Sample records for access authorization form

  1. 75 FR 4101 - Enterprise Income Verification (EIV) System User Access Authorization Form and Rules of Behavior...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-26

    ... Verification (EIV) System User Access Authorization Form and Rules of Behavior and User Agreement AGENCY... lists the following information: Title of Proposal: Enterprise Income Verification (EIV) System User Access, Authorization Form and Rules Of Behavior and User Agreement. OMB Approval Number: 2577-New. Form...

  2. Open Access Publishing: What Authors Want

    ERIC Educational Resources Information Center

    Nariani, Rajiv; Fernandez, Leila

    2012-01-01

    Campus-based open access author funds are being considered by many academic libraries as a way to support authors publishing in open access journals. Article processing fees for open access have been introduced recently by publishers and have not yet been widely accepted by authors. Few studies have surveyed authors on their reasons for publishing…

  3. 10 CFR 25.15 - Access permitted under “Q” or “L” access authorization.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Access permitted under âQâ or âLâ access authorization. 25.15 Section 25.15 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION Access Authorizations § 25.15 Access permitted under “Q” or “L” access authorization. (a) A “Q” access authorization permits an...

  4. 10 CFR 25.15 - Access permitted under “Q” or “L” access authorization.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Access permitted under âQâ or âLâ access authorization. 25.15 Section 25.15 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION Access Authorizations § 25.15 Access permitted under “Q” or “L” access authorization. (a) A “Q” access authorization permits an...

  5. 10 CFR 25.15 - Access permitted under “Q” or “L” access authorization.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Access permitted under âQâ or âLâ access authorization. 25.15 Section 25.15 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION Access Authorizations § 25.15 Access permitted under “Q” or “L” access authorization. (a) A “Q” access authorization permits an...

  6. 10 CFR 25.15 - Access permitted under “Q” or “L” access authorization.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Access permitted under âQâ or âLâ access authorization. 25.15 Section 25.15 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION Access Authorizations § 25.15 Access permitted under “Q” or “L” access authorization. (a) A “Q” access authorization permits an...

  7. 10 CFR 1046.14 - Access authorization.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... authorization for the highest level of classified matter to which they potentially have access. Security police... by the site security organization and approved by the Head of the Field Element. Security police officers shall possess a minimum of an “L” or DOE Secret access authorization. Security police officers...

  8. 77 FR 26213 - Access Authorization Fees

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-03

    ... and Regulations section of this Federal Register. List of Subjects 10 CFR Part 11 Hazardous materials--transportation, Investigations, Nuclear materials, Reporting and recordkeeping requirements, Security measures... amend its access authorization fees charged to licensees for work performed under the Material Access...

  9. Open access publishing and author-pays business models: a survey of authors' knowledge and perceptions

    PubMed Central

    Schroter, Sara; Tite, Leanne

    2006-01-01

    Objectives: We aimed to assess journal authors' current knowledge and perceptions of open access and author-pays publishing. Design: An electronic survey. Setting: Authors of research papers submitted to BMJ, Archives of Disease in Childhood, and Journal of Medical Genetics in 2004. Main outcome measures: Familiarity with and perceptions of open access and author-pays publishing. Results: 468/1113 (42%) responded. Prior to definitions being provided, 47% (222/468) and 38% (176/468) reported they were familiar with the terms `open access' and `author-pays' publishing, respectively. Some who did not at first recognize the terms, did claim to recognize them when they were defined. Only 10% (49/468) had submitted to an author-pays journal. Compared with non-open access subscription-based journals, 35% agreed that open access author-pays journals have a greater capacity to publish more content making it easier to get published, 27% thought they had lower impact factors, 31% thought they had faster and more timely publicaitons, and 46% agreed that people will think anyone can pay to get published. 55% (256/468) thought they would not continue to submit to their respective journal if it became open access and charged, largely because of the reputaiton of the journals. Half (54%, 255/468) said open access has `no impact' or was `low priority' in their submission decisions. Two-thirds (66%, 308/468) said they would prefer to submit to a non-open access subscription-based journal than an open access author-pays journal. Over half thought they would have to make a contribution or pay the full cost of an author charge (56%, 262/468). Conclusions: The survey yielded useful information about respondents' knowledge and perceptions of these publishing models. Authors have limited familiarity with the concept of open-access publishing and surrounding issues. Currently, open access policies have little impact on authors' decision of where to submit papers. PMID:16508053

  10. 77 FR 26149 - Access Authorization Fees

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-03

    ... Regulatory Affairs of OMB. List of Subjects 10 CFR Part 11 Hazardous materials--transportation... licensees for work performed under the Material Access Authorization Program (MAAP) and the Information... assigned duties which require access to special nuclear material (plutonium, uranium-233, and uranium...

  11. 10 CFR 25.17 - Approval for processing applicants for access authorization.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Approval for processing applicants for access... Authorizations § 25.17 Approval for processing applicants for access authorization. (a) Access authorizations... request by a letter that includes the name, Social Security number and level of access authorization. (c...

  12. 49 CFR 1544.229 - Fingerprint-based criminal history records checks (CHRC): Unescorted access authority, authority...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... identification media that one or more airports accepts as airport-approved media for unescorted access authority... identification media that one or more airports accepts as airport-approved media for unescorted access authority... aircraft operator identification medium to that individual; (3) Authorizing that individual to perform...

  13. 49 CFR 1544.229 - Fingerprint-based criminal history records checks (CHRC): Unescorted access authority, authority...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... identification media that one or more airports accepts as airport-approved media for unescorted access authority... identification media that one or more airports accepts as airport-approved media for unescorted access authority... aircraft operator identification medium to that individual; (3) Authorizing that individual to perform...

  14. 49 CFR 1544.229 - Fingerprint-based criminal history records checks (CHRC): Unescorted access authority, authority...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... identification media that one or more airports accepts as airport-approved media for unescorted access authority... identification media that one or more airports accepts as airport-approved media for unescorted access authority... aircraft operator identification medium to that individual; (3) Authorizing that individual to perform...

  15. 49 CFR 1544.229 - Fingerprint-based criminal history records checks (CHRC): Unescorted access authority, authority...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... identification media that one or more airports accepts as airport-approved media for unescorted access authority... identification media that one or more airports accepts as airport-approved media for unescorted access authority... aircraft operator identification medium to that individual; (3) Authorizing that individual to perform...

  16. 49 CFR 1544.229 - Fingerprint-based criminal history records checks (CHRC): Unescorted access authority, authority...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... identification media that one or more airports accepts as airport-approved media for unescorted access authority... identification media that one or more airports accepts as airport-approved media for unescorted access authority... aircraft operator identification medium to that individual; (3) Authorizing that individual to perform...

  17. 10 CFR 710.10 - Suspension of access authorization.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Suspension of access authorization. 710.10 Section 710.10 Energy DEPARTMENT OF ENERGY CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO CLASSIFIED MATTER OR SPECIAL NUCLEAR MATERIAL General Criteria and Procedures for Determining Eligibility for Access...

  18. 10 CFR 710.10 - Suspension of access authorization.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Suspension of access authorization. 710.10 Section 710.10 Energy DEPARTMENT OF ENERGY CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO CLASSIFIED MATTER OR SPECIAL NUCLEAR MATERIAL General Criteria and Procedures for Determining Eligibility for Access...

  19. 10 CFR 710.10 - Suspension of access authorization.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Suspension of access authorization. 710.10 Section 710.10 Energy DEPARTMENT OF ENERGY CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO CLASSIFIED MATTER OR SPECIAL NUCLEAR MATERIAL General Criteria and Procedures for Determining Eligibility for Access...

  20. 10 CFR 710.10 - Suspension of access authorization.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Suspension of access authorization. 710.10 Section 710.10 Energy DEPARTMENT OF ENERGY CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO CLASSIFIED MATTER OR SPECIAL NUCLEAR MATERIAL General Criteria and Procedures for Determining Eligibility for Access...

  1. 10 CFR 710.10 - Suspension of access authorization.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Suspension of access authorization. 710.10 Section 710.10 Energy DEPARTMENT OF ENERGY CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO CLASSIFIED MATTER OR SPECIAL NUCLEAR MATERIAL General Criteria and Procedures for Determining Eligibility for Access...

  2. 77 FR 46257 - Access Authorization Fees; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-03

    [email protected] . List of Subjects 10 CFR Part 11 Hazardous materials--transportation, Investigations, Nuclear materials, Reporting and recordkeeping requirements, Security measures, Special nuclear... authorization fees charged to licensees for work performed under the Material Access Authorization Program (MAAP...

  3. New Author Choice for Open Access

    NASA Astrophysics Data System (ADS)

    2007-04-01

    AGU journals now offer authors the opportunity to make their articles open for others to read for free. Authors choosing this option pay a fee based on article length and number of figures; these charges are designed to offset the potential loss of subscription income. This new option, called Author Choice, provides •Unlimited access to the article for all readers from the moment of publication. • Permission to deposit the PDF version in institutional repositories so long as the repository accepts AGU copyright permissions. • Continued copyright protection to prevent unauthorized uses of the author's work.

  4. 10 CFR Appendix A to Part 25 - Fees for NRC Access Authorization

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Fees for NRC Access Authorization A Appendix A to Part 25 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION Pt. 25, App. A Appendix A to Part 25—Fees for NRC Access Authorization The NRC application fee for an access authorization of type . . . Is the sum...

  5. 10 CFR Appendix A to Part 25 - Fees for NRC Access Authorization

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Fees for NRC Access Authorization A Appendix A to Part 25 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION Pt. 25, App. A Appendix A to Part 25—Fees for NRC Access Authorization The NRC application fee for an access authorization of type * * * Is the sum...

  6. 10 CFR Appendix A to Part 25 - Fees for NRC Access Authorization

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Fees for NRC Access Authorization A Appendix A to Part 25 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION Pt. 25, App. A Appendix A to Part 25—Fees for NRC Access Authorization The NRC application fee for an access authorization of type . . . Is the sum...

  7. 10 CFR Appendix A to Part 25 - Fees for NRC Access Authorization

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Fees for NRC Access Authorization A Appendix A to Part 25 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION Pt. 25, App. A Appendix A to Part 25—Fees for NRC Access Authorization The NRC application fee for an access authorization of type * * * Is the sum...

  8. 10 CFR Appendix A to Part 25 - Fees for NRC Access Authorization

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Fees for NRC Access Authorization A Appendix A to Part 25 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION Pt. 25, App. A Appendix A to Part 25—Fees for NRC Access Authorization The NRC application fee for an access authorization of type * * * Is the sum...

  9. Publishing in Open Access Education Journals: The Authors' Perspectives

    ERIC Educational Resources Information Center

    Coonin, Bryna; Younce, Leigh M.

    2010-01-01

    Open access publishing is now an accepted method of scholarly communication. However, the greatest traction for open access publishing thus far has been in the sciences. Penetration of open access publishing has been much slower among the social sciences. This study surveys 309 authors from recent issues of open access journals in education to…

  10. 76 FR 66089 - Access Authorization Program for Nuclear Power Plants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-25

    ... NUCLEAR REGULATORY COMMISSION [NRC-2011-0245] Access Authorization Program for Nuclear Power... Program for Nuclear Power Plants.'' This guide describes a method that NRC staff considers acceptable to... Regulations (10 CFR), section 73.56, ``Personnel Access Authorization Requirements for Nuclear Power Plants...

  11. 10 CFR 1016.38 - Suspension or revocation of access authorization.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Suspension or revocation of access authorization. 1016.38 Section 1016.38 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Control of Information § 1016.38 Suspension or revocation of access authorization. In any case where the...

  12. 10 CFR 1016.38 - Suspension or revocation of access authorization.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Suspension or revocation of access authorization. 1016.38 Section 1016.38 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Control of Information § 1016.38 Suspension or revocation of access authorization. In any case where the...

  13. A contextual role-based access control authorization model for electronic patient record.

    PubMed

    Motta, Gustavo H M B; Furuie, Sergio S

    2003-09-01

    The design of proper models for authorization and access control for electronic patient record (EPR) is essential to a wide scale use of EPR in large health organizations. In this paper, we propose a contextual role-based access control authorization model aiming to increase the patient privacy and the confidentiality of patient data, whereas being flexible enough to consider specific cases. This model regulates user's access to EPR based on organizational roles. It supports a role-tree hierarchy with authorization inheritance; positive and negative authorizations; static and dynamic separation of duties based on weak and strong role conflicts. Contextual authorizations use environmental information available at access time, like user/patient relationship, in order to decide whether a user is allowed to access an EPR resource. This enables the specification of a more flexible and precise authorization policy, where permission is granted or denied according to the right and the need of the user to carry out a particular job function.

  14. AccessMRS: integrating OpenMRS with smart forms on Android.

    PubMed

    Fazen, Louis E; Chemwolo, Benjamin T; Songok, Julia J; Ruhl, Laura J; Kipkoech, Carolyne; Green, James M; Ikemeri, Justus E; Christoffersen-Deb, Astrid

    2013-01-01

    We present a new open-source Android application, AccessMRS, for interfacing with an electronic medical record system (OpenMRS) and loading 'Smart Forms' on a mobile device. AccessMRS functions as a patient-centered interface for viewing OpenMRS data; managing patient information in reminders, task lists, and previous encounters; and launching patient-specific 'Smart Forms' for electronic data collection and dissemination of health information. We present AccessMRS in the context of related software applications we developed to serve Community Health Workers, including AccessInfo, AccessAdmin, AccessMaps, and AccessForms. The specific features and design of AccessMRS are detailed in relationship to the requirements that drove development: the workflows of the Kenyan Ministry of Health Community Health Volunteers (CHVs) supported by the AMPATH Primary Health Care Program. Specifically, AccessMRS was designed to improve the quality of community-based Maternal and Child Health services delivered by CHVs in Kosirai Division. AccessMRS is currently in use by more than 80 CHVs in Kenya and undergoing formal assessment of acceptability, effectiveness, and cost.

  15. 10 CFR 25.15 - Access permitted under “Q” or “L” access authorization.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Confidential National Security Information including intelligence information, CRYPTO (i.e., cryptographic... official business when the employee has the appropriate level of NRC access authorization and need-to-know...

  16. 10 CFR 25.27 - Reopening of cases in which requests for access authorizations are canceled.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... authorizations are canceled. 25.27 Section 25.27 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION Access Authorizations § 25.27 Reopening of cases in which requests for access authorizations are canceled. (a) In... cases were previously canceled, new fingerprint cards (FD-257) in duplicate and a new Security...

  17. 10 CFR 10.21 - Suspension of access authorization and/or employment clearance.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Suspension of access authorization and/or employment clearance. 10.21 Section 10.21 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.21 Suspension of access authorization and/or employment clearance. In those cases where...

  18. 10 CFR 10.21 - Suspension of access authorization and/or employment clearance.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Suspension of access authorization and/or employment clearance. 10.21 Section 10.21 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.21 Suspension of access authorization and/or employment clearance. In those cases where...

  19. 10 CFR 10.21 - Suspension of access authorization and/or employment clearance.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Suspension of access authorization and/or employment clearance. 10.21 Section 10.21 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.21 Suspension of access authorization and/or employment clearance. In those cases where...

  20. Nurse practitioners and controlled substances prescriptive authority: improving access to care.

    PubMed

    Ambrose, Michelle A; Tarlier, Denise S

    2013-03-01

    In 2007, Health Canada proposed a new framework to regulate prescriptive authority for controlled substances, titled New Classes of Practitioners Regulations (NCPR). The new regulatory framework was passed in November 2012; it gives nurse practitioners (NPs), midwives and podiatrists the authority to prescribe controlled medications under the Controlled Drugs and Substances Act. It is expected that authorizing NPs to write prescriptions for certain controlled substances commonly used in primary care will enhance flexibility and timeliness in primary care service delivery. Studies from the United States have shown positive outcomes in primary care access, decreased healthcare costs and the evolution and advancement of the NP role when prescriptive authority was expanded to include controlled substances. The purpose of this paper is to examine how NPs' prescriptive authority for controlled substances affects access to primary care and NP role development. Three key issues identified from the experience of one group of NPs in the United States (access to care, professional autonomy and prescriber knowledge) offer insight into the practice changes that may be anticipated for NPs in Canada now that they have acquired prescriptive authority for controlled substances. Recommendations are offered to assist nurse leaders and educators to best support NPs as they take on this new and important role responsibility.

  1. 10 CFR 11.15 - Application for special nuclear material access authorization.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Application for special nuclear material access authorization. 11.15 Section 11.15 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for Special Nuclear Material...

  2. 10 CFR 11.15 - Application for special nuclear material access authorization.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Application for special nuclear material access authorization. 11.15 Section 11.15 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for Special Nuclear Material...

  3. 10 CFR 11.15 - Application for special nuclear material access authorization.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Application for special nuclear material access authorization. 11.15 Section 11.15 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for Special Nuclear Material...

  4. 10 CFR 11.15 - Application for special nuclear material access authorization.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Application for special nuclear material access authorization. 11.15 Section 11.15 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for Special Nuclear Material...

  5. 10 CFR 11.15 - Application for special nuclear material access authorization.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Application for special nuclear material access authorization. 11.15 Section 11.15 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for Special Nuclear Material...

  6. 7 CFR 3015.151 - Authorized forms.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Authorized forms. 3015.151 Section 3015.151 Agriculture Regulations of the Department of Agriculture (Continued) OFFICE OF THE CHIEF FINANCIAL OFFICER, DEPARTMENT OF AGRICULTURE UNIFORM FEDERAL ASSISTANCE REGULATIONS Application for Federal Assistance § 3015...

  7. 76 FR 64379 - Agency Information Collection Activities: Proposed Collection; Comments Requested; eForm 6 Access...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-18

    ...] Agency Information Collection Activities: Proposed Collection; Comments Requested; eForm 6 Access Request... Form/Collection: eForm 6 Access Request. (3) Agency form number, if any, and the applicable component...: Respondents must complete the eForm 6 Access Request form in order to receive a user ID and password to obtain...

  8. 10 CFR 10.21 - Suspension of access authorization and/or employment clearance.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... ELIGIBILITY FOR ACCESS TO RESTRICTED DATA OR NATIONAL SECURITY INFORMATION OR AN EMPLOYMENT CLEARANCE... access authorization and/or an employment clearance, the Director, Division of Facilities and Security... Corporate Management and Chief Information Officer or other Deputy Executive Director, his or her...

  9. 10 CFR 10.21 - Suspension of access authorization and/or employment clearance.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... ELIGIBILITY FOR ACCESS TO RESTRICTED DATA OR NATIONAL SECURITY INFORMATION OR AN EMPLOYMENT CLEARANCE... access authorization and/or an employment clearance, the Director, Division of Facilities and Security... Corporate Management and Chief Information Officer or other Deputy Executive Director, his or her...

  10. Temporary Authorization Form for Personally Owned Equipment

    EPA Pesticide Factsheets

    All visitors bringing a personal laptop into EPA-RTP’s facilities must complete a “Temporary Authorization for Personally Owned Equipment” form and submit it to campus security upon their departure (last day of visit if more than one day).

  11. 31 CFR 360.6 - Authorized forms of registration.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Service annuitant, pursuant to 5 U.S.C. 8345(e). John F. Green or Mary B. Doe, Trustees of the Estate of... ownership form. A bond may be registered in the name of one individual. Example: Julie B. Jones, 123-45-6789... coowners. The form of registration “A and B” is not authorized. Examples: David R. Johnson 123-45-6789 or...

  12. 10 CFR 73.56 - Personnel access authorization requirements for nuclear power plants.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Personnel access authorization requirements for nuclear power plants. 73.56 Section 73.56 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION... authorization requirements for nuclear power plants. (a) Introduction. (1) By March 31, 2010, each nuclear power...

  13. 10 CFR 73.56 - Personnel access authorization requirements for nuclear power plants.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Personnel access authorization requirements for nuclear power plants. 73.56 Section 73.56 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION... authorization requirements for nuclear power plants. (a) Introduction. (1) By March 31, 2010, each nuclear power...

  14. 10 CFR 73.56 - Personnel access authorization requirements for nuclear power plants.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Personnel access authorization requirements for nuclear power plants. 73.56 Section 73.56 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION... authorization requirements for nuclear power plants. (a) Introduction. (1) By March 31, 2010, each nuclear power...

  15. 10 CFR 73.56 - Personnel access authorization requirements for nuclear power plants.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Personnel access authorization requirements for nuclear power plants. 73.56 Section 73.56 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION... authorization requirements for nuclear power plants. (a) Introduction. (1) By March 31, 2010, each nuclear power...

  16. 10 CFR 11.16 - Cancellation of request for special nuclear material access authorization.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Cancellation of request for special nuclear material access authorization. 11.16 Section 11.16 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for...

  17. 10 CFR 11.16 - Cancellation of request for special nuclear material access authorization.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Cancellation of request for special nuclear material access authorization. 11.16 Section 11.16 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for...

  18. 10 CFR 11.16 - Cancellation of request for special nuclear material access authorization.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Cancellation of request for special nuclear material access authorization. 11.16 Section 11.16 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for...

  19. Temporary authorization for use: does the French patient access programme for unlicensed medicines impact market access after formal licensing?

    PubMed

    Degrassat-Théas, Albane; Paubel, Pascal; Parent de Curzon, Olivier; Le Pen, Claude; Sinègre, Martine

    2013-04-01

    To reach the French market, a new drug requires a marketing authorization (MA) and price and reimbursement agreements. These hurdles could delay access to new and promising drugs. Since 1992, French law authorizes the use of unlicensed drugs on an exceptional and temporary basis through a compassionate-use programme, known as Temporary Authorization for Use (ATU). This programme was implemented to improve early access to drugs under development or authorized abroad. However, it is suspected to be inflationary, bypassing public bodies in charge of health technology assessment (HTA) and of pricing. The aim of this study is to observe the market access after the formal licensing of drugs that went through this compassionate-use programme. We included all ATUs that received an MA between 1 January 2005 and 30 June 2010. We first examined market access delays from these drugs using the standard administrative path. We positioned this result in relation to launch delays observed in France (for all outpatient drugs) and in other major European markets. Second, we assessed the bargaining power of a hospital purchaser after those drugs had obtained an MA by calculating the price growth rate after the approval. During the study period, 77 ATUs were formally licensed. The study concluded that, from the patient's perspective, licensing and public bodies' review time was shortened by a combined total of 36 months. The projected 11-month review time of public bodies may be longer than delays usually observed for outpatient drugs. Nonetheless, the study revealed significant benefits for French patient access based on comparable processing to launch time with those of other European countries with tight price control policies. In return, a 12 % premium, on average, is paid to pharmaceutical companies while drugs are under this status (sub-analysis on 56 drugs). In many instances, the ATU programme responds to a public health need by accelerating the availability of new drugs

  20. Memorandum "Open Metadata". Open Access to Documentation Forms and Item Catalogs in Healthcare.

    PubMed

    Dugas, M; Jöckel, K-H; Friede, T; Gefeller, O; Kieser, M; Marschollek, M; Ammenwerth, E; Röhrig, R; Knaup-Gregori, P; Prokosch, H-U

    2015-01-01

    At present, most documentation forms and item catalogs in healthcare are not accessible to the public. This applies to assessment forms of routine patient care as well as case report forms (CRFs) of clinical and epidemiological studies. On behalf of the German chairs for Medical Informatics, Biometry and Epidemiology six recommendations to developers and users of documentation forms in healthcare were developed. Open access to medical documentation forms could substantially improve information systems in healthcare and medical research networks. Therefore these forms should be made available to the scientific community, their use should not be unduly restricted, they should be published in a sustainable way using international standards and sources of documentation forms should be referenced in scientific publications.

  1. 15. CONSTRUCTION PROGRESS PHOTO SHOWING FORMS GOING UP ON ACCESS ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    15. CONSTRUCTION PROGRESS PHOTO SHOWING FORMS GOING UP ON ACCESS CORRIDOR. INEEL PHOTO NUMBER NRTS-59-336. - Idaho National Engineering Laboratory, Old Waste Calcining Facility, Scoville, Butte County, ID

  2. 77 FR 10753 - Draft Guidance for Industry: Food and Drug Administration Records Access Authority Under the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-23

    ...] Draft Guidance for Industry: Food and Drug Administration Records Access Authority Under the Federal... industry entitled ``FDA Records Access Authority Under Sections 414 and 704 of the Federal Food, Drug...). This updated draft guidance is intended to provide individuals in the human and animal food industries...

  3. Learner Attention to Form in ACCESS Task-Based Interaction

    ERIC Educational Resources Information Center

    Dao, Phung; Iwashita, Noriko; Gatbonton, Elizabeth

    2017-01-01

    This study explored the potential effects of communicative tasks developed using a reformulation of a task-based language teaching called Automatization in Communicative Contexts of Essential Speech Sequences (ACCESS) that includes automatization of language elements as one of its goals on learner attention to form in task-based interaction. The…

  4. Imagining a Gold Open Access Future: Attitudes, Behaviors, and Funding Scenarios among Authors of Academic Scholarship

    ERIC Educational Resources Information Center

    Tenopir, Carol; Dalton, Elizabeth D.; Christian, Lisa; Jones, Misty K.; McCabe, Mark; Smith, MacKenzie; Fish, Allison

    2017-01-01

    The viability of gold open access publishing models into the future will depend, in part, on the attitudes of authors toward open access (OA). In a survey of academics at four major research universities in North America, we examine academic authors' opinions and behaviors toward gold OA. The study allows us to see what academics know and perceive…

  5. 31 CFR 315.7 - Authorized forms of registration.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Authorized forms of registration. 315.7 Section 315.7 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued... omitted. Examples: Tenth National Bank, trustee of Pension Fund of Safety Manufacturing Company, U/A with...

  6. 31 CFR 315.7 - Authorized forms of registration.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Authorized forms of registration. 315.7 Section 315.7 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued... omitted. Examples: Tenth National Bank, trustee of Pension Fund of Safety Manufacturing Company, U/A with...

  7. 31 CFR 315.7 - Authorized forms of registration.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false Authorized forms of registration. 315.7 Section 315.7 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued... omitted. Examples: Tenth National Bank, trustee of Pension Fund of Safety Manufacturing Company, U/A with...

  8. 31 CFR 360.6 - Authorized forms of registration.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Authorized forms of registration. 360.6 Section 360.6 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued... Pension Fund of Safety Manufacturing Company, U/A with the company, dated March 31, 1996, 12-3456789...

  9. 31 CFR 360.6 - Authorized forms of registration.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Authorized forms of registration. 360.6 Section 360.6 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued... Pension Fund of Safety Manufacturing Company, U/A with the company, dated March 31, 1996, 12-3456789...

  10. 31 CFR 360.6 - Authorized forms of registration.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Authorized forms of registration. 360.6 Section 360.6 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued... Pension Fund of Safety Manufacturing Company, U/A with the company, dated March 31, 1996, 12-3456789...

  11. 31 CFR 353.7 - Authorized forms of registration.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false Authorized forms of registration. 353.7 Section 353.7 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued... limited term, their names may be omitted. Examples: Tenth National Bank, trustee of Pension Fund of Safety...

  12. 31 CFR 353.7 - Authorized forms of registration.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Authorized forms of registration. 353.7 Section 353.7 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued... limited term, their names may be omitted. Examples: Tenth National Bank, trustee of Pension Fund of Safety...

  13. 31 CFR 360.6 - Authorized forms of registration.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false Authorized forms of registration. 360.6 Section 360.6 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued... Pension Fund of Safety Manufacturing Company, U/A with the company, dated March 31, 1996, 12-3456789...

  14. 31 CFR 353.7 - Authorized forms of registration.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Authorized forms of registration. 353.7 Section 353.7 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued... limited term, their names may be omitted. Examples: Tenth National Bank, trustee of Pension Fund of Safety...

  15. Authoring Tools

    NASA Astrophysics Data System (ADS)

    Treviranus, Jutta

    Authoring tools that are accessible and that enable authors to produce accessible Web content play a critical role in web accessibility. Widespread use of authoring tools that comply to the W3C Authoring Tool Accessibility Guidelines (ATAG) would ensure that even authors who are neither knowledgeable about nor particularly motivated to produce accessible content do so by default. The principles and techniques of ATAG are discussed. Some examples of accessible authoring tools are described including authoring tool content management components such as TinyMCE. Considerations for creating an accessible collaborative environment are also covered. As part of providing accessible content, the debate between system-based personal optimization and one universally accessible site configuration is presented. The issues and potential solutions to address the accessibility crisis presented by the advent of rich internet applications are outlined. This challenge must be met to ensure that a large segment of the population is able to participate in the move toward the web as a two-way communication mechanism.

  16. A Bibliometric Study of Scholarly Articles Published by Library and Information Science Authors about Open Access

    ERIC Educational Resources Information Center

    Grandbois, Jennifer; Beheshti, Jamshid

    2014-01-01

    Introduction: This study aims to gain a greater understanding of the development of open access practices amongst library and information science authors, since their role is integral to the success of the broader open access movement. Method: Data were collected from scholarly articles about open access by library and information science authors…

  17. 17 CFR 274.402 - Form ID, uniform application for access codes to file on EDGAR.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... for access codes to file on EDGAR. 274.402 Section 274.402 Commodity and Securities Exchanges... Forms for Electronic Filing § 274.402 Form ID, uniform application for access codes to file on EDGAR..., filing agent or training agent to log on to the EDGAR system, submit filings, and change its CCC. (d...

  18. 17 CFR 239.63 - Form ID, uniform application for access codes to file on EDGAR.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... for access codes to file on EDGAR. 239.63 Section 239.63 Commodity and Securities Exchanges SECURITIES... Statements § 239.63 Form ID, uniform application for access codes to file on EDGAR. Form ID must be filed by... log on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification...

  19. 17 CFR 239.63 - Form ID, uniform application for access codes to file on EDGAR.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... for access codes to file on EDGAR. 239.63 Section 239.63 Commodity and Securities Exchanges SECURITIES... Statements § 239.63 Form ID, uniform application for access codes to file on EDGAR. Form ID must be filed by... log on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification...

  20. 17 CFR 274.402 - Form ID, uniform application for access codes to file on EDGAR.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... for access codes to file on EDGAR. 274.402 Section 274.402 Commodity and Securities Exchanges... Forms for Electronic Filing § 274.402 Form ID, uniform application for access codes to file on EDGAR..., filing agent or training agent to log on to the EDGAR system, submit filings, and change its CCC. (d...

  1. 7 CFR 3015.157 - Authorized form for nongovernmental organizations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Authorized form for nongovernmental organizations. 3015.157 Section 3015.157 Agriculture Regulations of the Department of Agriculture (Continued) OFFICE OF THE CHIEF FINANCIAL OFFICER, DEPARTMENT OF AGRICULTURE UNIFORM FEDERAL ASSISTANCE REGULATIONS...

  2. 31 CFR 353.7 - Authorized forms of registration.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... bond may be registered in the name of one individual. Example: John A. Jones 123-45-6789. (2... form of registration “A and B” is not authorized. Examples: John A. Jones 123-45-6789 or Ella S. Jones 987-65-4321. John A. Jones 123-45-6789 or (Miss, Ms. or Mrs.) Ella S. Jones. Ella S. Jones 987-65-4321...

  3. 32 CFR Appendix B to Part 504 - Customer Consent and Authorization For Access-Sample Format

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Customer Consent and Authorization For Access-Sample Format B Appendix B to Part 504 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS OBTAINING INFORMATION FROM FINANCIAL...

  4. 32 CFR Appendix B to Part 504 - Customer Consent and Authorization For Access-Sample Format

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Customer Consent and Authorization For Access-Sample Format B Appendix B to Part 504 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS OBTAINING INFORMATION FROM FINANCIAL...

  5. A Survey of Physical Sciences, Engineering and Mathematics Faculty Regarding Author Fees in Open Access Journals

    ERIC Educational Resources Information Center

    Cusker, Jeremy; Rauh, Anne E.

    2014-01-01

    Discussions of the potential of open access publishing frequently must contend with the skepticism of research authors regarding the need to pay author fees (also known as publication fees). With that in mind, the authors undertook a survey of faculty, postdocs, and graduate students in physical science, mathematics, and engineering fields at two…

  6. 10 CFR 2.307 - Extension and reduction of time limits; delegated authority to order use of procedures for access...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... authority to order use of procedures for access by potential parties to certain sensitive unclassified... authority to order use of procedures for access by potential parties to certain sensitive unclassified... Commission or the presiding officer. (b) If this part does not prescribe a time limit for an action to be...

  7. 17 CFR 9.11 - Form, contents and delivery of notice of disciplinary or access denial action.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... notice of disciplinary or access denial action. 9.11 Section 9.11 Commodity and Securities Exchanges... OTHER ADVERSE ACTIONS Notice and Effective Date of Disciplinary Action or Access Denial Action § 9.11 Form, contents and delivery of notice of disciplinary or access denial action. (a) When required...

  8. Full practice authority--effecting change and improving access to care: the Nevada journey.

    PubMed

    VanBeuge, Susan S; Walker, Tomas

    2014-06-01

    In 2013, Nevada shifted from a collaborative practice model to full practice authority. Given the challenges many states still face, this article provides an outline of the evolution of the "nurse practitioner" (NP) in Nevada. Reviewing the path Nevada took toward full practice authority, we hope to provide insight including lessons learned and opposition encountered to assist other states working toward full practice authority. Literature searches were conducted on PubMed and MEDLINE. Search terms included "autonomous practice," "nurse practitioner," and "full practice authority." Healthcare reform will require nurse practitioners committed to legislative change. Nurse practitioners have the knowledge and ability to affect the legislative process and improve patients' access to care. With careful planning, full engagement, and team building, making a statute change is possible and should be seriously considered in states still struggling with collaborative relationships. Nurse practitioners are well situated to provide primary care in the United States. Removing barriers to practice through statute change will empower NPs to effect positive change in our struggling healthcare system. ©2014 The Author(s) ©2014 American Association of Nurse Practitioners.

  9. [A computerized system for the management of letters of authorization for access to sensitive data in a research and teaching hospital].

    PubMed

    Bodina, Annalisa; Brizzolara, Antonella; Vadruccio, Gianluca; Castaldi, Silvana

    2012-01-01

    This paper describes the experience of a hospital which has introduced a system of computerized management of letters of authorization for healthcare workers to access sensitive health data, through the use of open source software. A new corporate intranet portal was created with access given only to the privacy contacts of each operational unit of the hospital. Once the privacy contact has entered the relevant user authorization, these must be approved first by the Directors of the respective operational units and finally by the privacy officer. The introduction of this system has allowed a systematic approach to the management of authorization for access to health data by hospital staff, regular updating and monitoring of the authorization and the start of a process of digitalization of documents.

  10. Awareness of “Predatory” Open-Access Journals among Prospective Veterinary and Medical Authors Attending Scientific Writing Workshops

    PubMed Central

    Christopher, Mary M.; Young, Karen M.

