Mild Cognitive Impairment and Susceptibility to Scams in Old Age
Han, S. Duke; Boyle, Patricia A.; James, Bryan D.; Yu, Lei; Bennett, David A.
2016-01-01
Background Falling victim to financial scams can have a significant impact upon social and financial wellbeing and independence. A large proportion of scam victims are older adults, but whether older victims with mild cognitive impairment (MCI) are at higher risk remains unknown. Objective We tested the hypothesis that older persons with MCI exhibit greater susceptibility to scams compared to those without cognitive impairment. Methods Seven hundred and thirty older adults without dementia were recruited from the Rush Memory and Aging Project, a community-based epidemiologic study of aging. Participants completed a five-item self-report measure of susceptibility to scams, a battery of cognitive measures, and clinical diagnostic evaluations. Results In models adjusted for age, education, and gender, the presence of MCI was associated with greater susceptibility to scams (B = 0.125, SE = 0.063, p-value = 0.047). Further, in analyses of the role of specific cognitive systems in susceptibility to scams among persons with MCI (n = 144), the level of performance in two systems, episodic memory and perceptual speed abilities, were associated with susceptibility. Conclusions Adults with MCI may be more susceptible to scams in old age than older persons with normal cognition. Lower abilities in specific cognitive systems, particularly perceptual speed and episodic memory, may contribute to greater susceptibility to scams in those with MCI. PMID:26519434
Forewarning reduces fraud susceptibility in vulnerable consumers
Scheibe, Susanne; Notthoff, Nanna; Menkin, Josephine; Ross, Lee; Shadel, Doug; Deevy, Martha; Carstensen, Laura L.
2014-01-01
Telemarketing fraud is pervasive and older consumers are disproportionally targeted. Given laboratory research showing that forewarning can effectively counter influence appeals, we conducted a field experiment to test whether forewarning could protect people who had been victimized in the past. A research assistant with prior experience as a telemarketer pitched a mock scam two or four weeks after participants were warned about the same scam or an entirely different scam. Both warnings reduced unequivocal acceptance of the mock scam although outright refusals (as opposed to expressions of skepticism) were more frequent with the same scam warning than the different scam warning. The same scam warning, but not the different scam warning, lost effectiveness over time. Findings demonstrate that social psychological research can inform effective protection strategies against telemarketing fraud. PMID:25328263
Do You Love Me? Psychological Characteristics of Romance Scam Victims
2018-01-01
Abstract The online dating romance scam is an Advance Fee Fraud, typically conducted by international criminal groups via online dating sites and social networking sites. This type of mass-marketing fraud (MMF) is the most frequently reported type of MMF in most Western countries. This study examined the psychological characteristics of romance scam victims by comparing romance scam victims with those who had never been scammed by MMFs. Romance scam victims tend to be middle-aged, well-educated women. Moreover, they tend to be more impulsive (scoring high on urgency and sensation seeking), less kind, more trustworthy, and have an addictive disposition. It is argued here that these findings might be useful for those developing prevention programs and awareness campaigns. PMID:28657792
Do You Love Me? Psychological Characteristics of Romance Scam Victims.
Whitty, Monica T
2018-02-01
The online dating romance scam is an Advance Fee Fraud, typically conducted by international criminal groups via online dating sites and social networking sites. This type of mass-marketing fraud (MMF) is the most frequently reported type of MMF in most Western countries. This study examined the psychological characteristics of romance scam victims by comparing romance scam victims with those who had never been scammed by MMFs. Romance scam victims tend to be middle-aged, well-educated women. Moreover, they tend to be more impulsive (scoring high on urgency and sensation seeking), less kind, more trustworthy, and have an addictive disposition. It is argued here that these findings might be useful for those developing prevention programs and awareness campaigns.
Quantitative genetic analysis of cellular adhesion molecules: the Fels Longitudinal Study.
Lee, Miryoung; Czerwinski, Stefan A; Choh, Audrey C; Demerath, Ellen W; Sun, Shumei S; Chumlea, Wm C; Towne, Bradford; Siervogel, Roger M
2006-03-01
Circulating concentrations of inflammatory markers predict cardiovascular disease (CVD) risk and are closely associated with obesity. However, little is known concerning genetic influences on serum levels of inflammatory markers. In this study, we estimated the heritability (h2) of soluble cellular adhesion molecule (sCAM) concentrations and examined the correlational architecture between different sCAMs. The study population included 234 men and 270 women aged 18-76 years, belonging to 121 families participating in the Fels Longitudinal Study. Serum levels of soluble intercellular adhesion molecule-1 (sICAM-1), vascular cell adhesion molecule-1 (sVCAM-1), E-selectin (sESEL-1) and P-selectin (sPSEL-1) were assayed using commercially available kits. A variance components-based maximum likelihood method was used to estimate the h2 of the different serum inflammatory markers while simultaneously adjusting for the effects of known CVD risk factors, such as age and smoking. Additionally, we used bivariate extensions of these methods to estimate genetic and random environmental correlations among sCAMs. Levels of sCAMs were significantly heritable: h2=0.24+/-0.10 for sICAM-1, h2=0.22+/-0.10 for sVCAM-1, h2=0.50+/-0.11 for sESEL-1, and h2=0.46+/-0.10 for sPSEL-1. In addition, a significant genetic correlation (rho(G)=0.63) was found between sICAM-1 and sVCAM-1 indicating some degree of shared genetic control. In the Fels Longitudinal Study, the levels of four sCAMs are significantly influenced by genetic effects, and sICAM-1 shares a common genetic background with sVCAM-1.
Boyle, Patricia A.; Yu, Lei; Wilson, Robert S.; Gamble, Keith; Buchman, Aron S.; Bennett, David A.
2012-01-01
Objective Decision making is an important determinant of health and well-being across the lifespan but is critical in aging, when many influential decisions are made just as cognitive function declines. Increasing evidence suggests that older adults, even those without dementia, often make poor decisions and are selectively vulnerable to scams. To date, however, the factors associated with poor decision making in old age are unknown. The objective of this study was to test the hypothesis that poor decision making is a consequence of cognitive decline among older persons without Alzheimer’s disease or mild cognitive impairment. Methods Participants were 420 non-demented persons from the Memory and Aging Project, a longitudinal, clinical-pathologic cohort study of aging in the Chicago metropolitan area. All underwent repeated cognitive evaluations and subsequently completed assessments of decision making and susceptibility to scams. Decision making was measured using 12 items from a previously established performance-based measure and a self-report measure of susceptibility to scams. Results Cognitive function data were collected over an average of 5.5 years prior to the decision making assessment. Regression analyses were used to examine whether the prior rate of cognitive decline predicted the level of decision making and susceptibility to scams; analyses controlled for age, sex, education, and starting level of cognition. Among 420 persons without dementia, more rapid cognitive decline predicted poorer decision making and increased susceptibility to scams (p’s<0.001). Further, the relations between cognitive decline, decision making and scams persisted in analyses restricted to persons without any cognitive impairment (i.e., no dementia or even mild cognitive impairment). Conclusions Poor decision making is a consequence of cognitive decline among older persons without Alzheimer’s disease or mild cognitive impairment, those widely considered “cognitively healthy.” These findings suggest that even very subtle age-related changes in cognition have detrimental effects on judgment. PMID:22916287
Grey matter correlates of susceptibility to scams in community-dwelling older adults.
Duke Han, S; Boyle, Patricia A; Yu, Lei; Arfanakis, Konstantinos; James, Bryan D; Fleischman, Debra A; Bennett, David A
2016-06-01
Susceptibility to scams is a significant issue among older adults, even among those with intact cognition. Age-related changes in brain macrostructure may be associated with susceptibility to scams; however, this has yet to be explored. Based on previous work implicating frontal and temporal lobe functioning as important in decision making, we tested the hypothesis that susceptibility to scams is associated with smaller grey matter volume in frontal and temporal lobe regions in a large community-dwelling cohort of non-demented older adults. Participants (N = 327, mean age = 81.55, mean education = 15.30, 78.9 % female) completed a self-report measure used to assess susceptibility to scams and an MRI brain scan. Results indicated an inverse association between overall grey matter and susceptibility to scams in models adjusted for age, education, and sex; and in models further adjusted for cognitive function. No significant associations were observed for white matter, cerebrospinal fluid, or total brain volume. Models adjusted for age, education, and sex revealed seven clusters showing smaller grey matter in the right parahippocampal/hippocampal/fusiform, left middle temporal, left orbitofrontal, right ventromedial prefrontal, right middle temporal, right precuneus, and right dorsolateral prefrontal regions. In models further adjusted for cognitive function, results revealed three significant clusters showing smaller grey matter in the right parahippocampal/hippocampal/fusiform, right hippocampal, and right middle temporal regions. Lower grey matter concentration in specific brain regions may be associated with susceptibility to scams, even after adjusting for cognitive ability. Future research is needed to determine whether grey matter reductions in these regions may be a biomarker for susceptibility to scams in old age.
Heo, W D; Lee, S H; Kim, M C; Kim, J C; Chung, W S; Chun, H J; Lee, K J; Park, C Y; Park, H C; Choi, J Y; Cho, M J
1999-01-19
The Ca2+ signal is essential for the activation of plant defense responses, but downstream components of the signaling pathway are still poorly defined. Here we demonstrate that specific calmodulin (CaM) isoforms are activated by infection or pathogen-derived elicitors and participate in Ca2+-mediated induction of plant disease resistance responses. Soybean CaM (SCaM)-4 and SCaM-5 genes, which encode for divergent CaM isoforms, were induced within 30 min by a fungal elicitor or pathogen, whereas other SCaM genes encoding highly conserved CaM isoforms did not show such response. This pathogen-triggered induction of these genes specifically depended on the increase of intracellular Ca2+ level. Constitutive expression of SCaM-4 and SCaM-5 in transgenic tobacco plants triggered spontaneous induction of lesions and induces an array of systemic acquired resistance (SAR)-associated genes. Surprisingly, these transgenic plants have normal levels of endogenous salicylic acid (SA). Furthermore, coexpression of nahG gene did not block the induction of SAR-associated genes in these transgenic plants, indicating that SA is not involved in the SAR gene induction mediated by SCaM-4 or SCaM-5. The transgenic plants exhibit enhanced resistance to a wide spectrum of virulent and avirulent pathogens, including bacteria, fungi, and virus. These results suggest that specific CaM isoforms are components of a SA-independent signal transduction chain leading to disease resistance.
Burnes, David; Henderson, Charles R; Sheppard, Christine; Zhao, Rebecca; Pillemer, Karl; Lachs, Mark S
2017-08-01
The financial exploitation of older adults was recently recognized by the Centers for Disease Control and Prevention as a serious public health problem. Knowledge of the prevalence of elder financial exploitation is mostly limited to the category of financial abuse, which occurs in relationships involving an expectation of trust. Little is known about the other major category of elder financial exploitation-elder financial fraud and scams, which is perpetrated by strangers. A valid estimate of elder financial fraud-scam prevalence is necessary as a foundation for research and prevention efforts. To estimate the prevalence of elder financial fraud-scam victimization in the United States based on a systematic review and meta-analysis. Multiple investigators independently screened titles and abstracts and reviewed relevant full-text records from PubMed, Medline, PsycINFO, Criminal Justice Abstracts, Social Work Abstracts, and AgeLine databases. To maximize the validity and generalizability of prevalence estimation, we restricted eligibility to general population-based studies (English speaking, 1990 onward) using state- or national-level probability sampling and collecting data directly from older adults. Information on elder financial fraud-scam prevalence and study-level characteristics was extracted independently by 2 investigators. Meta-analysis of elder financial fraud-scam prevalence used generalized mixed models with individual studies as levels of a random classification factor. We included 12 studies involving a total of 41 711 individuals in the meta-analysis. Overall pooled elder financial fraud-scam prevalence (up to 5-year period) across studies was 5.6% (95% confidence interval [CI] = 4.0%, 7.8%), with a 1-year period prevalence of 5.4% (95% CI = 3.2%, 7.6%). Studies using a series of questions describing specific fraud-scam events to measure victimization found a significantly higher prevalence (7.1%; 95% CI = 4.8%, 9.4%) than studies using a single, general-question self-report assessment approach (3.6%; 95% CI = 1.8%, 5.4%). Elder financial fraud and scams is a common problem, affecting approximately 1 of every 18 cognitively intact, community-dwelling older adults each year; it requires further attention from researchers, clinicians, and policymakers. Elder financial fraud-scam prevalence findings in this study likely underestimate the true population prevalence. We provide methodological recommendations to limit older adult participation and reporting bias in future population-based research. Public Health Implications. Elder financial exploitation victimization is associated with mortality, hospitalization, and poor physical and mental health. Health care professionals working with older adults likely routinely encounter patients who are fraud-scam victims. Validation of instruments to screen for elder financial fraud and scams in clinical settings is an important area of future research. Without effective primary prevention strategies, the absolute scope of this problem will escalate with the growing population of older adults.
Transport Traffic Analysis for Abusive Infrastructure Characterization
2012-12-14
Introduction Abusive traffic abounds on the Internet, in the form of email, malware, vulnerability scanners, worms, denial-of-service, drive-by-downloads, scam ...insight is two-fold. First, attackers have a basic requirement to source large amounts of data, be it denial-of-service, scam -hosting, spam, or other...the network core. This paper explores the power of transport-layer traffic analysis to detect and characterize scam hosting infrastructure, including
SEI Innovation Center Report: Cyber Intelligence Tradecraft Project: Summary of Key Findings
2013-01-01
source news, social media ), and focuses collection on the pertinent threats and strategic needs analysts identify while learning about their...difficult to correlate with other data sources (network data, social media , chat rooms, geopolitical news sites) and complicates trend analysis or...use of commonly exploited software, prohibiting USB storage devices, and impeding access to websites associated with scams and malware make it very
... a Consumer Complaint Report Identity Theft Get Your Free Credit Report Register for Do Not Call Get Scam Alerts ... File a claim if you were scammed via money transfer Ed tech, Privacy Workshop FTC, Department of ...
Anatomy of a Cancer Treatment Scam
MedlinePlus Videos and Cool Tools
... and Office Directors Budgets Financial Documents Other Financial Information Performance Office of Inspector General FTC Imposter Scams ... Reading Rooms FOIA Request Fee Regulations Freedom of Information Act Contacts Frequently Asked Questions (FAQ) Links Table ...
Online Safety: Fraud, Security, Phishing, Vishing
... Theft Online Safety Privacy Report Scams and Frauds Online Safety Be aware of these scams when you' ... Security and Safety Internet Fraud Phishing and Vishing Online Security and Safety The internet makes many everyday ...
Construct validity and reliability of the Single Checking Administration of Medications Scale.
O'Connell, Beverly; Hawkins, Mary; Ockerby, Cherene
2013-06-01
Research indicates that single checking of medications is as safe as double checking; however, many nurses are averse to independently checking medications. To assist with the introduction and use of single checking, a measure of nurses' attitudes, the thirteen-item Single Checking Administration of Medications Scale (SCAMS) was developed. We examined the psychometric properties of the SCAMS. Secondary analyses were conducted on data collected from 503 nurses across a large Australian health-care service. Analyses using exploratory and confirmatory factor analyses supported by structural equation modelling resulted in a valid twelve-item SCAMS containing two reliable subscales, the nine-item Attitudes towards single checking and three-item Advantages of single checking subscales. The SCAMS is recommended as a valid and reliable measure for monitoring nurses' attitudes to single checking prior to introducing single checking medications and after its implementation. © 2013 Wiley Publishing Asia Pty Ltd.
The online romance scam: a serious cybercrime.
Whitty, Monica T; Buchanan, Tom
2012-03-01
The Online Romance Scam is a relatively new form of fraud that became apparent in about 2008. In this crime, criminals pretend to initiate a relationship through online dating sites then defraud their victims of large sums of money. This paper presents some descriptive statistics about knowledge and victimization of the online dating romance scam in Great Britain. Our study found that despite its newness, an estimated 230,000 British citizens may have fallen victim to this crime. We conclude that there needs to be some rethinking about providing avenues for victims to report the crime or at least making them more comfortable when doing so.
Correlates of Susceptibility to Scams in Older Adults Without Dementia
James, Bryan D.; Boyle, Patricia A.; Bennett, David A.
2013-01-01
This study examined correlates of susceptibility to scams in 639 community-dwelling older adults without dementia from a cohort study of aging. Regression models adjusted for age, sex, education, and income were used to examine associations between susceptibility to scams, measured by 5-item self-report measure, and a number of potential correlates. Susceptibility was positively associated with age and negatively associated with income, cognition, psychological well being, social support, and literacy. Fully adjusted models indicated that older age and lower levels of cognitive function, decreased psychological well-being, and lower literacy in particular may be markers of susceptibility to financial victimization in old age. PMID:24499279
The Latest Scams in Literacy Education.
ERIC Educational Resources Information Center
Berger, Alan
The claims for the huge numbers of students suffering from the "latest scams" in literacy education--learning disability, dyslexia, attention deficit disorder, at risk, and hypoglycemia--are driven by political, economic, and social profits with minimal concern for children. While such problems exist, the phrases used to describe these…
Educators Beware: Avoiding the Scams
ERIC Educational Resources Information Center
DuBoff, Leonard D.; King, Christy O.
2009-01-01
The technology boom has provided opportunities for practitioners to work more efficiently by making available a host of timesaving, as well as cost-effective, tools. Sadly, modern technology has also provided the less scrupulous segments of society with opportunities to take advantage of others. All too familiar are the Nigerian money scams that…
6 Tip-offs to Rip-offs: Don't Fall for Health Fraud Scams
... are not the only health scams on the market. FDA found a fraudulent and expensive light therapy device with cure-all claims to treat fungal meningitis, Alzheimer’s, skin cancer, concussions and many other unrelated diseases. Generally, making health claims about a medical device without FDA ...
Klein, Hélène; Garneau, Line; Banderali, Umberto; Simoes, Manuel; Parent, Lucie; Sauvé, Rémy
2007-01-01
In this work we address the question of the KCa3.1 channel pore structure in the closed configuration in relation to the contribution of the C-terminal end of the S6 segments to the Ca2+-dependent gating process. Our results based on SCAM (substituted cysteine accessibility method) experiments first demonstrate that the S6 transmembrane segment of the open KCa3.1 channel contains two distinct functional domains delimited by V282 with MTSEA and MTSET binding leading to a total channel inhibition at positions V275, T278, and V282 and to a steep channel activation at positions A283 and A286. The rates of modification by MTSEA (diameter 4.6 Å) of the 275C (central cavity) and 286C residues (S6 C-terminal end) for the closed channel configuration were found to differ by less than sevenfold, whereas experiments performed with the larger MTSET reagent (diameter 5.8 Å) resulted in modification rates 103–104 faster for cysteines at 286 compared with 275. Consistent with these results, the modification rates of the cavity lining 275C residue by MTSEA, Et-Hg+, and Ag+ appeared poorly state dependent, whereas modification rates by MTSET were 103 faster for the open than the closed configuration. A SCAM analysis of the channel inner vestibule in the closed state revealed in addition that cysteine residues at 286 were accessible to MTS reagents as large as MTS-PtrEA, a result supported by the observation that binding of MTSET to cysteines at positions 283 or 286 could neither sterically nor electrostatically block the access of MTSEA to the closed channel cavity (275C). It follows that the closed KCa3.1 structure can hardly be accountable by an inverted teepee-like structure as described for KcsA, but is better represented by a narrow passage centered at V282 (equivalent to V474 in Shaker) connecting the channel central cavity to the cytosolic medium. This passage would not be however restrictive to the diffusion of small reagents such as MTSEA, Et-Hg+, and Ag+, arguing against the C-terminal end of S6 forming an obstructive barrier to the diffusion of K+ ions for the closed channel configuration. PMID:17353352
Brain Gym: Pseudoscientific Practice
ERIC Educational Resources Information Center
Kroeze, Kevin; Hyatt, Keith J.; Lambert, M. Chuck
2016-01-01
There is an abundance of scams and pseudoscientific practices promising seemingly magical cures for whatever ails a person. A short viewing of late night television will readily reveal a whole host of scams that may be more effective at relieving the viewer of the cash in his or her pocket than alleviating any unwanted symptoms. Unfortunately,…
A microprocessor card software server to support the Quebec health microprocessor card project.
Durant, P; Bérubé, J; Lavoie, G; Gamache, A; Ardouin, P; Papillon, M J; Fortin, J P
1995-01-01
The Quebec Health Smart Card Project is advocating the use of a memory card software server[1] (SCAM) to implement a portable medical record (PMR) on a smart card. The PMR is viewed as an object that can be manipulated by SCAM's services. In fact, we can talk about a pseudo-object-oriented approach. This software architecture provides a flexible and evolutive way to manage and optimize the PMR. SCAM is a generic software server; it can manage smart cards as well as optical (laser) cards or other types of memory cards. But, in the specific case of the Quebec Health Card Project, SCAM is used to provide services between physicians' or pharmacists' software and IBM smart card technology. We propose to expose the concepts and techniques used to provide a generic environment to deal with smart cards (and more generally with memory cards), to obtain a dynamic an evolutive PMR, to raise the system global security level and the data integrity, to optimize significantly the management of the PMR, and to provide statistic information about the use of the PMR.
Tools for Rapid Understanding of Malware Code
2015-05-07
cloaking techniques. We used three malware detectors, covering a wide spectrum of detection technologies, for our experiments: VirusTotal, an online ...Analysis and Manipulation ( SCAM ), 2014. [9] Babak Yadegari, Brian Johannesmeyer, Benjamin Whitely, and Saumya Debray. A generic approach to automatic...and Manipulation ( SCAM ), 2014. [9] Babak Yadegari, Brian Johannesmeyer, Benjamin Whitely, and Saumya Debray. A generic approach to automatic
Pattern analysis of fraud case in Taiwan, China and Indonesia
NASA Astrophysics Data System (ADS)
Kusumo, A. H.; Chi, C.-F.; Dewi, R. S.
2017-11-01
The current study analyzed 125 successful fraud cases happened in Taiwan, China, and Indonesia from 2008 to 2012 published in the English online newspapers. Each of the case report was coded in terms of scam principle, information media (information exchange between fraudsters and victim), money media (media used by fraudsters to obtain unauthorized financial benefit) and other additional information which was judged to be relevant. The Chi-square Automatic Interaction Detector (CHAID) was applied to the coded data of information, scam principle and money media to find a subset of predictors that might derive meaningful classifications. A series of flow diagrams was constructed based on CHAID result to illustrate the flow of information (scam) travelling from information media to money media.
ERIC Educational Resources Information Center
Major, Claire Howell; Bray, Nathaniel
2008-01-01
Campus-based urban legends have the potential to convey and construct student culture in higher education. Basic qualitative and humanistic research methods were used to collect, analyze, and interpret legends related to the academic experience of collegiate life.
Wood, Stacey; Liu, Pi-Ju; Hanoch, Yaniv; Xi, Patricia M; Klapatch, Lukas
2018-06-01
Mass marketing scams extract an enormous toll, yet the literature on scams is just emerging. In Experiment 1, 211 adults reviewed a solicitation and rated their intention of contacting an "activation number" for a prize. Scarcity and authority were manipulated. Many (48.82%) indicated some willingness to contact to "activate" the winnings. Intention of responding was inversely related to the perception of risk (b = -.441, p < .001) and positively associated with perception of benefits (b = .554, p < .001), but not with the experimental condition. In Experiment 2, 291 adults were randomly assigned to one of the three conditions (low, medium, or high activation fee), and were asked to report willingness to contact. Activation fees decreased intent to contact, but percentages remained high (25.70%), with higher perception of risk reducing contact rates (b = -.581, p < .001), and benefit perception increasing intent to contact (b = .381, p < .001). Our studies indicate that consumers are responding to perceived risks and benefits in their decision-making, regardless of persuasion elements used by scammers. In summary, our studies find that consumers with lower levels of education and high perception of benefits are at increased risk for mass marketing scams. (PsycINFO Database Record (c) 2018 APA, all rights reserved).
ERIC Educational Resources Information Center
Amosun, Peter Adewale; Ige, Olugbenga Adedayo; Choo, Kim-Kwang Raymond
2015-01-01
Nigeria is considered by many to be a cyber crime hot spot, and is often ranked among the world's top cyber crime committing countries (e.g. advanced fee fraud is also known as Nigerian scams and 419 scams--419 is a section under the Nigerian Criminal Code Act that prohibits obtaining goods by false pretences). We designed a cyber crime prevention…
Increased levels of markers of vascular inflammation in patients with coronary heart disease.
Schumacher, A; Seljeflot, I; Sommervoll, L; Christensen, B; Otterstad, J E; Arnesen, H
2002-01-01
Elevated levels of soluble cell adhesion molecules (sCAMs), inflammatory cytokines and C-reactive protein (CRP) have been associated with atherosclerotic disease states. The aim of the present study was to evaluate whether circulating levels of vascular cell adhesion molecule-1 (sVCAM-1), intercellular adhesion molecule-1 (sICAM-1), E- and P-selectin were significantly elevated in patients with coronary heart disease (CHD) compared with healthy controls, and to study possible associations between these sCAMs, tumour necrosis factor alpha (TNFalpha). interleukin-6 (IL-6), CRP and major CHD risk factors. The study included 193 patients in various stages of CHD and 193 matched controls. To evaluate any possible influence of acute phase reaction, reinvestigation was performed after 6 months. After adjustment for major CHD risk factors, sVCAM-1, sICAM-1, P-selectin, IL-6 and CRP remained significantly elevated in the CHD patients (p for all <0.001). In multivariate analysis sVCAM-1 was predicted by age (p=0.015), sICAM-1 by smoking (p<0.001) and total cholesterol (p=0.026), E-selectin by body mass index (BMI) (p=0.004) and P-selectin by male gender (p=0.015). TNFalpha significantly predicted sICAM-1 and E-selectin levels, while IL-6 predicted CRP but none of the sCAMs measured. This might indicate that TNFalpha, but not IL-6, plays a major role in the regulation of sCAM levels in vivo.
Mulinta, Ras; Yao, Sylvia Y. M.; Ng, Amy M. L.; Cass, Carol E.; Young, James D.
2017-01-01
The human SLC28 family of concentrative nucleoside transporter (CNT) proteins has three members: hCNT1, hCNT2, and hCNT3. Na+-coupled hCNT1 and hCNT2 transport pyrimidine and purine nucleosides, respectively, whereas hCNT3 transports both pyrimidine and purine nucleosides utilizing Na+ and/or H+ electrochemical gradients. Escherichia coli CNT family member NupC resembles hCNT1 in permeant selectivity but is H+-coupled. Using heterologous expression in Xenopus oocytes and the engineered cysteine-less hCNT3 protein hCNT3(C−), substituted cysteine accessibility method analysis with the membrane-impermeant thiol reactive reagent p-chloromercuribenzene sulfonate was performed on the transport domain (interfacial helix 2, hairpin 1, putative transmembrane domain (TM) 7, and TM8), as well as TM9 of the scaffold domain of the protein. This systematic scan of the entire C-terminal half of hCNT3(C−) together with parallel studies of the transport domain of wild-type hCNT1 and the corresponding TMs of cysteine-less NupC(C−) yielded results that validate the newly developed structural homology model of CNT membrane architecture for human CNTs, revealed extended conformationally mobile regions within transport-domain TMs, identified pore-lining residues of functional importance, and provided evidence of an emerging novel elevator-type mechanism of transporter function. PMID:28385889
Rezaeian, Mohsen
2015-01-01
OBJECTIVES: English has become the most frequently used language for scientific communication in the biomedical field. Therefore, scholars from all over the world try to publish their findings in English. This trend has a number of advantages, along with several disadvantages. METHODS: In the current article, the most important disadvantages of publishing biomedical research articles in English for non-native speakers of English are reviewed. RESULTS: The most important disadvantages of publishing biomedical research articles in English for non-native speakers may include: Overlooking, either unintentionally or even deliberately, the most important local health problems; failure to carry out groundbreaking research due to limited medical research budgets; violating generally accepted codes of publication ethics and committing research misconduct and publications in open-access scam/predatory journals rather than prestigious journals. CONCLUSIONS: The above mentioned disadvantages could eventually result in academic establishments becoming irresponsible or, even worse, corrupt. In order to avoid this, scientists, scientific organizations, academic institutions, and scientific associations all over the world should design and implement a wider range of collaborative and comprehensive plans. PMID:25968115
The Nimbus 6 data catalog. Volume 1: 12 June 1975 through 31 August 1975. Data orbits 1 through 1082
NASA Technical Reports Server (NTRS)
1975-01-01
Subsections 1.2 through 1.10 of this catalog summarize the operational highlights of the individual experiments, present preliminary experiment results, and call attention to known data anamolies. Section 2 lists the on-off times for each experiment and provides a method for determining the geographical coverage of each experiment. Section 3 shows selected HIRS, SCAMS and ESMR images, and Section 4 presents THIR montages. Section 5 presents corrections to The Nimbus 6 User's Guide.
... Loss & Fitness Jobs & Making Money Privacy, Identity & Online Security Blog Video & ... The Federal Trade Commission (FTC) is the nation’s consumer protection agency. The FTC works to prevent fraudulent, deceptive ...
Risk Factors for Social Networking Site Scam Victimization Among Malaysian Students.
Kirwan, Gráinne H; Fullwood, Chris; Rooney, Brendan
2018-02-01
Social networking sites (SNSs) can provide cybercriminals with various opportunities, including gathering of user data and login credentials to enable fraud, and directing of users toward online locations that may install malware onto their devices. The techniques employed by such cybercriminals can include clickbait (text or video), advertisement of nonexistent but potentially desirable products, and hoax competitions/giveaways. This study aimed to identify risk factors associated with falling victim to these malicious techniques. An online survey was completed by 295 Malaysian undergraduate students, finding that more than one-third had fallen victim to SNS scams. Logistic regression analysis identified several victimization risk factors including having higher scores in impulsivity (specifically cognitive complexity), using fewer devices for SNSs, and having been on an SNS for a longer duration. No reliable model was found for vulnerability to hoax valuable gift giveaways and "friend view application" advertising specifically, but vulnerability to video clickbait was predicted by lower extraversion scores, higher levels of openness to experience, using fewer devices, and being on an SNS for a longer duration. Other personality traits were not associated with either overall victimization susceptibility or increased risk of falling victim to the specific techniques. However, age approached significance within both the video clickbait and overall victimization models. These findings suggest that routine activity theory may be particularly beneficial in understanding and preventing SNSs scam victimization.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tang, Shuaiqi; Zhang, Minghua; Xie, Shaocheng
Large-scale forcing data, such as vertical velocity and advective tendencies, are required to drive single-column models (SCMs), cloud-resolving models, and large-eddy simulations. Previous studies suggest that some errors of these model simulations could be attributed to the lack of spatial variability in the specified domain-mean large-scale forcing. This study investigates the spatial variability of the forcing and explores its impact on SCM simulated precipitation and clouds. A gridded large-scale forcing data during the March 2000 Cloud Intensive Operational Period at the Atmospheric Radiation Measurement program's Southern Great Plains site is used for analysis and to drive the single-column version ofmore » the Community Atmospheric Model Version 5 (SCAM5). When the gridded forcing data show large spatial variability, such as during a frontal passage, SCAM5 with the domain-mean forcing is not able to capture the convective systems that are partly located in the domain or that only occupy part of the domain. This problem has been largely reduced by using the gridded forcing data, which allows running SCAM5 in each subcolumn and then averaging the results within the domain. This is because the subcolumns have a better chance to capture the timing of the frontal propagation and the small-scale systems. As a result, other potential uses of the gridded forcing data, such as understanding and testing scale-aware parameterizations, are also discussed.« less
Health fraud involves selling drugs, devices, foods, or cosmetics that have not been proven effective. Keep in ... you from getting the treatment you really need. Health fraud scams can be found everywhere, promising help ...
Hansoti, Bhakti; Langdorf, Mark I.; Murphy, Linda S.
2016-01-01
Introduction Open access (OA) medical publishing is growing rapidly. While subscription-based publishing does not charge the author, OA does. This opens the door for “predatory” publishers who take authors’ money but provide no substantial peer review or indexing to truly disseminate research findings. Discriminating between predatory and legitimate OA publishers is difficult. Methods We searched a number of library indexing databases that were available to us through the University of California, Irvine Libraries for journals in the field of emergency medicine (EM). Using criteria from Jeffrey Beall, University of Colorado librarian and an expert on predatory publishing, and the Research Committee of the International Federation for EM, we categorized EM journals as legitimate or likely predatory. Results We identified 150 journal titles related to EM from all sources, 55 of which met our criteria for OA (37%, the rest subscription based). Of these 55, 25 (45%) were likely to be predatory. We present lists of clearly legitimate OA journals, and, conversely, likely predatory ones. We present criteria a researcher can use to discriminate between the two. We present the indexing profiles of legitimate EM OA journals, to inform the researcher about degree of dissemination of research findings by journal. Conclusion OA journals are proliferating rapidly. About half in EM are legitimate. The rest take substantial money from unsuspecting, usually junior, researchers and provide no value for true dissemination of findings. Researchers should be educated and aware of scam journals. PMID:27625710
Phone Scam Prevention Act of 2014
Sen. Nelson, Bill [D-FL
2014-11-20
Senate - 11/20/2014 Read twice and referred to the Committee on Commerce, Science, and Transportation. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Protecting yourself from cancer scams
... The ads for the product use lots of technical or medical jargon. The product is deemed safe ... Duplication for commercial use must be authorized in writing by ADAM Health Solutions. About MedlinePlus Site Map ...
Caller ID Scam Prevention Act of 2014
Sen. Klobuchar, Amy [D-MN
2014-09-10
Senate - 09/10/2014 Read twice and referred to the Committee on Commerce, Science, and Transportation. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Avoiding Fraudulent Activity and Scams
United States Census Bureau Topics Population Latest Information Age and Sex Ancestry Children Mobility Population Estimates Population Projections Race Veterans Economy Latest Information Portal Other Economic Programs Business Latest Information Business Characteristics Classification Codes
Tropical cyclone intensities from satellite microwave data
NASA Technical Reports Server (NTRS)
Vonderhaar, T. H.; Kidder, S. Q.
1980-01-01
Radial profiles of mean 1000 mb to 250 mb temperature from the Nimbus 6 scanning microwave spectrometer (SCAMS) were constructed around eight intensifying tropical storms in the western Pacific. Seven storms showed distinct inward temperature gradients required for intensification; the eighth displayed no inward gradient and was decaying 24 hours later. The possibility that satellite data might be used to forecast tropical cyclone turning motion was investigated using estimates obtained from Nimbus 6 SCAMS data tapes of the mean 1000 mb to 250 mb temperature field around eleven tropical storms in 1975. Analysis of these data show that for turning storms, in all but one case, the turn was signaled 24 hours in advance by a significant temperature gradient perpendicular to the storm's path, at a distance of 9 deg to 13 deg in front of the storm. A thresholding technique was applied to the North Central U.S. during the summer to estimate precipitation frequency. except
NASA Technical Reports Server (NTRS)
Viezee, W.; Shigeishi, H.; Chang, A. T. C.
1979-01-01
The preliminary results of a research study that emphasizes the analysis and interpretation of data related to total precipitable water and nonprecipitating cloud liquid water obtained from NIMBUS-6 SCAMS are reported. Sixteen cyclonic storm situations in the northeastern Pacific Ocean that resulted in significant rainfall along the west coast of the United States during the winter season October 1975 through February 1976 are analyzed in terms of their distributions and amounts of total water vapor and liquid water, as obtained from SCAMS data. The water-substance analyses for each storm case are related to the distribution and amount of coastal precipitation observed during the subsequent time period when the storm system crosses the coastline. Concomitant precipitation predictions from the LFM are also incorporated. Techniques by which satellite microwave data over the ocean can be used to improve precipitation prediction for the Pacific West Coast are emphasized.
Tang, Shuaiqi; Zhang, Minghua; Xie, Shaocheng
2017-08-05
Large-scale forcing data, such as vertical velocity and advective tendencies, are required to drive single-column models (SCMs), cloud-resolving models, and large-eddy simulations. Previous studies suggest that some errors of these model simulations could be attributed to the lack of spatial variability in the specified domain-mean large-scale forcing. This study investigates the spatial variability of the forcing and explores its impact on SCM simulated precipitation and clouds. A gridded large-scale forcing data during the March 2000 Cloud Intensive Operational Period at the Atmospheric Radiation Measurement program's Southern Great Plains site is used for analysis and to drive the single-column version ofmore » the Community Atmospheric Model Version 5 (SCAM5). When the gridded forcing data show large spatial variability, such as during a frontal passage, SCAM5 with the domain-mean forcing is not able to capture the convective systems that are partly located in the domain or that only occupy part of the domain. This problem has been largely reduced by using the gridded forcing data, which allows running SCAM5 in each subcolumn and then averaging the results within the domain. This is because the subcolumns have a better chance to capture the timing of the frontal propagation and the small-scale systems. As a result, other potential uses of the gridded forcing data, such as understanding and testing scale-aware parameterizations, are also discussed.« less
ERIC Educational Resources Information Center
Ensor, Pat, Ed.
This book examines technical, social, and management issues related to librarians and cyberspace. The following chapters and articles are included: (1) "The Cybrarian's Tool Kit," including "Internet News and Website Reviews" (M. Sylvia), "Searching the Future" (J. Powell), "Netiquette, Hoaxes, and Scams! Oh…
ERIC Educational Resources Information Center
Finn, Chester E., Jr.
2002-01-01
Cautions that there are many potential problems related to higher education via the information superhighway, noting that while distance learning is a fast-growing and promising educational technology, consumers need to use common sense and be prepared to deal with new electronic scams and rip-offs. (SM)
Alaska > DOLWD > Employment Security Tax EMAIL SCAM ALERT (December 2012) On-line Employer Services Online Filing Demonstrations FAQs for TaxWeb Employer Report Notice Alaska Unemployment Insurance Tax Handbook The Employment Security Tax Section is responsible for providing assistance and information to
Schumacher, A; Seljeflot, I; Lerkerød, A B; Sommervoll, L; Otterstad, J E; Arnesen, H
2002-10-01
To investigate if Chlamydia pneumoniae and/or Helicobacter pylori seropositivity is associated with elevated levels of soluble endothelial cell adhesion molecules (sCAMs) as markers of atherosclerotic activity. Immunoglobulin A (IgA) and IgG antibodies to the two bacteria, soluble intercellular cell adhesion molecule-1 (sICAM-1), soluble vascular cell adhesion molecule-1 (sVCAM-1) and E-selectin were measured in coronary heart disease (CHD) patients (n = 193) and age- and sex-matched controls (n = 193). Two different serological methods were used for the detection of Chlamydia antibodies: Labsystems microimmunofluorescence to detect species-specific C. pneumoniae antibodies and Medac's recombinant enzyme-linked immunosorbent assay to detect genus-specific lipopolysaccharide antibodies. The concentrations of sICAM-1 and E-selectin were higher in CHD patients with positive vs. negative Chlamydia lipopolysaccharide IgA (P = 0.044 for both). H. pylori antibodies alone did not predict raised levels of sCAMs, but in CHD patients sICAM-1 was increased with IgA seropositivity to both bacteria compared to double seronegativity (P = 0.034). Concentrations of sVCAM-1 were elevated in CHD patients with double IgA seropositivity compared to those with Chlamydia lipopolysaccharide IgA seropositivity alone (P = 0.018). Our results may indicate that C. pneumoniae contributes to increased inflammation in CHD, and that this contribution is even more pronounced when present in combination with H. pylori IgA antibodies.
A Review & Critique of Trainee-Oriented Training Programs.
