regarding implantation of the Vibrant Soundbridge floating mass transducer (FMT) at the round window (round window vibroplasty) as well as to form a consensus on steps for a reliable, stable surgical procedure. Review of the literature and experimental observations by the authors. Round window (RW) vibroplasty has been established as a reliable procedure that produces good and stable results for patients with conductive or mixed hearing loss. The experience gained over the past few years of the authors' more than 200 implantations has led to consensus on several key points: (1) a wide and bloodless access to the middle ear with facial nerve monitoring, (2) the careful and correct identification and exposure of the round window membrane, (3) a good setup for efficient energy transition of the FMT, namely, perpendicular placement of the FMT with no contact to bone and the placement of cartilage behind the FMT to create a preloaded "spring" function, and (4) 4 points of FMT fixation: a rim of the round window bony overhang left intact both anterior and posterior to the FMT, conductor link stabilization, and cartilage behind the FMT. In addition, the FMT should be covered with soft tissue. © The Author(s) 2014.
Ebolavirus comparative genomics
Jun, Se-Ran; Leuze, Michael R.; Nookaew, Intawat; Uberbacher, Edward C.; Land, Miriam; Zhang, Qian; Wanchai, Visanu; Chai, Juanjuan; Nielsen, Morten; Trolle, Thomas; Lund, Ole; Buzard, Gregory S.; Pedersen, Thomas D.; Wassenaar, Trudy M.; Ussery, David W.
2015-01-01
The 2014 Ebola outbreak in West Africa is the largest documented for this virus. To examine the dynamics of this genome, we compare more than 100 currently available ebolavirus genomes to each other and to other viral genomes. Based on oligomer frequency analysis, the family Filoviridae forms a distinct group from all other sequenced viral genomes. All filovirus genomes sequenced to date encode proteins with similar functions and gene order, although there is considerable divergence in sequences between the three genera Ebolavirus, Cuevavirus and Marburgvirus within the family Filoviridae. Whereas all ebolavirus genomes are quite similar (multiple sequences of the same strain are often identical), variation is most common in the intergenic regions and within specific areas of the genes encoding the glycoprotein (GP), nucleoprotein (NP) and polymerase (L). We predict regions that could contain epitope-binding sites, which might be good vaccine targets. This information, combined with glycosylation sites and experimentally determined epitopes, can identify the most promising regions for the development of therapeutic strategies. This manuscript has been authored by UT-Battelle, LLC under Contract No. DE-AC05-00OR22725 with the U.S. Department of Energy. The United States Government retains and the publisher, by accepting the article for publication, acknowledges that the United States Government retains a non-exclusive, paid-up, irrevocable, world-wide license to publish or reproduce the published form of this manuscript, or allow others to do so, for United States Government purposes. The Department of Energy will provide public access to these results of federally sponsored research in accordance with the DOE Public Access Plan (http://energy.gov/downloads/doe-public-access-plan). PMID:26175035
NASA Astrophysics Data System (ADS)
Fegerl, Michael; Wieden, Wilfried
2013-04-01
Increasingly people have to communicate knowledge across cultural and language boundaries. Even though recent technologies offer powerful communication facilities people often feel confronted with barriers which clearly reduce their chances of making their interaction a success. Concrete evidence concerning such problems derives from a number of projects, where generated knowledge often results in dead-end products. In the Alpine Space-project SILMAS (Sustainable Instruments for Lake Management in Alpine Space), in which both authors were involved, a special approach (syneris® ) was taken to avoid this problem and to manage project knowledge in sustainable form. Under this approach knowledge input and output are handled interactively: Relevant knowledge can be developed continuously and users can always access the latest state of expertise. Resort to the respective tools and procedures can also assist in closing knowledge gaps and in developing innovative responses to familiar or novel problems. This contribution intends to describe possible ways and means which have been found to increase the chances of success of knowledge communication across cultural boundaries. The process of trans-cultural discussions of experts to find a standardized solution is highlighted as well as the problem of dissemination of expert knowledge to variant stakeholders. Finally lessons learned are made accessible, where a main task lies in the creation of a tool box for conflict solving instruments, as a demonstrable result of the project and for the time thereafter. The interactive web-based toolbox enables lake managers to access best practice instruments in standardized, explicit and cross-linguistic form.
Optical response from lenslike semiconductor nipple arrays
NASA Astrophysics Data System (ADS)
Wu, H.-M.; Lai, C.-M.; Peng, L.-H.
2008-11-01
The authors reported the use of recessive size reduction in self-assembled polystyrene sphere mask with anisotropic etching to form lenslike nipple arrays onto the surface of silicon and gallium nitride. These devices are shown to exhibit a filling factor near to an ideal close-packed condition and paraboloidlike etch profile with slope increased proportionally to the device aspect ratio. Specular reflectivity of less than 3% was observed over the visible spectral range for the 0.35-μm-period nipple-lens arrays. Using two-dimensional rigorous coupled-wave analysis, the latter phenomenon can be ascribed to a gradual index matching mechanism accessed by a high surface-coverage semiconductor nipple array structure.
Prediction of the Swamping Tendencies of Recreational Boats.
1982-01-01
Price Unclassified Uncl ass ified 369 Form DOT F 1700.7 (0-72) Reproduction of completed page authorized ii ! _, . , . .- ’-: " ’’ " _ , .L...Possibly, structures such as railings or hand-holds which make human access to the boat ends difficult would have to be required. This step may...0 M, N ’ . : aI -’ -4 - 44 --4 - - M. e4’ u Q: ft P.7 I I a u" M% w Na - fu IVf uCI f N IV CY .4. C- w4* - Y IV40 t5.4 nocy4 t N cu N M w4 w 14
Questioning the efficacy of 'gold' open access to published articles.
Fredericks, Suzanne
2015-07-01
To question the efficacy of 'gold' open access to published articles. Open access is unrestricted access to academic, theoretical and research literature that is scholarly and peer-reviewed. Two models of open access exist: 'gold' and 'green'. Gold open access provides everyone with access to articles during all stages of publication, with processing charges paid by the author(s). Green open access involves placing an already published article into a repository to provide unrestricted access, with processing charges incurred by the publisher. This is a discussion paper. An exploration of the relative benefits and drawbacks of the 'gold' and 'green' open access systems. Green open access is a more economic and efficient means of granting open access to scholarly literature but a large number of researchers select gold open access journals as their first choices for manuscript submissions. This paper questions the efficacy of gold open access models and presents an examination of green open access models to encourage nurse researchers to consider this approach. In the current academic environment, with increased pressures to publish and low funding success rates, it is difficult to understand why gold open access still exists. Green open access enhances the visibility of an academic's work, as increased downloads of articles tend to lead to increased citations. Green open access is the cheaper option, as well as the most beneficial choice, for universities that want to provide unrestricted access to all literature at minimal risk.
ERIC Educational Resources Information Center
Tenopir, Carol
2004-01-01
Open access publishing is a hot topic today. But open access publishing can have many different definitions, and pros and cons vary with the definitions. Open access publishing is especially attractive to companies and small colleges or universities that are likely to have many more readers than authors. A downside is that a membership fee sounds…
77 FR 40864 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-11
... standard reporting, ad-hoc reporting and tracking capability of procurement, funding, contractor and user..., guards, and is accessible only to authorized personnel. Access to records is limited to person(s... cleared for need-to-know. Access to computerized data is restricted by Common Access Card (CAC) and/or...
Cardea: Providing Support for Dynamic Resource Access in a Distributed Computing Environment
NASA Technical Reports Server (NTRS)
Lepro, Rebekah
2003-01-01
The environment framing the modem authorization process span domains of administration, relies on many different authentication sources, and manages complex attributes as part of the authorization process. Cardea facilitates dynamic access control within this environment as a central function of an inter-operable authorization framework. The system departs from the traditional authorization model by separating the authentication and authorization processes, distributing the responsibility for authorization data and allowing collaborating domains to retain control over their implementation mechanisms. Critical features of the system architecture and its handling of the authorization process differentiate the system from existing authorization components by addressing common needs not adequately addressed by existing systems. Continuing system research seeks to enhance the implementation of the current authorization model employed in Cardea, increase the robustness of current features, further the framework for establishing trust and promote interoperability with existing security mechanisms.
A dynamic access control method based on QoS requirement
NASA Astrophysics Data System (ADS)
Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang
2013-03-01
A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.
Trends in communicative access solutions for children with cerebral palsy.
Myrden, Andrew; Schudlo, Larissa; Weyand, Sabine; Zeyl, Timothy; Chau, Tom
2014-08-01
Access solutions may facilitate communication in children with limited functional speech and motor control. This study reviews current trends in access solution development for children with cerebral palsy, with particular emphasis on the access technology that harnesses a control signal from the user (eg, movement or physiological change) and the output device (eg, augmentative and alternative communication system) whose behavior is modulated by the user's control signal. Access technologies have advanced from simple mechanical switches to machine vision (eg, eye-gaze trackers), inertial sensing, and emerging physiological interfaces that require minimal physical effort. Similarly, output devices have evolved from bulky, dedicated hardware with limited configurability, to platform-agnostic, highly personalized mobile applications. Emerging case studies encourage the consideration of access technology for all nonverbal children with cerebral palsy with at least nascent contingency awareness. However, establishing robust evidence of the effectiveness of the aforementioned advances will require more expansive studies. © The Author(s) 2014.
77 FR 28591 - Combined Notice of Filings #2
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-15
...: Application for Market-Based Rate Authority to be effective 7/7/ 2012. Filed Date: 05/08/2012. Accession... filing per 35.12: Application for Market-Based Rate Authority to be effective 7/7/ 2012. Filed Date: 05....13(a)(2)(iii) Notice of Succession to be effective 7/10/ 2012. Filed Date: 05/08/2012. Accession...
"Predatory" Online Journals Lure Scholars Who Are Eager to Publish
ERIC Educational Resources Information Center
Stratford, Michael
2012-01-01
OMICS Publishing Group is an open-access publisher operating under an author-pays model. Unlike traditional journal subscriptions in which readers or institutions pay to read content, OMICS relies on its contributors for financial support. Although the author-pays model is not a new phenomenon in the realm of open access, its recent popularity has…
ERIC Educational Resources Information Center
Burke, Paul F.; Schuck, Sandy; Aubusson, Peter; Kearney, Matthew; Frischknecht, Bart
2018-01-01
This research examines how the pedagogical orientations of teachers affect technology adoption in the classroom. At the same time, the authors account for the stage of concern that teachers are experiencing regarding the use of the technology, their access to the technology and the level of schooling at which they teach.The authors' investigation…
A crowdsourcing model for creating preclinical medical education study tools.
Bow, Hansen C; Dattilo, Jonathan R; Jonas, Andrea M; Lehmann, Christoph U
2013-06-01
During their preclinical course work, medical students must memorize and recall substantial amounts of information. Recent trends in medical education emphasize collaboration through team-based learning. In the technology world, the trend toward collaboration has been characterized by the crowdsourcing movement. In 2011, the authors developed an innovative approach to team-based learning that combined students' use of flashcards to master large volumes of content with a crowdsourcing model, using a simple informatics system to enable those students to share in the effort of generating concise, high-yield study materials. The authors used Google Drive and developed a simple Java software program that enabled students to simultaneously access and edit sets of questions and answers in the form of flashcards. Through this crowdsourcing model, medical students in the class of 2014 at the Johns Hopkins University School of Medicine created a database of over 16,000 questions that corresponded to the Genes to Society basic science curriculum. An analysis of exam scores revealed that students in the class of 2014 outperformed those in the class of 2013, who did not have access to the flashcard system, and a survey of students demonstrated that users were generally satisfied with the system and found it a valuable study tool. In this article, the authors describe the development and implementation of their crowdsourcing model for creating study materials, emphasize its simplicity and user-friendliness, describe its impact on students' exam performance, and discuss how students in any educational discipline could implement a similar model of collaborative learning.
Wilson, Oonagh; Kirwan, John; Dures, Emma; Quest, Enid; Hewlett, Sarah
2017-01-01
Although foot problems are common in rheumatoid arthritis (RA), the consequences of foot problems from the patient perspective have not been fully explored. The aims of this study were to explore the experience of foot problems and decisions to access foot care services or not in patients with RA. Semi structured, one-to-one interviews with patients recruited from 2 UK rheumatology units, purposively sampled for self-reported foot problems and a range of personal/disease characteristics. Inductive thematic analysis was used, with rigour provided by multiple independent analysers. Emerging themes were discussed and agreed by all authors. Twelve patients participated: 7 female; mean age 56 years (29-72); mean disease duration 12 years (2-27), 5 had accessed foot care services. The 'Impact' of foot problems was substantial and formed the underpinning theme, comprising three organising themes: 'Foot symptoms'; 'Consequences'; and 'Cost'. Foot symptoms such as pain and numbness required self-management, and affected daily life (walking, working) leading to social and emotional costs. The global theme, 'Decision to access foot care or not', also comprised three organising themes: 'Access perceived unnecessary' (no problem, can cope); 'Access hindered by patients' perception'; and 'Access supported by patient and clinician'. Decisions to access foot care or not were complex and influenced by patient beliefs regarding possible treatments and how to access these, and hindered by patient perceptions that their feet were ignored by rheumatology clinicians. Positive experience of foot care encouraged continued utilisation but negative experiences contributed to patients' decisions to discontinue foot care services. Foot problems are important issues for patients and impact on many aspects of their physical, social and emotional lives. Patients who had accessed foot care services prioritised their foot problems as an important health care need. However, for others who would like foot care services, personal knowledge and values, and perceived barriers in clinical practice, appear to interact to inhibit foot care access. The extent which these interactions affect overall access to foot care in RA patients in general now needs to be quantified to help to inform and improve the effectiveness of the organisation and delivery of foot care.
Limited take-up of health coverage tax credits: a challenge to future tax credit design.
Dorn, Stan; Varon, Janet; Pervez, Fouad
2005-10-01
The Trade Act of 2002 created federal tax credits to subsidize health coverage for certain early retirees and workers displaced by international trade. Though small, this program offers the opportunity to learn how to design future tax credits for larger groups of uninsured. During September 2004, the most recent month for which there are data about all forms of Trade Act credits, roughly 22 percent of eligible individuals received credits. The authors find that health insurance tax credits are more likely to reach their target populations if such credits: 1) limit premium costs for the low-income uninsured and do not require full premium payments while applications are pending; 2) provide access to coverage that beneficiaries value, including care for preexisting conditions; 3) are combined with outreach that uses easily understandable, multilingual materials and proactive enrollment efforts; and 4) feature a simple application process involving one form filed with one agency.
Best practices for scholarly authors in the age of predatory journals
Beall, J
2016-01-01
‘Continuous effort, not strength or intelligence, is the key to understanding our potential.’ Margaret J Wheatley The focus of any academic or research author is to share his or her findings, and to gain respect and reward for publishing. The ideal journal is one that not only publishes an article quickly but also helps the author to improve the article before publication through peer review, selects only the best research so that the author’s article lies alongside other high quality articles, and provides maximum (and long-term) visibility and access to the article. Unfortunately, in the real world, authors need to make tradeoffs between high quality journals, those that work quickly, those that are willing to accept the article and those that provide the best access. Into this mix has come the potential of open access as a means of increasing visibility: journals publish the article without a subscription barrier so anyone, anywhere, can read the article. However, the growth of open access (pushed by institutions, grant bodies and governments as a means of improving human health and knowledge) has come with some unforeseen consequences. In this article, Jeffrey Beall discusses one recent phenomenon that has arisen from the open access movement: that of ‘predatory publishers’. These are individuals or companies that use the open access financial system (author pays, rather than library subscribes) to defraud authors and readers by promising reputable publishing platforms but delivering nothing of the sort. They frequently have imaginary editorial boards, do not operate any peer review or quality control, are unclear about payment requirements and opaque about ownership or location, include plagiarised content and publish whatever somebody will pay them to publish. Predatory publishers generally make false promises to authors and behave unethically. They also undermine the scholarly information and publishing environment with a deluge of poor quality, unchecked and invalidated articles often published on temporary sites, thus losing the scholarly record. Jeffrey Beall, a librarian in Denver, US, has watched the rise of such fraudulent practice, and manages a blog site that names publishers and journals that he has identified as predatory. While Beall’s lists can provide librarians and knowledgeable authors with information on which journals and publishers to be cautious about, several legitimate publishers, library groups and others have joined forces to educate and inform authors in what to look for when selecting journals to publish in (or read). This initiative, called Think. Check. Submit. (http://thinkchecksubmit.org/), was launched in the latter half of 2015 and hopes to raise awareness of disreputable journals while clearly separating them from valid, high quality, open access journals (of which there are many). PIPPA SMART Guest Editor PMID:26829665
Storyboards and Science: Introducing the Planetary Data Storyboard
NASA Astrophysics Data System (ADS)
King, T. A.; Del Villar, A.; Alkhawaja, A.; Grayzeck, E. J.; Galica, C.; Odess, J.; Erickson, K. J.
2015-12-01
Every discovery has a story and storytelling is an ancient form of education. The stories of scientific discovery are often very formal and technical and not always very accessible. As in the past, today most scientific storytelling is done as in-person presentations in the form of slide shows or movies that unfold according to the design of its author. Things have changed. Using today's technologies telling stories can be a rich multi-media experience with a blending of text, animations, movies and infographics. Also, with presentations on the web the presentation can provide links to more details and the audience (reader) can jump to the linked information. Even so, the most common form of today's storytelling is as a narrative that starts with a page, a link to a single movie or a slide-show. We introduce a new promising form of scientific storytelling, the storyboard. With a storyboard a story is presented as a set of panels that contain representative images of an event and may have associated notes or instructions. The panels are arranged in a timeline that allow the audience to experience the discovery in the same way it occurred. A panel can also link to a more detailed source such as a publication, the data that was collected or items derived from the research (like movies or animations). Scientific storyboards can make science discovery more accessible to people by presenting events in an easy to follow layout. Scientific storyboards can also help to teach the scientific method, by following the experiences of a researcher as they investigate a phenomenon or try to understand a new set of observations. We illustrate the unique features of scientific storyboards with the Planetary Data Storyboard using data archived by the Planetary Data System.