    2015-01-01

    Authors face many choices when selecting a journal for publication. Prospective authors, especially trainees, may be unaware of “predatory” online journals or how to differentiate them from legitimate journals. In this study, we assessed awareness of open-access and predatory journals among prospective authors attending scientific writing workshops; our long-term goal was to inform educational goals for the workshops. We surveyed participants of writing workshops at veterinary and medical schools and an international conference over a 1-year period. The survey included 14 statements for respondents to indicate agreement level on a Likert-like scale and four questions on awareness of resources about predatory journals; respondents also defined “predatory journal.” A total of 145 participants completed the survey: 106 (73.1%) from veterinary schools and 86 (59.3%) graduate students or residents. Fewer faculty (vs trainees) agreed that open access was an important factor in deciding where to publish; faculty and postdoctoral researchers were more likely to expect to pay more to publish in an open-access journal. Most respondents (120/145, 82.7%) agreed/strongly agreed that the decision to accept a manuscript should not be influenced by publication charges, but 50% (56/112) indicated that they “didn’t know” how publishing costs were supported. Of the 142 respondents who answered, 33 (23.0%) indicated awareness of the term “predatory journal”; 34 (23.9%) were aware of the Directory of Open Access Journals; 24 (16.9%) were aware of the Science “sting” article about predatory journals; and 7 (4.8%) were aware of Beall’s list. Most (93/144, 64.5%) definitions of predatory journals described poor but not predatory journal practices, and some respondents misunderstood the term completely. Mentors should help novice authors to be aware of predatory journals and to distinguish between legitimate and illegitimate open-access journals, thus selecting the

  11. 43 CFR 6305.30 - What are the steps BLM must take in issuing an access authorization to valid occupancies?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... issuing an access authorization to mining claims or other valid occupancies wholly surrounded by... permit the reasonable use of the non-Federal land, valid mining claim, or other valid occupancy; and (3) The location, construction, maintenance, and use of the access route that BLM approves will be as...

  12. 43 CFR 6305.30 - What are the steps BLM must take in issuing an access authorization to valid occupancies?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... issuing an access authorization to mining claims or other valid occupancies wholly surrounded by... permit the reasonable use of the non-Federal land, valid mining claim, or other valid occupancy; and (3) The location, construction, maintenance, and use of the access route that BLM approves will be as...

  13. 43 CFR 6305.30 - What are the steps BLM must take in issuing an access authorization to valid occupancies?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... issuing an access authorization to mining claims or other valid occupancies wholly surrounded by... permit the reasonable use of the non-Federal land, valid mining claim, or other valid occupancy; and (3) The location, construction, maintenance, and use of the access route that BLM approves will be as...

  14. 43 CFR 6305.30 - What are the steps BLM must take in issuing an access authorization to valid occupancies?

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... issuing an access authorization to mining claims or other valid occupancies wholly surrounded by... permit the reasonable use of the non-Federal land, valid mining claim, or other valid occupancy; and (3) The location, construction, maintenance, and use of the access route that BLM approves will be as...

  15. An accessible four-dimensional treatment of Maxwell's equations in terms of differential forms

    NASA Astrophysics Data System (ADS)

    Sá, Lucas

    2017-03-01

    Maxwell’s equations are derived in terms of differential forms in the four-dimensional Minkowski representation, starting from the three-dimensional vector calculus differential version of these equations. Introducing all the mathematical and physical concepts needed (including the tool of differential forms), using only knowledge of elementary vector calculus and the local vector version of Maxwell’s equations, the equations are reduced to a simple and elegant set of two equations for a unified quantity, the electromagnetic field. The treatment should be accessible for students taking a first course on electromagnetism.

  16. HIPAA privacy rules and compliance with federal and state employment laws: the participant authorization form.

    PubMed

    Brislin, Joseph A

    2003-03-01

    Although HIPAA privacy rules do not apply directly to employers or to employment records, they do apply indirectly to employers because employer-sponsored group health plans and all health care providers are covered. HIPAA privacy regulations overlap with federal and state employment laws, and liabilities for breach of confidentiality can be substantial. Employers can use a participant's authorization form to comply with employment laws and company policies. Sample authorization forms are provided at the end of this article.

  17. 2 CFR 25.210 - Authority to modify agency application forms or formats.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 2 Grants and Agreements 1 2014-01-01 2014-01-01 false Authority to modify agency application forms or formats. 25.210 Section 25.210 Grants and Agreements Office of Management and Budget Guidance for Grants and Agreements OFFICE OF MANAGEMENT AND BUDGET GOVERNMENTWIDE GUIDANCE FOR GRANTS AND AGREEMENTS...

  18. 2 CFR 25.210 - Authority to modify agency application forms or formats.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 2 Grants and Agreements 1 2013-01-01 2013-01-01 false Authority to modify agency application forms or formats. 25.210 Section 25.210 Grants and Agreements Office of Management and Budget Guidance for Grants and Agreements OFFICE OF MANAGEMENT AND BUDGET GOVERNMENTWIDE GUIDANCE FOR GRANTS AND AGREEMENTS...

  19. 2 CFR 25.210 - Authority to modify agency application forms or formats.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 2 Grants and Agreements 1 2012-01-01 2012-01-01 false Authority to modify agency application forms or formats. 25.210 Section 25.210 Grants and Agreements Office of Management and Budget Guidance for Grants and Agreements OFFICE OF MANAGEMENT AND BUDGET GOVERNMENTWIDE GUIDANCE FOR GRANTS AND AGREEMENTS...

  20. 2 CFR 25.210 - Authority to modify agency application forms or formats.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 2 Grants and Agreements 1 2011-01-01 2011-01-01 false Authority to modify agency application forms or formats. 25.210 Section 25.210 Grants and Agreements Office of Management and Budget Guidance for Grants and Agreements OFFICE OF MANAGEMENT AND BUDGET GOVERNMENTWIDE GUIDANCE FOR GRANTS AND AGREEMENTS...

  1. 28 CFR 1100.33 - Access to information and translation services for victims of severe forms of trafficking in...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... services for victims of severe forms of trafficking in persons. 1100.33 Section 1100.33 Judicial Administration DEPARTMENT OF JUSTICE AND DEPARTMENT OF STATE TRAFFICKING IN PERSONS Victims of Severe Forms of Trafficking in Persons § 1100.33 Access to information and translation services for victims of severe forms of...

  2. 28 CFR 1100.33 - Access to information and translation services for victims of severe forms of trafficking in...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... services for victims of severe forms of trafficking in persons. 1100.33 Section 1100.33 Judicial Administration DEPARTMENT OF JUSTICE AND DEPARTMENT OF STATE TRAFFICKING IN PERSONS Victims of Severe Forms of Trafficking in Persons § 1100.33 Access to information and translation services for victims of severe forms of...

  3. 28 CFR 1100.33 - Access to information and translation services for victims of severe forms of trafficking in...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... services for victims of severe forms of trafficking in persons. 1100.33 Section 1100.33 Judicial Administration DEPARTMENT OF JUSTICE AND DEPARTMENT OF STATE TRAFFICKING IN PERSONS Victims of Severe Forms of Trafficking in Persons § 1100.33 Access to information and translation services for victims of severe forms of...

  4. Traditional and emerging forms of dental practice. Cost, accessibility, and quality factors.

    PubMed Central

    Rovin, S; Nash, J

    1982-01-01

    The traditional and predominant manner of delivering dental care is through a fee-for-service, private practice system. A number of alternative dental care delivery systems have emerged and are being tested, and others are just emerging. These systems include department store practices, hospital dental services, health maintenance organizations, the independent practice of dental hygiene, and denturism. Although it is too soon to draw final conclusions about the efficacy and effectiveness of these systems, we examine them for their potential to compete with and change the way dental care is currently delivered. Using the parameters of cost, accessibility, and quality, we compare these systems to traditional dental practice. Some of these emerging forms clearly have the potential to complete favorably with traditional practice. Other seem less likely to alter the existing system substantially. The system which can best control costs, increase accessibility, and enhance quality will gain the competitive edge. PMID:7091453

  5. 17 CFR 269.7 - Form ID, uniform application for access codes to file on EDGAR.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification Authorization Code (PMAC)—allows a filer, filing agent or training agent to change its Password. [69 FR 22710, Apr... Sections Affected, which appears in the Finding Aids section of the printed volume and on GPO Access. ...

  6. 17 CFR 249.446 - Form ID, uniform application for access codes to file on EDGAR.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... log on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification Authorization Code (PMAC)—allows a filer, filing agent or training agent to change its Password. [69 FR 22710... Sections Affected, which appears in the Finding Aids section of the printed volume and on GPO Access. ...

  7. 15 CFR Supplement No. 3 to Part 715 - Deadlines for Submission of Declarations, No Changes Authorization Forms, Amendments for...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Declarations, No Changes Authorization Forms, Amendments for Unscheduled Discrete Organic Chemical (UDOC... COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS ACTIVITIES INVOLVING UNSCHEDULED DISCRETE ORGANIC..., No Changes Authorization Forms, Amendments for Unscheduled Discrete Organic Chemical (UDOC...

  8. 15 CFR Supplement No. 3 to Part 715 - Deadlines for Submission of Declarations, No Changes Authorization Forms, Amendments for...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Declarations, No Changes Authorization Forms, Amendments for Unscheduled Discrete Organic Chemical (UDOC... COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS ACTIVITIES INVOLVING UNSCHEDULED DISCRETE ORGANIC..., No Changes Authorization Forms, Amendments for Unscheduled Discrete Organic Chemical (UDOC...

  9. 15 CFR Supplement No. 3 to Part 715 - Deadlines for Submission of Declarations, No Changes Authorization Forms, Amendments for...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Declarations, No Changes Authorization Forms, Amendments for Unscheduled Discrete Organic Chemical (UDOC... COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS ACTIVITIES INVOLVING UNSCHEDULED DISCRETE ORGANIC... Changes Authorization Forms, Amendments for Unscheduled Discrete Organic Chemical (UDOC) Facilities, and...

  10. 15 CFR Supplement No. 3 to Part 715 - Deadlines for Submission of Declarations, No Changes Authorization Forms, Amendments for...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Declarations, No Changes Authorization Forms, Amendments for Unscheduled Discrete Organic Chemical (UDOC... COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS ACTIVITIES INVOLVING UNSCHEDULED DISCRETE ORGANIC... Changes Authorization Forms, Amendments for Unscheduled Discrete Organic Chemical (UDOC) Facilities, and...

  11. 15 CFR Supplement No. 3 to Part 715 - Deadlines for Submission of Declarations, No Changes Authorization Forms, Amendments for...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Declarations, No Changes Authorization Forms, Amendments for Unscheduled Discrete Organic Chemical (UDOC... COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS ACTIVITIES INVOLVING UNSCHEDULED DISCRETE ORGANIC... Changes Authorization Forms, Amendments for Unscheduled Discrete Organic Chemical (UDOC) Facilities, and...

  12. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.

    PubMed

    Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia

    2018-05-17

    Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional "encrypt-then-sign" or "sign-then-encrypt" strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation.

  13. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation

    PubMed Central

    Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia

    2018-01-01

    Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional “encrypt-then-sign” or “sign-then-encrypt” strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation. PMID:29772840

  14. 18 CFR 141.51 - FERC Form No. 714, Annual Electric Balancing Authority Area and Planning Area Report.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., Annual Electric Balancing Authority Area and Planning Area Report. 141.51 Section 141.51 Conservation of...) § 141.51 FERC Form No. 714, Annual Electric Balancing Authority Area and Planning Area Report. (a) Who... Policies Act, 16 U.S.C. 2602, operating a balancing authority area, and any group of electric utilities...

  15. 18 CFR 141.51 - FERC Form No. 714, Annual Electric Balancing Authority Area and Planning Area Report.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ..., Annual Electric Balancing Authority Area and Planning Area Report. 141.51 Section 141.51 Conservation of...) § 141.51 FERC Form No. 714, Annual Electric Balancing Authority Area and Planning Area Report. (a) Who... Policies Act, 16 U.S.C. 2602, operating a balancing authority area, and any group of electric utilities...

  16. 18 CFR 141.51 - FERC Form No. 714, Annual Electric Balancing Authority Area and Planning Area Report.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., Annual Electric Balancing Authority Area and Planning Area Report. 141.51 Section 141.51 Conservation of...) § 141.51 FERC Form No. 714, Annual Electric Balancing Authority Area and Planning Area Report. (a) Who... Policies Act, 16 U.S.C. 2602, operating a balancing authority area, and any group of electric utilities...

  17. 18 CFR 141.51 - FERC Form No. 714, Annual Electric Balancing Authority Area and Planning Area Report.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ..., Annual Electric Balancing Authority Area and Planning Area Report. 141.51 Section 141.51 Conservation of...) § 141.51 FERC Form No. 714, Annual Electric Balancing Authority Area and Planning Area Report. (a) Who... Policies Act, 16 U.S.C. 2602, operating a balancing authority area, and any group of electric utilities...

  18. 18 CFR 141.51 - FERC Form No. 714, Annual Electric Balancing Authority Area and Planning Area Report.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., Annual Electric Balancing Authority Area and Planning Area Report. 141.51 Section 141.51 Conservation of...) § 141.51 FERC Form No. 714, Annual Electric Balancing Authority Area and Planning Area Report. (a) Who... Policies Act, 16 U.S.C. 2602, operating a balancing authority area, and any group of electric utilities...

  19. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment

    PubMed Central

    Xiao, Min; Zhou, Jing; Liu, Xuejiao; Jiang, Mingda

    2017-01-01

    In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment. PMID:28629131

  20. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.

    PubMed

    Xiao, Min; Zhou, Jing; Liu, Xuejiao; Jiang, Mingda

    2017-06-17

    In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment.

  1. Policy reconciliation for access control in dynamic cross-enterprise collaborations

    NASA Astrophysics Data System (ADS)

    Preuveneers, D.; Joosen, W.; Ilie-Zudor, E.

    2018-03-01

    In dynamic cross-enterprise collaborations, different enterprises form a - possibly temporary - business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.

  2. 48 CFR 401.170 - Electronic access to regulatory information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false Electronic access to... AGRICULTURE GENERAL AGRICULTURE ACQUISITION REGULATION SYSTEM Purpose, Authority, Issuance 401.170 Electronic... guidance in electronic form. The Internet address for the Procurement Homepage is URL http://www.usda.gov...

  3. 48 CFR 401.170 - Electronic access to regulatory information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false Electronic access to... AGRICULTURE GENERAL AGRICULTURE ACQUISITION REGULATION SYSTEM Purpose, Authority, Issuance 401.170 Electronic... guidance in electronic form. The Internet address for the Procurement Homepage is URL http://www.usda.gov...

  4. 48 CFR 401.170 - Electronic access to regulatory information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Electronic access to... AGRICULTURE GENERAL AGRICULTURE ACQUISITION REGULATION SYSTEM Purpose, Authority, Issuance 401.170 Electronic... guidance in electronic form. The Internet address for the Procurement Homepage is URL http://www.usda.gov...

  5. 48 CFR 401.170 - Electronic access to regulatory information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false Electronic access to... AGRICULTURE GENERAL AGRICULTURE ACQUISITION REGULATION SYSTEM Purpose, Authority, Issuance 401.170 Electronic... guidance in electronic form. The Internet address for the Procurement Homepage is URL http://www.usda.gov...

  6. 32 CFR Appendix E to Part 197 - Form Letter-Conditions Governing Access to Official Records for Historical Research Purposes

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Form Letter-Conditions Governing Access to Official Records for Historical Research Purposes E Appendix E to Part 197 National Defense Department of... THE FILES OF THE OFFICE OF THE SECRETARY OF DEFENSE (OSD) Pt. 197, App. E Appendix E to Part 197—Form...

  7. 77 FR 37553 - Access Authorization Fees

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-22

    ... PDR: You may examine and purchase copies of public documents at the NRC's PDR, Room O1-F21, One White... authorization. The formula for calculating fees remains based on current Office of Personnel Management (OPM) billing rates for personnel background investigations. The NRC designed the formula to recover the full...

  8. 9 CFR 381.213 - Notification of governmental authorities having jurisdiction over article detained; form of...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Notification of governmental authorities having jurisdiction over article detained; form of written notification. 381.213 Section 381.213 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE AGENCY...

  9. 20 CFR 10.303 - Should the employer use a Form CA-16 to authorize medical testing when an employee is exposed to...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Should the employer use a Form CA-16 to... Related Benefits Emergency Medical Care § 10.303 Should the employer use a Form CA-16 to authorize medical... medical treatment under the FECA. The employer therefore should not use a Form CA-16 to authorize medical...

  10. 20 CFR 10.303 - Should the employer use a Form CA-16 to authorize medical testing when an employee is exposed to...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 1 2011-04-01 2011-04-01 false Should the employer use a Form CA-16 to... Related Benefits Emergency Medical Care § 10.303 Should the employer use a Form CA-16 to authorize medical... medical treatment under the FECA. The employer therefore should not use a Form CA-16 to authorize medical...

  11. 20 CFR 10.303 - Should the employer use a Form CA-16 to authorize medical testing when an employee is exposed to...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 1 2012-04-01 2012-04-01 false Should the employer use a Form CA-16 to... Related Benefits Emergency Medical Care § 10.303 Should the employer use a Form CA-16 to authorize medical... medical treatment under the FECA. The employer therefore should not use a Form CA-16 to authorize medical...

  12. 20 CFR 10.303 - Should the employer use a Form CA-16 to authorize medical testing when an employee is exposed to...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 1 2014-04-01 2012-04-01 true Should the employer use a Form CA-16 to... Related Benefits Emergency Medical Care § 10.303 Should the employer use a Form CA-16 to authorize medical... medical treatment under the FECA. The employer therefore should not use a Form CA-16 to authorize medical...

  13. 20 CFR 10.303 - Should the employer use a Form CA-16 to authorize medical testing when an employee is exposed to...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 1 2013-04-01 2012-04-01 true Should the employer use a Form CA-16 to... Related Benefits Emergency Medical Care § 10.303 Should the employer use a Form CA-16 to authorize medical... medical treatment under the FECA. The employer therefore should not use a Form CA-16 to authorize medical...

  14. Creating Digital Authors

    ERIC Educational Resources Information Center

    Zoch, Melody; Langston-DeMott, Brooke; Adams-Budde, Melissa

    2014-01-01

    Elementary students find themselves engaged and learning at a digital writing camp. The authors find that such elementary students usually have limited access to technology at home and school, and posit that teachers should do all they can to give them more access to and experience in digital composing. Students were motivated and learned to use…

  15. 17 CFR 140.74 - Delegation of authority to issue special calls for Series 03 Reports and Form 40.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... issue special calls for Series 03 Reports and Form 40. 140.74 Section 140.74 Commodity and Securities... Functions § 140.74 Delegation of authority to issue special calls for Series 03 Reports and Form 40. (a) The Commodity Futures Trading Commission hereby delegates, until such time as the Commission orders otherwise...

  16. 17 CFR 140.74 - Delegation of authority to issue special calls for Series 03 Reports and Form 40.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... issue special calls for Series 03 Reports and Form 40. 140.74 Section 140.74 Commodity and Securities... Functions § 140.74 Delegation of authority to issue special calls for Series 03 Reports and Form 40. (a) The Commodity Futures Trading Commission hereby delegates, until such time as the Commission orders otherwise...

  17. 17 CFR 140.74 - Delegation of authority to issue special calls for Series 03 Reports and Form 40.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... issue special calls for Series 03 Reports and Form 40. 140.74 Section 140.74 Commodity and Securities... Functions § 140.74 Delegation of authority to issue special calls for Series 03 Reports and Form 40. (a) The Commodity Futures Trading Commission hereby delegates, until such time as the Commission orders otherwise...

  18. The Virtual Ramp to the Equivalent Experience in the Virtual Museum: Accessibility to Museums on the Web.

    ERIC Educational Resources Information Center

    Nevile, Liddy; McCathieNevile, Charles

    This paper argues that a range of forms and modalities of resources should be provided to ensure accessibility and richness on the World Wide Web for all users. Based on experiences in developing virtual exhibitions of Quinkan Aboriginal Rock Art, the authors present a brief overview of the technology available for accessibility. Then they explore…

  19. Airport Ground Access Planning Guide

    DOT National Transportation Integrated Search

    1980-07-01

    Airport access has been identified by some airport authorities as a potential threat to the growth of aviation. In order to help airport planners and local authorities define the critical elements of an access problem and identify improvement project...

  20. Spread the word: MMN brain response reveals whole-form access of discontinuous particle verbs.

    PubMed

    Hanna, Jeff; Cappelle, Bert; Pulvermüller, Friedemann

    2017-12-01

    The status of particle verbs such as rise (…) up as either lexically stored or combinatorially assembled is an issue which so far has not been settled decisively. In this study, we use the mismatch negativity (MMN) brain response to observe neurophysiological responses to discontinuous particle verbs. The MMN can be used to distinguish between whole-form storage and combinatorial processes, as it is enhanced to stored words compared to unknown pseudowords, whereas combinatorially legal strings elicit a reduced MMN relative to ungrammatical ones. Earlier work had found larger MMNs to congruent than to incongruent verb-particle combinations when particle and verb appeared as adjacent elements, thus suggesting whole-form storage at least in this case. However, it is still possible that particle verbs discontinuously spread out across a sentence would elicit the combinatorial, grammar-violation response pattern instead. Here, we tested the brain signatures of discontinuous verb-particle combinations, orthogonally varying congruence and semantic transparency. The results show for the first time brain indices of whole-form storage for discontinuous constituents, thus arguing in favour of access to whole-form-stored lexical elements in the processing of particle verbs, irrespective of their semantic opacity. Results are discussed in the context of linguistic debates about the status of particle verbs as words, lexical elements or syntactically generated combinations. The explanation of the pattern of results within a neurobiological language model is highlighted. Copyright © 2017 Elsevier Inc. All rights reserved.

  1. Open Access Alternatives

    ERIC Educational Resources Information Center

    Tenopir, Carol

    2004-01-01

    Open access publishing is a hot topic today. But open access publishing can have many different definitions, and pros and cons vary with the definitions. Open access publishing is especially attractive to companies and small colleges or universities that are likely to have many more readers than authors. A downside is that a membership fee sounds…

  2. 20 CFR 403.140 - If the Commissioner authorizes testimony, what will be the scope and form of that testimony?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., what will be the scope and form of that testimony? 403.140 Section 403.140 Employees' Benefits SOCIAL... PROCEEDINGS § 403.140 If the Commissioner authorizes testimony, what will be the scope and form of that testimony? The employee's testimony must be limited to matters that were specifically approved. We will...

  3. From Web accessibility to Web adaptability.

    PubMed

    Kelly, Brian; Nevile, Liddy; Sloan, David; Fanou, Sotiris; Ellison, Ruth; Herrod, Lisa

    2009-07-01

    This article asserts that current approaches to enhance the accessibility of Web resources fail to provide a solid foundation for the development of a robust and future-proofed framework. In particular, they fail to take advantage of new technologies and technological practices. The article introduces a framework for Web adaptability, which encourages the development of Web-based services that can be resilient to the diversity of uses of such services, the target audience, available resources, technical innovations, organisational policies and relevant definitions of 'accessibility'. The article refers to a series of author-focussed approaches to accessibility through which the authors and others have struggled to find ways to promote accessibility for people with disabilities. These approaches depend upon the resource author's determination of the anticipated users' needs and their provision. Through approaches labelled as 1.0, 2.0 and 3.0, the authors have widened their focus to account for contexts and individual differences in target audiences. Now, the authors want to recognise the role of users in determining their engagement with resources (including services). To distinguish this new approach, the term 'adaptability' has been used to replace 'accessibility'; new definitions of accessibility have been adopted, and the authors have reviewed their previous work to clarify how it is relevant to the new approach. Accessibility 1.0 is here characterised as a technical approach in which authors are told how to construct resources for a broadly defined audience. This is known as universal design. Accessibility 2.0 was introduced to point to the need to account for the context in which resources would be used, to help overcome inadequacies identified in the purely technical approach. Accessibility 3.0 moved the focus on users from a homogenised universal definition to recognition of the idiosyncratic needs and preferences of individuals and to cater for them. All of

  4. Environmental Assessment for Authorizing the Puerto Rico Electric Power Authority (PREPA) to allow Public Access to the Boiling Nuclear Superheat (BONUS) Reactor Building, Rincon, Puerto Rico

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    N /A

    The U.S. Department of Energy (DOE) proposes to consent to a proposal by the Puerto Rico Electric Power Authority (PREPA) to allow public access to the Boiling Nuclear Superheat (BONUS) reactor building located near Rincon, Puerto Rico for use as a museum. PREPA, the owner of the BONUS facility, has determined that the historical significance of this facility, as one of only two reactors of this design ever constructed in the world, warrants preservation in a museum, and that this museum would provide economic benefits to the local community through increased tourism. Therefore, PREPA is proposing development of the BONUSmore » facility as a museum.« less

  5. Public Access and Open Access: Is There a Difference? | Poster

    Cancer.gov

    By Robin Meckley, Contributing Writer, and Tracie Frederick, Guest Writer Open access and public access—are they different concepts or are they the same? What do they mean for the researchers at NCI at Frederick? “Open-access (OA) literature is digital, online, free of charge, and free of most copyright and licensing restrictions. What makes it possible is the Internet and the consent of the author or copyright-holder,” according to an open access website maintained by Peter Suber, director, Harvard Open Access Project.

  6. Medical cannabis access, use, and substitution for prescription opioids and other substances: A survey of authorized medical cannabis patients.

    PubMed

    Lucas, Philippe; Walsh, Zach

    2017-04-01

    In 2014 Health Canada replaced the Marihuana for Medical Access Regulations (MMAR) with the Marihuana for Medical Purposes Regulations (MMPR). One of the primary changes in the new program has been to move from a single Licensed Producer (LP) of cannabis to multiple Licensed Producers. This is the first comprehensive survey of patients enrolled in the MMPR. Patients registered to purchase cannabis from Tilray, a federally authorized Licenced Producer (LP) within the MMPR, were invited to complete an online survey consisting of 107 questions on demographics, patterns of use, and cannabis substitution effect. The survey was completed by 271 respondents. Cannabis is perceived to be an effective treatment for diverse conditions, with pain and mental health the most prominent. Findings include high self-reported use of cannabis as a substitute for prescription drugs (63%), particularly pharmaceutical opioids (30%), benzodiazepines (16%), and antidepressants (12%). Patients also reported substituting cannabis for alcohol (25%), cigarettes/tobacco (12%), and illicit drugs (3%). A significant percentage of patients (42%) reported accessing cannabis from illegal/unregulated sources in addition to access via LPs, and over half (55%) were charged to receive a medical recommendation to use cannabis, with nearly 25% paying $300 or more. The finding that patients report its use as a substitute for prescription drugs supports prior research on medical cannabis users; however, this study is the first to specify the classes of prescription drugs for which cannabis it is used as a substitute, and to match this substitution to specific diagnostic categories. The findings that some authorized patients purchase cannabis from unregulated sources and that a significant percentage of patients were charged for medical cannabis recommendations highlight ongoing policy challenges for this federal program. Copyright © 2017 Elsevier B.V. All rights reserved.

  7. Are pediatric Open Access journals promoting good publication practice? An analysis of author instructions.

    PubMed

    Meerpohl, Joerg J; Wolff, Robert F; Antes, Gerd; von Elm, Erik

    2011-04-09

    Several studies analyzed whether conventional journals in general medicine or specialties such as pediatrics endorse recommendations aiming to improve publication practice. Despite evidence showing benefits of these recommendations, the proportion of endorsing journals has been moderate to low and varied considerably for different recommendations. About half of pediatric journals indexed in the Journal Citation Report referred to the Uniform Requirements for Manuscripts of the International Committee of Medical Journal Editors (ICMJE) but only about a quarter recommended registration of trials. We aimed to investigate to what extent pediatric open-access (OA) journals endorse these recommendations. We hypothesized that a high proportion of these journals have adopted recommendations on good publication practice since OA electronic publishing has been associated with a number of editorial innovations aiming at improved access and transparency. We identified 41 journals publishing original research in the subject category "Health Sciences, Medicine (General), Pediatrics" of the Directory of Open Access Journals http://www.doaj.org. From the journals' online author instructions we extracted information regarding endorsement of four domains of editorial policy: the Uniform Requirements for Manuscripts, trial registration, disclosure of conflicts of interest and five major reporting guidelines such as the CONSORT (Consolidated Standards of Reporting Trials) statement. Two investigators collected data independently. The Uniform Requirements were mentioned by 27 (66%) pediatric OA journals. Thirteen (32%) required or recommended trial registration prior to publication of a trial report. Conflict of interest policies were stated by 25 journals (61%). Advice about reporting guidelines was less frequent: CONSORT was referred to by 12 journals (29%) followed by other reporting guidelines (MOOSE, PRISMA or STARD) (8 journals, 20%) and STROBE (3 journals, 7%). The EQUATOR

  8. Are pediatric Open Access journals promoting good publication practice? An analysis of author instructions

    PubMed Central

    2011-01-01

    Background Several studies analyzed whether conventional journals in general medicine or specialties such as pediatrics endorse recommendations aiming to improve publication practice. Despite evidence showing benefits of these recommendations, the proportion of endorsing journals has been moderate to low and varied considerably for different recommendations. About half of pediatric journals indexed in the Journal Citation Report referred to the Uniform Requirements for Manuscripts of the International Committee of Medical Journal Editors (ICMJE) but only about a quarter recommended registration of trials. We aimed to investigate to what extent pediatric open-access (OA) journals endorse these recommendations. We hypothesized that a high proportion of these journals have adopted recommendations on good publication practice since OA electronic publishing has been associated with a number of editorial innovations aiming at improved access and transparency. Methods We identified 41 journals publishing original research in the subject category "Health Sciences, Medicine (General), Pediatrics" of the Directory of Open Access Journals http://www.doaj.org. From the journals' online author instructions we extracted information regarding endorsement of four domains of editorial policy: the Uniform Requirements for Manuscripts, trial registration, disclosure of conflicts of interest and five major reporting guidelines such as the CONSORT (Consolidated Standards of Reporting Trials) statement. Two investigators collected data independently. Results The Uniform Requirements were mentioned by 27 (66%) pediatric OA journals. Thirteen (32%) required or recommended trial registration prior to publication of a trial report. Conflict of interest policies were stated by 25 journals (61%). Advice about reporting guidelines was less frequent: CONSORT was referred to by 12 journals (29%) followed by other reporting guidelines (MOOSE, PRISMA or STARD) (8 journals, 20%) and STROBE (3

  9. 75 FR 5867 - Proposed Collection; Comment Request for Form 8879-C and Form 8879-I

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-04

    ... Form 8879-C, IRS e-file Signature Authorization for Form 1120, and Form 8879-I, IRS e-file Signature...: Title: IRS e-file Signature Authorization for Form 1120; IRS e-file Signature Authorization for Form... Signature Authorization for Form 1120, and Form 8879-I, IRS e-file Signature Authorization for Form 1120-F...

  10. Improving outpatient access and patient experiences in academic ambulatory care.

    PubMed

    O'Neill, Sarah; Calderon, Sherry; Casella, Joanne; Wood, Elizabeth; Carvelli-Sheehan, Jayne; Zeidel, Mark L

    2012-02-01

    Effective scheduling of and ready access to doctor appointments affect ambulatory patient care quality, but these are often sacrificed by patients seeking care from physicians at academic medical centers. At one center, Beth Israel Deaconess Medical Center, the authors developed interventions to improve the scheduling of appointments and to reduce the access time between telephone call and first offered appointment. Improvements to scheduling included no redirection to voicemail, prompt telephone pickup, courteous service, complete registration, and effective scheduling. Reduced access time meant being offered an appointment with a physician in the appropriate specialty within three working days of the telephone call. Scheduling and access were assessed using monthly "mystery shopper" calls. Mystery shoppers collected data using standardized forms, rated the quality of service, and transcribed their interactions with schedulers. Monthly results were tabulated and discussed with clinical leaders; leaders and frontline staff then developed solutions to detected problems. Eighteen months after the beginning of the intervention (in June 2007), which is ongoing, schedulers had gone from using 60% of their registration skills to over 90%, customer service scores had risen from 2.6 to 4.9 (on a 5-point scale), and average access time had fallen from 12 days to 6 days. The program costs $50,000 per year and has been associated with a 35% increase in ambulatory volume across three years. The authors conclude that academic medical centers can markedly improve the scheduling process and access to care and that these improvements may result in increased ambulatory care volume.

  11. Authority Is Relational: Rethinking Educational Empowerment

    ERIC Educational Resources Information Center

    Bingham, Charles

    2008-01-01

    Written in an accessible and personal style, this innovative study of authority in education examines scenarios of authority in ways that problematize, augment, and redefine prevalent ideas of how it works. Usually seen as a thing that people have, the author suggests that authority should be understood instead as a relation that happens between…

  12. Achieving open access to conservation science.

    PubMed

    Fuller, Richard A; Lee, Jasmine R; Watson, James E M

    2014-12-01

    Conservation science is a crisis discipline in which the results of scientific enquiry must be made available quickly to those implementing management. We assessed the extent to which scientific research published since the year 2000 in 20 conservation science journals is publicly available. Of the 19,207 papers published, 1,667 (8.68%) are freely downloadable from an official repository. Moreover, only 938 papers (4.88%) meet the standard definition of open access in which material can be freely reused providing attribution to the authors is given. This compares poorly with a comparable set of 20 evolutionary biology journals, where 31.93% of papers are freely downloadable and 7.49% are open access. Seventeen of the 20 conservation journals offer an open access option, but fewer than 5% of the papers are available through open access. The cost of accessing the full body of conservation science runs into tens of thousands of dollars per year for institutional subscribers, and many conservation practitioners cannot access pay-per-view science through their workplace. However, important initiatives such as Research4Life are making science available to organizations in developing countries. We urge authors of conservation science to pay for open access on a per-article basis or to choose publication in open access journals, taking care to ensure the license allows reuse for any purpose providing attribution is given. Currently, it would cost $51 million to make all conservation science published since 2000 freely available by paying the open access fees currently levied to authors. Publishers of conservation journals might consider more cost effective models for open access and conservation-oriented organizations running journals could consider a broader range of options for open access to nonmembers such as sponsorship of open access via membership fees. © 2014 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of the Society for

  13. The AAS Working Group on Accessibility and Disability (WGAD) Year 1 Highlights and Database Access

    NASA Astrophysics Data System (ADS)

    Knierman, Karen A.; Diaz Merced, Wanda; Aarnio, Alicia; Garcia, Beatriz; Monkiewicz, Jacqueline A.; Murphy, Nicholas Arnold

    2017-06-01

    The AAS Working Group on Accessibility and Disability (WGAD) was formed in January of 2016 with the express purpose of seeking equity of opportunity and building inclusive practices for disabled astronomers at all educational and career stages. In this presentation, we will provide a summary of current activities, focusing on developing best practices for accessibility with respect to astronomical databases, publications, and meetings. Due to the reliance of space sciences on databases, it is important to have user centered design systems for data retrieval. The cognitive overload that may be experienced by users of current databases may be mitigated by use of multi-modal interfaces such as xSonify. Such interfaces would be in parallel or outside the original database and would not require additional software efforts from the original database. WGAD is partnering with the IAU Commission C1 WG Astronomy for Equity and Inclusion to develop such accessibility tools for databases and methods for user testing. To collect data on astronomical conference and meeting accessibility considerations, WGAD solicited feedback from January AAS attendees via a web form. These data, together with upcoming input from the community and analysis of accessibility documents of similar conferences, will be used to create a meeting accessibility document. Additionally, we will update the progress of journal access guidelines and our social media presence via Twitter. We recommend that astronomical journals form committees to evaluate the accessibility of their publications by performing user-centered usability studies.