ERIC Educational Resources Information Center
Klein-Konz, Ann; Todd-Mancillas, William R.
This paper reviews literature on trainee-oriented training programs, which assign to individual employees predominant responsibility for diagnosing organizational problems requiring changes in employees' behaviors. A Self-Change, Adaption, and Modification (SCAM) Model is developed. The literature support for the model is written in similar…
An appraisal of the performance of the economic and financial crimes commission in Nigeria.
Sowunmi, Fatai Abiola; Adesola, Muniru Adekunle; Salako, Mudashiru Abiodun
2010-12-01
This article examines how an anti-graft body, the Economic and Financial Crime Commission (EFCC), has fared in reducing the incidence of corruption in Nigeria, in particular, bank fraud, Internet scam, and bad governance. It first discusses the corruption situation in Nigeria by highlighting public office holders who have been associated with corruption charges. A Likert-type scale is used in designing the questionnaire for data collection. Descriptive and chi-square analyses are used, and results reveal that the performance of the EFCC has been affected by government interference (p < .05). However, although the anti-graft body has not been able to reduce the incidence of bank fraud (p > .05), bad governance and advance fee fraud have recorded appreciable reduction (p < .05). Areas of success as well as challenges that need to be addressed are identified. Specifically, it is recommended that the bill that established EFCC should be amended to reduce government interference and improve its manpower development, especially in the areas of fraud and Internet scam detection.
Avoiding "Profscam": For Accounting Educators.
ERIC Educational Resources Information Center
Dillaway, Manson P.
In partial response to a recent best-seller decrying the so-called "ProfScam" scenario whereby professors downgrade undergraduate teaching in favor of often irrelevant research, the paper offers guidance to accounting faculty seeking to undertake meaningful publishable research. Recommendations are given for four stages in the research process:…
In ... and out: open access publishing in scientific journals.
Boumil, Marcia M; Salem, Deeb N
2014-01-01
Open access (OA) journals are a growing phenomenon largely of the past decade wherein readers can access the content of scientific journals without paying for a subscription. The costs are borne by authors (or their institutions) who pay a fee to be published, thus allowing readers to access, search, print, and cite the journals without cost. Although the OA model, in and of itself, need not diminish scientific rigor, selectivity, or peer review, the "author pays" model creates an inherent conflict of interest: it operates with the incentive on the part of the journal to publish more and reject less. This is coupled with cost containment measures that affect the journals' ability to engage experienced editors and professional staff to scrutinize data, data analyses, and author conflicts of interest. While some OA journals appear to be comparable to their print competitors, others are "predatory" and have no legitimacy at all. Two recent "scams"--one recently published in Science--highlight the urgency of addressing the issues raised by OA publication so that OA does not lose its credibility just as it begins to gather substantial momentum. High-quality journals develop their reputations over time, and OA outlets will be no exception. For this to occur, however, the OA audience will need to be satisfied that OA can deliver high-quality publications utilizing rigorous peer review, editing, and conflict of interest scrutiny. Academic tenure and promotion committees that review scholarly credentials are understandably skeptical of publications in unrecognized journals, and the large number of new OA outlets contributes to this urgency from their perspective as well.
Cyber-Cops: Angels on the Net.
ERIC Educational Resources Information Center
Educom Review, 1996
1996-01-01
Curtis Sliwa, founder of the Guardian Angels citizens' safety patrol, discusses the development of the Cyber Angels, an online citizens' patrol group that monitors Internet communication. Cyber Angels voluntarily look for and report any illegal activity conducted over the Internet, such as pyramid scams, transmission of stolen credit card and…
Tsunami-Relief Groups Advise K-12
ERIC Educational Resources Information Center
Hurst, Marianne D.
2005-01-01
As American schools pitch in with an array of charitable projects in response to the tsunami in South Asia, experts say educators and students should consider carefully how they can most effectively support relief groups, avoid fund-raising scams, and incorporate their efforts into service-learning programs. When students returned to school after…
Analysis of an Anti-Phishing Lab Activity
ERIC Educational Resources Information Center
Werner, Laurie A.; Courte, Jill
2010-01-01
Despite advances in spam detection software, anti-spam laws, and increasingly sophisticated users, the number of successful phishing scams continues to grow. In addition to monetary losses attributable to phishing, there is also a loss of confidence that stifles use of online services. Using in-class activities in an introductory computer course…
78 FR 37427 - World Elder Abuse Awareness Day, 2013
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-20
... and security. But too often, senior citizens are the victims of abuse, neglect, or financial..., which was enacted as part of the Affordable Care Act, we are working to prevent elder abuse, neglect... seniors to meet financial challenges and helping them avoid scams. And we continue to pursue a rigorous...
Guaranteed Loans: Just Plain Expensive
ERIC Educational Resources Information Center
Petri, Thomas E.
2007-01-01
The investigation of New York State's attorney general, Andrew M. Cuomo, into the questionable practices of lenders in federal student-loan programs has helped raise public awareness of one of the greatest scams in our government: The Federal Family Education Loan program, otherwise known as the guaranteed-student-loan program, is unnecessarily…
Designing for the Elderly User: Internet Safety Training
ERIC Educational Resources Information Center
Appelt, Lianne C.
2016-01-01
The following qualitative study examines the usability of a custom-designed Internet safety tutorial, targeted at elderly individuals who use the Internet regularly, for effectively conveying critical information regarding online fraud, scams, and other cyber security. The elderly population is especially at risk when it comes to fraudulent…
KCNQ1 channel modulation by KCNE proteins via the voltage-sensing domain.
Nakajo, Koichi; Kubo, Yoshihiro
2015-06-15
The gating of the KCNQ1 potassium channel is drastically regulated by auxiliary subunit KCNE proteins. KCNE1, for example, slows the activation kinetics of KCNQ1 by two orders of magnitude. Like other voltage-gated ion channels, the opening of KCNQ1 is regulated by the voltage-sensing domain (VSD; S1-S4 segments). Although it has been known that KCNE proteins interact with KCNQ1 via the pore domain, some recent reports suggest that the VSD movement may be altered by KCNE. The altered VSD movement of KCNQ1 by KCNE proteins has been examined by site-directed mutagenesis, the scanning cysteine accessibility method (SCAM), voltage clamp fluorometry (VCF) and gating charge measurements. These accumulated data support the idea that KCNE proteins interact with the VSDs of KCNQ1 and modulate the gating of the KCNQ1 channel. In this review, we will summarize recent findings and current views of the KCNQ1 modulation by KCNE via the VSD. In this context, we discuss our recent findings that KCNE1 may alter physical interactions between the S4 segment (VSD) and the S5 segment (pore domain) of KCNQ1. Based on these findings from ourselves and others, we propose a hypothetical mechanism for how KCNE1 binding alters the VSD movement and the gating of the channel. © 2015 The Authors. The Journal of Physiology © 2015 The Physiological Society.
Caveat Emptor: The Head Start Scam. Policy Analysis No. 187.
ERIC Educational Resources Information Center
Hood, John
This report questions the efficacy and utility of the Head Start program by challenging the widely accepted belief that early intervention can prevent future dependence and delinquency. This belief assumes that: (1) sweeping conclusions can be drawn from the study of a few unique preschool programs; (2) children's futures are fundamentally…
3 CFR 8782 - Proclamation 8782 of March 5, 2012. National Consumer Protection Week, 2012
Code of Federal Regulations, 2013 CFR
2013-01-01
..., mortgages, and student loans, to build the foundation for a better tomorrow. These tools help bring our aspirations within reach and empower countless individuals to earn an education, afford a home, or raise a... highlighting the ways individuals and families can protect themselves from scams, fraud, and abuse. Robust...
Don't Get "Phished" out of Cyberspace
ERIC Educational Resources Information Center
Goldsborough, Reid
2004-01-01
Identity theft via bogus e-mail links, or "phishing," is escalating, with criminals becoming ever more brazen and sophisticated in their online schemes to trick people into revealing their personal information. People do get scammed. Phishing messages that appear to be sent by trusted companies dupe 3 percent of the people who receive…
The Role of the Ventromedial Prefrontal Cortex in Purchase Intent Among Older Adults.
Koestner, Bryan P; Hedgcock, William; Halfmann, Kameko; Denburg, Natalie L
2016-01-01
Older adults are frequently the targets of scams and deception, with millions of individuals being affected each year in the United States alone. Previous research has shown that the ventromedial prefrontal cortex (vmPFC) may play a role in vulnerability to fraud. The current study examined brain activation patterns in relation to susceptibility to scams and fraud using functional magnetic resonance imaging (fMRI). Twenty-eight healthy, community-dwelling older adults were subdivided into groups of impaired and unimpaired decision makers as determined by their performance on the Iowa Gambling Task (IGT). While in the scanner, the participants viewed advertisements that were created directly from cases deemed deceptive by the Federal Trade Commission (FTC). We then obtained behavioral measures involving comprehension of claims and purchase intention of the product in each advertisement. Contrasts show brain activity in the vmPFC was less correlated with purchase intention in impaired vs. unimpaired older adult decision makers. Our results have important implications for both future research and recognizing the possible causes of fraud susceptibility among older adults.
The Role of the Ventromedial Prefrontal Cortex in Purchase Intent Among Older Adults
Koestner, Bryan P.; Hedgcock, William; Halfmann, Kameko; Denburg, Natalie L.
2016-01-01
Older adults are frequently the targets of scams and deception, with millions of individuals being affected each year in the United States alone. Previous research has shown that the ventromedial prefrontal cortex (vmPFC) may play a role in vulnerability to fraud. The current study examined brain activation patterns in relation to susceptibility to scams and fraud using functional magnetic resonance imaging (fMRI). Twenty-eight healthy, community-dwelling older adults were subdivided into groups of impaired and unimpaired decision makers as determined by their performance on the Iowa Gambling Task (IGT). While in the scanner, the participants viewed advertisements that were created directly from cases deemed deceptive by the Federal Trade Commission (FTC). We then obtained behavioral measures involving comprehension of claims and purchase intention of the product in each advertisement. Contrasts show brain activity in the vmPFC was less correlated with purchase intention in impaired vs. unimpaired older adult decision makers. Our results have important implications for both future research and recognizing the possible causes of fraud susceptibility among older adults. PMID:27536238
College Scholarship Fraud Prevention Act of 2000: Annual Report to Congress. May 2005
ERIC Educational Resources Information Center
US Department of Education, 2005
2005-01-01
Every year, millions of high school graduates seek ways to finance the rising costs of a college education, at times falling prey to scholarship and financial aid scams. To help students and their families, on November 5, 2000, Congress passed the College Scholarship Fraud Prevention Act of 2000 (Act) to establish stricter sentencing guidelines…
Recent trends at the state and federal level in accelerating CERCLA clean-ups
DOE Office of Scientific and Technical Information (OSTI.GOV)
Clegg, B.
Efforts at accelerating remedial action at the federal level focus on the following: the Superfund accelerated clean-up model (SCAM); Brownfields economic redevelopment initiative; guidance documents and policies; and collaboration with state voluntary cleanup programs. At the state level efforts involved in accelerating clean-ups include voluntary clean-up programs and Brownfields initiatives.
College Scholarship Fraud Prevention Act of 2000: Annual Report to Congress. May 2006
ERIC Educational Resources Information Center
US Department of Education, 2006
2006-01-01
Every year, millions of high school graduates seek ways to finance the rising costs of a college education, at times falling prey to scholarship and financial aid scams. To help students and their families, on November 5, 2000, Congress passed the College Scholarship Fraud Prevention Act of 2000 (Act) to establish stricter sentencing guidelines…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-16
... Mortgage Scams Assistance Housing Counseling Under the Housing Counseling Program AGENCY: Office of the... Counseling Program. SUMMARY: In accordance with section 102(a)(4)(C) of the Department of Housing and Urban... recipients under the Housing Counseling Program. FOR FURTHER INFORMATION CONTACT: Ruth Rom[aacute]n, Director...
College Scholarship Fraud Prevention Act of 2000: Annual Report to Congress. May 2007
ERIC Educational Resources Information Center
US Department of Education, 2007
2007-01-01
Every year, millions of high school graduates seek ways to finance the rising costs of a college education, at times falling prey to scholarship and financial aid scams. To help students and their families, on November 5, 2000, Congress passed the College Scholarship Fraud Prevention Act of 2000 (Act) to establish stricter sentencing guidelines…
College Scholarship Fraud Prevention Act of 2000: Annual Report to Congress. 2008
ERIC Educational Resources Information Center
US Department of Education, 2008
2008-01-01
Every year, millions of high school graduates seek ways to finance the rising costs of a college education, at times falling prey to scholarship and financial aid scams. To help students and their families, on November 5, 2000, Congress passed the College Scholarship Fraud Prevention Act of 2000 (Act) to establish stricter sentencing guidelines…
College Scholarship Fraud Prevention Act of 2000: Annual Report to Congress
ERIC Educational Resources Information Center
US Department of Education, 2004
2004-01-01
Every year, millions of high school graduates seek ways to finance the rising costs of a college education, at times falling prey to scholarship and financial aid scams. To help students and their families, on November 5, 2000, Congress passed the College Scholarship Fraud Prevention Act of 2000 (Act) to establish stricter sentencing guidelines…
Con Artists Attack Colleges with Fake Help-Desk E-Mail
ERIC Educational Resources Information Center
Young, Jeffrey R.
2008-01-01
An e-mail scam has hit tens of thousands of users at dozens of colleges over the past few weeks, leaving network administrators scrambling to respond before campus computer accounts are taken over by spammers. Students, professors, and staff members at the affected colleges received e-mail messages that purported to come from the colleges' help…
NASA Technical Reports Server (NTRS)
Ledsham, W. H.; Staelin, D. H.
1978-01-01
An extended Kalman-Bucy filter has been implemented for atmospheric temperature profile retrievals from observations made using the Scanned Microwave Spectrometer (SCAMS) instrument carried on the Nimbus 6 satellite. This filter has the advantage that it requires neither stationary statistics in the underlying processes nor linear production of the observed variables from the variables to be estimated. This extended Kalman-Bucy filter has yielded significant performance improvement relative to multiple regression retrieval methods. A multi-spot extended Kalman-Bucy filter has also been developed in which the temperature profiles at a number of scan angles in a scanning instrument are retrieved simultaneously. These multi-spot retrievals are shown to outperform the single-spot Kalman retrievals.
Moustafa, Khaled
2016-02-01
The Internet has revolutionized the way knowledge is currently produced, stored and disseminated. A few finger clicks on a keyboard can save time and many hours of search in libraries or shopping in stores. Online trademarks with an (e-) prefix such as e-library, e-business, e-health etc., are increasingly part of our daily professional vocabularies. However, the Internet has also produced multiple negative side effects, ranging from an unhealthy dependency to a dehumanization of human relationships. Fraudulent, unethical and scam practices are also flourishing through for example misleading online advertising methods. Some social and professional networks gather users' profiles for selling and advertising purposes, sometimes by making it technically difficult to unsubscribe. Here, I discuss some of these unethical aspects and propose some potential solutions to reduce them.
Rezaeian, Mohsen
2015-01-01
English has become the most frequently used language for scientific communication in the biomedical field. Therefore, scholars from all over the world try to publish their findings in English. This trend has a number of advantages, along with several disadvantages. In the current article, the most important disadvantages of publishing biomedical research articles in English for non-native speakers of English are reviewed. The most important disadvantages of publishing biomedical research articles in English for non-native speakers may include: Overlooking, either unintentionally or even deliberately, the most important local health problems; failure to carry out groundbreaking research due to limited medical research budgets; violating generally accepted codes of publication ethics and committing research misconduct and publications in open-access scam/predatory journals rather than prestigious journals. The above mentioned disadvantages could eventually result in academic establishments becoming irresponsible or, even worse, corrupt. In order to avoid this, scientists, scientific organizations, academic institutions, and scientific associations all over the world should design and implement a wider range of collaborative and comprehensive plans.
Reading in the Hyperconnected Information Era: Lessons from the Beijing Ticket Scam
ERIC Educational Resources Information Center
Ruth, Alison
2009-01-01
In this paper I argue that the kinds of literacy needed for making sense of information on websites is more nuanced and embedded in our everyday context that we are currently providing for learners. The kinds of analysis of websites which allow the processing of information in context are presented. This is demonstrated by an analysis of a scam…
Cyber-Security Curricula for Basic Users
2013-09-01
like cyberbullying , digital cheating, and safety and security concerns‖ [7]. The need to teach security principles to this age demographic is at an...addresses the following topics: Cyberbullying , Inappropriate content, 25 Predators, Revealing too much Information, Spyware, spam, and scams. Each...emerging technology, surfing the web, video gaming, the dark side – cyberbullying . Each topic is covered by providing facts for the teacher to present
College Scholarship Fraud Prevention Act of 2000: Second Annual Report to Congress. May 2003
ERIC Educational Resources Information Center
US Department of Education, 2003
2003-01-01
Every year, millions of high school graduates seek ways to finance the rising costs of a college education, at times falling prey to scholarship and financial aid scams. To help students and their families, on November 5, 2000, Congress passed the College Scholarship Fraud Prevention Act of 2000 (Act) to establish stricter sentencing guidelines…
ERIC Educational Resources Information Center
Mbaziira, Alex Vincent
2017-01-01
Cybercriminals are increasingly using Internet-based text messaging applications to exploit their victims. Incidents of deceptive cybercrime in text-based communication are increasing and include fraud, scams, as well as favorable and unfavorable fake reviews. In this work, we use a text-based deception detection approach to train models for…
Pretending Pirates: Tracing the Toxic Trail in South Asia
ERIC Educational Resources Information Center
Singh, Nivedita; Dev, Santosh; Sengupta, Santoshi
2018-01-01
The recent decades that launched us into the 21st century had a long list of horrendous errors, and scams, which can be traced back to decisions made by those in positions of authority, whether in the public sphere or in business. It questions the very intentions and objectives of leaders and one wonders if failures were deliberate or due to the…
Numerous Academics Have Been Duped by a Scam Using Names of Prominent Scholars.
ERIC Educational Resources Information Center
Leatherman, Courtney
1997-01-01
A convicted criminal, eluding police, has conned dozens of college faculty out of over $200,000 over two years by pretending to be a prominent scholar, calling on colleagues to provide financial assistance to a friend, and offering academic services or personal favors in return. Targeted professors have been in the fields of history, sociology,…
CrossTalk. The Journal of Defense Software Engineering. Volume 17, Number 3, March 2004
2004-03-01
grace and a littlemore space to house our growing child . Memory filled, the disk over spilled and the infant was now teen wild. The coffers were plump...and a plethora of spam. Jobs reborn, lots of porn , and a case of identity scam. We were the butt of your jokes,drank all your Cokes, and programmed
Servicemembers Civil Relief Act: Information on Mortgage Protections and Related Education Efforts
2014-01-01
activities; legal assistance attorneys provide counseling; and a number of outreach media , such as publications and websites, are aimed at informing...to servicemembers. DOD and the Consumer Federation of America also conduct the Military Saves Campaign every year, a social marketing campaign to...theft, and insurance scams targeted at servicemembers and their families. DOD established its financial education partnerships by signing memorandums
College Scholarship Fraud Prevention Act of 2000: First Annual Report to Congress. May 2002
ERIC Educational Resources Information Center
US Department of Education, 2002
2002-01-01
Every year, millions of high school graduates enter college. The cost of a four-year college education has risen over 600 percent since 1969. Students and their families seek ways to finance the rising costs of a college education, at times falling prey to scholarship and financial aid scams. To help students and their families, on November 5,…
Hansoti, Bhakti; Langdorf, Mark I; Murphy, Linda S
2016-09-01
Open access (OA) medical publishing is growing rapidly. While subscription-based publishing does not charge the author, OA does. This opens the door for "predatory" publishers who take authors' money but provide no substantial peer review or indexing to truly disseminate research findings. Discriminating between predatory and legitimate OA publishers is difficult. We searched a number of library indexing databases that were available to us through the University of California, Irvine Libraries for journals in the field of emergency medicine (EM). Using criteria from Jeffrey Beall, University of Colorado librarian and an expert on predatory publishing, and the Research Committee of the International Federation for EM, we categorized EM journals as legitimate or likely predatory. We identified 150 journal titles related to EM from all sources, 55 of which met our criteria for OA (37%, the rest subscription based). Of these 55, 25 (45%) were likely to be predatory. We present lists of clearly legitimate OA journals, and, conversely, likely predatory ones. We present criteria a researcher can use to discriminate between the two. We present the indexing profiles of legitimate EM OA journals, to inform the researcher about degree of dissemination of research findings by journal. OA journals are proliferating rapidly. About half in EM are legitimate. The rest take substantial money from unsuspecting, usually junior, researchers and provide no value for true dissemination of findings. Researchers should be educated and aware of scam journals.
Health Insurance Exchanges: Health Insurance Navigators and In-Person Assistance
2013-09-25
apply for coverage through the exchanges may be eligible for small business tax credits.5 Consumers may apply for coverage over the phone, online , via...more recent CMS announcements reference 20-30 hours of training. 47 The Medicare Learning Network online navigator training is estimated to take 20...about scam artists seeking to obtain personal information under the guise of verifying information regarding ACA coverage.114
The Solution of Linear Complementarity Problems on an Array Processor.
1981-01-01
INITIALIZE T04E 4IASK COMON /1SCA/M1AA ITERAIIJ)NSp NIUvld ITEWAILUNSPNUJ4d RUMboaJNI Co6 C3MAON /ISCA/I GRIL )POINTSo Y LiRIUPOINTS CDMAION /SUaLMjAT...GRI1D# WIDTH GRIfl LOGICAL MASWI MASK MASK INTEGE" X GRIL )POINTSo Y GRIOPUINTS 14JTEGEM MAX ITERATIONS# NUMB ITERArIONS9 NIJMO ROPIS, NUMB COLS C LOCAL
Probing the Initial Mass Function in Extended Ultraviolet (XUV) Disks
NASA Astrophysics Data System (ADS)
Koda, Jin
2012-01-01
"The GALEX UV satellite discovered tantalizing evidence of star formation (SF) far beyond the optical edge of galactic disks (i.e. extended UV disk, or XUV disk). This discovery provides a new opportunity for studying SF in the exceedingly low-density environment (˜1/10 of typical SF density), spurring intense debate on the universality of the initial mass function (IMF) in such exceptional environments. Our pilot S-Cam study of M83’s XUV disk led to support for the universal IMF at least in M83 (Koda et al. 2012). We propose an expansion of the pilot study, observing 6 XUV disks in NA656(Hα), B, I, and R-band with S-Cam. In conjunction with GALEX UV bands, these images will reveal the presence of O stars (Hα; NA656-R) and O&B stars (UV) in stellar clusters -thus, constraining the high-mass end of the IMF. The multi-broadband images will enable us to determine the masses of the clusters with much improved accuracy (previously, relied only on R). The proposed observations will not only increase the statistical significance of our previous result, but also enable us to analyze the stochastic effect of IMF sampling in very low-mass clusters (10^{2+3} M_sun) - the regime about which there is much ongoing debate."
Baig, Deeba Noreen; Yanagawa, Toru; Tabuchi, Katsuhiko
2017-03-01
Synaptic cell adhesion molecules (SCAMs) are a functional category of cell adhesion molecules that connect pre- and postsynapses by the protein-protein interaction via their extracellular cell adhesion domains. Countless numbers of common genetic variants and rare mutations in SCAMs have been identified in the patients with autism spectrum disorders (ASDs). Among these, NRXN and NLGN family proteins cooperatively function at synaptic terminals both of which genes are strongly implicated as risk genes for ASDs. Knock-in mice carrying a single rare point mutation of NLGN3 (NLGN3 R451C) discovered in the patients with ASDs display a deficit in social interaction and an enhancement of spatial learning and memory ability reminiscent of the clinical phenotype of ASDs. NLGN4 knockout (KO) and NRXN2α KO mice also show a deficit in sociability as well as some specific neuropsychiatric behaviors. In this review, we selected NRXNs/NLGNs, CNTNAP2/CNTNAP4, CNTN4, ITGB3, and KIRREL3 as strong ASD risk genes based on SFARI score and summarize the protein structures, functions at synapses, representative discoveries in human genetic studies, and phenotypes of the mutant model mice in light of the pathophysiology of ASDs. Copyright © 2016 Elsevier Inc. All rights reserved.
Carnevale, R; Loffredo, L; Nocella, C; Bartimoccia, S; Bucci, T; De Falco, E; Peruzzi, M; Chimenti, I; Biondi-Zoccai, G; Pignatelli, P; Violi, F; Frati, G
2014-01-01
Platelet activation contributes to the alteration of endothelial function, a critical initial step in atherogenesis through the production and release of prooxidant mediators. There is uncertainty about the precise role of polyphenols in interaction between platelets and endothelial cells (ECs). We aimed to investigate whether polyphenols are able to reduce endothelial activation induced by activated platelets. First, we compared platelet activation and flow-mediated dilation (FMD) in 10 healthy subjects (HS) and 10 patients with peripheral artery disease (PAD). Then, we evaluated the effect of epicatechin plus catechin on platelet-HUVEC interaction by measuring soluble cell adhesion molecules (CAMs), NOx production, and eNOS phosphorylation (p-eNOS) in HUVEC. Compared to HS, PAD patients had enhanced platelet activation. Conversely, PAD patients had lower FMD than HS. Supernatant of activated platelets from PAD patients induced an increase of sCAMs release and a decrease of p-eNOS and nitric oxide (NO) bioavailability compared to unstimulated HUVEC. Coincubation of HUVEC, with supernatant of PAD platelets patients, pretreated with a scalar dose of the polyphenols, resulted in a decrease of sCAMs release and in an increase of p-eNOS and NO bioavailability. This study demonstrates that epicatechin plus catechin reduces endothelial activation induced by activated platelets.
Probing the Initial Mass Function in Extended Ultraviolet (XUV) Disks
NASA Astrophysics Data System (ADS)
Koda, Jin
2013-01-01
"The GALEX UV satellite discovered tantalizing evidence of star formation (SF) far beyond the optical edge of galactic disks (i.e. extended UV disk, or XUV disk). This discovery provides a new opportunity for studying SF in the exceedingly low-density environment (˜1/10 of typical SF density), spurring intense debate on the universality of the initial mass function (IMF) in such exceptional environments. Our pilot S-Cam study of M83’s XUV disk led to support for the universal IMF at least in M83 (Koda et al. 2012). We propose an expansion of the pilot study by an order of magnitude, by observing additional 6 XUV disks in NA656(Hα), B, I, and R-band with S-Cam in S13A. In conjunction with GALEX UV bands, these images will reveal the presence of O stars (Hα; NA656-R) and O&B stars (UV) in stellar clusters -thus, constraining the high-mass end of the IMF. These multi-broadband images will enable us to determine the masses of the clusters with much improved accuracy (previously, relied only on R). The proposed observations will not only increase the statistical significance of our previous result, but also enable us to analyze the stochastic effect of IMF sampling in very low-mass - clusters (10^(2+3) M_sun) - the regime about which there is much ongoing debate."
Probing the Initial Mass Function in Extended Ultraviolet (XUV) Disks
NASA Astrophysics Data System (ADS)
Koda, Jin
2013-01-01
"The GALEX UV satellite discovered tantalizing evidence of star formation (SF) far beyond the optical edge of galactic disks (i.e. extended UV disk, or XUV disk). This discovery provides a new opportunity for studying SF in the exceedingly low-density environment (˜1/10 of typical SF density), spurring intense debate on the universality of the initial mass function (IMF) in such exceptional environments. Our pilot S-Cam study of M83’s XUV disk led to support for the universal IMF at least in M83 (Koda et al. 2012). We propose an expansion of the pilot study by about an order of magnitude, by observing 6 XUV disks in NA656(Hα), B, I, and R-band with S-Cam in S13B. In conjunction with GALEX UV bands, these images will reveal the presence of O stars (Hα) and O&B stars (UV) in stellar clusters -thus, constraining the high-mass end of the IMF. These multi-broadband images will enable us to determine the masses of the clusters with much improved accuracy (previously, relied only on R). The proposed observations will not only increase the statistical significance of our previous result, but also enable us to analyze the stochastic effect of IMF sampling in very low-mass - clusters (10^{2+3} M_sun) - the regime of ongoing debate. Previously allocated 1+2 nights were cancelled (telescope failures)."
Probing the Initial Mass Function in Extended Ultraviolet (XUV) Disks
NASA Astrophysics Data System (ADS)
Koda, Jin
2014-01-01
The GALEX UV satellite discovered tantalizing evidence of star formation (SF) far beyond the optical edge of galactic disks (i.e. XUV disk). This discovery provides a new opportunity for studying SF in the exceedingly low-density environment (~1/10 of typical SF density), spurring intense debate on the universality of the initial mass function (IMF) in such exceptional environments. Our pilot study led to support for the universal IMF at least in M83’s XUV disk (Koda et al. 2012). We propose an expansion of the pilot study by about an order of magnitude, by observing total ~ 10 XUV disks (6 disks in S14A) in NA656(Halpha), B, I, and R-band with S-Cam. In conjunction with GALEX UV bands, these images will reveal the presence of O stars (Halpha) and O&B stars (UV) in stellar clusters -thus, constraining the high-mass end of the IMF. These multi-broadband images will enable us to determine the masses of the clusters with much improved accuracy (previously, relied only on R). This project will not only increase the statistical significance of our previous result, but also enable us to analyze the stochastic effect of IMF sampling in very low-mass clusters (102-3 Msun) - the regime of ongoing debate. This proposal will complete this on-going project with S-Cam.
Temperature profile retrievals with extended Kalman-Bucy filters
NASA Technical Reports Server (NTRS)
Ledsham, W. H.; Staelin, D. H.
1979-01-01
The Extended Kalman-Bucy Filter is a powerful technique for estimating non-stationary random parameters in situations where the received signal is a noisy non-linear function of those parameters. A practical causal filter for retrieving atmospheric temperature profiles from radiances observed at a single scan angle by the Scanning Microwave Spectrometer (SCAMS) carried on the Nimbus 6 satellite typically shows approximately a 10-30% reduction in rms error about the mean at almost all levels below 70 mb when compared with a regression inversion.
Kaufmann, Kristian W.; Dawson, Eric S.; Henry, L. Keith; Field, Julie R.; Blakely, Randy D.; Meiler, Jens
2009-01-01
To identify potential determinants of substrate selectivity in serotonin (5-HT) transporters (SERT), models of human and Drosophila serotonin transporters (hSERT, dSERT) were built based on the leucine transporter (LeuTAa) structure reported by Yamashita et al. (Nature 2005;437:215–223), PBDID 2A65. Although the overall amino acid identity between SERTs and the LeuTAa is only 17%, it increases to above 50% in the first shell of the putative 5-HT binding site, allowing de novo computational docking of tryptamine derivatives in atomic detail. Comparison of hSERT and dSERT complexed with substrates pinpoints likely structural determinants for substrate binding. Forgoing the use of experimental transport and binding data of tryptamine derivatives for construction of these models enables us to cHitically assess and validate their predictive power: A single 5-HT binding mode was identified that retains the amine placement observed in the LeuTAa structure, matches site-directed mutagenesis and substituted cysteine accessibility method (SCAM) data, complies with support vector machine derived relations activity relations, and predicts computational binding energies for 5-HT analogs with a significant correlation coefficient (R = 0.72). This binding mode places 5-HT deep in the binding pocket of the SERT with the 5-position near residue hSERT A169/dSERT D164 in transmembrane helix 3, the indole nitrogen next to residue Y176/Y171, and the ethylamine tail under residues F335/F327 and S336/S328 within 4 Å of residue D98. Our studies identify a number of potential contacts whose contribution to substrate binding and transport was previously unsuspected. PMID:18704946
The visiting internet Fiancé/ée (VIF): an emerging group of international travelers.
Sofarelli, Theresa A; Birich, Holly K; Hale, DeVon C
2014-01-01
Here we describe an emerging category of travelers called the Visiting Internet Fiancé/ée (VIF), characterized by their travel to pursue a romantic relationship with an individual they have only encountered online. The VIF is not well identified in travel medicine literature despite having a higher risk for several travel-related issues including sexually transmitted infections, monetary fraud, and international scams. We also propose specific counseling interventions designed to minimize the adverse outcomes faced by the VIF traveler. © 2014 International Society of Travel Medicine.
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. Senate Committee on the Judiciary.
This hearing provided a forum for witnesses testifying about the Anti-Fraudulent Adoption Practices Act of 1984 (S. 2299) and the issues the bill was designed to address. Testimony focuses on the nature and incidence of fraudulent adoption scams; the need for Federal legislation to address the problem; the experiences of victimized families;…
Guo, Zhun; Wang, Minghuai; Qian, Yun; ...
2014-08-13
In this study, we investigate the sensitivity of simulated shallow cumulus and stratocumulus clouds to selected tunable parameters of Cloud Layers Unified by Binormals (CLUBB) in the single column version of Community Atmosphere Model version 5 (SCAM5). A quasi-Monte Carlo (QMC) sampling approach is adopted to effectively explore the high-dimensional parameter space and a generalized linear model is adopted to study the responses of simulated cloud fields to tunable parameters. One stratocumulus and two shallow convection cases are configured at both coarse and fine vertical resolutions in this study.. Our results show that most of the variance in simulated cloudmore » fields can be explained by a small number of tunable parameters. The parameters related to Newtonian and buoyancy-damping terms of total water flux are found to be the most influential parameters for stratocumulus. For shallow cumulus, the most influential parameters are those related to skewness of vertical velocity, reflecting the strong coupling between cloud properties and dynamics in this regime. The influential parameters in the stratocumulus case are sensitive to the choice of the vertical resolution while little sensitivity is found for the shallow convection cases, as eddy mixing length (or dissipation time scale) plays a more important role and depends more strongly on the vertical resolution in stratocumulus than in shallow convections. The influential parameters remain almost unchanged when the number of tunable parameters increases from 16 to 35. This study improves understanding of the CLUBB behavior associated with parameter uncertainties.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Holohan, D.
1995-03-01
Some suggestions for increasing business in the fuel oil marketing sector are given: These include: (1) give your customers a good reason to buy from you; (2) never take customers for granted; (3) use newsletters to educate customers about new developments, the latest technology; (4) establish a personal relationship with customers. Call them and tell them how much you appreciate their business; (5) educate them about possible scams-for instance chimney cleaning companies that might bend the truth; and (6) give your {open_quotes}full-service{close_quotes} company a small town personality and a caring voice. Customers will have difficulty leaving you.
Training users to counteract phishing.
Mayhorn, Christopher B; Nyeste, Patrick G
2012-01-01
Phishing is an increasingly more prevalent form of online, social engineered scams that escalate costs and risks to society year to year. This study demonstrates an association between anti-phishing training techniques used in previous research and individual differences which could affect phishing susceptibility. Results indicated that anti-phishing training in both a simple comic and more complex video game form is helpful in decreasing phishing susceptibility as measured by Miss rates for all individuals including college aged and computer savvy participants. Based on the results of the present study, implications for future efforts to combat phishing are discussed.
Police as contributors to Healthy Communities: Aiken, South Carolina.
Frommer, P; Papouchado, K
2000-01-01
In Aiken, South Carolina, community policing has led to numerous innovative programs that have contributed to a healthy community. The MOMS and COPS (Managing Our Maternity System with Community Oriented Policing System) program has played a significant part in the county's 50% decrease in infant mortality since 1989 and contributed to Aiken's designation as an All-America City in 1997. Other programs include a mentoring program for at-risk teen girls; instant crime reporting with donated cellular phones; seminars for seniors to alert them to scams and common crimes; demolition of unsafe homes; free installation of smoke detectors; a child ID program; and parental education on child brain development.
Behind the Spam: A "Spectral Analysis" of Predatory Publishers
NASA Astrophysics Data System (ADS)
Beall, Jeffrey
2015-08-01
Most researchers today are bombarded with spam email solicitations from questionable scholarly publishers. These emails solicit article manuscripts, editorial board service, and even ad hoc peer reviews. These "predatory" publishers exploit the scholarly publishing process, patterning themselves after legitimate scholarly publishers yet performing little or no peer review and quickly accepting submitted manuscripts and collecting fees from submitting authors. These counterfeit publishers and journals have published much junk science — especially in the field of cosmology — threatening the integrity of the academic record. This presentation examines the current state of predatory publishing and related scams such as fake impact factors and advises researchers how to navigate scholarly publishing to best avoid predatory publishers and other scholarly publishing-related perils.
Emulating a million machines to investigate botnets.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rudish, Donald W.
2010-06-01
Researchers at Sandia National Laboratories in Livermore, California are creating what is in effect a vast digital petridish able to hold one million operating systems at once in an effort to study the behavior of rogue programs known as botnets. Botnets are used extensively by malicious computer hackers to steal computing power fron Internet-connected computers. The hackers harness the stolen resources into a scattered but powerful computer that can be used to send spam, execute phishing, scams or steal digital information. These remote-controlled 'distributed computers' are difficult to observe and track. Botnets may take over parts of tens of thousandsmore » or in some cases even millions of computers, making them among the world's most powerful computers for some applications.« less
Posttest examination results of recent treat tests on metal fuel
DOE Office of Scientific and Technical Information (OSTI.GOV)
Holland, J.W.; Wright, A.E.; Bauer, T.H.
A series of in-reactor transient tests is underway to study the characteristics of metal-alloy fuel during transient-overpower-without-scam conditions. The initial tests focused on determining the margin to cladding breach and the axial fuel motions that would mitigate the power excursion. The tests were conducted in flowing-sodium loops with uranium - 5% fissium EBR-II Mark-II driver fuel elements in the TREAT facility. Posttest examination of the tests evaluated fuel elongation in intact pins and postfailure fuel motion. Microscopic examination of the intact pins studied the nature and extent of fuel/cladding interaction, fuel melt fraction and mass distribution, and distribution of porosity.more » Eutectic penetration and failure of the cladding were also examined in the failed pins.« less
Médicarte software developed for the Quebec microprocessor health card project.
Lavoie, G; Tremblay, L; Durant, P; Papillon, M J; Bérubé, J; Fortin, J P
1995-01-01
The Quebec Patient Smart Card Project is a Provincial Government initiative under the responsibility of the Rgie de l'assurance-maladie du Québec (Quebec Health Insurance Board). Development, implementation, and assessment duties were assigned to a team from Université Laval, which in turn joined a group from the Direction de la santé publique du Bas-St-Laurent in Rimouski, where the experiment is taking place. The pilot project seeks to evaluate the use and acceptance of a microprocessor card as a way to improve the exchange of clinical information between card users and various health professionals. The card can be best described as a résumé containing information pertinent to an individual's health history. It is not a complete medical file; rather, it is a summary to be used as a starting point for a discussion between health professionals and patients. The target population is composed of persons 60 years and over, pregnant women, infants under 18 months, and the residents of a small town located in the target area, St-Fabien, regardless of age. The health professionals involved are general practitioners, specialists, pharmacists, nurses, and ambulance personnel. Participation in the project is on a voluntary basis. Each health care provider participating in the project has a personal identification number (PIN) and must use both an access card and a user card to access information. This prevents unauthorized access to a patient's card and allows the staff to sign and date information entered onto the patient card. To test the microprocessor card, we developed software based on a problem-oriented approach integrating diagnosis, investigations, treatments, and referrals. This software is not an expert system that constrains the clinician to a particular decisional algorithm. Instead, the software supports the physician in decision making. The software was developed with a graphical interface (Windows 3.1) to maximize its user friendliness. A version of the software was developed for each of the four groups of health care providers involved. In addition we designed an application to interface with existing pharmaceutical software. For practical reasons and to make it possible to differentiate between the different access profiles, the information stored on the card is divided in several blocks: Identification, Emergency, History (personal and family), Screening Tests, Vaccinations, Drug Profile, General follow-up, and some Specific follow-ups (Pregnancy, Ophthalmology, Kidney failure, Cardiology, Pediatrics, Diabetes, Pneumology, Specific parameters). Over 14,000 diagnoses and symptoms are classified with four levels of precision, the codification being based on the ICPC (International Classification for Primary Care). The software contains different applications to assist the clinician in decision making. A "Drug Advisor" helps the prescriber by detecting possible interactions between drugs, giving indications (doses) and contraindications, cautions, potential side-effects and therapeutic alternatives. There is also a prevention module providing recommendations for vaccination and periodic examinations based on the patient's age and sex. The pharmaceutical, vaccination, and screening tests data banks are updated every six months. These sections of the software are accessible to access card holders at any times, even without a patient card, and constitute in themselves an interesting clinical tool. We developed a software server (SCAM) allowing the different applications to access the data in a memory card regardless of the type of memory card used. Using a single high level command language, this server provides a standardized utilization of memory cards from various manufacturers. It ensures the compatibility of the applications using the card as a storage medium. (abstract truncated)
Conceptual model and map of financial exploitation of older adults.