Sustainable Development of Research Capacity in West Africa based on the GLOWA Volta Project
NASA Astrophysics Data System (ADS)
Liebe, Jens R.; Rogmann, Antonio; Falk, Ulrike; Amisigo, Barnabas; Nyarko, Kofi; Harmsen, Karl; Vlek, Paul L. G.
2010-05-01
The Sustainable Development of Research Capacity (SDRC) in West Africa is an 18 month project, funded by the German Ministry of Education and Research, to strengthen the research capacity, give access to data and models, and to support the establishment of the newly formed Volta Basin Authority. The SDRC project largely builds on the results and models developed in the framework of the GLOWA Volta Project (GVP), a nine-year, interdisciplinary research project (May 2000 - May 2009). The GVP's central objectives were to analyze the physical and socio-economic determinants of the hydrological cycle in the Volta Basin in the face of global change, and to develop scientifically sound decision support resources. Another major achievement of GVP was the extensive capacity building. Of the 81 participating students (57 Ph.D.'s), 44 originated from West Africa, and 85% of the West African graduates returned to their home countries. The SDRC makes use of the wide range of research results and decision support tools developed in the course of the GVP. It is based on three columns: I. knowledge transfer and strengthening of human capacity, which focus on a training on the modeling of the onset of the rainy season, hydrological, economic, and hydro-economic modeling, and training of geospatial database managers; II. strengthening of infrastructural research capacity through the support of a research instrumentation network through the operation and transfer of a weather station network, a network of tele-transmitted stream gauges; and III. the transfer of a publicly accessible online Geoportal for the dissemination of various geospatial data and research results. At the center of the SDRC effort is the strengthening of the Volta Basin Authority, a river basin authority with a transnational mandate, especially through the transfer of the Geoportal, and the associated training and promotion efforts. The Geoportal is an effort to overcome the data scarcity previously observed in the Volta Basin, and represents the first comprehensive, publicly accessible data- and meta-database for the Volta Basin. The Geoportal can be used to search for data, for interactive mapping or the download of ready-made maps, and to publish and share new data and research results. Local institutions are actively involved in acquiring data for the Geoportal, and trained in its operation. For the contributing institutions, the ability to manage data access and use rights (publicly available, available to defined user groups, available upon request) is of great importance. It allows them to publish the existence of their data and facilitate access to it without sacrificing their ownership rights. The Geoportal can be accessed at http://131.220.109.6/Geoportal
NASA thesaurus. Volume 2: Access vocabulary
NASA Technical Reports Server (NTRS)
1985-01-01
The Access Vocabulary, which is essentially a permuted index, provides access to any word or number in authorized postable and nonpostable terms. Additional entries include postable and nonpostable terms, other word entries, and pseudo-multiword terms that are permutations of words that contain words within words. The Access Vocabulary contains 40,738 entries that give increased access to the hierarchies in Volume 1 - Hierarchical Listing.
NASA Thesaurus. Volume 2: Access vocabulary
NASA Technical Reports Server (NTRS)
1982-01-01
The Access Vocabulary, which is essentially a permuted index, provides access to any word or number in authorized postable and nonpostable terms. Additional entries include postable and nonpostable terms, other word entries, and pseudo-multiword terms that are permutations of words that contain words within words. The Access Vocabulary contains, 40,661 entries that give increased access to he hierarchies in Volume 1 - Hierarchical Listing.
Web Accessibility in Europe and the United States: What We Are Doing to Increase Inclusion
ERIC Educational Resources Information Center
Wheaton, Joseph; Bertini, Patrizia
2007-01-01
Accessibility is hardly a new problem and certainly did not originate with the Web. Lack of access to buildings long preceded the call for accessible Web content. Although it is unlikely that rehabilitation educators look at Web page accessibility with indifference, many may also find it difficult to implement. The authors posit three reasons why…
Ferlie, Ewan
2017-06-20
This commentary on the recent think piece by Mannion and Exworthy reviews their core arguments, highlighting their suggestion that recent forces for personalization have emerged which may counterbalance the strong standardization wave which has been evident in many healthcare settings and systems over the last two decades. These forces for personalization can take very different forms. The commentary explores the authors' suggestion that these themes can be fruitfully examined theoretically through an institutional logics (ILs) literature, which has recently been applied by some scholars to healthcare settings. This commentary outlines key premises of that theoretical tradition. Finally, the commentary makes suggestions for taking this IL influenced research agenda further, along with some issues to be addressed. © 2018 The Author(s); Published by Kerman University of Medical Sciences. This is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
An overview of biomedical literature search on the World Wide Web in the third millennium.
Kumar, Prince; Goel, Roshni; Jain, Chandni; Kumar, Ashish; Parashar, Abhishek; Gond, Ajay Ratan
2012-06-01
Complete access to the existing pool of biomedical literature and the ability to "hit" upon the exact information of the relevant specialty are becoming essential elements of academic and clinical expertise. With the rapid expansion of the literature database, it is almost impossible to keep up to date with every innovation. Using the Internet, however, most people can freely access this literature at any time, from almost anywhere. This paper highlights the use of the Internet in obtaining valuable biomedical research information, which is mostly available from journals, databases, textbooks and e-journals in the form of web pages, text materials, images, and so on. The authors present an overview of web-based resources for biomedical researchers, providing information about Internet search engines (e.g., Google), web-based bibliographic databases (e.g., PubMed, IndMed) and how to use them, and other online biomedical resources that can assist clinicians in reaching well-informed clinical decisions.
Accessible Bus Service in Palm Beach County, Florida
DOT National Transportation Integrated Search
1983-03-01
The Palm Beach County Transportation Authority introduced accessible fixed-route service on its countywide CoTran bus service in May 1980. CoTran provided 100% (full-fleet) accessible service, using 23 retrofitted buses and 40 new buses, all equipped...
A study of the effect of ADA accessibility on Kansas roundabouts.
DOT National Transportation Integrated Search
2008-11-01
The Access Board, with authority to enforce provisions of the American Disabilities Act (ADA), initially determined : that roundabouts are not accessible by blind pedestrians and drafted proposed guidelines to require pedestrian : signals at all roun...
49 CFR 238.125 - Marking and instructions for emergency egress and rescue access.
Code of Federal Regulations, 2014 CFR
2014-10-01
... and rescue access. On or after January 28, 2015, emergency signage and markings shall be provided for..., “Standard for Emergency Signage for Egress/Access of Passenger Rail Equipment,” Authorized October 7, 2007...
Aggarwal, Sunil K; Carter, Gregory T; Sullivan, Mark D; ZumBrunnen, Craig; Morrill, Richard; Mayer, Jonathan D
2009-01-01
This study was conducted to better understand the characteristics of chronic pain patients seeking treatment with medicinal cannabis (MC). Retrospective chart reviews of 139 patients (87 males, median age 47 years; 52 females, median age 48 years); all were legally qualified for MC use in Washington State. Regional pain clinic staffed by university faculty. age 18 years and older; having legally accessed MC treatment, with valid documentation in their medical records. All data were de-identified. Records were scored for multiple indicators, including time since initial MC authorization, qualifying condition(s), McGill Pain score, functional status, use of other analgesic modalities, including opioids, and patterns of use over time. Of 139 patients, 15 (11 percent) had prior authorizations for MC before seeking care in this clinic. The sample contained 236.4 patient-years of authorized MC use. Time of authorized use ranged from 11 days to 8.31 years (median of 1.12 years). Most patients were male (63 percent) yet female patients averaged 0.18 years longer authorized use. There were no other gender-specific trends or factors. Most patients (n = 123, 88 percent) had more than one pain syndrome present. Myofascial pain syndrome was the most common diagnosis (n = 114, 82 percent), followed by neuropathic pain (n = 89, 64 percent), discogenic back pain (n = 72, 51.7 percent), and osteoarthritis (n = 37, 26.6 percent). Other diagnoses included diabetic neuropathy, central pain syndrome, phantom pain, spinal cord injury, fibromyalgia, rheumatoid arthritis, HIV neuropathy, visceral pain, and malignant pain. In 51 (37 percent) patients, there were documented instances of major hurdles related to accessing MC, including prior physicians unwilling to authorize use, legal problems related to MC use, and difficulties in finding an affordable and consistent supply of MC. Data indicate that males and females access MC at approximately the same rate, with similar median authorization times. Although the majority of patient records documented significant symptom alleviation with MC, major treatment access and delivery barriers remain.
Microsoft's Vista: Guarantees People with Special Needs Access to Computers
ERIC Educational Resources Information Center
Williams, John M.
2006-01-01
In this article, the author discusses the accessibility features of Microsoft's Windows Vista. One of the most innovative aspects of Windows Vista is a new accessibility and automated testing model called Microsoft UI Automation, which reduces development costs not only for accessible and assistive technology (AT) developers, but also for…
Electronic Ramp to Success: Designing Campus Web Pages for Users with Disabilities.
ERIC Educational Resources Information Center
Coombs, Norman
2002-01-01
Discusses key issues in addressing the challenge of Web accessibility for people with disabilities, including tools for Web authoring, repairing, and accessibility validation, and relevant legal issues. Presents standards for Web accessibility, including the Section 508 Standards from the Federal Access Board, and the World Wide Web Consortium's…
Guidelines for Making Web Content Accessible to All Users
ERIC Educational Resources Information Center
Thompson, Terrill; Primlani, Saroj; Fiedor, Lisa
2009-01-01
The main goal of accessibility standards and guidelines is to design websites everyone can use. The "IT Accessibility Constituent Group" developed this set of draft guidelines to help EQ authors, reviewers, and staff and the larger EDUCAUSE community ensure that web content is accessible to all users, including those with disabilities. This…
10 CFR 26.65 - Pre-access drug and alcohol testing.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Pre-access drug and alcohol testing. 26.65 Section 26.65 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Granting and Maintaining Authorization § 26.65 Pre-access drug and alcohol testing. (a) Purpose. This section contains pre-access testing...
25 CFR 571.6 - Access to papers, books, and records.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 25 Indians 2 2013-04-01 2013-04-01 false Access to papers, books, and records. 571.6 Section 571.6... PROVISIONS MONITORING AND INVESTIGATIONS Inspection of Books and Records § 571.6 Access to papers, books, and... operation shall provide the authorized representative with access to all papers, books, and records...
25 CFR 571.6 - Access to papers, books, and records.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 25 Indians 2 2010-04-01 2010-04-01 false Access to papers, books, and records. 571.6 Section 571.6... PROVISIONS MONITORING AND INVESTIGATIONS Inspection of Books and Records § 571.6 Access to papers, books, and... operation shall provide the authorized representative with access to all papers, books, and records...
25 CFR 571.6 - Access to papers, books, and records.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 25 Indians 2 2011-04-01 2011-04-01 false Access to papers, books, and records. 571.6 Section 571.6... PROVISIONS MONITORING AND INVESTIGATIONS Inspection of Books and Records § 571.6 Access to papers, books, and... operation shall provide the authorized representative with access to all papers, books, and records...
25 CFR 571.6 - Access to papers, books, and records.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 25 Indians 2 2014-04-01 2014-04-01 false Access to papers, books, and records. 571.6 Section 571.6... PROVISIONS MONITORING AND INVESTIGATIONS Inspection of Books and Records § 571.6 Access to papers, books, and... operation shall provide the authorized representative with access to all papers, books, and records...
25 CFR 571.6 - Access to papers, books, and records.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 25 Indians 2 2012-04-01 2012-04-01 false Access to papers, books, and records. 571.6 Section 571.6... PROVISIONS MONITORING AND INVESTIGATIONS Inspection of Books and Records § 571.6 Access to papers, books, and... operation shall provide the authorized representative with access to all papers, books, and records...
77 FR 37683 - Proposed Collection; Comment Request; NDAR Data Access Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-22
... first where the Principal Investigator (PI) completes the entire NDAR Data Access Request form, and the second where the PI has the Research Assistant begin filling out the form and PI provides the final...
Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT
Guo, Yunchuan; Yin, Lihua; Li, Chao
2014-01-01
Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model. PMID:25177731
Matsaganis, Matthew D; Wilkin, Holley A
2015-04-01
This article contributes to the burgeoning literature on the social determinants of health disparities. The authors investigate how communication resources and collective efficacy, independently and in combination, shape residents' access to health enhancing resources (including healthcare services, sources of healthier food options, and public recreation spaces) in their communities. Using random digit dial telephone survey data from 833 residents of South Los Angeles communities the authors show that communicative social capital-that is, an information and problem-solving resource that accrues to residents as they become more integrated into their local communication network of neighbors, community organizations, and local media-plays a significant role in access to health resources. This relationship is complicated by individuals' health insurance and health status, as communicative social capital magnifies the sense of absence of resources for those who are in worse health and lack insurance. Communicative social capital builds collective efficacy, which is positively related to access to health-enhancing resources, but it also mediates the negative relationship between communicative social capital and access to health resources. Residents with richer stores of communicative social capital and collective efficacy report better access to health resources. The authors conclude with a discussion of implications of these findings and suggestions for future research.
NASA Technical Reports Server (NTRS)
Westmeyer, Paul A. (Inventor); Wertenberg, Russell F. (Inventor); Krage, Frederick J. (Inventor); Riegel, Jack F. (Inventor)
2017-01-01
An authentication procedure utilizes multiple independent sources of data to determine whether usage of a device, such as a desktop computer, is authorized. When a comparison indicates an anomaly from the base-line usage data, the system, provides a notice that access of the first device is not authorized.
ERIC Educational Resources Information Center
Biktimirov, Ernest N.; Klassen, Kenneth J.
2008-01-01
The authors examined the relationship between student online activity, including access to specific course materials, and performance in a traditional face-to-face introductory finance course that a class Web site supported. The authors used 6 measures: (a) total hits, (b) hit consistency, (c) number of unique files that the students accessed, (d)…
Making Microcomputers Accessible to Blind Persons.
ERIC Educational Resources Information Center
Ruconich, Sandra K.; And Others
1986-01-01
The article considers advantages and limitations of tactile, auditory, and visual means of microcomputer access for blind students. Discussed are electronic braille, paper braille, the Optacon, synthesized speech, and enlarged print. Improved multimedia access technology is predicted for the future. (Author/DB)
Funding free and universal access to Journal of Neuroinflammation.
Mrak, Robert E; Griffin, W Sue T
2004-10-14
Journal of Neuroinflammation is an Open Access, online journal published by BioMed Central. Open Access publishing provides instant and universal availability of published work to any potential reader, worldwide, completely free of subscriptions, passwords, and charges. Further, authors retain copyright for their work, facilitating its dissemination. Open Access publishing is made possible by article-processing charges assessed "on the front end" to authors, their institutions, or their funding agencies. Beginning November 1, 2004, the Journal of Neuroinflammation will introduce article-processing charges of around US$525 for accepted articles. This charge will be waived for authors from institutions that are BioMed Central members, and in additional cases for reasons of genuine financial hardship. These article-processing charges pay for an electronic submission process that facilitates efficient and thorough peer review, for publication costs involved in providing the article freely and universally accessible in various formats online, and for the processes required for the article's inclusion in PubMed and its archiving in PubMed Central, e-Depot, Potsdam and INIST. There is no remuneration of any kind provided to the Editors-in-Chief, to any members of the Editorial Board, or to peer reviewers; all of whose work is entirely voluntary. Our article-processing charge is less than charges frequently levied by traditional journals: the Journal of Neuroinflammation does not levy any additional page or color charges on top of this fee, and there are no reprint costs as publication-quality pdf files are provided, free, for distribution in lieu of reprints. Our article-processing charge will enable full, immediate, and continued Open Access for all work published in Journal of Neuroinflammation. The benefits from such Open Access will accrue to readers, through unrestricted access; to authors, through the widest possible dissemination of their work; and to science and society in general, through facilitation of information availability and scientific advancement.
Khamis, F M; Rwomushana, I; Ombura, L O; Cook, G; Mohamed, S A; Tanga, C M; Nderitu, P W; Borgemeister, C; Sétamou, M; Grout, T G; Ekesi, S
2017-12-05
Citrus (Citrus spp.) production continues to decline in East Africa, particularly in Kenya and Tanzania, the two major producers in the region. This decline is attributed to pests and diseases including infestation by the African citrus triozid, Trioza erytreae (Del Guercio) (Hemiptera: Triozidae). Besides direct feeding damage by adults and immature stages, T. erytreae is the main vector of 'Candidatus Liberibacter africanus', the causative agent of Greening disease in Africa, closely related to Huanglongbing. This study aimed to generate a novel barcode reference library for T. erytreae in order to use DNA barcoding as a rapid tool for accurate identification of the pest to aid phytosanitary measures. Triozid samples were collected from citrus orchards in Kenya, Tanzania, and South Africa and from alternative host plants. Sequences generated from populations in the study showed very low variability within acceptable ranges of species. All samples analyzed were linked to T. erytreae of GenBank accession number KU517195. Phylogeny of samples in this study and other Trioza reference species was inferred using the Maximum Likelihood method. The phylogenetic tree was paraphyletic with two distinct branches. The first branch had two clusters: 1) cluster of all populations analyzed with GenBank accession of T. erytreae and 2) cluster of all the other GenBank accession of Trioza species analyzed except T. incrustata Percy, 2016 (KT588307.1), T. eugeniae Froggatt (KY294637.1), and T. grallata Percy, 2016 (KT588308.1) that occupied the second branch as outgroups forming sister clade relationships. These results were further substantiated with genetic distance values and principal component analyses. © The Author(s) 2017. Published by Oxford University Press on behalf of Entomological Society of America.