  14. Access control for electronic patient records.

    PubMed

    Glagola, M J

    1998-01-01

    The transition from hardcopy records to electronic records is in the forefront for healthcare today. For healthcare facilities, a major issue is determining who can access patients' medical information and how access to this information can be controlled. There are three components to access control: identification, authentication and authorization. Checking proof of identity is a means of authenticating someone--through a driver's license, passport or their fingerprints. Similar processes are needed in a computer environment, through the use of passwords, one-time passwords or smartcards, encryption and kerberos, and call-back procedures. New in the area of access control are biometric devices, which are hardware/software combinations that digitize a physical characteristic and compare the sample with previously stored samples. Fingerprints, voiceprints and facial features are examples. Their cost is currently prohibitive, but in time, they may become more common. Digital certificates and certification authorities are other means used to authenticate identify. When a system challenges a user's identity at log on, the user provides a certification that tells the system to go to the issuing certification authority and find proof the user's claim is valid. Low-level certifications offer little value for sensitive data, but high-level certification is now being introduced. It requires more specific, detailed information on the applicant. Authorization, the final component of access control, establishes what a specific user can and cannot access. To have effective access control, transaction logging and system monitoring are needed to ensure the various techniques are being used and performing properly.

  15. 77 FR 20743 - Protective Force Personnel Medical, Physical Readiness, Training, and Access Authorization Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-06

    ...-HQ-2012-0002] RIN 1992-AA40 Protective Force Personnel Medical, Physical Readiness, Training, and... the proposed rule to amend the standards for medical, physical performance, training, and access... proposed rule to revise the standards for medical, physical performance, training, and access...

  16. State Authorization Reciprocity Agreement: Participation and Access to Higher Education

    ERIC Educational Resources Information Center

    Onwuameze, Nkechi

    2017-01-01

    The State Authorization Reciprocity Agreement initiative was launched in 2014 to provide a uniform standard for the regulation of distance education across states in the United States. The system established by the National Council for State Authorization Reciprocity Agreement (NC-SARA) allows willing post-secondary institutions to participate…

  17. Perilous terra incognita--open-access journals.

    PubMed

    Balon, Richard

    2014-04-01

    The author focuses on a new rapidly spreading practice of publication in open-access journals. The pros and cons of open-access journals are discussed. Publishing in these journals may be cost prohibitive for educators and junior faculty members. Some authors may be lured by the ease of publishing in open-access journals (and their, at times, inflated self-description, e.g., "international", "scientific"), and their possibly valuable contributions will escape the attention of Academic Psychiatry readership in the vast sea of open-access journals. The readership may be flooded with a large number of low-quality articles (maybe not even properly peer-reviewed) from open-access journals. It may take some time to sort out what is and what is not relevant and useful. Open-access publishing represents a problematic and controversial practice and may be associated with a conflict of interest for the editors and publishers of these journals.

  18. Reasoning on Weighted Delegatable Authorizations

    NASA Astrophysics Data System (ADS)

    Ruan, Chun; Varadharajan, Vijay

    This paper studies logic based methods for representing and evaluating complex access control policies needed by modern database applications. In our framework, authorization and delegation rules are specified in a Weighted Delegatable Authorization Program (WDAP) which is an extended logic program. We show how extended logic programs can be used to specify complex security policies which support weighted administrative privilege delegation, weighted positive and negative authorizations, and weighted authorization propagations. We also propose a conflict resolution method that enables flexible delegation control by considering priorities of authorization grantors and weights of authorizations. A number of rules are provided to achieve delegation depth control, conflict resolution, and authorization and delegation propagations.

  19. Group Membership Based Authorization to CADC Resources

    NASA Astrophysics Data System (ADS)

    Damian, A.; Dowler, P.; Gaudet, S.; Hill, N.

    2012-09-01

    The Group Membership Service (GMS), implemented at the Canadian Astronomy Data Centre (CADC), is a prototype of what could eventually be an IVOA standard for a distributed and interoperable group membership protocol. Group membership is the core authorization concept that enables teamwork and collaboration amongst astronomers accessing distributed resources and services. The service integrates and complements other access control related IVOA standards such as single-sign-on (SSO) using X.509 proxy certificates and the Credential Delegation Protocol (CDP). The GMS has been used at CADC for several years now, initially as a subsystem and then as a stand-alone Web service. It is part of the authorization mechanism for controlling the access to restricted Web resources as well as the VOSpace service hosted by the CADC. We present the role that GMS plays within the access control system at the CADC, including the functionality of the service and how the different CADC services make use of it to assert user authorization to resources. We also describe the main advantages and challenges of using the service as well as future work to increase its robustness and functionality.

  20. Article processing charges, funding, and open access publishing at Journal of Experimental & Clinical Assisted Reproduction.

    PubMed

    Sills, Eric Scott; Vincent, Tina Thibault; Palermo, Gianpiero D

    2005-01-13

    Journal of Experimental & Clinical Assisted Reproduction is an Open Access, online, electronic journal published by BioMed Central with full contents available to the scientific and medical community free of charge to all readers. Authors maintain the copyright to their own work, a policy facilitating dissemination of data to the widest possible audience without requiring permission from the publisher. This Open Access publishing model is subsidized by authors (or their institutions/funding agencies) in the form of a single pound330 article processing charge (APC), due at the time of manuscript acceptance for publication. Payment of the APC is not a condition for formal peer review and does not apply to articles rejected after review. Additionally, this fee is waived for authors whose institutions are BioMed Central members or where genuine financial hardship exists. Considering ordinary publication fees related to page charges and reprints, the APC at Journal of Experimental & Clinical Assisted Reproduction is comparable to costs associated with publishing in some traditional print journals, and is less expensive than many. Implementation of the APC within this Open Access framework is envisioned as a modern research-friendly policy that supports networking among investigators, brings new research into reach rapidly, and empowers authors with greater control over their own scholarly publications.

  1. 20 CFR 403.140 - If the Commissioner authorizes testimony, what will be the scope and form of that testimony?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false If the Commissioner authorizes testimony, what will be the scope and form of that testimony? 403.140 Section 403.140 Employees' Benefits SOCIAL SECURITY ADMINISTRATION TESTIMONY BY EMPLOYEES AND THE PRODUCTION OF RECORDS AND INFORMATION IN LEGAL...

  2. 48 CFR 252.241-7001 - Government access.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Government access. 252.241... Clauses 252.241-7001 Government access. As prescribed in 241.501-70(b), use the following clause: Government Access (DEC 1991) Authorized representatives of the Government may have access to the Contractor's...

  3. 48 CFR 252.241-7001 - Government access.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Government access. 252.241... Clauses 252.241-7001 Government access. As prescribed in 241.501-70(b), use the following clause: Government Access (DEC 1991) Authorized representatives of the Government may have access to the Contractor's...

  4. 48 CFR 252.241-7001 - Government access.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Government access. 252.241... Clauses 252.241-7001 Government access. As prescribed in 241.501-70(b), use the following clause: Government Access (DEC 1991) Authorized representatives of the Government may have access to the Contractor's...

  5. 48 CFR 252.241-7001 - Government access.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Government access. 252.241... Clauses 252.241-7001 Government access. As prescribed in 241.501-70(b), use the following clause: Government Access (DEC 1991) Authorized representatives of the Government may have access to the Contractor's...

  6. 48 CFR 252.241-7001 - Government access.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Government access. 252.241... Clauses 252.241-7001 Government access. As prescribed in 241.501-70(b), use the following clause: Government Access (DEC 1991) Authorized representatives of the Government may have access to the Contractor's...

  7. 78 FR 8223 - Proposed Collection; Comment Request for Form 8879-C and Form 8879-I

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-05

    ... Form 8879-C, IRS e-file Signature Authorization for Form 1120, and Form 8879-I, IRS e-file Signature...: IRS e-file Signature Authorization for Form 1120; IRS e-file Signature Authorization for Form 1120-F. OMB Number: 1545-1864. Form Number: 8879-C; 8879-I. Abstract: The Form 8879-C, IRS e-file Signature...

  8. 48 CFR 3053.303 - Agency forms.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... section illustrates agency-specified forms. To access these forms go to: http://www.dhs.gov (under “Business, Acquisition Information”) or https://dhsonline.dhs.gov/portal/jhtml/general/forms.jhtml. Form...

  9. 48 CFR 3053.303 - Agency forms.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... section illustrates agency-specified forms. To access these forms go to: http://www.dhs.gov (under “Business, Acquisition Information”) or https://dhsonline.dhs.gov/portal/jhtml/general/forms.jhtml. Form...

  10. 48 CFR 3053.303 - Agency forms.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... section illustrates agency-specified forms. To access these forms go to: http://www.dhs.gov (under “Business, Acquisition Information”) or https://dhsonline.dhs.gov/portal/jhtml/general/forms.jhtml. Form...

  11. 48 CFR 3053.303 - Agency forms.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... section illustrates agency-specified forms. To access these forms go to: http://www.dhs.gov (under “Business, Acquisition Information”) or https://dhsonline.dhs.gov/portal/jhtml/general/forms.jhtml. Form...

  12. 48 CFR 3053.303 - Agency forms.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... section illustrates agency-specified forms. To access these forms go to: http://www.dhs.gov (under “Business, Acquisition Information”) or https://dhsonline.dhs.gov/portal/jhtml/general/forms.jhtml. Form...

  13. Access to scientific publications: the scientist's perspective.

    PubMed

    Voronin, Yegor; Myrzahmetov, Askar; Bernstein, Alan

    2011-01-01

    Scientific publishing is undergoing significant changes due to the growth of online publications, increases in the number of open access journals, and policies of funders and universities requiring authors to ensure that their publications become publicly accessible. Most studies of the impact of these changes have focused on the growth of articles available through open access or the number of open-access journals. Here, we investigated access to publications at a number of institutes and universities around the world, focusing on publications in HIV vaccine research--an area of biomedical research with special importance to the developing world. We selected research papers in HIV vaccine research field, creating: 1) a first set of 50 most recently published papers with keywords "HIV vaccine" and 2) a second set of 200 articles randomly selected from those cited in the first set. Access to the majority (80%) of the recently published articles required subscription, while cited literature was much more accessible (67% freely available online). Subscriptions at a number of institutions around the world were assessed for providing access to subscription-only articles from the two sets. The access levels varied widely, ranging among institutions from 20% to 90%. Through the WHO-supported HINARI program, institutes in low-income countries had access comparable to that of institutes in the North. Finally, we examined the response rates for reprint requests sent to corresponding authors, a method commonly used before internet access became widespread. Contacting corresponding authors with requests for electronic copies of articles by email resulted in a 55-60% success rate, although in some cases it took up to 1.5 months to get a response. While research articles are increasingly available on the internet in open access format, institutional subscriptions continue to play an important role. However, subscriptions do not provide access to the full range of HIV vaccine

  14. Lessons about So-Called "Difficult" Patients from the UK Controversy over Patient Access to Electronic Health Records.

    PubMed

    Lucivero, Federica

    2017-04-01

    Increasing numbers of patients have direct access to their electronic health records (EHRs). Proponents of direct access argue that it empowers patients by making them more informed and offering them more control over their health and care. According to some proponents of patients' access to EHRs, clinicians' concerns about potential negative implications are grounded in a form of paternalism that protects clinicians' authority. This paper draws upon narratives from patients in the United Kingdom (UK) who have access to their EHRs and suggests strategies for moving beyond these controversies between proponents and critics of the system. It additionally shows that the very organizational, procedural, and technological infrastructure that promises patients' increased access to records can also exacerbate some patients' "difficult" behaviors. © 2017 American Medical Association. All Rights Reserved.

  15. NASA thesaurus. Volume 2: Access vocabulary

    NASA Technical Reports Server (NTRS)

    1985-01-01

    The Access Vocabulary, which is essentially a permuted index, provides access to any word or number in authorized postable and nonpostable terms. Additional entries include postable and nonpostable terms, other word entries, and pseudo-multiword terms that are permutations of words that contain words within words. The Access Vocabulary contains 40,738 entries that give increased access to the hierarchies in Volume 1 - Hierarchical Listing.

  16. NASA Thesaurus. Volume 2: Access vocabulary

    NASA Technical Reports Server (NTRS)

    1982-01-01

    The Access Vocabulary, which is essentially a permuted index, provides access to any word or number in authorized postable and nonpostable terms. Additional entries include postable and nonpostable terms, other word entries, and pseudo-multiword terms that are permutations of words that contain words within words. The Access Vocabulary contains, 40,661 entries that give increased access to he hierarchies in Volume 1 - Hierarchical Listing.

  17. NASA thesaurus. Volume 2: Access vocabulary

    NASA Technical Reports Server (NTRS)

    1988-01-01

    The access vocabulary, which is essentially a permuted index, provides access to any word or number in authorized postable and nonpostable terms. Additional entries include postable and nonpostable terms, other word entries and pseudo-multiword terms that are permutations of words that contain words within words. The access vocabulary contains almost 42,000 entries that give increased access to the hierarchies in Volume 1 - Hierarchical Listing.

  18. Forming-free and self-rectifying resistive switching of the simple Pt/TaOx/n-Si structure for access device-free high-density memory application

    NASA Astrophysics Data System (ADS)

    Gao, Shuang; Zeng, Fei; Li, Fan; Wang, Minjuan; Mao, Haijun; Wang, Guangyue; Song, Cheng; Pan, Feng

    2015-03-01

    The search for self-rectifying resistive memories has aroused great attention due to their potential in high-density memory applications without additional access devices. Here we report the forming-free and self-rectifying bipolar resistive switching behavior of a simple Pt/TaOx/n-Si tri-layer structure. The forming-free phenomenon is attributed to the generation of a large amount of oxygen vacancies, in a TaOx region that is in close proximity to the TaOx/n-Si interface, via out-diffusion of oxygen ions from TaOx to n-Si. A maximum rectification ratio of ~6 × 102 is obtained when the Pt/TaOx/n-Si devices stay in a low resistance state, which originates from the existence of a Schottky barrier between the formed oxygen vacancy filament and the n-Si electrode. More importantly, numerical simulation reveals that the self-rectifying behavior itself can guarantee a maximum crossbar size of 212 × 212 (~44 kbit) on the premise of 10% read margin. Moreover, satisfactory switching uniformity and retention performance are observed based on this simple tri-layer structure. All of these results demonstrate the great potential of this simple Pt/TaOx/n-Si tri-layer structure for access device-free high-density memory applications.The search for self-rectifying resistive memories has aroused great attention due to their potential in high-density memory applications without additional access devices. Here we report the forming-free and self-rectifying bipolar resistive switching behavior of a simple Pt/TaOx/n-Si tri-layer structure. The forming-free phenomenon is attributed to the generation of a large amount of oxygen vacancies, in a TaOx region that is in close proximity to the TaOx/n-Si interface, via out-diffusion of oxygen ions from TaOx to n-Si. A maximum rectification ratio of ~6 × 102 is obtained when the Pt/TaOx/n-Si devices stay in a low resistance state, which originates from the existence of a Schottky barrier between the formed oxygen vacancy filament and the n

  19. 49 CFR 8.11 - Authority to classify information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ....11 Transportation Office of the Secretary of Transportation CLASSIFIED INFORMATION: CLASSIFICATION/DECLASSIFICATION/ACCESS Classification/Declassification of Information § 8.11 Authority to classify information. (a... information as SECRET or CONFIDENTIAL with further authorization to delegate this authority. (b) The following...

  20. 49 CFR 8.11 - Authority to classify information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ....11 Transportation Office of the Secretary of Transportation CLASSIFIED INFORMATION: CLASSIFICATION/DECLASSIFICATION/ACCESS Classification/Declassification of Information § 8.11 Authority to classify information. (a... information as SECRET or CONFIDENTIAL with further authorization to delegate this authority. (b) The following...

  1. 49 CFR 8.11 - Authority to classify information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ....11 Transportation Office of the Secretary of Transportation CLASSIFIED INFORMATION: CLASSIFICATION/DECLASSIFICATION/ACCESS Classification/Declassification of Information § 8.11 Authority to classify information. (a... information as SECRET or CONFIDENTIAL with further authorization to delegate this authority. (b) The following...

  2. 49 CFR 8.11 - Authority to classify information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ....11 Transportation Office of the Secretary of Transportation CLASSIFIED INFORMATION: CLASSIFICATION/DECLASSIFICATION/ACCESS Classification/Declassification of Information § 8.11 Authority to classify information. (a... information as SECRET or CONFIDENTIAL with further authorization to delegate this authority. (b) The following...

  3. 49 CFR 8.11 - Authority to classify information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ....11 Transportation Office of the Secretary of Transportation CLASSIFIED INFORMATION: CLASSIFICATION/DECLASSIFICATION/ACCESS Classification/Declassification of Information § 8.11 Authority to classify information. (a... information as SECRET or CONFIDENTIAL with further authorization to delegate this authority. (b) The following...

  4. 15 CFR 922.47 - Pre-existing authorizations or rights and certifications of pre-existing authorizations or rights.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... rights of subsistence use or access in existence on the date of designation of any National Marine... leases, permits, licenses, or rights consistent with the purposes for which the Sanctuary was designated... authorized by a valid lease, permit, license, approval or other authorization in existence on the effective...

  5. 15 CFR 922.47 - Pre-existing authorizations or rights and certifications of pre-existing authorizations or rights.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... rights of subsistence use or access in existence on the date of designation of any National Marine... leases, permits, licenses, or rights consistent with the purposes for which the Sanctuary was designated... authorized by a valid lease, permit, license, approval or other authorization in existence on the effective...

  6. Federal Facilities Inspections: A Guide to EPA's Access and Inspection Authorities

    EPA Pesticide Factsheets

    This brochure outlines the legal authority for EPA, or one of its authorized representatives, to inspect a federal facility for compliance with environmental laws. It also identifies the federal, state, or tribal inspectors who may conduct inspections.

  7. An evaluation of emergency medicine investigators' views on open access to medical literature.

    PubMed

    Rodriguez, R M; Wong, J; Hardy, J; Frankel, E

    2006-12-01

    Scientists and governmental agencies have called for free universal access to research publications via the internet--open access. To examine the current medical literature reading practices of emergency medicine investigators (EMIs) and their views towards open access. Surveys were mailed to the 212 corresponding authors of all original research articles published in years 2002 and 2003 in the Annals of Emergency Medicine, Academic Emergency Medicine and The Journal of Emergency Medicine. The most commonly read forms of medical literature reported by the 129 (61%) EMI respondents were hard-copy medical journals and online literature review services. 59% of EMIs were in favour of open access; 58% stated they would read a wider variety of medical literature; 21% believed open access would improve the quality of publications and 39% thought it would decrease the quality. When asked how a US 1500 dollars fee for open access would affect their ability to publish research, 69% said it would greatly impede and 19% said it would slightly impede their research. Despite concerns that open access may impede their ability to publish research and decrease the quality of publications, most EMIs surveyed favoured open access. They believed open access would increase and broaden their medical literature reading.

  8. 31 CFR 315.7 - Authorized forms of registration.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    .... Example: John A. Jones 123-45-6789. (2) Coownership form. A bond may be registered in the names of two...: John A. Jones 123-45-6789 or Ella S. Jones 987-65-4321. John A. Jones 123-45-6789 or (Miss, Ms. or Mrs... abbreviated to “P.O.D.” Examples: John A. Jones 123-45-6789 payable on death to Mrs. Ella S. Jones. John A...

  9. Accessibility Considerations for Hybrid Courses

    ERIC Educational Resources Information Center

    Behling, Kirsten

    2017-01-01

    This chapter explores the central questions and issues that faculty and administrators need to consider when designing and implementing hybrid courses to ensure that all students, including those with disabilities, have equal access. The author offers resources on faculty development programs, accessibility checklists, and online resources on…

  10. 45 CFR 150.325 - Settlement authority.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Settlement authority. 150.325 Section 150.325 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS CMS... Governmental Plans-Civil Money Penalties § 150.325 Settlement authority. Nothing in §§ 150.315 through 150.323...

  11. Registered access: a 'Triple-A' approach.

    PubMed

    Dyke, Stephanie O M; Kirby, Emily; Shabani, Mahsa; Thorogood, Adrian; Kato, Kazuto; Knoppers, Bartha M

    2016-12-01

    We propose a standard model for a novel data access tier - registered access - to facilitate access to data that cannot be published in open access archives owing to ethical and legal risk. Based on an analysis of applicable research ethics and other legal and administrative frameworks, we discuss the general characteristics of this Registered Access Model, which would comprise a three-stage approval process: Authentication, Attestation and Authorization. We are piloting registered access with the Demonstration Projects of the Global Alliance for Genomics and Health for which it may provide a suitable mechanism for access to certain data types and to different types of data users.

  12. 32 CFR 1909.18 - Termination of access.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Requests for Historical Access § 1909.18 Termination of access. The Coordinator shall cancel any authorization whenever the Director of Personnel Security cancels the security clearance of a requester (or...

  13. Access to a Car and the Self-Reported Health and Mental Health of People Aged 65 and Older in Northern Ireland.

    PubMed

    Doebler, Stefanie

    2016-05-01

    This article examines relationships between access to a car and the self-reported health and mental health of older people. The analysis is based on a sample of N = 65,601 individuals aged 65 years and older from the Northern Ireland Longitudinal Study linked to 2001 and 2011 census returns. The findings from hierarchical linear and binary logistic multilevel path models indicate that having no access to a car is related to a considerable health and mental health disadvantage particularly for older people who live alone. Rural-urban health and mental health differences are mediated by access to a car. The findings support approaches that emphasize the importance of autonomy and independence for the well-being of older people and indicate that not having access to a car can be a problem for older people not only in rural but also in intermediate and urban areas, if no sufficient alternative forms of mobility are provided. © The Author(s) 2015.

  14. Selective access and editing in a database

    NASA Technical Reports Server (NTRS)

    Maluf, David A. (Inventor); Gawdiak, Yuri O. (Inventor)

    2010-01-01

    Method and system for providing selective access to different portions of a database by different subgroups of database users. Where N users are involved, up to 2.sup.N-1 distinguishable access subgroups in a group space can be formed, where no two access subgroups have the same members. Two or more members of a given access subgroup can edit, substantially simultaneously, a document accessible to each member.

  15. Sent packing: protein engineering generates a new crystal form of Pseudomonas aeruginosa DsbA1 with increased catalytic surface accessibility

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McMahon, Roisin M., E-mail: r.mcmahon1@uq.edu.au; Coinçon, Mathieu; Tay, Stephanie

    The crystal structure of a P. aeruginosa DsbA1 variant is more suitable for fragment-based lead discovery efforts to identify inhibitors of this antimicrobial drug target. In the reported structures the active site of the protein can simultaneously bind multiple ligands introduced in the crystallization solution or via soaking. Pseudomonas aeruginosa is an opportunistic human pathogen for which new antimicrobial drug options are urgently sought. P. aeruginosa disulfide-bond protein A1 (PaDsbA1) plays a pivotal role in catalyzing the oxidative folding of multiple virulence proteins and as such holds great promise as a drug target. As part of a fragment-based lead discoverymore » approach to PaDsbA1 inhibitor development, the identification of a crystal form of PaDsbA1 that was more suitable for fragment-soaking experiments was sought. A previously identified crystallization condition for this protein was unsuitable, as in this crystal form of PaDsbA1 the active-site surface loops are engaged in the crystal packing, occluding access to the target site. A single residue involved in crystal-packing interactions was substituted with an amino acid commonly found at this position in closely related enzymes, and this variant was successfully used to generate a new crystal form of PaDsbA1 in which the active-site surface is more accessible for soaking experiments. The PaDsbA1 variant displays identical redox character and in vitro activity to wild-type PaDsbA1 and is structurally highly similar. Two crystal structures of the PaDsbA1 variant were determined in complex with small molecules bound to the protein active site. These small molecules (MES, glycerol and ethylene glycol) were derived from the crystallization or cryoprotectant solutions and provide a proof of principle that the reported crystal form will be amenable to co-crystallization and soaking with small molecules designed to target the protein active-site surface.« less

  16. 14 CFR 1262.109 - Delegations of authority.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Delegations of authority. 1262.109 Section 1262.109 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION EQUAL ACCESS TO JUSTICE ACT IN AGENCY PROCEEDINGS General Provisions § 1262.109 Delegations of authority. (a) The NASA...

  17. Making Microcomputers Accessible to Blind Persons.

    ERIC Educational Resources Information Center

    Ruconich, Sandra K.; And Others

    1986-01-01

    The article considers advantages and limitations of tactile, auditory, and visual means of microcomputer access for blind students. Discussed are electronic braille, paper braille, the Optacon, synthesized speech, and enlarged print. Improved multimedia access technology is predicted for the future. (Author/DB)

  18. 32 CFR Appendix B to Part 505 - Denial Authorities for Records Under Their Authority (Formerly Access and Amendment Refusal...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... the Army (Manpower and Reserve Affairs) is authorized to act on requests for civilian personnel... and reports that result in criminal investigation reports. This authority has been delegated to the...

  19. 32 CFR Appendix B to Part 505 - Denial Authorities for Records Under Their Authority (Formerly Access and Amendment Refusal...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... the Army (Manpower and Reserve Affairs) is authorized to act on requests for civilian personnel... and reports that result in criminal investigation reports. This authority has been delegated to the...

  20. 32 CFR Appendix B to Part 505 - Denial Authorities for Records Under Their Authority (Formerly Access and Amendment Refusal...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... the Army (Manpower and Reserve Affairs) is authorized to act on requests for civilian personnel... and reports that result in criminal investigation reports. This authority has been delegated to the...

  1. 32 CFR Appendix B to Part 505 - Denial Authorities for Records Under Their Authority (Formerly Access and Amendment Refusal...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... the Army (Manpower and Reserve Affairs) is authorized to act on requests for civilian personnel... and reports that result in criminal investigation reports. This authority has been delegated to the...

  2. 32 CFR Appendix B to Part 505 - Denial Authorities for Records Under Their Authority (Formerly Access and Amendment Refusal...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... the Army (Manpower and Reserve Affairs) is authorized to act on requests for civilian personnel... and reports that result in criminal investigation reports. This authority has been delegated to the...

  3. 17 CFR 201.37 - Delegations of authority.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Delegations of authority. 201.37 Section 201.37 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION RULES OF PRACTICE Regulations Pertaining to the Equal Access to Justice Act § 201.37 Delegations of authority. (a...

  4. 7 CFR 1468.32 - Access to operating unit.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... the contract. Access shall include the right to provide technical assistance and inspect any work... § 1468.32 Access to operating unit. Any authorized CCC representative shall have the right to enter an... participant prior to the exercise of this right to access. ...

  5. J2ME implementation of system for storing and accessing of sensitive data on patient's mobile device

    NASA Astrophysics Data System (ADS)

    Zabołotny, Wojciech M.; Wielgórski, Radosław; Nowik, Marcin

    2011-10-01

    This paper presents a system allowing to use a patient's mobile phone or PDA for storing of biomedical data, which then, during medical consultation or intervention may be used by the medical staff. The presented solution is aimed on providing both: reliable protection to sensitive patient's data, and easy access to information for authorized medical staff. In the presented system, data are stored in an encrypted form, and the encryption key is available only for authorized persons. The central authentication server verifies the current access rights of the person trying to obtain the information, before providing him or her with the key needed to access the patient's data. The key provided by the server is valid only for the particular device, which minimizes the risk of its misuse. For rare situations when no connection to the authentication server is available (e.g. intervention in the mountains or rural area), system assures an additional "emergency" method to access the encryption key in controlled, registered way. The system has been implemented in Java language and tested in the simulated environment provided by Sun Java Wireless Toolkit for CLDC.

  6. Positioning Your Library in an Open-Access Environment

    ERIC Educational Resources Information Center

    Bhatt, Anjana H.

    2010-01-01

    This paper is a summary of the project that the author completed at Florida Gulf Coast University (FGCU) library for providing online access to 80 open access E-journals and digital collections. Although FGCU uses SerialsSolutions products to establish online access, any one can provide access to these collections as they are free for all. Paper…

  7. 76 FR 19707 - Classified Information: Classification/Declassification/Access; Authority To Classify Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-08

    ... SECRET or CONFIDENTIAL to the Administrator of the Federal Aviation Administration, and to the Assistant... authority to originally classify information as SECRET or CONFIDENTIAL, with further authorization to...

  8. The secure authorization model for healthcare information system.

    PubMed

    Hsu, Wen-Shin; Pan, Jiann-I

    2013-10-01

    Exploring healthcare system for assisting medical services or transmitting patients' personal health information in web application has been widely investigated. Information and communication technologies have been applied to the medical services and healthcare area for a number of years to resolve problems in medical management. In the healthcare system, not all users are allowed to access all the information. Several authorization models for restricting users to access specific information at specific permissions have been proposed. However, as the number of users and the amount of information grows, the difficulties for administrating user authorization will increase. The critical problem limits the widespread usage of the healthcare system. This paper proposes an approach for role-based and extends it to deal with the information for authorizations in the healthcare system. We propose the role-based authorization model which supports authorizations for different kinds of objects, and a new authorization domain. Based on this model, we discuss the issues and requirements of security in the healthcare systems. The security issues for services shared between different healthcare industries will also be discussed.

  9. 76 FR 36620 - Proposed Collection; Comment Request for Form 8453-F and Form 8879-F

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-22

    ... Filing and Form 8879-F, IRS e-file Signature Authorization for Form 1041. DATES: Written comments should... electronic or magnetic media transmission, will comprise the taxpayer's income tax return (Form 1041). Title: IRS e-file Signature Authorization for Form 1041. OMB Number: 1545-0967. Form Number: 8879-F. Abstract...

  10. Accessibility to editorial information in Oral and Maxillofacial Surgery journals: The authors' point of view.

    PubMed

    Castelo-Baz, Pablo; Leira-Feijoo, Yago; Seoane-Romero, Juan Manuel; Varela-Centelles, Pablo; Seoane, Juan

    2015-09-01

    To evaluate the accessibility to editorial information in Oral & Maxillofacial Surgery journals. A cross-sectional study using the WOS-Web of Science database in three categories: "Surgery," "Otorhinolaryngology," and "Dentistry, Oral Surgery & Medicine" was designed. Journals were filtered by title and classified under three headings: OMFS specialty; OMFS subspecialty and related sciences; and multidisciplinary journals. Specialty scope (OMFS vs. other); impact factor; path for the manuscript; blinding policy; accessibility to reviewers' criteria; and percentage of acceptance. Only 46 of 330 journals met the inclusion criteria. All OMFS journals provided comprehensive information about the review process, compared to 5 of 27 (18.5%) of Oral Surgery and related sciences periodicals. Most specialty journals do not inform about the blind review mode used (20 of 33; 60.6%). Generally, information about the reviewers' assessment criteria is scarce, but is available from all OMFS journals, which also state the percentage of manuscript acceptance (100% vs. 14.8%). OMFS JCR journals provide adequate information about their editorial process in terms of path for the manuscript, accessibility to reviewers' criteria, and percentage of acceptance. Additional efforts are needed to increase accessibility to information about blinding policy and average time from submission to acceptance. Copyright © 2015 European Association for Cranio-Maxillo-Facial Surgery. Published by Elsevier Ltd. All rights reserved.

  11. Secure web-based access to radiology: forms and databases for fast queries

    NASA Astrophysics Data System (ADS)

    McColl, Roderick W.; Lane, Thomas J.

    2002-05-01

    Currently, Web-based access to mini-PACS or similar databases commonly utilizes either JavaScript, Java applets or ActiveX controls. Many sites do not permit applets or controls or other binary objects for fear of viruses or worms sent by malicious users. In addition, the typical CGI query mechanism requires several parameters to be sent with the http GET/POST request, which may identify the patient in some way; this in unacceptable for privacy protection. Also unacceptable are pages produced by server-side scripts which can be cached by the browser, since these may also contain sensitive information. We propose a simple mechanism for access to patient information, including images, which guarantees security of information, makes it impossible to bookmark the page, or to return to the page after some defined length of time. In addition, this mechanism is simple, therefore permitting rapid access without the need to initially download an interface such as an applet or control. In addition to image display, the design of the site allows the user to view and save movies of multi-phasic data, or to construct multi-frame datasets from entire series. These capabilities make the site attractive for research purposes such as teaching file preparation.

  12. 31 CFR 6.7 - Delegations of authority.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Delegations of authority. 6.7 Section 6.7 Money and Finance: Treasury Office of the Secretary of the Treasury APPLICATIONS FOR AWARDS UNDER THE EQUAL ACCESS TO JUSTICE ACT General Provisions § 6.7 Delegations of authority. The Director...

  13. The future of academic publishing: what is open access?

    PubMed

    Collins, Jannette

    2005-04-01

    For more than 200 years, publishers have been charging users (i.e., subscribers) for access to scientific information to make a profit. Authors have been required to grant copyright ownership to the publisher. This system was not questioned until the Internet popularized electronic publishing. The Internet allows for rapid dissemination of information to millions of readers. Some people have seen this as an opportunity to revolutionize the system of scientific publishing and to make it one that provides free, open access to all scientific information to all persons everywhere in the world. Such systems have been launched and have instigated a wave of dialogue among proponents and opponents alike. At the center of the controversy is the issue of who will pay for the costs of publishing, because an open-access system is not free, and this threatens the backbone of the traditional publishing industry. Currently, open-access publishers charge authors a fee to have their articles published. Because of this and the uncertainty of the sustainability of the open-access system, some authors are hesitant to participate in the new system. This article reviews the events that led to the creation of open-access publishing, the arguments for and against it, and the implications of open access for the future of academic publishing.

  14. Patent law--balancing profit maximization and public access to technology.

    PubMed

    Beckerman-Rodau, Andrew

    2003-01-01

    This article addresses the contemporary issue of balancing the need for patent protection for intellectual property with the resulting restriction of public access to new technology. The author argues that patent law protects private property rights rather than creating monopolies. Additionally, the author discusses how restricting access to patented technology, such as pharmaceuticals, can affect public health problems, such as the HIV/AIDS epidemic in developing nations. The author then concludes with some proposals for making patented technology available to people in developing nations who need access to such technology but who are unable to afford its high costs due to patent protection.