Conrad, Kendon J; Iris, Madelyn; Ridings, John W; Fairman, Kimberly P; Rosen, Abby; Wilber, Kathleen H
2011-10-01
This article describes the processes and outcomes of three-dimensional concept mapping to conceptualize financial exploitation of older adults. Statements were generated from a literature review and by local and national panels consisting of 16 experts in the field of financial exploitation. These statements were sorted and rated using Concept Systems software, which grouped the statements into clusters and depicted them as a map. Statements were grouped into six clusters, and ranked by the experts as follows in descending severity: (a) theft and scams, (b) financial victimization, (c) financial entitlement, (d) coercion, (e) signs of possible financial exploitation, and (f) money management difficulties. The hierarchical model can be used to identify elder financial exploitation and differentiate it from related but distinct areas of victimization. The severity hierarchy may be used to develop measures that will enable more precise screening for triage of clients into appropriate interventions.
Prescription drug abuse: problem, policies, and implications.
Phillips, Janice
2013-01-01
This article provides an overview on prescription drug abuse and highlights a number of related legislative bills introduced during the 112th Congress in response to this growing epidemic. Prescription drug abuse has emerged as the nation's fastest growing drug problem. Although prescription drugs have been used effectively and appropriately for decades, deaths from prescription pain medicine in particular have reached epidemic proportions. Bills related to prescription drug abuse introduced during the 112th Congress focus on strengthening provider and consumer education, tracking and monitoring prescription drug abuse, improving data collection on drug overdose fatalities, combating fraud and abuse in Medicare and Medicaid programs, reclassifying drugs to make them more difficult to prescribe and obtain, and enforcing stricter penalties for individuals who operate scam pain clinics and sell pain pills illegitimately. This article underscores the importance of a multifaceted approach to combating prescription drug abuse and concludes with implications for nursing. Copyright © 2013. Published by Mosby, Inc.
Tzanetakis, Meropi; Kamphausen, Gerrit; Werse, Bernd; von Laufenberg, Roger
2016-09-01
In recent years, marketplaces in the darknet emerged where vendors and customers can exchange illicit drugs and other goods on digital platforms by using hidden internet services. The main thesis of this paper is that in an online environment, different practices for building trust and reputation emerge that stabilise market processes. Qualitative and quantitative data from a recent German project on conventional (offline) small-scale drug dealing as well as qualitative case studies on four online vendors operating on Agora market are used to explore alternative practices for building trust and reputation. They also explore the use of violence and logistics established on cryptomarkets in comparison to traditional dealing. To analyse the data we applied qualitative content analyses. For conventional commercial illicit drug dealing on various kinds of markets, trust between buyer and seller is a crucial issue, often emphasized by restricting deals to well-known persons. While this typically includes face-to-face contact, the opposite is true with online drug trading. It is characteristic of cryptomarkets that the parties involved in a transaction know neither the personal identity nor the physical location of one another. This is realised by using aliases, anonymising software, and cryptocurrencies for payments. Violence typically only plays a role in traditional drug dealing, but mostly, if at all, just as a latent threat for potential rule-breakers. Processing a transaction anonymously includes escrow services for the buyers, which makes trading more reliable, although they cannot completely prevent scamming. Furthermore, online drug marketplaces usually offer a customer feedback system that allows customers to rate vendors and review products. A positive vendor feedback helps building reputation and trust in such an online environment. With regard to logistics, most conventional small-scale dealers restrict their acts of selling to private surroundings to avoid encounters with law enforcement. In cryptomarkets, the purchased drugs are delivered by traditional postal services, sometimes to false addresses or to someone else's name to conceal the identity and address of the buyer. On virtual drug markets practices of building trust, conflict resolution and logistics is constantly evolving. They offer improved security solutions on the one hand while on the other hand scamming and fraud seem to be widely used on both online and conventional drug markets. Copyright © 2015 Elsevier B.V. All rights reserved.
Homelessness and Money Mismanagement in Iraq and Afghanistan Veterans
Sullivan, Connor P.; Wolfe, James; Wagner, Henry Ryan; Beckham, Jean C.
2013-01-01
Objectives. We examined the empirical link between money mismanagement and subsequent homelessness among veterans. Methods. We used a random sample of Iraq and Afghanistan War era veterans from the National Post-Deployment Adjustment Survey in 2009–2011. Results. Veterans were randomly selected from a roster of all US military service members in Operation Iraqi Freedom or Operation Enduring Freedom who were separated from active duty or in the Reserves/National Guard. Veterans (n = 1090) from 50 states and all military branches completed 2 waves of data collection 1 year apart (79% retention rate). Thirty percent reported money mismanagement (e.g., bouncing or forging a check, going over one’s credit limit, falling victim to a money scam in the past year). Multivariate analysis revealed money mismanagement (odds ratio [OR] = 4.09, 95% CI = 1.87, 8.94) was associated with homelessness in the next year, as were arrest history (OR = 2.65, 95% CI = 1.33, 5.29), mental health diagnosis (OR = 2.59, 95% CI = 1.26, 5.33), and income (OR = 0.30, 95% CI = 0.13, 0.71). Conclusions. Money mismanagement, reported by a substantial number of veterans, was related to a higher rate of subsequent homelessness. The findings have implications for policymakers and clinicians, suggesting that financial education programs offered by the US Departments of Defense and Veterans Affairs may be targeted to effectively address veteran homelessness. PMID:24148067
Current and potential cyber attacks on medical journals; guidelines for improving security.
Dadkhah, Mehdi; Seno, Seyed Amin Hosseini; Borchardt, Glenn
2017-03-01
At the moment, scholarly publishing is faced with much academic misconduct and threats such as predatory journals, hijacked journals, phishing, and other scams. In response, we have been discussing this misconduct and trying to increase the awareness of researchers, but it seems that there is a lack of research that presents guidelines for editors to help them protect themselves against these threats. It seems that information security is missing in some parts of scholarly publishing that particularly involves medical journals. In this paper, we explain different types of cyber-attacks that especially threaten editors and academic journals. We then explain the details involved in each type of attack. Finally, we present general guidelines for detection and prevention of the attacks. In some cases, we use small experiments to show that our claim is true. Finally, we conclude the paper with a prioritization of these attacks. Copyright © 2016 European Federation of Internal Medicine. Published by Elsevier B.V. All rights reserved.
Internet Access and Pricing: Sorting Out the Options.
ERIC Educational Resources Information Center
Fowler, Thomas B.
1997-01-01
Discusses Internet access and pricing options. Highlights include restructuring of the telecommunications industry; current methods of access; economics of high-speed access; the impact of cheap Internet access; long-term possibilities; and a table that provides a comparison of Internet access methods. (LRW)
Atomic memory access hardware implementations
Ahn, Jung Ho; Erez, Mattan; Dally, William J
2015-02-17
Atomic memory access requests are handled using a variety of systems and methods. According to one example method, a data-processing circuit having an address-request generator that issues requests to a common memory implements a method of processing the requests using a memory-access intervention circuit coupled between the generator and the common memory. The method identifies a current atomic-memory access request from a plurality of memory access requests. A data set is stored that corresponds to the current atomic-memory access request in a data storage circuit within the intervention circuit. It is determined whether the current atomic-memory access request corresponds to at least one previously-stored atomic-memory access request. In response to determining correspondence, the current request is implemented by retrieving data from the common memory. The data is modified in response to the current request and at least one other access request in the memory-access intervention circuit.
Adam, Ahmed
2017-01-01
Objective To describe a simple, novel method to achieve ureteric access in the Cohen crossed reimplanted ureter, which will allow retrograde working access via the conventional transurethral method. Materials and Methods Under cystoscopic vision, suprapubic needle puncture was performed. The needle was directed (bevel facing) towards the desired ureteric orifice (UO). A guidewire (with a floppy-tip) was then inserted into the suprapubic needle passing into the bladder, and then easily passed into the crossed-reimplanted UO. The distal end of the guidewire was then removed through the urethra with cystoscopic grasping forceps. The straightened ureter then easily facilitated ureteroscopy access, retrograde pyelogram studies, and JJ stent insertion in a conventional transurethral method. Results The UO and ureter were aligned in a more conventional orthotopic course, to allow for conventional transurethral working access. Conclusion A novel method to access the Cohen crossed reimplanted ureter was described. All previously published methods of accessing the crossed ureter were critically appraised. PMID:29463976
Evaluation of analytical performance of a new high-sensitivity immunoassay for cardiac troponin I.
Masotti, Silvia; Prontera, Concetta; Musetti, Veronica; Storti, Simona; Ndreu, Rudina; Zucchelli, Gian Carlo; Passino, Claudio; Clerico, Aldo
2018-02-23
The study aim was to evaluate and compare the analytical performance of the new chemiluminescent immunoassay for cardiac troponin I (cTnI), called Access hs-TnI using DxI platform, with those of Access AccuTnI+3 method, and high-sensitivity (hs) cTnI method for ARCHITECT platform. The limits of blank (LoB), detection (LoD) and quantitation (LoQ) at 10% and 20% CV were evaluated according to international standardized protocols. For the evaluation of analytical performance and comparison of cTnI results, both heparinized plasma samples, collected from healthy subjects and patients with cardiac diseases, and quality control samples distributed in external quality assessment programs were used. LoB, LoD and LoQ at 20% and 10% CV values of the Access hs-cTnI method were 0.6, 1.3, 2.1 and 5.3 ng/L, respectively. Access hs-cTnI method showed analytical performance significantly better than that of Access AccuTnI+3 method and similar results to those of hs ARCHITECT cTnI method. Moreover, the cTnI concentrations measured with Access hs-cTnI method showed close linear regressions with both Access AccuTnI+3 and ARCHITECT hs-cTnI methods, although there were systematic differences between these methods. There was no difference between cTnI values measured by Access hs-cTnI in heparinized plasma and serum samples, whereas there was a significant difference between cTnI values, respectively measured in EDTA and heparin plasma samples. Access hs-cTnI has analytical sensitivity parameters significantly improved compared to Access AccuTnI+3 method and is similar to those of the high-sensitivity method using ARCHITECT platform.
Measuring geographic access to health care: raster and network-based methods
2012-01-01
Background Inequalities in geographic access to health care result from the configuration of facilities, population distribution, and the transportation infrastructure. In recent accessibility studies, the traditional distance measure (Euclidean) has been replaced with more plausible measures such as travel distance or time. Both network and raster-based methods are often utilized for estimating travel time in a Geographic Information System. Therefore, exploring the differences in the underlying data models and associated methods and their impact on geographic accessibility estimates is warranted. Methods We examine the assumptions present in population-based travel time models. Conceptual and practical differences between raster and network data models are reviewed, along with methodological implications for service area estimates. Our case study investigates Limited Access Areas defined by Michigan’s Certificate of Need (CON) Program. Geographic accessibility is calculated by identifying the number of people residing more than 30 minutes from an acute care hospital. Both network and raster-based methods are implemented and their results are compared. We also examine sensitivity to changes in travel speed settings and population assignment. Results In both methods, the areas identified as having limited accessibility were similar in their location, configuration, and shape. However, the number of people identified as having limited accessibility varied substantially between methods. Over all permutations, the raster-based method identified more area and people with limited accessibility. The raster-based method was more sensitive to travel speed settings, while the network-based method was more sensitive to the specific population assignment method employed in Michigan. Conclusions Differences between the underlying data models help to explain the variation in results between raster and network-based methods. Considering that the choice of data model/method may substantially alter the outcomes of a geographic accessibility analysis, we advise researchers to use caution in model selection. For policy, we recommend that Michigan adopt the network-based method or reevaluate the travel speed assignment rule in the raster-based method. Additionally, we recommend that the state revisit the population assignment method. PMID:22587023
Random access with adaptive packet aggregation in LTE/LTE-A.
Zhou, Kaijie; Nikaein, Navid
While random access presents a promising solution for efficient uplink channel access, the preamble collision rate can significantly increase when massive number of devices simultaneously access the channel. To address this issue and improve the reliability of the random access, an adaptive packet aggregation method is proposed. With the proposed method, a device does not trigger a random access for every single packet. Instead, it starts a random access when the number of aggregated packets reaches a given threshold. This method reduces the packet collision rate at the expense of an extra latency, which is used to accumulate multiple packets into a single transmission unit. Therefore, the tradeoff between packet loss rate and channel access latency has to be carefully selected. We use semi-Markov model to derive the packet loss rate and channel access latency as functions of packet aggregation number. Hence, the optimal amount of aggregated packets can be found, which keeps the loss rate below the desired value while minimizing the access latency. We also apply for the idea of packet aggregation for power saving, where a device aggregates as many packets as possible until the latency constraint is reached. Simulations are carried out to evaluate our methods. We find that the packet loss rate and/or power consumption are significantly reduced with the proposed method.
Is Psychological Vulnerability Related to the Experience of Fraud in Older Adults?
LICHTENBERG, PETER A.; STICKNEY, LAURIE; PAULSON, DANIEL
2013-01-01
Financial exploitation, and particularly thefts and scams, are increasing at an alarming rate. In this study we (a) determined the national prevalence of older adults who report having been a victim of fraud, (b) created a population-based model for the prediction of fraud, and (c) examined how fraud is experienced by the most psychologically vulnerable older adults. The older adults studied were 4,400 participants in a Health and Retirement Study substudy, the 2008 Leave Behind Questionnaire. The prevalence of fraud across the previous 5 years was 4.5%. Among measures collected in 2002, age, education, and depression were significant predictors of fraud. Financial satisfaction and social-needs fulfillment were measured in 2008 and were significantly related to fraud above and beyond the 2002 predictors. Using depression and social-needs fulfillment to determine the most psychologically vulnerable older adults, we found that fraud prevalence was three times higher (14%) among those with the highest depression and the lowest social-needs fulfillment than among the rest of the sample (4.1%; χ2 = 20.49; p < .001). Clinical gerontologists and other professionals in the field need to be aware of their psychologically vulnerable clients heightened exposure to financial fraud. PMID:23997404
NASA Astrophysics Data System (ADS)
Wibowo, Arief C.; Smith, Mark D.; Yeon, Jeongho; Halasyamani, P. Shiv; zur Loye, Hans-Conrad
2012-11-01
Two new 3D bismuth containing coordination polymers are reported along with their single crystal structures and SHG properties. Compound 1: Bi2O2(pydc) (pydc=pyridine-2, 5-dicarboxylate), crystallizes in the monoclinic, polar space group, P21 (a=9.6479(9) Å, b=4.2349(4) Å, c=11.9615(11) Å, β=109.587(1)°), which contains Bi2O2 chains that are connected into a 3D structure via the pydc ligands. Compound 2: Bi4Na4(1R3S-cam)8(EtOH)3.1(H2O)3.4 (1R3S cam=1R3S-camphoric acid) crystallizes in the monoclinic, polar space group, P21 (a=19.0855(7) Å, b=13.7706(5) Å, c=19.2429(7) Å, β=90.701(1)°) and is a true 3D coordination polymer. These are two example of SHG compounds prepared using unsymmetric ligands (compound 1) or chiral ligands (compound 2), together with metals that often exhibit stereochemically-active lone pairs, such as Bi3+, a synthetic approach that resulted in polar, non-centrosymmetric, 3D metal-organic coordination polymer.
NASA Technical Reports Server (NTRS)
Lu, Y. T.; Hidaka, H.; Feldman, L. J.
1996-01-01
Roots of many species respond to gravity (gravitropism) and grow downward only if illuminated. This light-regulated root gravitropism is phytochrome-dependent, mediated by calcium, and inhibited by KN-93, a specific inhibitor of calcium/calmodulin-dependent protein kinase II (CaMK II). A cDNA encoding MCK1, a maize homolog of mammalian CaMK, has been isolated from roots of maize (Zea mays L.). The MCK1 gene is expressed in root tips, the site of perception for both light and gravity. Using the [35S]CaM gel-overlay assay we showed that calmodulin-binding activity of the MCK1 is abolished by 50 microM KN-93, but binding is not affected by 5 microM KN-93, paralleling physiological findings that light-regulated root gravitropism is inhibited by 50 microM KN-93, but not by 5 microM KN-93. KN-93 inhibits light-regulated gravitropism by interrupting transduction of the light signal, not light perception, suggesting that MCK1 may play a role in transducing light. This is the first report suggesting a physiological function for a CaMK homolog in light signal transduction.
Slumdog romance: Facebook love and digital privacy at the margins.
Arora, Payal; Scheiber, Laura
2017-04-01
Facebook has consolidated its position as the one-stop-shop for social activity among the poor in the global South. Sex, romance, and love are key motivations for mobile and Internet technology usage among this demographic, much like the West. Digital romance is a critical context through which we gain fresh perspectives on Internet governance for an emerging digital and globalizing public. Revenge porn, slut-shaming, and Internet romance scams are a common and growing malady worldwide. Focusing on how it manifests in diverse digital cultures will aid in the shaping of new Internet laws for a more inclusive cross-cultural public. In specific, this article examines how low-income youth in two of the BRICS (Brazil, Russia, India, China and South Africa) nations - Brazil and India - exercise and express their notions on digital privacy, surveillance, and trust through the lens of romance. This allows for a more thorough investigation of the relationship between sexuality, morality, and governance within the larger Facebook ecology. As Facebook becomes the dominant virtual public sphere for the world's poor, we are compelled to ask whether inclusivity of the digital users comes at the price of diversity of digital platforms.
Slumdog romance: Facebook love and digital privacy at the margins
Arora, Payal; Scheiber, Laura
2017-01-01
Facebook has consolidated its position as the one-stop-shop for social activity among the poor in the global South. Sex, romance, and love are key motivations for mobile and Internet technology usage among this demographic, much like the West. Digital romance is a critical context through which we gain fresh perspectives on Internet governance for an emerging digital and globalizing public. Revenge porn, slut-shaming, and Internet romance scams are a common and growing malady worldwide. Focusing on how it manifests in diverse digital cultures will aid in the shaping of new Internet laws for a more inclusive cross-cultural public. In specific, this article examines how low-income youth in two of the BRICS (Brazil, Russia, India, China and South Africa) nations – Brazil and India – exercise and express their notions on digital privacy, surveillance, and trust through the lens of romance. This allows for a more thorough investigation of the relationship between sexuality, morality, and governance within the larger Facebook ecology. As Facebook becomes the dominant virtual public sphere for the world’s poor, we are compelled to ask whether inclusivity of the digital users comes at the price of diversity of digital platforms. PMID:29708133
Two Improved Access Methods on Compact Binary (CB) Trees.
ERIC Educational Resources Information Center
Shishibori, Masami; Koyama, Masafumi; Okada, Makoto; Aoe, Jun-ichi
2000-01-01
Discusses information retrieval and the use of binary trees as a fast access method for search strategies such as hashing. Proposes new methods based on compact binary trees that provide faster access and more compact storage, explains the theoretical basis, and confirms the validity of the methods through empirical observations. (LRW)
76 FR 26341 - Medicaid Program; Methods for Assuring Access to Covered Medicaid Services
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-06
... Medicare & Medicaid Services 42 CFR Part 447 Medicare Program; Methods for Assuring Access to Covered... Services 42 CFR Part 447 [CMS 2328-P] RIN 0938-AQ54 Medicaid Program; Methods for Assuring Access to... design the procedures for enrolling providers of such care, and to set the methods for establishing...
Heap/stack guard pages using a wakeup unit
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gooding, Thomas M; Satterfield, David L; Steinmacher-Burow, Burkhard
A method and system for providing a memory access check on a processor including the steps of detecting accesses to a memory device including level-1 cache using a wakeup unit. The method includes invalidating level-1 cache ranges corresponding to a guard page, and configuring a plurality of wakeup address compare (WAC) registers to allow access to selected WAC registers. The method selects one of the plurality of WAC registers, and sets up a WAC register related to the guard page. The method configures the wakeup unit to interrupt on access of the selected WAC register. The method detects access ofmore » the memory device using the wakeup unit when a guard page is violated. The method generates an interrupt to the core using the wakeup unit, and determines the source of the interrupt. The method detects the activated WAC registers assigned to the violated guard page, and initiates a response.« less
Assessment method of accessibility conditions: how to make public buildings accessible?
Andrade, Isabela Fernandes; Ely, e Vera Helena Moro Bins
2012-01-01
The enforcement of accessibility today has faced several difficulties, such as intervention in historic buildings that now house public services and cultural activities, such as town halls, museums and theaters and should allow access, on equal terms to all people. The paper presents the application of a method for evaluating the spatial accessibility conditions and their results. For this, we sought to support the theoretical foundation about the main issue involved and legislation. From the method used--guided walks--it was possible to identify the main barriers to accessibility in historic buildings. From the identified barriers, possible solutions are presented according to the four components of accessibility: spatial orientation, displacement, use and communication. It is hoped also that the knowledge gained in this research contributes to an improvement of accessibility legislation in relation to the listed items.
Gregory, Ellyn; Soderman, Melinda; Ward, Christy; Beukelman, David R; Hux, Karen
2006-06-01
This study investigated the accuracy with which 30 young adults without disabilities learned abbreviation expansion codes associated with specific vocabulary items that were stored in an AAC device with two accessing methods: mouse access and keyboard access. Both accessing methods utilized a specialized computer application, called AAC Menu, which allowed for errorless practice. Mouse access prompted passive learning, whereas keyboard access prompted active learning. Results revealed that participants who accessed words via a keyboard demonstrated significantly higher mastery of abbreviation-expansion codes than those who accessed words via a computer mouse.
A novel asynchronous access method with binary interfaces
2008-01-01
Background Traditionally synchronous access strategies require users to comply with one or more time constraints in order to communicate intent with a binary human-machine interface (e.g., mechanical, gestural or neural switches). Asynchronous access methods are preferable, but have not been used with binary interfaces in the control of devices that require more than two commands to be successfully operated. Methods We present the mathematical development and evaluation of a novel asynchronous access method that may be used to translate sporadic activations of binary interfaces into distinct outcomes for the control of devices requiring an arbitrary number of commands to be controlled. With this method, users are required to activate their interfaces only when the device under control behaves erroneously. Then, a recursive algorithm, incorporating contextual assumptions relevant to all possible outcomes, is used to obtain an informed estimate of user intention. We evaluate this method by simulating a control task requiring a series of target commands to be tracked by a model user. Results When compared to a random selection, the proposed asynchronous access method offers a significant reduction in the number of interface activations required from the user. Conclusion This novel access method offers a variety of advantages over traditionally synchronous access strategies and may be adapted to a wide variety of contexts, with primary relevance to applications involving direct object manipulation. PMID:18959797
Spatial access to residential care resources in Beijing, China
2012-01-01
Background As the population is ageing rapidly in Beijing, the residential care sector is in a fast expansion process with the support of the municipal government. Understanding spatial accessibility to residential care resources by older people supports the need for rational allocation of care resources in future planning. Methods Based on population data and data on residential care resources, this study uses two Geographic Information System (GIS) based methods – shortest path analysis and a two-step floating catchment area (2SFCA) method to analyse spatial accessibility to residential care resources. Results Spatial accessibility varies as the methods and considered factors change. When only time distance is considered, residential care resources are more accessible in the central city than in suburban and exurban areas. If care resources are considered in addition to time distance, spatial accessibility is relatively poor in the central city compared to the northeast to southeast side of the suburban and exurban areas. The resources in the northwest to southwest side of the city are the least accessible, even though several hotspots of residential care resources are located in these areas. Conclusions For policy making, it may require combining various methods for a comprehensive analysis. The methods used in this study provide tools for identifying underserved areas in order to improve equity in access to and efficiency in allocation of residential care resources in future planning. PMID:22877360
Crovelli, Robert A.; revised by Charpentier, Ronald R.
2012-01-01
The U.S. Geological Survey (USGS) periodically assesses petroleum resources of areas within the United States and the world. The purpose of this report is to explain the development of an analytic probabilistic method and spreadsheet software system called Analytic Cell-Based Continuous Energy Spreadsheet System (ACCESS). The ACCESS method is based upon mathematical equations derived from probability theory. The ACCESS spreadsheet can be used to calculate estimates of the undeveloped oil, gas, and NGL (natural gas liquids) resources in a continuous-type assessment unit. An assessment unit is a mappable volume of rock in a total petroleum system. In this report, the geologic assessment model is defined first, the analytic probabilistic method is described second, and the spreadsheet ACCESS is described third. In this revised version of Open-File Report 00-044 , the text has been updated to reflect modifications that were made to the ACCESS program. Two versions of the program are added as appendixes.
A dynamic access control method based on QoS requirement
NASA Astrophysics Data System (ADS)
Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang
2013-03-01
A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.
Tao, Zhuolin; Yao, Zaoxing; Kong, Hui; Duan, Fei; Li, Guicai
2018-05-09
Shenzhen has rapidly grown into a megacity in the recent decades. It is a challenging task for the Shenzhen government to provide sufficient healthcare services. The spatial configuration of healthcare services can influence the convenience for the consumers to obtain healthcare services. Spatial accessibility has been widely adopted as a scientific measurement for evaluating the rationality of the spatial configuration of healthcare services. The multi-modal two-step floating catchment area (2SFCA) method is an important advance in the field of healthcare accessibility modelling, which enables the simultaneous assessment of spatial accessibility via multiple transport modes. This study further develops the multi-modal 2SFCA method by introducing online map APIs to improve the estimation of travel time by public transit or by car respectively. As the results show, the distribution of healthcare accessibility by multi-modal 2SFCA shows significant spatial disparity. Moreover, by dividing the multi-modal accessibility into car-mode and transit-mode accessibility, this study discovers that the transit-mode subgroup is disadvantaged in the competition for healthcare services with the car-mode subgroup. The disparity in transit-mode accessibility is the main reason of the uneven pattern of healthcare accessibility in Shenzhen. The findings suggest improving the public transit conditions for accessing healthcare services to reduce the disparity of healthcare accessibility. More healthcare services should be allocated in the eastern and western Shenzhen, especially sub-districts in Dapeng District and western Bao'an District. As these findings cannot be drawn by the traditional single-modal 2SFCA method, the advantage of the multi-modal 2SFCA method is significant to both healthcare studies and healthcare system planning.
Tipton, Stephen J; Forkey, Sara; Choi, Young B
2016-04-01
This paper examines various methods encompassing the authentication of users in accessing Electronic Medical Records (EMRs). From a methodological perspective, multiple authentication methods have been researched from both a desktop and mobile accessibility perspective. Each method is investigated at a high level, along with comparative analyses, as well as real world examples. The projected outcome of this examination is a better understanding of the sophistication required in protecting the vital privacy constraints of an individual's Protected Health Information (PHI). In understanding the implications of protecting healthcare data in today's technological world, the scope of this paper is to grasp an overview of confidentiality as it pertains to information security. In addressing this topic, a high level overview of the three goals of information security are examined; in particular, the goal of confidentiality is the primary focus. Expanding upon the goal of confidentiality, healthcare accessibility legal aspects are considered, with a focus upon the Health Insurance Portability and Accountability Act of 1996 (HIPAA). With the primary focus of this examination being access to EMRs, the paper will consider two types of accessibility of concern: access from a physician, or group of physicians; and access from an individual patient.
VIEWCACHE: An incremental pointer-based access method for autonomous interoperable databases
NASA Technical Reports Server (NTRS)
Roussopoulos, N.; Sellis, Timos
1993-01-01
One of the biggest problems facing NASA today is to provide scientists efficient access to a large number of distributed databases. Our pointer-based incremental data base access method, VIEWCACHE, provides such an interface for accessing distributed datasets and directories. VIEWCACHE allows database browsing and search performing inter-database cross-referencing with no actual data movement between database sites. This organization and processing is especially suitable for managing Astrophysics databases which are physically distributed all over the world. Once the search is complete, the set of collected pointers pointing to the desired data are cached. VIEWCACHE includes spatial access methods for accessing image datasets, which provide much easier query formulation by referring directly to the image and very efficient search for objects contained within a two-dimensional window. We will develop and optimize a VIEWCACHE External Gateway Access to database management systems to facilitate database search.
VIEWCACHE: An incremental pointer-based access method for autonomous interoperable databases
NASA Technical Reports Server (NTRS)
Roussopoulos, N.; Sellis, Timos
1992-01-01
One of biggest problems facing NASA today is to provide scientists efficient access to a large number of distributed databases. Our pointer-based incremental database access method, VIEWCACHE, provides such an interface for accessing distributed data sets and directories. VIEWCACHE allows database browsing and search performing inter-database cross-referencing with no actual data movement between database sites. This organization and processing is especially suitable for managing Astrophysics databases which are physically distributed all over the world. Once the search is complete, the set of collected pointers pointing to the desired data are cached. VIEWCACHE includes spatial access methods for accessing image data sets, which provide much easier query formulation by referring directly to the image and very efficient search for objects contained within a two-dimensional window. We will develop and optimize a VIEWCACHE External Gateway Access to database management systems to facilitate distributed database search.
Shah, Tayyab Ikram; Milosavljevic, Stephan; Bath, Brenna
2017-06-01
This research is focused on methodological challenges and considerations associated with the estimation of the geographical aspects of access to healthcare with a focus on rural and remote areas. With the assumption that GIS-based accessibility measures for rural healthcare services will vary across geographic units of analysis and estimation techniques, which could influence the interpretation of spatial access to rural healthcare services. Estimations of geographical accessibility depend on variations of the following three parameters: 1) quality of input data; 2) accessibility method; and 3) geographical area. This research investigated the spatial distributions of physiotherapists (PTs) in comparison to family physicians (FPs) across Saskatchewan, Canada. The three-steps floating catchment areas (3SFCA) method was applied to calculate the accessibility scores for both PT and FP services at two different geographical units. A comparison of accessibility scores to simple healthcare provider-to-population ratios was also calculated. The results vary considerably depending on the accessibility methods used and the choice of geographical area unit for measuring geographical accessibility for both FP and PT services. These findings raise intriguing questions regarding the nature and extent of technical issues and methodological considerations that can affect GIS-based measures in health services research and planning. This study demonstrates how the selection of geographical areal units and different methods for measuring geographical accessibility could affect the distribution of healthcare resources in rural areas. These methodological issues have implications for determining where there is reduced access that will ultimately impact health human resource priorities and policies. Copyright © 2017 Elsevier Ltd. All rights reserved.
ERIC Educational Resources Information Center
Museus, Samuel D.
2011-01-01
In this article, the author discusses how researchers can use mixed-methods approaches and intersectional analyses to understand college access among first-generation Asian American and Pacific Islanders (AAPIs). First, he discusses the utility of mixed-methods approaches and intersectionality research in studying college access. Then, he…
Using the Fusion Proximal Area Method and Gravity Method to Identify Areas with Physician Shortages
Xiong, Xuechen; Jin, Chao; Chen, Haile; Luo, Li
2016-01-01
Objectives This paper presents a geographic information system (GIS)-based proximal area method and gravity method for identifying areas with physician shortages. The innovation of this paper is that it uses the appropriate methods to discover each type of health resource and then integrates all these methods to assess spatial access to health resources using population distribution data. In this way, spatial access to health resources for an entire city can be visualized in one neat package, which can help health policy makers quickly comprehend realistic distributions of health resources at a macro level. Methods First, classify health resources according to the trade areas of the patients they serve. Second, apply an appropriate method to each different type of health resource to measure spatial access to those resources. Third, integrate all types of access using population distribution data. Results In case study of Shanghai with the fusion method, areas with physician shortages are located primarily in suburban districts, especially in district junction areas. The result suggests that the government of Shanghai should pay more attention to these areas by investing in new or relocating existing health resources. Conclusion The fusion method is demonstrated to be more accurate and practicable than using a single method to assess spatial access to health resources. PMID:27695105
Microcomputer Applications with PC LAN (Local Area Network) in Battleships.
1988-12-01
NETWORKS 5 C. TRANSMISSION TECHNIQUES 6 D. MEDIUM ACCESS CONTROL METHODS 6 1. CSMA CD 6 2. Control Token 7 3. Slotted Ring 7 E...network model in the Turkish Battleships will employ the broadband technique. D. MEDIUM ACCESS CONTROL METHODS The access method is one of the most...better performance at heavier loads. 3. Slotted Ring This method is used with a ring network. The ring is initialized to contain a fixed number of
Evolving bipartite authentication graph partitions
Pope, Aaron Scott; Tauritz, Daniel Remy; Kent, Alexander D.
2017-01-16
As large scale enterprise computer networks become more ubiquitous, finding the appropriate balance between user convenience and user access control is an increasingly challenging proposition. Suboptimal partitioning of users’ access and available services contributes to the vulnerability of enterprise networks. Previous edge-cut partitioning methods unduly restrict users’ access to network resources. This paper introduces a novel method of network partitioning superior to the current state-of-the-art which minimizes user impact by providing alternate avenues for access that reduce vulnerability. Networks are modeled as bipartite authentication access graphs and a multi-objective evolutionary algorithm is used to simultaneously minimize the size of largemore » connected components while minimizing overall restrictions on network users. Lastly, results are presented on a real world data set that demonstrate the effectiveness of the introduced method compared to previous naive methods.« less
Evolving bipartite authentication graph partitions
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pope, Aaron Scott; Tauritz, Daniel Remy; Kent, Alexander D.
As large scale enterprise computer networks become more ubiquitous, finding the appropriate balance between user convenience and user access control is an increasingly challenging proposition. Suboptimal partitioning of users’ access and available services contributes to the vulnerability of enterprise networks. Previous edge-cut partitioning methods unduly restrict users’ access to network resources. This paper introduces a novel method of network partitioning superior to the current state-of-the-art which minimizes user impact by providing alternate avenues for access that reduce vulnerability. Networks are modeled as bipartite authentication access graphs and a multi-objective evolutionary algorithm is used to simultaneously minimize the size of largemore » connected components while minimizing overall restrictions on network users. Lastly, results are presented on a real world data set that demonstrate the effectiveness of the introduced method compared to previous naive methods.« less
Tricks of the Trade: Motivating Sales Agents to Con Older Adults.
DeLiema, Marguerite; Yon, Yongjie; Wilber, Kathleen H
2016-04-01
Financial fraud is estimated to cost consumers approximately $50 billion annually. To examine how new hires are trained to engage in fraud, this study analyzed a sales training transcript from Alliance for Mature Americans (Alliance). In 1996, Alliance was charged with using deception and misrepresentation to sell more than $200 million worth of living trusts and annuities to 10,000 older adults in California. Transcribed recordings from a 2-day Alliance sales training seminar were analyzed using NVivo10, coded inductively, and examined to identify emergent themes. Predominant themes were as follows: (a) indoctrination using incentives and neutralization techniques and (b) training on persuasion tactics targeted at older adults. Findings suggest that sales training focuses on establishing the company's legitimacy, normalizing unethical sales practices, and refining trainees' knowledge about how to influence older consumers. Predatory and fraudulent businesses peddling ill-suited products threaten the economic security of older Americans. Improved insights into sales manipulation strategies can guide the development of protective policies including educational approaches to help older adults detect scams and resist purchasing fraudulent products. © The Author 2014. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Consumer appeal of nutrition and health claims in three existing product concepts.
Verbeke, Wim; Scholderer, Joachim; Lähteenmäki, Liisa
2009-06-01
This paper reports on consumers' reactions towards calcium-enriched fruit juice, omega-3 enriched spread and fibre-enriched cereals, each with a nutrition claim, health claim and reduction of disease risk claim. Cross-sectional data were collected in April 2006 from a sample of 341 consumers in Belgium. Consumers' reactions to the carrier product, functional ingredient and claim combinations were assessed as perceived convincingness of the claim, credibility of the product, attractiveness of the product, and intention to buy the product, while accounting for differences in product familiarity, attitudinal and demographic characteristics. Generally, health claims outperformed nutrition claims, and both of these claim types outperformed reduction of disease risk claims. Comparing consumer reactions across product concepts revealed clear preferences for fibre-enriched cereals as compared to the other two concepts. The interaction effects between claim type and product concept indicated that reduction of disease risk claims are perceived very well in omega-3 enriched spreads, particularly in terms of perceived convincingness of the claim, while not appealing to consumers in the other product concepts. Positive attitudes towards functional foods and familiarity with the concrete functional product category boosted the claim type and product ratings, whereas perceived control over own health and perceiving functional foods as a marketing scam decreased all product concept's appeal.
47 CFR 15.711 - Interference avoidance methods.
Code of Federal Regulations, 2011 CFR
2011-10-01
... channel availability for a TVBD is determined based on the geo-location and database access method described in paragraphs (a) and (b) of this section. (a) Geo-location and database access. A TVBD shall rely on the geo-location and database access mechanism to identify available television channels...
47 CFR 15.711 - Interference avoidance methods.
Code of Federal Regulations, 2013 CFR
2013-10-01
... channel availability for a TVBD is determined based on the geo-location and database access method described in paragraphs (a) and (b) of this section. (a) Geo-location and database access. A TVBD shall rely on the geo-location and database access mechanism to identify available television channels...
47 CFR 15.711 - Interference avoidance methods.
Code of Federal Regulations, 2014 CFR
2014-10-01
... channel availability for a TVBD is determined based on the geo-location and database access method described in paragraphs (a) and (b) of this section. (a) Geo-location and database access. A TVBD shall rely on the geo-location and database access mechanism to identify available television channels...
47 CFR 15.711 - Interference avoidance methods.
Code of Federal Regulations, 2012 CFR
2012-10-01
... channel availability for a TVBD is determined based on the geo-location and database access method described in paragraphs (a) and (b) of this section. (a) Geo-location and database access. A TVBD shall rely on the geo-location and database access mechanism to identify available television channels...
Scheduled Peripheral Component Interconnect Arbiter
NASA Technical Reports Server (NTRS)
Nixon, Scott Alan (Inventor)
2015-01-01
Systems and methods are described for arbitrating access of a communication bus. In one embodiment, a method includes performing steps on one or more processors. The steps include: receiving an access request from a device of the communication bus; evaluating a bus schedule to determine an importance of the device based on the access request; and selectively granting access of the communication bus to the device based on the importance of the device.