User Registration Systems for Distributed Systems
NASA Astrophysics Data System (ADS)
Murphy, K. J.; Cechini, M.; Pilone, D.; Mitchell, A.
2010-12-01
As NASA’s Earth Observing System Data and Information System (EOSDIS) systems have evolved over the years, most of the EOSDIS data are now available to users via anonymous on-line access. Although the changes have improved the dissemination efficiency of earth science data, the anonymous access has made it difficult to characterize users, capture metrics on the value of EOSDIS and provide customized services that benefit users. As the number of web-based applications continues to grow, data centers and application providers have implemented their own user registration systems and provided new tools and interfaces for their registered users. This has led to the creation of independent registration systems for accessing data and interacting with online tools and services. The user profile information maintained at each of these registration systems is not consistent and the registration enforcement varies by system as well. This problem is in no way unique to EOSDIS and represents a general challenge to the distributed computing community. In a study done in 2007(http://www2007.org/papers/paper620.pd), the average user has approximately 7 passwords for about 25 accounts and enters a password 8 times a day. These numbers have only increased in the last three years. To try and address this, a number of solutions have been offered including Single Sign-On solutions using a common backend like Microsoft Active Directory or an LDAP server, trust based identity providers like OpenID, and various forms of authorization delegation like OAuth or SAML/XACML. This talk discusses the differences between authentication and authorization, the state of the more popular user registration solutions available for distributed use, and some of the technical and policy drivers that need to be considered when incorporating a user registration system into your application.
RBAC-Matrix-based EMR right management system to improve HIPAA compliance.
Lee, Hung-Chang; Chang, Shih-Hsin
2012-10-01
Security control of Electronic Medical Record (EMR) is a mechanism used to manage electronic medical records files and protect sensitive medical records document from information leakage. Researches proposed the Role-Based Access Control(RBAC). However, with the increasing scale of medical institutions, the access control behavior is difficult to have a detailed declaration among roles in RBAC. Furthermore, with the stringent specifications such as the U.S. HIPAA and Canada PIPEDA etc., patients are encouraged to have the right in regulating the access control of his EMR. In response to these problems, we propose an EMR digital rights management system, which is a RBAC-based extension to a matrix organization of medical institutions, known as RBAC-Matrix. With the aim of authorizing the EMR among roles in the organization, RBAC-Matrix also allow patients to be involved in defining access rights of his records. RBAC-Matrix authorizes access control declaration among matrix organizations of medical institutions by using XrML file in association with each EMR. It processes XrML rights declaration file-based authorization of behavior in the two-stage design, called master & servant stage, thus makes the associated EMR to be better protected. RBAC-Matrix will also make medical record file and its associated XrML declaration to two different EMRA(EMR Authorization)roles, namely, the medical records Document Creator (DC) and the medical records Document Right Setting (DRS). Access right setting, determined by the DRS, is cosigned by the patient, thus make the declaration of rights and the use of EMR to comply with HIPAA specifications.
Improving maternal healthcare utilisation in sub-Saharan Africa through micro-finance.
Abekah-Nkrumah, Gordon; Abor, Patience Aseweh; Abor, Joshua; Adjasi, Charles K D
2011-01-01
This paper aims to examine links between women's access to micro-finance and how they use maternal healthcare services in sub-Saharan Africa (SSA). The authors use theoretical and empirical literature to propose a framework to sustain and improve women's access to maternal healthcare services through micro-financing. It is found that improved access to micro-finance by women, combined with education may enhance maternal health service uptake. The paper does not consider empirical data in the analysis. The authors advocate empirically testing the framework proposed in other SSA countries. It is important to empower women by facilitating their access to education and micro-finance. This has implications for improving maternal healthcare utilization in SSA. The paper moves beyond poor access to maternal health services in SSA and proposes a framework for providing sustainable solutions.
Gas seal for an in situ oil shale retort and method of forming thermal barrier
Burton, III, Robert S.
1982-01-01
A gas seal is provided in an access drift excavated in a subterranean formation containing oil shale. The access drift is adjacent an in situ oil shale retort and is in gas communication with the fragmented permeable mass of formation particles containing oil shale formed in the in situ oil shale retort. The mass of formation particles extends into the access drift, forming a rubble pile of formation particles having a face approximately at the angle of repose of fragmented formation. The gas seal includes a temperature barrier which includes a layer of heat insulating material disposed on the face of the rubble pile of formation particles and additionally includes a gas barrier. The gas barrier is a gas-tight bulkhead installed across the access drift at a location in the access drift spaced apart from the temperature barrier.
NASA thesaurus. Volume 2: Access vocabulary
NASA Technical Reports Server (NTRS)
1988-01-01
The access vocabulary, which is essentially a permuted index, provides access to any word or number in authorized postable and nonpostable terms. Additional entries include postable and nonpostable terms, other word entries and pseudo-multiword terms that are permutations of words that contain words within words. The access vocabulary contains almost 42,000 entries that give increased access to the hierarchies in Volume 1 - Hierarchical Listing.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false Temporary eligibility for access at the top secret levels and temporary eligibility for âQâ access authorization: For someone who is the subject of a... Guidelines for Temporary Access § 147.31 Temporary eligibility for access at the top secret levels and...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 1 2014-07-01 2014-07-01 false Temporary eligibility for access at the top secret levels and temporary eligibility for âQâ access authorization: For someone who is the subject of a... Guidelines for Temporary Access § 147.31 Temporary eligibility for access at the top secret levels and...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 1 2012-07-01 2012-07-01 false Temporary eligibility for access at the top secret levels and temporary eligibility for âQâ access authorization: For someone who is the subject of a... Guidelines for Temporary Access § 147.31 Temporary eligibility for access at the top secret levels and...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 1 2013-07-01 2013-07-01 false Temporary eligibility for access at the top secret levels and temporary eligibility for âQâ access authorization: For someone who is the subject of a... Guidelines for Temporary Access § 147.31 Temporary eligibility for access at the top secret levels and...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Guidelines for Temporary Access § 147.31 Temporary eligibility for access at the top secret levels and... 32 National Defense 1 2010-07-01 2010-07-01 false Temporary eligibility for access at the top secret levels and temporary eligibility for âQâ access authorization: For someone who is the subject of a...
Blankart, Carl Rudolf; Stargardt, Tom; Schreyögg, Jonas
2011-01-01
Market authorization does not guarantee patient access to any given drug. This is particularly true for costly orphan drugs because access depends primarily on co-payments, reimbursement policies and prices. The objective of this article is to identify differences in the availability of orphan drugs and in patient access to them in 11 pharmaceutical markets: Australia, Canada, England, France, Germany, Hungary, the Netherlands, Poland, Slovakia, Switzerland and the US. Four rare diseases were selected for analysis: pulmonary arterial hypertension (PAH), Fabry disease (FD), hereditary angioedema (HAE) and chronic myeloid leukaemia (CML). Indicators for availability were defined as (i) the indications for which orphan drugs had been authorized in the treatment of these diseases; (ii) the application date; and (iii) the date upon which these drugs received market authorization in each country. Indicators of patient access were defined as (i) the outcomes of technology appraisals; (ii) the extent of coverage provided by healthcare payers; and (iii) the price of the drugs in each country. For PAH we analysed bosentan, iloprost, sildenafil, treprostinil (intravenous and inhaled) as well as sitaxentan and ambrisentan; for FD we analysed agalsidase alfa and agalsidase beta; for HAE we analysed icatibant, ecallantide and two complement C1s inhibitors; for CML we analysed imatinib, dasatinib and nilotinib. Most drugs included in this study had received market authorization in all countries, but the range of indications for which they had been authorized differed by country. The broadest range of indications was found in Australia, and the largest variations in indications were found for PAH drugs. Authorization process speed (the time between application and market authorization) was fastest in the US, with an average of 362 days, followed by the EU (394 days). The highest prices for the included drugs were found in Germany and the US, and the lowest in Canada, Australia and England. Although the prices of all of the included drugs were high compared with those of most non-orphan drugs, most of the insurance plans in our country sample provided coverage for authorized drugs after a certain threshold. Availability of and access to orphan drugs play a key role in determining whether patients will receive adequate and efficient treatment. Although the present study showed some variations between countries in selected indicators of availability and access to orphan drugs, virtually all of the drugs in question were available and accessible in our sample. However, substantial co-payments in the US and Canada represent important barriers to patient access, especially in the case of expensive treatments such as those analysed in this study. Market exclusivity is a strong instrument for fostering orphan drug development and drug availability. However, despite the positive effect of this instrument, the conditions under which market exclusivity is granted should be reconsidered in cases where the costs of developing an orphan drug have already been amortized through the use of the drug's active ingredient for the treatment of a common indication.
75 FR 62522 - Combined Notice of Filings No. 3
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-12
... filing per 154.203: NAESB EDI Form Filing to be effective 11/1/ 2010. Filed Date: 09/30/2010. Accession....9 EDI Form to be effective 11/1/2010. Filed Date: 09/30/2010. Accession Number: 20100930-5348...
External access to ALICE controls conditions data
NASA Astrophysics Data System (ADS)
Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.
2014-06-01
ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.
PACCMIT/PACCMIT-CDS: identifying microRNA targets in 3' UTRs and coding sequences.
Šulc, Miroslav; Marín, Ray M; Robins, Harlan S; Vaníček, Jiří
2015-07-01
The purpose of the proposed web server, publicly available at http://paccmit.epfl.ch, is to provide a user-friendly interface to two algorithms for predicting messenger RNA (mRNA) molecules regulated by microRNAs: (i) PACCMIT (Prediction of ACcessible and/or Conserved MIcroRNA Targets), which identifies primarily mRNA transcripts targeted in their 3' untranslated regions (3' UTRs), and (ii) PACCMIT-CDS, designed to find mRNAs targeted within their coding sequences (CDSs). While PACCMIT belongs among the accurate algorithms for predicting conserved microRNA targets in the 3' UTRs, the main contribution of the web server is 2-fold: PACCMIT provides an accurate tool for predicting targets also of weakly conserved or non-conserved microRNAs, whereas PACCMIT-CDS addresses the lack of similar portals adapted specifically for targets in CDS. The web server asks the user for microRNAs and mRNAs to be analyzed, accesses the precomputed P-values for all microRNA-mRNA pairs from a database for all mRNAs and microRNAs in a given species, ranks the predicted microRNA-mRNA pairs, evaluates their significance according to the false discovery rate and finally displays the predictions in a tabular form. The results are also available for download in several standard formats. © The Author(s) 2015. Published by Oxford University Press on behalf of Nucleic Acids Research.
First Experiences Using XACML for Access Control in Distributed Systems
NASA Technical Reports Server (NTRS)
Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit
2003-01-01
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.
17 CFR 9.12 - Effective date of disciplinary or access denial action.
Code of Federal Regulations, 2010 CFR
2010-04-01
... ACTIONS Notice and Effective Date of Disciplinary Action or Access Denial Action § 9.12 Effective date of disciplinary or access denial action. (a) Effective date. Any disciplinary or access denial action taken by an... cause a disciplinary action to become effective prior to that time if: (1) As authorized by § 8.25 of...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-02
.... Access to Safeguards Information is limited to those persons who have established a need-to-know the... to Safeguards Information'' (EA-13-041). A need-to-know means a determination by a person having... access. 2. No person may have access to Safeguards Information or unescorted access to radioactive...
Siler, Kyle; Haustein, Stefanie; Smith, Elise; Larivière, Vincent; Alperin, Juan Pablo
2018-01-01
Using a database of recent articles published in the field of Global Health research, we examine institutional sources of stratification in publishing access outcomes. Traditionally, the focus on inequality in scientific publishing has focused on prestige hierarchies in established print journals. This project examines stratification in contemporary publishing with a particular focus on subscription vs. various Open Access (OA) publishing options. Findings show that authors working at lower-ranked universities are more likely to publish in closed/paywalled outlets, and less likely to choose outlets that involve some sort of Article Processing Charge (APCs; gold or hybrid OA). We also analyze institutional differences and stratification in the APC costs paid in various journals. Authors affiliated with higher-ranked institutions, as well as hospitals and non-profit organizations pay relatively higher APCs for gold and hybrid OA publications. Results suggest that authors affiliated with high-ranked universities and well-funded institutions tend to have more resources to choose pay options with publishing. Our research suggests new professional hierarchies developing in contemporary publishing, where various OA publishing options are becoming increasingly prominent. Just as there is stratification in institutional representation between different types of publishing access, there is also inequality within access types.
Regan, Jemma L
2016-07-01
A case study comprised of formal interviews, formal observations and informal discussions investigated the motivations and experiences accessing dementia care health and social care services for a Muslim, Pakistani male with dementia. Motivations derived from 'desperation' and an inability to access support from family or religious community. Experiences of accessing services were mostly negative. Dementia services were ill-informed about how to support persons with young onset dementia, with pre-existing mental health conditions, from an ethnic minority. Education and training to remove barriers to all dementia care services is required for persons with dementia, their families and within dementia services and religious communities. © The Author(s) 2014.
Ophthalmology patients' interest in online access to clinic notes at three US clinics.
Lee, Bryan S; Oster, Natalia V; Chen, Galen Y; Ding, Leona L; Walker, Janice D; Elmore, Joann G
2017-07-01
This study aimed to understand patients' perceptions about potential benefits and harms of accessing their own ophthalmology clinic notes via an electronic patient portal as part of the OpenNotes initiative. The authors conducted a cross-sectional, in-person survey of ophthalmology patients at three US eye clinics. The paper survey was self-administered or administered with assistance from study staff before or after patients' clinical visits. The authors used descriptive statistics to summarise patient characteristics and patient attitudes about accessing their ophthalmology notes online. Chi-square and t-tests were performed to assess differences in patient responses between clinic locations. Four hundred and fifty-one patients responded (response rate 65%). Most patients thought that accessing doctors' notes online was a good idea (95%), wanted to view their clinic notes online (94%), and agreed online access would increase their understanding of their eye problems (95%) and help them better remember their care plan (94%); 14% said online access would increase their worry; 43% had privacy concerns; and 96% indicated they would show or discuss their notes with at least one other person. Non-white patients were more likely than white patients to perceive online clinic notes as a useful tool, but they were also more likely to worry and to express greater privacy concerns. Patients at three US eye clinics were strongly in favour of online access to ophthalmology notes and were optimistic this access would improve their understanding and self-care. Ophthalmologists should consider offering online access to their notes to enhance doctor-patient communication and improve clinical outcomes. © 2017 The Authors Ophthalmic & Physiological Optics © 2017 The College of Optometrists.
Davis, J T
2001-06-01
The author reviews a contemporary cognitive psychology perspective on memory that views memory as being composed of multiple separate systems. Most researchers draw a fundamental distinction between declarative/explicit and non-declarative/implicit forms of memory. Declarative memory is responsible for the conscious recollection of facts and events--what is typically meant by the everyday and the common psychoanalytic use of the word 'memory'. Non-declarative forms of memory, in contrast, are specialised processes that influence experience and behaviour without representing the past in terms of any consciously accessible content. They operate outside of an individual's awareness, but are not repressed or otherwise dynamically unconscious. Using this theoretical framework, the question of how childhood relationship experiences are carried forward from the past to influence the present is examined. It is argued that incorporating a conceptualisation of non-declarative memory processing into psychoanalytic theory is essential. Non-declarative memory processes are capable of forming complex and sophisticated representations of the interpersonal world. These non-declarative memory processes exert a major impact on interpersonal experience and behaviour that needs to be analysed on its own terms and not mistakenly viewed as a form of resistance.
Increasing Access to Tuberculosis Services in Ethiopia: Findings From a Patient-Pathway Analysis.
Fekadu, Lelisa; Hanson, Christy; Osberg, Mike; Makayova, Julia; Mingkwan, Pia; Chin, Daniel
2017-11-06
In Ethiopia, extensive scale-up of the availability of health extension workers (HEWs) at the community level has been credited with increased identification and referral of patients with presumptive tuberculosis, which has contributed to increased tuberculosis case notification and better treatment outcomes. However, nearly 30% of Ethiopia's estimated 191000 patients with tuberculosis remained unnotified in 2015. A better understanding of patient care-seeking practices may inform future government action to reach all patients with tuberculosis. A patient-pathway analysis was completed to assess the alignment between patient care initiation and the availability of diagnostic and treatment services at the national level. More than one third of patients initiated care with HEWs, who refer patients to health centers for diagnosis. An additional one third of patients initiated care at health centers. Of those health centers, >80% had microscopy services, but few had access to Xpert. Despite an extensive microscopy and radiography network at middle levels of the health system, a quarter of all notified patients with tuberculosis had no bacteriological confirmation of disease. While 30% of patients reported receiving some form of care from the private sector, private-sector facilities, especially pharmacies, were not widely accessed for tuberculosis diagnosis. The availability of HEWs can increase access to tuberculosis diagnostic and treatment support services, particularly for rural populations. Continued strengthening of referral systems from HEWs and health posts are needed to enable consistent and timely access to Xpert as an initial diagnostic test and to drug resistance screening. © The Author 2017. Published by Oxford University Press for the Infectious Diseases Society of America.