  15. Accessible solitons of fractional dimension

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhong, Wei-Ping, E-mail: zhongwp6@126.com; Texas A&M University at Qatar, P.O. Box 23874, Doha; Belić, Milivoj

    We demonstrate that accessible solitons described by an extended Schrödinger equation with the Laplacian of fractional dimension can exist in strongly nonlocal nonlinear media. The soliton solutions of the model are constructed by two special functions, the associated Legendre polynomials and the Laguerre polynomials in the fraction-dimensional space. Our results show that these fractional accessible solitons form a soliton family which includes crescent solitons, and asymmetric single-layer and multi-layer necklace solitons. -- Highlights: •Analytic solutions of a fractional Schrödinger equation are obtained. •The solutions are produced by means of self-similar method applied to the fractional Schrödinger equation with parabolic potential.more » •The fractional accessible solitons form crescent, asymmetric single-layer and multilayer necklace profiles. •The model applies to the propagation of optical pulses in strongly nonlocal nonlinear media.« less

  16. External access to ALICE controls conditions data

    NASA Astrophysics Data System (ADS)

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  17. The INDIGO-Datacloud Authentication and Authorization Infrastructure

    NASA Astrophysics Data System (ADS)

    Ceccanti, A.; Hardt, M.; Wegh, B.; Millar, AP; Caberletti, M.; Vianello, E.; Licehammer, S.

    2017-10-01

    Contemporary distributed computing infrastructures (DCIs) are not easily and securely accessible by scientists. These computing environments are typically hard to integrate due to interoperability problems resulting from the use of different authentication mechanisms, identity negotiation protocols and access control policies. Such limitations have a big impact on the user experience making it hard for user communities to port and run their scientific applications on resources aggregated from multiple providers. The INDIGO-DataCloud project wants to provide the services and tools needed to enable a secure composition of resources from multiple providers in support of scientific applications. In order to do so, a common AAI architecture has to be defined that supports multiple authentication mechanisms, support delegated authorization across services and can be easily integrated in off-the-shelf software. In this contribution we introduce the INDIGO Authentication and Authorization Infrastructure, describing its main components and their status and how authentication, delegation and authorization flows are implemented across services.

  18. Quantum secret sharing for a general quantum access structure

    NASA Astrophysics Data System (ADS)

    Bai, Chen-Ming; Li, Zhi-Hui; Si, Meng-Meng; Li, Yong-Ming

    2017-10-01

    Quantum secret sharing is a procedure for sharing a secret among a number of participants such that only certain subsets of participants can collaboratively reconstruct it, which are called authorized sets. The quantum access structure of a secret sharing is a family of all authorized sets. Firstly, in this paper, we propose the concept of decomposition of quantum access structure to design a quantum secret sharing scheme. Secondly, based on a maximal quantum access structure (MQAS) [D. Gottesman, Phys. Rev. A 61, 042311 (2000)], we propose an algorithm to improve a MQAS and obtain an improved maximal quantum access structure (IMQAS). Then, we present a sufficient and necessary condition about IMQAS, which shows the relationship between the minimal authorized sets and the players. In accordance with properties, we construct an efficient quantum secret sharing scheme with a decomposition and IMQAS. A major advantage of these techniques is that it allows us to construct a method to realize a general quantum access structure. Finally, we present two kinds of quantum secret sharing schemes via the thought of concatenation or a decomposition of quantum access structure. As a consequence, we find that the application of these techniques allows us to save more quantum shares and reduces more cost than the existing scheme.

  19. Computer access security code system

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  20. Evaluating transportation equity : an intermetropolitan comparison of regional accessibility and urban form.

    DOT National Transportation Integrated Search

    2013-06-01

    The concept of accessibility is used as the measurement tool to assess the link between social equity and the built environment because : it simultaneously accounts for both land-use patterns and a transportation system. This study compares 25 metrop...

  1. 40 CFR 1400.6 - Enhanced local access.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...); DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.6 Enhanced local access. (a) OCA data elements. Consistent with 42 U.S.C...) OCA information. (1) LEPCs and related local government agencies are authorized and encouraged to...

  2. 40 CFR 1400.6 - Enhanced local access.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...); DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.6 Enhanced local access. (a) OCA data elements. Consistent with 42 U.S.C...) OCA information. (1) LEPCs and related local government agencies are authorized and encouraged to...

  3. 40 CFR 1400.6 - Enhanced local access.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...); DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.6 Enhanced local access. (a) OCA data elements. Consistent with 42 U.S.C...) OCA information. (1) LEPCs and related local government agencies are authorized and encouraged to...

  4. 40 CFR 1400.6 - Enhanced local access.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...); DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.6 Enhanced local access. (a) OCA data elements. Consistent with 42 U.S.C...) OCA information. (1) LEPCs and related local government agencies are authorized and encouraged to...

  5. Best practices for scholarly authors in the age of predatory journals.

    PubMed

    Beall, J

    2016-02-01

    'Continuous effort, not strength or intelligence, is the key to understanding our potential.' Margaret J Wheatley. The focus of any academic or research author is to share his or her findings, and to gain respect and reward for publishing. The ideal journal is one that not only publishes an article quickly but also helps the author to improve the article before publication through peer review, selects only the best research so that the author's article lies alongside other high quality articles, and provides maximum (and long-term) visibility and access to the article. Unfortunately, in the real world, authors need to make tradeoffs between high quality journals, those that work quickly, those that are willing to accept the article and those that provide the best access. Into this mix has come the potential of open access as a means of increasing visibility: journals publish the article without a subscription barrier so anyone, anywhere, can read the article. However, the growth of open access (pushed by institutions, grant bodies and governments as a means of improving human health and knowledge) has come with some unforeseen consequences. In this article, Jeffrey Beall discusses one recent phenomenon that has arisen from the open access movement: that of 'predatory publishers'. These are individuals or companies that use the open access financial system (author pays, rather than library subscribes) to defraud authors and readers by promising reputable publishing platforms but delivering nothing of the sort. They frequently have imaginary editorial boards, do not operate any peer review or quality control, are unclear about payment requirements and opaque about ownership or location, include plagiarised content and publish whatever somebody will pay them to publish. Predatory publishers generally make false promises to authors and behave unethically. They also undermine the scholarly information and publishing environment with a deluge of poor quality, unchecked

  6. Accessible Bus Service in Palm Beach County, Florida

    DOT National Transportation Integrated Search

    1983-03-01

    The Palm Beach County Transportation Authority introduced accessible fixed-route service on its countywide CoTran bus service in May 1980. CoTran provided 100% (full-fleet) accessible service, using 23 retrofitted buses and 40 new buses, all equipped...

  7. Memory availability and referential access

    PubMed Central

    Johns, Clinton L.; Gordon, Peter C.; Long, Debra L.; Swaab, Tamara Y.

    2013-01-01

    Most theories of coreference specify linguistic factors that modulate antecedent accessibility in memory; however, whether non-linguistic factors also affect coreferential access is unknown. Here we examined the impact of a non-linguistic generation task (letter transposition) on the repeated-name penalty, a processing difficulty observed when coreferential repeated names refer to syntactically prominent (and thus more accessible) antecedents. In Experiment 1, generation improved online (event-related potentials) and offline (recognition memory) accessibility of names in word lists. In Experiment 2, we manipulated generation and syntactic prominence of antecedent names in sentences; both improved online and offline accessibility, but only syntactic prominence elicited a repeated-name penalty. Our results have three important implications: first, the form of a referential expression interacts with an antecedent’s status in the discourse model during coreference; second, availability in memory and referential accessibility are separable; and finally, theories of coreference must better integrate known properties of the human memory system. PMID:24443621

  8. Expanded Access Programs

    PubMed Central

    Van Campen, Luann E.; Garnett, Timothy

    2015-01-01

    Expanded access is a regulatory mechanism by which an investigational drug can be made available outside of a clinical trial to treat patients with serious or life-threatening conditions for which there are no satisfactory treatment options. An expanded access program (EAP) is the formal plan under which preapproval access to an investigational drug can be provided to a group of patients. Although an EAP is a regulated program, the decision to authorize an EAP is the responsibility of the biopharmaceutical sponsor. Because of the significant impact an EAP can have on current patients, drug development, and future patients, we propose that a sponsor’s decision must be based not only on regulatory criteria but also on ethical and practical considerations regarding implementation of an EAP. Such an approach will help ensure that decisions and plans uphold ethical precepts such as fairness, promoting good, and minimizing risk of harm. PMID:29473010

  9. Handprinted Forms and Characters

    National Institute of Standards and Technology Data Gateway

    NIST Handprinted Forms and Characters (Web, free access)   NIST Special Database 19 contains NIST's entire corpus of training materials for handprinted document and character recognition. It supersedes NIST Special Databases 3 and 7.

  10. Questioning the efficacy of 'gold' open access to published articles.

    PubMed

    Fredericks, Suzanne

    2015-07-01

    To question the efficacy of 'gold' open access to published articles. Open access is unrestricted access to academic, theoretical and research literature that is scholarly and peer-reviewed. Two models of open access exist: 'gold' and 'green'. Gold open access provides everyone with access to articles during all stages of publication, with processing charges paid by the author(s). Green open access involves placing an already published article into a repository to provide unrestricted access, with processing charges incurred by the publisher. This is a discussion paper. An exploration of the relative benefits and drawbacks of the 'gold' and 'green' open access systems. Green open access is a more economic and efficient means of granting open access to scholarly literature but a large number of researchers select gold open access journals as their first choices for manuscript submissions. This paper questions the efficacy of gold open access models and presents an examination of green open access models to encourage nurse researchers to consider this approach. In the current academic environment, with increased pressures to publish and low funding success rates, it is difficult to understand why gold open access still exists. Green open access enhances the visibility of an academic's work, as increased downloads of articles tend to lead to increased citations. Green open access is the cheaper option, as well as the most beneficial choice, for universities that want to provide unrestricted access to all literature at minimal risk.

  11. 24 CFR 5.905 - What special authority is there to obtain access to sex offender registration information?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... obtain access to sex offender registration information? 5.905 Section 5.905 Housing and Urban Development... access to sex offender registration information? (a) PHA obligation to obtain sex offender registration... applying for admission to any federally assisted housing program is subject to a lifetime sex offender...

  12. 24 CFR 5.905 - What special authority is there to obtain access to sex offender registration information?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... obtain access to sex offender registration information? 5.905 Section 5.905 Housing and Urban Development... access to sex offender registration information? (a) PHA obligation to obtain sex offender registration... applying for admission to any federally assisted housing program is subject to a lifetime sex offender...

  13. 24 CFR 5.905 - What special authority is there to obtain access to sex offender registration information?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... obtain access to sex offender registration information? 5.905 Section 5.905 Housing and Urban Development... access to sex offender registration information? (a) PHA obligation to obtain sex offender registration... applying for admission to any federally assisted housing program is subject to a lifetime sex offender...

  14. 24 CFR 5.905 - What special authority is there to obtain access to sex offender registration information?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... obtain access to sex offender registration information? 5.905 Section 5.905 Housing and Urban Development... access to sex offender registration information? (a) PHA obligation to obtain sex offender registration... applying for admission to any federally assisted housing program is subject to a lifetime sex offender...

  15. 24 CFR 5.905 - What special authority is there to obtain access to sex offender registration information?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... obtain access to sex offender registration information? 5.905 Section 5.905 Housing and Urban Development... access to sex offender registration information? (a) PHA obligation to obtain sex offender registration... applying for admission to any federally assisted housing program is subject to a lifetime sex offender...

  16. 31 CFR 363.16 - How do I access my account?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT REGULATIONS GOVERNING SECURITIES HELD IN TREASURYDIRECT General Provisions Governing Securities Held in TreasuryDirect § 363.16 How do I access my account? You may access your account online using your account number, password, and any other form(s) of...

  17. Fixed Access Network Sharing

    NASA Astrophysics Data System (ADS)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  18. Best practices for scholarly authors in the age of predatory journals

    PubMed Central

    Beall, J

    2016-01-01

    ‘Continuous effort, not strength or intelligence, is the key to understanding our potential.’ Margaret J Wheatley The focus of any academic or research author is to share his or her findings, and to gain respect and reward for publishing. The ideal journal is one that not only publishes an article quickly but also helps the author to improve the article before publication through peer review, selects only the best research so that the author’s article lies alongside other high quality articles, and provides maximum (and long-term) visibility and access to the article. Unfortunately, in the real world, authors need to make tradeoffs between high quality journals, those that work quickly, those that are willing to accept the article and those that provide the best access. Into this mix has come the potential of open access as a means of increasing visibility: journals publish the article without a subscription barrier so anyone, anywhere, can read the article. However, the growth of open access (pushed by institutions, grant bodies and governments as a means of improving human health and knowledge) has come with some unforeseen consequences. In this article, Jeffrey Beall discusses one recent phenomenon that has arisen from the open access movement: that of ‘predatory publishers’. These are individuals or companies that use the open access financial system (author pays, rather than library subscribes) to defraud authors and readers by promising reputable publishing platforms but delivering nothing of the sort. They frequently have imaginary editorial boards, do not operate any peer review or quality control, are unclear about payment requirements and opaque about ownership or location, include plagiarised content and publish whatever somebody will pay them to publish. Predatory publishers generally make false promises to authors and behave unethically. They also undermine the scholarly information and publishing environment with a deluge of poor quality

  19. Guidelines for Making Web Content Accessible to All Users

    ERIC Educational Resources Information Center

    Thompson, Terrill; Primlani, Saroj; Fiedor, Lisa

    2009-01-01

    The main goal of accessibility standards and guidelines is to design websites everyone can use. The "IT Accessibility Constituent Group" developed this set of draft guidelines to help EQ authors, reviewers, and staff and the larger EDUCAUSE community ensure that web content is accessible to all users, including those with disabilities. This…

  20. 32 CFR 701.107 - Record access.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 5 U.S.C. 552a, this subpart and subpart G of this part, unless they provide written authorization... individual to state a reason or justify the need to gain access under 5 U.S.C. 552a, this subpart and subpart... instruction in order to seek access to records under the provisions of 5 U.S.C. 552a, this subpart and subpart...

  1. 32 CFR 701.107 - Record access.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 5 U.S.C. 552a, this subpart and subpart G of this part, unless they provide written authorization... individual to state a reason or justify the need to gain access under 5 U.S.C. 552a, this subpart and subpart... instruction in order to seek access to records under the provisions of 5 U.S.C. 552a, this subpart and subpart...

  2. 32 CFR 701.107 - Record access.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 5 U.S.C. 552a, this subpart and subpart G of this part, unless they provide written authorization... individual to state a reason or justify the need to gain access under 5 U.S.C. 552a, this subpart and subpart... instruction in order to seek access to records under the provisions of 5 U.S.C. 552a, this subpart and subpart...

  3. 32 CFR 701.107 - Record access.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 5 U.S.C. 552a, this subpart and subpart G of this part, unless they provide written authorization... individual to state a reason or justify the need to gain access under 5 U.S.C. 552a, this subpart and subpart... instruction in order to seek access to records under the provisions of 5 U.S.C. 552a, this subpart and subpart...

  4. 32 CFR 701.107 - Record access.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 5 U.S.C. 552a, this subpart and subpart G of this part, unless they provide written authorization... individual to state a reason or justify the need to gain access under 5 U.S.C. 552a, this subpart and subpart... instruction in order to seek access to records under the provisions of 5 U.S.C. 552a, this subpart and subpart...

  5. 14 CFR 153.5 - Aviation safety inspector airport access.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Aviation safety inspector airport access... TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT OPERATIONS Aviation Safety Inspector Access § 153.5 Aviation safety... must grant Aviation Safety Inspectors bearing FAA Form 110A free and uninterrupted access to public-use...

  6. Role-based access control permissions

    DOEpatents

    Staggs, Kevin P.; Markham, Thomas R.; Hull Roskos, Julie J.; Chernoguzov, Alexander

    2017-04-25

    Devices, systems, and methods for role-based access control permissions are disclosed. One method includes a policy decision point that receives up-to-date security context information from one or more outside sources to determine whether to grant access for a data client to a portion of the system and creates an access vector including the determination; receiving, via a policy agent, a request by the data client for access to the portion of the computing system by the data client, wherein the policy agent checks to ensure there is a session established with communications and user/application enforcement points; receiving, via communications policy enforcement point, the request from the policy agent, wherein the communications policy enforcement point determines whether the data client is an authorized node, based upon the access vector received from the policy decision point; and receiving, via the user/application policy enforcement point, the request from the communications policy enforcement point.

  7. Access Control of Web- and Java-Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  8. Due diligence in the open-access explosion era: choosing a reputable journal for publication

    PubMed Central

    Ashcraft, Alyce

    2017-01-01

    Abstract Faculty are required to publish. Naïve and “in-a-hurry-to-publish” authors seek to publish in journals where manuscripts are rapidly accepted. Others may innocently submit to one of an increasing number of questionable/predatory journals, where predatory is defined as practices of publishing journals for exploitation of author-pays, open-access publication model by charging authors publication fees for publisher profit without provision of expected services (expert peer review, editing, archiving, and indexing published manuscripts) and promising almost instant publication. Authors may intentionally submit manuscripts to predatory journals for rapid publication without concern for journal quality. A brief summary of the open access “movement,” suggestions for selecting reputable open access journals, and suggestion for avoiding predatory publishers/journals are described. The purpose is to alert junior and seasoned faculty about predatory publishers included among available open access journal listings. Brief review of open access publication, predatory/questionable journal characteristics, suggestions for selecting reputable open access journals and avoiding predatory publishers/journals are described. Time is required for intentionally performing due diligence in open access journal selection, based on publisher/journal quality, prior to manuscript submission or authors must be able to successfully withdraw manuscripts when submission to a questionable or predatory journal is discovered. PMID:29040536

  9. Due diligence in the open-access explosion era: choosing a reputable journal for publication.

    PubMed

    Masten, Yondell; Ashcraft, Alyce

    2017-11-15

    Faculty are required to publish. Naïve and "in-a-hurry-to-publish" authors seek to publish in journals where manuscripts are rapidly accepted. Others may innocently submit to one of an increasing number of questionable/predatory journals, where predatory is defined as practices of publishing journals for exploitation of author-pays, open-access publication model by charging authors publication fees for publisher profit without provision of expected services (expert peer review, editing, archiving, and indexing published manuscripts) and promising almost instant publication. Authors may intentionally submit manuscripts to predatory journals for rapid publication without concern for journal quality. A brief summary of the open access "movement," suggestions for selecting reputable open access journals, and suggestion for avoiding predatory publishers/journals are described. The purpose is to alert junior and seasoned faculty about predatory publishers included among available open access journal listings. Brief review of open access publication, predatory/questionable journal characteristics, suggestions for selecting reputable open access journals and avoiding predatory publishers/journals are described. Time is required for intentionally performing due diligence in open access journal selection, based on publisher/journal quality, prior to manuscript submission or authors must be able to successfully withdraw manuscripts when submission to a questionable or predatory journal is discovered. © FEMS 2017.

  10. Authoring of Learning Objects in Context

    ERIC Educational Resources Information Center

    Specht, Marcus; Kravcik, Milos

    2006-01-01

    Learning objects and content interchange standards provide new possibilities for e-learning. Nevertheless the content often lacks context data to find appropriate use for adaptive learning on demand and personalized learning experiences. In the Remotely Accessible Field Trips (RAFT) project mobile authoring of learning content in context has shown…

  11. Early Patient Access to Medicines: Health Technology Assessment Bodies Need to Catch Up with New Marketing Authorization Methods.

    PubMed

    Leyens, Lada; Brand, Angela

    National and international medicines agencies have developed innovative methods to expedite promising new medicines to the market and facilitate early patient access. Some of these approval pathways are the conditional approval and the adaptive pathways by the European Medicines Agency (EMA); the Promising Innovative Medicine (PIM) designation and the Early Access to Medicines Scheme (EAMS) by the Medicines and Healthcare Products Regulatory Agency (MHRA), as well as the Fast Track, Breakthrough or Accelerated Approval methods by the Food and Drug Administration (FDA). However, at least in Europe, these methods cannot achieve the goal of improving timely access for patients to new medicines on their own; the reimbursement process also has to become adaptive and flexible. In the past 2 years, the effective access (national patient access) to newly approved oncology drugs ranged from 1 to 30 months, with an extremely high variability between European countries. The goal of early patient access in Europe can only be achieved if the national health technology assessment bodies, such as NICE (ENG), HAS (FR), G-BA (DE) or AIFA (IT), provide harmonized, transparent, flexible, conditional and adaptive methods that adopt the level of evidence accepted by the medicines agencies. The efforts from medicines agencies are welcome but will be in vain if health technology assessments do not follow with similar initiatives, and the European 'postcode' lottery will continue. © 2016 S. Karger AG, Basel.

  12. Context-aware access control for pervasive access to process-based healthcare systems.

    PubMed

    Koufi, Vassiliki; Vassilacopoulos, George

    2008-01-01

    Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.

  13. A dynamic access control method based on QoS requirement

    NASA Astrophysics Data System (ADS)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  14. Social Construction of Authorized Users in the Digital Age

    ERIC Educational Resources Information Center

    Zhu, Xiaohua; Eschenfelder, Kristin R.

    2010-01-01

    This paper analyzes changes to the definitions of "authorized users" contained in electronic resources licenses and embedded in access control technologies from the mid-1990s to the present. In analyzing changes to the license and technology-based definitions, it tracks shifts in major stakeholders' perceptions of authorized users and…

  15. [Analysis of the accessibility of short acting oral opioids in Hungary].

    PubMed

    Lovas, Kornélia; Hadnagy, László; Jobban, Eszter; Kullmann, Tamás

    2016-05-01

    Short acting oral formulas make part of optimal opioid analgesia. The use of short acting oral morphine has not widely spread in Hungary, and these drugs completely lacked from the market for three years. Since December 2015 short acting morphine-sulphate has again been commercialised. The causes of the market failure are analysed in this article. The aim of the retrospective analysis is to help the accessibility of the medicine to every patient in need. Prescription morphine use depends on the harmonised cooperation of a number of actors. Besides regulating and financing authorities and professional organisations, patients and the opinion forming media are also responsible for building up the right routine.

  16. The development of a multi-dimensional gambling accessibility scale.

    PubMed

    Hing, Nerilee; Haw, John

    2009-12-01

    The aim of the current study was to develop a scale of gambling accessibility that would have theoretical significance to exposure theory and also serve to highlight the accessibility risk factors for problem gambling. Scale items were generated from the Productivity Commission's (Australia's Gambling Industries: Report No. 10. AusInfo, Canberra, 1999) recommendations and tested on a group with high exposure to the gambling environment. In total, 533 gaming venue employees (aged 18-70 years; 67% women) completed a questionnaire that included six 13-item scales measuring accessibility across a range of gambling forms (gaming machines, keno, casino table games, lotteries, horse and dog racing, sports betting). Also included in the questionnaire was the Problem Gambling Severity Index (PGSI) along with measures of gambling frequency and expenditure. Principal components analysis indicated that a common three factor structure existed across all forms of gambling and these were labelled social accessibility, physical accessibility and cognitive accessibility. However, convergent validity was not demonstrated with inconsistent correlations between each subscale and measures of gambling behaviour. These results are discussed in light of exposure theory and the further development of a multi-dimensional measure of gambling accessibility.

  17. Microsoft's Vista: Guarantees People with Special Needs Access to Computers

    ERIC Educational Resources Information Center

    Williams, John M.

    2006-01-01

    In this article, the author discusses the accessibility features of Microsoft's Windows Vista. One of the most innovative aspects of Windows Vista is a new accessibility and automated testing model called Microsoft UI Automation, which reduces development costs not only for accessible and assistive technology (AT) developers, but also for…

  18. 10 CFR 26.65 - Pre-access drug and alcohol testing.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Pre-access drug and alcohol testing. 26.65 Section 26.65 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Granting and Maintaining Authorization § 26.65 Pre-access drug and alcohol testing. (a) Purpose. This section contains pre-access testing...

  19. Funding free and universal access to Journal of Neuroinflammation.

    PubMed

    Mrak, Robert E; Griffin, W Sue T

    2004-10-14

    Journal of Neuroinflammation is an Open Access, online journal published by BioMed Central. Open Access publishing provides instant and universal availability of published work to any potential reader, worldwide, completely free of subscriptions, passwords, and charges. Further, authors retain copyright for their work, facilitating its dissemination. Open Access publishing is made possible by article-processing charges assessed "on the front end" to authors, their institutions, or their funding agencies. Beginning November 1, 2004, the Journal of Neuroinflammation will introduce article-processing charges of around US$525 for accepted articles. This charge will be waived for authors from institutions that are BioMed Central members, and in additional cases for reasons of genuine financial hardship. These article-processing charges pay for an electronic submission process that facilitates efficient and thorough peer review, for publication costs involved in providing the article freely and universally accessible in various formats online, and for the processes required for the article's inclusion in PubMed and its archiving in PubMed Central, e-Depot, Potsdam and INIST. There is no remuneration of any kind provided to the Editors-in-Chief, to any members of the Editorial Board, or to peer reviewers; all of whose work is entirely voluntary. Our article-processing charge is less than charges frequently levied by traditional journals: the Journal of Neuroinflammation does not levy any additional page or color charges on top of this fee, and there are no reprint costs as publication-quality pdf files are provided, free, for distribution in lieu of reprints. Our article-processing charge will enable full, immediate, and continued Open Access for all work published in Journal of Neuroinflammation. The benefits from such Open Access will accrue to readers, through unrestricted access; to authors, through the widest possible dissemination of their work; and to science and

  20. GEOSS authentication/authorization services: a Broker-based approach

    NASA Astrophysics Data System (ADS)

    Santoro, M.; Nativi, S.

    2014-12-01

    The vision of the Global Earth Observation System of Systems (GEOSS) is the achievement of societal benefits through voluntary contribution and sharing of resources to better understand the relationships between the society and the environment where we live. The GEOSS Common Infrastructure (GCI) allows users to search, access, and use the resources contributed by the GEOSS members. The GEO DAB (Discovery and Access Broker) is the GCI component in charge of interconnecting the heterogeneous data systems contributing to GEOSS. Client applications (i.e. the portals and apps) can connect to GEO DAB as a unique entry point to discover and access resources available through GCI, with no need to implement the many service protocols and models applied by the GEOSS data providers. The GEO DAB implements the brokering approach (Nativi et al., 2013) to build a flexible and scalable System of Systems. User authentication/authorization functionality is becoming more and more important for GEOSS data providers and users. The Providers ask for information about who accessed their resources and, in some cases, want to limit the data download. The Users ask for a profiled interaction with the system based on their needs and expertise level. Besides, authentication and authorization is necessary for GEOSS to provide moderated social services - e.g. feedback messages, data "fit for use" comments, etc. In keeping with the GEOSS principles of building on existing systems and lowering entry-barriers for users, an objective of the authentication/authorization development was to support existing and well-used users' credentials (e.g. Google, Twitter, etc.). Due to the heterogeneity of technologies used by the different providers and applications, a broker-based approach for the authentication/authorization was introduced as a new functionality of GEO DAB. This new capability will be demonstrated at the next GEO XI Plenary (November 2014). This work will be presented and discussed

  1. Identity and Access Management: Technological Implementation of Policy

    ERIC Educational Resources Information Center

    von Munkwitz-Smith, Jeff; West, Ann

    2004-01-01

    Navigating the multiple processes for accessing ever-multiplying campus information systems can be a daunting task for students, faculty, and staff. This article provides a brief overview of Identity and Access Management Services. The authors review key characteristics and components of this new information architecture and address the issue of…

  2. Publisher's Note: EPL and Open Access Articles

    NASA Astrophysics Data System (ADS)

    Ancarani, Barbara; Brassac, Catherine; Burr, Frédéric; Dose, Volker; King, Caroline

    2008-01-01

    In May 2007 the EPLA Board of Directors welcomed the CERN initiative for the creation of a Sponsoring Consortium for Open Access Publishing in Particle Physics (SCOAP3) and agreed to enter into negotiations to enable high energy physics papers to be published in EPL with selective open access. At a subsequent meeting in August 2007, the Board decided to offer substantial initial discount while open access remained a small fraction of the content of EPL. A necessary precursor to negotiation with SCOAP3 is a general open access policy. The Directors agreed that this policy should offer a free-to-read option for all authors in all sections of EPL and so provide fair opportunities across the broad range of physics covered by EPL. The policy for the journal should allow individual authors, their institutions, funding agencies or sponsoring consortia to pay for published articles to be freely available to all, permanently. The Board stressed the importance of maintaining EPL as a refereed journal with robust and reliable content, in contrast to a repository or preprint server. EPL would remain a subscription journal for content that is not free to read and authors, institutions or funding agencies may choose to pay for their articles to be open access. As an initial step in this open access venture, a single-article fee of € 1000 ( 1330) can now be paid by individuals who choose to have their article published free to all. This pricing, which is substantially discounted, ensures that EPL remains competitive with other similar journals. EPL will continue to ensure this policy is sustainable although the journal must remain financially viable and the pricing scheme will be under continual review. At this stage we welcome enquires concerning an institutional membership fee that would allow that institute to pay in advance for open access publications in EPL for authors from that institute. The fee would follow a band structure, based on the number of articles that

  3. 25 CFR 571.6 - Access to papers, books, and records.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 2 2013-04-01 2013-04-01 false Access to papers, books, and records. 571.6 Section 571.6... PROVISIONS MONITORING AND INVESTIGATIONS Inspection of Books and Records § 571.6 Access to papers, books, and... operation shall provide the authorized representative with access to all papers, books, and records...

  4. 25 CFR 571.6 - Access to papers, books, and records.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Access to papers, books, and records. 571.6 Section 571.6... PROVISIONS MONITORING AND INVESTIGATIONS Inspection of Books and Records § 571.6 Access to papers, books, and... operation shall provide the authorized representative with access to all papers, books, and records...

  5. 25 CFR 571.6 - Access to papers, books, and records.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 2 2011-04-01 2011-04-01 false Access to papers, books, and records. 571.6 Section 571.6... PROVISIONS MONITORING AND INVESTIGATIONS Inspection of Books and Records § 571.6 Access to papers, books, and... operation shall provide the authorized representative with access to all papers, books, and records...

  6. 25 CFR 571.6 - Access to papers, books, and records.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 2 2014-04-01 2014-04-01 false Access to papers, books, and records. 571.6 Section 571.6... PROVISIONS MONITORING AND INVESTIGATIONS Inspection of Books and Records § 571.6 Access to papers, books, and... operation shall provide the authorized representative with access to all papers, books, and records...

  7. 25 CFR 571.6 - Access to papers, books, and records.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 2 2012-04-01 2012-04-01 false Access to papers, books, and records. 571.6 Section 571.6... PROVISIONS MONITORING AND INVESTIGATIONS Inspection of Books and Records § 571.6 Access to papers, books, and... operation shall provide the authorized representative with access to all papers, books, and records...

  8. Radial access for cerebrovascular procedures: Case report and technical note.

    PubMed

    Satti, Sudhakar R; Vance, Ansar Z; Sivapatham, Thinesh

    2016-04-01

    Advantages of radial access over brachial/axillary or femoral access have been well described for several decades and include decreased cost, patient preference, and decreased major access site complications. Despite these advantages, radial access is rarely employed or even considered for neurointerventional procedures. This attitude should be reconsidered given several recent large, randomized, controlled trials from the cardiovascular literature proving that radial access is associated with statistically lower costs, decreased incidence of myocardial infarctions, strokes, and even decreased mortality. Radial access is now considered the standard of care for percutaneous coronary interventions in most US centers. Although radial access has been described for neurovascular procedures in the past, overall experience is limited. The two major challenges are the unique anatomy required to access the cerebral vasculature given very acute angles between the arm and craniocervical vessels and limitations in available technology. We present a simplified approach to radial access for cerebrovascular procedures and provide a concise step-by-step approach for patient selection, ultrasound-guided single-wall access, recommended catheters/wires, and review of patent hemostasis. Additionally, we present a complex cerebrovascular intervention in which standard femoral access was unsuccessful, while radial access was quickly achieved to highlight the importance of familiarity with the radial approach for all neurointerventionalists. We have found that the learning curve is not too steep and that the radial access approach can be adopted smoothly for a large percentage of diagnostic and interventional neuroradiologic procedures. Radial access should be considered in all patients undergoing a cerebrovascular procedure. © The Author(s) 2015.

  9. 17 CFR 9.9 - Waiver of rules; delegation of authority.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... authority. 9.9 Section 9.9 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO REVIEW OF EXCHANGE DISCIPLINARY, ACCESS DENIAL OR OTHER ADVERSE ACTIONS General Provisions § 9.9 Waiver of rules; delegation of authority. (a) Standards for waiver; notice to parties. To prevent...

  10. Perceptions of Cataloguers and End-Users towards Bilingual Authority Files.

    ERIC Educational Resources Information Center

    Abdoulaye, Kaba

    2002-01-01

    Analyzes and describes bilingual authority files at the main library of the International Islamic University of Malaysia. Highlights include a review of multilingual research; perceptions of end users and catalogers; problems with bilingual files; and use of the OPAC (online public access catalog) by users. (Author/LRW)

  11. Negotiating Access to Health Information to Promote Students' Health.

    PubMed

    Radis, Molly E; Updegrove, Stephen C; Somsel, Anne; Crowley, Angela A

    2016-04-01

    Access to student health information, such as immunizations, screenings, and care plans for chronic conditions, is essential for school nurses to fulfill their role in promoting students' health. School nurses typically encounter barriers to accessing health records and spend many hours attempting to retrieve health information. As a result, nurses' time is poorly utilized and students may suffer adverse outcomes including delayed school entry. In response to this pressing public health issue, a school medical advisor and director of school nurses in a local health department successfully negotiated access for school nurses to three health record systems: a state immunization tracking system, an electronic lead surveillance program, and an electronic health record system. This negotiation process is presented within a framework of the Theory of Diffusion of Innovation and provides a strategy for other school nurses seeking access to student health information. © The Author(s) 2015.

  12. 34 CFR 75.610 - Access by the handicapped.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 34 Education 1 2014-07-01 2014-07-01 false Access by the handicapped. 75.610 Section 75.610... by a Grantee? Construction § 75.610 Access by the handicapped. A grantee shall comply with the... facilities—41 CFR subpart 101-19.6. (Authority: 20 U.S.C. 1221e-3 and 3474) ...

  13. A federated capability-based access control mechanism for internet of things (IoTs)

    NASA Astrophysics Data System (ADS)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  14. 42 CFR 51.41 - Access to records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... THE PROTECTION AND ADVOCACY FOR INDIVIDUALS WITH MENTAL ILLNESS PROGRAM Access to Records, Facilities... individuals with mental illness: (1) An individual who is a client of the P&A system if authorized by that...) The individual, due to his or her mental or physical condition, is unable to authorize the P&A system...