Spatial Access to Primary Care Providers in Appalachia
Donohoe, Joseph; Marshall, Vince; Tan, Xi; Camacho, Fabian T.; Anderson, Roger T.; Balkrishnan, Rajesh
2016-01-01
Purpose: The goal of this research was to examine spatial access to primary care physicians in Appalachia using both traditional access measures and the 2-step floating catchment area (2SFCA) method. Spatial access to care was compared between urban and rural regions of Appalachia. Methods: The study region included Appalachia counties of Pennsylvania, Ohio, Kentucky, and North Carolina. Primary care physicians during 2008 and total census block group populations were geocoded into GIS software. Ratios of county physicians to population, driving time to nearest primary care physician, and various 2SFCA approaches were compared. Results: Urban areas of the study region had shorter travel times to their closest primary care physician. Provider to population ratios produced results that varied widely from one county to another because of strict geographic boundaries. The 2SFCA method produced varied results depending on the distance decay weight and variable catchment size techniques chose. 2SFCA scores showed greater access to care in urban areas of Pennsylvania, Ohio, and North Carolina. Conclusion: The different parameters of the 2SFCA method—distance decay weights and variable catchment sizes—have a large impact on the resulting spatial access to primary care scores. The findings of this study suggest that using a relative 2SFCA approach, the spatial access ratio method, when detailed patient travel data are unavailable. The 2SFCA method shows promise for measuring access to care in Appalachia, but more research on patient travel preferences is needed to inform implementation. PMID:26906524
Horner, Nolan S; Beauchemin, Diane
2012-03-02
A simple method for the speciation analysis of bio-accessible arsenic (As) in rice was developed using a continuous on-line leaching method to release the bio-accessible fraction. The continuous on-line leaching method has several advantages over commonly used batch methods including quicker and easier sample preparation, reduced risk of contamination and access to real time leaching data. The bio-accessibility of As in the samples was monitored using inductively coupled plasma mass spectrometry (ICP-MS). Results from a certified reference material as well as cooked and uncooked white rice showed that the majority of As was leached by saliva. Results obtained using the continuous on-line leaching method were comparable to those obtained using a batch method. Speciation analysis of the saliva leachate was performed using ion exchange chromatography coupled to ICP-MS. The four most toxic forms of As (As(III), monomethylarsonic acid (MMA), dimethylarsinic acid (DMA) and As(V)) were clearly separated within 5 min in a single chromatographic run. Over 92% of bio-accessible As in the certified reference material and uncooked white rice sample was in the form of DMA and As(V), whereas it was present as DMA and As(III) in the cooked white rice. Copyright © 2011 Elsevier B.V. All rights reserved.
Wang, Jin; Cao, Xianshuang; Jiang, Hao; Qi, Yadong; Chin, Kit L; Yue, Yongde
2014-12-17
Hibiscus sabdariffa has gained attention for its antioxidant activity. There are many accessions of H. sabdariffa in the world. However, information on the quantification of antioxidant compounds in different accessions is rather limited. In this paper, a liquid chromatography/quadrupole-time-of-flight mass spectrometry (LC-Q-TOF-MS) method for simultaneous determination of five antioxidant compounds (neochlorogenic acid, chlorogenic acid, cryptochlorogenic acid, rutin, and isoquercitrin) in H. sabdariffa leaves was developed. The method was validated for linearity, sensitivity, precision, repeatability and accuracy. The validated method has been successfully applied for determination of the five analytes in eight accessions of H. sabdariffa. The eight accessions of H. sabdariffa were evaluated for their antioxidant activities by DPPH free radical scavenging assay. The investigated accessions of H. sabdariffa were rich in rutin and exhibited strong antioxidant activity. The two accessions showing the highest antioxidant activities were from Cuba (No. 2) and Taiwan (No. 5). The results indicated that H. sabdariffa leaves could be considered as a potential antioxidant source for the food industry. The developed LC-Q-TOF-MS method is helpful for quality control of H. sabdariffa.
Innovative methods for knowledge transfer
NASA Astrophysics Data System (ADS)
Goanta, A. M.
2015-11-01
At this time, learning takes place, either with classic books on paper support or using books scanned or drawn and further converted into PDF or PPT files that are printed on type support CD / DVD. The latter modern means of learning, the study adds live on the Internet using search engines and not least e-learning method, which allows the study of bibliographic related materials in PDF or PPT, stacked and grouped on the basis of a curriculum imposed which can be accessed on a website via a user name and password. Innovative methods come to successfully use other file types than those mentioned above. The graphics in teaching technical subjects such as descriptive geometry can be achieved using animated PowerPoint files, allowing for visualization of steps to be taken, in the case of solving by drawing a descriptive geometry. Another innovative method relies on the use of HTML files, inspired by related sites help design software packages that can be used when teaching descriptive geometry that the technical design. Through this work, the author has proposed to present a new innovative method, which is inspired by the methods listed above, but involves using AVI files to teaching of computer-assisted type graphics or info graphics. In general this new author's method lends itself particularly well to the teaching of the use of software packages because the student actually see the place from where the delivered command is accessed and contextual options of right button of the mouse. These laboratory courses or mentoring can be freestanding cards support CD / DVD or can be posted on websites with restricted access based on user name and password. Practically paper presents the methodology of creating courses and tutorials in AVI format, and how to monitor the degree of accessing the website, on which there were posted mentioned teaching materials, using the tools offered by Google Analytics. The results consist of graphical work, about the degree of access to educational materials, made on the basis of various criteria, such as the: time of access, access location, age of those who accessed, chapters accessed, etc. Finally the author presents his findings on the benefits of this method.
A subjective scheduler for subjective dedicated networks
NASA Astrophysics Data System (ADS)
Suherman; Fakhrizal, Said Reza; Al-Akaidi, Marwan
2017-09-01
Multiple access technique is one of important techniques within medium access layer in TCP/IP protocol stack. Each network technology implements the selected access method. Priority can be implemented in those methods to differentiate services. Some internet networks are dedicated for specific purpose. Education browsing or tutorial video accesses are preferred in a library hotspot, while entertainment and sport contents could be subjects of limitation. Current solution may use IP address filter or access list. This paper proposes subjective properties of users or applications are used for priority determination in multiple access techniques. The NS-2 simulator is employed to evaluate the method. A video surveillance network using WiMAX is chosen as the object. Subjective priority is implemented on WiMAX scheduler based on traffic properties. Three different traffic sources from monitoring video: palace, park, and market are evaluated. The proposed subjective scheduler prioritizes palace monitoring video that results better quality, xx dB than the later monitoring spots.
2013-01-01
Background In many countries, financial assistance is awarded to physicians who settle in an area that is designated as a shortage area to prevent unequal accessibility to primary health care. Today, however, policy makers use fairly simple methods to define health care accessibility, with physician-to-population ratios (PPRs) within predefined administrative boundaries being overwhelmingly favoured. Our purpose is to verify whether these simple methods are accurate enough for adequately designating medical shortage areas and explore how these perform relative to more advanced GIS-based methods. Methods Using a geographical information system (GIS), we conduct a nation-wide study of accessibility to primary care physicians in Belgium using four different methods: PPR, distance to closest physician, cumulative opportunity, and floating catchment area (FCA) methods. Results The official method used by policy makers in Belgium (calculating PPR per physician zone) offers only a crude representation of health care accessibility, especially because large contiguous areas (physician zones) are considered. We found substantial differences in the number and spatial distribution of medical shortage areas when applying different methods. Conclusions The assessment of spatial health care accessibility and concomitant policy initiatives are affected by and dependent on the methodology used. The major disadvantage of PPR methods is its aggregated approach, masking subtle local variations. Some simple GIS methods overcome this issue, but have limitations in terms of conceptualisation of physician interaction and distance decay. Conceptually, the enhanced 2-step floating catchment area (E2SFCA) method, an advanced FCA method, was found to be most appropriate for supporting areal health care policies, since this method is able to calculate accessibility at a small scale (e.g. census tracts), takes interaction between physicians into account, and considers distance decay. While at present in health care research methodological differences and modifiable areal unit problems have remained largely overlooked, this manuscript shows that these aspects have a significant influence on the insights obtained. Hence, it is important for policy makers to ascertain to what extent their policy evaluations hold under different scales of analysis and when different methods are used. PMID:23964751
Hubless satellite communications networks
NASA Technical Reports Server (NTRS)
Robinson, Peter Alan
1994-01-01
Frequency Comb Multiple Access (FCMA) is a new combined modulation and multiple access method which will allow cheap hubless Very Small Aperture Terminal (VSAT) networks to be constructed. Theoretical results show bandwidth efficiency and power efficiency improvements over other modulation and multiple access methods. Costs of the VSAT network are reduced dramatically since a hub station is not required.
An evaluation of three methods of saying "no" to avoid an escalating response class hierarchy.
Mace, F Charles; Pratt, Jamie L; Prager, Kevin L; Pritchard, Duncan
2011-01-01
We evaluated the effects of three different methods of denying access to requested high-preference activities on escalating problem behavior. Functional analysis and response class hierarchy (RCH) assessment results indicated that 4 topographies of problem behaviors displayed by a 13-year-old boy with high-functioning autism constituted an RCH maintained by positive (tangible) reinforcement. Identification of the RCH comprised the baseline phase, during which computer access was denied by saying "no" and providing an explanation for the restriction. Two alternative methods of saying "no" were then evaluated. These methods included (a) denying computer access while providing an opportunity to engage in an alternative preferred activity and (b) denying immediate computer access by arranging a contingency between completion of a low-preference task and subsequent computer access. Results indicated that a hierarchy of problem behavior may be identified in the context of denying access to a preferred activity and that it may be possible to prevent occurrences of escalating problem behavior by either presenting alternative options or arranging contingencies when saying "no" to a child's requests.
Biomass accessibility analysis using electron tomography
Hinkle, Jacob D.; Ciesielski, Peter N.; Gruchalla, Kenny; ...
2015-12-25
Substrate accessibility to catalysts has been a dominant theme in theories of biomass deconstruction. Furthermore, current methods of quantifying accessibility do not elucidate mechanisms for increased accessibility due to changes in microstructure following pretreatment.
Dewulf, Bart; Neutens, Tijs; De Weerdt, Yves; Van de Weghe, Nico
2013-08-22
In many countries, financial assistance is awarded to physicians who settle in an area that is designated as a shortage area to prevent unequal accessibility to primary health care. Today, however, policy makers use fairly simple methods to define health care accessibility, with physician-to-population ratios (PPRs) within predefined administrative boundaries being overwhelmingly favoured. Our purpose is to verify whether these simple methods are accurate enough for adequately designating medical shortage areas and explore how these perform relative to more advanced GIS-based methods. Using a geographical information system (GIS), we conduct a nation-wide study of accessibility to primary care physicians in Belgium using four different methods: PPR, distance to closest physician, cumulative opportunity, and floating catchment area (FCA) methods. The official method used by policy makers in Belgium (calculating PPR per physician zone) offers only a crude representation of health care accessibility, especially because large contiguous areas (physician zones) are considered. We found substantial differences in the number and spatial distribution of medical shortage areas when applying different methods. The assessment of spatial health care accessibility and concomitant policy initiatives are affected by and dependent on the methodology used. The major disadvantage of PPR methods is its aggregated approach, masking subtle local variations. Some simple GIS methods overcome this issue, but have limitations in terms of conceptualisation of physician interaction and distance decay. Conceptually, the enhanced 2-step floating catchment area (E2SFCA) method, an advanced FCA method, was found to be most appropriate for supporting areal health care policies, since this method is able to calculate accessibility at a small scale (e.g., census tracts), takes interaction between physicians into account, and considers distance decay. While at present in health care research methodological differences and modifiable areal unit problems have remained largely overlooked, this manuscript shows that these aspects have a significant influence on the insights obtained. Hence, it is important for policy makers to ascertain to what extent their policy evaluations hold under different scales of analysis and when different methods are used.
Efficient Unsteady Flow Visualization with High-Order Access Dependencies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Jiang; Guo, Hanqi; Yuan, Xiaoru
We present a novel high-order access dependencies based model for efficient pathline computation in unsteady flow visualization. By taking longer access sequences into account to model more sophisticated data access patterns in particle tracing, our method greatly improves the accuracy and reliability in data access prediction. In our work, high-order access dependencies are calculated by tracing uniformly-seeded pathlines in both forward and backward directions in a preprocessing stage. The effectiveness of our proposed approach is demonstrated through a parallel particle tracing framework with high-order data prefetching. Results show that our method achieves higher data locality and hence improves the efficiencymore » of pathline computation.« less
Program Retrieval/Dissemination: A Solid State Random Access System.
ERIC Educational Resources Information Center
Weeks, Walter O., Jr.
The trend toward greater flexibility in educational methods has led to a need for better and more rapid access to a variety of aural and audiovisual resource materials. This in turn has demanded the development of a flexible, reliable system of hardware designed to aid existing distribution methods in providing such access. The system must be…
Does Accessibility of Positive and Negative Schema Vary by Child Physical Abuse Risk?
ERIC Educational Resources Information Center
Crouch, Julie L.; Risser, Heather J.; Skowronski, John J.; Milner, Joel S.; Farc, Magdalena M.; Irwin, Lauren M.
2010-01-01
Objective: To examine differences in accessibility of positive and negative schema in parents with high and low risk for child physical abuse (CPA). Methods: This study combined picture priming and lexical decision making methods to assess the accessibility of positive and negative words following presentation of child and adult faces. The child…
Action Research to Improve Methods of Delivery and Feedback in an Access Grid Room Environment
ERIC Educational Resources Information Center
McArthur, Lynne C.; Klass, Lara; Eberhard, Andrew; Stacey, Andrew
2011-01-01
This article describes a qualitative study which was undertaken to improve the delivery methods and feedback opportunity in honours mathematics lectures which are delivered through Access Grid Rooms. Access Grid Rooms are facilities that provide two-way video and audio interactivity across multiple sites, with the inclusion of smart boards. The…
Ochoa, David; García-Gutiérrez, Ponciano; Juan, David; Valencia, Alfonso; Pazos, Florencio
2013-01-27
A widespread family of methods for studying and predicting protein interactions using sequence information is based on co-evolution, quantified as similarity of phylogenetic trees. Part of the co-evolution observed between interacting proteins could be due to co-adaptation caused by inter-protein contacts. In this case, the co-evolution is expected to be more evident when evaluated on the surface of the proteins or the internal layers close to it. In this work we study the effect of incorporating information on predicted solvent accessibility to three methods for predicting protein interactions based on similarity of phylogenetic trees. We evaluate the performance of these methods in predicting different types of protein associations when trees based on positions with different characteristics of predicted accessibility are used as input. We found that predicted accessibility improves the results of two recent versions of the mirrortree methodology in predicting direct binary physical interactions, while it neither improves these methods, nor the original mirrortree method, in predicting other types of interactions. That improvement comes at no cost in terms of applicability since accessibility can be predicted for any sequence. We also found that predictions of protein-protein interactions are improved when multiple sequence alignments with a richer representation of sequences (including paralogs) are incorporated in the accessibility prediction.
Heinold, Mark R.; Berger, John F.; Loper, Milton H.; Runkle, Gary A.
2015-12-29
Systems and methods permit discriminate access to nuclear reactors. Systems provide penetration pathways to irradiation target loading and offloading systems, instrumentation systems, and other external systems at desired times, while limiting such access during undesired times. Systems use selection mechanisms that can be strategically positioned for space sharing to connect only desired systems to a reactor. Selection mechanisms include distinct paths, forks, diverters, turntables, and other types of selectors. Management methods with such systems permits use of the nuclear reactor and penetration pathways between different systems and functions, simultaneously and at only distinct desired times. Existing TIP drives and other known instrumentation and plant systems are useable with access management systems and methods, which can be used in any nuclear plant with access restrictions.
VanDersarl, Jules J.; Xu, Alexander M.; Melosh, Nicholas A.; Tayebi, Noureddine
2016-02-23
In accordance with the purpose(s) of the present disclosure, as embodied and broadly described herein, embodiments of the present disclosure, in one aspect, relate to methods of making a structure including nanotubes, a structure including nanotubes, methods of delivering a fluid to a cell, methods of removing a fluid to a cell, methods of accessing intracellular space, and the like.
portfolio standards, new methods for accessing natural gas reserves and aging power plants are opening standards, new methods for accessing natural gas reserves, and aging power plants are opening opportunities
Leyens, Lada; Brand, Angela
National and international medicines agencies have developed innovative methods to expedite promising new medicines to the market and facilitate early patient access. Some of these approval pathways are the conditional approval and the adaptive pathways by the European Medicines Agency (EMA); the Promising Innovative Medicine (PIM) designation and the Early Access to Medicines Scheme (EAMS) by the Medicines and Healthcare Products Regulatory Agency (MHRA), as well as the Fast Track, Breakthrough or Accelerated Approval methods by the Food and Drug Administration (FDA). However, at least in Europe, these methods cannot achieve the goal of improving timely access for patients to new medicines on their own; the reimbursement process also has to become adaptive and flexible. In the past 2 years, the effective access (national patient access) to newly approved oncology drugs ranged from 1 to 30 months, with an extremely high variability between European countries. The goal of early patient access in Europe can only be achieved if the national health technology assessment bodies, such as NICE (ENG), HAS (FR), G-BA (DE) or AIFA (IT), provide harmonized, transparent, flexible, conditional and adaptive methods that adopt the level of evidence accepted by the medicines agencies. The efforts from medicines agencies are welcome but will be in vain if health technology assessments do not follow with similar initiatives, and the European 'postcode' lottery will continue. © 2016 S. Karger AG, Basel.
Percutaneous Portal Vein Access and Transhepatic Tract Hemostasis
Saad, Wael E. A.; Madoff, David C.
2012-01-01
Percutaneous portal vein interventions require minimally invasive access to the portal venous system. Common approaches to the portal vein include transjugular hepatic vein to portal vein access and direct transhepatic portal vein access. A major concern of the transhepatic route is the risk of postprocedural bleeding, which is increased when patients are anticoagulated or receiving pharmaceutical thrombolytic therapy. Thus percutaneous portal vein access and subsequent closure are important technical parts of percutaneous portal vein procedures. At present, various techniques have been used for either portal access or subsequent transhepatic tract closure and hemostasis. Regardless of the method used, meticulous technique is required to achieve the overall safety and effectiveness of portal venous procedures. This article reviews the various techniques of percutaneous transhepatic portal vein access and the various closure and hemostatic methods used to reduce the risk of postprocedural bleeding. PMID:23729976
Publishing in Open Access Education Journals: The Authors' Perspectives
ERIC Educational Resources Information Center
Coonin, Bryna; Younce, Leigh M.
2010-01-01
Open access publishing is now an accepted method of scholarly communication. However, the greatest traction for open access publishing thus far has been in the sciences. Penetration of open access publishing has been much slower among the social sciences. This study surveys 309 authors from recent issues of open access journals in education to…
NASA Astrophysics Data System (ADS)
Han, Yishi; Luo, Zhixiao; Wang, Jianhua; Min, Zhixuan; Qin, Xinyu; Sun, Yunlong
2014-09-01
In general, context-based adaptive variable length coding (CAVLC) decoding in H.264/AVC standard requires frequent access to the unstructured variable length coding tables (VLCTs) and significant memory accesses are consumed. Heavy memory accesses will cause high power consumption and time delays, which are serious problems for applications in portable multimedia devices. We propose a method for high-efficiency CAVLC decoding by using a program instead of all the VLCTs. The decoded codeword from VLCTs can be obtained without any table look-up and memory access. The experimental results show that the proposed algorithm achieves 100% memory access saving and 40% decoding time saving without degrading video quality. Additionally, the proposed algorithm shows a better performance compared with conventional CAVLC decoding, such as table look-up by sequential search, table look-up by binary search, Moon's method, and Kim's method.
Allelic database and divergence among Psidium accessions by using microsatellite markers.
da Costa, S R; Santos, C A F
2013-12-16
This study aimed to investigate the genetic variability among guava accessions and wild Psidium species of the Embrapa Semiárido germplasm collection by using microsatellite loci to guide genetic resources and breeding programs, emphasizing crosses between guava and other Psidium species. DNA was extracted using the 2X CTAB method, and polymerase chain reaction products were analyzed on 6% denatured polyacrylamide gels stained with silver nitrate. The unweighted pair-group method using arithmetic average dendrogram generated from the distance matrix of the Jaccard coefficient for 183 alleles of 13 microsatellite loci was used for visualization of genetic similarity. The number of base pairs was estimated using inverse mobility method based on the regression of known-size products. Analysis of molecular variance was performed using total decomposition between and within guava accessions. The accessions showed similarity from 0.75 to 1.00, with the dendrogram presenting cophenetic value of 0.85. Five groups were observed: the first included guava accessions; the second, P. guineense accessions; the third, one accession of P. friedrichsthalianum; and the last 2 groups, P. cattleianum. The genetic similarity among P. guineense and some guava accessions were above 80%, suggesting greater possibility to obtain interspecies hybrids between these 2 species. The genetic variability between the accessions was considered to be high (ΦST = 0.238), indicating that guava genetic variability is not uniformly distributed among the 9 Brazilian states from where the accession were obtained. Obtaining a greater number of accessions by Brazilian states is recommended in order to have greater diversity among the species.
Systems and methods for processing irradiation targets through a nuclear reactor
Dayal, Yogeshwar; Saito, Earl F.; Berger, John F.; Brittingham, Martin W.; Morales, Stephen K.; Hare, Jeffrey M.
2016-05-03
Apparatuses and methods produce radioisotopes in instrumentation tubes of operating commercial nuclear reactors. Irradiation targets may be inserted and removed from instrumentation tubes during operation and converted to radioisotopes otherwise unavailable during operation of commercial nuclear reactors. Example apparatuses may continuously insert, remove, and store irradiation targets to be converted to useable radioisotopes or other desired materials at several different origin and termination points accessible outside an access barrier such as a containment building, drywell wall, or other access restriction preventing access to instrumentation tubes during operation of the nuclear plant.
Selective access and editing in a database
NASA Technical Reports Server (NTRS)
Maluf, David A. (Inventor); Gawdiak, Yuri O. (Inventor)
2010-01-01
Method and system for providing selective access to different portions of a database by different subgroups of database users. Where N users are involved, up to 2.sup.N-1 distinguishable access subgroups in a group space can be formed, where no two access subgroups have the same members. Two or more members of a given access subgroup can edit, substantially simultaneously, a document accessible to each member.
O'Connell, Thomas S; Bedford, K Juliet A; Thiede, Michael; McIntyre, Di
2015-06-09
A key element of the global drive to universal health coverage is ensuring access to needed health services for everyone, and to pursue this goal in an equitable way. This requires concerted efforts to reduce disparities in access through understanding and acting on barriers facing communities with the lowest utilisation levels. Financial barriers dominate the empirical literature on health service access. Unless the full range of access barriers are investigated, efforts to promote equitable access to health care are unlikely to succeed. This paper therefore focuses on exploring the nature and extent of non-financial access barriers. We draw upon two structured literature reviews on barriers to access and utilization of maternal, newborn and child health services in Ghana, Bangladesh, Vietnam and Rwanda. One review analyses access barriers identified in published literature using qualitative research methods; the other in published literature using quantitative analysis of household survey data. We then synthesised the key qualitative and quantitative findings through a conjoint iterative analysis. Five dominant themes on non-financial access barriers were identified: ethnicity; religion; physical accessibility; decision-making, gender and autonomy; and knowledge, information and education. The analysis highlighted that non-financial factors pose considerable barriers to access, many of which relate to the acceptability dimension of access and are challenging to address. Another key finding is that quantitative research methods, while yielding important findings, are inadequate for understanding non-financial access barriers in sufficient detail to develop effective responses. Qualitative research is critical in filling this gap. The analysis also indicates that the nature of non-financial access barriers vary considerably, not only between countries but also between different communities within individual countries. To adequately understand access barriers as a basis for developing effective strategies to address them, mixed-methods approaches are required. From an equity perspective, communities with the lowest utilisation levels should be prioritised and the access barriers specific to that community identified. It is, therefore, critical to develop approaches that can be used at the district level to diagnose and act upon access barriers if we are to pursue an equitable path to universal health coverage.
Assessment and Evaluation Methods for Access Services
ERIC Educational Resources Information Center
Long, Dallas
2014-01-01
This article serves as a primer for assessment and evaluation design by describing the range of methods commonly employed in library settings. Quantitative methods, such as counting and benchmarking measures, are useful for investigating the internal operations of an access services department in order to identify workflow inefficiencies or…
Review of manual control methods for handheld maneuverable instruments.
Fan, Chunman; Dodou, Dimitra; Breedveld, Paul
2013-06-01
By the introduction of new technologies, surgical procedures have been varying from free access in open surgery towards limited access in minimal access surgery. Improving access to difficult-to-reach anatomic sites, e.g. in neurosurgery or percutaneous interventions, needs advanced maneuverable instrumentation. Advances in maneuverable technology require the development of dedicated methods enabling surgeons to stay in direct, manual control of these complex instruments. This article gives an overview of the state-of-the-art in the development of manual control methods for handheld maneuverable instruments. It categorizes the manual control methods in three levels: a) number of steerable segments, b) number of Degrees Of Freedom (DOF), and c) coupling between control motion of the handle and steering motion of the tip. The literature research was completed by using Web of Science, Scopus and PubMed. The study shows that in controlling single steerable segments, direct as well as indirect control methods have been developed, whereas in controlling multiple steerable segments, a gradual shift can be noticed from parallel and serial control to integrated control. The development of multi-segmented maneuverable instruments is still at an early stage, and an intuitive and effective method to control them has to become a primary focus in the domain of minimal access surgery.
Contraceptive Methods Accessed in Volta Region, Ghana, 2009-2014.
Wilson, Himiede W; Ameme, Donne K; Ilesanmi, Olayinka Stephen
2017-01-01
In 2016, Volta Region was one of the two regions in Ghana that recorded a high prevalence of teenage pregnancy, accounting for 15.5% of all adolescent pregnancies in the country. This study aimed to determine the prevalence of contraceptive methods accessed by person, place, and time in Volta Region, Ghana, 2009-2014. We carried out a secondary analysis of contraceptive use data derived from the District Health Information Management System (DHIMS) 2 for Volta Region, between 2009 and 2014. We calculated proportions and described trends. Over the five-year period, there were 673,409 (75.0%) acceptors of family planning out of a total 897, 645 males and females of reproductive age. The proportion of family planning acceptors increased gradually from 18% in 2009 to 23% in 2014. Contraceptive methods were most commonly accessed by male and female between 20 and 29 years. The most common methods of contraceptives accessed were injectables among females accounting for about 70% and condoms accounting for over 90% among males. All the districts in Volta Region did not access contraceptives adequately. The Volta Regional Health Directorate should encourage and support research to ascertain factors influencing uptake of contraceptive methods in all the districts.
An optimization framework for measuring spatial access over healthcare networks.
Li, Zihao; Serban, Nicoleta; Swann, Julie L
2015-07-17
Measurement of healthcare spatial access over a network involves accounting for demand, supply, and network structure. Popular approaches are based on floating catchment areas; however the methods can overestimate demand over the network and fail to capture cascading effects across the system. Optimization is presented as a framework to measure spatial access. Questions related to when and why optimization should be used are addressed. The accuracy of the optimization models compared to the two-step floating catchment area method and its variations is analytically demonstrated, and a case study of specialty care for Cystic Fibrosis over the continental United States is used to compare these approaches. The optimization models capture a patient's experience rather than their opportunities and avoid overestimating patient demand. They can also capture system effects due to change based on congestion. Furthermore, the optimization models provide more elements of access than traditional catchment methods. Optimization models can incorporate user choice and other variations, and they can be useful towards targeting interventions to improve access. They can be easily adapted to measure access for different types of patients, over different provider types, or with capacity constraints in the network. Moreover, optimization models allow differences in access in rural and urban areas.
Not All Lexical Access Tasks Are Created Equal: Lexical Development between Three and Five
ERIC Educational Resources Information Center
Isacoff, Nora M.; Stromswold, Karin
2014-01-01
Lexical access tasks are designed to measure efficiency of lexical access, but task demands and methods vary greatly. Many lexical access tasks do not account for confounding factors including competence in other linguistic abilities. In this study, preschoolers were given two lexical access tasks. In the single-category naming (SCN) task,…
Cost comparison of competing local distribution systems for communication satellite traffic
NASA Technical Reports Server (NTRS)
Dopfel, F. E.
1979-01-01
The boundaries of market areas which favor various means for distributing communications satellite traffic are considered. The distribution methods considered are: control Earth station with cable access, rooftop Earth stations, Earth station with radio access, and various combinations of these methods. The least cost system for a hypothetical region described by number of users and the average cable access mileage is discussed. The region is characterized by a function which expresses the distribution of users. The results indicate that the least cost distribution is central Earth station with cable access for medium to high density areas of a region combined with rooftop Earth stations or (for higher volumes) radio access for remote users.
Renewable Energy on the Grid: Redefining What's Possible | Energy Analysis
, new methods for accessing natural gas reserves and aging power plants are opening opportunities for methods for accessing natural gas reserves and aging power plants are opening opportunities for new
Methods and devices for determining quality of services of storage systems
Seelam, Seetharami R [Yorktown Heights, NY; Teller, Patricia J [Las Cruces, NM
2012-01-17
Methods and systems for allowing access to computer storage systems. Multiple requests from multiple applications can be received and processed efficiently to allow traffic from multiple customers to access the storage system concurrently.
NASA Technical Reports Server (NTRS)
Poole, L. R.
1974-01-01
A study was conducted of an alternate method for storage and use of bathymetry data in the Langley Research Center and Virginia Institute of Marine Science mid-Atlantic continental-shelf wave-refraction computer program. The regional bathymetry array was divided into 105 indexed modules which can be read individually into memory in a nonsequential manner from a peripheral file using special random-access subroutines. In running a sample refraction case, a 75-percent decrease in program field length was achieved by using the random-access storage method in comparison with the conventional method of total regional array storage. This field-length decrease was accompanied by a comparative 5-percent increase in central processing time and a 477-percent increase in the number of operating-system calls. A comparative Langley Research Center computer system cost savings of 68 percent was achieved by using the random-access storage method.
ACCESS 3. Approximation concepts code for efficient structural synthesis: User's guide
NASA Technical Reports Server (NTRS)
Fleury, C.; Schmit, L. A., Jr.
1980-01-01
A user's guide is presented for ACCESS-3, a research oriented program which combines dual methods and a collection of approximation concepts to achieve excellent efficiency in structural synthesis. The finite element method is used for structural analysis and dual algorithms of mathematical programming are applied in the design optimization procedure. This program retains all of the ACCESS-2 capabilities and the data preparation formats are fully compatible. Four distinct optimizer options were added: interior point penalty function method (NEWSUMT); second order primal projection method (PRIMAL2); second order Newton-type dual method (DUAL2); and first order gradient projection-type dual method (DUAL1). A pure discrete and mixed continuous-discrete design variable capability, and zero order approximation of the stress constraints are also included.
Kim, Sunny Jung; Hancock, Jeffrey T
2015-04-01
Despite the accumulating evidence on the positive and negative outcomes of Facebook use, how people perceive themselves to be subject to these outcomes as well as the consequences and mechanisms of these perceptions are underexplored. According to optimistic bias, Facebook users may perceive that bad things are more likely to happen to others than to themselves, while good things are more likely to happen to them than to others. The findings from an online survey among Facebook users indicate that the negative psychological and social outcomes of using Facebook were perceived to be more likely to happen to other Facebook users than to themselves, p<0.001. These self-other discrepant perceptions toward negative social events (e.g., Facebook cyberbullying and scams) significantly mediated one's willingness to support Internet regulation, Sobel z=2.49, p=0.01. For positive outcomes of Facebook use, the direction of optimistic bias was reversed, t(235) = -5.52, p<0.01, indicating that people minimized the likelihoods of experiencing positive events from Facebook while assessing that other Facebook users are prone to encounter those positive events. This reversal pattern emerged among those with negative attitudes toward, and low involvement with, Facebook. These findings demonstrate important and novel self-other discrepant perceptions concerning the risks and benefits of Facebook use.
Shi, Song-Hai; Cheng, Tong; Jan, Lily Yeh; Jan, Yuh-Nung
2004-01-01
In the developing mammalian brain, a large fraction of excitatory synapses initially contain only N-methyl-d-aspartate receptor and thus are “silent” at the resting membrane potential. As development progresses, synapses acquire α-amino-3-hydroxy-5-methyl-4-isoxazolepropionic acid receptors (AMPA-Rs). Although this maturation of excitatory synapses has been well characterized, the molecular basis for this developmental change is not known. Here, we report that dendrite arborization and synapse maturation 1 (Dasm1), an Ig superfamily member, controls excitatory synapse maturation. Dasm1 is localized at the excitatory synapses. Suppression of Dasm1 expression by using RNA interference or expression of dominant negative deletion mutants of Dasm1 in hippocampal neurons at late developmental stage specifically impairs AMPA-R-mediated, but not N-methyl-d-aspartate receptor-mediated, synaptic transmission. The ability of Dasm1 to regulate synaptic AMPA-Rs requires its intracellular C-terminal PDZ domain-binding motif, which interacts with two synaptic PDZ domain-containing proteins involved in spine/synapse maturation, Shank and S-SCAM. Moreover, expression of dominant negative deletion mutants of Dasm1 leads to more immature silent synapses. These results suggest that Dasm1, as a transmembrane molecule, likely provides a link to bridge extracellular signals and intracellular signaling complexes in controlling excitatory synapse maturation. PMID:15340156
Homelessness and money mismanagement in Iraq and Afghanistan veterans.
Elbogen, Eric B; Sullivan, Connor P; Wolfe, James; Wagner, Henry Ryan; Beckham, Jean C
2013-12-01
We examined the empirical link between money mismanagement and subsequent homelessness among veterans. We used a random sample of Iraq and Afghanistan War era veterans from the National Post-Deployment Adjustment Survey in 2009-2011. Veterans were randomly selected from a roster of all US military service members in Operation Iraqi Freedom or Operation Enduring Freedom who were separated from active duty or in the Reserves/National Guard. Veterans (n = 1090) from 50 states and all military branches completed 2 waves of data collection 1 year apart (79% retention rate). Thirty percent reported money mismanagement (e.g., bouncing or forging a check, going over one's credit limit, falling victim to a money scam in the past year). Multivariate analysis revealed money mismanagement (odds ratio [OR] = 4.09, 95% CI = 1.87, 8.94) was associated with homelessness in the next year, as were arrest history (OR = 2.65, 95% CI = 1.33, 5.29), mental health diagnosis (OR = 2.59, 95% CI = 1.26, 5.33), and income (OR = 0.30, 95% CI = 0.13, 0.71). Money mismanagement, reported by a substantial number of veterans, was related to a higher rate of subsequent homelessness. The findings have implications for policymakers and clinicians, suggesting that financial education programs offered by the US Departments of Defense and Veterans Affairs may be targeted to effectively address veteran homelessness.
Klieve, Helen; Sveticic, Jerneja; De Leo, Diego
2009-01-01
Background The 1996 Australian National Firearms Agreement introduced strict access limitations. However, reports on the effectiveness of the new legislation are conflicting. This study, accessing all cases of suicide 1997-2004, explores factors which may impact on the choice of firearms as a suicide method, including current licence possession and previous history of legal access. Methods Detailed information on all Queensland suicides (1997-2004) was obtained from the Queensland Suicide Register, with additional details of firearm licence history accessed from the Firearm Registry (Queensland Police Service). Cases were compared against licence history and method choice (firearms or other method). Odds ratios (OR) assessed the risk of firearms suicide and suicide by any method against licence history. A logistic regression was undertaken identifying factors significant in those most likely to use firearms in suicide. Results The rate of suicide using firearms in those with a current license (10.92 per 100,000) far exceeded the rate in those with no license history (1.03 per 100,000). Those with a license history had a far higher rate of suicide (30.41 per 100,000) compared to that of all suicides (15.39 per 100,000). Additionally, a history of firearms licence (current or present) was found to more than double the risk of suicide by any means (OR = 2.09, P < 0.001). The group with the highest risk of selecting firearms to suicide were older males from rural locations. Conclusion Accessibility and familiarity with firearms represent critical elements in determining the choice of method. Further licensing restrictions and the implementation of more stringent secure storage requirements are likely to reduce the overall familiarity with firearms in the community and contribute to reductions in rates of suicide. PMID:19778414
5 CFR 2606.203 - Granting access.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Access to Records and Accounting of Disclosures § 2606.203 Granting access. (a) The methods for allowing... documentation will be required for the disclosure to the data subject of information required to be made...
77 FR 18814 - Emergency Access Advisory Committee; Announcement of Date of Next Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-28
... Communications and Video Accessibility Act (CVAA), Public Law 11-260, for the purpose of achieving equal access... those effective and efficient technologies and methods. Public Law 111-260 Sec. 106(c). During the... FEDERAL COMMUNICATIONS COMMISSION [DA 12-406] Emergency Access Advisory Committee; Announcement of...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-13
... Agencywide Documents Access and Management System (ADAMS) under Accession Number ML080510164. The proposed..., Maryland. NRC's Agencywide Documents Access and Management System (ADAMS): Publicly available documents..., Revision 3. You can access publicly available documents related to this notice using the following methods...
Stewart, Barclay T.; Gyedu, Adam; Boakye, Godfred; Lewis, Daniel; Hoogerboord, Marius; Mock, Charles
2017-01-01
Background Surgical disease burden falls disproportionately on individuals in low- and middle-income countries. These populations are also the least likely to have access to surgical care. Understanding the barriers to access in these populations is therefore necessary to meet the global surgical need. Methods Using geospatial methods, this study explores the district-level variation of two access barriers in Ghana: poverty and spatial access to care. National survey data were used to estimate the average total household expenditure (THE) in each district. Estimates of the spatial access to essential surgical care were generated from a cost-distance model based on a recent surgical capacity assessment. Correlations were analyzed using regression and displayed cartographically. Results Both THE and spatial access to surgical care were found to have statistically significant regional variation in Ghana (p < 0.001). An inverse relationship was identified between THE and spatial access to essential surgical care (β −5.15 USD, p < 0.001). Poverty and poor spatial access to surgical care were found to co-localize in the northwest of the country. Conclusions Multiple barriers to accessing surgical care can coexist within populations. A careful understanding of all access barriers is necessary to identify and target strategies to address unmet surgical need within a given population. PMID:27766400
Luo, Wei; Qi, Yi
2009-12-01
This paper presents an enhancement of the two-step floating catchment area (2SFCA) method for measuring spatial accessibility, addressing the problem of uniform access within the catchment by applying weights to different travel time zones to account for distance decay. The enhancement is proved to be another special case of the gravity model. When applying this enhanced 2SFCA (E2SFCA) to measure the spatial access to primary care physicians in a study area in northern Illinois, we find that it reveals spatial accessibility pattern that is more consistent with intuition and delineates more spatially explicit health professional shortage areas. It is easy to implement in GIS and straightforward to interpret.
2013-01-01
Background Medical barriers refer to unnecessary policies or procedures imposed by health care providers that are not necessarily medically advised; these restrictions impede clients’ access to family planning (FP). This mixed methods study investigates provider imposed barriers to provision of FP using recent quantitative and qualitative data from urban Uttar Pradesh, India. Methods Baseline quantitative data were collected in six cities in Uttar Pradesh, India from service delivery points (SDP), using facility audits, exit interviews, and provider surveys; for this study, the focus is on the provider surveys. More than 250 providers were surveyed in each city. Providers were asked about the FP methods they provide, and if they restrict clients’ access to each method based on age, parity, partner consent, or marital status. For the qualitative research, we conducted one-on-one interviews with 21 service providers in four of the six cities in Uttar Pradesh. Each interview lasted approximately 45 minutes. Results The quantitative findings show that providers restrict clients’ access to spacing and long-acting and permanent methods of FP based on age, parity, partner consent and marital status. Qualitative findings reinforce that providers, at times, make judgments about their clients’ education, FP needs and ability to understand FP options thereby imposing unnecessary barriers to FP methods. Conclusions Provider restrictions on FP methods are common in these urban Uttar Pradesh sites. This means that women who are young, unmarried, have few or no children, do not have the support of their partner, or are less educated may not be able to access or use FP or their preferred method. These findings highlight the need for in-service training for staff, with a focus on reviewing current guidelines and eligibility criteria for provision of methods. PMID:24365015
ERIC Educational Resources Information Center
Angkananon, Kewalin; Wald, Mike; Gilbert, Lester
2014-01-01
This paper focuses on the development and evaluation of a Technology Enhanced Interaction Framework and Method that can help with designing accessible mobile learning interactions involving disabled people. This new framework and method were developed to help design technological support for communication and interactions between people,…
Flexible Method for Inter-object Communication in C++
NASA Technical Reports Server (NTRS)
Curlett, Brian P.; Gould, Jack J.