Yammine, Kaissar
2015-11-01
The open access model, where researchers can publish their work and make it freely available to the whole medical community, is gaining ground over the traditional type of publication. However, fees are to be paid by either the authors or their institutions. The purpose of this paper is to assess the proportion and type of open access evidence-based articles in the form of systematic reviews and meta-analyses in the field of musculoskeletal disorders and orthopedic surgery. PubMed database was searched and the results showed a maximal number of hits for low back pain and total hip arthroplasty. We demonstrated that despite a 10-fold increase in the number of evidence-based publications in the past 10 years, the rate of free systematic reviews in the general biomedical literature did not change for the last two decades. In addition, the average percentage of free open access systematic reviews and meta-analyses for the commonest painful musculoskeletal conditions and orthopedic procedures was 20% and 18%, respectively. Those results were significantly lower than those of the systematic reviews and meta-analyses in the remaining biomedical research. Such findings could indicate a divergence between the efforts engaged at promoting evidence-based principles and those at disseminating evidence-based findings in the field of musculoskeletal disease and trauma. The high processing fee is thought to be a major limitation when considering open access model for publication. © 2015 Chinese Cochrane Center, West China Hospital of Sichuan University and Wiley Publishing Asia Pty Ltd.
Code of Federal Regulations, 2010 CFR
2010-07-01
... the Army (Manpower and Reserve Affairs) is authorized to act on requests for civilian personnel... and reports that result in criminal investigation reports. This authority has been delegated to the...
Code of Federal Regulations, 2014 CFR
2014-07-01
... the Army (Manpower and Reserve Affairs) is authorized to act on requests for civilian personnel... and reports that result in criminal investigation reports. This authority has been delegated to the...
Code of Federal Regulations, 2013 CFR
2013-07-01
... the Army (Manpower and Reserve Affairs) is authorized to act on requests for civilian personnel... and reports that result in criminal investigation reports. This authority has been delegated to the...
Code of Federal Regulations, 2011 CFR
2011-07-01
... the Army (Manpower and Reserve Affairs) is authorized to act on requests for civilian personnel... and reports that result in criminal investigation reports. This authority has been delegated to the...
Code of Federal Regulations, 2012 CFR
2012-07-01
... the Army (Manpower and Reserve Affairs) is authorized to act on requests for civilian personnel... and reports that result in criminal investigation reports. This authority has been delegated to the...
49 CFR 8.11 - Authority to classify information.
Code of Federal Regulations, 2011 CFR
2011-10-01
....11 Transportation Office of the Secretary of Transportation CLASSIFIED INFORMATION: CLASSIFICATION/DECLASSIFICATION/ACCESS Classification/Declassification of Information § 8.11 Authority to classify information. (a... information as SECRET or CONFIDENTIAL with further authorization to delegate this authority. (b) The following...
49 CFR 8.11 - Authority to classify information.
Code of Federal Regulations, 2012 CFR
2012-10-01
....11 Transportation Office of the Secretary of Transportation CLASSIFIED INFORMATION: CLASSIFICATION/DECLASSIFICATION/ACCESS Classification/Declassification of Information § 8.11 Authority to classify information. (a... information as SECRET or CONFIDENTIAL with further authorization to delegate this authority. (b) The following...
49 CFR 8.11 - Authority to classify information.
Code of Federal Regulations, 2014 CFR
2014-10-01
....11 Transportation Office of the Secretary of Transportation CLASSIFIED INFORMATION: CLASSIFICATION/DECLASSIFICATION/ACCESS Classification/Declassification of Information § 8.11 Authority to classify information. (a... information as SECRET or CONFIDENTIAL with further authorization to delegate this authority. (b) The following...
49 CFR 8.11 - Authority to classify information.
Code of Federal Regulations, 2013 CFR
2013-10-01
....11 Transportation Office of the Secretary of Transportation CLASSIFIED INFORMATION: CLASSIFICATION/DECLASSIFICATION/ACCESS Classification/Declassification of Information § 8.11 Authority to classify information. (a... information as SECRET or CONFIDENTIAL with further authorization to delegate this authority. (b) The following...
49 CFR 8.11 - Authority to classify information.
Code of Federal Regulations, 2010 CFR
2010-10-01
....11 Transportation Office of the Secretary of Transportation CLASSIFIED INFORMATION: CLASSIFICATION/DECLASSIFICATION/ACCESS Classification/Declassification of Information § 8.11 Authority to classify information. (a... information as SECRET or CONFIDENTIAL with further authorization to delegate this authority. (b) The following...
Perrone, Dina
2010-04-01
This article provides an account of a female ethnographer's experience accessing participants and observing drug-using behaviors in highly sexualized dance clubs. Specifically, it describes how the researcher as a gendered and sexualized self can compromise safety and inhibit access while also serving as an advantage to establishing rapport. The author describes how various methods were employed to appear as part of the cultural scene and access participants, while avoiding, and responding to, unwanted sexual advances. To address such challenges, the author provides both practical and procedural suggestions for researchers and research institutions.
A System for Web-based Access to the HSOS Database
NASA Astrophysics Data System (ADS)
Lin, G.
Huairou Solar Observing Station's (HSOS) magnetogram and dopplergram are world-class instruments. Access to their data has opened to the world. Web-based access to the data will provide a powerful, convenient tool for data searching and solar physics. It is necessary that our data be provided to users via the Web when it is opened to the world. In this presentation, the author describes general design and programming construction of the system. The system will be generated by PHP and MySQL. The author also introduces basic feature of PHP and MySQL.
Unintentional Insider Threats: Social Engineering
2014-01-01
or business partner (2) who has or had authorized access to an organization’s network, system, or data and who, (3) through action or inaction...features. The accumulation and analysis of incident statistics will also ultimately help stakeholders prioritize different types of UIT threats and...is (1) a current or former employee, contractor, or business partner (2) who has or had authorized access to an organization’s network, system, or
Christopher, Mary M.; Young, Karen M.
2015-01-01
Authors face many choices when selecting a journal for publication. Prospective authors, especially trainees, may be unaware of “predatory” online journals or how to differentiate them from legitimate journals. In this study, we assessed awareness of open-access and predatory journals among prospective authors attending scientific writing workshops; our long-term goal was to inform educational goals for the workshops. We surveyed participants of writing workshops at veterinary and medical schools and an international conference over a 1-year period. The survey included 14 statements for respondents to indicate agreement level on a Likert-like scale and four questions on awareness of resources about predatory journals; respondents also defined “predatory journal.” A total of 145 participants completed the survey: 106 (73.1%) from veterinary schools and 86 (59.3%) graduate students or residents. Fewer faculty (vs trainees) agreed that open access was an important factor in deciding where to publish; faculty and postdoctoral researchers were more likely to expect to pay more to publish in an open-access journal. Most respondents (120/145, 82.7%) agreed/strongly agreed that the decision to accept a manuscript should not be influenced by publication charges, but 50% (56/112) indicated that they “didn’t know” how publishing costs were supported. Of the 142 respondents who answered, 33 (23.0%) indicated awareness of the term “predatory journal”; 34 (23.9%) were aware of the Directory of Open Access Journals; 24 (16.9%) were aware of the Science “sting” article about predatory journals; and 7 (4.8%) were aware of Beall’s list. Most (93/144, 64.5%) definitions of predatory journals described poor but not predatory journal practices, and some respondents misunderstood the term completely. Mentors should help novice authors to be aware of predatory journals and to distinguish between legitimate and illegitimate open-access journals, thus selecting the best journal for their work. PMID:26664951
Behmer Hansen, Rosemary Talbot; Arora, Kavita Shah
2018-06-14
Since USA constitutional precedent established in 1976, adolescents have increasingly been afforded the right to access contraception without first obtaining parental consent or authorisation. There is general agreement this ethically permissible. However, long-acting reversible contraception (LARC) methods have only recently been prescribed to the adolescent population. They are currently the most effective forms of contraception available and have high compliance and satisfaction rates. Yet unlike other contraceptives, LARCs are associated with special procedural risks because they must be inserted and removed by trained healthcare providers. It is unclear whether the unique invasive nature of LARC changes the traditional ethical calculus of permitting adolescent decision-making in the realm of contraception. To answer this question, we review the risk-benefit profile of adolescent LARC use. Traditional justifications for permitting adolescent contraception decision-making authority are then considered in the context of LARCs. Finally, analogous reasoning is used to evaluate potential differences between permitting adolescents to consent for LARC procedures versus for emergency and pregnancy termination procedures. Ultimately, we argue that the invasive nature of LARCs does not override adolescents' unique and compelling need for safe and effective forms of contraception. In fact, LARCs may oftentimes be in the best interest of adolescent patients who wish to prevent unintended pregnancy. We advocate for the specific enumeration of adolescents' ability to consent to both LARC insertion and removal procedures within state policies. Given the provider-dependent nature of LARCs and the stigma regarding adolescent sexuality, special political and procedural safeguards to protect adolescent autonomy are warranted. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Accessibility Considerations for Hybrid Courses
ERIC Educational Resources Information Center
Behling, Kirsten
2017-01-01
This chapter explores the central questions and issues that faculty and administrators need to consider when designing and implementing hybrid courses to ensure that all students, including those with disabilities, have equal access. The author offers resources on faculty development programs, accessibility checklists, and online resources on…
78 FR 22527 - TRICARE Access to Care Demonstration Project
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-16
... DEPARTMENT OF DEFENSE Office of the Secretary TRICARE Access to Care Demonstration Project AGENCY... Access to Care Demonstration for TRICARE Prime/TRICARE Prime Remote Beneficiaries. SUMMARY: This notice... to utilize four visits per fiscal year to TRICARE authorized Urgent Care Centers without obtaining an...
40 CFR 1400.6 - Enhanced local access.
Code of Federal Regulations, 2011 CFR
2011-07-01
...); DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.6 Enhanced local access. (a) OCA data elements. Consistent with 42 U.S.C...) OCA information. (1) LEPCs and related local government agencies are authorized and encouraged to...
40 CFR 1400.6 - Enhanced local access.
Code of Federal Regulations, 2012 CFR
2012-07-01
...); DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.6 Enhanced local access. (a) OCA data elements. Consistent with 42 U.S.C...) OCA information. (1) LEPCs and related local government agencies are authorized and encouraged to...
40 CFR 1400.6 - Enhanced local access.
Code of Federal Regulations, 2013 CFR
2013-07-01
...); DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.6 Enhanced local access. (a) OCA data elements. Consistent with 42 U.S.C...) OCA information. (1) LEPCs and related local government agencies are authorized and encouraged to...
40 CFR 1400.6 - Enhanced local access.
Code of Federal Regulations, 2014 CFR
2014-07-01
...); DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.6 Enhanced local access. (a) OCA data elements. Consistent with 42 U.S.C...) OCA information. (1) LEPCs and related local government agencies are authorized and encouraged to...
Code of Federal Regulations, 2010 CFR
2010-04-01
... determining the eligibility of proposed improvements for financing with defense access roads funds. The... financing either in whole or in part with defense access road funds, MTMC will certify the project as important to the national defense and will authorize expenditure of defense access road funds. The Commander...
Fried, Jana; Harris, Bronwyn; Eyles, John; Moshabela, Mosa
2015-05-01
Achieving equitable access to health care is an important policy goal, with access influenced by affordability, availability, and acceptability of specific services. We explore patient narratives from a 5-year program of research on health care access to examine relationships between social constructions of illness and the acceptability of health services in the context of tuberculosis treatment and antiretroviral therapy in South Africa. Acceptability of services seems particularly important to the meanings patients attach to illness and care, whereas-conversely-these constructions appear to influence what constitutes acceptability and hence affect access to care. We highlight the underestimated role of individually, socially, and politically constructed healthworlds; traditional and biomedical beliefs; and social support networks. Suggested policy implications for improving acceptability and hence overall health care access include abandoning patronizing approaches to care and refocusing from treating "disease" to responding to "illness" by acknowledging and incorporating patients' healthworlds in patient-provider interactions. © The Author(s) 2015.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-08
... SECRET or CONFIDENTIAL to the Administrator of the Federal Aviation Administration, and to the Assistant... authority to originally classify information as SECRET or CONFIDENTIAL, with further authorization to...
Drug knowledge expressed as computable semantic triples.
Elkin, Peter L; Carter, John S; Nabar, Manasi; Tuttle, Mark; Lincoln, Michael; Brown, Steven H
2011-01-01
The majority of questions that arise in the practice of medicine relate to drug information. Additionally, adverse reactions account for as many as 98,000 deaths per year in the United States. Adverse drug reactions account for a significant portion of those errors. Many authors believe that clinical decision support associated with computerized physician order entry has the potential to decrease this adverse drug event rate. This decision support requires knowledge to drive the process. One important and rich source of drug knowledge is the DailyMed product labels. In this project we used computationally extracted SNOMED CT™ codified data associated with each section of each product label as input to a rules engine that created computable assertional knowledge in the form of semantic triples. These are expressed in the form of "Drug" HasIndication "SNOMED CT™". The information density of drug labels is deep, broad and quite substantial. By providing a computable form of this information content from drug labels we make these important axioms (facts) more accessible to computer programs designed to support improved care.
Negotiating Access to Health Information to Promote Students' Health.
Radis, Molly E; Updegrove, Stephen C; Somsel, Anne; Crowley, Angela A
2016-04-01
Access to student health information, such as immunizations, screenings, and care plans for chronic conditions, is essential for school nurses to fulfill their role in promoting students' health. School nurses typically encounter barriers to accessing health records and spend many hours attempting to retrieve health information. As a result, nurses' time is poorly utilized and students may suffer adverse outcomes including delayed school entry. In response to this pressing public health issue, a school medical advisor and director of school nurses in a local health department successfully negotiated access for school nurses to three health record systems: a state immunization tracking system, an electronic lead surveillance program, and an electronic health record system. This negotiation process is presented within a framework of the Theory of Diffusion of Innovation and provides a strategy for other school nurses seeking access to student health information. © The Author(s) 2015.
High School Students' Self-Reported Use of School Clinics and Nurses.
Harper, Christopher R; Liddon, Nicole; Dunville, Richard; Habel, Melissa A
2016-10-01
Access to school health clinics and nurses has been linked with improved student achievement and health. Unfortunately, no studies have examined how many students report using school clinics or nurses and for which services. This study addressed this gap with data from a nationally representative sample of 15- to 25-year-olds. Respondents who reported being in high school were provided a list of services and asked whether they had gone to a school nurse or clinic for any of the listed services. Nearly 90% reported having access to a school clinic or nurse. Among students with access, 65.6% reported using at least one service. Non-White students and younger students were more likely to report having access to a clinic or nurse. These results show many students have access to clinics or nurses and are using these services, although not uniformly for all services. © The Author(s) 2016.
Open access to scientific articles: a review of benefits and challenges.
Björk, Bo-Christer
2017-03-01
The Internet has fundamentally changed the publishing of scholarly peer reviewed journals, and the way readers find and access articles. Digital access is nowadays the norm, in particular for researchers. The Internet has enabled a totally new business model, Open Access (OA), in which an article is openly available in full text for anyone with Internet access. This article reviews the different options to achieve this, whether by journals changing their revenue structures from subscription to publishing charges, or authors utilizing a number of options for posting OA versions of article manuscripts in repositories. It also discusses the regrettable emergence of "predatory" publishers, who spam academics, and make money by promising them rapid publication with only the semblance of peer review. The situation is further discussed from the viewpoints of different stakeholders, including academics as authors and readers, practicing physicians and the general public.
Knoepke, Christopher E; Matlock, Daniel D
2017-11-01
Social work interventions in health care, particularly those that involve working with people being treated for chronic and life-threatening conditions, frequently involve efforts to educate patients about their disease, treatment options, safety planning, medical adherence, and other associated issues. Despite an intuitive notion that patients access information about all of these issues through a variety of media-both inside and outside the clinical encounter, created by professionals and by others-there currently exists no validated means of assessing patients' use of these forms of information. To address this gap, authors first created candidate item measures with input from both physicians and a small group of diverse patients who currently have an implantable cardioverter defibrillator (ICD), a sophisticated cardiac device for which a trajectory model of social work intervention was recently outlined. Authors then surveyed a group of 205 individuals who have these devices, assessing their use of various media to learn about ICDs. They then conducted factor and item analysis to refine and remove poorly performing items while delineating forms of media use by type. The resultant preliminary measure of informational media use can be further refined and adapted for use with any clinical population. © 2017 National Association of Social Workers.
Wang, Dongmei; Mu, Juan; Chen, Yan; ...