  15. 32 CFR 761.13 - Ships: Individual authorizations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 5 2011-07-01 2011-07-01 false Ships: Individual authorizations. 761.13 Section... TRUST TERRITORY OF THE PACIFIC ISLANDS Entry Authorization § 761.13 Ships: Individual authorizations. (a) Applications; form; filing. Applications for authorization to navigate ships within the limits of defense areas...

  16. 78 FR 22527 - TRICARE Access to Care Demonstration Project

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-16

    ... DEPARTMENT OF DEFENSE Office of the Secretary TRICARE Access to Care Demonstration Project AGENCY... Access to Care Demonstration for TRICARE Prime/TRICARE Prime Remote Beneficiaries. SUMMARY: This notice... to utilize four visits per fiscal year to TRICARE authorized Urgent Care Centers without obtaining an...

  17. Trends in communicative access solutions for children with cerebral palsy.

    PubMed

    Myrden, Andrew; Schudlo, Larissa; Weyand, Sabine; Zeyl, Timothy; Chau, Tom

    2014-08-01

    Access solutions may facilitate communication in children with limited functional speech and motor control. This study reviews current trends in access solution development for children with cerebral palsy, with particular emphasis on the access technology that harnesses a control signal from the user (eg, movement or physiological change) and the output device (eg, augmentative and alternative communication system) whose behavior is modulated by the user's control signal. Access technologies have advanced from simple mechanical switches to machine vision (eg, eye-gaze trackers), inertial sensing, and emerging physiological interfaces that require minimal physical effort. Similarly, output devices have evolved from bulky, dedicated hardware with limited configurability, to platform-agnostic, highly personalized mobile applications. Emerging case studies encourage the consideration of access technology for all nonverbal children with cerebral palsy with at least nascent contingency awareness. However, establishing robust evidence of the effectiveness of the aforementioned advances will require more expansive studies. © The Author(s) 2014.

  18. 10 CFR 1004.7 - Responses by authorizing officials: Form and content.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ....7 Section 1004.7 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) FREEDOM OF INFORMATION § 1004.7... this Regulation, the Freedom of Information Act, and where the applicable fees are $15 or less or where... denial, containing a reference to the specific exemption under the Freedom of Information Act authorizing...

  19. Centralized Authorization Using a Direct Service, Part II

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wachsmann, A

    Authorization is the process of deciding if entity X is allowed to have access to resource Y. Determining the identity of X is the job of the authentication process. One task of authorization in computer networks is to define and determine which user has access to which computers in the network. On Linux, the tendency exists to create a local account for each single user who should be allowed to logon to a computer. This is typically the case because a user not only needs login privileges to a computer but also additional resources like a home directory to actuallymore » do some work. Creating a local account on every computer takes care of all this. The problem with this approach is that these local accounts can be inconsistent with each other. The same user name could have a different user ID and/or group ID on different computers. Even more problematic is when two different accounts share the same user ID and group ID on different computers: User joe on computer1 could have user ID 1234 and group ID 56 and user jane on computer2 could have the same user ID 1234 and group ID 56. This is a big security risk in case shared resources like NFS are used. These two different accounts are the same for an NFS server so that these users can wipe out each other's files. The solution to this inconsistency problem is to have only one central, authoritative data source for this kind of information and a means of providing all your computers with access to this central source. This is what a ''Directory Service'' is. The two directory services most widely used for centralizing authorization data are the Network Information Service (NIS, formerly known as Yellow Pages or YP) and Lightweight Directory Access Protocol (LDAP).« less

  20. Multinational Experiment 7. Protecting Access to Space: Presentation to Senior Leaders

    DTIC Science & Technology

    2013-07-08

    Multinational Experiment 7: Outcome 3: Space Access Briefing to SLS 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d...operations Consequence management Ship status during search & rescue Tele-medicine Broadband internet TV signal distribution Satellite radio Rural...military-usage • Significant economic & societal consequences Access to space at risk • Current approach unsustainable • Broad range of threats

  1. Transradial access: lessons learned from cardiology.

    PubMed

    Snelling, Brian M; Sur, Samir; Shah, Sumedh Subodh; Marlow, Megan M; Cohen, Mauricio G; Peterson, Eric C

    2018-05-01

    Innovations in interventional cardiology historically predate those in neuro-intervention. As such, studying trends in interventional cardiology can be useful in exploring avenues to optimise neuro-interventional techniques. One such cardiology innovation has been the steady conversion of arterial puncture sites from transfemoral access (TFA) to transradial access (TRA), a paradigm shift supported by safety benefits for patients. While neuro-intervention has unique anatomical challenges, the access itself is identical. As such, examining the extensive cardiology literature on the radial approach has the potential to offer valuable lessons for the neuro-interventionalist audience who may be unfamiliar with this body of work. Therefore, we present here a report, particularly for neuro-interventionalists, regarding the best practices for TRA by reviewing the relevant cardiology literature. We focused our review on the data most relevant to our audience, namely that surrounding the access itself. By reviewing the cardiology literature on metrics such as safety profiles, cost and patient satisfaction differences between TFA and TRA, as well as examining the technical nuances of the procedure and post-procedural care, we hope to give physicians treating complex cerebrovascular disease a broader data-driven understanding of TRA. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  2. 32 CFR 761.15 - Aircraft: Individual authorizations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... NAVY JURISDICTION NAVAL DEFENSIVE SEA AREAS; NAVAL AIRSPACE RESERVATIONS, AREAS UNDER NAVY... authorizations. (a) Special procedures. In addition to the entry authorization to enter or navigate within the... special agreements or treaties. (b) Application; Form; Filing. Applications for authorization to navigate...

  3. 32 CFR 761.15 - Aircraft: Individual authorizations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... NAVY JURISDICTION NAVAL DEFENSIVE SEA AREAS; NAVAL AIRSPACE RESERVATIONS, AREAS UNDER NAVY... authorizations. (a) Special procedures. In addition to the entry authorization to enter or navigate within the... special agreements or treaties. (b) Application; Form; Filing. Applications for authorization to navigate...

  4. 32 CFR 761.15 - Aircraft: Individual authorizations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... NAVY JURISDICTION NAVAL DEFENSIVE SEA AREAS; NAVAL AIRSPACE RESERVATIONS, AREAS UNDER NAVY... authorizations. (a) Special procedures. In addition to the entry authorization to enter or navigate within the... special agreements or treaties. (b) Application; Form; Filing. Applications for authorization to navigate...

  5. 32 CFR 761.15 - Aircraft: Individual authorizations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... NAVY JURISDICTION NAVAL DEFENSIVE SEA AREAS; NAVAL AIRSPACE RESERVATIONS, AREAS UNDER NAVY... authorizations. (a) Special procedures. In addition to the entry authorization to enter or navigate within the... special agreements or treaties. (b) Application; Form; Filing. Applications for authorization to navigate...

  6. 32 CFR 761.15 - Aircraft: Individual authorizations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... NAVY JURISDICTION NAVAL DEFENSIVE SEA AREAS; NAVAL AIRSPACE RESERVATIONS, AREAS UNDER NAVY... authorizations. (a) Special procedures. In addition to the entry authorization to enter or navigate within the... special agreements or treaties. (b) Application; Form; Filing. Applications for authorization to navigate...

  7. Trace Authored Papers from the Annual Conference on Rehabilitation Technology (13th, Washington, D.C., 1990).

    ERIC Educational Resources Information Center

    Wisconsin Univ., Madison. Trace Center.

    This document brings together eight papers presented at a rehabilitation technology conference, authored by individuals affiliated with the Trace R & D Center on Communication, Control and Computer Access for Handicapped Individuals. Titles and authors of the papers are as follows: "Current Initiatives in Accessible Computing" (Jane Berliss);…

  8. 28 CFR 17.21 - Classification and declassification authority.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Administration may delegate original Secret and Confidential classification authority to subordinate officials... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Classification and declassification... INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Classified Information § 17.21 Classification and...

  9. 28 CFR 17.21 - Classification and declassification authority.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Administration may delegate original Secret and Confidential classification authority to subordinate officials... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Classification and declassification... INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Classified Information § 17.21 Classification and...

  10. 28 CFR 17.21 - Classification and declassification authority.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Administration may delegate original Secret and Confidential classification authority to subordinate officials... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Classification and declassification... INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Classified Information § 17.21 Classification and...

  11. 28 CFR 17.21 - Classification and declassification authority.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Administration may delegate original Secret and Confidential classification authority to subordinate officials... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Classification and declassification... INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Classified Information § 17.21 Classification and...

  12. Patient-centred access to health care: conceptualising access at the interface of health systems and populations

    PubMed Central

    2013-01-01

    Background Access is central to the performance of health care systems around the world. However, access to health care remains a complex notion as exemplified in the variety of interpretations of the concept across authors. The aim of this paper is to suggest a conceptualisation of access to health care describing broad dimensions and determinants that integrate demand and supply-side-factors and enabling the operationalisation of access to health care all along the process of obtaining care and benefiting from the services. Methods A synthesis of the published literature on the conceptualisation of access has been performed. The most cited frameworks served as a basis to develop a revised conceptual framework. Results Here, we view access as the opportunity to identify healthcare needs, to seek healthcare services, to reach, to obtain or use health care services, and to actually have a need for services fulfilled. We conceptualise five dimensions of accessibility: 1) Approachability; 2) Acceptability; 3) Availability and accommodation; 4) Affordability; 5) Appropriateness. In this framework, five corresponding abilities of populations interact with the dimensions of accessibility to generate access. Five corollary dimensions of abilities include: 1) Ability to perceive; 2) Ability to seek; 3) Ability to reach; 4) Ability to pay; and 5) Ability to engage. Conclusions This paper explains the comprehensiveness and dynamic nature of this conceptualisation of access to care and identifies relevant determinants that can have an impact on access from a multilevel perspective where factors related to health systems, institutions, organisations and providers are considered with factors at the individual, household, community, and population levels. PMID:23496984

  13. 29 CFR 96.41 - Access to records.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... any of their duly authorized representatives (including certified public accountants under contract), shall have access to any books, documents, papers, and records (manual and automated) of the entity...

  14. 29 CFR 96.41 - Access to records.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... any of their duly authorized representatives (including certified public accountants under contract), shall have access to any books, documents, papers, and records (manual and automated) of the entity...

  15. 29 CFR 96.41 - Access to records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... any of their duly authorized representatives (including certified public accountants under contract), shall have access to any books, documents, papers, and records (manual and automated) of the entity...

  16. 29 CFR 96.41 - Access to records.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... any of their duly authorized representatives (including certified public accountants under contract), shall have access to any books, documents, papers, and records (manual and automated) of the entity...

  17. 29 CFR 96.41 - Access to records.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... any of their duly authorized representatives (including certified public accountants under contract), shall have access to any books, documents, papers, and records (manual and automated) of the entity...

  18. An Attribute Based Access Control Framework for Healthcare System

    NASA Astrophysics Data System (ADS)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  19. An iron-catalysed C-C bond-forming spirocyclization cascade providing sustainable access to new 3D heterocyclic frameworks

    NASA Astrophysics Data System (ADS)

    Adams, Kirsty; Ball, Anthony K.; Birkett, James; Brown, Lee; Chappell, Ben; Gill, Duncan M.; Lo, P. K. Tony; Patmore, Nathan J.; Rice, Craig. R.; Ryan, James; Raubo, Piotr; Sweeney, Joseph B.

    2017-04-01

    Heterocyclic architectures offer powerful creative possibilities to a range of chemistry end-users. This is particularly true of heterocycles containing a high proportion of sp3-carbon atoms, which confer precise spatial definition upon chemical probes, drug substances, chiral monomers and the like. Nonetheless, simple catalytic routes to new heterocyclic cores are infrequently reported, and methods making use of biomass-accessible starting materials are also rare. Here, we demonstrate a new method allowing rapid entry to spirocyclic bis-heterocycles, in which inexpensive iron(III) catalysts mediate a highly stereoselective C-C bond-forming cyclization cascade reaction using (2-halo)aryl ethers and amines constructed using feedstock chemicals readily available from plant sources. Fe(acac)3 mediates the deiodinative cyclization of (2-halo)aryloxy furfuranyl ethers, followed by capture of the intermediate metal species by Grignard reagents, to deliver spirocycles containing two asymmetric centres. The reactions offer potential entry to key structural motifs present in bioactive natural products.

  20. Faculty experiences with the National Institutes of Health (NIH) public access policy, compliance issues, and copyright practices.

    PubMed

    Charbonneau, Deborah H; McGlone, Jonathan

    2013-01-01

    The research assessed faculty awareness of the National Institutes of Health (NIH) public access policy and faculty experiences with the copyright terms in their author agreements with publishers. During the fall of 2011, 198 faculty members receiving funding from NIH at a large urban academic institution were invited to participate in an anonymous online survey. A total of 94 faculty members responded to the survey, representing a response rate of 47%. Thirty percent of the survey respondents were either unaware of or not familiar with the NIH policy. Further, a significant number of faculty members (97.8%) indicated that they usually signed their copyright forms "as is." The findings show that time, confusing instructions, and unclear journal policies are challenges experienced by NIH-funded faculty in complying with the federal mandate. There is a need to educate faculty with respect to the value of retaining their copyrights and self-archiving their publications to help advance public access and open access scholarship.

  1. 10 CFR 95.51 - Retrieval of classified matter following suspension or revocation of access authorization.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.51 Retrieval of classified matter following suspension or revocation of access... 10 Energy 2 2014-01-01 2014-01-01 false Retrieval of classified matter following suspension or...

  2. 10 CFR 95.51 - Retrieval of classified matter following suspension or revocation of access authorization.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.51 Retrieval of classified matter following suspension or revocation of access... 10 Energy 2 2010-01-01 2010-01-01 false Retrieval of classified matter following suspension or...

  3. 10 CFR 95.51 - Retrieval of classified matter following suspension or revocation of access authorization.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.51 Retrieval of classified matter following suspension or revocation of access... 10 Energy 2 2013-01-01 2013-01-01 false Retrieval of classified matter following suspension or...

  4. 10 CFR 95.51 - Retrieval of classified matter following suspension or revocation of access authorization.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.51 Retrieval of classified matter following suspension or revocation of access... 10 Energy 2 2011-01-01 2011-01-01 false Retrieval of classified matter following suspension or...

  5. 10 CFR 95.51 - Retrieval of classified matter following suspension or revocation of access authorization.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.51 Retrieval of classified matter following suspension or revocation of access... 10 Energy 2 2012-01-01 2012-01-01 false Retrieval of classified matter following suspension or...

  6. NASA Publications Guide for Authors. Revised

    NASA Technical Reports Server (NTRS)

    2005-01-01

    This document presents guidelines for use by NASA authors for preparing and publishing their scientific and technical information (STI). Section 1 gives an overview. Section 2 describes each type of report in the NASA STI Report Series and other forms of publications. It also discusses dissemination and safeguarding of STI. Section 3 gives technical, data quality, and dissemination reviews, including the mandatory review via NASA Form 1676, NASA Scientific and Technical Information (STI) Document Availability Authorization (DAA). It also describes handling unlimited and limited/restricted STI. Section 4 provides recommended standards for document format, composition, and organization and element of a typical report. Section 5 presents miscellaneous preparation recommendations. Section 6 discusses two required forms, Standard Form 298 and NF-1676. The guide cites additional sources of information of standards, guidelines, and review and approval requirements.

  7. Access and accounting schemes of wireless broadband

    NASA Astrophysics Data System (ADS)

    Zhang, Jian; Huang, Benxiong; Wang, Yan; Yu, Xing

    2004-04-01

    In this paper, two wireless broadband access and accounting schemes were introduced. There are some differences in the client and the access router module between them. In one scheme, Secure Shell (SSH) protocol is used in the access system. The SSH server makes the authentication based on private key cryptography. The advantage of this scheme is the security of the user's information, and we have sophisticated access control. In the other scheme, Secure Sockets Layer (SSL) protocol is used the access system. It uses the technology of public privacy key. Nowadays, web browser generally combines HTTP and SSL protocol and we use the SSL protocol to implement the encryption of the data between the clients and the access route. The schemes are same in the radius sever part. Remote Authentication Dial in User Service (RADIUS), as a security protocol in the form of Client/Sever, is becoming an authentication/accounting protocol for standard access to the Internet. It will be explained in a flow chart. In our scheme, the access router serves as the client to the radius server.

  8. Use of the conditional marketing authorization pathway for oncology medicines in Europe.

    PubMed

    Hoekman, J; Boon, W P C; Bouvy, J C; Ebbers, H C; de Jong, J P; De Bruin, M L

    2015-11-01

    Conditional marketing authorization (CMA) in the European Union (EU) is an early access pathway for medicines that show promising therapeutic effects, but for which comprehensive data are not available. Using a mixed quantitative-qualitative research design, we evaluated how CMA has been used in marketing authorization of oncology medicines in the period 2006 to 2013. We show that compared to full marketing authorization, CMA is granted based on less comprehensive data. However, this is accompanied by significantly longer assessment times and less consensus among regulators about marketing authorization. Moreover, development time from first-in-human testing to marketing authorization did not differ between full marketing authorization and CMA, but was significantly longer for CMA compared to accelerated approved products in the United States (US). Results indicate that CMA is not used by companies as a prospectively planned pathway to obtain early access, but as a "rescue option" when submitted data are not strong enough to justify full marketing authorization. © 2015, The American Society for Clinical Pharmacology and Therapeutics.

  9. Service composition towards increasing end-user accessibility.

    PubMed

    Kaklanis, Nikolaos; Votis, Konstantinos; Tzovaras, Dimitrios

    2015-01-01

    This paper presents the Cloud4all Service Synthesizer Tool, a framework that enables efficient orchestration of accessibility services, as well as their combination into complex forms, providing more advanced functionalities towards increasing the accessibility of end-users with various types of functional limitations. The supported services are described formally within an ontology, enabling, thus, semantic service composition. The proposed service composition approach is based on semantic matching between services specifications on the one hand and user needs/preferences and current context of use on the other hand. The use of automatic composition of accessibility services can significantly enhance end-users' accessibility, especially in cases where assistive solutions are not available in their device.

  10. Standard formatted data units-control authority procedures

    NASA Technical Reports Server (NTRS)

    1991-01-01

    The purpose of this document is to establish a set of minimum and optional requirements for the implementation of Control Authority (CA) organizations within and among the Agencies participating in the Consultative Committee for Space Data Systems (CCSDS). By satisfying these requirements, the resultant cooperating set of CA organizations will produce a global CA service supporting information transfer with digital data under the Standard Formatted Data Unit (SFDU) concept. This service is primarily accomplished through the registration, permanent archiving, and dissemination of metadata in the form of Metadata Objects (MDO) that assist in the interpretation of data objects received in SFDU form. This Recommendation addresses the responsibilities, services, and interface protocols for a hierarchy of CA organizations. The top level, consisting of the CCSDS Secretariat and its operational agent, is unique and primarily provides a global coordination function. The lower levels are Agency CA organizations that have primary responsibility for the registration, archiving, and dissemination of MDOs. As experience is gained and technology evolves, the CA Procedures will be extended to include enhanced services and their supporting protocols. In particular, it is anticipated that eventually CA organizations will be linked via networks on a global basis, and will provide requestors with online automated access to CA services. While this Recommendation does not preclude such operations, it also does not recommend the specific protocols to be used to ensure global compatibility of these services. These recommendations will be generated as experience is gained.

  11. Poor Access for African Researchers to African Emergency Care Publications: A Cross-sectional Study.

    PubMed

    Bruijns, Stevan R; Maesela, Mmapeladi; Sinha, Suniti; Banner, Megan

    2017-10-01

    Based on relative population size and burden of disease, emergency care publication outputs from low- and middle-income regions are disproportionately lower than those of high-income regions. Ironically, outputs from regions with higher publication rates are often less relevant in the African context. As a result, the dissemination of and access to local research is essential to local researchers, but the cost of this access (actual and cost-wise) remains unknown. The aim of this study was to describe access to African emergency care publications in terms of publisher-based access (open access or subscription) and alternate access (self-archived or author provided), as well as the cost of access. We conducted a retrospective, cross-sectional study using all emergency medicine publications included in Scopus between 2011 and 2015. A sequential search strategy described access to each article, and we calculated mean article charges against the purchasing power parity index (used to describe out-of-pocket expense). We included 666 publications from 49 journals, of which 395 (59.3%) were open access. For subscription-based articles, 106 (39.1%) were self-archived, 60 (22.1%) were author-provided, and 105 (38.8%) were inaccessible. Mean article access cost was $36.44, and mean processing charge was $2,319.34. Using the purchasing power parity index it was calculated that equivalent out-of-pocket expenditure for South African, Ghanaian and Tanzanian authors would respectively be $15.77, $10.44 and $13.04 for access, and $1,004.02, $664.36 and $830.27 for processing. Based on this, the corrected cost of a single-unit article access or process charge for South African, Ghanaian and Tanzanian authors, respectively, was 2.3, 3.5 and 2.8 times higher than the standard rate. One in six African emergency care publications are inaccessible outside institutional library subscriptions; additionally, the cost of access to publications in low- and middle-income countries appears

  12. The continued movement for open access to peer-reviewed literature.

    PubMed

    Liesegang, Thomas J

    2013-09-01

    To provide a current overview of the movement for open access to the peer review literature. Perspective. Literature review of recent advances in the open access movement with a personal viewpoint of the nuances of the movement. The open access movement is complex, with many different constituents. The idealists for the open access movement are seeking open access to the literature but also to the data that constitute the research within the manuscript. The business model of the traditional subscription journal is being scrutinized in relation to the surge in the number of open access journals. Within this environment authors should beware predatory practices. More government and funding agencies are mandating open access to their funded research. This open access movement will continue to be disruptive until a business model ensures continuity of the scientific record. A flood of open access articles that might enrich, but also might pollute or confuse, the medical literature has altered the filtering mechanism provided by the traditional peer review system. At some point there may be a shake-out, with some literature being lost in cyberspace. The open access movement is maturing and must be embraced in some format. The challenge is to establish a sustainable financial business model that will permit the use of digital technology but yet not endanger the decades-old traditional publication model and peer review system. Authors seem to be slower in adopting open access than the idealists in the movement. Copyright © 2013 Elsevier Inc. All rights reserved.

  13. X-Ray Form Factor, Attenuation and Scattering Tables

    National Institute of Standards and Technology Data Gateway

    SRD 66 X-Ray Form Factor, Attenuation and Scattering Tables (Web, free access)   This database collects tables and graphs of the form factors, the photoabsorption cross section, and the total attenuation coefficient for any element (Z <= 92).

  14. "Garbage" In, "Refuse and Refuse Disposal" Out: Making the Most of the Subject Authority File in OPAC.

    ERIC Educational Resources Information Center

    Horn, Marguerite E.

    2002-01-01

    Discusses the difference in subject access in OPACs (online public access catalogs) between subject searching (authority, alphabetic, or controlled vocabulary) versus keyword searching (uncontrolled, free text, natural language vocabulary). Compares a query on the term "garbage" in two online catalogs and discusses results. (Author/LRW)

  15. Enhancing access to health information in Africa: a librarian's perspective.

    PubMed

    Gathoni, Nasra

    2012-01-01

    In recent years, tremendous progress has been made toward providing health information in Africa, in part because of technological advancements. Nevertheless, ensuring that information is accessible, comprehensible, and usable remains problematic, and there remain needs in many settings to address issues such as computer skills, literacy, and the infrastructure to access information. To determine how librarians might play a more strategic role in meeting information needs of health professionals in Africa, the author reviewed key components of information systems pertinent to knowledge management for the health sector, including access to global online resources, capacity to use computer technology for information retrieval, information literacy, and the potential for professional networks to play a role in improving access to and use of information. The author concluded that, in regions that lack adequate information systems, librarians could apply their knowledge and skills to facilitate access and use by information seekers. Ensuring access to and use of health information can also be achieved by engaging organizations and associations working to enhance access to health information, such as the Association for Health Information and Libraries in Africa. These groups can provide assistance through training, dissemination, information repackaging, and other approaches known to improve information literacy.

  16. 32 CFR 552.168 - Fort Lewis Area Access Office.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... issued to each person authorized access. The permit is not transferable. Entry to the Fort Lewis range... valid for one year. When a permit expires, the holder must re-register to renew privileges, and a new... been coordinated and approved, Area Access will determine when called for entry whether the area...

  17. 32 CFR 552.168 - Fort Lewis Area Access Office.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... issued to each person authorized access. The permit is not transferable. Entry to the Fort Lewis range... valid for one year. When a permit expires, the holder must re-register to renew privileges, and a new... been coordinated and approved, Area Access will determine when called for entry whether the area...

  18. 32 CFR 552.168 - Fort Lewis Area Access Office.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... issued to each person authorized access. The permit is not transferable. Entry to the Fort Lewis range... valid for one year. When a permit expires, the holder must re-register to renew privileges, and a new... been coordinated and approved, Area Access will determine when called for entry whether the area...

  19. 32 CFR 552.168 - Fort Lewis Area Access Office.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... issued to each person authorized access. The permit is not transferable. Entry to the Fort Lewis range... valid for one year. When a permit expires, the holder must re-register to renew privileges, and a new... been coordinated and approved, Area Access will determine when called for entry whether the area...

  20. Speeding Access to Vaccines and Medicines in Low- and Middle-Income Countries: A Case for Change and a Framework for Optimized Product Market Authorization.

    PubMed

    Ahonkhai, Vincent; Martins, Samuel F; Portet, Alexandre; Lumpkin, Murray; Hartman, Dan

    2016-01-01

    The United Nations Millennium Development Goals galvanized global efforts to alleviate suffering of the world's poorest people through unprecedented public-private partnerships. Donor aid agencies have demonstrably saved millions of lives that might otherwise have been lost to disease through increased access to quality-assured vaccines and medicines. Yet, the introduction of these health interventions in low- and middle-income countries (LMICs) continues to face a time lag due to factors which remain poorly understood. A recurring theme from our partnership engagements was that an optimized regulatory process would contribute to improved access to quality health products. Therefore, we investigated the current system for medicine and vaccine registration in LMICs as part of our comprehensive regulatory strategy. Here, we report a fact base of the registration timelines for vaccines and drugs used to treat certain communicable diseases in LMICs. We worked with a broad set of stakeholders, including the World Health Organization's prequalification team, national regulatory authorities, manufacturers, procurers, and other experts, and collected data on the timelines between first submission and last approval of applications for product registration sub-Saharan Africa. We focused on countries with the highest burden of communicable disease and the greatest need for the products studied. The data showed a typical lag of 4 to 7 years between the first regulatory submission which was usually to a regulatory agency in a high-income country, and the final approval in Sub-Saharan Africa. Two of the three typical registration steps which products undergo before delivery in the countries involve lengthy timelines. Failure to leverage or rely on the findings from reviews already performed by competent regulatory authorities, disparate requirements for product approval by the countries, and lengthy timelines by manufacturers to respond to regulatory queries were key underlying

  1. iFORM: Incorporating Find Occurrence of Regulatory Motifs.

    PubMed

    Ren, Chao; Chen, Hebing; Yang, Bite; Liu, Feng; Ouyang, Zhangyi; Bo, Xiaochen; Shu, Wenjie

    2016-01-01

    Accurately identifying the binding sites of transcription factors (TFs) is crucial to understanding the mechanisms of transcriptional regulation and human disease. We present incorporating Find Occurrence of Regulatory Motifs (iFORM), an easy-to-use and efficient tool for scanning DNA sequences with TF motifs described as position weight matrices (PWMs). Both performance assessment with a receiver operating characteristic (ROC) curve and a correlation-based approach demonstrated that iFORM achieves higher accuracy and sensitivity by integrating five classical motif discovery programs using Fisher's combined probability test. We have used iFORM to provide accurate results on a variety of data in the ENCODE Project and the NIH Roadmap Epigenomics Project, and the tool has demonstrated its utility in further elucidating individual roles of functional elements. Both the source and binary codes for iFORM can be freely accessed at https://github.com/wenjiegroup/iFORM. The identified TF binding sites across human cell and tissue types using iFORM have been deposited in the Gene Expression Omnibus under the accession ID GSE53962.

  2. San Diego Wheelchair Accessible Bus Study

    DOT National Transportation Integrated Search

    1977-09-01

    The study describes the implementation and early operation of a pilot project of fixed route, wheelchair accessible bus service on two routes of the San Diego Transit system. Five buses of the Transit Authority fleet were retrofitted with wheelchair ...

  3. 20-Year Subject and Author Index, Volume 1, 1997-Volume 20, 1996; Subject and Author Index, Volume 21, 1997.

    ERIC Educational Resources Information Center

    Weiler, Robert M.; Pealer, Lisa N.

    1997-01-01

    This index provides readers interested in health behavior, health education, and health promotion ordered access to materials published in Health Values and the American Journal of Health Behavior, 1977-1997. The index includes 115 subject headings and 5 department headings, classifying 918 entries by 1,319 authors and coauthors. (SM)

  4. What Is Asked in Clinical Data Request Forms? A Multi-site Thematic Analysis of Forms Towards Better Data Access Support

    PubMed Central

    Hanauer, David A; Hruby, Gregory W.; Fort, Daniel G.; Rasmussen, Luke V.; Mendonça, Eneida A.; Weng, Chunhua

    2014-01-01

    Many academic medical centers have aggregated data from multiple clinical systems into centralized repositories. These repositories can then be queried by skilled data analysts who act as intermediaries between the data stores and the research teams. To obtain data, researchers are often expected to complete a data request form. Such forms are meant to support record-keeping and, most importantly, provide a means for conveying complex data needs in a clear and understandable manner. Yet little is known about how data request forms are constructed and how effective they are likely to be. We conducted a content analysis of ten data request forms from CTSA-supported institutions. We found that most of the forms over-emphasized the collection of metadata that were not considered germane to the actual data needs. Based on our findings, we provide recommendations to improve the quality of data request forms in support of clinical and translational research. PMID:25954367

  5. 45 CFR 150.419 - Forms of hearing.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Forms of hearing. 150.419 Section 150.419 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS CMS ENFORCEMENT IN GROUP AND INDIVIDUAL INSURANCE MARKETS Administrative Hearings § 150.419 Forms of hearing. (a...

  6. 45 CFR 150.419 - Forms of hearing.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Forms of hearing. 150.419 Section 150.419 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS CMS ENFORCEMENT IN GROUP AND INDIVIDUAL INSURANCE MARKETS Administrative Hearings § 150.419 Forms of hearing. (a...

  7. Research on a dynamic workflow access control model

    NASA Astrophysics Data System (ADS)

    Liu, Yiliang; Deng, Jinxia

    2007-12-01

    In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.

  8. 50 CFR 600.415 - Access to statistics.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... perform functions authorized by a Federal contract or grant. (c) State personnel. Upon written request... members might gain personal or competitive advantage from access to the data. (ii) The possibility that...

  9. 50 CFR 600.415 - Access to statistics.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... perform functions authorized by a Federal contract or grant. (c) State personnel. Upon written request... members might gain personal or competitive advantage from access to the data. (ii) The possibility that...

  10. 50 CFR 600.415 - Access to statistics.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... perform functions authorized by a Federal contract or grant. (c) State personnel. Upon written request... members might gain personal or competitive advantage from access to the data. (ii) The possibility that...

  11. 50 CFR 600.415 - Access to statistics.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... perform functions authorized by a Federal contract or grant. (c) State personnel. Upon written request... members might gain personal or competitive advantage from access to the data. (ii) The possibility that...

  12. A study of the effect of ADA accessibility on Kansas roundabouts.

    DOT National Transportation Integrated Search

    2008-11-01

    The Access Board, with authority to enforce provisions of the American Disabilities Act (ADA), initially determined : that roundabouts are not accessible by blind pedestrians and drafted proposed guidelines to require pedestrian : signals at all roun...

  13. 32 CFR 1900.01 - Authority and purpose.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Authority and purpose. 1900.01 Section 1900.01 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC ACCESS... National Security Act of 1947, as amended (50 U.S.C. 403); and sec. 6 of the Central Intelligence Agency...

  14. 32 CFR 1900.01 - Authority and purpose.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Authority and purpose. 1900.01 Section 1900.01 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC ACCESS... National Security Act of 1947, as amended (50 U.S.C. 403); and sec. 6 of the Central Intelligence Agency...

  15. 32 CFR 1900.01 - Authority and purpose.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Authority and purpose. 1900.01 Section 1900.01 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC ACCESS... National Security Act of 1947, as amended (50 U.S.C. 403); and sec. 6 of the Central Intelligence Agency...

  16. Policy Issues in Computer Networks: Multi-Access Information Systems.

    ERIC Educational Resources Information Center

    Lyons, Patrice A.

    As computer databases become more publicly accessible through public networks, there is a growing need to provide effective protection for proprietary information. Without adequate assurances that their works will be protected, authors and other copyright owners may be reluctant to allow the full text of their works to be accessed through computer…

  17. Structured Forms Reference Set of Binary Images (SFRS)

    National Institute of Standards and Technology Data Gateway

    NIST Structured Forms Reference Set of Binary Images (SFRS) (Web, free access)   The NIST Structured Forms Database (Special Database 2) consists of 5,590 pages of binary, black-and-white images of synthesized documents. The documents in this database are 12 different tax forms from the IRS 1040 Package X for the year 1988.

  18. The AAS Working Group on Accessibility and Disability (WGAD): progress, current projects, and prospects for making astronomy accessible to all

    NASA Astrophysics Data System (ADS)

    Aarnio, Alicia; Diaz-Merced, Wanda; Monkiewicz, Jacqueline; Knierman, Karen; AAS WGAD

    2018-01-01

    Representation of astronomers with disabilities is low at the earliest career stages and losses compound with career stage thereafter; single-digit and lower percentage representation statistics are in large part due to systemic barriers to access and failure to accommodate the needs of users of a wide range of abilities. In this presentation, we discuss the barriers currently inhibiting broad access to astronomical publications, databases, and conferences. The WGAD was formed in January of 2016 to work toward removal of these barriers to make our field inclusive of astronomers with disabilities at all career stages. We have productively engaged with publishers and accessibility audits have been performed. Database accessibility evaluation is underway, and we are working with the AAS and other professional organizations on conference accessibility. We are keeping users centrally focused via surveys and user test groups, and holding paramount the overarching idea that meeting present accessibility standards is a necessary but insufficient condition for full access.