1994-01-01
A method has been developed for organizing and sharing large amounts of information between objects in C++ code. This method uses a set of object classes to define variables and group them into tables. The variable tables presented here provide a convenient way of defining and cataloging data, as well as a user-friendly input/output system, a standardized set of access functions, mechanisms for ensuring data integrity, methods for interprocessor data transfer, and an interpretive language for programming relationships between parameters. The object-oriented nature of these variable tables enables the use of multiple data types, each with unique attributes and behavior. Because each variable provides its own access methods, redundant table lookup functions can be bypassed, thus decreasing access times while maintaining data integrity. In addition, a method for automatic reference counting was developed to manage memory safely.
Providing Access to a Diverse Set of Global Reanalysis Dataset Collections
NASA Astrophysics Data System (ADS)
Schuster, D.; Worley, S. J.
2015-12-01
The National Center for Atmospheric Research (NCAR) Research Data Archive (RDA, http://rda.ucar.edu) provides open access to a variety of global reanalysis dataset collections to support atmospheric and related sciences research worldwide. These include products from the European Centre for Medium-Range Weather Forecasts (ECMWF), Japan Meteorological Agency (JMA), National Centers for Environmental Prediction (NCEP), National Oceanic and Atmospheric Administration (NOAA), and NCAR.All RDA hosted reanalysis collections are freely accessible to registered users through a variety of methods. Standard access methods include traditional browser and scripted HTTP file download. Enhanced downloads are available through the Globus GridFTP "fire and forget" data transfer service, which provides an efficient, reliable, and preferred alternative to traditional HTTP-based methods. For those that favor interoperable access using compatible tools, the Unidata THREDDS Data server provides remote access to complete reanalysis collections by virtual dataset aggregation "files". Finally, users can request data subsets and format conversions to be prepared for them through web interface form requests or web service API batch requests. This approach uses NCAR HPC and central file systems to effectively prepare products from the high-resolution and very large reanalyses archives. The presentation will include a detailed inventory of all RDA reanalysis dataset collection holdings, and highlight access capabilities to these collections through use case examples.
47 CFR 54.621 - Access to advanced telecommunications and information services.
Code of Federal Regulations, 2012 CFR
2012-10-01
... cannot obtain toll-free access to an Internet service provider shall be entitled to receive the lesser of... monthly cost of eligible Internet access shall be eligible for universal support. Health care providers shall certify that the Internet access selected is the most cost-effective method for their health care...
ERIC Educational Resources Information Center
Stanton, Kate Valentine; Liew, Chern Li
2011-01-01
Introduction: We examine doctoral students' awareness of and attitudes to open access forms of publication. Levels of awareness of open access and the concept of institutional repositories, publishing behaviour and perceptions of benefits and risks of open access publishing were explored. Method: Qualitative and quantitative data were collected…
Availability and Accessibility in an Open Access Institutional Repository: A Case Study
ERIC Educational Resources Information Center
Lee, Jongwook; Burnett, Gary; Vandegrift, Micah; Baeg, Jung Hoon; Morris, Richard
2015-01-01
Introduction: This study explores the extent to which an institutional repository makes papers available and accessible on the open Web by using 170 journal articles housed in DigiNole Commons, the institutional repository at Florida State University. Method: To analyse the repository's impact on availability and accessibility, we conducted…
47 CFR 54.621 - Access to advanced telecommunications and information services.
Code of Federal Regulations, 2011 CFR
2011-10-01
... monthly cost of eligible Internet access shall be eligible for universal support. Health care providers shall certify that the Internet access selected is the most cost-effective method for their health care needs as defined in § 54.615(c)(7), and that purchase of the Internet access is reasonably related to...
47 CFR 54.621 - Access to advanced telecommunications and information services.
Code of Federal Regulations, 2010 CFR
2010-10-01
... monthly cost of eligible Internet access shall be eligible for universal support. Health care providers shall certify that the Internet access selected is the most cost-effective method for their health care needs as defined in § 54.615(c)(7), and that purchase of the Internet access is reasonably related to...
Oyugi, Boniface; Kioko, Urbanus; Kaboro, Stephen Mbugua; Gikonyo, Shadrack; Okumu, Clarice; Ogola-Munene, Sarah; Kalsi, Shaminder; Thiani, Simon; Korir, Julius; Odundo, Paul; Baltazaar, Billy; Ranji, Moses; Muraguri, Nicholas; Nzioka, Charles
2017-03-27
The study seeks to evaluate the difference in access of long-term family planning (LTFP) methods among the output based approach (OBA) and non-OBA clients within the OBA facility. The study utilises a quasi experimental design. A two tailed unpaired t-test with unequal variance is used to test for the significance variation in the mean access. The difference in difference (DiD) estimates of program effect on long term family planning methods is done to estimate the causal effect by exploiting the group level difference on two or more dimensions. The study also uses a linear regression model to evaluate the predictors of choice of long-term family planning methods. Data was analysed using SPSS version 17. All the methods (Bilateral tubal ligation-BTL, Vasectomy, intrauterine contraceptive device -IUCD, Implants, and Total or combined long-term family planning methods -LTFP) showed a statistical significant difference in the mean utilization between OBA versus non-OBA clients. The difference in difference estimates reveal that the difference in access between OBA and non OBA clients can significantly be attributed to the implementation of the OBA program for intrauterine contraceptive device (p = 0.002), Implants (p = 0.004), and total or combined long-term family planning methods (p = 0.001). The county of residence is a significant determinant of access to all long-term family planning methods except vasectomy and the year of registration is a significant determinant of access especially for implants and total or combined long-term family planning methods. The management level and facility type does not play a role in determining the type of long-term family planning method preferred; however, non-governmental organisations (NGOs) as management level influences the choice of all methods (Bilateral tubal ligation, intrauterine contraceptive device, Implants, and combined methods) except vasectomy. The adjusted R 2 value, representing the percentage of the variance explained by various models, is larger than 18% for implants and total or combined long-term family planning. The study showed that the voucher services in Kenya has been effective in providing long-term family planning services and improving access of care provided to women of reproductive age. Therefore, voucher scheme can be used as a tool for bridging the gap of unmet needs of family planning in Kenya and could potentially be more effective if rolled out to other counties.
The effect of alkaline pretreatment methods on cellulose structure and accessibility
Bali, Garima; Meng, Xianzhi; Deneff, Jacob I.; ...
2014-11-24
The effects of different alkaline pretreatments on cellulose structural features and accessibility are compared and correlated with the enzymatic hydrolysis of Populus. The pretreatments are shown to modify polysaccharides and lignin content to enhance the accessibility for cellulase enzymes. The highest increase in the cellulose accessibility was observed in dilute sodium hydroxide, followed by methods using ammonia soaking and lime (Ca(OH) 2). The biggest increase of cellulose accessibility occurs during the first 10 min of pretreatment, with further increases at a slower rate as severity increases. Low temperature ammonia soaking at longer residence times dissolved a major portion of hemicellulosemore » and exhibited higher cellulose accessibility than high temperature soaking. Moreover, the most significant reduction of degree of polymerization (DP) occurred for dilute sodium hydroxide (NaOH) and ammonia pretreated Populus samples. The study thus identifies important cellulose structural features and relevant parameters related to biomass recalcitrance.« less
Secure Web-Site Access with Tickets and Message-Dependent Digests
Donato, David I.
2008-01-01
Although there are various methods for restricting access to documents stored on a World Wide Web (WWW) site (a Web site), none of the widely used methods is completely suitable for restricting access to Web applications hosted on an otherwise publicly accessible Web site. A new technique, however, provides a mix of features well suited for restricting Web-site or Web-application access to authorized users, including the following: secure user authentication, tamper-resistant sessions, simple access to user state variables by server-side applications, and clean session terminations. This technique, called message-dependent digests with tickets, or MDDT, maintains secure user sessions by passing single-use nonces (tickets) and message-dependent digests of user credentials back and forth between client and server. Appendix 2 provides a working implementation of MDDT with PHP server-side code and JavaScript client-side code.
Mumford, Leslie; Lam, Rachel; Wright, Virginia; Chau, Tom
2014-08-01
This study applied response efficiency theory to create the Access Technology Delivery Protocol (ATDP), a child and family-centred collaborative approach to the implementation of access technologies. We conducted a descriptive, mixed methods case study to demonstrate the ATDP method with a 12-year-old boy with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with a custom smile-based access technology. At the 16 week mark, the new access technology offered better response quality; teacher satisfaction was high; average technology usage was 3-4 times per week for up to 1 h each time; switch sensitivity and specificity reached 78% and 64%, respectively, and participation scores increased by 38%. This case supports further development and testing of the ATDP with additional children with multiple or severe disabilities.
Role-based access control permissions
Staggs, Kevin P.; Markham, Thomas R.; Hull Roskos, Julie J.; Chernoguzov, Alexander
2017-04-25
Devices, systems, and methods for role-based access control permissions are disclosed. One method includes a policy decision point that receives up-to-date security context information from one or more outside sources to determine whether to grant access for a data client to a portion of the system and creates an access vector including the determination; receiving, via a policy agent, a request by the data client for access to the portion of the computing system by the data client, wherein the policy agent checks to ensure there is a session established with communications and user/application enforcement points; receiving, via communications policy enforcement point, the request from the policy agent, wherein the communications policy enforcement point determines whether the data client is an authorized node, based upon the access vector received from the policy decision point; and receiving, via the user/application policy enforcement point, the request from the communications policy enforcement point.
ACOG Committee Opinion Number 542: Access to emergency contraception.
2012-11-01
Emergency contraception includes contraceptive methods used to prevent pregnancy in the first few days after unprotected intercourse, sexual assault, or contraceptive failure. Although the U.S. Food and Drug Administration approved the first dedicated product for emergency contraception in 1998, numerous barriers to access to emergency contraception remain. The purpose of this Committee Opinion is to examine the barriers to the use of oral emergency contraception methods and to highlight the importance of increasing access.
Measuring access to primary care appointments: a review of methods
Jones, Wendy; Elwyn, Glyn; Edwards, Peter; Edwards, Adrian; Emmerson, Melody; Hibbs, Richard
2003-01-01
Background Patient access to primary care appointments is not routinely measured despite the increasing interest in this aspect of practice activity. The generation of standardised data (or benchmarks) for access could inform developments within primary care organisations and act as a quality marker for clinical governance. Logically the setting of targets should be based on a sound system of measurement. The practicalities of developing appropriate measures need debate. Therefore we aimed to search for and compare methods that have been published or are being developed to measure patient access to primary care appointments, with particular focus on finding methods using appointment system data. Method A search and review was made of the primary care literature from 1990 to 2001, which included an assessment of online resources (websites) and communication with recognised experts. The identified methods were assessed. Results The published literature in this specific area was not extensive but revealed emerging interest in the late 1990s. Two broad approaches to the measurement of waiting times to GP appointments were identified. Firstly, appointment systems in primary care organisations were analysed in differing ways to provide numerical data and, secondly, patient perceptions (reports) of access were evaluated using survey techniques. Six different methods were found which were based on appointment systems data. Conclusion The two approaches of either using patient questionnaires or appointment system data are methods that represent entirely different aims. The latter method when used to represent patient waiting times for 'routine' elective appointments seems to hold promise as a useful tool and this avoids the definitional problems that surround 'urgent' appointments. The purpose for which the data is being collected needs to be borne in mind and will determine the chosen methods of data retrieval and representation. PMID:12846934
Mapping Norway - a Method to Register and Survey the Status of Accessibility
NASA Astrophysics Data System (ADS)
Michaelis, Sven; Bögelsack, Kathrin
2018-05-01
The Norwegian mapping authority has developed a standard method for mapping accessibility mostly for people with limited or no walking abilities in urban and recreational areas. We choose an object-orientated approach where points, lines and polygons represents objects in the environment. All data are stored in a geospatial database, so they can be presented as web map and analyzed using GIS software. By the end of 2016 more than 160 municipalities are mapped using that method. The aim of this project is to establish a national standard for mapping and to provide a geodatabase that shows the status of accessibility throughout Norway. The data provide a useful tool for national statistics, local planning authorities and private users. First results show that accessibility is low and Norway still faces many challenges to meet the government's goals for Universal Design.
Extra-corporeal blood access, sensing, and radiation methods and apparatuses
NASA Technical Reports Server (NTRS)
Castle, Kent D. (Inventor)
1993-01-01
The described invention is related to extra-corporeal blood access and radiation methods and apparatuses and, in particular, to subjecting flowing blood to energy in variety of forms, including radiation, electromagnetic force fields or atomic particles. It is directed to methods and apparatuses for accessing flowing blood and for subjecting the blood to electrical conductive, electrostatic or electromagnetic fields or for radiating the blood with some type of radiation, e.g., radio waves, ultrasonic or audio waves, microwaves, IR rays, visible light, UV radiation, x-rays, alpha, beta or gamma rays. An apparatus is employed which includes one or more access ports or windows for radiating blood and/or for sensing/analyzing blood. This invention is useful for killing viruses and bacteria in blood, monitoring blood for medical purposes, genetic modification of blood, and analyzing and/or treating blood components.
Kinds of access: different methods for report reveal different kinds of metacognitive access
Overgaard, Morten; Sandberg, Kristian
2012-01-01
In experimental investigations of consciousness, participants are asked to reflect upon their own experiences by issuing reports about them in different ways. For this reason, a participant needs some access to the content of her own conscious experience in order to report. In such experiments, the reports typically consist of some variety of ratings of confidence or direct descriptions of one's own experiences. Whereas different methods of reporting are typically used interchangeably, recent experiments indicate that different results are obtained with different kinds of reporting. We argue that there is not only a theoretical, but also an empirical difference between different methods of reporting. We hypothesize that differences in the sensitivity of different scales may reveal that different types of access are used to issue direct reports about experiences and metacognitive reports about the classification process. PMID:22492747
Pearson, Amber L
2016-09-20
Most water access studies involve self-reported measures such as time spent or simple spatial measures such as Euclidean distance from home to source. GPS-based measures of access are often considered actual access and have shown little correlation with self-reported measures. One main obstacle to widespread use of GPS-based measurement of access to water has been technological limitations (e.g., battery life). As such, GPS-based measures have been limited by time and in sample size. The aim of this pilot study was to develop and test a novel GPS unit, (≤4-week battery life, waterproof) to measure access to water. The GPS-based method was pilot-tested to estimate number of trips per day, time spent and distance traveled to source for all water collected over a 3-day period in five households in south-western Uganda. This method was then compared to self-reported measures and commonly used spatial measures of access for the same households. Time spent collecting water was significantly overestimated using a self-reported measure, compared to GPS-based (p < 0.05). In contrast, both the GIS Euclidean distances to nearest and actual primary source significantly underestimated distances traveled, compared to the GPS-based measurement of actual travel paths to water source (p < 0.05). Households did not consistently collect water from the source nearest their home. Comparisons between the GPS-based measure and self-reported meters traveled were not made, as respondents did not feel that they could accurately estimate distance. However, there was complete agreement between self-reported primary source and GPS-based. Reliance on cross-sectional self-reported or simple GIS measures leads to misclassification in water access measurement. This new method offers reductions in such errors and may aid in understanding dynamic measures of access to water for health studies.
Global Monitoring of Water Supply and Sanitation: History, Methods and Future Challenges
Bartram, Jamie; Brocklehurst, Clarissa; Fisher, Michael B.; Luyendijk, Rolf; Hossain, Rifat; Wardlaw, Tessa; Gordon, Bruce
2014-01-01
International monitoring of drinking water and sanitation shapes awareness of countries’ needs and informs policy, implementation and research efforts to extend and improve services. The Millennium Development Goals established global targets for drinking water and sanitation access; progress towards these targets, facilitated by international monitoring, has contributed to reducing the global disease burden and increasing quality of life. The experiences of the MDG period generated important lessons about the strengths and limitations of current approaches to defining and monitoring access to drinking water and sanitation. The methods by which the Joint Monitoring Programme (JMP) of WHO and UNICEF tracks access and progress are based on analysis of data from household surveys and linear regression modelling of these results over time. These methods provide nationally-representative and internationally-comparable insights into the drinking water and sanitation facilities used by populations worldwide, but also have substantial limitations: current methods do not address water quality, equity of access, or extra-household services. Improved statistical methods are needed to better model temporal trends. This article describes and critically reviews JMP methods in detail for the first time. It also explores the impact of, and future directions for, international monitoring of drinking water and sanitation. PMID:25116635
Code of Federal Regulations, 2011 CFR
2011-01-01
... storage method. (d) Access to and retrieval of records. The record retention program of an Enterprise shall ensure access to and retrieval of records by the Enterprise and access, upon request, by OFHEO... availability of the records and existing information technology. ...
Code of Federal Regulations, 2010 CFR
2010-01-01
... storage method. (d) Access to and retrieval of records. The record retention program of an Enterprise shall ensure access to and retrieval of records by the Enterprise and access, upon request, by OFHEO... availability of the records and existing information technology. ...
Yoon, Doe Hyun; Muralimanohar, Naveen; Chang, Jichuan; Ranganthan, Parthasarathy
2017-09-26
A disclosed example method involves performing simultaneous data accesses on at least first and second independently selectable logical sub-ranks to access first data via a wide internal data bus in a memory device. The memory device includes a translation buffer chip, memory chips in independently selectable logical sub-ranks, a narrow external data bus to connect the translation buffer chip to a memory controller, and the wide internal data bus between the translation buffer chip and the memory chips. A data access is performed on only the first independently selectable logical sub-rank to access second data via the wide internal data bus. The example method also involves locating a first portion of the first data, a second portion of the first data, and the second data on the narrow external data bus during separate data transfers.
Reed, Elizabeth; Donta, Balaiah; Dasgupta, Anindita; Ghule, Mohan; Battala, Madhusudana; Nair, Saritha; Silverman, Jay; Jadhav, Arun; Palaye, Prajakta; Saggurti, Niranjan; Raj, Anita
2016-06-01
Objectives The social positioning (i.e. social status and autonomy) of women in the household facilitates women's access to and decision-making power related to family planning (FP). Women's access to spending money, which may be an indicator of greater social positioning in the household, may also be greater among women who engage in income generating activities for their families, regardless of women's status in the household. However, in both scenarios, access to money may independently afford greater opportunity to obtain family planning services among women. This study seeks to assess whether access to money is associated with FP outcomes independently of women's social positioning in their households. Methods Using survey data from married couples in rural Maharashtra, India (n = 855), crude and adjusted regression was used to assess women's access to their own spending money in relation to past 3 month use of condoms and other forms of contraceptives (pills, injectables, intrauterine device). Results Access to money (59 %) was associated with condom and other contraceptive use (AORs ranged 1.5-1.8). These findings remained significant after adjusting for women's FP decision-making power in the household and mobility to seek FP services. Conclusion While preliminary, findings suggest that access to money may increase women's ability to obtain FP methods, even in contexts where social norms to support women's power in FP decision-making may not be readily adopted.
Plan characteristics and SSI enrollees' access to and quality of care in four TennCare MCOs.
Hill, Steven C; Wooldridge, Judith
2002-10-01
To assess hypotheses about which managed care organization (MCO) characteristics affect access to care and quality of care--including access to specialists, providers' knowledge about disability, and coordination of care--for people with disabilities. Survey of blind/disabled Supplemental Security Income (SSI) enrollees in four MCOs serving TennCare, Tennessee's Medicaid managed care program, in Memphis, conducted from 1998 through spring 1999. We compared enrollee reports of access and quality across the four MCOs using regression methods, and we use case study methods to assess whether patterns both within and across MCOs are consistent with the hypotheses. We conducted computer-assisted telephone surveys and used regression analysis to compare access and quality controlling for enrollee characteristics. Although the four MCOs' characteristics varied, access to providers, coordination of care, and access to some services were generally similar across MCOs. Enrollees in one plan, the only MCO with a larger provider network and that paid physicians on a fee-for-service basis, reported their providers were more knowledgeable, and they had more secondary preventive care visits. Differences found in access to specialists and delays in approving care appear to be unrelated to characteristics reported by the MCOs, but instead may be related to how tightly utilization is reviewed. Plan networks, financial incentives, utilization management methods, and state requirements are important areas for further study, and, in the meantime, ongoing monitoring of SSI enrollees in each MCO may be important for detecting problems and successes.
Simulating changes to emergency care resources to compare system effectiveness.
Branas, Charles C; Wolff, Catherine S; Williams, Justin; Margolis, Gregg; Carr, Brendan G
2013-08-01
To apply systems optimization methods to simulate and compare the most effective locations for emergency care resources as measured by access to care. This study was an optimization analysis of the locations of trauma centers (TCs), helicopter depots (HDs), and severely injured patients in need of time-critical care in select US states. Access was defined as the percentage of injured patients who could reach a level I/II TC within 45 or 60 minutes. Optimal locations were determined by a search algorithm that considered all candidate sites within a set of existing hospitals and airports in finding the best solutions that maximized access. Across a dozen states, existing access to TCs within 60 minutes ranged from 31.1% to 95.6%, with a mean of 71.5%. Access increased from 0.8% to 35.0% after optimal addition of one or two TCs. Access increased from 1.0% to 15.3% after optimal addition of one or two HDs. Relocation of TCs and HDs (optimal removal followed by optimal addition) produced similar results. Optimal changes to TCs produced greater increases in access to care than optimal changes to HDs although these results varied across states. Systems optimization methods can be used to compare the impacts of different resource configurations and their possible effects on access to care. These methods to determine optimal resource allocation can be applied to many domains, including comparative effectiveness and patient-centered outcomes research. Copyright © 2013 Elsevier Inc. All rights reserved.
Reed, Elizabeth; Donta, Balaiah; Dasgupta, Anindita; Ghule, Mohan; Battala, Madhusudana; Nair, Saritha; Silverman, Jay; Jadhav, Arun; Palaye, Prajakta; Saggurti, Niranjan; Raj, Anita
2016-01-01
Objectives The social positioning (i.e. social status and autonomy) of women in the household facilitates women’s access to and decision-making power related to family planning (FP). Women’s access to spending money, which may be an indicator of greater social positioning in the household, may also be greater among women who engage in income generating activities for their families, regardless of women’s status in the household. However, in both scenarios, access to money may independently afford greater opportunity to obtain family planning services among women. This study seeks to assess whether access to money is associated with FP outcomes independently of women’s social positioning in their households. Methods Using survey data from married couples in rural Maharashtra, India (n=855), crude and adjusted regression was used to assess women’s access to their own spending money in relation to past 3 month use of condoms and other forms of contraceptives (pills, injectables, intrauterine device). Results Access to money (59%) was associated with condom and other contraceptive use (AORs ranged: 1.5 – 1.8). These findings remained significant after adjusting for women’s FP decision-making power in the household and mobility to seek FP services. Conclusion While preliminary, findings suggest that access to money may increase women’s ability to obtain FP methods, even in contexts where social norms to support women’s power in FP decision-making may not be readily adopted. PMID:26971270
Methods and Devices for Micro-Isolation, Extraction, and/or Analysis of Microscale Components
NASA Technical Reports Server (NTRS)
Wade, Lawrence A. (Inventor); Kartalov, Emil P. (Inventor); Taylor, Clive (Inventor); Shibata, Darryl (Inventor)
2014-01-01
Provided herein are devices and methods for the micro-isolation of biological cellular material. A micro-isolation apparatus described can comprise a photomask that protects regions of interest against DNA-destroying illumination. The micro-isolation apparatus can further comprise photosensitive material defining access wells following illumination and subsequent developing of the photosensitive material. The micro-isolation apparatus can further comprise a chambered microfluidic device comprising channels providing access to wells defined in photosensitive material. The micro-isolation apparatus can comprise a chambered microfluidic device without access wells defined in photosensitive material where valves control the flow of gases or liquids through the channels of the microfluidic device. Also included are methods for selectively isolating cellular material using the apparatuses described herein, as are methods for biochemical analysis of individual regions of interest of cellular material using the devices described herein. Further included are methods of making masking arrays useful for the methods described herein.
Mathur, Shawn; Schmidt, Christian; Das, Chhaya; Tucker, Philip W
2006-01-01
Uncensored exchange of scientific results hastens progress. Open Access does not stop at the removal of price and permission barriers; still, censorship and reading disabilities, to name a few, hamper access to information. Here, we invite the scientific community and the public to discuss new methods to distribute, store and manage literature in order to achieve unfettered access to literature. PMID:16956402
Mathur, Shawn; Schmidt, Christian; Das, Chhaya; Tucker, Philip W
2006-09-06
Uncensored exchange of scientific results hastens progress. Open Access does not stop at the removal of price and permission barriers; still, censorship and reading disabilities, to name a few, hamper access to information. Here, we invite the scientific community and the public to discuss new methods to distribute, store and manage literature in order to achieve unfettered access to literature.
Research Investigation of Information Access Methods
ERIC Educational Resources Information Center
Heinrichs, John H.; Sharkey, Thomas W.; Lim, Jeen-Su
2006-01-01
This study investigates the satisfaction of library users at Wayne State University who utilize alternative information access methods. The LibQUAL+[TM] desired and perceived that satisfaction ratings are used to determine the user's "superiority gap." By focusing limited library resources to address "superiority gap" issues identified by each…
Analysis of Airport Access - A Methods Review and Research Program
DOT National Transportation Integrated Search
1971-10-01
The report points up the differences and similarities between airport access travel and general urban trip making. Models and surveys developed for, or applicable, to airport access planning are reviewed. A research proram is proposed which would gen...
Distributed magnetic field positioning system using code division multiple access
NASA Technical Reports Server (NTRS)
Prigge, Eric A. (Inventor)
2003-01-01
An apparatus and methods for a magnetic field positioning system use a fundamentally different, and advantageous, signal structure and multiple access method, known as Code Division Multiple Access (CDMA). This signal architecture, when combined with processing methods, leads to advantages over the existing technologies, especially when applied to a system with a large number of magnetic field generators (beacons). Beacons at known positions generate coded magnetic fields, and a magnetic sensor measures a sum field and decomposes it into component fields to determine the sensor position and orientation. The apparatus and methods can have a large `building-sized` coverage area. The system allows for numerous beacons to be distributed throughout an area at a number of different locations. A method to estimate position and attitude, with no prior knowledge, uses dipole fields produced by these beacons in different locations.
Shah, Tayyab Ikram; Bell, Scott; Wilson, Kathi
2016-01-01
Background Urban environments can influence many aspects of health and well-being and access to health care is one of them. Access to primary health care (PHC) in urban settings is a pressing research and policy issue in Canada. Most research on access to healthcare is focused on national and provincial levels in Canada; there is a need to advance current understanding to local scales such as neighbourhoods. Methods This study examines spatial accessibility to family physicians using the Three-Step Floating Catchment Area (3SFCA) method to identify neighbourhoods with poor geographical access to PHC services and their spatial patterning across 14 Canadian urban settings. An index of spatial access to PHC services, representing an accessibility score (physicians-per-1000 population), was calculated for neighborhoods using a 3km road network distance. Information about primary health care providers (this definition does not include mobile services such as health buses or nurse practitioners or less distributed services such as emergency rooms) used in this research was gathered from publicly available and routinely updated sources (i.e. provincial colleges of physicians and surgeons). An integrated geocoding approach was used to establish PHC locations. Results The results found that the three methods, Simple Ratio, Neighbourhood Simple Ratio, and 3SFCA that produce City level access scores are positively correlated with each other. Comparative analyses were performed both within and across urban settings to examine disparities in distributions of PHC services. It is found that neighbourhoods with poor accessibility scores in the main urban settings across Canada have further disadvantages in relation to population high health care needs. Conclusions The results of this study show substantial variations in geographical accessibility to PHC services both within and among urban areas. This research enhances our understanding of spatial accessibility to health care services at the neighbourhood level. In particular, the results show that the low access neighbourhoods tend to be clustered in the neighbourhoods at the urban periphery and immediately surrounding the downtown area. PMID:27997577
A Method for Selection of Appropriate Assistive Technology for Computer Access
ERIC Educational Resources Information Center
Jenko, Mojca
2010-01-01
Assistive technologies (ATs) for computer access enable people with disabilities to be included in the information society. Current methods for assessment and selection of the most appropriate AT for each individual are nonstandardized, lengthy, subjective, and require substantial clinical experience of a multidisciplinary team. This manuscript…
Creating a Shared Formulary in 7 Critical Access Hospitals
ERIC Educational Resources Information Center
Wakefield, Douglas S.; Ward, Marcia M.; Loes, Jean L.; O'Brien, John; Abbas, Nancy
2010-01-01
Purpose: This paper reports a case study of 7 Critical Access Hospitals' (CAH) and 1 rural referral hospital's successful collaboration to develop a shared formulary. Methods: Study methods included document reviews, interviews with key informants, and use of descriptive statistics. Findings: Through a systematic review and decision process, CAH…
Characteristics of Completed Suicides: Implications of Differences among Methods.
ERIC Educational Resources Information Center
Fischer, Ellen P.; And Others
1993-01-01
Compared characteristics of suicides by jumping to those of suicides by hanging, ingestion, or shooting. Method used was significantly associated with sociodemographics, occupation, and mental health status, even after adjustment for individual access to suicide means. Findings provide evidence for hypothesis that controlling access to agent of…
Mof-Tree: A Spatial Access Method To Manipulate Multiple Overlapping Features.
ERIC Educational Resources Information Center
Manolopoulos, Yannis; Nardelli, Enrico; Papadopoulos, Apostolos; Proietti, Guido
1997-01-01
Investigates the manipulation of large sets of two-dimensional data representing multiple overlapping features, and presents a new access method, the MOF-tree. Analyzes storage requirements and time with respect to window query operations involving multiple features. Examines both the pointer-based and pointerless MOF-tree representations.…
Techtalk: Telecommunications for Improving Developmental Education.
ERIC Educational Resources Information Center
Caverly, David C.; Broderick, Bill
1993-01-01
Explains how to access the Internet, discussing hardware and software considerations, connectivity, and types of access available to users. Describes the uses of electronic mail; TELNET, a method for remotely logging onto another computer; and anonymous File Transfer Protocol (FTP), a method for downloading files from a remote computer. (MAB)
ERIC Educational Resources Information Center
Grandbois, Jennifer; Beheshti, Jamshid
2014-01-01
Introduction: This study aims to gain a greater understanding of the development of open access practices amongst library and information science authors, since their role is integral to the success of the broader open access movement. Method: Data were collected from scholarly articles about open access by library and information science authors…
FTTH: the overview of existing technologies
NASA Astrophysics Data System (ADS)
Nowak, Dawid; Murphy, John
2005-06-01
The growing popularity of the Internet is the key driver behind the development of new access methods which would enable a customer to experience a true broadband. Amongst various technologies, the access methods based on the optical fiber are getting more and more attention as they offer the ultimate solution in delivering different services to the customers' premises. Three different architectures have been proposed that facilitate the roll out of Fiber-to-the-Home (FTTH) infrastructure. Point-to-point Ethernet networks are the most straightforward and already matured solution. Different flavors of Passive Optical Networks (PONs) with Time Division Multiplexing Access (TDMA) are getting more widespread as necessary equipment is becoming available on the market. The third main contender are PONs withWavelength DivisionMultiplexing Access (WDMA). Although still in their infancy, the laboratory tests show that they have many advantages over present solutions. In this paper we show a brief comparison of these three access methods. In our analysis the architecture of each solution is presented. The applicability of each system is looked at from different viewpoint and their advantages and disadvantages are highlighted.
Enhancing healthcare accessibility measurements using GIS: A case study in Seoul, Korea
Kim, Yeeun; Byon, Young-Ji
2018-01-01
With recent aging demographic trends, the needs for enhancing geo-spatial analysis capabilities and monitoring the status of accessibilities of its citizens with healthcare services have increased. The accessibility to healthcare is determined not only by geographic distances to service locations, but also includes travel time, available modes of transportation, and departure time. Having access to the latest and accurate information regarding the healthcare accessibility allows the municipal government to plan for improvements, including expansion of healthcare infrastructure, effective labor distribution, alternative healthcare options for the regions with low accessibilities, and redesigning the public transportation routes and schedules. This paper proposes a new method named, Seoul Enhanced 2-Step Floating Catchment Area (SE2SFCA), which is customized for the city of Seoul, where population density is higher and the average distance between healthcare-service locations tends to be shorter than the typical North American or European cities. The proposed method of SE2SFCA is found to be realistic and effective in determining the weak accessibility regions. It resolves the over-estimation issues of the past, arising from the assignment of high healthcare accessibility for the regions with large hospitals and high density of population and hospitals. PMID:29462194
Enhancing healthcare accessibility measurements using GIS: A case study in Seoul, Korea.
Kim, Yeeun; Byon, Young-Ji; Yeo, Hwasoo
2018-01-01
With recent aging demographic trends, the needs for enhancing geo-spatial analysis capabilities and monitoring the status of accessibilities of its citizens with healthcare services have increased. The accessibility to healthcare is determined not only by geographic distances to service locations, but also includes travel time, available modes of transportation, and departure time. Having access to the latest and accurate information regarding the healthcare accessibility allows the municipal government to plan for improvements, including expansion of healthcare infrastructure, effective labor distribution, alternative healthcare options for the regions with low accessibilities, and redesigning the public transportation routes and schedules. This paper proposes a new method named, Seoul Enhanced 2-Step Floating Catchment Area (SE2SFCA), which is customized for the city of Seoul, where population density is higher and the average distance between healthcare-service locations tends to be shorter than the typical North American or European cities. The proposed method of SE2SFCA is found to be realistic and effective in determining the weak accessibility regions. It resolves the over-estimation issues of the past, arising from the assignment of high healthcare accessibility for the regions with large hospitals and high density of population and hospitals.
Formalization of the Access Control on ARM-Android Platform with the B Method
NASA Astrophysics Data System (ADS)
Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing
2018-01-01
ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.
2013-01-01
Introduction There is a great health services disparity between urban and rural areas in China. The percentage of people who are unable to access health services due to long travel times increases. This paper takes Donghai County as the study unit to analyse areas with physician shortages and characteristics of the potential spatial accessibility of health services. We analyse how the unequal health services resources distribution and the New Cooperative Medical Scheme affect the potential spatial accessibility of health services in Donghai County. We also give some advice on how to alleviate the unequal spatial accessibility of health services in areas that are more remote and isolated. Methods The shortest traffic times of from hospitals to villages are calculated with an O-D matrix of GIS extension model. This paper applies an enhanced two-step floating catchment area (E2SFCA) method to study the spatial accessibility of health services and to determine areas with physician shortages in Donghai County. The sensitivity of the E2SFCA for assessing variation in the spatial accessibility of health services is checked using different impedance coefficient valuesa. Geostatistical Analyst model and spatial analyst method is used to analyse the spatial pattern and the edge effect of potential spatial accessibility of health services. Results The results show that 69% of villages have access to lower potential spatial accessibility of health services than the average for Donghai County, and 79% of the village scores are lower than the average for Jiangsu Province. The potential spatial accessibility of health services diminishes greatly from the centre of the county to outlying areas. Using a smaller impedance coefficient leads to greater disparity among the villages. The spatial accessibility of health services is greater along highway in the county. Conclusions Most of villages are in underserved health services areas. An unequal distribution of health service resources and the reimbursement policies of the New Cooperative Medical Scheme have led to an edge effect regarding spatial accessibility of health services in Donghai County, whereby people living on the edge of the county have less access to health services. Comprehensive measures should be considered to alleviate the unequal spatial accessibility of health services in areas that are more remote and isolated. PMID:23688278
Barg, Alexej; Saltzman, Charles L; Beals, Timothy C; Bachus, Kent N; Blankenhorn, Brad D; Nickisch, Florian
2016-07-01
To evaluate the accessibility of the talar dome through anterior and posterior portals for ankle arthroscopy with the standard noninvasive distraction versus wire-based longitudinal distraction using a tensioned wire placed transversely through the calcaneal tuberosity. Seven matched pairs of thigh-to-foot specimens underwent ankle arthroscopy with 1 of 2 methods of distraction: a standard noninvasive strapping technique or a calcaneal tuberosity wire-based technique. The order of the arthroscopic approach and use of a distraction method was randomly determined. The areas accessed from both 2-portal anterior and 2-portal posterior approaches were determined by using a molded translucent grid. The mean talar surface accessible by anterior ankle arthroscopy was comparable with noninvasive versus calcaneal wire distraction with 57.8% ± 17.2% (range, 32.9% to 75.7%) versus 61.5% ± 15.2% (range, 38.5% to 79.1%) of the talar dome, respectively (P = .590). The use of calcaneal wire distraction significantly improved posterior talar dome accessibility compared with noninvasive distraction, with 56.4% ± 20.0% (range, 14.4% to 78.0%) versus 39.8% ± 14.9% (range, 20.0% to 57.6%) of the talar dome, respectively (P = .031). Under the conditions studied, our cadaveric model showed equivalent talar dome access with 2-portal anterior arthroscopy of calcaneal wire-based distraction versus noninvasive strap distraction, but improved access for 2-portal posterior arthroscopy with calcaneal wire-based distraction versus noninvasive strap distraction. The posterior 40% of the talar dome is difficult to access via anterior ankle arthroscopy. Posterior calcaneal tuberosity wire-based longitudinal distraction improved arthroscopic access to the centro-posterior talar dome with a posterior arthroscopic approach. Published by Elsevier Inc.
Yang, Yuedong; Li, Xiaomei; Zhao, Huiying; Zhan, Jian; Wang, Jihua; Zhou, Yaoqi
2017-01-01
As most RNA structures are elusive to structure determination, obtaining solvent accessible surface areas (ASAs) of nucleotides in an RNA structure is an important first step to characterize potential functional sites and core structural regions. Here, we developed RNAsnap, the first machine-learning method trained on protein-bound RNA structures for solvent accessibility prediction. Built on sequence profiles from multiple sequence alignment (RNAsnap-prof), the method provided robust prediction in fivefold cross-validation and an independent test (Pearson correlation coefficients, r, between predicted and actual ASA values are 0.66 and 0.63, respectively). Application of the method to 6178 mRNAs revealed its positive correlation to mRNA accessibility by dimethyl sulphate (DMS) experimentally measured in vivo (r = 0.37) but not in vitro (r = 0.07), despite the lack of training on mRNAs and the fact that DMS accessibility is only an approximation to solvent accessibility. We further found strong association across coding and noncoding regions between predicted solvent accessibility of the mutation site of a single nucleotide variant (SNV) and the frequency of that variant in the population for 2.2 million SNVs obtained in the 1000 Genomes Project. Moreover, mapping solvent accessibility of RNAs to the human genome indicated that introns, 5' cap of 5' and 3' cap of 3' untranslated regions, are more solvent accessible, consistent with their respective functional roles. These results support conformational selections as the mechanism for the formation of RNA-protein complexes and highlight the utility of genome-scale characterization of RNA tertiary structures by RNAsnap. The server and its stand-alone downloadable version are available at http://sparks-lab.org. © 2016 Yang et al.; Published by Cold Spring Harbor Laboratory Press for the RNA Society.