2017-03-01
The stress-induced phase transformation and micromechanical behavior of CuZr-based alloy were investigated by in-situ neutron diffraction. The pseudoelastic behavior with a pronounced strain-hardening effect is observed. The retained martensite nuclei and the residual stress obtained from the 1st cycle reduce the stress threshold for the martensitic transformation. A critical stress level is required for the reverse martensitic transformation from martensite to B2 phase. An increase of intensity for the B2 (110) plane in the 1st cycle is caused by the twinning along the {112}<111> twinning system. The convoluted stress partitioning influenced by the elastic and transformation anisotropy along with themore » newly formed martensite determines the microstress partitioning of the studied CuZr-based alloy. The reversible martensitic transformation is responsible for the pseudoelasticity. The macro mechanical behavior of the pure B2 phase can be divided into 3 stages, which are mediated by the evolvement of the martensitic transformation. This manuscript has been authored by UT-Battelle, LLC under Contract No. DE-AC05-00OR22725 with the U.S. Department of Energy. The United States Government retains and the publisher, by accepting the article for publication, acknowledges that the United States Government retains a non-exclusive, paid-up, irrevocable, world-wide license to publish or reproduce the published form of this manuscript, or allow others to do so, for United States Government purposes. The Department of Energy will provide public access to these results of federally sponsored research in accordance with the DOE Public Access Plan (http://energy.gov/downloads/doe-public-access-plan).« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wang, Dongmei; Mu, Juan; Chen, Yan
The stress-induced phase transformation and micromechanical behavior of CuZr-based alloy were investigated by in-situ neutron diffraction. The pseudoelastic behavior with a pronounced strain-hardening effect is observed. The retained martensite nuclei and the residual stress obtained from the 1st cycle reduce the stress threshold for the martensitic transformation. A critical stress level is required for the reverse martensitic transformation from martensite to B2 phase. An increase of intensity for the B2 (110) plane in the 1st cycle is caused by the twinning along the {112}<111> twinning system. The convoluted stress partitioning influenced by the elastic and transformation anisotropy along with themore » newly formed martensite determines the microstress partitioning of the studied CuZr-based alloy. The reversible martensitic transformation is responsible for the pseudoelasticity. The macro mechanical behavior of the pure B2 phase can be divided into 3 stages, which are mediated by the evolvement of the martensitic transformation. This manuscript has been authored by UT-Battelle, LLC under Contract No. DE-AC05-00OR22725 with the U.S. Department of Energy. The United States Government retains and the publisher, by accepting the article for publication, acknowledges that the United States Government retains a non-exclusive, paid-up, irrevocable, world-wide license to publish or reproduce the published form of this manuscript, or allow others to do so, for United States Government purposes. The Department of Energy will provide public access to these results of federally sponsored research in accordance with the DOE Public Access Plan (http://energy.gov/downloads/doe-public-access-plan).« less
Degrassat-Théas, Albane; Paubel, Pascal; Parent de Curzon, Olivier; Le Pen, Claude; Sinègre, Martine
2013-04-01
To reach the French market, a new drug requires a marketing authorization (MA) and price and reimbursement agreements. These hurdles could delay access to new and promising drugs. Since 1992, French law authorizes the use of unlicensed drugs on an exceptional and temporary basis through a compassionate-use programme, known as Temporary Authorization for Use (ATU). This programme was implemented to improve early access to drugs under development or authorized abroad. However, it is suspected to be inflationary, bypassing public bodies in charge of health technology assessment (HTA) and of pricing. The aim of this study is to observe the market access after the formal licensing of drugs that went through this compassionate-use programme. We included all ATUs that received an MA between 1 January 2005 and 30 June 2010. We first examined market access delays from these drugs using the standard administrative path. We positioned this result in relation to launch delays observed in France (for all outpatient drugs) and in other major European markets. Second, we assessed the bargaining power of a hospital purchaser after those drugs had obtained an MA by calculating the price growth rate after the approval. During the study period, 77 ATUs were formally licensed. The study concluded that, from the patient's perspective, licensing and public bodies' review time was shortened by a combined total of 36 months. The projected 11-month review time of public bodies may be longer than delays usually observed for outpatient drugs. Nonetheless, the study revealed significant benefits for French patient access based on comparable processing to launch time with those of other European countries with tight price control policies. In return, a 12 % premium, on average, is paid to pharmaceutical companies while drugs are under this status (sub-analysis on 56 drugs). In many instances, the ATU programme responds to a public health need by accelerating the availability of new drugs even though this study suggests an impact of the programme on the market access of these drugs for which the standard administrative path is longer than usual. In addition, pharmaceutical companies seem to market compassionate-use drugs with a presumed benefit/risk ratio at a price that guarantees a margin for future negotiation.
78 FR 8223 - Proposed Collection; Comment Request for Form 8879-C and Form 8879-I
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-05
... Form 8879-C, IRS e-file Signature Authorization for Form 1120, and Form 8879-I, IRS e-file Signature...: IRS e-file Signature Authorization for Form 1120; IRS e-file Signature Authorization for Form 1120-F. OMB Number: 1545-1864. Form Number: 8879-C; 8879-I. Abstract: The Form 8879-C, IRS e-file Signature...
78 FR 68903 - Proposed Collection; Comment Request for Form 8879-EX
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-15
... Form 8879-EX, IRS e-file Signature Authorization for Forms 720, 2290, and 8849. DATES: Written comments...: IRS e-file Signature Authorization for Forms 720, 2290, and 8849. OMB Number: 1545-2081. Form Number: 8879-EX. Abstract: The Form 8879-EX, IRS e-file Signature Authorization for Forms 720, 2990, and 8849...
ERIC Educational Resources Information Center
McKirnan, David J.; Du Bois, Steve N.; Alvy, Lisa M.; Jones, Kyle
2013-01-01
Men who have sex with men (MSM) appear to experience barriers to health care compared with general population men. This report examines individual differences in health care access within a diverse sample of urban MSM ("N" = 871). The authors examined demographic differences in health care access and the relation between access and…
The AAS Working Group on Accessibility and Disability (WGAD) Year 1 Highlights and Database Access
NASA Astrophysics Data System (ADS)
Knierman, Karen A.; Diaz Merced, Wanda; Aarnio, Alicia; Garcia, Beatriz; Monkiewicz, Jacqueline A.; Murphy, Nicholas Arnold
2017-06-01
The AAS Working Group on Accessibility and Disability (WGAD) was formed in January of 2016 with the express purpose of seeking equity of opportunity and building inclusive practices for disabled astronomers at all educational and career stages. In this presentation, we will provide a summary of current activities, focusing on developing best practices for accessibility with respect to astronomical databases, publications, and meetings. Due to the reliance of space sciences on databases, it is important to have user centered design systems for data retrieval. The cognitive overload that may be experienced by users of current databases may be mitigated by use of multi-modal interfaces such as xSonify. Such interfaces would be in parallel or outside the original database and would not require additional software efforts from the original database. WGAD is partnering with the IAU Commission C1 WG Astronomy for Equity and Inclusion to develop such accessibility tools for databases and methods for user testing. To collect data on astronomical conference and meeting accessibility considerations, WGAD solicited feedback from January AAS attendees via a web form. These data, together with upcoming input from the community and analysis of accessibility documents of similar conferences, will be used to create a meeting accessibility document. Additionally, we will update the progress of journal access guidelines and our social media presence via Twitter. We recommend that astronomical journals form committees to evaluate the accessibility of their publications by performing user-centered usability studies.
Enhancing access to health information in Africa: a librarian's perspective.
Gathoni, Nasra
2012-01-01
In recent years, tremendous progress has been made toward providing health information in Africa, in part because of technological advancements. Nevertheless, ensuring that information is accessible, comprehensible, and usable remains problematic, and there remain needs in many settings to address issues such as computer skills, literacy, and the infrastructure to access information. To determine how librarians might play a more strategic role in meeting information needs of health professionals in Africa, the author reviewed key components of information systems pertinent to knowledge management for the health sector, including access to global online resources, capacity to use computer technology for information retrieval, information literacy, and the potential for professional networks to play a role in improving access to and use of information. The author concluded that, in regions that lack adequate information systems, librarians could apply their knowledge and skills to facilitate access and use by information seekers. Ensuring access to and use of health information can also be achieved by engaging organizations and associations working to enhance access to health information, such as the Association for Health Information and Libraries in Africa. These groups can provide assistance through training, dissemination, information repackaging, and other approaches known to improve information literacy.
Cohort Profile: Footprints in Time, the Australian Longitudinal Study of Indigenous Children.
Thurber, Katherine A; Banks, Emily; Banwell, Cathy
2015-06-01
Indigenous Australians experience profound levels of disadvantage in health, living standards, life expectancy, education and employment, particularly in comparison with non-Indigenous Australians. Very little information is available about the healthy development of Australian Indigenous children; the Longitudinal Study of Indigenous Children (LSIC) is designed to fill this knowledge gap.This dataset provides an opportunity to follow the development of up to 1759 Indigenous children. LSIC conducts annual face-to-face interviews with children (aged 0.5-2 and 3.5-5 years at baseline in 2008) and their caregivers. This represents between 5% and 10% of the total population of Indigenous children in these age groups, including families of varied socioeconomic and cultural backgrounds. Study topics include: the physical, social and emotional well-being of children and their caregivers; language; culture; parenting; and early childhood education.LSIC is a shared resource, formed in partnership with communities; its data are readily accessible through the Australian Government Department of Social Services (see http://dss.gov.au/lsic for data and access arrangements). As one of very few longitudinal studies of Indigenous children, and the only national one, LSIC will enable an understanding of Indigenous children from a wide range of environments and cultures. Findings from LSIC form part of a growing infrastructure from which to understand Indigenous child health. © The Author 2014. Published by Oxford University Press on behalf of the International Epidemiological Association.
Pilot evaluation of a web-based intervention targeting sexual health service access.
Brown, K E; Newby, K; Caley, M; Danahay, A; Kehal, I
2016-04-01
Sexual health service access is fundamental to good sexual health, yet interventions designed to address this have rarely been implemented or evaluated. In this article, pilot evaluation findings for a targeted public health behavior change intervention, delivered via a website and web-app, aiming to increase uptake of sexual health services among 13-19-year olds are reported. A pre-post questionnaire-based design was used. Matched baseline and follow-up data were identified from 148 respondents aged 13-18 years. Outcome measures were self-reported service access, self-reported intention to access services and beliefs about services and service access identified through needs analysis. Objective service access data provided by local sexual health services were also analyzed. Analysis suggests the intervention had a significant positive effect on psychological barriers to and antecedents of service access among females. Males, who reported greater confidence in service access compared with females, significantly increased service access by time 2 follow-up. Available objective service access data support the assertion that the intervention may have led to increases in service access. There is real promise for this novel digital intervention. Further evaluation is planned as the model is licensed to and rolled out by other local authorities in the United Kingdom. © The Author 2016. Published by Oxford University Press. All rights reserved. For permissions, please email: journals.permissions@oup.com.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 2 2010-07-01 2010-07-01 false Form Letter-Conditions Governing Access to Official Records for Historical Research Purposes E Appendix E to Part 197 National Defense Department of... THE FILES OF THE OFFICE OF THE SECRETARY OF DEFENSE (OSD) Pt. 197, App. E Appendix E to Part 197—Form...
29 CFR 96.41 - Access to records.
Code of Federal Regulations, 2011 CFR
2011-07-01
... any of their duly authorized representatives (including certified public accountants under contract), shall have access to any books, documents, papers, and records (manual and automated) of the entity...
29 CFR 96.41 - Access to records.
Code of Federal Regulations, 2012 CFR
2012-07-01
... any of their duly authorized representatives (including certified public accountants under contract), shall have access to any books, documents, papers, and records (manual and automated) of the entity...
29 CFR 96.41 - Access to records.
Code of Federal Regulations, 2010 CFR
2010-07-01
... any of their duly authorized representatives (including certified public accountants under contract), shall have access to any books, documents, papers, and records (manual and automated) of the entity...
29 CFR 96.41 - Access to records.
Code of Federal Regulations, 2013 CFR
2013-07-01
... any of their duly authorized representatives (including certified public accountants under contract), shall have access to any books, documents, papers, and records (manual and automated) of the entity...
29 CFR 96.41 - Access to records.
Code of Federal Regulations, 2014 CFR
2014-07-01
... any of their duly authorized representatives (including certified public accountants under contract), shall have access to any books, documents, papers, and records (manual and automated) of the entity...
New Searching Capability and OpenURL Linking in the ADS
NASA Astrophysics Data System (ADS)
Eichhorn, Guenther; Accomazzi, A.; Grant, C. S.; Henneken, E.; Kurtz, M. J.; Thompson, D. M.; Murray, S. S.
2006-12-01
The ADS is the search system of choice for the astronomical community. It also covers a large part of the physics and physics/astronomy education literature. In order to make access to this system as easy as possible, we developed a Google-like interface version of our search form. This one-field search parses the user input and automatically detects author names and year ranges. Firefox users can set up their browser to have this search field installed in the top right corner search field to have even easier access to the ADS search capability. The basic search is available from the ADS Homepage at: http://adsabs.harvard.edu To aid with access to subscription journals the ADS now supports OpenURL linking. If your library supports an OpenURL server, you can specify this server in the ADS preference settings. All links to journal articles will then automatically be directed to the OpenURL with the appropriate link information. We provide a selection of known OpenURL servers to choose from. If your server is not in this list, please send the necessary information to ads@cfa.harvard.edu and we will include it in our list. The ADS is funded by NASA grant NNG06GG68G.
Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Lee, Sungyoung; Chung, Tae Choong
2016-01-01
Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to pre-defined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider.
Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Lee, Sungyoung; Chung, Tae Choong
2016-01-01
Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to pre-defined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider. PMID:27571421
Coelho, Ivan Batista
2010-01-01
This paper aims to evaluate the nineteen years of the National Health System in Brazil, under the prism of equity. It takes into account the current political context in Brazil in the 80s, that the democratization of the country and the health sector could, per se, lead to a more equitable situation regarding the access to health services. Democracy and equity concepts are here discussed; analyzing which situations may facilitate or make it difficult its association in a theoretical plan, applying them to the Brazilian context in a more general form and, to emphasizing practical implications to the National Health System and to groups of activism related to health reforms. It also seeks to show the limits and possibilities of these groups with regards to the reduction of inequality, in relation to the access to health services, which still remain. To conclude, the author points out the need for other movements to be established which seek the reduction of such and other inequalities, such as access to education, housing, etc, drawing special attention to the role played by the State, which is questioned regarding its incapacity of promoting equity, once it presents itself as being powerful when approaching other matters.
Radial access for cerebrovascular procedures: Case report and technical note.
Satti, Sudhakar R; Vance, Ansar Z; Sivapatham, Thinesh
2016-04-01
Advantages of radial access over brachial/axillary or femoral access have been well described for several decades and include decreased cost, patient preference, and decreased major access site complications. Despite these advantages, radial access is rarely employed or even considered for neurointerventional procedures. This attitude should be reconsidered given several recent large, randomized, controlled trials from the cardiovascular literature proving that radial access is associated with statistically lower costs, decreased incidence of myocardial infarctions, strokes, and even decreased mortality. Radial access is now considered the standard of care for percutaneous coronary interventions in most US centers. Although radial access has been described for neurovascular procedures in the past, overall experience is limited. The two major challenges are the unique anatomy required to access the cerebral vasculature given very acute angles between the arm and craniocervical vessels and limitations in available technology. We present a simplified approach to radial access for cerebrovascular procedures and provide a concise step-by-step approach for patient selection, ultrasound-guided single-wall access, recommended catheters/wires, and review of patent hemostasis. Additionally, we present a complex cerebrovascular intervention in which standard femoral access was unsuccessful, while radial access was quickly achieved to highlight the importance of familiarity with the radial approach for all neurointerventionalists. We have found that the learning curve is not too steep and that the radial access approach can be adopted smoothly for a large percentage of diagnostic and interventional neuroradiologic procedures. Radial access should be considered in all patients undergoing a cerebrovascular procedure. © The Author(s) 2015.
Exploring the dynamics of research collaborations by mapping social networks in invasion science.
Abrahams, B; Sitas, N; Esler, K J
2018-06-19
Moving towards more integrative approaches within the invasion sciences has been recognized as a means of improving linkages between science, policy, and practice. Yet despite the recognition that biological invasions pose complex social-ecological challenges, the invasion literature poorly covers social-ecological or distinctly integrative research. Various initiatives and investments have been made towards building research capacity and conducting more integrative research aimed at improving the management of biological invasions. Using a combination of social network and thematic analysis approaches, and the South African Working for Water (WfW) program as a case study for the management of invasive species, we identify and explore the roles of core authors in shaping collaboration networks and research outputs, based on bibliographic records. We found that research produced under the auspices of WfW is authored by a handful of core authors, conducting primarily ecologically-focused research, with social research significantly underrepresented. Core authors identified in this study play an essential role in mediating relationships between researchers, in addition to potentially controlling access to those seeking to form collaborations, maintaining network cohesion and connectivity across institutional and disciplinary boundaries. Research projects should be designed to span disciplines and institutions if they are to adequately address complex challenges. Copyright © 2018 Elsevier Ltd. All rights reserved.
Use of the conditional marketing authorization pathway for oncology medicines in Europe.
Hoekman, J; Boon, W P C; Bouvy, J C; Ebbers, H C; de Jong, J P; De Bruin, M L
2015-11-01
Conditional marketing authorization (CMA) in the European Union (EU) is an early access pathway for medicines that show promising therapeutic effects, but for which comprehensive data are not available. Using a mixed quantitative-qualitative research design, we evaluated how CMA has been used in marketing authorization of oncology medicines in the period 2006 to 2013. We show that compared to full marketing authorization, CMA is granted based on less comprehensive data. However, this is accompanied by significantly longer assessment times and less consensus among regulators about marketing authorization. Moreover, development time from first-in-human testing to marketing authorization did not differ between full marketing authorization and CMA, but was significantly longer for CMA compared to accelerated approved products in the United States (US). Results indicate that CMA is not used by companies as a prospectively planned pathway to obtain early access, but as a "rescue option" when submitted data are not strong enough to justify full marketing authorization. © 2015, The American Society for Clinical Pharmacology and Therapeutics.
The impact of free access to the scientific literature: a review of recent research.
Davis, Philip M; Walters, William H
2011-07-01
The paper reviews recent studies that evaluate the impact of free access (open access) on the behavior of scientists as authors, readers, and citers in developed and developing nations. It also examines the extent to which the biomedical literature is used by the general public. The paper is a critical review of the literature, with systematic description of key studies. Researchers report that their access to the scientific literature is generally good and improving. For authors, the access status of a journal is not an important consideration when deciding where to publish. There is clear evidence that free access increases the number of article downloads, although its impact on article citations is not clear. Recent studies indicate that large citation advantages are simply artifacts of the failure to adequately control for confounding variables. The effect of free access on the general public's use of the primary medical literature has not been thoroughly evaluated. Recent studies provide little evidence to support the idea that there is a crisis in access to the scholarly literature. Further research is needed to investigate whether free access is making a difference in non-research contexts and to better understand the dissemination of scientific literature through peer-to-peer networks and other informal mechanisms.