  19. Web Content Accessibility Guidelines 2.0: A Further Step towards Accessible Digital Information

    ERIC Educational Resources Information Center

    Ribera, Mireia; Porras, Merce; Boldu, Marc; Termens, Miquel; Sule, Andreu; Paris, Pilar

    2009-01-01

    Purpose: The purpose of this paper is to explain the changes in the Web Content Accessibility Guidelines (WCAG) 2.0 compared with WCAG 1.0 within the context of its historical development. Design/methodology/approach: In order to compare WCAG 2.0 with WCAG 1.0 a diachronic analysis of the evolution of these standards is done. Known authors and…

  20. Accelerating global access to plant diversity information.

    PubMed

    Lughadha, Eimear Nic; Miller, Chuck

    2009-11-01

    Botanic gardens play key roles in the development and dissemination of plant information resources. Drivers for change have included progress in information technology, growing public expectations of electronic access and international conservation policy. Great advances have been made in the quantity, quality and accessibility of plant information in digital form and the extent to which information from multiple providers can be accessed through a single portal. However, significant challenges remain to be addressed in making botanic gardens resources maximally accessible and impactful, not least the overwhelming volume of material which still awaits digitisation. The year 2010 represents an opportunity for botanic gardens to showcase their collaborative achievements in delivery of electronic plant information and reinforce their relevance to pressing environmental issues.

  1. Cardea: Dynamic Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  2. Access Control for Mobile Assessment Systems Using ID.

    PubMed

    Nakayama, Masaharu; Ishii, Tadashi; Morino, Kazuma

    2015-01-01

    The assessment of shelters during disaster is critical to ensure the health of evacuees and prevent pandemic. In the Ishinomaki area, one of the areas most damaged by the Great East Japan Earthquake, the highly organized assessment helped to successfully manage a total of 328 shelters with a total of 46,480 evacuees. The input and analysis of vast amounts of data was tedious work for staff members. However, a web-based assessment system that utilized mobile devices was thought to decrease workload and standardize the evaluation form. The necessary access of information should be controlled in order to maintain individuals' privacy. We successfully developed an access control system using IDs. By utilizing a unique numerical ID, users can access the input form or assessment table. This avoids unnecessary queries to the server, resulting in a quick response and easy availability, even with poor internet connection.

  3. So You Wanna Be a Web Author?

    ERIC Educational Resources Information Center

    Buchanan, Larry

    1996-01-01

    Defines HyperText Markup Language (HTML) as it relates to the World Wide Web (WWW). Describes steps needed to create HTML files on a UNIX system and to make them accessible via the WWW. Presents a list of basic HTML formatting codes and explains the coding used in the author's personal HTML file. (JMV)

  4. 7 CFR 2200.4 - Authority of the Board.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Authority of the Board. 2200.4 Section 2200.4 Agriculture Regulations of the Department of Agriculture (Continued) LOCAL TELEVISION LOAN GUARANTEE BOARD ACCESS TO LOCAL TELEVISION SIGNALS GUARANTEED LOAN PROGRAM; GENERAL POLICIES AND PROCEDURES § 2200.4...

  5. Parallel Systems Laboratory: Access, Allocation, and Control

    DTIC Science & Technology

    1992-06-30

    boog Eae...4d READ ISTRUCTIONSREPORT DOCUMENTATIO PAGE BEFOR COMPLETNG FORM I. REPORT NUMNER 2. GOVT ACCESSION NO 3- RECIPINT’S CATALOG NUMR9 . TITLE (an...a summary of the salient results of this research in capsule form which is followed by an extensive list of publications, dissertations and theses...because it provides the asymptotic use of currently wasted cycles. To do so, we examine a distribution of w(u It) in a very simple form and for

  6. A System for Web-based Access to the HSOS Database

    NASA Astrophysics Data System (ADS)

    Lin, G.

    Huairou Solar Observing Station's (HSOS) magnetogram and dopplergram are world-class instruments. Access to their data has opened to the world. Web-based access to the data will provide a powerful, convenient tool for data searching and solar physics. It is necessary that our data be provided to users via the Web when it is opened to the world. In this presentation, the author describes general design and programming construction of the system. The system will be generated by PHP and MySQL. The author also introduces basic feature of PHP and MySQL.

  7. Poor Access for African Researchers to African Emergency Care Publications: A Cross-sectional Study

    PubMed Central

    Bruijns, Stevan R.; Maesela, Mmapeladi; Sinha, Suniti; Banner, Megan

    2017-01-01

    Introduction Based on relative population size and burden of disease, emergency care publication outputs from low- and middle-income regions are disproportionately lower than those of high-income regions. Ironically, outputs from regions with higher publication rates are often less relevant in the African context. As a result, the dissemination of and access to local research is essential to local researchers, but the cost of this access (actual and cost-wise) remains unknown. The aim of this study was to describe access to African emergency care publications in terms of publisher-based access (open access or subscription) and alternate access (self-archived or author provided), as well as the cost of access. Methods We conducted a retrospective, cross-sectional study using all emergency medicine publications included in Scopus between 2011 and 2015. A sequential search strategy described access to each article, and we calculated mean article charges against the purchasing power parity index (used to describe out-of-pocket expense). Results We included 666 publications from 49 journals, of which 395 (59.3%) were open access. For subscription-based articles, 106 (39.1%) were self-archived, 60 (22.1%) were author-provided, and 105 (38.8%) were inaccessible. Mean article access cost was $36.44, and mean processing charge was $2,319.34. Using the purchasing power parity index it was calculated that equivalent out-of-pocket expenditure for South African, Ghanaian and Tanzanian authors would respectively be $15.77, $10.44 and $13.04 for access, and $1,004.02, $664.36 and $830.27 for processing. Based on this, the corrected cost of a single-unit article access or process charge for South African, Ghanaian and Tanzanian authors, respectively, was 2.3, 3.5 and 2.8 times higher than the standard rate. Conclusion One in six African emergency care publications are inaccessible outside institutional library subscriptions; additionally, the cost of access to publications in low

  8. User Problems with Access to Fictional Characters and Personal Names in Online Public Access Catalogs.

    ERIC Educational Resources Information Center

    Yee, Martha M.; Soto, Raymond

    1991-01-01

    Describes a survey of reference librarians in libraries with online public access catalogs that was conducted to determine what types of searches patrons would use to look for names of fictional characters. Name, subject, and author indexes are discussed, and implications for cataloging using the MARC format are suggested. (10 references) (LRW)

  9. 75 FR 2583 - Over-the-Road Bus Accessibility Program Grants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-15

    ... Transportation Equity Act for the 21st Century (TEA-21). The OTRB Accessibility Program makes funds available to... (TEA-21), Public Law 105-85 as amended by the Safe, Accountable, Flexible, Efficient, Transportation.... transportation system. TEA-21 authorized FTA's OTRB Accessibility Program to assist OTRB operators in complying...

  10. Accessing Digital Libraries: A Study of ARL Members' Digital Projects

    ERIC Educational Resources Information Center

    Kahl, Chad M.; Williams, Sarah C.

    2006-01-01

    To ensure efficient access to and integrated searching capabilities for their institution's new digital library projects, the authors studied Web sites of the Association of Research Libraries' (ARL) 111 academic, English-language libraries. Data were gathered on 1117 digital projects, noting library Web site and project access, metadata, and…

  11. Distinct modes of DNA accessibility in plant chromatin.

    PubMed

    Shu, Huan; Wildhaber, Thomas; Siretskiy, Alexey; Gruissem, Wilhelm; Hennig, Lars

    2012-01-01

    The accessibility of DNA to regulatory proteins is a major property of the chromatin environment that favours or hinders transcription. Recent studies in flies reported that H3K9me2-marked heterochromatin is accessible while H3K27me3-marked chromatin forms extensive domains of low accessibility. Here we show that plants regulate DNA accessibility differently. H3K9me2-marked heterochromatin is the least accessible in the Arabidopsis thaliana genome, and H3K27me3-marked chromatin also has low accessibility. We see that very long genes without H3K9me2 or H3K27me3 are often inaccessible and generated significantly lower amounts of antisense transcripts than other genes, suggesting that reduced accessibility is associated with reduced recognition of alternative promoters. Low accessibility of H3K9me2-marked heterochromatin and long genes depend on cytosine methylation, explaining why chromatin accessibility differs between plants and flies. Together, we conclude that restriction of DNA accessibility is a local property of chromatin and not necessarily a consequence of microscopically visible compaction.

  12. 78 FR 68903 - Proposed Collection; Comment Request for Form 8879-EX

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-15

    ... Form 8879-EX, IRS e-file Signature Authorization for Forms 720, 2290, and 8849. DATES: Written comments...: IRS e-file Signature Authorization for Forms 720, 2290, and 8849. OMB Number: 1545-2081. Form Number: 8879-EX. Abstract: The Form 8879-EX, IRS e-file Signature Authorization for Forms 720, 2990, and 8849...

  13. A method to implement fine-grained access control for personal health records through standard relational database queries.

    PubMed

    Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley

    2010-10-01

    Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.

  14. Forming-free, bipolar resistivity switching characteristics of fully transparent resistive random access memory with IZO/α-IGZO/ITO structure

    NASA Astrophysics Data System (ADS)

    Lo, Chun-Chieh; Hsieh, Tsung-Eong

    2016-09-01

    Fully transparent resistive random access memory (TRRAM) containing amorphous indium gallium zinc oxide as the resistance switching (RS) layer and transparent conducting oxides (indium zinc oxide and indium tin oxide) as the electrodes was prepared. Optical measurement indicated the transmittance of device exceeds 80% in visible-light wavelength range. TRRAM samples exhibited the forming-free feature and the best electrical performance (V SET  =  0.61 V V RESET  =  -0.76 V R HRS/R LRS (i.e. the R-ratio)  >103) was observed in the device subject to a post-annealing at 300 °C for 1 hr in atmospheric ambient. Such a sample also exhibited satisfactory endurance and retention properties at 85 °C as revealed by the reliability tests. Electrical measurement performed in vacuum ambient indicated that the RS mechanism correlates with the charge trapping/de-trapping process associated with oxygen defects in the RS layer.

  15. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks.

    Scope of Contributions

    This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to:
    • Optical access network architectures and protocols
    • Passive optical networks (BPON, EPON, GPON, etc.)
    • Active optical networks
    • Multiple access control
    • Multiservices and QoS provisioning
    • Network survivability
    • Field trials and standards
    • Performance modeling and analysis

    Manuscript Submission

    To submit to this special issue, follow the normal procedure for submission to JON, indicating ``Optical Access Networks feature' in the ``Comments' field of the online submission form. For all other questions relating to this feature issue, please send an e-mail to jon@osa.org, subject line ``Optical Access Networks' Additional information can be found on the JON website: http://www.osa-jon.org/submission/. Submission Deadline: 1 June 2005

  16. Pilot evaluation of a web-based intervention targeting sexual health service access.

    PubMed

    Brown, K E; Newby, K; Caley, M; Danahay, A; Kehal, I

    2016-04-01

    Sexual health service access is fundamental to good sexual health, yet interventions designed to address this have rarely been implemented or evaluated. In this article, pilot evaluation findings for a targeted public health behavior change intervention, delivered via a website and web-app, aiming to increase uptake of sexual health services among 13-19-year olds are reported. A pre-post questionnaire-based design was used. Matched baseline and follow-up data were identified from 148 respondents aged 13-18 years. Outcome measures were self-reported service access, self-reported intention to access services and beliefs about services and service access identified through needs analysis. Objective service access data provided by local sexual health services were also analyzed. Analysis suggests the intervention had a significant positive effect on psychological barriers to and antecedents of service access among females. Males, who reported greater confidence in service access compared with females, significantly increased service access by time 2 follow-up. Available objective service access data support the assertion that the intervention may have led to increases in service access. There is real promise for this novel digital intervention. Further evaluation is planned as the model is licensed to and rolled out by other local authorities in the United Kingdom. © The Author 2016. Published by Oxford University Press. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  17. VARIATION IN ACCESSIBLE CELL SURFACE IMMUNOGLOBULIN AMONG ANTIBODY-FORMING CELLS

    PubMed Central

    Nossal, G. J. V.; Lewis, Heather

    1972-01-01

    Spleen cells from CBA mice that had been primarily or secondarily immunized with sheep red blood cells were reacted at 0°C with a 125I-labeled polyvalent rabbit anti-mouse globulin reagent. After suitable washing, the cells were placed in a plaque-revealing monolayer and warmed to 37°C. Plaques appeared within 10–20 min. Single plaque-forming cells (PFC) were taken from the middle of plaques, were washed by micromanipulation, and were singly dried on glass slides. The amount of attached antireceptor was assessed by quantitative radioautography. Great variation in "receptor density" was encountered among the 258 single cells studied. However, early, immature PFC in both primary and secondary responses had statistically significantly more receptors than late, mature PFC. On any given day point, no difference was found between IgM- and IgG-forming cells. The results were consistent with the view that cells still able to be driven to further proliferation by antigen retain receptors, and conversely that cells, as they mature, lose both receptors and ability to be influenced by antigen. PMID:4554455

  18. Accessing specialty behavioral health treatment in private health plans.

    PubMed

    Merrick, Elizabeth L; Horgan, Constance M; Garnick, Deborah W; Reif, Sharon; Stewart, Maureen T

    2009-10-01

    Connecting people to mental health and substance abuse services is critical, given the extent of unmet need. The way health plans structure access to care can play a role. This study examined treatment entry procedures for specialty behavioral health care in private health plans and their relationship with behavioral health contracting arrangements, focusing primarily on initial entry into outpatient treatment. The data source was a nationally representative health plan survey on behavioral health services in 2003 (N = 368 plans with 767 managed care products; 83% response rate). Most health plan products initially authorized six or more outpatient visits if authorization was required, did not routinely conduct telephonic clinical assessment, had standards for timely access, and monitored wait time. Products with carve-outs differed on several treatment entry dimensions. Findings suggest that health plans focus on timely access and typically do not heavily manage initial entry into outpatient treatment.

  19. Rejected Manuscripts in Publishers' Archives: Legal Rights and Access

    ERIC Educational Resources Information Center

    Hamburger, Susan

    2011-01-01

    This article focuses on an analysis of how various archival repositories deal with rejected manuscripts in publishers' archives as part of existing collections and as potential donations, and includes suggestions for ways to provide access while maintaining the author's legal rights. Viewpoints from the journal editor, author, archivist, and…

  20. Evolution of Nursing Science: Is Open Access the Answer?

    PubMed

    Clarke, Pamela N; Garcia, Jenny

    2015-10-01

    The open access movement where journal content is made freely available over the Internet is purported to increase scientific exchange, yet has pros and cons. There are issues related to quality that need to be examined in relation to evolution of nursing science. © The Author(s) 2015.

  1. Methodology for Localized and Accessible Image Formation and Elucidation

    ERIC Educational Resources Information Center

    Patil, Sandeep R.; Katiyar, Manish

    2009-01-01

    Accessibility is one of the key checkpoints in all software products, applications, and Web sites. Accessibility with digital images has always been a major challenge for the industry. Images form an integral part of certain type of documents and most Web 2.0-compliant Web sites. Individuals challenged with blindness and many dyslexics only make…

  2. Access to digital library databases in higher education: design problems and infrastructural gaps.

    PubMed

    Oswal, Sushil K

    2014-01-01

    After defining accessibility and usability, the author offers a broad survey of the research studies on digital content databases which have thus far primarily depended on data drawn from studies conducted by sighted researchers with non-disabled users employing screen readers and low vision devices. This article aims at producing a detailed description of the difficulties confronted by blind screen reader users with online library databases which now hold most of the academic, peer-reviewed journal and periodical content essential for research and teaching in higher education. The approach taken here is borrowed from descriptive ethnography which allows the author to create a complete picture of the accessibility and usability problems faced by an experienced academic user of digital library databases and screen readers. The author provides a detailed analysis of the different aspects of accessibility issues in digital databases under several headers with a special focus on full-text PDF files. The author emphasizes that long-term studies with actual, blind screen reader users employing both qualitative and computerized research tools can yield meaningful data for the designers and developers to improve these databases to a level that they begin to provide an equal access to the blind.

  3. 17 CFR 9.12 - Effective date of disciplinary or access denial action.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... ACTIONS Notice and Effective Date of Disciplinary Action or Access Denial Action § 9.12 Effective date of disciplinary or access denial action. (a) Effective date. Any disciplinary or access denial action taken by an... cause a disciplinary action to become effective prior to that time if: (1) As authorized by § 8.25 of...

  4. Access to water

    NASA Astrophysics Data System (ADS)

    Stein, Robyn; Niklaas, Lindie

    This paper will examine the legal implications of the South African Constitutional judgement of Government of the Republic of South Africa and others vs Grootboom and others (2001(1) SA 46 (CC)) in view of the developing debate on socio-economic rights under the constitution on the constitutional right of access to sufficient water. It will look at the manner in which effect is being given to this right at municipal level through the provision of free water and the constitutional implications of an adequate basic minimum level set by the State and local authorities. The paper will also explore the implications of relevant legislation, which enables local authorities to cut off water supplies as well as the implications of the Grootboom decision for communities facing water cut-offs.

  5. Open access to scientific articles: a review of benefits and challenges.

    PubMed

    Björk, Bo-Christer

    2017-03-01

    The Internet has fundamentally changed the publishing of scholarly peer reviewed journals, and the way readers find and access articles. Digital access is nowadays the norm, in particular for researchers. The Internet has enabled a totally new business model, Open Access (OA), in which an article is openly available in full text for anyone with Internet access. This article reviews the different options to achieve this, whether by journals changing their revenue structures from subscription to publishing charges, or authors utilizing a number of options for posting OA versions of article manuscripts in repositories. It also discusses the regrettable emergence of "predatory" publishers, who spam academics, and make money by promising them rapid publication with only the semblance of peer review. The situation is further discussed from the viewpoints of different stakeholders, including academics as authors and readers, practicing physicians and the general public.

  6. Computer-Assisted Language Learning Authoring Issues

    ERIC Educational Resources Information Center

    Otto, Sue E. K.; Pusack, James P.

    2009-01-01

    Computer-assisted language learning (CALL) authoring refers to a wide variety of creative development activities using software tools that run the gamut from simple templates (easy-to-use predefined forms into which content is typed) to complex authoring environments (flexible but harder-to-use systems, requiring advanced skills and a great deal…

  7. How Often Are Drugs Made Available Under the Food and Drug Administration's Expanded Access Process Approved?

    PubMed

    McKee, Amy E; Markon, André O; Chan-Tack, Kirk M; Lurie, Peter

    2017-10-01

    In this review of individual patient expanded-access requests to the Center for Drug Evaluation and Research for the period Fiscal Year 2010 to Fiscal Year 2014, we evaluated the number of applications received and the number allowed to proceed. We also evaluated whether drugs and certain biologics obtained under expanded access went on to be approved by the Food and Drug Administration. Finally, we considered concerns that adverse events occurring during expanded access might place sponsors at risk for legal liability. Overall, 98% of individual patient expanded-access requests were allowed to proceed. During the study period, among drugs without a previous approval for any indication or dosage form, 24% of unique drugs (ie, multiple applications for access to the same drug were considered to relate to 1 unique drug), and 20% of expanded-access applications received marketing approval by 1 year after initial submission; 43% and 33%, respectively, were approved by 5 years after initial submission. A search of 3 legal databases and a database of news articles did not appear to identify any product liability cases arising from the use of a product in expanded access. Our analyses seek to give physicians and patients a realistic perspective on the likelihood of a drug's approval as well as certain information regarding the product liability risks for commercial sponsors when providing expanded access to investigational drugs. The US Food and Drug Administration (FDA)'s expanded-access program maintains a careful balance between authorizing patient access to potentially beneficial drugs and protecting them from drugs that may have unknown risks. At the same time, the agency wishes to maintain the integrity of the clinical trials process, ultimately the best way to get safe and effective drugs to patients. © 2017, The American College of Clinical Pharmacology.

  8. Acceptable care? Illness constructions, healthworlds, and accessible chronic treatment in South Africa.

    PubMed

    Fried, Jana; Harris, Bronwyn; Eyles, John; Moshabela, Mosa

    2015-05-01

    Achieving equitable access to health care is an important policy goal, with access influenced by affordability, availability, and acceptability of specific services. We explore patient narratives from a 5-year program of research on health care access to examine relationships between social constructions of illness and the acceptability of health services in the context of tuberculosis treatment and antiretroviral therapy in South Africa. Acceptability of services seems particularly important to the meanings patients attach to illness and care, whereas-conversely-these constructions appear to influence what constitutes acceptability and hence affect access to care. We highlight the underestimated role of individually, socially, and politically constructed healthworlds; traditional and biomedical beliefs; and social support networks. Suggested policy implications for improving acceptability and hence overall health care access include abandoning patronizing approaches to care and refocusing from treating "disease" to responding to "illness" by acknowledging and incorporating patients' healthworlds in patient-provider interactions. © The Author(s) 2015.

  9. Electronic journal access: how does it affect the print subscription price?*

    PubMed Central

    Chen, Frances L.; Wrynn, Paul; Rieke, Judith L.

    2001-01-01

    Objective: This study examined the rates of print journal subscription price increases according to the type of available electronic access. The types of access included: electronic priced separately from the print, combination print with “free online” access, and aggregated, defined here as electronic access purchased as part of a collection. The percentages of print price increases were compared to each other and to that for titles available only in print. The authors were not aware of prior objective research in this area. Methods: The authors analyzed the percentage print price increases of 300 journals over a five-year time period. The titles were grouped according to type of available electronic access. The median and mean percentage print price increases were calculated and plotted for all titles within each group. Results: Using both the median and the mean to look at the percentage print price increases over five years, it was obvious that print prices for journals with electronic access exceeded journals that did not offer an electronic option. Electronic priced separately averaged 3% to 5% higher than print only titles using both measures. Combination print with “free online” access had higher increases from 1996 to 1999, but, in 2000, their percentage increases were about the same as print only titles. The rate of price increases for aggregated titles consistently went down over the past five years. Journals with no electronic option showed the lowest percentage rates of print price increase. Conclusions: The authors' findings reveal that the increases of print prices for their sample of titles were higher if a type of electronic access was offered. According to the results of this study, aggregated collections currently represent the electronic option whose percentage price increase for print prices was lowest. However, the uneven fluctuations in rates of subscription prices revealed that the pricing of journals with electronic access is still

  10. 45 CFR 150.403 - Scope of ALJ's authority.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Scope of ALJ's authority. 150.403 Section 150.403 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS CMS ENFORCEMENT IN GROUP AND INDIVIDUAL INSURANCE MARKETS Administrative Hearings § 150.403 Scope of ALJ's...

  11. 45 CFR 150.403 - Scope of ALJ's authority.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Scope of ALJ's authority. 150.403 Section 150.403 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS CMS ENFORCEMENT IN GROUP AND INDIVIDUAL INSURANCE MARKETS Administrative Hearings § 150.403 Scope of ALJ's...

  12. Predatory Open Access in Rehabilitation.

    PubMed

    Manca, Andrea; Martinez, Gianluca; Cugusi, Lucia; Dragone, Daniele; Mercuro, Giuseppe; Deriu, Franca

    2017-05-01

    Increasingly scholars and researchers are being solicited by predatory open access journals seeking manuscript submissions and abusing the author-pays model by charging authors with publishing fees without any or proper peer review. Such questionable editorial practices are threatening the reputation and credibility of scholarly publishing. To date, no investigation has been conducted on this phenomenon in the field of rehabilitation. This study attempts to identify specific predatory journals operating in this field to quantify the phenomenon and its geographic distribution. Beall's List has been used to this end which, although not perfect, is a comprehensive and up-to-date report of predatory publishers. Of the 1113 publishers on the list, 59 journals were identified, for a total of 5610 published articles. The median number of articles published by each journal was 21, and the median amount of article processing charges was $499. Only 1 out of 59 journals was included in the Directory of Open Access Journals, whereas 7 (12%) were indexed by PubMed. Most of the publishers were based in India (36%) followed by the United States (25%) and Pakistan (5%), and 25% were without a verifiable address. The data indicate that the threat of predatory publishing in rehabilitation is real. Physiatrists, physiotherapists, researchers, and academics operating in this field are advised to use the tools available to recognize predatory practices before considering publishing in open access journals. Copyright © 2017 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  13. Gold or green: the debate on open access policies.

    PubMed

    Abadal, Ernest

    2013-09-01

    The movement for open access to science seeks to achieve unrestricted and free access to academic publications on the Internet. To this end, two mechanisms have been established: the gold road, in which scientific journals are openly accessible, and the green road, in which publications are self-archived in repositories. The publication of the Finch Report in 2012, advocating exclusively the adoption of the gold road, generated a debate as to whether either of the two options should be prioritized. The recommendations of the Finch Report stirred controversy among academicians specialized in open access issues, who felt that the role played by repositories was not adequately considered and because the green road places the burden of publishing costs basically on authors. The Finch Report's conclusions are compatible with the characteristics of science communication in the UK and they could surely also be applied to the (few) countries with a powerful publishing industry and substantial research funding. In Spain, both the current national legislation and the existing rules at universities largely advocate the green road. This is directly related to the structure of scientific communication in Spain, where many journals have little commercial significance, the system of charging a fee to authors has not been adopted, and there is a good repository infrastructure. As for open access policies, the performance of the scientific communication system in each country should be carefully analyzed to determine the most suitable open access strategy.

  14. 29 CFR 1960.69 - Retention and updating of old forms.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ....69 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) BASIC PROGRAM ELEMENTS FOR FEDERAL EMPLOYEE OCCUPATIONAL SAFETY AND HEALTH... continue to provide access to the data as though these forms were the OSHA Form 300 Log and Form 301...

  15. 29 CFR 1960.69 - Retention and updating of old forms.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ....69 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) BASIC PROGRAM ELEMENTS FOR FEDERAL EMPLOYEE OCCUPATIONAL SAFETY AND HEALTH... continue to provide access to the data as though these forms were the OSHA Form 300 Log and Form 301...

  16. Speeding Access to Vaccines and Medicines in Low- and Middle-Income Countries: A Case for Change and a Framework for Optimized Product Market Authorization

    PubMed Central

    Ahonkhai, Vincent; Portet, Alexandre; Hartman, Dan

    2016-01-01

    Background The United Nations Millennium Development Goals galvanized global efforts to alleviate suffering of the world’s poorest people through unprecedented public-private partnerships. Donor aid agencies have demonstrably saved millions of lives that might otherwise have been lost to disease through increased access to quality-assured vaccines and medicines. Yet, the introduction of these health interventions in low- and middle-income countries (LMICs) continues to face a time lag due to factors which remain poorly understood. Methods and Findings A recurring theme from our partnership engagements was that an optimized regulatory process would contribute to improved access to quality health products. Therefore, we investigated the current system for medicine and vaccine registration in LMICs as part of our comprehensive regulatory strategy. Here, we report a fact base of the registration timelines for vaccines and drugs used to treat certain communicable diseases in LMICs. We worked with a broad set of stakeholders, including the World Health Organization’s prequalification team, national regulatory authorities, manufacturers, procurers, and other experts, and collected data on the timelines between first submission and last approval of applications for product registration sub-Saharan Africa. We focused on countries with the highest burden of communicable disease and the greatest need for the products studied. The data showed a typical lag of 4 to 7 years between the first regulatory submission which was usually to a regulatory agency in a high-income country, and the final approval in Sub-Saharan Africa. Two of the three typical registration steps which products undergo before delivery in the countries involve lengthy timelines. Failure to leverage or rely on the findings from reviews already performed by competent regulatory authorities, disparate requirements for product approval by the countries, and lengthy timelines by manufacturers to respond to

  17. Institutional open access funds: now is the time.

    PubMed

    Eckman, Charles D; Weil, Beth T

    2010-05-25

    To date, the Berkeley OA fund has ensured that 43 articles are free to be read immediately upon publication and 44 additional articles are now in the pipeline. The full scope of OA publishing during this period was significantly larger, at least by a factor of four. The OA fund allocation will continue to be carefully managed over the coming years. We are tracking our potential liability assuming the OA landscape grows with additional publishers and OA options. The amount predicted as necessary to maintain the fund based on the initial 18-month uptake data is US$45,000. This is less than 1% of the US$6.2 million the library invests in subscribing to closed-access digital journals. We are paying attention in particular to the attempts by the California Digital Library, which negotiates major journal publisher licenses on behalf of the UC campuses, to include terms within the licenses that enable UC authors to take advantage of publishers'hybrid OA options [16]. And it comes with far less of the myriad overhead costs associated with those closed-access subscriptions because that subscription price doesn't tell the full story of the actual cost of maintaining the subscription. Those subscriptions involve staff-intensive license negotiations. Institutions develop and maintain systems architectures in order to ensure that only authorized users have access and respond to challenges from publishers of the content when actual or potential breaches of the licenses are identified (publishers invest hugely in monitoring use of their content in order to ensure the license terms are not breached and are quite willing to contact the institutional subscriber when any untoward activity appears on their logs). They must, in certain instances, maintain the confidentiality of certain clauses in the licenses and increasingly respond to freedom of information, public records act requests related to the investments of public resources in those contracts. The need to experiment is

  18. 12 CFR 956.2 - Authorized investments.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Authorized investments. 956.2 Section 956.2... ITEMS FEDERAL HOME LOAN BANK INVESTMENTS § 956.2 Authorized investments. In addition to assets... securities of any small business investment company formed pursuant to 15 U.S.C. 681(d), to the extent such...

  19. 12 CFR 956.2 - Authorized investments.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 7 2011-01-01 2011-01-01 false Authorized investments. 956.2 Section 956.2... ITEMS FEDERAL HOME LOAN BANK INVESTMENTS § 956.2 Authorized investments. In addition to assets... securities of any small business investment company formed pursuant to 15 U.S.C. 681(d), to the extent such...

  20. 7 CFR 631.22 - Access to operating unit.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... include the right to measure acreages, render technical assistance, and inspect any work undertaken under... Access to operating unit. Any authorized NRCS representative shall have the right to enter an operating...

  1. Technology Resources: Mathematics Accessibility for All Not Accommodation for Some

    ERIC Educational Resources Information Center

    Duranczyk, Irene M.

    2009-01-01

    When faculty and learning assistance staff create teaching documents and web pages envisioning the widest range of users they can save time while achieving access for all. There are tools and techniques available to make mathematics visual, orally, and dynamically more accessible through multimodal presentation forms. Resources from Design…

  2. Access to data and the information explosion: oral contraceptives and risk of cancer.

    PubMed

    Weiner, J M; Shirley, S; Gilman, N J; Stowe, S M; Wolf, R M

    1981-09-01

    This report describes a technically feasible method to deal with the enormous volume of literature published regarding oral contraceptives. This subject was discussed in 3735 publications during the period from November 1977 through October 1980. Our findings showed that those papers reporting original, numeric relationships involving risk of cancer and use of oral contraceptives were one percent of the total 3735 publications. However, only seven of the 27 articles involved were authored by individuals from departments of obstetrics and gynecology. Further, only four of the 27 were published in journals devoted to obstetrics and gynecology. The analyses suggest a form of censorship taking place, in that the obstetrics/gynecology specialists do not have ready access to the primary data.

  3. Forms of History Textbook Interference

    ERIC Educational Resources Information Center

    Blaauw, Jan

    2017-01-01

    History textbooks in contemporary democracies have often been exposed to censorship and other forms of interference. This article presents the idea of a classification of these forms as a novel way to contemplate the ambivalent relationship between democratic authority and historical instruction. The model primarily distinguishes official forms of…

  4. The case for full practice authority.

    PubMed

    Holmes, Olivia; Kinsey-Weathers, Shanieka

    2016-03-01

    The Institute of Medicine (IOM) recommended in its 2010 report on the future of nursing that advanced practice registered nurses (APRNs) should factor prominently in providing care to the millions of Americans who access healthcare services under the Affordable Care Act (ACA). The IOM also recommended that APRNs practice to the full extent of their education and training.However, many states have laws in place that limit full practice authority for APRNs, specifically NPs, in providing basic health services such as primary care. These laws place restrictions on independent practice and Medicaid and Medicare reimbursement, which prevent nurses from “responding effectively to rapidly changing health care settings and an evolving health care system.” Less than half of the United States has adopted full practice authority licensure and practice laws (see APRN practice authority at a glance). This article discusses how the primary care needs of millions of Americans can be met by granting full practice authority to APRNs nationwide and provides evidence to support the high level of care these practitioners can provide independently.

  5. 10 CFR 26.65 - Pre-access drug and alcohol testing.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... rely on the results of those drug and alcohol tests to meet the requirements for pre-access testing in... authorization until the drug test results are received. (2) The licensee or other entity need not conduct pre... tests; or (iii) If the individual is selected for pre-access testing under this paragraph, the licensee...

  6. 10 CFR 26.65 - Pre-access drug and alcohol testing.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... rely on the results of those drug and alcohol tests to meet the requirements for pre-access testing in... authorization until the drug test results are received. (2) The licensee or other entity need not conduct pre... tests; or (iii) If the individual is selected for pre-access testing under this paragraph, the licensee...

  7. 10 CFR 26.65 - Pre-access drug and alcohol testing.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... rely on the results of those drug and alcohol tests to meet the requirements for pre-access testing in... authorization until the drug test results are received. (2) The licensee or other entity need not conduct pre... tests; or (iii) If the individual is selected for pre-access testing under this paragraph, the licensee...

  8. 10 CFR 26.65 - Pre-access drug and alcohol testing.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... rely on the results of those drug and alcohol tests to meet the requirements for pre-access testing in... authorization until the drug test results are received. (2) The licensee or other entity need not conduct pre... tests; or (iii) If the individual is selected for pre-access testing under this paragraph, the licensee...

  9. Anatomical connections of the visual word form area.

    PubMed

    Bouhali, Florence; Thiebaut de Schotten, Michel; Pinel, Philippe; Poupon, Cyril; Mangin, Jean-François; Dehaene, Stanislas; Cohen, Laurent

    2014-11-12

    The visual word form area (VWFA), a region systematically involved in the identification of written words, occupies a reproducible location in the left occipitotemporal sulcus in expert readers of all cultures. Such a reproducible localization is paradoxical, given that reading is a recent invention that could not have influenced the genetic evolution of the cortex. Here, we test the hypothesis that the VWFA recycles a region of the ventral visual cortex that shows a high degree of anatomical connectivity to perisylvian language areas, thus providing an efficient circuit for both grapheme-phoneme conversion and lexical access. In two distinct experiments, using high-resolution diffusion-weighted data from 75 human subjects, we show that (1) the VWFA, compared with the fusiform face area, shows higher connectivity to left-hemispheric perisylvian superior temporal, anterior temporal and inferior frontal areas; (2) on a posterior-to-anterior axis, its localization within the left occipitotemporal sulcus maps onto a peak of connectivity with language areas, with slightly distinct subregions showing preferential projections to areas respectively involved in grapheme-phoneme conversion and lexical access. In agreement with functional data on the VWFA in blind subjects, the results suggest that connectivity to language areas, over and above visual factors, may be the primary determinant of VWFA localization. Copyright © 2014 the authors 0270-6474/14/3415402-13$15.00/0.

  10. Internet Access in the European Union and in the United States.

    ERIC Educational Resources Information Center

    Bauer, Johannes M.; Berne, Michel; Maitland, Carleen F.

    2002-01-01

    Examines the effects of public policies towards traditional communications infrastructures on Internet access in Europe and the United States. Discusses competitive strategies and describes the influence of regulatory policies affecting market entry and the pricing of services on Internet access, based on empirical findings. (Author/LRW)

  11. [Generalized congenital fibromatosis (author's transl)].