Ma, Jianzhu; Wang, Sheng
2015-01-01
Motivation. The solvent accessibility of protein residues is one of the driving forces of protein folding, while the contact number of protein residues limits the possibilities of protein conformations. The de novo prediction of these properties from protein sequence is important for the study of protein structure and function. Although these two properties are certainly related with each other, it is challenging to exploit this dependency for the prediction. Method. We present a method AcconPred for predicting solvent accessibility and contact number simultaneously, which is based on a shared weight multitask learning framework under the CNF (conditional neural fields) model. The multitask learning framework on a collection of related tasks provides more accurate prediction than the framework trained only on a single task. The CNF method not only models the complex relationship between the input features and the predicted labels, but also exploits the interdependency among adjacent labels. Results. Trained on 5729 monomeric soluble globular protein datasets, AcconPred could reach 0.68 three-state accuracy for solvent accessibility and 0.75 correlation for contact number. Tested on the 105 CASP11 domain datasets for solvent accessibility, AcconPred could reach 0.64 accuracy, which outperforms existing methods. PMID:26339631
76 FR 66089 - Access Authorization Program for Nuclear Power Plants
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-25
... NUCLEAR REGULATORY COMMISSION [NRC-2011-0245] Access Authorization Program for Nuclear Power... Program for Nuclear Power Plants.'' This guide describes a method that NRC staff considers acceptable to... Regulations (10 CFR), section 73.56, ``Personnel Access Authorization Requirements for Nuclear Power Plants...
True or false: do 5-year-olds understand belief?
Fabricius, William V; Boyer, Ty W; Weimer, Amy A; Carroll, Kathleen
2010-11-01
In 3 studies (N = 188) we tested the hypothesis that children use a perceptual access approach to reason about mental states before they understand beliefs. The perceptual access hypothesis predicts a U-shaped developmental pattern of performance in true belief tasks, in which 3-year-olds who reason about reality should succeed, 4- to 5-year-olds who use perceptual access reasoning should fail, and older children who use belief reasoning should succeed. The results of Study 1 revealed the predicted pattern in 2 different true belief tasks. The results of Study 2 disconfirmed several alternate explanations based on possible pragmatic and inhibitory demands of the true belief tasks. In Study 3, we compared 2 methods of classifying individuals according to which 1 of the 3 reasoning strategies (reality reasoning, perceptual access reasoning, belief reasoning) they used. The 2 methods gave converging results. Both methods indicated that the majority of children used the same approach across tasks and that it was not until after 6 years of age that most children reasoned about beliefs. We conclude that because most prior studies have failed to detect young children's use of perceptual access reasoning, they have overestimated their understanding of false beliefs. We outline several theoretical implications that follow from the perceptual access hypothesis.
Deng, Lei; Fan, Chao; Zeng, Zhiwen
2017-12-28
Direct prediction of the three-dimensional (3D) structures of proteins from one-dimensional (1D) sequences is a challenging problem. Significant structural characteristics such as solvent accessibility and contact number are essential for deriving restrains in modeling protein folding and protein 3D structure. Thus, accurately predicting these features is a critical step for 3D protein structure building. In this study, we present DeepSacon, a computational method that can effectively predict protein solvent accessibility and contact number by using a deep neural network, which is built based on stacked autoencoder and a dropout method. The results demonstrate that our proposed DeepSacon achieves a significant improvement in the prediction quality compared with the state-of-the-art methods. We obtain 0.70 three-state accuracy for solvent accessibility, 0.33 15-state accuracy and 0.74 Pearson Correlation Coefficient (PCC) for the contact number on the 5729 monomeric soluble globular protein dataset. We also evaluate the performance on the CASP11 benchmark dataset, DeepSacon achieves 0.68 three-state accuracy and 0.69 PCC for solvent accessibility and contact number, respectively. We have shown that DeepSacon can reliably predict solvent accessibility and contact number with stacked sparse autoencoder and a dropout approach.
A novel method for intraoral access to the superior head of the human lateral pterygoid muscle.
Oliveira, Aleli Tôrres; Camilo, Anderson Aparecido; Bahia, Paulo Roberto Valle; Carvalho, Antonio Carlos Pires; DosSantos, Marcos Fabio; da Silva, Jorge Vicente Lopes; Monteiro, André Antonio
2014-01-01
The uncoordinated activity of the superior and inferior parts of the lateral pterygoid muscle (LPM) has been suggested to be one of the causes of temporomandibular joint (TMJ) disc displacement. A therapy for this muscle disorder is the injection of botulinum toxin (BTX), of the LPM. However, there is a potential risk of side effects with the injection guide methods currently available. In addition, they do not permit appropriate differentiation between the two bellies of the muscle. Herein, a novel method is presented to provide intraoral access to the superior head of the human LPM with maximal control and minimal hazards. Computational tomography along with digital imaging software programs and rapid prototyping techniques were used to create a rapid prototyped guide to orient BTX injections in the superior LPM. The method proved to be feasible and reliable. Furthermore, when tested in one volunteer it allowed precise access to the upper head of LPM, without producing side effects. The prototyped guide presented in this paper is a novel tool that provides intraoral access to the superior head of the LPM. Further studies will be necessary to test the efficacy and validate this method in a larger cohort of subjects.
Detecting Inappropriate Access to Electronic Health Records Using Collaborative Filtering.
Menon, Aditya Krishna; Jiang, Xiaoqian; Kim, Jihoon; Vaidya, Jaideep; Ohno-Machado, Lucila
2014-04-01
Many healthcare facilities enforce security on their electronic health records (EHRs) through a corrective mechanism: some staff nominally have almost unrestricted access to the records, but there is a strict ex post facto audit process for inappropriate accesses, i.e., accesses that violate the facility's security and privacy policies. This process is inefficient, as each suspicious access has to be reviewed by a security expert, and is purely retrospective, as it occurs after damage may have been incurred. This motivates automated approaches based on machine learning using historical data. Previous attempts at such a system have successfully applied supervised learning models to this end, such as SVMs and logistic regression. While providing benefits over manual auditing, these approaches ignore the identity of the users and patients involved in a record access. Therefore, they cannot exploit the fact that a patient whose record was previously involved in a violation has an increased risk of being involved in a future violation. Motivated by this, in this paper, we propose a collaborative filtering inspired approach to predicting inappropriate accesses. Our solution integrates both explicit and latent features for staff and patients, the latter acting as a personalized "finger-print" based on historical access patterns. The proposed method, when applied to real EHR access data from two tertiary hospitals and a file-access dataset from Amazon, shows not only significantly improved performance compared to existing methods, but also provides insights as to what indicates an inappropriate access.
Detecting Inappropriate Access to Electronic Health Records Using Collaborative Filtering
Menon, Aditya Krishna; Jiang, Xiaoqian; Kim, Jihoon; Vaidya, Jaideep; Ohno-Machado, Lucila
2013-01-01
Many healthcare facilities enforce security on their electronic health records (EHRs) through a corrective mechanism: some staff nominally have almost unrestricted access to the records, but there is a strict ex post facto audit process for inappropriate accesses, i.e., accesses that violate the facility’s security and privacy policies. This process is inefficient, as each suspicious access has to be reviewed by a security expert, and is purely retrospective, as it occurs after damage may have been incurred. This motivates automated approaches based on machine learning using historical data. Previous attempts at such a system have successfully applied supervised learning models to this end, such as SVMs and logistic regression. While providing benefits over manual auditing, these approaches ignore the identity of the users and patients involved in a record access. Therefore, they cannot exploit the fact that a patient whose record was previously involved in a violation has an increased risk of being involved in a future violation. Motivated by this, in this paper, we propose a collaborative filtering inspired approach to predicting inappropriate accesses. Our solution integrates both explicit and latent features for staff and patients, the latter acting as a personalized “finger-print” based on historical access patterns. The proposed method, when applied to real EHR access data from two tertiary hospitals and a file-access dataset from Amazon, shows not only significantly improved performance compared to existing methods, but also provides insights as to what indicates an inappropriate access. PMID:24683293
NASA Technical Reports Server (NTRS)
Gibbs, Michael J. (Inventor); Adams, Michael B. (Inventor); Chase, Karl L. (Inventor); Van Omen, Debi (Inventor); Lewis, Daniel E. (Inventor); McCrobie, Daniel E. (Inventor)
2003-01-01
A method and system for displaying a flight plan such that an entire flight plan is viewable through the use of scrolling devices is disclosed. The flight plan display may also include a method and system for collapsing and expanding a flight plan display, have provisions for the conspicuous marking of changes to a flight plan, the use of tabs to switch between various displays of data, and access to a navigation database that allows a user to view information about various navigational aids. The database may also the access to the information about the navigational aids to be prioritized based on proximity to the current position of the aircraft.
NASA Astrophysics Data System (ADS)
Lu, Meilian; Yang, Dong; Zhou, Xing
2013-03-01
Based on the analysis of the requirements of conversation history storage in CPM (Converged IP Messaging) system, a Multi-views storage model and access methods of conversation history are proposed. The storage model separates logical views from physical storage and divides the storage into system managed region and user managed region. It simultaneously supports conversation view, system pre-defined view and user-defined view of storage. The rationality and feasibility of multi-view presentation, the physical storage model and access methods are validated through the implemented prototype. It proves that, this proposal has good scalability, which will help to optimize the physical data storage structure and improve storage performance.
A Novel Method for Intraoral Access to the Superior Head of the Human Lateral Pterygoid Muscle
Oliveira, Aleli Tôrres; Camilo, Anderson Aparecido; Bahia, Paulo Roberto Valle; Carvalho, Antonio Carlos Pires; DosSantos, Marcos Fabio; da Silva, Jorge Vicente Lopes; Monteiro, André Antonio
2014-01-01
Background. The uncoordinated activity of the superior and inferior parts of the lateral pterygoid muscle (LPM) has been suggested to be one of the causes of temporomandibular joint (TMJ) disc displacement. A therapy for this muscle disorder is the injection of botulinum toxin (BTX), of the LPM. However, there is a potential risk of side effects with the injection guide methods currently available. In addition, they do not permit appropriate differentiation between the two bellies of the muscle. Herein, a novel method is presented to provide intraoral access to the superior head of the human LPM with maximal control and minimal hazards. Methods. Computational tomography along with digital imaging software programs and rapid prototyping techniques were used to create a rapid prototyped guide to orient BTX injections in the superior LPM. Results. The method proved to be feasible and reliable. Furthermore, when tested in one volunteer it allowed precise access to the upper head of LPM, without producing side effects. Conclusions. The prototyped guide presented in this paper is a novel tool that provides intraoral access to the superior head of the LPM. Further studies will be necessary to test the efficacy and validate this method in a larger cohort of subjects. PMID:24963484
Doherty, Kyle; Butterfield, Bradley J.; Wood, Troy E.
2017-01-01
Land management agencies are increasing the use of native plant materials for vegetation treatments to restore ecosystem function and maintain natural ecological integrity. This shift toward the use of natives has highlighted a need to increase the diversity of materials available. A key problem is agreeing on how many, and which, new accessions should be developed. Here we describe new methods that address this problem. Our methods use climate data to calculate a climate similarity index between two points in a defined extent. This index can be used to predict relative performance of available accessions at a target site. In addition, the index can be used in combination with standard cluster analysis algorithms to quantify and maximize climate coverage (mean climate similarity), given a modeled range extent and a specified number of accessions. We demonstrate the utility of this latter feature by applying it to the extents of 11 western North American species with proven or potential use in restoration. First, a species-specific seed transfer map can be readily generated for a species by predicting performance for accessions currently available; this map can be readily updated to accommodate new accessions. Next, the increase in climate coverage achieved by adding successive accessions can be explored, yielding information that managers can use to balance ecological and economic considerations in determining how many accessions to develop. This approach identifies sampling sites, referred to as climate centers, which contribute unique, complementary, climate coverage to accessions on hand, thus providing explicit sampling guidance for both germplasm preservation and research. We examine how these and other features of our approach add to existing methods used to guide plant materials development and use. Finally, we discuss how these new methods provide a framework that could be used to coordinate native plant materials development, evaluation, and use across agencies, regions, and research groups.
Noonan, Vanessa K; Townson, Andrea F; Higgins, Caroline E; Rogers, Jess; Wolfe, Dalton L
2014-01-01
Background It is not known whether ongoing access to a broad-based Internet knowledge resource can influence the practice of health care providers. We undertook a study to evaluate the impact of a Web-based knowledge resource on increasing access to evidence and facilitating best practice of health care providers. Objective The objective of this study was to evaluate (1) the impact of the Spinal Cord Injury Rehabilitation Evidence (SCIRE) project on access to information for health care providers and researchers and (2) how SCIRE influenced health care providers' management of clients. Methods A 4-part mixed methods evaluation was undertaken: (1) monitoring website traffic and utilization using Google Analytics, (2) online survey of users who accessed the SCIRE website, (3) online survey of targeted end-users, that is, rehabilitation health care providers known to work with spinal cord injury (SCI) clients, as well as researchers, and (4) focus groups with health care providers who had previously accessed SCIRE. Results The online format allowed the content for a relatively specialized field to have far reach (eg, 26 countries and over 6500 users per month). The website survey and targeted end-user survey confirmed that health care providers, as well as researchers perceived that the website increased their access to SCI evidence. Access to SCIRE not only improved knowledge of SCI evidence but helped inform changes to the health providers’ clinical practice and improved their confidence in treating SCI clients. The SCIRE information directly influenced the health providers’ clinical decision making, in terms of choice of intervention, equipment needs, or assessment tool. Conclusions A Web-based knowledge resource may be a relatively inexpensive method to increase access to evidence-based information, increase knowledge of the evidence, inform changes to the health providers’ practice, and influence their clinical decision making. PMID:25537167
Accessing remote data bases using microcomputers
Saul, Peter D.
1985-01-01
General practitioners' access to remote data bases using microcomputers is increasing, making even the most obscure information readily available. Some of the systems available to general practitioners in the UK are described and the methods of access are outlined. General practitioners should be aware of the advances in technology; data bases are increasing in size, the cost of access is falling and their use is becoming easier. PMID:4020756
ERIC Educational Resources Information Center
de Jonge, J. F. M.; And Others
This report examines, country by country, the present state of student access to higher education institutions in the Member States of the European Community (EC), as well as the elements which affect access directly and the elements which can potentially have an effect on access. Volume 1 of the report gives an overview of the methods of data…
Teens' Survey of Stores in the District of Columbia on Accessibility of Family Planning Methods.
ERIC Educational Resources Information Center
Center for Population Options, Washington, DC.
Access to and availability of contraceptive methods in stores play an important role in the prevention of AIDS, unwanted pregnancies, and other sexually transmitted diseases. Although teens are generally knowledgable about birth control, many encounter barriers when attempting to obtain contraceptive. Forty-five drug stores and 15 convenience…
Development of Integrated Public Administration Custom Services in Hungary.
Laki, Tamas
2015-01-01
The paper is a case-study introducing a national project in Hungary establishing a countrywide public administration customer service system where accessibility was a key issue. Starting from the concept the paper describes the methods and organisational background how accessible design was integrated in the planning method and gives a feedback of site experiences.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-03
... Docket ID 2012-0078. You may submit comments by the following methods: Federal Rulemaking Web site: Go to.... SUPPLEMENTARY INFORMATION: I. Accessing Information and Submitting Comments A. Accessing Information Please... publicly available, by the following methods: Federal Rulemaking Web Site: Go to http://www.regulations.gov...
The Method behind the Madness: Acquiring Online Journals and a Solution to Provide Access
ERIC Educational Resources Information Center
Skekel, Donna
2005-01-01
Libraries are seeking the best possible solution for integrating online journals into their collections. While exploring the different methods and technology available, many libraries still strive to fulfill the original "library mission" proposed by Charles Cutter in his "Rules for a Dictionary Catalog". Providing comprehensive access to…
14 CFR § 1251.301 - Existing facilities.
Code of Federal Regulations, 2014 CFR
2014-01-01
... OF HANDICAP Accessibility § 1251.301 Existing facilities. (a) Accessibility. A recipient shall... entirety it is readily accessible to handicapped persons. This paragraph does not require a recipient to... handicapped persons. (b) Methods. A recipient may comply with the requirement of paragraph (a) of this section...
5 CFR 297.202 - Methods of access.
Code of Federal Regulations, 2010 CFR
2010-01-01
....202 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PRIVACY... access to records, when such access has been granted by the Office or agency, are: (1) Inspection in person in the designated office during the hours specified by the Office or agency; or (2) Transfer of...
Jia, Yunjian; Zhou, Zhenyu; Chen, Fei; Duan, Peng; Guo, Zhen; Mumtaz, Shahid
2017-01-13
Tracking people's behaviors is a main category of cyber physical social sensing (CPSS)-related people-centric applications. Most tracking methods utilize camera networks or sensors built into mobile devices such as global positioning system (GPS) and Bluetooth. In this article, we propose a non-intrusive wireless fidelity (Wi-Fi)-based tracking method. To show the feasibility, we target tracking people's access behaviors in Wi-Fi networks, which has drawn a lot of interest from the academy and industry recently. Existing methods used for acquiring access traces either provide very limited visibility into media access control (MAC)-level transmission dynamics or sometimes are inflexible and costly. In this article, we present a passive CPSS system operating in a non-intrusive, flexible, and simplified manner to overcome above limitations. We have implemented the prototype on the off-the-shelf personal computer, and performed real-world deployment experiments. The experimental results show that the method is feasible, and people's access behaviors can be correctly tracked within a one-second delay.
Jia, Yunjian; Zhou, Zhenyu; Chen, Fei; Duan, Peng; Guo, Zhen; Mumtaz, Shahid
2017-01-01
Tracking people’s behaviors is a main category of cyber physical social sensing (CPSS)-related people-centric applications. Most tracking methods utilize camera networks or sensors built into mobile devices such as global positioning system (GPS) and Bluetooth. In this article, we propose a non-intrusive wireless fidelity (Wi-Fi)-based tracking method. To show the feasibility, we target tracking people’s access behaviors in Wi-Fi networks, which has drawn a lot of interest from the academy and industry recently. Existing methods used for acquiring access traces either provide very limited visibility into media access control (MAC)-level transmission dynamics or sometimes are inflexible and costly. In this article, we present a passive CPSS system operating in a non-intrusive, flexible, and simplified manner to overcome above limitations. We have implemented the prototype on the off-the-shelf personal computer, and performed real-world deployment experiments. The experimental results show that the method is feasible, and people’s access behaviors can be correctly tracked within a one-second delay. PMID:28098772
Apparatuses for interaction with a subterranean formation, and methods of use thereof
Clark, Don T.; Jones, Richard L.; Turner, Terry D.; Hubbell, Joel M.; Sisson, James B.
2007-12-25
An access casing assembly structured for placement at least partially within a subterranean formation by forcing the access casing assembly thereinto, comprising a plurality of casing sections operably coupled to form a central elongated cavity for providing access to the subterranean region is disclosed. Further, a tip portion of the access casing assembly may include a porous filter through which liquid or gas may communicate with the central elongated cavity. Also, a receiving member or at least one engagement hub may form a portion of the central elongated cavity and may include an engagement feature configured for selectively and lockingly engaging a locking structure of a device to be positioned within the access casing assembly. Methods of use are disclosed. A tensiometer is disclosed including a chamber structured for allowing at least partially filling with a fluid subsequent to contact therewith.
NASA Technical Reports Server (NTRS)
Lin, Wuyin; Liu, Yangang; Vogelmann, Andrew M.; Fridlind, Ann; Endo, Satoshi; Song, Hua; Feng, Sha; Toto, Tami; Li, Zhijin; Zhang, Minghua
2015-01-01
Climatically important low-level clouds are commonly misrepresented in climate models. The FAst-physics System TEstbed and Research (FASTER) Project has constructed case studies from the Atmospheric Radiation Measurement Climate Research Facility's Southern Great Plain site during the RACORO aircraft campaign to facilitate research on model representation of boundary-layer clouds. This paper focuses on using the single-column Community Atmosphere Model version 5 (SCAM5) simulations of a multi-day continental shallow cumulus case to identify specific parameterization causes of low-cloud biases. Consistent model biases among the simulations driven by a set of alternative forcings suggest that uncertainty in the forcing plays only a relatively minor role. In-depth analysis reveals that the model's shallow cumulus convection scheme tends to significantly under-produce clouds during the times when shallow cumuli exist in the observations, while the deep convective and stratiform cloud schemes significantly over-produce low-level clouds throughout the day. The links between model biases and the underlying assumptions of the shallow cumulus scheme are further diagnosed with the aid of large-eddy simulations and aircraft measurements, and by suppressing the triggering of the deep convection scheme. It is found that the weak boundary layer turbulence simulated is directly responsible for the weak cumulus activity and the simulated boundary layer stratiform clouds. Increased vertical and temporal resolutions are shown to lead to stronger boundary layer turbulence and reduction of low-cloud biases.
Is multi-level marketing of nutrition supplements a legal and an ethical practice?
Cardenas, Diana; Fuchs-Tarlovsky, Vanessa
2018-06-01
Multi-level marketing (MLM) of nutrition products has experienced dramatic growth in recent decades. 'Wellness' is the second most popular niche in the MLM industry and represents 35% of sales among all the products in 2016. This category includes dietary supplements, weight management and sports nutrition products. The aim of this paper is to analyse whether this practice is legal and ethical. An analysis of available documentary information about the legal aspects of Multi-level marketing business was performed. Ethical reflexion was based on the "principlism" approach. We argue that, while being a controversial business model, MLM is not fraudulent from a legal point of view. However, it is an unethical strategy obviating all the principles of beneficence, nonmaleficence and autonomy. What is at stake is the possible economic scam and the potential harm those products could cause due to unproven efficacy, exceeding daily nutrient requirements and potential toxicity. The sale of dietary and nutrition supplements products by physicians and dieticians presents a conflict of interests that can undermine the primary obligation of physicians to serve the interests of their patients before their own. While considering that MLM of dietary supplements and other nutrition products are a legal business strategy, we affirm that it is an unethical practice. MLM products that have nutritional value or promoted as remedies may be unnecessary and intended for conditions that are unsuitable for self-prescription as well. Copyright © 2018 European Society for Clinical Nutrition and Metabolism. Published by Elsevier Ltd. All rights reserved.
Lin, Wuyin; Liu, Yangang; Vogelmann, Andrew M.; ...
2015-06-19
Climatically important low-level clouds are commonly misrepresented in climate models. The FAst-physics System TEstbed and Research (FASTER) project has constructed case studies from the Atmospheric Radiation Measurement (ARM) Climate Research Facility's Southern Great Plain site during the RACORO aircraft campaign to facilitate research on model representation of boundary-layer clouds. This paper focuses on using the single-column Community Atmosphere Model version 5 (SCAM5) simulations of a multi-day continental shallow cumulus case to identify specific parameterization causes of low-cloud biases. Consistent model biases among the simulations driven by a set of alternative forcings suggest that uncertainty in the forcing plays only amore » relatively minor role. In-depth analysis reveals that the model's shallow cumulus convection scheme tends to significantly under-produce clouds during the times when shallow cumuli exist in the observations, while the deep convective and stratiform cloud schemes significantly over-produce low-level clouds throughout the day. The links between model biases and the underlying assumptions of the shallow cumulus scheme are further diagnosed with the aid of large-eddy simulations and aircraft measurements, and by suppressing the triggering of the deep convection scheme. It is found that the weak boundary layer turbulence simulated is directly responsible for the weak cumulus activity and the simulated boundary layer stratiform clouds. Increased vertical and temporal resolutions are shown to lead to stronger boundary layer turbulence and reduction of low-cloud biases.« less
Modelling galaxy clustering: halo occupation distribution versus subhalo matching.
Guo, Hong; Zheng, Zheng; Behroozi, Peter S; Zehavi, Idit; Chuang, Chia-Hsun; Comparat, Johan; Favole, Ginevra; Gottloeber, Stefan; Klypin, Anatoly; Prada, Francisco; Rodríguez-Torres, Sergio A; Weinberg, David H; Yepes, Gustavo
2016-07-01
We model the luminosity-dependent projected and redshift-space two-point correlation functions (2PCFs) of the Sloan Digital Sky Survey (SDSS) Data Release 7 Main galaxy sample, using the halo occupation distribution (HOD) model and the subhalo abundance matching (SHAM) model and its extension. All the models are built on the same high-resolution N -body simulations. We find that the HOD model generally provides the best performance in reproducing the clustering measurements in both projected and redshift spaces. The SHAM model with the same halo-galaxy relation for central and satellite galaxies (or distinct haloes and subhaloes), when including scatters, has a best-fitting χ 2 /dof around 2-3. We therefore extend the SHAM model to the subhalo clustering and abundance matching (SCAM) by allowing the central and satellite galaxies to have different galaxy-halo relations. We infer the corresponding halo/subhalo parameters by jointly fitting the galaxy 2PCFs and abundances and consider subhaloes selected based on three properties, the mass M acc at the time of accretion, the maximum circular velocity V acc at the time of accretion, and the peak maximum circular velocity V peak over the history of the subhaloes. The three subhalo models work well for luminous galaxy samples (with luminosity above L * ). For low-luminosity samples, the V acc model stands out in reproducing the data, with the V peak model slightly worse, while the M acc model fails to fit the data. We discuss the implications of the modelling results.
Milner, A; Witt, K; Maheen, H; LaMontagne, A D
2017-04-04
Availability of lethal means is a significant risk factor for suicide. This study investigated whether occupations with greater access to lethal means had higher suicide rates than those without access, and further, whether this relationship differed for females versus males. A retrospective mortality study was conducted across the Australian population over the period 2001 to 2012. Data from the Australian Bureau of Statistics, which collects Census information on occupation for the Australian population, and the National Coroners Information System, which records information on suicide deaths, were combined. Employed suicide records were coded by occupation and work-related access to lethal means. Descriptive analysis and negative binomial regression were used to assess the relationship between access to means and suicide. Persons in occupations with access to firearms, medicines or drugs, and carbon monoxide more frequently used these methods to end their lives than those without access to means. Females employed in occupations with access to means had suicide rates that were 3.02 times greater (95% CI 2.60 to 3.50, p < 0.001) than those employed in occupations without access. Males in occupations with access had suicide rates that were 1.24 times greater than those without access (95% CI 1.16 to 1.33, p < 0.001). Work-related access to means is a risk factor for suicide in the employed population, but is associated with a greater risk for females than males. The findings of this study suggest the importance of controlling access to lethal methods in occupations where these are readily available.
Persistent escalation of alcohol drinking in C57BL/6J mice with intermittent access to 20% ethanol
Hwa, Lara S.; Chu, Adam; Levinson, Sally A.; Kayyali, Tala M.; DeBold, Joseph F.; Miczek, Klaus A.
2011-01-01
Background Intermittent access to drugs of abuse, as opposed to continuous access, is hypothesized to induce a kindling-type transition from moderate to escalated use, leading to dependence. Intermittent 24-hour cycles of ethanol access and deprivation can generate high levels of voluntary ethanol drinking in rats. Methods The current study uses C57BL/6J mice (B6) in an intermittent access to 20% ethanol protocol to escalate ethanol drinking levels. Adult male and female B6 mice were given intermittent access to 20% ethanol on alternating days of the week with water available ad libitum. Ethanol consumption during the initial 2 hours of access was compared to a short term, limited access “binge” drinking procedure, similar to drinking-in-the-dark (DID). B6 mice were also assessed for ethanol dependence with handling-induced convulsion (HIC), a reliable measure of withdrawal severity. Results After 3 weeks, male mice given intermittent access to ethanol achieved high stable levels of ethanol drinking in excess of 20 g/kg/24h, reaching above 100 mg/dl BEC, and showed a significantly higher ethanol preference than mice given continuous access to ethanol. Also, mice given intermittent access drank about twice as much as DID mice in the initial 2-hour access period. B6 mice that underwent the intermittent access protocol for longer periods of time displayed more severe signs of alcohol withdrawal. Additionally, female B6 mice were given intermittent access to ethanol and drank significantly more than males (ca. 30 g/kg/24h). Discussion The intermittent access method in B6 mice is advantageous because it induces escalated, voluntary, and preferential per os ethanol intake, behavior that may mimic a cardinal feature of human alcohol dependence, though the exact nature and site of ethanol acting in the brain and blood as a result of intermittent access has yet to be determined. PMID:21631540
Reported fatal and non-fatal incidents involving tourists in Thailand, July 1997-June 1999.
Leggat, Peter A; Leggat, Frances W
2003-05-01
Objectives. To examine fatal and non-fatal incidents involving tourists in Thailand. Methods. Press records from a major English language newspaper for the period from July 1997 to June 1999 were examined for reports of fatal and non-fatal incidents involving tourists. Results. From July 1997 to June 1999, up to 233 deaths were reported and up to a further 216 were reported injured in incidents involving tourists. One hundred and one deaths and 45 injured were reported following one major domestic jet aircraft crash in southern Thailand, however, it was not stated what proportion of casualties were tourists. Approximately 90 people perished in a single hotel fire in southeast Thailand. Most of the victims were local travellers attending meetings of two Thai companies. Sixteen deaths and 86 injured resulted from five road accidents. The majority of deaths and injuries involved foreigners. Twelve deaths and at least 33 injured resulted from three ferry and tour boat accidents. Most victims were reported to be foreigners. Three deaths and 35 injured resulted from a single cable car accident in northern Thailand. Most of these were Thai tourists, however, four of the injured were foreigners. Eight deaths and six injured resulted from 11 muggings and other violent incidents. All were foreigners. Six deaths were reportedly connected to a scam at the airport in Bangkok involving unlicensed airport taxis. Three deaths and four injured were due to other reported incidents. Conclusions. Newspaper reports of fatal and non-fatal incidents involving tourists in Thailand were probably uncommon, particularly given the volume of tourists entering the Kingdom, although better reporting mechanisms are needed. With the exception of the unusual major incidents, most reported fatal and non-fatal incidents involving tourists were due to road trauma and other transportation accidents, muggings, and occasional water sports and other accidents, which could occur at any major tourist destination. Travel health advisers should include advice concerning personal safety abroad and tourist authorities should endeavour to promote and advocate for tourism safety.
Method and apparatus for managing access to a memory
DOE Office of Scientific and Technical Information (OSTI.GOV)
DeBenedictis, Erik
A method and apparatus for managing access to a memory of a computing system. A controller transforms a plurality of operations that represent a computing job into an operational memory layout that reduces a size of a selected portion of the memory that needs to be accessed to perform the computing job. The controller stores the operational memory layout in a plurality of memory cells within the selected portion of the memory. The controller controls a sequence by which a processor in the computing system accesses the memory to perform the computing job using the operational memory layout. The operationalmore » memory layout reduces an amount of energy consumed by the processor to perform the computing job.« less
Librarians and Libraries Supporting Open Access Publishing
ERIC Educational Resources Information Center
Richard, Jennifer; Koufogiannakis, Denise; Ryan, Pam
2009-01-01
As new models of scholarly communication emerge, librarians and libraries have responded by developing and supporting new methods of storing and providing access to information and by creating new publishing support services. This article will examine the roles of libraries and librarians in developing and supporting open access publishing…
Enhancing Access to Information: Designing Catalogs for the 21st Century.
ERIC Educational Resources Information Center
Tyckoson, David A., Ed.
This book addresses the problem of when a library has limited catalog access, and explores various technological methods to expand the catalog beyond its traditional boundaries. Fourteen chapters describe catalog projects in individual libraries: (1) "Enhancing Access to Information: Building Catalogs for the Future" (David A. Tyckoson);…
Enhancing Access to Situational Vocabulary by Leveraging Geographic Context
ERIC Educational Resources Information Center
Patel, Rupal; Radhakrishnan, Rajiv
2007-01-01
Users of augmentative and alternative communication (AAC) aids could benefit from novel methods for accelerating access to contextually relevant vocabulary. This paper describes our initial efforts toward improving access to situational vocabulary through the use of geographic context to predict vocabulary. A corpus of spoken data produced by one…
Open Access Publishing in Indian Premier Research Institutions
ERIC Educational Resources Information Center
Bhat, Mohammad Hanief
2009-01-01
Introduction: Publishing research findings in open access journals is a means of enhancing visibility and consequently increasing the impact of publications. This study provides an overview of open access publishing in premier research institutes of India. Method: The publication output of each institution from 2003 to 2007 was ascertained through…
47 CFR 54.101 - Supported services for rural, insular and high cost areas.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) Dual tone multi-frequency signaling or its functional equivalent. “Dual tone multi-frequency” (DTMF) is a method of signaling that facilitates the transportation of signaling through the network... systems; (6) Access to operator services. “Access to operator services” is defined as access to any...
James, Abi; Draffan, E A; Wald, Mike
2017-01-01
This paper presents a gap analysis between crowdsourced functional accessibility evaluations of ebooks conducted by non-experts and the technical accessibility standards employed by developers. It also illustrates how combining these approaches can provide more appropriate information for a wider group of users with print impairments.
Thoughts on Access, Differentiation, and Implementation of a Multicultural Curriculum
ERIC Educational Resources Information Center
Cavilla, Derek
2014-01-01
Identification of gifted students from diverse and underserved communities is traditionally low; however, there are ways to expand identification methods in order to make access to gifted education programs more equitable. Creation and implementation of multi-faceted and multi-dimensional assessments as well as tiered access into gifted education…
The Many Faces of the Economic Bulletin Board.
ERIC Educational Resources Information Center
Boettcher, Jennifer
1996-01-01
The Economic Bulletin Board (EBB), a one-stop site for economic statistics and government-sponsored business information, can be accessed on the World Wide Web, gopher, telnet, file transfer protocol, dial-up, and fax. Each access method has advantages and disadvantages related to connections, pricing, depth of access, retrieval, and system…
A computing method for spatial accessibility based on grid partition
NASA Astrophysics Data System (ADS)
Ma, Linbing; Zhang, Xinchang
2007-06-01
An accessibility computing method and process based on grid partition was put forward in the paper. As two important factors impacting on traffic, density of road network and relative spatial resistance for difference land use was integrated into computing traffic cost in each grid. A* algorithms was inducted to searching optimum traffic cost of grids path, a detailed searching process and definition of heuristic evaluation function was described in the paper. Therefore, the method can be implemented more simply and its data source is obtained more easily. Moreover, by changing heuristic searching information, more reasonable computing result can be obtained. For confirming our research, a software package was developed with C# language under ArcEngine9 environment. Applying the computing method, a case study on accessibility of business districts in Guangzhou city was carried out.
Gunnell, David; Derges, Jane; Chang, Shu-Sen; Biddle, Lucy
2015-01-01
Helium gas suicides have increased in England and Wales; easy-to-access descriptions of this method on the Internet may have contributed to this rise. To investigate the availability of information on using helium as a method of suicide and trends in searching about this method on the Internet. We analyzed trends in (a) Google searching (2004-2014) and (b) hits on a Wikipedia article describing helium as a method of suicide (2013-2014). We also investigated the extent to which helium was described as a method of suicide on web pages and discussion forums identified via Google. We found no evidence of rises in Internet searching about suicide using helium. News stories about helium suicides were associated with increased search activity. The Wikipedia article may have been temporarily altered to increase awareness of suicide using helium around the time of a celebrity suicide. Approximately one third of the links retrieved using Google searches for suicide methods mentioned helium. Information about helium as a suicide method is readily available on the Internet; the Wikipedia article describing its use was highly accessed following celebrity suicides. Availability of online information about this method may contribute to rises in helium suicides.
48 CFR 315.7000 - Section 508 accessibility standards.
Code of Federal Regulations, 2010 CFR
2010-10-01
... CONTRACTING METHODS AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Acquisition of Electronic Information Technology 315.7000 Section 508 accessibility standards. EIT products and services, including EIT...
Retail Food Store Access in Rural Appalachia: A Mixed Methods Study.
Thatcher, Esther; Johnson, Cassandra; Zenk, Shannon N; Kulbok, Pamela
2017-05-01
To describe how characteristics of food retail stores (potential access) and other factors influence self-reported food shopping behavior (realized food access) among low-income, rural Central Appalachian women. Cross-sectional descriptive. Potential access was assessed through store mapping and in-store food audits. Factors influencing consumers' realized access were assessed through in-depth interviews. Results were merged using a convergent parallel mixed methods approach. Food stores (n = 50) and adult women (n = 9) in a rural Central Appalachian county. Potential and realized food access were described across five dimensions: availability, accessibility, affordability, acceptability, and accommodation. Supermarkets had better availability of healthful foods, followed by grocery stores, dollar stores, and convenience stores. On average, participants lived within 10 miles of 3.9 supermarkets or grocery stores, and traveled 7.5 miles for major food shopping. Participants generally shopped at the closest store that met their expectations for food availability, price, service, and atmosphere. Participants' perceptions of stores diverged from each other and from in-store audit findings. Findings from this study can help public health nurses engage with communities to make affordable, healthy foods more accessible. Recommendations are made for educating low-income consumers and partnering with food stores. © 2016 Wiley Periodicals, Inc.
Inequities in access to inpatient rehabilitation after stroke: an international scoping review.
Lynch, Elizabeth A; Cadilhac, Dominique A; Luker, Julie A; Hillier, Susan L
2017-12-01
Background Inequities in accessing inpatient rehabilitation after stroke have been reported in many countries and impact on patient outcomes. Objective To explore variation in international recommendations regarding which patients should receive inpatient rehabilitation after stroke and to describe reported access to rehabilitation. Methods A scoping review was conducted to identify clinical guidelines with recommendations regarding which patients should access inpatient rehabilitation after stroke, and data regarding the proportion of patients accessing stroke rehabilitation. Four bibliographic databases and grey literature were searched. Results Twenty-eight documents were included. Selection criteria for post-acute inpatient rehabilitation were identified for 14 countries or regions and summary data on the proportion of patients receiving inpatient rehabilitation were identified for 14 countries. In Australia, New Zealand, and the United Kingdom, it is recommended that all patients with stroke symptoms should access rehabilitation, whereas guidelines from the United States, Canada, and Europe did not consistently recommend rehabilitation for people with severe stroke. Access to inpatient rehabilitation ranged from 13% in Sweden to 57% in Israel. Differences in availability of early supported discharge/home rehabilitation programs and variations in reporting methods may influence the ability to reliably compare access to rehabilitation between regions. Conclusion Recommendations regarding which patients with moderate and severe strokes should access ongoing rehabilitation are inconsistent. Clinical practice guidelines from different countries regarding post-stroke rehabilitation do not always reflect the evidence regarding the likely benefits to people with stroke. Inequity in access to rehabilitation after stroke is an international issue.
ERIC Educational Resources Information Center
Leon, Federico R.; Lundgren, Rebecka; Sinai, Irit; Jennings, Victoria
2011-01-01
A nonrandomized experiment carried out in Jharkhand, India, shows how the effects of interventions designed to improve access to family-planning methods can be erroneously regarded as trivial when contraceptive use is utilized as dependent variable, ignoring women's need for contraception. Significant effects of the intervention were observed on…
ERIC Educational Resources Information Center
Raven, Neil
2016-01-01
Whilst published data sources exist for evaluating interventions aimed at widening higher education access, there is value for practitioners in conducting their own research. However, recognition of the contribution afforded by generating new data raises questions over which research methods to utilise. One method relatively new to widening…
Nic Carthaigh, Niamh; De Gryse, Benoit; Esmati, Abdul Sattar; Nizar, Barak; Van Overloop, Catherine; Fricke, Renzo; Bseiso, Jehan; Baker, Corinne; Decroo, Tom; Philips, Mit
2015-01-01
Background The Afghan population suffers from a long standing armed conflict. We investigated patients’ experiences of their access to and use of the health services. Methods Data were collected in four clinics from different provinces. Mixed methods were applied. The questions focused on access obstacles during the current health problem and health seeking behaviour during a previous illness episode of a household member. Results To access the health facilities 71.8% (545/759) of patients experienced obstacles. The combination of long distances, high costs and the conflict deprived people of life-saving healthcare. The closest public clinics were underused due to perceptions regarding their lack of availability or quality of staff, services or medicines. For one in five people, a lack of access to health care had resulted in death among family members or close friends within the last year. Conclusions Violence continues to affect daily life and access to healthcare in Afghanistan. Moreover, healthcare provision is not adequately geared to meet medical and emergency needs. Impartial healthcare tailored to the context will be vital to increase access to basic and life-saving healthcare. PMID:25492948
Kim, Seungjoo
2014-01-01
There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943
Baek, Seungsoo; Kim, Seungjoo
2014-01-01
There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.