The impact of free access to the scientific literature: a review of recent research
Walters, William H
2011-01-01
Objectives: The paper reviews recent studies that evaluate the impact of free access (open access) on the behavior of scientists as authors, readers, and citers in developed and developing nations. It also examines the extent to which the biomedical literature is used by the general public. Method: The paper is a critical review of the literature, with systematic description of key studies. Results: Researchers report that their access to the scientific literature is generally good and improving. For authors, the access status of a journal is not an important consideration when deciding where to publish. There is clear evidence that free access increases the number of article downloads, although its impact on article citations is not clear. Recent studies indicate that large citation advantages are simply artifacts of the failure to adequately control for confounding variables. The effect of free access on the general public's use of the primary medical literature has not been thoroughly evaluated. Conclusions: Recent studies provide little evidence to support the idea that there is a crisis in access to the scholarly literature. Further research is needed to investigate whether free access is making a difference in non-research contexts and to better understand the dissemination of scientific literature through peer-to-peer networks and other informal mechanisms. PMID:21753913
OAS :: Secretariat for Strengthening Democracy (SSD)
Structure Our Locations Contact Us Access to Information Offices in the Member States Our History Logo Authorities Services Legal Protocol Topics A Access to Information Access to Rights Actions against Corruption Management Public Security R Racism and Intolerance Refugees S Scholarships School of Governance Science and
77 FR 5295 - Over-the-Road Bus Accessibility Program Announcement of Project Selections
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-02
... DEPARTMENT OF TRANSPORTATION Federal Transit Administration Over-the-Road Bus Accessibility...-Road Bus (OTRB) Accessibility Program, authorized by Section 3038 of the Transportation Equity Act for... of over-the-road buses to help finance the incremental capital and training costs of complying with...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
... 1974; Department of Homeland Security/ALL-004 General Information Technology Access Account Records..., Department of Homeland Security/ALL-004 General Information Technology Access Account Records System of... access account records. This system consists of information collected in order to provide authorized...
28 CFR 115.353 - Resident access to outside support services and legal representation.
Code of Federal Regulations, 2013 CFR
2013-07-01
... provide residents with access to outside victim advocates for emotional support services related to sexual abuse, by providing, posting, or otherwise making accessible mailing addresses and telephone numbers... reports of abuse will be forwarded to authorities in accordance with mandatory reporting laws. (c) The...
28 CFR 115.353 - Resident access to outside support services and legal representation.
Code of Federal Regulations, 2012 CFR
2012-07-01
... provide residents with access to outside victim advocates for emotional support services related to sexual abuse, by providing, posting, or otherwise making accessible mailing addresses and telephone numbers... reports of abuse will be forwarded to authorities in accordance with mandatory reporting laws. (c) The...
28 CFR 115.353 - Resident access to outside support services and legal representation.
Code of Federal Regulations, 2014 CFR
2014-07-01
... provide residents with access to outside victim advocates for emotional support services related to sexual abuse, by providing, posting, or otherwise making accessible mailing addresses and telephone numbers... reports of abuse will be forwarded to authorities in accordance with mandatory reporting laws. (c) The...
75 FR 2583 - Over-the-Road Bus Accessibility Program Grants
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-15
... Transportation Equity Act for the 21st Century (TEA-21). The OTRB Accessibility Program makes funds available to... (TEA-21), Public Law 105-85 as amended by the Safe, Accountable, Flexible, Efficient, Transportation.... transportation system. TEA-21 authorized FTA's OTRB Accessibility Program to assist OTRB operators in complying...
ERIC Educational Resources Information Center
Solarsh, Barbara; Johnson, Hilary
2017-01-01
People with communication support needs experience barriers that limit their social inclusion in society. A community approach such as "communication access" that targets changing attitudes, skills, and resources may assist in facilitating community participation. The authors describe the development of communication access from 2008 in…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-06
...-HQ-2012-0002] RIN 1992-AA40 Protective Force Personnel Medical, Physical Readiness, Training, and... the proposed rule to amend the standards for medical, physical performance, training, and access... proposed rule to revise the standards for medical, physical performance, training, and access...
Internet Access in the European Union and in the United States.
ERIC Educational Resources Information Center
Bauer, Johannes M.; Berne, Michel; Maitland, Carleen F.
2002-01-01
Examines the effects of public policies towards traditional communications infrastructures on Internet access in Europe and the United States. Discusses competitive strategies and describes the influence of regulatory policies affecting market entry and the pricing of services on Internet access, based on empirical findings. (Author/LRW)
Identity and Access Management: Technological Implementation of Policy
ERIC Educational Resources Information Center
von Munkwitz-Smith, Jeff; West, Ann
2004-01-01
Navigating the multiple processes for accessing ever-multiplying campus information systems can be a daunting task for students, faculty, and staff. This article provides a brief overview of Identity and Access Management Services. The authors review key characteristics and components of this new information architecture and address the issue of…
Accessing Digital Libraries: A Study of ARL Members' Digital Projects
ERIC Educational Resources Information Center
Kahl, Chad M.; Williams, Sarah C.
2006-01-01
To ensure efficient access to and integrated searching capabilities for their institution's new digital library projects, the authors studied Web sites of the Association of Research Libraries' (ARL) 111 academic, English-language libraries. Data were gathered on 1117 digital projects, noting library Web site and project access, metadata, and…
Authority Is Relational: Rethinking Educational Empowerment
ERIC Educational Resources Information Center
Bingham, Charles
2008-01-01
Written in an accessible and personal style, this innovative study of authority in education examines scenarios of authority in ways that problematize, augment, and redefine prevalent ideas of how it works. Usually seen as a thing that people have, the author suggests that authority should be understood instead as a relation that happens between…
Dunn, Jennifer Templeton; Lesyna, Katherine; Zaret, Anna
2017-11-08
Improving maternal health, reducing global maternal mortality, and working toward universal access to reproductive health care are global priorities for United Nations agencies, national governments, and civil society organizations. Human rights lawyers have joined this global movement, using international law and domestic constitutions to hold nations accountable for preventable maternal death and for failing to provide access to reproductive health care services. This article discusses three decisions in which international treaty bodies find the nations of Brazil and Peru responsible for violations of the Convention on the Elimination of All Forms of Discrimination Against Women and the International Covenant on Civil and Political Rights and also two domestic decisions alleging constitutional violations in India and Uganda. The authors analyze the impact of these decisions on access to maternal and other reproductive health services in Brazil, Peru, India, and Uganda and conclude that litigation is most effective when aligned with ongoing efforts by the public health community and civil society organizations. In filing these complaints and cases on behalf of individual women and their families, legal advocates highlight health system failures and challenge the historical structures and hierarchies that discriminate against and devalue women. These international and domestic decisions empower women and their communities and inspire nations and other stakeholders to commit to broader social, economic, and political change. Human rights litigation brings attention to existing public health campaigns and supports the development of local and global movements and coalitions to improve women's health.
Medical records and privacy: empirical effects of legislation.
McCarthy, D B; Shatin, D; Drinkard, C R; Kleinman, J H; Gardner, J S
1999-04-01
To determine the effects of state legislation requiring patient informed consent prior to medical record abstraction by external researchers for a specific study. Informed consent responses obtained from November 1997 through April 1998 from members of a Minnesota-based IPA model health plan. Descriptive case study of consent to gain access to medical records for a pharmaco-epidemiologic study of seizures associated with use of a pain medication that was conducted as part of the FDA's post-marketing safety surveillance program to evaluate adverse events associated with approved drugs. The informed consent process approved by an institutional review board consisted of three phases: (1) a letter from the health plan's medical director requesting participation, (2) a second mailing to nonrespondents, and (3) a follow-up telephone call to nonrespondents. Of 140 Minnesota health plan members asked to participate in the medical records study, 52 percent (73) responded and 19 percent (26) returned a signed consent form authorizing access to their records for the study. For 132 study subjects enrolled in five other health plans in states where study-specific consent was not required, health care providers granted access to patient medical records for 93 percent (123) of the members. Legislation requiring patient informed consent to gain access to medical records for a specific research study was associated with low participation and increased time to complete that observational study. Efforts to protect patient privacy may come into conflict with the ability to produce timely and valid research to safeguard and improve public health.
Chressanthis, George A; Khedkar, Pratap; Jain, Nitin; Poddar, Prashant; Seiders, Michael G
2012-07-01
The authors explored to what extent important medical decisions by practitioners can be influenced by pharmaceutical representatives and, in particular, whether restricting such access could delay appropriate changes in clinical practice. Medical practices were divided into four categories based on the degree of sales representative access to clinicians: very low, low, medium, and high from a database compiled by ZS Associates called AccessMonitor (Evanston, IL) used extensively by many pharmaceutical companies. Clinical decisions of 58,647 to 72,114 physicians were statistically analyzed using prescription data from IMS Health (Danbury, CT) in three critical areas: an innovative drug for type 2 diabetes (sitagliptin), an older diabetes drug with a new Food and Drug Administration-required black box warning for cardiovascular safety (rosiglitazone), and a combination lipid therapy that had reported negative outcomes in a clinical trial (simvastatin+ezetimbe). For the uptake of the new diabetes agent, the authors found that physicians with very low access to representatives had the lowest adoption of this new therapy and took 1.4 and 4.6 times longer to adopt than physicians in the low- and medium-access restriction categories, respectively. In responding to the black box warning for rosiglitazone, the authors found that physicians with very low access were 4.0 times slower to reduce their use of this treatment than those with low access. Likewise, there was significantly less response in terms of changing prescribing to the negative news with the lipid therapy for physicians in more access-restricted offices. Overall, cardiologists were the most responsive to information changes relative to primary care physicians. These findings emphasize that limiting access to pharmaceutical representatives can have the unintended effect of reducing appropriate responses to negative information about drugs just as much as responses to positive information about innovative drugs. © 2012 Wiley Periodicals, Inc.
Facebook and Twitter, communication and shelter, and the 2011 Tuscaloosa tornado.
Stokes, Courtney; Senkbeil, Jason C
2017-01-01
This paper represents one of the first attempts to analyse the many ways in which Facebook and Twitter were used during a tornado disaster. Comparisons between five randomly selected campus samples and a city of Tuscaloosa, Alabama, sample revealed that campus samples used Facebook and Twitter significantly more both before and after the tornado, but Facebook usage was not significantly different after the event. Furthermore, differences in social media usage and other forms of communication before the tornado were found for age, education, and years lived in Tuscaloosa. Generally, age and education were inversely proportionate to social media usage. Influences on shelter-seeking actions varied between social media users and three random samples of non-social media users; however, it appears that social media respondents were likely to be using a smartphone simultaneously to access warning polygon information, to receive text message alerts, and to listen or respond to environmental cues. © 2017 The Author(s). Disasters © Overseas Development Institute, 2017.
Lauridsen, S M R; Norup, M S; Rossel, P J H
2007-12-01
Rationing healthcare is a difficult task, which includes preventing patients from accessing potentially beneficial treatments. Proponents of implicit rationing argue that politicians cannot resist pressure from strong patient groups for treatments and conclude that physicians should ration without informing patients or the public. The authors subdivide this specific programme of implicit rationing, or "hidden rationing", into local hidden rationing, unsophisticated global hidden rationing and sophisticated global hidden rationing. They evaluate the appropriateness of these methods of rationing from the perspectives of individual and political autonomy and conclude that local hidden rationing and unsophisticated global hidden rationing clearly violate patients' individual autonomy, that is, their right to participate in medical decision-making. While sophisticated global hidden rationing avoids this charge, the authors point out that it nonetheless violates the political autonomy of patients, that is, their right to engage in public affairs as citizens. A defence of any of the forms of hidden rationing is therefore considered to be incompatible with a defence of autonomy.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Berra, P.B.; Chung, S.M.; Hachem, N.I.
This article presents techniques for managing a very large data/knowledge base to support multiple inference-mechanisms for logic programming. Because evaluation of goals can require accessing data from the extensional database, or EDB, in very general ways, one must often resort to indexing on all fields of the extensional database facts. This presents a formidable management problem in that the index data may be larger than the EDB itself. This problem becomes even more serious in this case of very large data/knowledge bases (hundreds of gigabytes), since considerably more hardware will be required to process and store the index data. Inmore » order to reduce the amount of index data considerably without losing generality, the authors form a surrogate file, which is a hashing transformation of the facts. Superimposed code words (SCW), concatenated code words (CCW), and transformed inverted lists (TIL) are possible structures for the surrogate file. since these transformations are quite regular and compact, the authors consider possible computer architecture for the processing of the surrogate file.« less
Cyclone shelters and their locational suitability: an empirical analysis from coastal Bangladesh.
Mallick, Bishawjit
2014-07-01
Bangladesh is one of the poorest and the most disaster-prone countries in Asia; it is important, therefore, to know how its disaster reduction strategies are organised and planned. Cyclone shelters comprise a widely acceptable form of infrastructural support for disaster management in Bangladesh. This paper attempts to analyse empirically their use during cyclones in a sample study area along the southwest coastal belt of the country. It shows how the location of a cyclone shelter can determine the social power structure in coastal Bangladesh. The results reveal that the establishment of cyclone shelters in the studied communities is determined by neither a right-based nor a demand-based planning approach; rather, their creation is dependent on the socio-political affluence of local-level decision-makers. The paper goes on to demonstrate that socially vulnerable households (defined, for example, by income or housing conditions) are afforded disproportionately less access to cyclone shelters as compared to less socially vulnerable households. © 2014 The Author(s). Disasters © Overseas Development Institute, 2014.
DOE Office of Scientific and Technical Information (OSTI.GOV)
May, C.A.; Breitigam, W.; Bauer, R.S.
The laminates that are used to prepare advanced composite parts generally require curing at high temperature and pressure, and their raw material shelf lives are limited. The epoxy resin systems that the authors describe here offer the potential of extended shelf life while curing at relatively low temperatures with a method the authors call rapid thermoset processing (RTP). A laminate is formed by stacking the prepreg in a pre-determined manner as required by the end product configuration. The prepreg is then bagged by placing it in a sealed envelope of a heat-resistant film, which is subsequently bonded to a metalmore » surface (the tool) with a heat-resistant vacuum bag putty. The bag has an access hole through which vacuum can be applied to the prepreg stack, facilitating removal of air and other volatiles. This assembly is then heated under vacuum and pressure in an autoclave, the resin melts, and any excess air or volatile matter bleeds from the configuration, resulting in the required dense, void-free laminate.« less
Cydzik, Marzena; Rudowska, Magdalena; Stefanowicz, Piotr; Szewczuk, Zbigniew
2011-12-01
Derivatization of peptides as quaternary ammonium salts (QAS) is a promising method for sensitive detection by electrospray ionization tandem mass spectrometry (Cydzik et al. J. Pept. Sci. 2011, 17, 445-453). The peptides derivatized by QAS at their N-termini undergo fragmentation according to the two competing mechanisms - charge remote (ChR) and charge directed (ChD). The absence of mobile proton in the quaternary salt ion results in ChR dissociation of a peptide bond. However, Hofmann elimination of quaternary salt creates an ion with one mobile proton leading to the ChD fragmentation. The experiments on the quaternary ammonium salts with deuterated N-alkyl groups or amide NH bonds revealed that QAS derivatized peptides dissociate according to the mixed ChR-ChD mechanism. The isotopic labeling allows differentiation of fragments formed according to ChR and ChD mechanisms. © The Author(s) 2011. This article is published with open access at Springerlink.com
Hilsenrath, Peter; Eakin, Cynthia; Fischer, Katrina
2015-01-01
Health care reform is directed toward improving access and quality while containing costs. An essential part of this is improvement of pricing models to more accurately reflect the costs of providing care. Transparent prices that reflect costs are necessary to signal information to consumers and producers. This information is central in a consumer-driven marketplace. The rapid increase in high deductible insurance and other forms of cost sharing incentivizes the search for price information. The organizational ability to measure costs across a cycle of care is an integral component of creating value, and will play a greater role as reimbursements transition to episode-based care, value-based purchasing, and accountable care organization models. This article discusses use of activity-based costing (ABC) to better measure the cost of health care. It describes examples of ABC in health care organizations and discusses impediments to adoption in the United States including cultural and institutional barriers. © The Author(s) 2015.
Rotich, Joseph K; Hannan, Terry J; Smith, Faye E; Bii, John; Odero, Wilson W; Vu, Nguyen; Mamlin, Burke W; Mamlin, Joseph J; Einterz, Robert M; Tierney, William M
2003-01-01
The authors implemented an electronic medical record system in a rural Kenyan health center. Visit data are recorded on a paper encounter form, eliminating duplicate documentation in multiple clinic logbooks. Data are entered into an MS-Access database supported by redundant power systems. The system was initiated in February 2001, and 10,000 visit records were entered for 6,190 patients in six months. The authors present a summary of the clinics visited, diagnoses made, drugs prescribed, and tests performed. After system implementation, patient visits were 22% shorter. They spent 58% less time with providers (p < 0.001) and 38% less time waiting (p = 0.06). Clinic personnel spent 50% less time interacting with patients, two thirds less time interacting with each other, and more time in personal activities. This simple electronic medical record system has bridged the "digital divide." Financial and technical sustainability by Kenyans will be key to its future use and development.
The continued movement for open access to peer-reviewed literature.