    PubMed

    Larrègue, M; Poitou, C; Bressieux, J P; de Giacomoni, P; Vant, F

    1977-05-01

    About a spontaneously regressive case of osteo-cutaneous congenital fibromatosis, the authors describe the characteristics of the disease (32 observations). Although the majority of cases are sporadic, 3 familial observations are in favour of a dominant autosomal transmission of low penetrance. Study of the familial cases and analysis of the different localisations demonstrate the unicity of the so-called diffuse forms with visceral involvement and of the so-called generalized forms without visceral involvement congenital fibromatosis is characterized by several fibromas at birth: in two-thirds of the cases, it is a purely cutaneous or osteocutaneous form, which disappears spontaneously; in one third of the cases, it is a cutaneous or osteo-cutaneous form with lethal visceral involvement.

  12. An Instrument for the Measurement of Parental Authority Prototypes.

    ERIC Educational Resources Information Center

    Buri, John R.

    Baumrind (1971) proposed three distinct patterns of parental authority (permissiveness, authoritarianism, and authoritativeness) and measured these parenting styles through interviews with parents and their children and through observations of parents interacting with their children. This study was undertaken to develop a readily-accessible,…

  13. Observation of Prethermalization in Long-Range Interacting Spin Chains (Open Access, Author’s Manuscript)

    DTIC Science & Technology

    2016-08-03

    instance, quantum systems that are near-integrable usually fail to thermalize in an experimentally realistic time scale and, instead, relax to quasi ...However, it is possible to observe quasi -stationary states, often called prethermal, that emerge within an experimentally accessible time scale. Previous...generalized Gibbs ensemble (GGE) [10–13]. Here we experimentally study the relaxation dynamics of a chain of up to 22 spins evolving under a long-range

  14. The base rates and factors associated with reported access to firearms in psychiatric inpatients.

    PubMed

    Kolla, Bhanu Prakash; O'Connor, Stephen S; Lineberry, Timothy W

    2011-01-01

    The aim of this study was to define whether specific patient demographic groups, diagnoses or other factors are associated with psychiatric inpatients reporting firearms access. A retrospective medical records review study was conducted using information on access to firearms from electronic medical records for all patients 16 years and older admitted between July 2007 and May 2008 at the Mayo Clinic Psychiatric Hospital in Rochester, MN. Data were obtained only on patients providing authorization for record review. Data were analyzed using univariate and multivariate logistic regression analyses accounting for gender, diagnostic groups, comorbid substance use, history of suicide attempts and family history of suicide/suicide attempts. Seventy-four percent (1169/1580) of patients provided research authorization. The ratio of men to women was identical in both research and nonresearch authorization groups. There were 14.6% of inpatients who reported firearms access. In univariate analysis, men were more likely (P<.0001) to report access than women, and a history of previous suicide attempt(s) was associated with decreased access (P=.02). Multiple logistic regression analyses controlling for other factors found females and patients with history of previous suicide attempt(s) less likely to report access, while patients with a family history of suicide or suicide attempts reported increased firearms access. Diagnostic groups were not associated with access on univariate or multiple logistic regression analyses. Men and inpatients with a family history of suicide/suicide attempts were more likely to report firearms access. Clinicians should develop standardized systems of identification of firearms access and provide guidance on removal. Copyright © 2011 Elsevier Inc. All rights reserved.

  15. 17 CFR Appendix to Part 48 - Form FBOT

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... BOARDS OF TRADE Pt. 48, App. Appendix to Part 48—Form FBOT COMMODITY FUTURES TRADING COMMISSION FORM FBOT FOREIGN BOARD OF TRADE APPLICATION FOR REGISTRATION (IN ORDER TO PERMIT DIRECT ACCESS TO MEMBERS AND OTHER... foreign board of trade applying for registration pursuant to CEA section 4(b) and part 48 of the...

  16. EBOOK.EXE: A Desktop Authoring Tool for HURAA.

    ERIC Educational Resources Information Center

    Hu, Xiangen; Mathews, Eric; Graesser, Arthur C.; Susarla, Suresh

    The development of authoring tools for intelligent systems is an important step for creating, maintaining, and structuring content in a quick and easy manner. It has the benefit of allowing for a rapid change to new domains or topics for tutoring. The development of such tools requires functional control, access protection, ease of learning, and…

  17. How to start a minimal access mitral valve program.

    PubMed

    Hunter, Steven

    2013-11-01

    The seven pillars of governance established by the National Health Service in the United Kingdom provide a useful framework for the process of introducing new procedures to a hospital. Drawing from local experience, the author present guidance for institutions considering establishing a minimal access mitral valve program. The seven pillars of governance apply to the practice of minimally invasive mitral valve surgery, based on the principle of patient-centred practice. The author delineate the benefits of minimally invasive mitral valve surgery in terms of: "clinical effectiveness", including reduced length of hospital stay, "risk management effectiveness", including conversion to sternotomy and aortic dissection, "patient experience" including improved cosmesis and quicker recovery, and the effectiveness of communication, resources and strategies in the implementation of minimally invasive mitral valve surgery. Finally, the author have identified seven learning curves experienced by surgeons involved in introducing a minimal access mitral valve program. The learning curves are defined as: techniques of mitral valve repair, Transoesophageal Echocardiography-guided cannulation, incisions, instruments, visualization, aortic occlusion and cardiopulmonary bypass strategies. From local experience, the author provide advice on how to reduce the learning curves, such as practising with the specialised instruments and visualization techniques during sternotomy cases. Underpinning the NHS pillars are the principles of systems awareness, teamwork, communication, ownership and leadership, all of which are paramount to performing any surgery but more so with minimal access surgery, as will be highlighted throughout this paper.

  18. How to start a minimal access mitral valve program

    PubMed Central

    2013-01-01

    The seven pillars of governance established by the National Health Service in the United Kingdom provide a useful framework for the process of introducing new procedures to a hospital. Drawing from local experience, the author present guidance for institutions considering establishing a minimal access mitral valve program. The seven pillars of governance apply to the practice of minimally invasive mitral valve surgery, based on the principle of patient-centred practice. The author delineate the benefits of minimally invasive mitral valve surgery in terms of: “clinical effectiveness”, including reduced length of hospital stay, “risk management effectiveness”, including conversion to sternotomy and aortic dissection, “patient experience” including improved cosmesis and quicker recovery, and the effectiveness of communication, resources and strategies in the implementation of minimally invasive mitral valve surgery. Finally, the author have identified seven learning curves experienced by surgeons involved in introducing a minimal access mitral valve program. The learning curves are defined as: techniques of mitral valve repair, Transoesophageal Echocardiography-guided cannulation, incisions, instruments, visualization, aortic occlusion and cardiopulmonary bypass strategies. From local experience, the author provide advice on how to reduce the learning curves, such as practising with the specialised instruments and visualization techniques during sternotomy cases. Underpinning the NHS pillars are the principles of systems awareness, teamwork, communication, ownership and leadership, all of which are paramount to performing any surgery but more so with minimal access surgery, as will be highlighted throughout this paper. PMID:24349981

  19. 76 FR 37779 - Rural Broadband Access Loans and Loan Guarantees Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-28

    ... DEPARTMENT OF AGRICULTURE Rural Utilities Service Rural Broadband Access Loans and Loan Guarantees... of $325,663,157 in loan funds for the Rural Broadband Access Loans and Loan Guarantees Program for... identifying a definite funding amount. The maximum amount of a loan under this authority will be $75 million...

  20. Health Care Access Among Deaf People.

    PubMed

    Kuenburg, Alexa; Fellinger, Paul; Fellinger, Johannes

    2016-01-01

    Access to health care without barriers is a clearly defined right of people with disabilities as stated by the UN Convention on the Rights of People with Disabilities. The present study reviews literature from 2000 to 2015 on access to health care for deaf people and reveals significant challenges in communication with health providers and gaps in global health knowledge for deaf people including those with even higher risk of marginalization. Examples of approaches to improve access to health care, such as providing powerful and visually accessible communication through the use of sign language, the implementation of important communication technologies, and cultural awareness trainings for health professionals are discussed. Programs that raise health knowledge in Deaf communities and models of primary health care centers for deaf people are also presented. Published documents can empower deaf people to realize their right to enjoy the highest attainable standard of health. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  1. 49 CFR 238.125 - Marking and instructions for emergency egress and rescue access.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... and rescue access. On or after January 28, 2015, emergency signage and markings shall be provided for..., “Standard for Emergency Signage for Egress/Access of Passenger Rail Equipment,” Authorized October 7, 2007...

  2. 22 CFR 94.3 - Functions of the Central Authority.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Section 94.3 Foreign Relations DEPARTMENT OF STATE LEGAL AND RELATED SERVICES INTERNATIONAL CHILD.... state authorities to secure the prompt location and return of children wrongfully removed to or retained in any Contracting State, to ensure that rights of custody and access under the laws of one...

  3. Trust in decision-making authorities dictates the form of the interactive relationship between outcome fairness and procedural fairness.

    PubMed

    Bianchi, Emily C; Brockner, Joel; van den Bos, Kees; Seifert, Matthias; Moon, Henry; van Dijke, Marius; De Cremer, David

    2015-01-01

    Reactions to decisions are shaped by both outcome and procedural fairness. Moreover, outcome and procedural fairness interact to influence beliefs and behaviors. However, different types of "process/outcome" interaction effects have emerged. Many studies have shown that people react particularly negatively when they receive unfair or unfavorable outcomes accompanied by unfair procedures (the "low-low" interactive pattern). However, others find that people react especially positively when they receive fair or favorable outcomes accompanied by fair procedures (the "high-high" interactive pattern). We propose that trust in decision-making authorities dictates the form of the process/outcome interaction. Across three studies, when trust was high, the "low-low" interactive pattern emerged. When trust was low, the "high-high" interactive pattern emerged. The findings suggest that when people's experience of outcome and procedural fairness diverged from how they expected to be treated, they reacted in the direction of their experiences; otherwise, their reactions were consistent with their expectations. © 2014 by the Society for Personality and Social Psychology, Inc.

  4. 77 FR 37683 - Proposed Collection; Comment Request; NDAR Data Access Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-22

    ... first where the Principal Investigator (PI) completes the entire NDAR Data Access Request form, and the second where the PI has the Research Assistant begin filling out the form and PI provides the final...

  5. 23 CFR 658.19 - Reasonable access.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... State may enact or enforce any law denying reasonable access to vehicles with dimensions authorized by...-semitrailer combination in which the semitrailer has a length not to exceed 28 feet (28.5 feet where allowed... not to exceed 281/2 feet and which generally operates as part of a vehicle combination described in...

  6. Ophthalmology patients' interest in online access to clinic notes at three US clinics.

    PubMed

    Lee, Bryan S; Oster, Natalia V; Chen, Galen Y; Ding, Leona L; Walker, Janice D; Elmore, Joann G

    2017-07-01

    This study aimed to understand patients' perceptions about potential benefits and harms of accessing their own ophthalmology clinic notes via an electronic patient portal as part of the OpenNotes initiative. The authors conducted a cross-sectional, in-person survey of ophthalmology patients at three US eye clinics. The paper survey was self-administered or administered with assistance from study staff before or after patients' clinical visits. The authors used descriptive statistics to summarise patient characteristics and patient attitudes about accessing their ophthalmology notes online. Chi-square and t-tests were performed to assess differences in patient responses between clinic locations. Four hundred and fifty-one patients responded (response rate 65%). Most patients thought that accessing doctors' notes online was a good idea (95%), wanted to view their clinic notes online (94%), and agreed online access would increase their understanding of their eye problems (95%) and help them better remember their care plan (94%); 14% said online access would increase their worry; 43% had privacy concerns; and 96% indicated they would show or discuss their notes with at least one other person. Non-white patients were more likely than white patients to perceive online clinic notes as a useful tool, but they were also more likely to worry and to express greater privacy concerns. Patients at three US eye clinics were strongly in favour of online access to ophthalmology notes and were optimistic this access would improve their understanding and self-care. Ophthalmologists should consider offering online access to their notes to enhance doctor-patient communication and improve clinical outcomes. © 2017 The Authors Ophthalmic & Physiological Optics © 2017 The College of Optometrists.

  7. 45 CFR 164.524 - Access of individuals to protected health information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... individual with access to the protected health information in the form or format requested by the individual, if it is readily producible in such form or format; or, if not, in a readable hard copy form or such other form or format as agreed to by the covered entity and the individual. (ii) The covered entity may...

  8. Navy Commercial Access Control System Did Not Effectively Mitigate Access Control Risks

    DTIC Science & Technology

    2013-09-16

    fOR OFFICL’tb HSE OtuN Contents Introduction Objective 1 Background 1 Review of Internal Controls 4 Finding A. NCACS Did Not Effectively...8fHh’ DODIC.-20 13·134 I v FOR OFFICL’tb HSE ONI-X Introduction Objective The objective of the audit was to determine whether the Navy... HSE ONb\\’ authorized a Common Access Card. In order to avoid the appearance of endorsing Rapidgate, Eid Passport’s trademarked product, in May 2011

  9. 27 CFR 46.22 - Forms prescribed.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... CIGARETTE PAPERS AND TUBES Administrative Provisions § 46.22 Forms prescribed. (a) The appropriate TTB officer is authorized to prescribe all forms required by this part. You must furnish all of the..., and as required by this part. You must file each form in accordance with its instructions. (b) Forms...

  10. Strategies for Success: Open Access Policies at North American Educational Institutions

    ERIC Educational Resources Information Center

    Fruin, Christine; Sutton, Shan

    2016-01-01

    Recognizing the paucity of quantitative and qualitative data from North American educational institutions that have pursued open access policies, the authors devised a survey to collect information on the characteristics of these institutions, as well as the elements of the open access policies, the methods of promoting these policies, faculty…

  11. An Overview of Public Access Computer Software Management Tools for Libraries

    ERIC Educational Resources Information Center

    Wayne, Richard

    2004-01-01

    An IT decision maker gives an overview of public access PC software that's useful in controlling session length and scheduling, Internet access, print output, security, and the latest headaches: spyware and adware. In this article, the author describes a representative sample of software tools in several important categories such as setup…

  12. CILogon: An Integrated Identity and Access Management Platform for Science

    NASA Astrophysics Data System (ADS)

    Basney, J.

    2016-12-01

    When scientists work together, they use web sites and other software to share their ideas and data. To ensure the integrity of their work, these systems require the scientists to log in and verify that they are part of the team working on a particular science problem. Too often, the identity and access verification process is a stumbling block for the scientists. Scientific research projects are forced to invest time and effort into developing and supporting Identity and Access Management (IAM) services, distracting them from the core goals of their research collaboration. CILogon provides an IAM platform that enables scientists to work together to meet their IAM needs more effectively so they can allocate more time and effort to their core mission of scientific research. The CILogon platform enables federated identity management and collaborative organization management. Federated identity management enables researchers to use their home organization identities to access cyberinfrastructure, rather than requiring yet another username and password to log on. Collaborative organization management enables research projects to define user groups for authorization to collaboration platforms (e.g., wikis, mailing lists, and domain applications). CILogon's IAM platform serves the unique needs of research collaborations, namely the need to dynamically form collaboration groups across organizations and countries, sharing access to data, instruments, compute clusters, and other resources to enable scientific discovery. CILogon provides a software-as-a-service platform to ease integration with cyberinfrastructure, while making all software components publicly available under open source licenses to enable re-use. Figure 1 illustrates the components and interfaces of this platform. CILogon has been operational since 2010 and has been used by over 7,000 researchers from more than 170 identity providers to access cyberinfrastructure including Globus, LIGO, Open Science Grid

  13. 32 CFR 761.11 - Persons: Individual authorizations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... ADMINISTRATION, AND THE TRUST TERRITORY OF THE PACIFIC ISLANDS Entry Authorization § 761.11 Persons: Individual... may be empowered to do or for forwarding the application to the nearest Entry Control Commander...) Applications for entry authorizations will be made on the standard form Statement of Personal History, DD 398...

  14. Form Analysis for Jazz Arrangers.

    ERIC Educational Resources Information Center

    Smith, John C.

    1980-01-01

    The author discusses the importance of the study of the contour of form and of a review of how music elements affect contour when studying jazz composition. When this has been mastered, students can begin the study of style. (Author/KC)

  15. Computer-Access-Code Matrices

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr.

    1990-01-01

    Authorized users respond to changing challenges with changing passwords. Scheme for controlling access to computers defeats eavesdroppers and "hackers". Based on password system of challenge and password or sign, challenge, and countersign correlated with random alphanumeric codes in matrices of two or more dimensions. Codes stored on floppy disk or plug-in card and changed frequently. For even higher security, matrices of four or more dimensions used, just as cubes compounded into hypercubes in concurrent processing.

  16. Theoretical Discussion on Forms of Cultural Capital in Singapore

    ERIC Educational Resources Information Center

    Tan, Cheng Yong

    2013-01-01

    This article is a theoretical discussion on five forms of cultural resources that constitute cultural capital for children in the meritocratic yet stratified society of Singapore. These five forms of cultural capital are namely "academic" tastes and leisure preferences, use of Standard English, access to and dispositions toward…

  17. 45 CFR 150.427 - Form and service of submissions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Form and service of submissions. 150.427 Section 150.427 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS CMS ENFORCEMENT IN GROUP AND INDIVIDUAL INSURANCE MARKETS Administrative Hearings § 150.427 Form...

  18. 45 CFR 150.427 - Form and service of submissions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Form and service of submissions. 150.427 Section 150.427 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS CMS ENFORCEMENT IN GROUP AND INDIVIDUAL INSURANCE MARKETS Administrative Hearings § 150.427 Form...

  19. Distributed reservation-based code division multiple access

    NASA Astrophysics Data System (ADS)

    Wieselthier, J. E.; Ephremides, A.

    1984-11-01

    The use of spread spectrum signaling, motivated primarily by its antijamming capabilities in military applications, leads naturally to the use of Code Division Multiple Access (CDMA) techniques that permit the successful simultaneous transmission by a number of users over a wideband channel. In this paper we address some of the major issues that are associated with the design of multiple access protocols for spread spectrum networks. We then propose, analyze, and evaluate a distributed reservation-based multiple access protocol that does in fact exploit CDMA properties. Especially significant is the fact that no acknowledgment or feedback information from the destination is required (thus facilitating communication with a radio-silent mode), nor is any form of coordination among the users necessary.

  20. Web Accessibility in Europe and the United States: What We Are Doing to Increase Inclusion

    ERIC Educational Resources Information Center

    Wheaton, Joseph; Bertini, Patrizia

    2007-01-01

    Accessibility is hardly a new problem and certainly did not originate with the Web. Lack of access to buildings long preceded the call for accessible Web content. Although it is unlikely that rehabilitation educators look at Web page accessibility with indifference, many may also find it difficult to implement. The authors posit three reasons why…

  1. Utilisation of prehospital intravenous access.

    PubMed

    Bester, B H; Sobuwa, Simpiwe

    2014-07-22

    To describe the use of intravenous (IV) therapy in the South African (SA) prehopsital setting, and to determine the proportion of prehopsital cannulations considered unnecessary when graded against the South African Triage Score (SATS) chart. The study was conducted in the prehospital emergency medical care setting in the Western Cape Province, SA. Using a descriptive research design, we looked at the report forms of patients treated and transported by personnel currently employed in the public sector, serving the urban and rural areas stipulated by the municipal boundaries. All medical and trauma cases in which establishment of IV access was documented for the month of April 2013 were included. Interhospital transfers, unsuccessful attempts at IV access and intraosseous cannulation were excluded. When graded against the SATS, prophylactic IV access was not justified in 42.3% of the total number of cases (N=149) in which it was established, and therefore added no direct benefit to the continuum of patient care. It is worth noting that 18.8% (n=39) of the IV lines were utilised for fluid administration, as opposed to 9.2% (n=19) for the administration of IV medications. In view of the paucity of studies indicating a direct benefit of out-of-hospital IV intervention, the practice of precautionary, protocol-driven prophylactic establishment of IV access should be evaluated. Current data suggest that in the absence of scientific evidence, IV access should only be initiated when it will benefit the patient immediately, and precautionary IV access, especially in non-injured patients, should be re-evaluated.

  2. 77 FR 13206 - Protective Force Personnel Medical, Physical Readiness, Training, and Access Authorization Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-06

    ...The Department of Energy (DOE or Department) proposes to revise the regulation governing the standards for medical, physical performance, training, and access authorizations for protective force (PF) personnel employed by contractors providing security services to the Department. The existing version of this regulation was promulgated in 1993 and substantial portions of the regulation date to the mid- 1980s. Since 1993 DOE policy has placed greater reliance upon technology, vehicular response, and increased firepower and, correspondingly, has reduced its reliance upon the ability of PF personnel to perform the running tasks required in the current regulation. Furthermore, this shift in emphasis has placed a greater premium upon the retention of mature, tactically experienced, and technically sophisticated personnel, particularly since these personnel represent a considerable investment by DOE in security background investigations and training. The proposed revisions bring DOE PF medical and physical readiness requirements in line with these tactical and organizational priorities. The proposed revisions reduce the exposure of the PF population to injuries related to physical readiness testing. They would create a PF readiness classification designed specifically to encourage the retention of experienced personnel. The revisions would further ensure that PF personnel would be evaluated on a case-by-case basis on their ability to perform the essential functions of their positions without posing a direct threat to themselves or site personnel, the facility, or the general public. The proposed revisions would further ensure that reasonable accommodations would be considered before a determination is made that an individual cannot perform the essential functions of a particular position. The proposed rule also would provide for new medical review processes for PF personnel disqualified from medical certification. The proposed rule would ensure that DOE PF medical and

  3. Supporting Access to Open Online Courses for Learners of Developing Countries

    ERIC Educational Resources Information Center

    Nti, Kwame

    2015-01-01

    This paper examines how access to, and use of, open online courses may be enhanced for learners of developing countries from a learner perspective. Using analysis of the open education concept, factors that affect access to open educational resources content, and universal standards for delivering online learning, the author demonstrates that the…

  4. Access to care for children with emotional/behavioral difficulties.

    PubMed

    Henning-Smith, Carrie; Alang, Sirry

    2016-06-01

    Emotional/behavioral difficulties (EBDs) are increasingly diagnosed in children, constituting some of the most common chronic childhood conditions. Left untreated, EBDs pose long-term individual and population-level consequences. There is a growing evidence of disparities in EBD prevalence by various demographic characteristics. This article builds on this research by examining disparities in access to medical care for children with EBD. From 2008 to 2011, using data from the US National Health Interview Survey (N = 31,631) on sample children aged 4-17, we investigate (1) whether having EBD affects access to care (modeled as delayed care due to cost and difficulty making an appointment) and (2) the role demographic characteristics, health insurance coverage, and frequency of service use play in access to care for children with EBD. Results indicate that children with EBD experience issues in accessing care at more than twice the rate of children without EBD, even though they are less likely to be uninsured than their counterparts without EBD. In multivariable models, children with EBD are still more likely to experience delayed care due to cost and difficulty making a timely appointment, even after adjusting for frequency of health service use, insurance coverage, and demographic characteristics. © The Author(s) 2015.

  5. Vascular access for home haemodialysis.

    PubMed

    Al Shakarchi, Julien; Day, C; Inston, N

    2018-03-01

    Home haemodialysis has been advocated due to improved quality of life. However, there are very little data on the optimum vascular access for it. A retrospective cohort study was carried on all patients who initiated home haemodialysis between 2011 and 2016 at a large university hospital. Access-related hospital admissions and interventions were used as primary outcome measures. Our cohort consisted of 74 patients. On initiation of home haemodialysis, 62 individuals were using an arteriovenous fistula as vascular access, while the remaining were on a tunnelled dialysis catheter. Of the 12 patients who started on a tunnelled dialysis catheter, 5 were subsequently converted to either an arteriovenous fistula ( n = 4) or an arteriovenous graft ( n = 1). During the period of home haemodialysis use, four arteriovenous fistula failed or thrombosed with patients continuing on home haemodialysis using an arteriovenous graft ( n = 3) or a tunnelled dialysis catheter ( n = 1). To maintain uninterrupted home haemodialysis, interventional rates were 0.32 per arteriovenous fistula/arteriovenous graft access-year and 0.4 per tunnelled dialysis catheter access-year. Hospital admission rates for patients on home haemodialysis were 0.33 per patient-year. Our study has shown that home haemodialysis can be safely and independently performed at home within a closely managed home haemodialysis programme. The authors also advocate the use of arteriovenous fistulas for this cohort of patients due to both low complication and intervention rates.

  6. Kinematic Methods of Designing Free Form Shells

    NASA Astrophysics Data System (ADS)

    Korotkiy, V. A.; Khmarova, L. I.

    2017-11-01

    The geometrical shell model is formed in light of the set requirements expressed through surface parameters. The shell is modelled using the kinematic method according to which the shell is formed as a continuous one-parameter set of curves. The authors offer a kinematic method based on the use of second-order curves with a variable eccentricity as a form-making element. Additional guiding ruled surfaces are used to control the designed surface form. The authors made a software application enabling to plot a second-order curve specified by a random set of five coplanar points and tangents.

  7. 78 FR 14422 - Proposed Collection; Comment Request for Form 8879-S

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-05

    ... Form 8879-S, IRS e-file Signature Authorization for Form 1120S. DATES: Written comments should be... . SUPPLEMENTARY INFORMATION: Title: IRS e-file Signature Authorization for Form 1120S. OMB Number: 1545-1863. Form...

  8. [Self-archiving of biomedical papers in open access repositories].

    PubMed

    Abad-García, M Francisca; Melero, Remedios; Abadal, Ernest; González-Teruel, Aurora

    2010-04-01

    Open-access literature is digital, online, free of charge, and free of most copyright and licensing restrictions. Self-archiving or deposit of scholarly outputs in institutional repositories (open-access green route) is increasingly present in the activities of the scientific community. Besides the benefits of open access for visibility and dissemination of science, it is increasingly more often required by funding agencies to deposit papers and any other type of documents in repositories. In the biomedical environment this is even more relevant by the impact scientific literature can have on public health. However, to make self-archiving feasible, authors should be aware of its meaning and the terms in which they are allowed to archive their works. In that sense, there are some tools like Sherpa/RoMEO or DULCINEA (both directories of copyright licences of scientific journals at different levels) to find out what rights are retained by authors when they publish a paper and if they allow to implement self-archiving. PubMed Central and its British and Canadian counterparts are the main thematic repositories for biomedical fields. In our country there is none of similar nature, but most of the universities and CSIC, have already created their own institutional repositories. The increase in visibility of research results and their impact on a greater and earlier citation is one of the most frequently advance of open access, but removal of economic barriers to access to information is also a benefit to break borders between groups.

  9. Advanced software development workstation project ACCESS user's guide

    NASA Technical Reports Server (NTRS)

    1990-01-01

    ACCESS is a knowledge based software information system designed to assist the user in modifying retrieved software to satisfy user specifications. A user's guide is presented for the knowledge engineer who wishes to create for ACCESS a knowledge base consisting of representations of objects in some software system. This knowledge is accessible to an end user who wishes to use the catalogued software objects to create a new application program or an input stream for an existing system. The application specific portion of an ACCESS knowledge base consists of a taxonomy of object classes, as well as instances of these classes. All objects in the knowledge base are stored in an associative memory. ACCESS provides a standard interface for the end user to browse and modify objects. In addition, the interface can be customized by the addition of application specific data entry forms and by specification of display order for the taxonomy and object attributes. These customization options are described.

  10. Energy challenges in optical access and aggregation networks.

    PubMed

    Kilper, Daniel C; Rastegarfar, Houman

    2016-03-06

    Scalability is a critical issue for access and aggregation networks as they must support the growth in both the size of data capacity demands and the multiplicity of access points. The number of connected devices, the Internet of Things, is growing to the tens of billions. Prevailing communication paradigms are reaching physical limitations that make continued growth problematic. Challenges are emerging in electronic and optical systems and energy increasingly plays a central role. With the spectral efficiency of optical systems approaching the Shannon limit, increasing parallelism is required to support higher capacities. For electronic systems, as the density and speed increases, the total system energy, thermal density and energy per bit are moving into regimes that become impractical to support-for example requiring single-chip processor powers above the 100 W limit common today. We examine communication network scaling and energy use from the Internet core down to the computer processor core and consider implications for optical networks. Optical switching in data centres is identified as a potential model from which scalable access and aggregation networks for the future Internet, with the application of integrated photonic devices and intelligent hybrid networking, will emerge. © 2016 The Author(s).

  11. 75 FR 18954 - Proposed Collection; Comment Request for Form 8879-B

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ... Form 8879-B, IRS e-file Signature Authorization for Form 1065-B. DATES: Written comments should be...: Title: IRS e-file Signature Authorization for Form 1065-B. OMB Number: 1545-2043. Form Number: 8879-B...

  12. 17 CFR 259.602 - Form ID, uniform application for access codes to file on EDGAR.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...)—allows a filer, filing agent or training agent to log on to the EDGAR system, submit filings, and change... agent to change its Password. [69 FR 22710, Apr. 26, 2004] Editorial Note: For Federal Register... section of the printed volume and on GPO Access. ...

  13. Allelic database and accession divergence of a Brazilian mango collection based on microsatellite markers.

    PubMed

    Dos Santos Ribeiro, I C N; Lima Neto, F P; Santos, C A F

    2012-12-19

    Allelic patterns and genetic distances were examined in a collection of 103 foreign and Brazilian mango (Mangifera indica) accessions in order to develop a reference database to support cultivar protection and breeding programs. An UPGMA dendrogram was generated using Jaccard's coefficients from a distance matrix based on 50 alleles of 12 microsatellite loci. The base pair number was estimated by the method of inverse mobility. The cophenetic correlation was 0.8. The accessions had a coefficient of similarity from 30 to 100%, which reflects high genetic variability. Three groups were observed in the UPGMA dendrogram; the first group was formed predominantly by foreign accessions, the second group was formed by Brazilian accessions, and the Dashehari accession was isolated from the others. The 50 microsatellite alleles did not separate all 103 accessions, indicating that there are duplicates in this mango collection. These 12 microsatellites need to be validated in order to establish a reliable set to identify mango cultivars.

  14. Web Accessibility and Accessibility Instruction

    ERIC Educational Resources Information Center

    Green, Ravonne A.; Huprich, Julia

    2009-01-01

    Section 508 of the Americans with Disabilities Act (ADA) mandates that programs and services be accessible to people with disabilities. While schools of library and information science (SLIS*) and university libraries should model accessible Web sites, this may not be the case. This article examines previous studies about the Web accessibility of…

  15. 48 CFR 401.170 - Electronic access to regulatory information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... access to regulatory information. The USDA Departmental Administration Procurement Homepage provides... guidance in electronic form. The Internet address for the Procurement Homepage is URL http://www.usda.gov...

  16. Increasing Access to Tuberculosis Services in Ethiopia: Findings From a Patient-Pathway Analysis.

    PubMed

    Fekadu, Lelisa; Hanson, Christy; Osberg, Mike; Makayova, Julia; Mingkwan, Pia; Chin, Daniel

    2017-11-06

    In Ethiopia, extensive scale-up of the availability of health extension workers (HEWs) at the community level has been credited with increased identification and referral of patients with presumptive tuberculosis, which has contributed to increased tuberculosis case notification and better treatment outcomes. However, nearly 30% of Ethiopia's estimated 191000 patients with tuberculosis remained unnotified in 2015. A better understanding of patient care-seeking practices may inform future government action to reach all patients with tuberculosis. A patient-pathway analysis was completed to assess the alignment between patient care initiation and the availability of diagnostic and treatment services at the national level. More than one third of patients initiated care with HEWs, who refer patients to health centers for diagnosis. An additional one third of patients initiated care at health centers. Of those health centers, >80% had microscopy services, but few had access to Xpert. Despite an extensive microscopy and radiography network at middle levels of the health system, a quarter of all notified patients with tuberculosis had no bacteriological confirmation of disease. While 30% of patients reported receiving some form of care from the private sector, private-sector facilities, especially pharmacies, were not widely accessed for tuberculosis diagnosis. The availability of HEWs can increase access to tuberculosis diagnostic and treatment support services, particularly for rural populations. Continued strengthening of referral systems from HEWs and health posts are needed to enable consistent and timely access to Xpert as an initial diagnostic test and to drug resistance screening. © The Author 2017. Published by Oxford University Press for the Infectious Diseases Society of America.

  17. [Neurological complications of infectious mononucleosis (author's transl)].

    PubMed

    Rousseau, J J; Franck, G

    1977-01-01

    The authors report three different and rare forms of neurological complication associated with infectious mononucleosis. The first two, which are faily unusual in their clinical signs, occurred during the course of two typical cases of mononucleosis, one in the form of progressively regressive myelitis and the other in that of amyotrophic paralysis of the shoulder. The third occurred in isolation, after an encephalitic attack combined with a state of epileptic mal, with no other accompanying infectious sign. On the basis of these three single cases, and recent data in the literature about the Epstein-Barr virus, the authors briefly recapitulate the neurological clinical forms of infectious monouncleosis and the means of serological diagnosis; they discuss the frequency and pathogeny of these complications and tentatively suggest certain similarities with other nervous disorders observed in the course of proliferative or dysglobulinaemic diseases.

  18. 47 CFR 3.20 - Application form.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... AUTHORITIES IN MARITIME AND MARITIME MOBILE-SATELLITE RADIO SERVICES Application Procedures § 3.20 Application form. Written application must be made to the Federal Communications Commission on FCC Form 44... 47 Telecommunication 1 2010-10-01 2010-10-01 false Application form. 3.20 Section 3.20...

  19. Health information in Italian public health websites: moving from inaccessibility to accessibility.

    PubMed

    Mancini, Cristina; Zedda, Monica; Barbaro, Annarita

    2005-12-01

    In January 2004, the Italian government passed new legislation designed to give people with disabilities access to online services. Starting from the new legislation requirements, the purpose of this study is to investigate whether Italian Local Health Authorities websites are accessible to users with different abilities. One hundred and seventy websites were analysed evaluating their compliance to the World Wide Web Consortium (W3C) Priority 1 guidelines via a combination of appropriate accessibility testing methods. This review was carried out twice: the first time it took place between the end of 2003 and May-June 2004. The same survey was repeated again in December 2004, after the issuing of the draft of the Implementation Regulations for The Stanca Law in July 2004. In this second survey, all the websites analysed before were checked again to establish if some measures to make those sites accessible were taken. Seventy-six per cent of the analysed websites fail to satisfy the most basic W3C requirements, but Italian Local Health Authorities websites are likely to present significant improvements to access for some disabled user groups: the number of accessible websites increased consistently between the first and the second review. It seems that awareness of web accessibility issues is increasing among developers of health information websites because of law enforcement. Recommendations for future research and development are offered.