NASA Technical Reports Server (NTRS)
Feng, Hui-Yu; VanderWijngaart, Rob; Biswas, Rupak; Biegel, Bryan (Technical Monitor)
2001-01-01
We describe the design of a new method for the measurement of the performance of modern computer systems when solving scientific problems featuring irregular, dynamic memory accesses. The method involves the solution of a stylized heat transfer problem on an unstructured, adaptive grid. A Spectral Element Method (SEM) with an adaptive, nonconforming mesh is selected to discretize the transport equation. The relatively high order of the SEM lowers the fraction of wall clock time spent on inter-processor communication, which eases the load balancing task and allows us to concentrate on the memory accesses. The benchmark is designed to be three-dimensional. Parallelization and load balance issues of a reference implementation will be described in detail in future reports.
Xu, Yueru; Ye, Zhirui; Wang, Yuan; Wang, Chao; Sun, Cuicui
2018-05-18
This paper focuses on the effect of road lighting on road safety at accesses and tries to quantitatively analyze the relationship between road lighting and road safety. An Artificial Neural Network (ANN) was applied in this study. This method is one of the most popular machine-learning methods in recent years and does not require any pre-defined assumptions. This method was applied using field data collected from ten road segments in Nanjing, Jiangsu Province, China. The results show that the impact of road lighting on road safety at accesses is significant. In addition, road lighting has greater influence when vehicle speeds are higher or the number of lanes is larger. A threshold illuminance was also found in this paper, and the results show that the safety level at accesses will become stable when reaching this value. The improvement of illuminance can decrease the speed variation among vehicles and improve the safety level. In addition, high-grade roads need better illuminance at accesses. A threshold value can also be obtained based on related variables and used to develop scientific guidelines for traffic management organizations.
Associations between e-cigarette access and smoking and drinking behaviours in teenagers.
Hughes, Karen; Bellis, Mark A; Hardcastle, Katherine A; McHale, Philip; Bennett, Andrew; Ireland, Robin; Pike, Kate
2015-03-31
Public health concerns regarding e-cigarettes and debate on appropriate regulatory responses are focusing on the need to prevent child access to these devices. However, little is currently known about the characteristics of those young people that are accessing e-cigarettes. Using a cross-sectional survey of 14-17 year old school students in North West England (n = 16,193) we examined associations between e-cigarette access and demographics, conventional smoking behaviours, alcohol consumption, and methods of accessing cigarettes and alcohol. Access to e-cigarettes was identified through a question asking students if they had ever tried or purchased e-cigarettes. One in five participants reported having accessed e-cigarettes (19.2%). Prevalence was highest among smokers (rising to 75.8% in those smoking >5 per day), although 15.8% of teenagers that had accessed e-cigarettes had never smoked conventional cigarettes (v.13.6% being ex-smokers). E-cigarette access was independently associated with male gender, having parents/guardians that smoke and students' alcohol use. Compared with non-drinkers, teenagers that drank alcohol at least weekly and binge drank were more likely to have accessed e-cigarettes (adjusted odds ratio [AOR] 1.89, P < 0.001), with this association particularly strong among never-smokers (AOR 4.59, P < 0.001). Among drinkers, e-cigarette access was related to: drinking to get drunk, alcohol-related violence, consumption of spirits; self-purchase of alcohol from shops or supermarkets; and accessing alcohol by recruiting adult proxy purchasers outside shops. There is an urgent need for controls on the promotion and sale of e-cigarettes to children. Findings suggest that e-cigarettes are being accessed by teenagers more for experimentation than smoking cessation. Those most likely to access e-cigarettes may already be familiar with illicit methods of accessing age-restricted substances.
Protein Solvent-Accessibility Prediction by a Stacked Deep Bidirectional Recurrent Neural Network.
Zhang, Buzhong; Li, Linqing; Lü, Qiang
2018-05-25
Residue solvent accessibility is closely related to the spatial arrangement and packing of residues. Predicting the solvent accessibility of a protein is an important step to understand its structure and function. In this work, we present a deep learning method to predict residue solvent accessibility, which is based on a stacked deep bidirectional recurrent neural network applied to sequence profiles. To capture more long-range sequence information, a merging operator was proposed when bidirectional information from hidden nodes was merged for outputs. Three types of merging operators were used in our improved model, with a long short-term memory network performing as a hidden computing node. The trained database was constructed from 7361 proteins extracted from the PISCES server using a cut-off of 25% sequence identity. Sequence-derived features including position-specific scoring matrix, physical properties, physicochemical characteristics, conservation score and protein coding were used to represent a residue. Using this method, predictive values of continuous relative solvent-accessible area were obtained, and then, these values were transformed into binary states with predefined thresholds. Our experimental results showed that our deep learning method improved prediction quality relative to current methods, with mean absolute error and Pearson's correlation coefficient values of 8.8% and 74.8%, respectively, on the CB502 dataset and 8.2% and 78%, respectively, on the Manesh215 dataset.
Method for forming precision clockplate with pivot pins
Wild, Ronald L [Albuquerque, NM
2010-06-01
Methods are disclosed for producing a precision clockplate with rotational bearing surfaces (e.g. pivot pins). The methods comprise providing an electrically conductive blank, conventionally machining oversize features comprising bearing surfaces into the blank, optionally machining of a relief on non-bearing surfaces, providing wire accesses adjacent to bearing surfaces, threading the wire of an electrical discharge machine through the accesses and finishing the bearing surfaces by wire electrical discharge machining. The methods have been shown to produce bearing surfaces of comparable dimension and tolerances as those produced by micro-machining methods such as LIGA, at reduced cost and complexity.
Custom-made raster method for fistula and graft.
Blokker, C
2005-01-01
Unfamiliarity with fistula and graft characteristics can lead to failed punctures, haematomas and sometimes access occlusion. The Custom-made Raster Method provides detailed shunt visualisation and angiographic images by using photo-editing software. Access veins of an individual shunt and an adapted raster are projected on a digital picture of the arm. During angiography the shunt arm is fixated and a digital picture is taken from a fixed vertical angle and distance. Reference points are marked on the shunt arm, which serves as a fixation to draw a raster with coordination points. In this way a picture is created similar to a roadmap with veins. There is complete integration of digital and radiological images by using software programmes Adobe Photoshop + Illustrator or Agfa Web 1000 under Windows XP. All illustrations fit 1:1 by scaling up or down without distortion. Editing with Photoshop gives a precise projection of shunt veins on the real coloured background of the digital photograph. In this projection the grey angiography background is made completely transparent. The system can contain more detailed information in combination with echo (duplex) images of depth and diameter. This visualisation method is a useful tool for multi disciplinary access meetings with intervention radiologists, access surgeons and nephrologists. Access malfunction, aneurysms and stenosis can be projected at the exact location. The system leads to clear and concrete puncture advice. Transfer of access information and communication to other dialysis centres is facilitated.
Reconceptualising Access in Education Policy: Method and Mindset
ERIC Educational Resources Information Center
Vongalis-Macrow, Athena
2010-01-01
Enhancing access to education and knowledge is a long-held principle enshrined in education policy. Access to education offers leverage for educational attainment and achievement, at the individual and social levels. In policy, the term equates with concepts of inclusion, social justice and equity. Over the last decades, as education policy has…
Strategies for Success: Open Access Policies at North American Educational Institutions
ERIC Educational Resources Information Center
Fruin, Christine; Sutton, Shan
2016-01-01
Recognizing the paucity of quantitative and qualitative data from North American educational institutions that have pursued open access policies, the authors devised a survey to collect information on the characteristics of these institutions, as well as the elements of the open access policies, the methods of promoting these policies, faculty…
ERIC Educational Resources Information Center
Akinbode, Rahmon O. Onaolapo; Nwalo, Kenneth Ivo Ngozi
2017-01-01
This study investigates serials management in university libraries, determines the extent to which serials are accessed and used and appraises the influence of availability, accessibility and use of serials on publications output of lecturers in federal universities in Nigeria. Questionnaire administration method was adopted to accumulate data for…
ERIC Educational Resources Information Center
Lee, Heng; Hsu, Chih-Cheng; Chen, Fu-Li; Yen, Yea-Yin; Lin, Pi-Li; Chiu, Yu-Wen; Lee, Chien-Hung; Peng, Wu-Der; Chen, Ted; Lu, Di-Lin; Huang, Hsiao-Ling
2014-01-01
Background: Adolescents who perceive easy access to tobacco are more likely to acquire cigarettes and experience smoking. This study assesses area disparities in perceptions of access to tobacco and cigarette purchasing experiences among schoolchildren. Methods: Data on children's tobacco-related variables were obtained from the Control of…
Deficits in Young Men's Knowledge about Accessing Sexual and Reproductive Health Services
ERIC Educational Resources Information Center
Bersamin, Melina; Fisher, Deborah A.; Marcell, Arik V.; Finan, Laura J.
2017-01-01
Objective: The current study aimed to examine (1) gender differences in college students' knowledge of sexual and reproductive health care (K-SRHC) service access points, and (2) the relationship between demographic and psychosocial factors and college students' overall K-SRHC service access points. Methods and Participants: Self-report online…
A Comparison of Web Resource Access Experiments: Planning for the New Millennium.
ERIC Educational Resources Information Center
Greenberg, Jane
This paper reports on research that compared five leading experiments that aim to improve access to the growing number of information resources on the World Wide Web. The objective was to identify characteristics of success and considerations for improvement in experiments providing access to Web resources via bibliographic control methods. The…
Using Distance Learning to Impact Access of Diverse Learners to Advanced Placement Programs
ERIC Educational Resources Information Center
Fenty, Nicole S.; Allio, Andrea
2017-01-01
Distance learning has been used as one method to increase access for students who have otherwise been underrepresented in college preparatory courses like Advanced Placement (AP). This study evaluated the impact of a statewide Virtual Advanced Placement (VAP) program on access to AP courses for students from underrepresented populations. Survey…
Rodriguez, Jairo; Tsukiyama, Toshio
2013-01-01
Faithful DNA replication is essential for normal cell division and differentiation. In eukaryotic cells, DNA replication takes place on chromatin. This poses the critical question as to how DNA replication can progress through chromatin, which is inhibitory to all DNA-dependent processes. Here, we developed a novel genome-wide method to measure chromatin accessibility to micrococcal nuclease (MNase) that is normalized for nucleosome density, the NCAM (normalized chromatin accessibility to MNase) assay. This method enabled us to discover that chromatin accessibility increases specifically at and ahead of DNA replication forks in normal S phase and during replication stress. We further found that Mec1, a key regulatory ATR-like kinase in the S-phase checkpoint, is required for both normal chromatin accessibility around replication forks and replication fork rate during replication stress, revealing novel functions for the kinase in replication stress response. These results suggest a possibility that Mec1 may facilitate DNA replication fork progression during replication stress by increasing chromatin accessibility around replication forks. PMID:23307868
Diffusion accessibility as a method for visualizing macromolecular surface geometry.
Tsai, Yingssu; Holton, Thomas; Yeates, Todd O
2015-10-01
Important three-dimensional spatial features such as depth and surface concavity can be difficult to convey clearly in the context of two-dimensional images. In the area of macromolecular visualization, the computer graphics technique of ray-tracing can be helpful, but further techniques for emphasizing surface concavity can give clearer perceptions of depth. The notion of diffusion accessibility is well-suited for emphasizing such features of macromolecular surfaces, but a method for calculating diffusion accessibility has not been made widely available. Here we make available a web-based platform that performs the necessary calculation by solving the Laplace equation for steady state diffusion, and produces scripts for visualization that emphasize surface depth by coloring according to diffusion accessibility. The URL is http://services.mbi.ucla.edu/DiffAcc/. © 2015 The Protein Society.
Well constructions with inhibited microbial growth and methods of antimicrobial treatment in wells
Lee, Brady D.; Dooley, Kirk J.
2004-11-02
The invention includes methods of inhibiting microbial growth in a well. A packing material containing a mixture of a first material and an antimicrobial agent is provided to at least partially fill a well bore. One or more access tubes are provided in an annular space around a casing within the well bore. The access tubes have a first terminal opening located at or above a ground surface and have a length that extends from the first terminal opening at least part of the depth of the well bore. The access tubes have a second terminal opening located within the well bore. An antimicrobial material is supplied into the well bore through the first terminal opening of the access tubes. The invention also includes well constructs.
ERIC Educational Resources Information Center
James, Gwyneth
2013-01-01
Researching the learning experiences of postgraduate students requires a different type of qualitative research to enable access to areas of their lives which may well remain hidden with more conventional methods of research. Narrative inquiry as both method and methodology allows such access. In this article, I focus on the use, appropriateness,…
Probabilistic assessment methodology for continuous-type petroleum accumulations
Crovelli, R.A.
2003-01-01
The analytic resource assessment method, called ACCESS (Analytic Cell-based Continuous Energy Spreadsheet System), was developed to calculate estimates of petroleum resources for the geologic assessment model, called FORSPAN, in continuous-type petroleum accumulations. The ACCESS method is based upon mathematical equations derived from probability theory in the form of a computer spreadsheet system. ?? 2003 Elsevier B.V. All rights reserved.
Utilizing Strategic and Operational Methods for Whole-Community Disaster Planning.
Franks, Stevee; Seaton, Ellen
2017-12-01
Analysis of response and recovery efforts to disasters over the past 2 decades has identified a consistent gap that plagues the nation in regard to persons with access and functional needs. This gap can be highlighted by Hurricane Katrina, where the majority of those killed were a part of the access and functional needs population. After a disaster, many individuals with access and functional needs require assistance recovering but often have difficulty accessing services and resources. These difficulties are due to a combination of issues, such as health problems and the disruption of community support services. We sought to help bridge this gap by focusing on strategic and operational methods used while planning for the whole community. This article highlights the many partnerships that must be fostered for successful whole-community planning. These partnerships include, but are not limited to, local government departments, health agencies, nonprofit and nongovernmental organizations, and other volunteer organizations. We showcase these methods by using a developmental Post-Disaster Canvassing Plan to highlight planning methods that may aid jurisdictions across the United States in disaster planning for the whole community. (Disaster Med Public Health Preparedness. 2017;11:741-746).
Nature Research journals reproducibility policies and initiatives in the Earth sciences
NASA Astrophysics Data System (ADS)
VanDecar, J. C.
2016-12-01
The Nature Research journals strongly support the long-term endeavour by funders, institutions, researchers and publishers toward increasing the reliability and reproducibility of published research. In the Earth, space and environmental sciences this mainly takes the form of ensuring that underlying data and methods in each manuscript are made as transparent and accessible as possible. Supporting data must be made available to editors and peer reviewers at the time of submission for the purposes of evaluating each manuscript. But the preferred way to share data sets is via public repositories. When appropriate community repositories are available, we strongly encourage authors to deposit their data prior to publication. We also now require that a statement be included in each manuscript, under the heading "Data availability", indicating whether and how the data can be accessed, including any restrictions to access. To allow authors to describe their experimental design and methods in as much detail as necessary, the Nature Research journals have effectively abolished space restrictions on online methods sections. To further increase transparency, we also encourage authors to provide tables of the data behind graphs and figures as Source Data. This builds on our established data-deposition policy for specific experiments and large data sets. The Source Data is made available directly from the figure legend, for easy access. We also require that details of geological samples and palaeontological specimens include clear provenance information to ensure full transparency of the research methods. Palaeontological and type specimens must be deposited in a recognised museum or collection to permit free access by other researchers in perpetuity. Finally, authors must make available upon request, to editors and reviewers, any previously unreported custom computer code used to generate results that are reported in the paper and central to its main claims. For all studies using custom code that is deemed central to the conclusions, a statement must be included, under the heading "Code availability", indicating whether and how the code can be accessed, including any restrictions to access.
Women's access needs in maternity care in rural Tasmania, Australia: a mixed methods study.
Hoang, Ha; Le, Quynh; Terry, Daniel
2014-03-01
This study investigates (i) maternity care access issues in rural Tasmania, (ii) rural women's challenges in accessing maternity services and (iii) rural women's access needs in maternity services. A mixed-method approach using a survey and semi-structured interviews was conducted. The survey explored women's views of rural maternity services from antenatal to postnatal care, while interviews reinforced the survey results and provided insights into the access issues and needs of women in maternity care. The survey was completed by n=210 women, with a response rate of 35%, with n=22 follow-up interviews being conducted. The survey indicated the majority of rural women believed antenatal education and check-ups and postnatal check-ups should be provided locally. The majority of women surveyed also believed in the importance of having a maternity unit in the local hospital, which was further iterated and clarified within the interviews. Three main themes emerged from the interview data, namely (i) lack of access to maternity services, (ii) difficulties in accessing maternity services, and (iii) rural women's access needs. The study suggested that women's access needs are not fully met in some rural areas of Tasmania. Rural women face many challenges when accessing maternity services, including financial burden and risk of labouring en route. The study supports the claim that the closure of rural maternity units shifts cost and risk from the health care system to rural women and their families. Copyright © 2013 Australian College of Midwives. Published by Elsevier Ltd. All rights reserved.
Congdon, Peter
2016-01-01
Background: Enhanced quality of care and improved access are central to effective primary care management of long term conditions. However, research evidence is inconclusive in establishing a link between quality of primary care, or access, and adverse outcomes, such as unplanned hospitalisation. Methods: This paper proposes a structural equation model for quality and access as latent variables affecting adverse outcomes, such as unplanned hospitalisations. In a case study application, quality of care (QOC) is defined in relation to diabetes, and the aim is to assess impacts of care quality and access on unplanned hospital admissions for diabetes, while allowing also for socio-economic deprivation, diabetes morbidity, and supply effects. The study involves 90 general practitioner (GP) practices in two London Clinical Commissioning Groups, using clinical quality of care indicators, and patient survey data on perceived access. Results: As a single predictor, quality of care has a significant negative impact on emergency admissions, and this significant effect remains when socio-economic deprivation and morbidity are allowed. In a full structural equation model including access, the probability that QOC negatively impacts on unplanned admissions exceeds 0.9. Furthermore, poor access is linked to deprivation, diminished QOC, and larger list sizes. Conclusions: Using a Bayesian inference methodology, the evidence from the analysis is weighted towards negative impacts of higher primary care quality and improved access on unplanned admissions. The methodology of the paper is potentially applicable to other long term conditions, and relevant when care quality and access cannot be measured directly and are better regarded as latent variables. PMID:27598184
Breda, Alberto; Territo, Angelo; Scoffone, Cesare; Seitz, Christian; Knoll, Thomas; Herrmann, Thomas; Brehmer, Mariannhe; Osther, Palle J S; Liatsikos, Evangelos
2017-11-12
Percutaneous nephrolithotomy (PNL) is the treatment of choice for larger and complex renal calculi. First step in performing PNL is to obtain access to the renal cavity using either fluoroscopy or ultrasound (US) guidance or a combination of both. Which guiding method to choose is controversial? A systematic review of the literature was performed comparing image guidance modalities for obtaining access in PNL. Evidence acquisition and synthesis: A PubMed, Scopus and Cochrane search for peer-reviewed studies was performed using the keywords "ultrasound" AND "fluoroscopy" AND "Percutaneous nephrolithotomy". Eligible articles were reviewed according to PRISMA criteria. Two hundred and forty records were identified using the keywords. Of these twelve studies were considered relevant. US guidance seems to be associated with a slightly lower complication rate, which may be related to fewer puncture attempts needed for obtaining access and to better peri-renal organ visualization. On the other hand, US-guidance alone needs the adjunct of fluoroscopy in a significant number of cases for achieving access. Stone free rate (SFR) was comparable between groups. Using US for renal access unequivocally reduces radiation exposure. Current evidence indicates that both fluoroscopy and US guidance may be successfully used for obtaining percutaneous renal access. Combining the image-guiding modalities - US and fluoroscopy - seems to increase outcome in PNL both with regard to success in achieving access and reducing complications. Furthermore, including US in the access strategy of PNL reduces radiation exposure to surgeon and staff as well as patients.
Kim, Jihoon; Grillo, Janice M; Ohno-Machado, Lucila
2011-01-01
Objective To determine whether statistical and machine-learning methods, when applied to electronic health record (EHR) access data, could help identify suspicious (ie, potentially inappropriate) access to EHRs. Methods From EHR access logs and other organizational data collected over a 2-month period, the authors extracted 26 features likely to be useful in detecting suspicious accesses. Selected events were marked as either suspicious or appropriate by privacy officers, and served as the gold standard set for model evaluation. The authors trained logistic regression (LR) and support vector machine (SVM) models on 10-fold cross-validation sets of 1291 labeled events. The authors evaluated the sensitivity of final models on an external set of 58 events that were identified as truly inappropriate and investigated independently from this study using standard operating procedures. Results The area under the receiver operating characteristic curve of the models on the whole data set of 1291 events was 0.91 for LR, and 0.95 for SVM. The sensitivity of the baseline model on this set was 0.8. When the final models were evaluated on the set of 58 investigated events, all of which were determined as truly inappropriate, the sensitivity was 0 for the baseline method, 0.76 for LR, and 0.79 for SVM. Limitations The LR and SVM models may not generalize because of interinstitutional differences in organizational structures, applications, and workflows. Nevertheless, our approach for constructing the models using statistical and machine-learning techniques can be generalized. An important limitation is the relatively small sample used for the training set due to the effort required for its construction. Conclusion The results suggest that statistical and machine-learning methods can play an important role in helping privacy officers detect suspicious accesses to EHRs. PMID:21672912
Method and apparatus of prefetching streams of varying prefetch depth
Gara, Alan [Mount Kisco, NY; Ohmacht, Martin [Yorktown Heights, NY; Salapura, Valentina [Chappaqua, NY; Sugavanam, Krishnan [Mahopac, NY; Hoenicke, Dirk [Seebruck-Seeon, DE
2012-01-24
Method and apparatus of prefetching streams of varying prefetch depth dynamically changes the depth of prefetching so that the number of multiple streams as well as the hit rate of a single stream are optimized. The method and apparatus in one aspect monitor a plurality of load requests from a processing unit for data in a prefetch buffer, determine an access pattern associated with the plurality of load requests and adjust a prefetch depth according to the access pattern.
LaPelle, Nancy R; Luckmann, Roger; Simpson, E Hatheway; Martin, Elaine R
2006-01-01
Background Movement towards evidence-based practices in many fields suggests that public health (PH) challenges may be better addressed if credible information about health risks and effective PH practices is readily available. However, research has shown that many PH information needs are unmet. In addition to reviewing relevant literature, this study performed a comprehensive review of existing information resources and collected data from two representative PH groups, focusing on identifying current practices, expressed information needs, and ideal systems for information access. Methods Nineteen individual interviews were conducted among employees of two domains in a state health department – communicable disease control and community health promotion. Subsequent focus groups gathered additional data on preferences for methods of information access and delivery as well as information format and content. Qualitative methods were used to identify themes in the interview and focus group transcripts. Results Informants expressed similar needs for improved information access including single portal access with a good search engine; automatic notification regarding newly available information; access to best practice information in many areas of interest that extend beyond biomedical subject matter; improved access to grey literature as well as to more systematic reviews, summaries, and full-text articles; better methods for indexing, filtering, and searching for information; and effective ways to archive information accessed. Informants expressed a preference for improving systems with which they were already familiar such as PubMed and listservs rather than introducing new systems of information organization and delivery. A hypothetical ideal model for information organization and delivery was developed based on informants' stated information needs and preferred means of delivery. Features of the model were endorsed by the subjects who reviewed it. Conclusion Many critical information needs of PH practitioners are not being met efficiently or at all. We propose a dual strategy of: 1) promoting incremental improvements in existing information delivery systems based on the expressed preferences of the PH users of the systems and 2) the concurrent development and rigorous evaluation of new models of information organization and delivery that draw on successful resources already operating to deliver information to clinical medical practitioners. PMID:16597331
Spatial accessibility of primary health care in China: A case study in Sichuan Province.
Wang, Xiuli; Yang, Huazhen; Duan, Zhanqi; Pan, Jay
2018-05-10
Access to primary health care is considered a fundamental right and an important facilitator of overall population health. Township health centers (THCs) and Community health centers (CHCs) serve as central hubs of China's primary health care system and have been emphasized during recent health care reforms. Accessibility of these hubs is poorly understood and a better understanding of the current situation is essential for proper decision making. This study assesses spatial access to health care provided by primary health care institutions (THCs/CHCs) in Sichuan Province as a microcosm in China. The Nearest-Neighbor method, Enhanced Two-Step Floating Catchment Area (E2SFCA) method, and Gini Coefficient are utilized to represent travel impedance, spatial accessibility, and disparity of primary health care resources (hospital beds, doctors, and health professionals). Accessibilities and Gini Coefficients are correlated with social development indexes (GDP, ethnicity, etc.) to identify influencing factors. Spatial access to primary health care is better in southeastern Sichuan compared to northwestern Sichuan in terms of shorter travel time, higher spatial accessibility, and lower inequity. Social development indexes all showed significant correlation with county averaged spatial accessibilities/Gini Coefficients, with population density ranking top. The disparity of access to primary health care is also apparent between ethnic minority and non-minority regions. To improve spatial access to primary health care and narrow the inequity, more township health centers staffed by qualified health professionals are recommended for northwestern Sichuan. Improved road networks will also help. Among areas with insufficient primary health care, the specific counties where demographics are dominated by older people and children due to widespread rural-urban migration of the workforce, and by ethnic minorities, should be especially emphasized in future planning. Copyright © 2018 Elsevier Ltd. All rights reserved.
Verma, Ashutosh Kumar; Dhawan, Sunita Singh; Singh, Seema; Bharati, Kumar Avinash; Jyotsana
2016-01-01
Background: Gymnema sylvestre, a vulnerable plant species, is mentioned in Indian Pharmacopeia as an antidiabetic drug Objective: Study of genetic and chemical diversity and its implications in accessions of G. sylvestre Materials and Methods: Fourteen accessions of G. sylvestre collected from Central India and assessment of their genetic and chemical diversity were carried out using ISSR (inter simple sequence repeat) and HPLC (high performance liquid chromatography) fingerprinting methods Results: Among the screened 40 ISSR primers, 15 were found polymorphic and collectively produced nine unique accession-specific bands. The maximum and minimum numbers of amplicones were noted for ISSR-15 and ISSR-11, respectively. The ISSR -11 and ISSR-13 revealed 100% polymorphism. HPLC chromatograms showed that accessions possess the secondary metabolites of mid-polarity with considerable variability. Unknown peaks with retention time 2.63, 3.41, 23.83, 24.50, and 44.67 were found universal type. Comparative hierarchical clustering analysis based on foresaid fingerprints indicates that both techniques have equal potential to discriminate accessions according to percentage gymnemic acid in their leaf tissue. Second approach was noted more efficiently for separation of accessions according to their agro-climatic/collection site Conclusion: Highly polymorphic ISSRs could be utilized as molecular probes for further selection of high gymnemic acid yielding accessions. Observed accession specific bands may be used as a descriptor for plant accessions protection and converted into sequence tagged sites markers. Identified five universal type peaks could be helpful in identification of G. sylvestre-based various herbal preparations. SUMMARY Nine accession specific unique bandsFive marker peaks for G. sylvestre.Suitability of genetic and chemical fingerprinting Abbreviations used: HPLC: High Performance Liquid Chromatography, ISSR: Inter Simple Sequence Repeats, CTAB: Cetyl Trimethylammonium Bromide, DNTP: Deoxynucleotide Triphosphates PMID:27761067
Distributed clinical data sharing via dynamic access-control policy transformation.
Rezaeibagha, Fatemeh; Mu, Yi
2016-05-01
Data sharing in electronic health record (EHR) systems is important for improving the quality of healthcare delivery. Data sharing, however, has raised some security and privacy concerns because healthcare data could be potentially accessible by a variety of users, which could lead to privacy exposure of patients. Without addressing this issue, large-scale adoption and sharing of EHR data are impractical. The traditional solution to the problem is via encryption. Although encryption can be applied to access control, it is not applicable for complex EHR systems that require multiple domains (e.g. public and private clouds) with various access requirements. This study was carried out to address the security and privacy issues of EHR data sharing with our novel access-control mechanism, which captures the scenario of the hybrid clouds and need of access-control policy transformation, to provide secure and privacy-preserving data sharing among different healthcare enterprises. We introduce an access-control mechanism with some cryptographic building blocks and present a novel approach for secure EHR data sharing and access-control policy transformation in EHR systems for hybrid clouds. We propose a useful data sharing system for healthcare providers to handle various EHR users who have various access privileges in different cloud environments. A systematic study has been conducted on data sharing in EHR systems to provide a solution to the security and privacy issues. In conclusion, we introduce an access-control method for privacy protection of EHRs and EHR policy transformation that allows an EHR access-control policy to be transformed from a private cloud to a public cloud. This method has never been studied previously in the literature. Furthermore, we provide a protocol to demonstrate policy transformation as an application scenario. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Zehnder, M S; Connert, T; Weiger, R; Krastl, G; Kühl, S
2016-10-01
To present a novel method utilizing 3D printed templates to gain guided access to root canals and to evaluate its accuracy in vitro. Sixty extracted human teeth were placed into six maxillary jaw models. Preoperative CBCT scans were matched with intra-oral scans using the coDiagnostix(™) software. Access cavities, sleeves and templates for guidance were virtually planned. Templates were produced by a 3D printer. After access cavity preparation by two operators, a postoperative CBCT scan was superimposed on the virtual planning. Accuracy was measured by calculating the deviation of planned and prepared cavities in three dimensions and angle. Ninety-five per cent confidence intervals were calculated for both operators. All root canals were accessible after cavity preparation with 'Guided Endodontics'. Deviations of planned and prepared access cavities were low with means ranging from 0.16 to 0.21 mm for different aspects at the base of the bur and 0.17-0.47 mm at the tip of the bur. Mean of angle deviation was 1.81°. Overlapping 95% confidence intervals revealed no significant difference between operators. 'Guided Endodontics' allowed an accurate access cavity preparation up to the apical third of the root utilizing printed templates for guidance. All root canals were accessible after preparation. © 2015 International Endodontic Journal. Published by John Wiley & Sons Ltd.
Willey, Barbara; Waiswa, Peter; Kajjo, Darious; Munos, Melinda; Akuze, Joseph; Allen, Elizabeth; Marchant, Tanya
2018-06-01
Improving maternal and newborn health requires improvements in the quality of facility-based care. This is challenging to measure: routine data may be unreliable; respondents in population surveys may be unable to accurately report on quality indicators; and facility assessments lack population level denominators. We explored methods for linking access to skilled birth attendance (SBA) from household surveys to data on provision of care from facility surveys with the aim of estimating population level effective coverage reflecting access to quality care. We used data from Mayuge District, Uganda. Data from household surveys on access to SBA were linked to health facility assessment census data on readiness to provide basic emergency obstetric and newborn care (BEmONC) in the same district. One individual- and two ecological-linking methods were applied. All methods used household survey reports on where care at birth was accessed. The individual-linking method linked this to data about facility readiness from the specific facility where each woman delivered. The first ecological-linking approach used a district-wide mean estimate of facility readiness. The second used an estimate of facility readiness adjusted by level of health facility accessed. Absolute differences between estimates derived from the different linking methods were calculated, and agreement examined using Lin's concordance correlation coefficient. A total of 1177 women resident in Mayuge reported a birth during 2012-13. Of these, 664 took place in facilities within Mayuge, and were eligible for linking to the census of the district's 38 facilities. 55% were assisted by a SBA in a facility. Using the individual-linking method, effective coverage of births that took place with an SBA in a facility ready to provide BEmONC was just 10% (95% confidence interval CI 3-17). The absolute difference between the individual- and ecological-level linking method adjusting for facility level was one percentage point (11%), and tests suggested good agreement. The ecological method using the district-wide estimate demonstrated poor agreement. The proportion of women accessing appropriately equipped facilities for care at birth is far lower than the coverage of facility delivery. To realise the life-saving potential of health services, countries need evidence to inform actions that address gaps in the provision of quality care. Linking household and facility-based information provides a simple but innovative method for estimating quality of care at the population level. These encouraging findings suggest that linking data sets can result in meaningful evidence even when the exact location of care seeking is not known.
Kim, Jihoon; Grillo, Janice M; Boxwala, Aziz A; Jiang, Xiaoqian; Mandelbaum, Rose B; Patel, Bhakti A; Mikels, Debra; Vinterbo, Staal A; Ohno-Machado, Lucila
2011-01-01
Our objective is to facilitate semi-automated detection of suspicious access to EHRs. Previously we have shown that a machine learning method can play a role in identifying potentially inappropriate access to EHRs. However, the problem of sampling informative instances to build a classifier still remained. We developed an integrated filtering method leveraging both anomaly detection based on symbolic clustering and signature detection, a rule-based technique. We applied the integrated filtering to 25.5 million access records in an intervention arm, and compared this with 8.6 million access records in a control arm where no filtering was applied. On the training set with cross-validation, the AUC was 0.960 in the control arm and 0.998 in the intervention arm. The difference in false negative rates on the independent test set was significant, P=1.6×10(-6). Our study suggests that utilization of integrated filtering strategies to facilitate the construction of classifiers can be helpful.
Kim, Jihoon; Grillo, Janice M; Boxwala, Aziz A; Jiang, Xiaoqian; Mandelbaum, Rose B; Patel, Bhakti A; Mikels, Debra; Vinterbo, Staal A; Ohno-Machado, Lucila
2011-01-01
Our objective is to facilitate semi-automated detection of suspicious access to EHRs. Previously we have shown that a machine learning method can play a role in identifying potentially inappropriate access to EHRs. However, the problem of sampling informative instances to build a classifier still remained. We developed an integrated filtering method leveraging both anomaly detection based on symbolic clustering and signature detection, a rule-based technique. We applied the integrated filtering to 25.5 million access records in an intervention arm, and compared this with 8.6 million access records in a control arm where no filtering was applied. On the training set with cross-validation, the AUC was 0.960 in the control arm and 0.998 in the intervention arm. The difference in false negative rates on the independent test set was significant, P=1.6×10−6. Our study suggests that utilization of integrated filtering strategies to facilitate the construction of classifiers can be helpful. PMID:22195129
Reshadat, S; Saedi, S; Zangeneh, A; Ghasemi, S R; Gilan, N R; Karbasi, A; Bavandpoor, E
2015-09-08
Geographic information systems (GIS) analysis has not been widely used in underdeveloped countries to ensure that vulnerable populations have accessibility to primary health-care services. This study applied GIS methods to analyse the spatial accessibility to urban primary-care centres of the population in Kermanshah city, Islamic Republic of Iran, by age and sex groups. In a descriptive-analytical study over 3 time periods, network analysis, mean centre and standard distance methods were applied using ArcGIS 9.3. The analysis was based on a standard radius of 750 m distance from health centres, walking speed of 1 m/s and desired access time to health centres of 12.5 mins. The proportion of the population with inadequate geographical access to health centres rose from 47.3% in 1997 to 58.4% in 2012. The mean centre and standard distance mapping showed that the spatial distribution of health centres in Kermanshah needed to be adjusted to changes in population distribution.
Access to and Use of Eye Care Services in Rural Arkansas
ERIC Educational Resources Information Center
Kilmer, Greta; Bynum, LaTonya; Balamurugan, Appathurai
2010-01-01
Context: Rural residents are more likely to be uninsured and have low income. Purpose: To determine if rural residents in Arkansas have decreased access to eye care services and use them less frequently than urban residents. Methods: Data from the 2006 Visual Impairment and Access to Eye Care Module from the Arkansas Behavioral Risk Factor…
Modes of Access: The Influence of Dissemination Channels on the Use of Open Access Monographs
ERIC Educational Resources Information Center
Snijder, Ronald
2014-01-01
Introduction: This paper studies the effects of several dissemination channels in an open access environment by analysing the download data of the OAPEN Library. Method: Download data were obtained containing the number of downloads and the name of the Internet provider. Based on public information, each Internet provider was categorised. The…
ERIC Educational Resources Information Center
Scott, James Calvert; Blaszczynski, Carol; Green, Diana J.; Fagerheim, Britt Anna
2008-01-01
Problem: The business education literature isn't accessible. Research Questions: Which business education periodicals do vital business educators perceive to be more useful? In which databases and/or indices are they found? How much literature is fugitive? What strategies might increase literature accessibility? Research Method: Delphi technique.…
ERIC Educational Resources Information Center
McLachlan, Sarah; Hagger, Martin S.
2010-01-01
This study aimed to explore relations between chronically accessible outcomes in physical activity and scaled measures of motivational orientations from a self-determination perspective. Methods from construct and attitude accessibility research and the Levesque and Pelletier (2003) study were used to identify participants' chronically accessible…
ERIC Educational Resources Information Center
Atherton, Mirella; Shah, Mahsood; Vazquez, Jenny; Griffiths, Zoe; Jackson, Brian; Burgess, Catherine
2017-01-01
Curriculum design, teaching methods, assessments and range of academic support need to be inclusive in Open Access Enabling courses. The findings of this study confirm a correlation between student access to online learning materials and a positive impact on grades in science courses. More specifically, students who frequently use the online…
76 FR 19357 - Emergency Access Advisory Committee; Announcement of Date of Next Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-07
... Committee will address the status of the national survey of persons with disability and seniors to learn... access to emergency services by individuals with disabilities as part of our nation's migration to a... methods by which to enable access to NG9-1-1 emergency services by individuals with disabilities. In order...
ERIC Educational Resources Information Center
Pratt, Justin M.; Yezierski, Ellen J.
2018-01-01
Conducting qualitative research in any discipline warrants two actions: accessing participants and eliciting their ideas. In chemistry education research (CER), survey techniques have been used to increase access to participants and diversify samples. Interview tasks (such as card sorting, using demonstrations, and using simulations) have been…
Shah, Tayyab Ikram; Bell, Scott; Wilson, Kathi
2016-01-01
Urban environments can influence many aspects of health and well-being and access to health care is one of them. Access to primary health care (PHC) in urban settings is a pressing research and policy issue in Canada. Most research on access to healthcare is focused on national and provincial levels in Canada; there is a need to advance current understanding to local scales such as neighbourhoods. This study examines spatial accessibility to family physicians using the Three-Step Floating Catchment Area (3SFCA) method to identify neighbourhoods with poor geographical access to PHC services and their spatial patterning across 14 Canadian urban settings. An index of spatial access to PHC services, representing an accessibility score (physicians-per-1000 population), was calculated for neighborhoods using a 3km road network distance. Information about primary health care providers (this definition does not include mobile services such as health buses or nurse practitioners or less distributed services such as emergency rooms) used in this research was gathered from publicly available and routinely updated sources (i.e. provincial colleges of physicians and surgeons). An integrated geocoding approach was used to establish PHC locations. The results found that the three methods, Simple Ratio, Neighbourhood Simple Ratio, and 3SFCA that produce City level access scores are positively correlated with each other. Comparative analyses were performed both within and across urban settings to examine disparities in distributions of PHC services. It is found that neighbourhoods with poor accessibility scores in the main urban settings across Canada have further disadvantages in relation to population high health care needs. The results of this study show substantial variations in geographical accessibility to PHC services both within and among urban areas. This research enhances our understanding of spatial accessibility to health care services at the neighbourhood level. In particular, the results show that the low access neighbourhoods tend to be clustered in the neighbourhoods at the urban periphery and immediately surrounding the downtown area.