Liesegang, Thomas J
2013-09-01
To provide a current overview of the movement for open access to the peer review literature. Perspective. Literature review of recent advances in the open access movement with a personal viewpoint of the nuances of the movement. The open access movement is complex, with many different constituents. The idealists for the open access movement are seeking open access to the literature but also to the data that constitute the research within the manuscript. The business model of the traditional subscription journal is being scrutinized in relation to the surge in the number of open access journals. Within this environment authors should beware predatory practices. More government and funding agencies are mandating open access to their funded research. This open access movement will continue to be disruptive until a business model ensures continuity of the scientific record. A flood of open access articles that might enrich, but also might pollute or confuse, the medical literature has altered the filtering mechanism provided by the traditional peer review system. At some point there may be a shake-out, with some literature being lost in cyberspace. The open access movement is maturing and must be embraced in some format. The challenge is to establish a sustainable financial business model that will permit the use of digital technology but yet not endanger the decades-old traditional publication model and peer review system. Authors seem to be slower in adopting open access than the idealists in the movement. Copyright © 2013 Elsevier Inc. All rights reserved.
Email solicitation for scholarly work--a single researcher's perspective.
Bugeja, Justine; Grech, Victor
2015-01-01
Publishing is important for career progression. The traditional journal model results in subscribers bearing publication costs. The eagerness with which researchers seek journals for the publishing of their work, along with the internet, has resulted in the creation of a new model called open access (OA). Author/s or their institution/s pay an actual publication fee. This has in turn resulted in the creation of questionable journals which charge steep publishing fees. Emails soliciting publication to one of the authors (VG) were collected for the month of March 2015. Information collected included costs of OA publishing, and whether or not this information was readily available. The appropriateness of said solicitations was also assessed with regard to topics with which the targeted author was familiar. There was a total of 44 solicitations: 3 were duplicates. Out of 41 solicitations, 20 (49%) were appropriate. The open access fee was readily available in 27 out of 41 solicitations (66%). The open access fee averaged $475, ranging from $25 to $1500. The only journal which provided true OA was Medical Principles and Practice, with no fees charged whatsoever. Potential authors should carefully investigate OA journals prior to choosing journals wherein to submit their work.
EEL hits provision of NRC's proposed security rules
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1985-06-01
The Edison Electric Institute (EEI) opposes key provisions in the Nuclear Regulatory Commission's proposed rules for the security of nuclear plants. The objections focus on areas of nuclear plant access, physical protection of facilities, and personal searches. EEI feels that the nuclear industry has implemented effective access measures to provide reasonable assurance against insider threats. It objects to the proposal that workers denied access authorization could petition for a review of their case under conventional labor-management collective bargaining agreements. A counter-proposal by EEI exempts authorizes employees from pat-down searches on the grounds that such searches will make employees unhappy andmore » lower productivity.« less
ERIC Educational Resources Information Center
Murthy, Carrie, Comp.
2017-01-01
In May 2017, the Investing in Innovation Fund (i3) College Access and Success community embarked on a project to compile shared challenges and lessons learned as a resource for fellow i3 College Access and Success grantees, the larger community of i3 grantees, and the broader field of college access. Through this project, the authors discovered…
Haustein, Stefanie; Smith, Elise; Larivière, Vincent; Alperin, Juan Pablo
2018-01-01
Using a database of recent articles published in the field of Global Health research, we examine institutional sources of stratification in publishing access outcomes. Traditionally, the focus on inequality in scientific publishing has focused on prestige hierarchies in established print journals. This project examines stratification in contemporary publishing with a particular focus on subscription vs. various Open Access (OA) publishing options. Findings show that authors working at lower-ranked universities are more likely to publish in closed/paywalled outlets, and less likely to choose outlets that involve some sort of Article Processing Charge (APCs; gold or hybrid OA). We also analyze institutional differences and stratification in the APC costs paid in various journals. Authors affiliated with higher-ranked institutions, as well as hospitals and non-profit organizations pay relatively higher APCs for gold and hybrid OA publications. Results suggest that authors affiliated with high-ranked universities and well-funded institutions tend to have more resources to choose pay options with publishing. Our research suggests new professional hierarchies developing in contemporary publishing, where various OA publishing options are becoming increasingly prominent. Just as there is stratification in institutional representation between different types of publishing access, there is also inequality within access types. PMID:29479492
50 CFR 600.415 - Access to statistics.
Code of Federal Regulations, 2014 CFR
2014-10-01
... perform functions authorized by a Federal contract or grant. (c) State personnel. Upon written request... members might gain personal or competitive advantage from access to the data. (ii) The possibility that...
50 CFR 600.415 - Access to statistics.
Code of Federal Regulations, 2011 CFR
2011-10-01
... perform functions authorized by a Federal contract or grant. (c) State personnel. Upon written request... members might gain personal or competitive advantage from access to the data. (ii) The possibility that...
50 CFR 600.415 - Access to statistics.
Code of Federal Regulations, 2013 CFR
2013-10-01
... perform functions authorized by a Federal contract or grant. (c) State personnel. Upon written request... members might gain personal or competitive advantage from access to the data. (ii) The possibility that...
50 CFR 600.415 - Access to statistics.
Code of Federal Regulations, 2012 CFR
2012-10-01
... perform functions authorized by a Federal contract or grant. (c) State personnel. Upon written request... members might gain personal or competitive advantage from access to the data. (ii) The possibility that...
32 CFR Appendix A to Part 651 - References
Code of Federal Regulations, 2014 CFR
2014-07-01
... publications and forms are accessible from a variety of sources through the use of electronic media or paper products. In most cases, electronic publications and forms that are associated with military organizations can be accessed at various address or web sites on the Internet. Since electronic addresses can...
32 CFR Appendix A to Part 651 - References
Code of Federal Regulations, 2012 CFR
2012-07-01
... publications and forms are accessible from a variety of sources through the use of electronic media or paper products. In most cases, electronic publications and forms that are associated with military organizations can be accessed at various address or web sites on the Internet. Since electronic addresses can...
32 CFR Appendix A to Part 651 - References
Code of Federal Regulations, 2013 CFR
2013-07-01
... publications and forms are accessible from a variety of sources through the use of electronic media or paper products. In most cases, electronic publications and forms that are associated with military organizations can be accessed at various address or web sites on the Internet. Since electronic addresses can...
Learner Attention to Form in ACCESS Task-Based Interaction
ERIC Educational Resources Information Center
Dao, Phung; Iwashita, Noriko; Gatbonton, Elizabeth
2017-01-01
This study explored the potential effects of communicative tasks developed using a reformulation of a task-based language teaching called Automatization in Communicative Contexts of Essential Speech Sequences (ACCESS) that includes automatization of language elements as one of its goals on learner attention to form in task-based interaction. The…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-27
... Form 628, ``Financial EDI Authorization;'' NUREG/BR-0254, Payment Methods; and NRC Form 629... applicable: NRC Form 628, ``Financial EDI Authorization'' and NRC Form 629, ``Authorization for Payment by...
ERIC Educational Resources Information Center
Santos, José L.; Sáenz, Victor B.
2014-01-01
The authors paint a national portrait of Latina/o trends over more than 30 years in terms of demographic and financial concerns that pertain to access at 4-year institutions. Using a multiple policy streams framework, the authors contend that growing numbers of Latina/os are in the eye of the perfect storm in a global economy that calls for more…
7 CFR 631.22 - Access to operating unit.
Code of Federal Regulations, 2010 CFR
2010-01-01
... include the right to measure acreages, render technical assistance, and inspect any work undertaken under... Access to operating unit. Any authorized NRCS representative shall have the right to enter an operating...
Selective access and editing in a database
NASA Technical Reports Server (NTRS)
Maluf, David A. (Inventor); Gawdiak, Yuri O. (Inventor)
2010-01-01
Method and system for providing selective access to different portions of a database by different subgroups of database users. Where N users are involved, up to 2.sup.N-1 distinguishable access subgroups in a group space can be formed, where no two access subgroups have the same members. Two or more members of a given access subgroup can edit, substantially simultaneously, a document accessible to each member.
48 CFR 3053.303 - Agency forms.
Code of Federal Regulations, 2010 CFR
2010-10-01
... section illustrates agency-specified forms. To access these forms go to: http://www.dhs.gov (under “Business, Acquisition Information”) or https://dhsonline.dhs.gov/portal/jhtml/general/forms.jhtml. Form...
48 CFR 3053.303 - Agency forms.
Code of Federal Regulations, 2011 CFR
2011-10-01
... section illustrates agency-specified forms. To access these forms go to: http://www.dhs.gov (under “Business, Acquisition Information”) or https://dhsonline.dhs.gov/portal/jhtml/general/forms.jhtml. Form...
48 CFR 3053.303 - Agency forms.
Code of Federal Regulations, 2012 CFR
2012-10-01
... section illustrates agency-specified forms. To access these forms go to: http://www.dhs.gov (under “Business, Acquisition Information”) or https://dhsonline.dhs.gov/portal/jhtml/general/forms.jhtml. Form...
48 CFR 3053.303 - Agency forms.
Code of Federal Regulations, 2014 CFR
2014-10-01
... section illustrates agency-specified forms. To access these forms go to: http://www.dhs.gov (under “Business, Acquisition Information”) or https://dhsonline.dhs.gov/portal/jhtml/general/forms.jhtml. Form...
48 CFR 3053.303 - Agency forms.
Code of Federal Regulations, 2013 CFR
2013-10-01
... section illustrates agency-specified forms. To access these forms go to: http://www.dhs.gov (under “Business, Acquisition Information”) or https://dhsonline.dhs.gov/portal/jhtml/general/forms.jhtml. Form...
Public Access and Open Access: Is There a Difference? | Poster
By Robin Meckley, Contributing Writer, and Tracie Frederick, Guest Writer Open access and public access—are they different concepts or are they the same? What do they mean for the researchers at NCI at Frederick? “Open-access (OA) literature is digital, online, free of charge, and free of most copyright and licensing restrictions. What makes it possible is the Internet and the consent of the author or copyright-holder,” according to an open access website maintained by Peter Suber, director, Harvard Open Access Project.
Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia
2018-05-17
Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional "encrypt-then-sign" or "sign-then-encrypt" strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation.
Strategies for Success: Open Access Policies at North American Educational Institutions
ERIC Educational Resources Information Center
Fruin, Christine; Sutton, Shan
2016-01-01
Recognizing the paucity of quantitative and qualitative data from North American educational institutions that have pursued open access policies, the authors devised a survey to collect information on the characteristics of these institutions, as well as the elements of the open access policies, the methods of promoting these policies, faculty…
ERIC Educational Resources Information Center
Duyck, Wouter; Van Assche, Eva; Drieghe, Denis; Hartsuiker, Robert J.
2007-01-01
Recent research on bilingualism has shown that lexical access in visual word recognition by bilinguals is not selective with respect to language. In the present study, the authors investigated language-independent lexical access in bilinguals reading sentences, which constitutes a strong unilingual linguistic context. In the first experiment,…
Policy Issues in Computer Networks: Multi-Access Information Systems.
ERIC Educational Resources Information Center
Lyons, Patrice A.
As computer databases become more publicly accessible through public networks, there is a growing need to provide effective protection for proprietary information. Without adequate assurances that their works will be protected, authors and other copyright owners may be reluctant to allow the full text of their works to be accessed through computer…
Code of Federal Regulations, 2012 CFR
2012-04-01
... obtain access to sex offender registration information? 5.905 Section 5.905 Housing and Urban Development... access to sex offender registration information? (a) PHA obligation to obtain sex offender registration... applying for admission to any federally assisted housing program is subject to a lifetime sex offender...
Code of Federal Regulations, 2013 CFR
2013-04-01
... obtain access to sex offender registration information? 5.905 Section 5.905 Housing and Urban Development... access to sex offender registration information? (a) PHA obligation to obtain sex offender registration... applying for admission to any federally assisted housing program is subject to a lifetime sex offender...
Code of Federal Regulations, 2010 CFR
2010-04-01
... obtain access to sex offender registration information? 5.905 Section 5.905 Housing and Urban Development... access to sex offender registration information? (a) PHA obligation to obtain sex offender registration... applying for admission to any federally assisted housing program is subject to a lifetime sex offender...
Code of Federal Regulations, 2014 CFR
2014-04-01
... obtain access to sex offender registration information? 5.905 Section 5.905 Housing and Urban Development... access to sex offender registration information? (a) PHA obligation to obtain sex offender registration... applying for admission to any federally assisted housing program is subject to a lifetime sex offender...
Code of Federal Regulations, 2011 CFR
2011-04-01
... obtain access to sex offender registration information? 5.905 Section 5.905 Housing and Urban Development... access to sex offender registration information? (a) PHA obligation to obtain sex offender registration... applying for admission to any federally assisted housing program is subject to a lifetime sex offender...
32 CFR 552.168 - Fort Lewis Area Access Office.
Code of Federal Regulations, 2011 CFR
2011-07-01
... issued to each person authorized access. The permit is not transferable. Entry to the Fort Lewis range... valid for one year. When a permit expires, the holder must re-register to renew privileges, and a new... been coordinated and approved, Area Access will determine when called for entry whether the area...
32 CFR 552.168 - Fort Lewis Area Access Office.
Code of Federal Regulations, 2012 CFR
2012-07-01
... issued to each person authorized access. The permit is not transferable. Entry to the Fort Lewis range... valid for one year. When a permit expires, the holder must re-register to renew privileges, and a new... been coordinated and approved, Area Access will determine when called for entry whether the area...
32 CFR 552.168 - Fort Lewis Area Access Office.
Code of Federal Regulations, 2010 CFR
2010-07-01
... issued to each person authorized access. The permit is not transferable. Entry to the Fort Lewis range... valid for one year. When a permit expires, the holder must re-register to renew privileges, and a new... been coordinated and approved, Area Access will determine when called for entry whether the area...
32 CFR 552.168 - Fort Lewis Area Access Office.
Code of Federal Regulations, 2013 CFR
2013-07-01
... issued to each person authorized access. The permit is not transferable. Entry to the Fort Lewis range... valid for one year. When a permit expires, the holder must re-register to renew privileges, and a new... been coordinated and approved, Area Access will determine when called for entry whether the area...
ERIC Educational Resources Information Center
Laditka, Sarah B.; Laditka, James N.; Bennett, Kevin J.; Probst, Janice C.
2005-01-01
Pregnancy complications affect many women. It is likely that some complications can be avoided through routine primary and prenatal care of reasonable quality. The authors examined access to health care during pregnancy for mothers insured by Medicaid. The access indicator is potentially avoidable maternity complications (PAMCs). Potentially…
An Overview of Public Access Computer Software Management Tools for Libraries
ERIC Educational Resources Information Center
Wayne, Richard
2004-01-01
An IT decision maker gives an overview of public access PC software that's useful in controlling session length and scheduling, Internet access, print output, security, and the latest headaches: spyware and adware. In this article, the author describes a representative sample of software tools in several important categories such as setup…
Supporting Access to Open Online Courses for Learners of Developing Countries
ERIC Educational Resources Information Center
Nti, Kwame
2015-01-01
This paper examines how access to, and use of, open online courses may be enhanced for learners of developing countries from a learner perspective. Using analysis of the open education concept, factors that affect access to open educational resources content, and universal standards for delivering online learning, the author demonstrates that the…
Code of Federal Regulations, 2013 CFR
2013-01-01
... authenticate and permit access only to authorized individuals and controls to prevent employees from providing member information to unauthorized individuals who may seek to obtain this information through fraudulent... unauthorized individuals have gained access to member information systems, including appropriate reports to...
Code of Federal Regulations, 2014 CFR
2014-01-01
... authenticate and permit access only to authorized individuals and controls to prevent employees from providing member information to unauthorized individuals who may seek to obtain this information through fraudulent... unauthorized individuals have gained access to member information systems, including appropriate reports to...
Code of Federal Regulations, 2012 CFR
2012-01-01
... authenticate and permit access only to authorized individuals and controls to prevent employees from providing member information to unauthorized individuals who may seek to obtain this information through fraudulent... unauthorized individuals have gained access to member information systems, including appropriate reports to...
76 FR 37779 - Rural Broadband Access Loans and Loan Guarantees Program
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-28
... DEPARTMENT OF AGRICULTURE Rural Utilities Service Rural Broadband Access Loans and Loan Guarantees... of $325,663,157 in loan funds for the Rural Broadband Access Loans and Loan Guarantees Program for... identifying a definite funding amount. The maximum amount of a loan under this authority will be $75 million...
76 FR 56712 - CLIA Program and HIPAA Privacy Rule; Patients' Access to Test Reports
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-14
...; Patients' Access to Test Reports AGENCY: Centers for Medicare & Medicaid Services (CMS), HHS; Centers for...) regulations to specify that, upon a patient's request, the laboratory may provide access to completed test... provide for release of test reports to authorized persons and, if applicable, the individuals (or their...
34 CFR 75.610 - Access by the handicapped.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 34 Education 1 2014-07-01 2014-07-01 false Access by the handicapped. 75.610 Section 75.610... by a Grantee? Construction § 75.610 Access by the handicapped. A grantee shall comply with the... facilities—41 CFR subpart 101-19.6. (Authority: 20 U.S.C. 1221e-3 and 3474) ...
Access Control of Web- and Java-Based Applications
NASA Technical Reports Server (NTRS)
Tso, Kam S.; Pajevski, Michael J.