  20. Task Delegation Based Access Control Models for Workflow Systems

    NASA Astrophysics Data System (ADS)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  1. Future Perspectives on Baryon Form Factor Measurements with BES III

    NASA Astrophysics Data System (ADS)

    Schönning, Karin; Li, Cui

    2017-03-01

    The electromagnetic structure of hadrons, parameterised in terms of electromagnetic form factors, EMFF's, provide a key to the strong interaction. Nucleon EMFF's have been studied rigorously for more than 60 years but the new techniques and larger data samples available at modern facilities have given rise to a renewed interest for the field. Recently, the access to hyperon structure by hyperon time-like EMFF provides an additional dimension. The BEijing Spectrometer (BES III) at the Beijing Electron Positron Collider (BEPC-II) in China is the only running experiment where time-like baryon EMFF's can be studied in the e+e- → BB̅ reaction. The BES III detector is an excellent tool for baryon form factor measurements thanks to its near 4π coverage, precise tracking, PID and calorimetry. All hyperons in the SU(3) spin 1/2 octet and spin 3/2 decuplet are energetically accessible within the BEPC-II energy range. Recent data on proton and Λ hyperon form factors will be presented. Furthermore, a world-leading data sample was collected in 2014-2015 for precision measurements of baryon form factors. In particular, the data will enable a measurement of the relative phase between the electric and the magnetic form factors for Λ and Λc+ and hyperons. The modulus of the phase can be extracted from the hyperon polarisation, which in turn is experimentally accessible via the weak, parity violating decay. Furthermore, from the spin correlation between the outgoing hyperon and antihyperon, the sign of the phase can be extracted. This means that the time-like form factors can be completely determined for the first time. The methods will be outlined and the prospects of the BES III form factor measurements will be given. We will also present a planned upgrade of the BES III detector which is expected to improve future form factor measurements.

  2. 45 CFR 144.210 - Form and manner of reports.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Form and manner of reports. 144.210 Section 144.210 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS REQUIREMENTS RELATING TO HEALTH INSURANCE COVERAGE Source: § 144.210 Form and manner of reports. All reports...

  3. Accessibility, Textbooks, and Access Services

    ERIC Educational Resources Information Center

    Kahler, Janice E.

    2017-01-01

    Putting access in Access Services is the goal. The Course Reserves unit is the place. Textbooks are the focus. Electronic technologies are the future. Patron-centric services will be our standard. Access to textbooks by all patrons will be the achievement. Course Reserves located in Library West at the University of Florida George A. Smathers…

  4. Facilitating Co-Authoring: Reflections of Content and Language Lecturers

    ERIC Educational Resources Information Center

    Wright, J.

    2010-01-01

    During a content and language project at a University of Technology (UoT) in Cape Town, South Africa, pairs of language and content lecturers, whose broad definition of integration was "the provision of linguistic access to content knowledge", co-authored ten integrated textbooks. Their intention was to assist first year learners with…

  5. User Authentication and Authorization Challenges in a Networked Library Environment.

    ERIC Educational Resources Information Center

    Machovec, George S.

    1997-01-01

    Discusses computer user authentication and authorization issues when libraries need to let valid users access databases and information services without making the process too difficult for either party. Common solutions are explained, including filtering, passwords, and kerberos (cryptographic authentication scheme for secure use over public…

  6. A scheme of hidden-structure attribute-based encryption with multiple authorities

    NASA Astrophysics Data System (ADS)

    Ling, J.; Weng, A. X.

    2018-05-01

    In the most of the CP-ABE schemes with hidden access structure, both all the user attributes and the key generation are managed by only one authority. The key generation efficiency will decrease as the number of user increases, and the data will encounter security issues as the only authority is attacked. We proposed a scheme of hidden-structure attribute-based encryption with multiple authorities, which introduces multiple semi-trusted attribute authorities, avoiding the threat even though one or more authorities are attacked. We also realized user revocation by managing a revocation list. Based on DBDH assumption, we proved that our scheme is of IND-CMA security. The analysis shows that our scheme improves the key generation efficiency.

  7. Access to CAMAC from VxWorks and UNIX in DART

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Streets, J.; Meadows, J.; Moore, C.

    1996-02-01

    All High Energy Physics experiments at Fermilab include CAMAC modules which need to be read out for each triggered event. There is also a need to access CAMAC modules for control and monitoring of the experiment. As part of the DART Project the authors have developed a package of software for CAMAC access from UNIX and VxWorks platforms, with support for several hardware interfaces. The authors report on developments for the CES CBD8210 VME to parallel CAMAC, the Hytec VSD2992 VME to serial CAMAC and Jorway 411S SCSI to parallel and serial CAMAC branch drivers, and give a summary ofmore » the timings obtained.« less

  8. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  9. Reactivating Neural Circuits with Clinically Accessible Stimulation to Restore Hand Function in Persons with Tetraplegia

    DTIC Science & Technology

    2017-09-01

    AWARD NUMBER: W81XWH-16-1-0395 TITLE: Reactivating Neural Circuits with Clinically Accessible Stimulation to Restore Hand Function in...estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data...Clinically Accessible Stimulation to Restore Hand Function in Persons with Tetraplegia 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S

  10. Commentary: open access, open business, closed fairness!

    PubMed

    Moustafa, Khaled

    2015-01-01

    A strong trend to move from print to online publication is largely perceived in scientific and nonscientific fields. A growing number of publishers increasingly opt for online publication as an option or a compulsory alternative. From readers' perspective, this is a highly appreciated facility, but from the author's, things are different mainly because of excessive article processing charges (APC) that make the open access system sometimes as a hindrance for many authors but a lucrative enterprise for many shareholders, enticing the most traditional and conservative publishers.

  11. Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

    PubMed Central

    Guo, Yunchuan; Yin, Lihua; Li, Chao

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model. PMID:25177731

  12. Spatiotemporal access model based on reputation for the sensing layer of the IoT.

    PubMed

    Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  13. Structured Forms Reference Set of Binary Images II (SFRS2)

    National Institute of Standards and Technology Data Gateway

    NIST Structured Forms Reference Set of Binary Images II (SFRS2) (Web, free access)   The second NIST database of structured forms (Special Database 6) consists of 5,595 pages of binary, black-and-white images of synthesized documents containing hand-print. The documents in this database are 12 different tax forms with the IRS 1040 Package X for the year 1988.

  14. 75 FR 56656 - Proposed Collection; Comment Request for Form 8879-EX

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-16

    ... Form 8879-EX, IRS e-file Signature Authorization for Forms 720, 2290, and 8849. DATES: Written comments....gov . SUPPLEMENTARY INFORMATION: Title: IRS e-file Signature Authorization for Forms 720, 2290, and 8849. OMB Number: 1545-2081. Form Number: 8879-EX. Abstract: The Form 8879-EX, IRS e-file Signature...

  15. 77 FR 5295 - Over-the-Road Bus Accessibility Program Announcement of Project Selections

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-02

    ... DEPARTMENT OF TRANSPORTATION Federal Transit Administration Over-the-Road Bus Accessibility...-Road Bus (OTRB) Accessibility Program, authorized by Section 3038 of the Transportation Equity Act for... of over-the-road buses to help finance the incremental capital and training costs of complying with...

  16. 75 FR 28325 - Proposed Collection; Comment Request for Form 8879-PE

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-20

    ... Form 8879-PE, IRS e-file Signature Authorization for Form 1065. DATES: Written comments should be....gov . SUPPLEMENTARY INFORMATION: Title: IRS e-file Signature Authorization for Form 1065. OMB Number...

  17. [Regulators in access to anticancer drugs in Canada].

    PubMed

    Côté, André; Keating, Bernard; Parent, Marc; Simard, Guy

    2015-01-01

    Based exclusively on drugs approved by provincial public health insurance systems, many authors have reported significant variability in terms of access to anticancer drugs (ACD) among Canadian citizens, raising problems of equal access to these drugs.In this paper, we emphasize that the mere presence on the list of public drug plans cannot be considered to be a sufficient indicator to determine the real availability of anticancer drugs (ACD) for the patient. We describe and compare four sets of regulators defined in each province and determine their effects on the accessibility of ACD for patients in each province. The term regulator comprises the conditions which must be observed for access via the public health insurance system as well as the rules (strategies) decided by the third-party payer for the management of these conditions.The results of our analyses lead to the conclusion that there is indeed a variation between provinces in terms of access to drugs financed by public funds, but that this variability primarily impacts less important treatments.

  18. The impact of free access to the scientific literature: a review of recent research.

    PubMed

    Davis, Philip M; Walters, William H

    2011-07-01

    The paper reviews recent studies that evaluate the impact of free access (open access) on the behavior of scientists as authors, readers, and citers in developed and developing nations. It also examines the extent to which the biomedical literature is used by the general public. The paper is a critical review of the literature, with systematic description of key studies. Researchers report that their access to the scientific literature is generally good and improving. For authors, the access status of a journal is not an important consideration when deciding where to publish. There is clear evidence that free access increases the number of article downloads, although its impact on article citations is not clear. Recent studies indicate that large citation advantages are simply artifacts of the failure to adequately control for confounding variables. The effect of free access on the general public's use of the primary medical literature has not been thoroughly evaluated. Recent studies provide little evidence to support the idea that there is a crisis in access to the scholarly literature. Further research is needed to investigate whether free access is making a difference in non-research contexts and to better understand the dissemination of scientific literature through peer-to-peer networks and other informal mechanisms.

  19. The impact of free access to the scientific literature: a review of recent research

    PubMed Central

    Walters, William H

    2011-01-01

    Objectives: The paper reviews recent studies that evaluate the impact of free access (open access) on the behavior of scientists as authors, readers, and citers in developed and developing nations. It also examines the extent to which the biomedical literature is used by the general public. Method: The paper is a critical review of the literature, with systematic description of key studies. Results: Researchers report that their access to the scientific literature is generally good and improving. For authors, the access status of a journal is not an important consideration when deciding where to publish. There is clear evidence that free access increases the number of article downloads, although its impact on article citations is not clear. Recent studies indicate that large citation advantages are simply artifacts of the failure to adequately control for confounding variables. The effect of free access on the general public's use of the primary medical literature has not been thoroughly evaluated. Conclusions: Recent studies provide little evidence to support the idea that there is a crisis in access to the scholarly literature. Further research is needed to investigate whether free access is making a difference in non-research contexts and to better understand the dissemination of scientific literature through peer-to-peer networks and other informal mechanisms. PMID:21753913

  20. Student-Accessible Science Texts: Elements of Design

    ERIC Educational Resources Information Center

    McTigue, Erin M.; Slough, Scott W.

    2010-01-01

    Within this article, we introduce our conception of text accessibility. First, we synthesize recent research on informational text quality and present key attributes proven to contribute to comprehension of science texts beyond the readability formula. These features include (a) the concreteness of text, (b) the voice of the author, (c) coherent…

  1. 27 CFR 45.27 - Forms prescribed.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... OF THE TREASURY (CONTINUED) TOBACCO REMOVAL OF TOBACCO PRODUCTS AND CIGARETTE PAPERS AND TUBES.... (a) The appropriate TTB officer is authorized to prescribe all forms required by this part. You must... instructions for the form, and as required by this part. You must file each form in accordance with its...

  2. Multiple-access phased array antenna simulator for a digital beam-forming system investigation

    NASA Technical Reports Server (NTRS)

    Kerczewski, Robert J.; Yu, John; Walton, Joanne C.; Perl, Thomas D.; Andro, Monty; Alexovich, Robert E.

    1992-01-01

    Future versions of data relay satellite systems are currently being planned by NASA. Being given consideration for implementation are on-board digital beamforming techniques which will allow multiple users to simultaneously access a single S-band phased array antenna system. To investigate the potential performance of such a system, a laboratory simulator has been developed at NASA's Lewis Research Center. This paper describes the system simulator, and in particular, the requirements, design and performance of a key subsystem, the phased array antenna simulator, which provides realistic inputs to the digital processor including multiple signals, noise, and nonlinearities.

  3. Multiple-access phased array antenna simulator for a digital beam forming system investigation

    NASA Technical Reports Server (NTRS)

    Kerczewski, Robert J.; Yu, John; Walton, Joanne C.; Perl, Thomas D.; Andro, Monty; Alexovich, Robert E.

    1992-01-01

    Future versions of data relay satellite systems are currently being planned by NASA. Being given consideration for implementation are on-board digital beamforming techniques which will allow multiple users to simultaneously access a single S-band phased array antenna system. To investigate the potential performance of such a system, a laboratory simulator has been developed at NASA's Lewis Research Center. This paper describes the system simulator, and in particular, the requirements, design, and performance of a key subsystem, the phased array antenna simulator, which provides realistic inputs to the digital processor including multiple signals, noise, and nonlinearities.

  4. 75 FR 2933 - Proposed Collection; Comment Request for Form 8879-S

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-19

    ... Form 8879-S, IRS e-file Signature Authorization for Form 1120S. DATES: Written comments should [email protected] . SUPPLEMENTARY INFORMATION: Title: IRS e-file Signature Authorization for Form 1120S. OMB...

  5. Self-taught axillary vein access without venography for pacemaker implantation: prospective randomized comparison with the cephalic vein access.

    PubMed

    Squara, Fabien; Tomi, Julien; Scarlatti, Didier; Theodore, Guillaume; Moceri, Pamela; Ferrari, Emile

    2017-12-01

    Axillary vein access for pacemaker implantation is uncommon in many centres because of the lack of training in this technique. We assessed whether the introduction of the axillary vein technique was safe and efficient as compared with cephalic vein access, in a centre where no operators had any previous experience in axillary vein puncture. Patients undergoing pacemaker implantation were randomized to axillary or cephalic vein access. All three operators had no experience nor training in axillary vein puncture, and self-learned the technique by reading a published review. Axillary vein puncture was fluoroscopy-guided without contrast venography. Cephalic access was performed by dissection of delto-pectoral groove. Venous access success, venous access duration (from skin incision to guidewire or lead in superior vena cava), procedure duration, X-ray exposure, and peri-procedural (1 month) complications were recorded. results We randomized 74 consecutive patients to axillary (n = 37) or cephalic vein access (n = 37). Axillary vein was successfully accessed in 30/37 (81.1%) patients vs. 28/37 (75.7%) of cephalic veins (P = 0.57). Venous access time was shorter in axillary group than in cephalic group [5.7 (4.4-8.3) vs. 12.2 (10.5-14.8) min, P < 0.001], as well as procedure duration [34.8 (30.6-38.4) vs. 42.0 (39.1-46.6) min, P = 0.043]. X-ray exposure and peri-procedural overall complications were comparable in both groups. Axillary puncture was safe and faster than cephalic access even for the five first procedures performed by each operator. Self-taught axillary vein puncture for pacemaker implantation seems immediately safe and faster than cephalic vein access, when performed by electrophysiologists trained to pacemaker implantation but not to axillary vein puncture. Published on behalf of the European Society of Cardiology. All rights reserved. © The Author 2017. For Permissions, please email: journals.permissions@oup.com.

  6. 28 CFR 115.353 - Resident access to outside support services and legal representation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... provide residents with access to outside victim advocates for emotional support services related to sexual abuse, by providing, posting, or otherwise making accessible mailing addresses and telephone numbers... reports of abuse will be forwarded to authorities in accordance with mandatory reporting laws. (c) The...

  7. 28 CFR 115.353 - Resident access to outside support services and legal representation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... provide residents with access to outside victim advocates for emotional support services related to sexual abuse, by providing, posting, or otherwise making accessible mailing addresses and telephone numbers... reports of abuse will be forwarded to authorities in accordance with mandatory reporting laws. (c) The...

  8. 28 CFR 115.353 - Resident access to outside support services and legal representation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... provide residents with access to outside victim advocates for emotional support services related to sexual abuse, by providing, posting, or otherwise making accessible mailing addresses and telephone numbers... reports of abuse will be forwarded to authorities in accordance with mandatory reporting laws. (c) The...

  9. 41 CFR 51-9.304-4 - Form of payment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Form of payment. 51-9.304...-Individual Access to Records § 51-9.304-4 Form of payment. Payment shall be by check or money order payable to the Committee for Purchase from People who are Blind or Severely Disabled and shall be addressed...

  10. Accessibility, stabilizability, and feedback control of continuous orbital transfer.

    PubMed

    Gurfil, Pini

    2004-05-01

    This paper investigates the problem of low-thrust orbital transfer using orbital element feedback from a control-theoretic standpoint, concepts of controllability, feedback stabilizability, and their interaction. The Gauss variational equations (GVEs) are used to model the state-space dynamics. First, the notion of accessibility, a weaker form of controllability, is presented. It is then shown that the GVEs are globally accessible. Based on the accessibility result, a nonlinear feedback controller is derived that asymptotically steers a vehicle from an initial elliptic Keplerian orbit to any given elliptic Keplerian orbit. The performance of the new controller is illustrated by simulating an orbital transfer between two geosynchronous Earth orbits. It is shown that the low-thrust controller requires less fuel than an impulsive maneuver for the same transfer time. Closed-form, analytic expressions for the new orbital transfer controller are given. Finally, it is proved, based on a topological nonlinear stabilizability test, that there does not exist a continuous closed-loop controller that can transfer a spacecraft to a parabolic escape trajectory.

  11. Secure Web-Site Access with Tickets and Message-Dependent Digests

    USGS Publications Warehouse

    Donato, David I.

    2008-01-01

    Although there are various methods for restricting access to documents stored on a World Wide Web (WWW) site (a Web site), none of the widely used methods is completely suitable for restricting access to Web applications hosted on an otherwise publicly accessible Web site. A new technique, however, provides a mix of features well suited for restricting Web-site or Web-application access to authorized users, including the following: secure user authentication, tamper-resistant sessions, simple access to user state variables by server-side applications, and clean session terminations. This technique, called message-dependent digests with tickets, or MDDT, maintains secure user sessions by passing single-use nonces (tickets) and message-dependent digests of user credentials back and forth between client and server. Appendix 2 provides a working implementation of MDDT with PHP server-side code and JavaScript client-side code.

  12. A Broker-based approach for GEOSS authentication/authorization services

    NASA Astrophysics Data System (ADS)

    Santoro, Mattia; Nativi, Stefano

    2015-04-01

    The Group on Earth Observation (GEO) is a voluntary partnership of governments and international organizations coordinating efforts to build a Global Earth Observation System of Systems (GEOSS). GEOSS aims to achieve societal benefits through voluntary contribution and sharing of resources to better understand the relationships between the society and the environment where we live. The GEOSS Common Infrastructure (GCI) implements a digital infrastructure (e-infrastructure) that coordinates access to these systems, interconnecting and harmonizing their data, applications, models, and products. The GCI component implementing the needed interoperability arrangements to interconnect the data systems contributing to GEOSS is the GEO DAB (Discovery and Access Broker). This provides a unique entry point to which client applications (i.e. the portals and apps) can connect for exploiting (search, discover, and access) resources available through GCI. The GEO DAB implements the brokering approach (Nativi et al., 2013) to build a flexible and scalable System of Systems. GEOSS data providers ask for information about who accessed their resources and, in some cases, want to limit the data download. GEOSS users ask for a profiled interaction with the system based on their needs and expertise level. This raised the need for an enrichment of GEO DAB functionalities, i.e. user authentication/authorization. Besides, authentication and authorization is necessary for GEOSS to provide moderated social services - e.g. feedback messages, data "fit for use" comments, etc. In the development of this new functionality, the need to support existing and well-used users' credentials (e.g. Google, Twitter, etc.) stems from GEOSS principles to build on existing systems and lower entry-barriers for users. To cope with these requirements and face the heterogeneity of technologies used by the different data systems and client applications, a broker-based approach for the authentication/authorization

  13. Effects of Form Perception and Meaning on the Visual Evoked Potential with Author’s Update

    DTIC Science & Technology

    2009-09-01

    2001. Controlling binocular rivalry. Vision Research. 41: 2943-2950. Freud , S. 1995. The Basic Writings of Sigmund Freud (Psychopathology of... Freud , S. 1990. The Ego and the Id (The Standard Edition of the Complete Psychological Works of Sigmund Freud ). P. Gay, Introduction. New York...1935), and psychoanalytic talk therapies associated with S. Freud (1995, 1990), gave results that were less accessible to scientific method. In short

  14. 32 CFR 147.30 - Temporary eligibility for access at the confidential and secret levels and temporary eligibility...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false Temporary eligibility for access at the confidential and secret levels and temporary eligibility for âLâ access authorization. 147.30 Section 147.30... Temporary Access § 147.30 Temporary eligibility for access at the confidential and secret levels and...

  15. 32 CFR 147.30 - Temporary eligibility for access at the confidential and secret levels and temporary eligibility...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Temporary eligibility for access at the confidential and secret levels and temporary eligibility for âLâ access authorization. 147.30 Section 147.30... Temporary Access § 147.30 Temporary eligibility for access at the confidential and secret levels and...

  16. 32 CFR 147.30 - Temporary eligibility for access at the confidential and secret levels and temporary eligibility...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Temporary eligibility for access at the confidential and secret levels and temporary eligibility for âLâ access authorization. 147.30 Section 147.30... Temporary Access § 147.30 Temporary eligibility for access at the confidential and secret levels and...

  17. 32 CFR 147.30 - Temporary eligibility for access at the confidential and secret levels and temporary eligibility...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Temporary eligibility for access at the confidential and secret levels and temporary eligibility for âLâ access authorization. 147.30 Section 147.30... Temporary Access § 147.30 Temporary eligibility for access at the confidential and secret levels and...

  18. 32 CFR 147.30 - Temporary eligibility for access at the confidential and secret levels and temporary eligibility...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Temporary eligibility for access at the confidential and secret levels and temporary eligibility for âLâ access authorization. 147.30 Section 147.30... Temporary Access § 147.30 Temporary eligibility for access at the confidential and secret levels and...

  19. 45 CFR 149.610 - Secretary's authority to reopen and revise a reimbursement determination.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... REQUIREMENTS RELATING TO HEALTH CARE ACCESS REQUIREMENTS FOR THE EARLY RETIREE REINSURANCE PROGRAM Disclosure of Data Inaccuracies § 149.610 Secretary's authority to reopen and revise a reimbursement...

  20. 45 CFR 149.610 - Secretary's authority to reopen and revise a reimbursement determination.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... REQUIREMENTS RELATING TO HEALTH CARE ACCESS REQUIREMENTS FOR THE EARLY RETIREE REINSURANCE PROGRAM Disclosure of Data Inaccuracies § 149.610 Secretary's authority to reopen and revise a reimbursement...

  1. 45 CFR 149.610 - Secretary's authority to reopen and revise a reimbursement determination.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... REQUIREMENTS RELATING TO HEALTH CARE ACCESS REQUIREMENTS FOR THE EARLY RETIREE REINSURANCE PROGRAM Disclosure of Data Inaccuracies § 149.610 Secretary's authority to reopen and revise a reimbursement...

  2. Mobile Authoring of Open Educational Resources as Reusable Learning Objects

    ERIC Educational Resources Information Center

    Kinshuk; Jesse, Ryan

    2013-01-01

    E-learning technologies have allowed authoring and playback of standardized reusable learning objects (RLO) for several years. Effective mobile learning requires similar functionality at both design time and runtime. Mobile devices can play RLO using applications like SMILE, mobile access to a learning management system (LMS), or other systems…

  3. Does Freedom or Do Monopolies Better Foster Expression: The Problem of Pre-Publication Rights of Authors.

    ERIC Educational Resources Information Center

    Sanders, Wayne

    The Constitution empowers Congress to protect the rights of authors. There is disagreement, however, over whether Congress may grant authors a limited monopoly on their works or may regulate authorship by permitting reasonable public access to creative works. The traditional view of expansive pre-publication rights for authors is supported by…

  4. Access to artemisinin-based anti-malarial treatment and its related factors in rural Tanzania

    PubMed Central

    2013-01-01

    Background Artemisinin-based combination treatment (ACT) has been widely adopted as one of the main malaria control strategies. However, its promise to save thousands of lives in sub-Saharan Africa depends on how effective the use of ACT is within the routine health system. The INESS platform evaluated effective coverage of ACT in several African countries. Timely access within 24 hours to an authorized ACT outlet is one of the determinants of effective coverage and was assessed for artemether-lumefantrine (Alu), in two district health systems in rural Tanzania. Methods From October 2009 to June 2011we conducted continuous rolling household surveys in the Kilombero-Ulanga and the Rufiji Health and Demographic Surveillance Sites (HDSS). Surveys were linked to the routine HDSS update rounds. Members of randomly pre-selected households that had experienced a fever episode in the previous two weeks were eligible for a structured interview. Data on individual treatment seeking, access to treatment, timing, source of treatment and household costs per episode were collected. Data are presented on timely access from a total of 2,112 interviews in relation to demographics, seasonality, and socio economic status. Results In Kilombero-Ulanga, 41.8% (CI: 36.6–45.1) and in Rufiji 36.8% (33.7–40.1) of fever cases had access to an authorized ACT provider within 24 hours of fever onset. In neither of the HDSS site was age, sex, socio-economic status or seasonality of malaria found to be significantly correlated with timely access. Conclusion Timely access to authorized ACT providers is below 50% despite interventions intended to improve access such as social marketing and accreditation of private dispensing outlets. To improve prompt diagnosis and treatment, access remains a major bottle neck and new more innovative interventions are needed to raise effective coverage of malaria treatment in Tanzania. PMID:23651521

  5. Access to essential drugs in Guyana: a public health challenge.

    PubMed

    Seoane-Vazquez, Enrique; Rodriguez-Monguio, Rosa

    2010-01-01

    Guyana's pharmaceutical sector faces major challenges that limit access to essential drugs. This study analyzes Guyana's drug policy and regulation, public financing, and drug procurement and delivery. The study also identifies main barriers to drug access and proposes alternatives to strengthen the country's public health functions. Data were collected from the country's regulatory agencies, public procurement agency, pharmacies, wholesalers, and pharmaceutical companies. The information was supplemented with interviews with a convenient sample of Guyanese health authorities and stakeholders. Data were also compiled from scientific databases, and web pages of the country's Ministries of Health, Commerce and Finance, the Bureau of Statistics, and international organizations. Major barriers to drug access include: (1) lack of national drug policy and regulation, and limited role of the regulatory authority; (2) inefficient drug selection and irrational drug use; (3) insufficient financial resources and lack of drug pricing policy; (4) inefficient planning and managing public supply system; (5) deficient epidemiological and information systems; and (6) inadequate infrastructures and human resources shortage. Improving drug access in Guyana requires the strengthening of the country's public health functions and the implementation of a national drug policy and pricing policy, streamlining the drug financing, procurement, and planning and managing drug supply; and adequate infrastructures and human resources. Copyright 2008 John Wiley & Sons, Ltd.

  6. WASP: Is open access publishing the way forward? A review of the different ways in which research papers can be published.

    PubMed

    Cuschieri, Sarah

    2018-06-01

    Academics have a duty towards peers and scholars alike to engage in research work and to publish their findings. This also assists in establishing personal academic success as well as the attainment of research grants. In the past, authors used to publish their research articles for free but access to these articles was restricted to subscription users only. Recently, open access publishing has gained momentum, whereby such articles are made freely accessible online. However open access publishing comes with a price tag for the author through article processing charges. Open access may also question a journal's credibility within the academic world if improperly implemented. This is particularly so following the unsolicited bombardment of researchers' email accounts with invitations for submissions to predatory open access journals. For these reasons, authors needs to rigorously weigh the pros and cons of whether to choose a subscription based or an open access journal for publication. Copyright © 2018 Elsevier B.V. All rights reserved.

  7. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.

  8. Open access of evidence-based publications: the case of the orthopedic and musculoskeletal literature.

    PubMed

    Yammine, Kaissar

    2015-11-01

    The open access model, where researchers can publish their work and make it freely available to the whole medical community, is gaining ground over the traditional type of publication. However, fees are to be paid by either the authors or their institutions. The purpose of this paper is to assess the proportion and type of open access evidence-based articles in the form of systematic reviews and meta-analyses in the field of musculoskeletal disorders and orthopedic surgery. PubMed database was searched and the results showed a maximal number of hits for low back pain and total hip arthroplasty. We demonstrated that despite a 10-fold increase in the number of evidence-based publications in the past 10 years, the rate of free systematic reviews in the general biomedical literature did not change for the last two decades. In addition, the average percentage of free open access systematic reviews and meta-analyses for the commonest painful musculoskeletal conditions and orthopedic procedures was 20% and 18%, respectively. Those results were significantly lower than those of the systematic reviews and meta-analyses in the remaining biomedical research. Such findings could indicate a divergence between the efforts engaged at promoting evidence-based principles and those at disseminating evidence-based findings in the field of musculoskeletal disease and trauma. The high processing fee is thought to be a major limitation when considering open access model for publication. © 2015 Chinese Cochrane Center, West China Hospital of Sichuan University and Wiley Publishing Asia Pty Ltd.

  9. Mapping Norway - a Method to Register and Survey the Status of Accessibility

    NASA Astrophysics Data System (ADS)

    Michaelis, Sven; Bögelsack, Kathrin

    2018-05-01

    The Norwegian mapping authority has developed a standard method for mapping accessibility mostly for people with limited or no walking abilities in urban and recreational areas. We choose an object-orientated approach where points, lines and polygons represents objects in the environment. All data are stored in a geospatial database, so they can be presented as web map and analyzed using GIS software. By the end of 2016 more than 160 municipalities are mapped using that method. The aim of this project is to establish a national standard for mapping and to provide a geodatabase that shows the status of accessibility throughout Norway. The data provide a useful tool for national statistics, local planning authorities and private users. First results show that accessibility is low and Norway still faces many challenges to meet the government's goals for Universal Design.

  10. 44 CFR 6.30 - Form of requests.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Form of requests. 6.30 Section 6.30 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF... manager, at his discretion, may accept oral requests for access subject to verification of identity. ...

  11. Open Access Theses in Institutional Repositories: An Exploratory Study of the Perceptions of Doctoral Students

    ERIC Educational Resources Information Center

    Stanton, Kate Valentine; Liew, Chern Li

    2011-01-01

    Introduction: We examine doctoral students' awareness of and attitudes to open access forms of publication. Levels of awareness of open access and the concept of institutional repositories, publishing behaviour and perceptions of benefits and risks of open access publishing were explored. Method: Qualitative and quantitative data were collected…

  12. Developing Guidelines for Evaluating the Adaptation of Accessible Web-Based Learning Materials

    ERIC Educational Resources Information Center

    Radovan, Marko; Perdih, Mojca

    2016-01-01

    E-learning is a rapidly developing form of education. One of the key characteristics of e-learning is flexibility, which enables easier access to knowledge for everyone. Information and communications technology (ICT), which is e-learning's main component, enables alternative means of accessing the web-based learning materials that comprise the…

  13. 32 CFR 552.94 - Area access procedures.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 3 2014-07-01 2014-07-01 false Area access procedures. 552.94 Section 552.94 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND... on DA Form 1594 (Daily Staff Journal or Duty Officer's Log). (c) Permit holders must call or visit...

  14. 32 CFR 552.94 - Area access procedures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Area access procedures. 552.94 Section 552.94 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND... on DA Form 1594 (Daily Staff Journal or Duty Officer's Log). (c) Permit holders must call or visit...

  15. 32 CFR 552.94 - Area access procedures.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Area access procedures. 552.94 Section 552.94 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND... on DA Form 1594 (Daily Staff Journal or Duty Officer's Log). (c) Permit holders must call or visit...

  16. 32 CFR 552.94 - Area access procedures.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 3 2012-07-01 2009-07-01 true Area access procedures. 552.94 Section 552.94 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND... on DA Form 1594 (Daily Staff Journal or Duty Officer's Log). (c) Permit holders must call or visit...

  17. 32 CFR 552.94 - Area access procedures.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 3 2013-07-01 2013-07-01 false Area access procedures. 552.94 Section 552.94 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND... on DA Form 1594 (Daily Staff Journal or Duty Officer's Log). (c) Permit holders must call or visit...

  18. [Access to Assisted Reproductive Technologies, surrogacy, same sex couple parenting].

    PubMed

    Belaisch Allart, J

    2012-08-01

    In France, access to Assisted Reproductive Technologies (ART) is strictly controlled. ART is only authorized for medical infertility. The revision of the law of bioethics has not modified access to ART. It is still forbidden to take charge of lesbian couples or gay-male couples, surrogacy is prohibited. The only change is that unmarried couples have no more to prove they live together since 2 years. Copyright © 2012 Elsevier Masson SAS. All rights reserved.

  19. SHERPA: Towards better accessibility of earthquake rupture archives

    NASA Astrophysics Data System (ADS)

    Théo, Yann; Sémo, Emmanuel; Mazet Roux, Gilles; Bossu, Rémy; Kamb, Linus; Frobert, Laurent

    2010-05-01

    Large crustal earthquakes are the subject of extensive field surveys in order to better understand the rupture process and its tectonic consequences. After the earthquake, pictures of the rupture can easily viewed quite easily on the web. However, once the event gets old, pictures disappear and can no longer be viewed, a heavy loss for researchers looking for information. Even when available, there are linked to a given survey and comparison between different earthquakes of the same phenomenon can not be easily performed. SHERPA, Sharing of Earthquake Rupture Pictures Archive, a web application developed at EMSC aims to fill this void. It aims at making available pictures of past earthquakes and sharing resources while strictly protecting the authors copyright and keeping the authors in charge of the diffusion to avoid unfair or inappropriate use of the photos. Our application is targeted at scientists and scientists only. Pictures uploaded on SHERPA are marked by a watermark "NOT FOR PUBLICATION" spread all over, and state the author's name. Authors and authors only have the possibility to remove this mark should they want their work to enter the public domain. If a user sees a picture he/she would like to use, he/she can put this picture in his/her cart. After the validation of this cart, a request (stating the name and purposes of the requestor) will be sent to the author(s) to ask to share the picture(s). If an author accepts this request, the requestor will be given the authorization to access a protected folder and download the unmarked picture. Without the author explicit consent, no picture will never be accessible to anyone. We want to state this point very clearly because ownership and copyright protection are essential to the SHERPA project. Uploading pictures is quick and easy: once registered, you can very simply upload pictures that can then be geolocalised using a Google map plugged on the web site. If the camera is equipped with a GPS, the software

  20. Author Correction: Single-nucleus analysis of accessible chromatin in developing mouse forebrain reveals cell-type-specific transcriptional regulation.

    PubMed

    Preissl, Sebastian; Fang, Rongxin; Huang, Hui; Zhao, Yuan; Raviram, Ramya; Gorkin, David U; Zhang, Yanxiao; Sos, Brandon C; Afzal, Veena; Dickel, Diane E; Kuan, Samantha; Visel, Axel; Pennacchio, Len A; Zhang, Kun; Ren, Bing

    2018-03-01

    In the version of this article initially published online, the accession code was given as GSE1000333. The correct code is GSE100033. The error has been corrected in the print, HTML and PDF versions of the article.