2013-01-01
Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers
Calver, Michael C; Bradley, J Stuart
2010-06-01
Open access (OA) publishing, whereby authors, their institutions, or their granting bodies pay or provide a repository through which peer-reviewed work is available online for free, is championed as a model to increase the number of citations per paper and disseminate results widely, especially to researchers in developing countries. We compared the number of citations of OA and non-OA papers in six journals and four books published since 2000 to test whether OA increases number of citations overall and increases citations made by authors in developing countries. After controlling for type of paper (e.g., review or research paper), length of paper, authors' citation profiles, number of authors per paper, and whether the author or the publisher released the paper in OA, OA had no statistically significant influence on the overall number of citations per journal paper. Journal papers were cited more frequently if the authors had published highly cited papers previously, were members of large teams of authors, or published relatively long papers, but papers were not cited more frequently if they were published in an OA source. Nevertheless, author-archived OA book chapters accrued up to eight times more citations than chapters in the same book that were not available through OA, perhaps because there is no online abstracting service for book chapters. There was also little evidence that journal papers or book chapters published in OA received more citations from authors in developing countries relative to those journal papers or book chapters not published in OA. For scholarly publications in conservation biology, only book chapters had an OA citation advantage, and OA did not increase the number of citations papers or chapters received from authors in developing countries.
Registered access: a 'Triple-A' approach.
Dyke, Stephanie O M; Kirby, Emily; Shabani, Mahsa; Thorogood, Adrian; Kato, Kazuto; Knoppers, Bartha M
2016-12-01
We propose a standard model for a novel data access tier - registered access - to facilitate access to data that cannot be published in open access archives owing to ethical and legal risk. Based on an analysis of applicable research ethics and other legal and administrative frameworks, we discuss the general characteristics of this Registered Access Model, which would comprise a three-stage approval process: Authentication, Attestation and Authorization. We are piloting registered access with the Demonstration Projects of the Global Alliance for Genomics and Health for which it may provide a suitable mechanism for access to certain data types and to different types of data users.
Mapping Norway - a Method to Register and Survey the Status of Accessibility
NASA Astrophysics Data System (ADS)
Michaelis, Sven; Bögelsack, Kathrin
2018-05-01
The Norwegian mapping authority has developed a standard method for mapping accessibility mostly for people with limited or no walking abilities in urban and recreational areas. We choose an object-orientated approach where points, lines and polygons represents objects in the environment. All data are stored in a geospatial database, so they can be presented as web map and analyzed using GIS software. By the end of 2016 more than 160 municipalities are mapped using that method. The aim of this project is to establish a national standard for mapping and to provide a geodatabase that shows the status of accessibility throughout Norway. The data provide a useful tool for national statistics, local planning authorities and private users. First results show that accessibility is low and Norway still faces many challenges to meet the government's goals for Universal Design.
Lung damage and pulmonary uptake of serotonin in intact dogs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dawson, C.A.; Christensen, C.W.; Rickaby, D.A.
1985-06-01
The authors examined the influence of glass bead embolization and oleic acid, dextran, and imipramine infusion on the pulmonary uptake of trace doses of (/sup 3/H)serotonin and the extravascular volume accessible to (/sup 14/C)antipyrine in anesthetized dogs. Embolization and imipramine decreased serotonin uptake by 53 and 61%, respectively, but no change was observed with oleic acid or dextran infusion. The extravascular volume accessible to the antipyrine was reduced by 77% after embolization and increased by 177 and approximately 44% after oleic acid and dextran infusion, respectively. The results suggest that when the perfused endothelial surface is sufficiently reduced, as withmore » embolization, the uptake of trace doses of serotonin will be depressed. In addition, decreases in serotonin uptake in response to imipramine in this study and in response to certain endothelial toxins in other studies suggest that serotonin uptake can reveal certain kinds of changes in endothelial function. However, the lack of a response to oleic acid-induced damage in the present study suggests that serotonin uptake is not sensitive to all forms of endothelial damage.« less
Internet Distribution of Spacecraft Telemetry Data
NASA Technical Reports Server (NTRS)
Specht, Ted; Noble, David
2006-01-01
Remote Access Multi-mission Processing and Analysis Ground Environment (RAMPAGE) is a Java-language server computer program that enables near-real-time display of spacecraft telemetry data on any authorized client computer that has access to the Internet and is equipped with Web-browser software. In addition to providing a variety of displays of the latest available telemetry data, RAMPAGE can deliver notification of an alarm by electronic mail. Subscribers can then use RAMPAGE displays to determine the state of the spacecraft and formulate a response to the alarm, if necessary. A user can query spacecraft mission data in either binary or comma-separated-value format by use of a Web form or a Practical Extraction and Reporting Language (PERL) script to automate the query process. RAMPAGE runs on Linux and Solaris server computers in the Ground Data System (GDS) of NASA's Jet Propulsion Laboratory and includes components designed specifically to make it compatible with legacy GDS software. The client/server architecture of RAMPAGE and the use of the Java programming language make it possible to utilize a variety of competitive server and client computers, thereby also helping to minimize costs.
Hot gas path component cooling system having a particle collection chamber
DOE Office of Scientific and Technical Information (OSTI.GOV)
Miranda, Carlos Miguel; Lacy, Benjamin Paul
A cooling system for a hot gas path component includes a substrate having an outer surface and an inner surface. The inner surface defines at least one interior space. A passage is formed in the substrate between the outer surface and the inner surface. An access passage is formed in the substrate and extends from the outer surface to the inner space. The access passage is formed at a first acute angle to the passage and includes a particle collection chamber. The access passage is configured to channel a cooling fluid to the passage. Furthermore, the passage is configured tomore » channel the cooling fluid therethrough to cool the substrate.« less
Federal Facilities Inspections: A Guide to EPA's Access and Inspection Authorities
This brochure outlines the legal authority for EPA, or one of its authorized representatives, to inspect a federal facility for compliance with environmental laws. It also identifies the federal, state, or tribal inspectors who may conduct inspections.
14 CFR 153.5 - Aviation safety inspector airport access.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Aviation safety inspector airport access... TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT OPERATIONS Aviation Safety Inspector Access § 153.5 Aviation safety... must grant Aviation Safety Inspectors bearing FAA Form 110A free and uninterrupted access to public-use...
Leung, Daisy W; Borek, Dominika; Luthra, Priya; Binning, Jennifer M; Anantpadma, Manu; Liu, Gai; Harvey, Ian B; Su, Zhaoming; Endlich-Frazier, Ariel; Pan, Juanli; Shabman, Reed S; Chiu, Wah; Davey, Robert A; Otwinowski, Zbyszek; Basler, Christopher F; Amarasinghe, Gaya K
2015-04-21
During viral RNA synthesis, Ebola virus (EBOV) nucleoprotein (NP) alternates between an RNA-template-bound form and a template-free form to provide the viral polymerase access to the RNA template. In addition, newly synthesized NP must be prevented from indiscriminately binding to noncognate RNAs. Here, we investigate the molecular bases for these critical processes. We identify an intrinsically disordered peptide derived from EBOV VP35 (NPBP, residues 20-48) that binds NP with high affinity and specificity, inhibits NP oligomerization, and releases RNA from NP-RNA complexes in vitro. The structure of the NPBP/ΔNPNTD complex, solved to 3.7 Å resolution, reveals how NPBP peptide occludes a large surface area that is important for NP-NP and NP-RNA interactions and for viral RNA synthesis. Together, our results identify a highly conserved viral interface that is important for EBOV replication and can be targeted for therapeutic development. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.
Access to artemisinin-based anti-malarial treatment and its related factors in rural Tanzania
2013-01-01
Background Artemisinin-based combination treatment (ACT) has been widely adopted as one of the main malaria control strategies. However, its promise to save thousands of lives in sub-Saharan Africa depends on how effective the use of ACT is within the routine health system. The INESS platform evaluated effective coverage of ACT in several African countries. Timely access within 24 hours to an authorized ACT outlet is one of the determinants of effective coverage and was assessed for artemether-lumefantrine (Alu), in two district health systems in rural Tanzania. Methods From October 2009 to June 2011we conducted continuous rolling household surveys in the Kilombero-Ulanga and the Rufiji Health and Demographic Surveillance Sites (HDSS). Surveys were linked to the routine HDSS update rounds. Members of randomly pre-selected households that had experienced a fever episode in the previous two weeks were eligible for a structured interview. Data on individual treatment seeking, access to treatment, timing, source of treatment and household costs per episode were collected. Data are presented on timely access from a total of 2,112 interviews in relation to demographics, seasonality, and socio economic status. Results In Kilombero-Ulanga, 41.8% (CI: 36.6–45.1) and in Rufiji 36.8% (33.7–40.1) of fever cases had access to an authorized ACT provider within 24 hours of fever onset. In neither of the HDSS site was age, sex, socio-economic status or seasonality of malaria found to be significantly correlated with timely access. Conclusion Timely access to authorized ACT providers is below 50% despite interventions intended to improve access such as social marketing and accreditation of private dispensing outlets. To improve prompt diagnosis and treatment, access remains a major bottle neck and new more innovative interventions are needed to raise effective coverage of malaria treatment in Tanzania. PMID:23651521
Bea-Muñoz, M; Medina-Sánchez, M; Flórez-García, M T
2015-01-01
Patients with spinal cord injuries and their carers have access to leaflets on Internet that they can use as educational material to complement traditional forms of education. The aim of this study is to evaluate the readability of informative documents in Spanish, obtained from Internet and aimed at patients with spinal cord injuries. A search was made with the Google search engine using the following key words: recommendation, advice, guide, manual, self-care, education and information, adding spinal cord injury, paraplegia and tetraplegia to each of the terms. We analyzed the first 50 results of each search. The readability of the leaflets was studied with the Flesch-Szigriszt index and the INFLESZ scale, both available on the INFLESZ program. Also indicated were year of publication, country and number of authors of the documents obtained. We obtained 16 documents, developed between 2001 and 2011. Readability oscillated between 43.34 (some-what difficult) and 62 (normal), with an average value of 51.56 (somewhat difficult). Only 4 pamphlets (25%) showed a Flesch-Szigriszt index of ≥ 55 (normal). There was no difference in readability by year, authors or country of publication. The readability of 75% of the documents studied was "somewhat difficult" according to the INFLESZ scale. These results coincide with previous studies, in both Spanish and English. If the readability of this type of documents is improved, it will be easier to achieve their educational goal.
NASA Astrophysics Data System (ADS)
Slater, T. F.
2017-12-01
Responding to the community's need for an archival journal to document program evaluation and educational impact of programs and innovations, the Journal of Astronomy & Earth Science Education (JAESE.org) is a scholarly, peer-reviewed journal designed to serve the discipline-based astronomy, planetary, and geosciences education research community. JAESE's first issue was published on December 31, 2014 and has published four volumes and seven issues since that time. By far, the median article topic has been focused on planetarium education research, while there have only been a few articles on conventional solid-Earth geosciences education research. Although there is not yet an even distribution of topics across the field, there is a relatively even distribution among author demographics. Authors include a range of both junior and senior members of the field. There have been significantly more female authors than male authors. Submissions are distributed as blind-copies to two or three peer reviewers with authors' names and identifying information redacted from the manuscript. The average time to complete the first round of peer-review reviewers is 6.2-weeks. There have been too few manuscripts to reliably publish a "percentage acceptance rate." Taken together, JAESE's guiding Editorial Advisory Board judges this to be a successful first few years. In a purposeful effort to make JAESE authors' scholarly works as widely accessible as possible, JAESE adopted an open-access business model. JAESE articles are available to read free-of-charge over the Internet, delivered as PDFs. To date, the most common way articles are downloaded by readers is through Google Scholar. Instead of charging readers and libraries recurring subscription fees, JAESE charges authors a nominal submission fee and a small open-access fee, averaging about $700 USD. These charges are far lower than the traditional page charges and gold-package open-access fees typically charged to authors or their institutions by typical scientific journals, making JAESE an attractive publishing venue for many scholars to make their work as widely read as possible. Author guidelines and Reviewer Applications are available at http://www.jaese.org
How to start a minimal access mitral valve program.
Hunter, Steven
2013-11-01
The seven pillars of governance established by the National Health Service in the United Kingdom provide a useful framework for the process of introducing new procedures to a hospital. Drawing from local experience, the author present guidance for institutions considering establishing a minimal access mitral valve program. The seven pillars of governance apply to the practice of minimally invasive mitral valve surgery, based on the principle of patient-centred practice. The author delineate the benefits of minimally invasive mitral valve surgery in terms of: "clinical effectiveness", including reduced length of hospital stay, "risk management effectiveness", including conversion to sternotomy and aortic dissection, "patient experience" including improved cosmesis and quicker recovery, and the effectiveness of communication, resources and strategies in the implementation of minimally invasive mitral valve surgery. Finally, the author have identified seven learning curves experienced by surgeons involved in introducing a minimal access mitral valve program. The learning curves are defined as: techniques of mitral valve repair, Transoesophageal Echocardiography-guided cannulation, incisions, instruments, visualization, aortic occlusion and cardiopulmonary bypass strategies. From local experience, the author provide advice on how to reduce the learning curves, such as practising with the specialised instruments and visualization techniques during sternotomy cases. Underpinning the NHS pillars are the principles of systems awareness, teamwork, communication, ownership and leadership, all of which are paramount to performing any surgery but more so with minimal access surgery, as will be highlighted throughout this paper.
Mylius, Maren; Frewer, Andreas
2015-08-01
Migrants without residence permits are de facto excluded from access to healthcare in Germany. There is one exception in relevant legislation: in the case of sexually transmitted infections and tuberculosis, the legislator has instructed the local Public Health Authorities to offer free and anonymous counseling, testing and, if necessary, treatment in case of apparent need. Furthermore, recommended vaccinations may be carried out free of charge. This study intends to comprehensively capture the services for undocumented migrants at Public Health Authorities in Germany. An e-mail survey of all Local Public Health Authorities (n = 384) in Germany was carried out between January and March 2011 using a standardized questionnaire. One hundred thirty-nine of 384 targeted local Health Authorities completed the questionnaire (36.2%), of which approximately a quarter (n = 34) reported interaction with 'illegal' immigrants. Twenty-give authorities (18.4%) gave the indication to carry out treatment. This outpatient treatment option is mostly limited to patients afflicted with sexually transmitted infections with the distinct exception of human immunodeficiency virus/acquired immune deficiency syndrome. The study highlights the gap between legislation and the reality of restricted access to medical services for undocumented migrants in Germany. It underlines the need of increased financial and human resources in Public Health Authorities and, overall, the simplification of national legislation to assure the right to healthcare. © The Author 2015. Published by Oxford University Press on behalf of the European Public Health Association. All rights reserved.
ERIC Educational Resources Information Center
Solomyak, Olla; Marantz, Alec
2009-01-01
We present an MEG study of heteronym recognition, aiming to distinguish between two theories of lexical access: the "early access" theory, which entails that lexical access occurs at early (pre 200 ms) stages of processing, and the "late access" theory, which interprets this early activity as orthographic word-form identification rather than…
Access to CAMAC from VxWorks and UNIX in DART
DOE Office of Scientific and Technical Information (OSTI.GOV)
Streets, J.; Meadows, J.; Moore, C.
1996-02-01
All High Energy Physics experiments at Fermilab include CAMAC modules which need to be read out for each triggered event. There is also a need to access CAMAC modules for control and monitoring of the experiment. As part of the DART Project the authors have developed a package of software for CAMAC access from UNIX and VxWorks platforms, with support for several hardware interfaces. The authors report on developments for the CES CBD8210 VME to parallel CAMAC, the Hytec VSD2992 VME to serial CAMAC and Jorway 411S SCSI to parallel and serial CAMAC branch drivers, and give a summary ofmore » the timings obtained.« less
30 CFR 291.1 - What is MMS's authority to collect information?
Code of Federal Regulations, 2011 CFR
2011-07-01
..., DEPARTMENT OF THE INTERIOR APPEALS OPEN AND NONDISCRIMINATORY ACCESS TO OIL AND GAS PIPELINES UNDER THE OUTER... been denied open and nondiscriminatory access to Outer Continental Shelf (OCS) pipelines as sections of...
Gingold-Belfer, Rachel; Niv, Yaron; Horev, Nehama; Gross, Shuli; Sahar, Nadav; Dickman, Ram
2017-04-01
Failure modes and effects analysis (FMEA) is used for the identification of potential risks in health care processes. We used a specific FMEA - based form for direct referral for colonoscopy and assessed it for procedurerelated perforations. Ten experts in endoscopy evaluated and computed the entire referral process, modes of preparation for the endoscopic procedure, the endoscopic procedure itself and the discharge process. We used FMEA assessing for likelihood of occurrence, detection and severity and calculated the risk profile number (RPN) for each of the above points. According to the highest RPN results we designed a specific open access referral form and then compared the occurrence of colonic perforations (between 2010 and 2013) in patients who were referred through the open access arm (Group 1) to those who had a prior clinical consultation (non-open access, Group 2). Our experts in endoscopy (5 physicians and 5 nurses) identified 3 categories of failure modes that, on average, reached the highest RPNs. We identified 9,558 colonoscopies in group 1, and 12,567 in group 2. Perforations were identified in three patients from the open access group (1:3186, 0.03%) and in 10 from group 2 (1:1256, 0.07%) (p = 0.024). Direct referral for colonoscopy saved 9,558 pre-procedure consultations and the sum of $850,000. The FMEA tool-based specific referral form facilitates a safe, time and money saving open access colonoscopy service. Our form may be adopted by other gastroenterological clinics in Israel.
Recognizing victims of human trafficking in the pediatric emergency department.
Becker, Heather J; Bechtel, Kirsten
2015-02-01
Human trafficking is a form of modern-day slavery that is rapidly expanding in the United States and throughout the world. It is a crime under both the United States and international law. The child and adult victims of human trafficking are denied their basic human rights and subjected to unspeakable physical and emotional harm. Traffickers exert complete control over their victims and are proficient at hiding their condition from authorities. Healthcare practitioners may be the only professionals who come into contact with victims if they present for medical care. This article will describe human trafficking and its potential victims, as well as guide medical management and access to services that will ensure their safety and restore their freedom.