NASA Technical Reports Server (NTRS)
Pliutau, Denis; Prasad, Narashimha S.
2013-01-01
Current approaches to satellite observation data storage and distribution implement separate visualization and data access methodologies which often leads to the need in time consuming data ordering and coding for applications requiring both visual representation as well as data handling and modeling capabilities. We describe an approach we implemented for a data-encoded web map service based on storing numerical data within server map tiles and subsequent client side data manipulation and map color rendering. The approach relies on storing data using the lossless compression Portable Network Graphics (PNG) image data format which is natively supported by web-browsers allowing on-the-fly browser rendering and modification of the map tiles. The method is easy to implement using existing software libraries and has the advantage of easy client side map color modifications, as well as spatial subsetting with physical parameter range filtering. This method is demonstrated for the ASTER-GDEM elevation model and selected MODIS data products and represents an alternative to the currently used storage and data access methods. One additional benefit includes providing multiple levels of averaging due to the need in generating map tiles at varying resolutions for various map magnification levels. We suggest that such merged data and mapping approach may be a viable alternative to existing static storage and data access methods for a wide array of combined simulation, data access and visualization purposes.
Ma, Jianzhu; Wang, Sheng
2015-01-01
The solvent accessibility of protein residues is one of the driving forces of protein folding, while the contact number of protein residues limits the possibilities of protein conformations. The de novo prediction of these properties from protein sequence is important for the study of protein structure and function. Although these two properties are certainly related with each other, it is challenging to exploit this dependency for the prediction. We present a method AcconPred for predicting solvent accessibility and contact number simultaneously, which is based on a shared weight multitask learning framework under the CNF (conditional neural fields) model. The multitask learning framework on a collection of related tasks provides more accurate prediction than the framework trained only on a single task. The CNF method not only models the complex relationship between the input features and the predicted labels, but also exploits the interdependency among adjacent labels. Trained on 5729 monomeric soluble globular protein datasets, AcconPred could reach 0.68 three-state accuracy for solvent accessibility and 0.75 correlation for contact number. Tested on the 105 CASP11 domain datasets for solvent accessibility, AcconPred could reach 0.64 accuracy, which outperforms existing methods.
NASA Astrophysics Data System (ADS)
Indrayana, I. N. E.; P, N. M. Wirasyanti D.; Sudiartha, I. KG
2018-01-01
Mobile application allow many users to access data from the application without being limited to space, space and time. Over time the data population of this application will increase. Data access time will cause problems if the data record has reached tens of thousands to millions of records.The objective of this research is to maintain the performance of data execution for large data records. One effort to maintain data access time performance is to apply query optimization method. The optimization used in this research is query heuristic optimization method. The built application is a mobile-based financial application using MySQL database with stored procedure therein. This application is used by more than one business entity in one database, thus enabling rapid data growth. In this stored procedure there is an optimized query using heuristic method. Query optimization is performed on a “Select” query that involves more than one table with multiple clausa. Evaluation is done by calculating the average access time using optimized and unoptimized queries. Access time calculation is also performed on the increase of population data in the database. The evaluation results shown the time of data execution with query heuristic optimization relatively faster than data execution time without using query optimization.
36 CFR 406.150 - Program accessibility: Existing facilities.
Code of Federal Regulations, 2010 CFR
2010-07-01
... accessibility requirements to the extent compelled by the Architectural Barriers Act of 1968, as amended (42 U.S.C. 4151-4157), and any regulations implementing it. In choosing among available methods for meeting...
ERIC Educational Resources Information Center
Gjesfjeld, Christopher D.; Jung, Jin-Kyu
2014-01-01
Although various methods have been used to teach about poverty in the social work classroom (e.g., quantitative, historical, and qualitative), the use of geographic visualization and geographic information systems (GIS) has become a relatively new method. In our analysis of food access on the East Side of Buffalo, New York, we demonstrate the…
Accessible engineering drawings for visually impaired machine operators.
Ramteke, Deepak; Kansal, Gayatri; Madhab, Benu
2014-01-01
An engineering drawing provides manufacturing information to a machine operator. An operator plans and executes machining operations based on this information. A visually impaired (VI) operator does not have direct access to the drawings. Drawing information is provided to them verbally or by using sample parts. Both methods have limitations that affect the quality of output. Use of engineering drawings is a standard practice for every industry; this hampers employment of a VI operator. Accessible engineering drawings are required to increase both independence, as well as, employability of VI operators. Today, Computer Aided Design (CAD) software is used for making engineering drawings, which are saved in CAD files. Required information is extracted from the CAD files and converted into Braille or voice. The authors of this article propose a method to make engineering drawings information directly accessible to a VI operator.
Mobile learning to improve mathematics teachers mathematical competencies
NASA Astrophysics Data System (ADS)
Hendrayana, A.; Wahyudin
2018-01-01
The role of teachers is crucial to the success of mathematics learning. One of the learning indicator is characterized by the students’ improved mathematical proficiency. In order to increase that, it is necessary to improve the teacher’s mathematical skills first. For that, it needs an innovative way to get teachers close to easily accessible learning resources through technology. The technology can facilitate teachers to access learning resources anytime and anywhere. The appropriate information technology is mobile learning. Innovations that can make teachers easy to access learning resources are mobile applications that can be accessed anytime and anywhere either online or offline. The research method was research development method. In preliminary analysis, subjects consist of teachers and lecturers in professional teacher education program. The results that the teachers ready to adopt mobile-learning for the improvement of their skills.
Classification of cassava genotypes based on qualitative and quantitative data.
Oliveira, E J; Oliveira Filho, O S; Santos, V S
2015-02-02
We evaluated the genetic variation of cassava accessions based on qualitative (binomial and multicategorical) and quantitative traits (continuous). We characterized 95 accessions obtained from the Cassava Germplasm Bank of Embrapa Mandioca e Fruticultura; we evaluated these accessions for 13 continuous, 10 binary, and 25 multicategorical traits. First, we analyzed the accessions based only on quantitative traits; next, we conducted joint analysis (qualitative and quantitative traits) based on the Ward-MLM method, which performs clustering in two stages. According to the pseudo-F, pseudo-t2, and maximum likelihood criteria, we identified five and four groups based on quantitative trait and joint analysis, respectively. The smaller number of groups identified based on joint analysis may be related to the nature of the data. On the other hand, quantitative data are more subject to environmental effects in the phenotype expression; this results in the absence of genetic differences, thereby contributing to greater differentiation among accessions. For most of the accessions, the maximum probability of classification was >0.90, independent of the trait analyzed, indicating a good fit of the clustering method. Differences in clustering according to the type of data implied that analysis of quantitative and qualitative traits in cassava germplasm might explore different genomic regions. On the other hand, when joint analysis was used, the means and ranges of genetic distances were high, indicating that the Ward-MLM method is very useful for clustering genotypes when there are several phenotypic traits, such as in the case of genetic resources and breeding programs.
Geographical accessibility to community pharmacies by the elderly in metropolitan Lisbon.
Padeiro, Miguel
2018-07-01
In ageing societies, community pharmacies play an important role in delivering medicines, responsible advising, and other targeted services. Elderly people are among their main consumers, as they use more prescription drugs, need more specific health care, and experience more mobility issues than other age groups. This makes geographical accessibility a relevant concern for them. To measure geographical pedestrian accessibility to community pharmacies by elderly people in the Lisbon Metropolitan Area (LMA). The number of elderly people living within a 10- and 15-min walk was estimated based on the exploitation of population census data, the address-based location of 801 community pharmacies, and a Google Maps Application Programming Interface (API) method for calculating distances between pharmacies and the centroids of census statistical subsections. Results were compared to figures attained via traditional methods. In the LMA, 61.2% of the elderly live less than a 10 min walk from the nearest pharmacy and 76.9% live less than 15 min away. This opposes the common view that pharmacies are highly accessible in urban areas. In addition, results show a high spatial variability of proximity to pharmacies. Despite the illusion of good coverage suggested at the metropolitan scale, accessibility measures demonstrate the existence of pharmaceutical deprivation areas for the elderly. The findings indicate the need for more accuracy in both access measurements and redistribution policies. Measurement methods and population targets should be reconsidered. Copyright © 2017 Elsevier Inc. All rights reserved.
General Catalytic Enantioselective Access to Monohalomethyl and Trifluoromethyl Cyclopropanes.
Huang, Wei-Sheng; Schlinquer, Claire; Poisson, Thomas; Pannecoucke, Xavier; Charette, André B; Jubault, Philippe
2018-05-29
An efficient catalytic enantioselective access to chiral functionalized trifluoromethyl cyclopropanes from two classes of diazo compounds and alpha-trifluoromethyl styrenes using Rh2((S)-BTPCP)4 as a catalyst is described. This method provides an efficient and practical strategy for the synthesis of highly functionalized CF3-cyclopropanes with excellent diastereoselectivities (up to 20:1) and enantioselectivities (up to 99% ee). The depicted methodology represents up to date the most efficient catalytic enantioselective method to access highly decorated chiral CF3-cyclopropanes. Extension to chiral monohalomethyl cyclopropanes in high ee is also reported. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
NASA Technical Reports Server (NTRS)
Schwab, Andrew J. (Inventor); Aylor, James (Inventor); Hitchcock, Charles Young (Inventor); Wulf, William A. (Inventor); McKee, Sally A. (Inventor); Moyer, Stephen A. (Inventor); Klenke, Robert (Inventor)
2000-01-01
A data processing system is disclosed which comprises a data processor and memory control device for controlling the access of information from the memory. The memory control device includes temporary storage and decision ability for determining what order to execute the memory accesses. The compiler detects the requirements of the data processor and selects the data to stream to the memory control device which determines a memory access order. The order in which to access said information is selected based on the location of information stored in the memory. The information is repeatedly accessed from memory and stored in the temporary storage until all streamed information is accessed. The information is stored until required by the data processor. The selection of the order in which to access information maximizes bandwidth and decreases the retrieval time.
Querying and Computing with BioCyc Databases
Krummenacker, Markus; Paley, Suzanne; Mueller, Lukas; Yan, Thomas; Karp, Peter D.
2006-01-01
Summary We describe multiple methods for accessing and querying the complex and integrated cellular data in the BioCyc family of databases: access through multiple file formats, access through Application Program Interfaces (APIs) for LISP, Perl and Java, and SQL access through the BioWarehouse relational database. Availability The Pathway Tools software and 20 BioCyc DBs in Tiers 1 and 2 are freely available to academic users; fees apply to some types of commercial use. For download instructions see http://BioCyc.org/download.shtml PMID:15961440
Novel Method for Exchange of Impella Circulatory Assist Catheter: The "Trojan Horse" Technique.
Phillips, Colin T; Tamez, Hector; Tu, Thomas M; Yeh, Robert W; Pinto, Duane S
2017-07-01
Patients with an indwelling Impella may require escalation of hemodynamic support or exchange to another circulatory assistance platform. As such, preservation of vascular access is preferable in cases where anticoagulation cannot be discontinued or to facilitate exchange to an alternative catheter or closure device. Challenges exist in avoiding bleeding and loss of wire access in these situations. We describe a single-access "Trojan Horse" technique that minimizes bleeding while maintaining arterial access for rapid exchange of this percutaneous ventricular assist device.
Providing Access and Visualization to Global Cloud Properties from GEO Satellites
NASA Astrophysics Data System (ADS)
Chee, T.; Nguyen, L.; Minnis, P.; Spangenberg, D.; Palikonda, R.; Ayers, J. K.
2015-12-01
Providing public access to cloud macro and microphysical properties is a key concern for the NASA Langley Research Center Cloud and Radiation Group. This work describes a tool and method that allows end users to easily browse and access cloud information that is otherwise difficult to acquire and manipulate. The core of the tool is an application-programming interface that is made available to the public. One goal of the tool is to provide a demonstration to end users so that they can use the dynamically generated imagery as an input into their own work flows for both image generation and cloud product requisition. This project builds upon NASA Langley Cloud and Radiation Group's experience with making real-time and historical satellite cloud product imagery accessible and easily searchable. As we see the increasing use of virtual supply chains that provide additional value at each link there is value in making satellite derived cloud product information available through a simple access method as well as allowing users to browse and view that imagery as they need rather than in a manner most convenient for the data provider. Using the Open Geospatial Consortium's Web Processing Service as our access method, we describe a system that uses a hybrid local and cloud based parallel processing system that can return both satellite imagery and cloud product imagery as well as the binary data used to generate them in multiple formats. The images and cloud products are sourced from multiple satellites and also "merged" datasets created by temporally and spatially matching satellite sensors. Finally, the tool and API allow users to access information that spans the time ranges that our group has information available. In the case of satellite imagery, the temporal range can span the entire lifetime of the sensor.
Committee Opinion No 699: Adolescent Pregnancy, Contraception, and Sexual Activity.
2017-05-01
In 2015, the birth rate among U.S. adolescents and young adults (aged 15-19 years) reached a historic low at 22.3 per 1,000 women. Despite positive trends, the United States continues to have the highest adolescent pregnancy rate among industrialized countries with data. Racial and ethnic disparities in adolescent pregnancy rates continue to exist, as do state-based differences in pregnancy, birth, and abortion rates. The American College of Obstetricians and Gynecologists supports access for adolescents to all contraceptive methods approved by the U.S. Food and Drug Administration. In the absence of contraindications, patient choice should be the principal factor in prescribing one method of contraception over another. Dual method use-the use of condoms in combination with more effective contraceptive methods to protect against sexually transmitted infections and unwanted pregnancy-is the ideal contraceptive practice for adolescents. Just as adolescents should have access to the full range of contraceptives, including long-acting reversible contraceptive methods, they should be able to decline and discontinue any method on their own, without barriers. A reproductive justice framework for contraceptive counseling and access is essential to providing equitable health care, accessing and having coverage for contraceptive methods, and resisting potential coercion by health care providers. Successful programs that resulted in measurable changes in adolescent contraceptive practices and sexual behavior have been described, but not implemented uniformly nor supported by policy improvements. More research is needed to determine which programs are most effective and which programs do not work. Continued efforts are integral to further advance positive trends.
Committee Opinion No. 699: Adolescent Pregnancy, Contraception, and Sexual Activity.
2017-05-01
In 2015, the birth rate among U.S. adolescents and young adults (aged 15-19 years) reached a historic low at 22.3 per 1,000 women. Despite positive trends, the United States continues to have the highest adolescent pregnancy rate among industrialized countries with data. Racial and ethnic disparities in adolescent pregnancy rates continue to exist, as do state-based differences in pregnancy, birth, and abortion rates. The American College of Obstetricians and Gynecologists supports access for adolescents to all contraceptive methods approved by the U.S. Food and Drug Administration. In the absence of contraindications, patient choice should be the principal factor in prescribing one method of contraception over another. Dual method use-the use of condoms in combination with more effective contraceptive methods to protect against sexually transmitted infections and unwanted pregnancy-is the ideal contraceptive practice for adolescents. Just as adolescents should have access to the full range of contraceptives, including long-acting reversible contraceptive methods, they should be able to decline and discontinue any method on their own, without barriers. A reproductive justice framework for contraceptive counseling and access is essential to providing equitable health care, accessing and having coverage for contraceptive methods, and resisting potential coercion by health care providers. Successful programs that resulted in measurable changes in adolescent contraceptive practices and sexual behavior have been described, but not implemented uniformly nor supported by policy improvements. More research is needed to determine which programs are most effective and which programs do not work. Continued efforts are integral to further advance positive trends.
Lamsal, Ram P; Beauchemin, Diane
2015-03-31
A previously developed, efficient and simple on-line leaching method was used to assess the maximum bio-accessible fraction (assuming no synergistic effect from other food and beverage) of potentially toxic elements (Cr, As, Cd and Pb) in whole wheat brown and white bread samples. Artificial saliva, gastric juice and intestinal juice were successively pumped into a mini-column, packed with bread (maintained at 37 °C) connected on-line to the nebulizer of an inductively coupled plasma mass spectrometry (ICP-MS) instrument equipped with a collision-reaction interface (CRI) using hydrogen as reaction gas to minimize carbon- and chlorine-based polyatomic interferences. In contrast to the conventional batch method to which it was compared, this approach provides real-time monitoring of potentially toxic elements that are continuously released during leaching. Mass balance for both methods was verified at the 95% confidence level. Results obtained from the whole wheat brown and white bread showed that the majority of Cr, Cd and Pb was leached by gastric juice but, in contrast, the majority of As was leached by saliva. While there was higher total content for elements in whole wheat bread than in white bread, a higher percentage of elements were bio-accessible in white bread than in whole wheat bread. Both the on-line and batch methods indicate that 40-98% of toxic elements in bread samples are bio-accessible. While comparison of total analyte concentrations with provisional tolerable daily intake values may indicate some serious health concern for children, when accounting for the bio-accessibility of these elements, bread consumption is found to be safe for all ages. Copyright © 2015 Elsevier B.V. All rights reserved.
Effects of gamma irradiation on the performance of Jatropha (Jatropha curcas L.) accessions
NASA Astrophysics Data System (ADS)
Surahman, M.; Santosa, E.; Agusta, H.; Aisyah, S. I.; Nisya, F. N.
2018-03-01
This study aimed to assess the effects of mutation by using gamma ray on the performance of jatropha plants. The study was conducted at PAIR BATAN. Jatropha seeds obtained from the collection farm of SBRC LPPM IPB and PT Indocement Tunggal Prakarsa Tbk in Gunung Putri, Bogor, were irradiated. The irradiated seeds were grown in Jonggol Trial Farm of IPB. Gamma irradiation was conducted by using a GCM 4000A device. Treatments consisted of irradiation doses, irradiation methods, and accessions. Irradiation doses given were 175, 200, 225 Gy, and no irradiation (control). Irradiation methods consisted of acute, intermittent, and split-dose. Accessions used in this study were Dompu, Medan, Bima, Lombok, ITP II, IP2P, and Thailand. Results of the study were analysed until 5 months after planting showed that gamma ray mutation gave stimulating and inhibiting effects on similar traits. Irradiation dose of 225 Gy was good to be given in acute, intermittent, and split-dose methods. Irradiation effects were found to be significant in jatropha accessions. Effects of irradiation on production will be published soon.
ERIC Educational Resources Information Center
Glazerman, Steven; Max, Jeffrey
2011-01-01
This appendix describes the methods and provides further detail to support the evaluation brief, "Do Low-Income Students Have Equal Access to the Highest-Performing Teachers?" (Contains 8 figures, 6 tables and 5 footnotes.) [For the main report, "Do Low-Income Students Have Equal Access to the Highest-Performing Teachers? NCEE…
Influence of Place of Residence in Access to Specialized Cancer Care for African Americans
ERIC Educational Resources Information Center
Onega, Tracy; Duell, Eric J.; Shi, Xun; Demidenko, Eugene; Goodman, David
2010-01-01
Context: Disparities in cancer care for rural residents and for African Americans have been documented, but the interaction of these factors is not well understood. Purpose: The authors examined the simultaneous influence of race and place of residence on access to and utilization of specialized cancer care in the United States. Methods: Access to…
A Tale of Two Cities: A Study of Access to Food, Lessons for Public Health Practice
ERIC Educational Resources Information Center
Caraher, Martin; Lloyd, Susan; Lawton, Julie; Singh, Gulab; Horsley, Kayt; Mussa, Fozia
2010-01-01
Objectives: To map food access in the city of Preston in the north-west of England in order to determine access, availability and affordability of healthy food options. Design and methodology: The research design employed a number of distinct methods including: surveys of shops; interviews with local people and shopkeepers; a cost and availability…
Spatial access to inpatient health care in northern rural India.
Ranga, Vikram; Panda, Pradeep
2014-05-01
Access to health care in rural areas is a major concern for local populations as well as for policy makers in developing countries. This paper examines spatial access to in-patient health care in northern rural India. In order to measure spatial access, impedance-based competition using the Three-Step floating Catchment Area (3SFCA) method, a modification of the simple gravity model, was used. 3SFCA was chosen for the study of the districts of Pratapgarh and Kanpur Dehat in the Uttar Pradesh state and Vaishali in the Bihar state, two of India's poorest states. This approach is based on discrete distance decay and also considers more parameters than other available methods, hence is believed to be a robust methodology. It was found that Vaishali district has the highest spatial access to in-patient health care followed by Pratapgarh and Kanpur Dehat. There is serious lack of health care, in Pratapgarh and Kanpur Dehat with 40% and 90% of the villages having shortage of in-patient care facilities in these respective districts. The most important factor affecting spatial access was found to be the distance to the nearest major urban agglomeration.
Moving toward a universally accessible web: Web accessibility and education.
Kurt, Serhat
2017-12-08
The World Wide Web is an extremely powerful source of information, inspiration, ideas, and opportunities. As such, it has become an integral part of daily life for a great majority of people. Yet, for a significant number of others, the internet offers only limited value due to the existence of barriers which make accessing the Web difficult, if not impossible. This article illustrates some of the reasons that achieving equality of access to the online world of education is so critical, explores the current status of Web accessibility, discusses evaluative tools and methods that can help identify accessibility issues in educational websites, and provides practical recommendations and guidelines for resolving some of the obstacles that currently hinder the achievability of the goal of universal Web access.
15 CFR 8c.50 - Program accessibility: Existing facilities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... accessibility requirements to the extent compelled by the Architectural Barriers Act of 1968, as amended (42 U.S.C. 4151-4157), and any regulations implementing it. In choosing among available methods for meeting...
Direct access: factors that affect physical therapist practice in the state of Ohio.
McCallum, Christine A; DiAngelis, Tom
2012-05-01
Direct access to physical therapist services is permitted by law in the majority of states and across all practice settings. Ohio enacted such legislation in 2004; however, it was unknown how direct access had affected actual clinical practice. The purpose of this study was to describe physical therapist and physical therapist practice environment factors that affect direct access practice. A 2-phase, mixed-method descriptive study was conducted. In the first phase, focus group interviews with 32 purposively selected physical therapists were completed, which resulted in 8 themes for an electronically distributed questionnaire. In the second phase, survey questionnaires were distributed to physical therapists with an e-mail address on file with the Ohio licensing board. An adjusted return rate of 23% was achieved. Data were analyzed for descriptive statistics. A constant comparative method assessed open-ended questions for common themes and patterns. Thirty-one percent of the respondents reported using direct access in physical therapist practice; however, 80% reported they would practice direct access if provided the opportunity. Physical therapists who practiced direct access were more likely to be in practice 6 years or more and hold advanced degrees beyond the entry level, were American Physical Therapy Association members, and had supportive management and organizational practice policies. The direct access physical therapist practice was generally a locally owned suburban private practice or a school-based clinic that saw approximately 6% to 10% of its patients by direct access. The majority of patients treated were adults with musculoskeletal or neuromuscular impairments. Nonresponse from e-mail may be associated with sample frame bias. Implementation of a direct access physical therapist practice model is evident in Ohio. Factors related to reimbursement and organizational policy appear to impede the process.
How Well Does Medicaid Work in Improving Access to Care?
Long, Sharon K; Coughlin, Teresa; King, Jennifer
2005-01-01
Objective To provide an assessment of how well the Medicaid program is working at improving access to and use of health care for low-income mothers. Data Source/Study Setting The 1997 and 1999 National Survey of America's Families, with state and county information drawn from the Area Resource File and other sources. Study Design Estimate the effects of Medicaid on access and use relative to private coverage and being uninsured, using instrumental variables methods to control for selection into insurance status. Data Collection/Extraction Method This study combines data from 1997 and 1999 for mothers in families with incomes below 200 percent of the federal poverty level. Principal Findings We find that Medicaid beneficiaries' access and use are significantly better than those obtained by the uninsured. Analysis that controls for insurance selection shows that the benefits of having Medicaid coverage versus being uninsured are substantially larger than what is estimated when selection is not accounted for. Our results also indicate that Medicaid beneficiaries' access and use are comparable to that of the low-income privately insured. Once insurance selection is controlled for, access and use under Medicaid is not significantly different from access and use under private insurance. Without controls for insurance selection, access and use for Medicaid beneficiaries is found to be significantly worse than for the low-income privately insured. Conclusions Our results show that the Medicaid program improved access to care relative to uninsurance for low-income mothers, achieving access and use levels comparable to those of the privately insured. Our results also indicate that prior research, which generally has not controlled for selection into insurance coverage, has likely understated the gains of Medicaid relative to uninsurance and overstated the gains of private coverage relative to Medicaid. PMID:15663701
Eng, Janice J; Noonan, Vanessa K; Townson, Andrea F; Higgins, Caroline E; Rogers, Jess; Wolfe, Dalton L
2014-12-23
It is not known whether ongoing access to a broad-based Internet knowledge resource can influence the practice of health care providers. We undertook a study to evaluate the impact of a Web-based knowledge resource on increasing access to evidence and facilitating best practice of health care providers. The objective of this study was to evaluate (1) the impact of the Spinal Cord Injury Rehabilitation Evidence (SCIRE) project on access to information for health care providers and researchers and (2) how SCIRE influenced health care providers' management of clients. A 4-part mixed methods evaluation was undertaken: (1) monitoring website traffic and utilization using Google Analytics, (2) online survey of users who accessed the SCIRE website, (3) online survey of targeted end-users, that is, rehabilitation health care providers known to work with spinal cord injury (SCI) clients, as well as researchers, and (4) focus groups with health care providers who had previously accessed SCIRE. The online format allowed the content for a relatively specialized field to have far reach (eg, 26 countries and over 6500 users per month). The website survey and targeted end-user survey confirmed that health care providers, as well as researchers perceived that the website increased their access to SCI evidence. Access to SCIRE not only improved knowledge of SCI evidence but helped inform changes to the health providers' clinical practice and improved their confidence in treating SCI clients. The SCIRE information directly influenced the health providers' clinical decision making, in terms of choice of intervention, equipment needs, or assessment tool. A Web-based knowledge resource may be a relatively inexpensive method to increase access to evidence-based information, increase knowledge of the evidence, inform changes to the health providers' practice, and influence their clinical decision making.
Pearson, Clare; Verne, Julia; Wells, Claudia; Polato, Giovanna M; Higginson, Irene J; Gao, Wei
2017-01-26
Geographical accessibility is important in accessing healthcare services. Measuring it has evolved alongside technological and data analysis advances. High correlations between different methods have been detected, but no comparisons exist in the context of palliative and end of life care (PEoLC) studies. To assess how geographical accessibility can affect PEoLC, selection of an appropriate method to capture it is crucial. We therefore aimed to compare methods of measuring geographical accessibility of decedents to PEoLC-related facilities in South London, an area with well-developed SPC provision. Individual-level death registration data in 2012 (n = 18,165), from the Office for National Statistics (ONS) were linked to area-level PEoLC-related facilities from various sources. Simple and more complex measures of geographical accessibility were calculated using the residential postcodes of the decedents and postcodes of the nearest hospital, care home and hospice. Distance measures (straight-line, travel network) and travel times along the road network were compared using geographic information system (GIS) mapping and correlation analysis (Spearman rho). Borough-level maps demonstrate similarities in geographical accessibility measures. Strong positive correlation exist between straight-line and travel distances to the nearest hospital (rho = 0.97), care home (rho = 0.94) and hospice (rho = 0.99). Travel times were also highly correlated with distance measures to the nearest hospital (rho range = 0.84-0.88), care home (rho = 0.88-0.95) and hospice (rho = 0.93-0.95). All correlations were significant at p < 0.001 level. Distance-based and travel-time measures of geographical accessibility to PEoLC-related facilities in South London are similar, suggesting the choice of measure can be based on the ease of calculation.
Schedulers with load-store queue awareness
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Tong; Eichenberger, Alexandre E.; Jacob, Arpith C.
2017-02-07
In one embodiment, a computer-implemented method includes tracking a size of a load-store queue (LSQ) during compile time of a program. The size of the LSQ is time-varying and indicates how many memory access instructions of the program are on the LSQ. The method further includes scheduling, by a computer processor, a plurality of memory access instructions of the program based on the size of the LSQ.
Schedulers with load-store queue awareness
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Tong; Eichenberger, Alexandre E.; Jacob, Arpith C.
2017-01-24
In one embodiment, a computer-implemented method includes tracking a size of a load-store queue (LSQ) during compile time of a program. The size of the LSQ is time-varying and indicates how many memory access instructions of the program are on the LSQ. The method further includes scheduling, by a computer processor, a plurality of memory access instructions of the program based on the size of the LSQ.
Widome, Rachel; Forster, Jean L.; Hannan, Peter J.; Perry, Cheryl L.
2008-01-01
OBJECTIVES To measure community-level changes in the methods youth use to obtain cigarettes over time and to relate these methods to the progression of smoking. METHODS We analyzed 2000-2003 data from the Minnesota Adolescent Community Cohort study, where youth (beginning at age 12), who were living in Minnesota at baseline, were surveyed every six months via telephone. We conducted mixed model repeated measures logistic regression to obtain probabilities of cigarette access methods among past 30-day smokers (n = 340 at baseline). RESULTS The probability of obtaining cigarettes from a commercial source in the past month declined from 0.36 at baseline to 0.22 at the sixth survey point while the probability of obtaining cigarettes from a social source during the previous month increased from 0.54 to 0.76 (p for both trends = 0.0001). At the community level, the likelihood of adolescents obtaining cigarettes from social sources was inversely related to the likelihood of progressing to heavy smoking (p < 0.001). CONCLUSIONS During this time, youth shifted to greater reliance on social sources and less on commercial sources. A trend toward less commercial access to cigarettes accompanied by an increase in social access may translate to youth being less likely to progress to heavier smoking. PMID:17719080
Unbundling in Current Broadband and Next-Generation Ultra-Broadband Access Networks
NASA Astrophysics Data System (ADS)
Gaudino, Roberto; Giuliano, Romeo; Mazzenga, Franco; Valcarenghi, Luca; Vatalaro, Francesco
2014-05-01
This article overviews the methods that are currently under investigation for implementing multi-operator open-access/shared-access techniques in next-generation access ultra-broadband architectures, starting from the traditional "unbundling-of-the-local-loop" techniques implemented in legacy twisted-pair digital subscriber line access networks. A straightforward replication of these copper-based unbundling-of-the-local-loop techniques is usually not feasible on next-generation access networks, including fiber-to-the-home point-to-multipoint passive optical networks. To investigate this issue, the article first gives a concise description of traditional copper-based unbundling-of-the-local-loop solutions, then focalizes on both next-generation access hybrid fiber-copper digital subscriber line fiber-to-the-cabinet scenarios and on fiber to the home by accounting for the mix of regulatory and technological reasons driving the next-generation access migration path, focusing mostly on the European situation.
Santos, Melissa Costa; Tesser, Charles Dalcanale
2012-11-01
The rendering of integrated and complementary practices in the Brazilian Unified Health System is fostered to increase the comprehensiveness of care and access to same, though it is a challenge to incorporate them into the services. Our objective is to provide a simple method of implementation of such practices in Primary Healthcare, derived from analysis of experiences in municipalities, using partial results of a master's thesis that employed research-action methodology. The method involves four stages: 1 - defininition of a nucleus responsible for implementation and consolidation thereof; 2 - situational analysis, with definition of the existing competent professionals; 3 - regulation, organization of access and legitimation; and 4 - implementation cycle: local plans, mentoring and ongoing education in health. The phases are described, justified and briefly discussed. The method encourages the development of rational and sustainable actions, sponsors participatory management, the creation of comprehensivenessand the broadening of care provided in Primary Healthcare by offering progressive and sustainable comprehensive and complementary practices.
Huang, Chunqiong; Liu, Guodao; Bai, Changjun; Wang, Wenqiang
2014-10-21
Although Cynodon dactylon (C. dactylon) is widely distributed in China, information on its genetic diversity within the germplasm pool is limited. The objective of this study was to reveal the genetic variation and relationships of 430 C. dactylon accessions collected from 22 Chinese provinces using sequence-related amplified polymorphism (SRAP) markers. Fifteen primer pairs were used to amplify specific C. dactylon genomic sequences. A total of 481 SRAP fragments were generated, with fragment sizes ranging from 260-1800 base pairs (bp). Genetic similarity coefficients (GSC) among the 430 accessions averaged 0.72 and ranged from 0.53-0.96. Cluster analysis conducted by two methods, namely the unweighted pair-group method with arithmetic averages (UPGMA) and principle coordinate analysis (PCoA), separated the accessions into eight distinct groups. Our findings verify that Chinese C. dactylon germplasms have rich genetic diversity, which is an excellent basis for C. dactylon breeding for new cultivars.
Non-unique key B-Tree implementation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ries, D.R.
1980-12-23
The B-Trees are an indexed method to allow fast retrieval and order preserving updates to a FRAMIS relation based on a designated set of keys in the relation. A B-Tree access method is being implemented to provide indexed and sequential (in index order) access to FRAMIS relations. The implementation modifies the basic B-Tree structure to correctly allow multiple key values and still maintain the balanced page fill property of B-Trees. The data structures of the B-Tree are presented first, including the FRAMIS solution to the duplicate key value problem. Then the access level routines and utilities are presented. These routinesmore » include the original B-Tree creation; searching the B-Tree; and inserting, deleting, and replacing tuples on the B-Tree. In conclusion, the uses of the B-Tree access structures at the semantic level to enhance the FRAMIS performance are discussed. 10 figures.« less
A simple method for long-term biliary access in large animals.
Andrews, J C; Knutsen, C; Smith, P; Prieskorn, D; Crudip, J; Klevering, J; Ensminger, W D
1988-07-01
A simple method to obtain long-term access to the biliary tree in dogs and pigs is presented. In ten dogs and four pigs, a cholecystectomy was performed, the cystic duct isolated, and a catheter inserted into the cut end of the cystic duct. The catheter was connected to a subcutaneous infusion port, producing a closed, internal system to allow long-term access. The catheter placement was successful in three of the pigs and all of the dogs. Thirty-five cholangiograms were obtained in the 13 subjects by accessing the port with a 20 gauge Huber needle and injecting small amounts (4-10 mL) of contrast under fluoroscopic control. Cholangiograms were obtained up to four months after catheter placement without evidence for catheter failure or surgically induced changes in the biliary tree. This model provides a simple, reliable means to obtain serial cholangiograms in a research setting.
Open-access microfluidic patch-clamp array with raised lateral cell trapping sites.
Lau, Adrian Y; Hung, Paul J; Wu, Angela R; Lee, Luke P
2006-12-01
A novel open-access microfluidic patch-clamp array chip with lateral cell trapping sites raised above the bottom plane of the chip was developed by combining both a microscale soft-lithography and a macroscale polymer fabrication method. This paper demonstrates the capability of using such an open-access fluidic system for patch-clamp measurements. The surface of the open-access patch-clamp sites prepared by the macroscale hole patterning method of soft-state elastic polydimethylsiloxane (PDMS) is examined; the seal resistances are characterized and correlated with the aperture dimensions. Whole cell patch-clamp measurements are carried out with CHO cells expressing Kv2.1 ion channels. Kv2.1 ion channel blocker (TEA) dosage response is characterized and the binding activity is examined. The results demonstrate that the system is capable of performing whole cell measurements and drug profiling in a more efficient manner than the traditional patch-clamp set-up.
Lei, Chunyang; Bie, Hongxia; Fang, Gengfa; Gaura, Elena; Brusey, James; Zhang, Xuekun; Dutkiewicz, Eryk
2016-07-18
Super dense wireless sensor networks (WSNs) have become popular with the development of Internet of Things (IoT), Machine-to-Machine (M2M) communications and Vehicular-to-Vehicular (V2V) networks. While highly-dense wireless networks provide efficient and sustainable solutions to collect precise environmental information, a new channel access scheme is needed to solve the channel collision problem caused by the large number of competing nodes accessing the channel simultaneously. In this paper, we propose a space-time random access method based on a directional data transmission strategy, by which collisions in the wireless channel are significantly decreased and channel utility efficiency is greatly enhanced. Simulation results show that our proposed method can decrease the packet loss rate to less than 2 % in large scale WSNs and in comparison with other channel access schemes for WSNs, the average network throughput can be doubled.
Spatial accessibility to vaccination sites in a campaign against rabies in São Paulo city, Brazil.
Polo, Gina; Acosta, Carlos Mera; Dias, Ricardo Augusto
2013-08-01
It is estimated that the city of São Paulo has over 2.5 million dogs and 560 thousand cats. These populations are irregularly distributed throughout the territory, making it difficult to appropriately allocate health services focused on these species. To reasonably allocate vaccination sites, it is necessary to identify social groups and their access to the referred service. Rabies in dogs and cats has been an important zoonotic health issue in São Paulo and the key component of rabies control is vaccination. The present study aims to introduce an approach to quantify the potential spatial accessibility to the vaccination sites of the 2009 campaign against rabies in the city of São Paulo and solve the overestimation associated with the classic methodology that applies buffer zones around vaccination sites based on Euclidean (straight-line) distance. To achieve this, a Gaussian-based two-step floating catchment area method with a travel-friction coefficient was adapted in a geographic information system environment, using distances along a street network based on Dijkstra's algorithm (short path method). The choice of the distance calculation method affected the results in terms of the population covered. In general, areas with low accessibility for both dogs and cats were observed, especially in densely populated areas. The eastern zone of the city had higher accessibility values compared with peripheral and central zones. The Gaussian-based two-step floating catchment method with a travel-friction coefficient was used to assess the overestimation of the straight-line distance method, which is the most widely used method for coverage analysis. We conclude that this approach has the potential to improve the efficiency of resource use when planning rabies control programs in large urban environments such as São Paulo. The findings emphasize the need for surveillance and intervention in isolated areas. Copyright © 2013 Elsevier B.V. All rights reserved.
Research on Rural Residence and Access to Drug Abuse Services: Where Are We and where Do We Go?
ERIC Educational Resources Information Center
Borders, Tyrone F.; Booth, Brenda M.
2007-01-01
Context: Illicit drug use is common in rural areas, but very little research has investigated rural populations' access to drug abuse services. Purpose: To describe the current state of the scientific literature on access to drug abuse services in rural areas and suggest directions for future research. Methods: We performed a literature review of…
New Tools to Convert PDF Math Contents into Accessible e-Books Efficiently.
Suzuki, Masakazu; Terada, Yugo; Kanahori, Toshihiro; Yamaguchi, Katsuhito
2015-01-01
New features in our math-OCR software to convert PDF math contents into accessible e-books are shown. A method for recognizing PDF is thoroughly improved. In addition, contents in any selected area including math formulas in a PDF file can be cut and pasted into a document in various accessible formats, which is automatically recognized and converted into texts and accessible math formulas through this process. Combining it with our authoring tool for a technical document, one can easily produce accessible e-books in various formats such as DAISY, accessible EPUB3, DAISY-like HTML5, Microsoft Word with math objects and so on. Those contents are useful for various print-disabled students ranging from the blind to the dyslexic.
Towards an Approach of Semantic Access Control for Cloud Computing
NASA Astrophysics Data System (ADS)
Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai
With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.
Chu, Carissa; Masic, Selma; Usawachintachit, Manint; Hu, Weiguo; Yang, Wenzeng; Stoller, Marshall; Li, Jianxing
2016-01-01
Abstract Ultrasound-guided renal access for percutaneous nephrolithotomy (PCNL) is a safe, effective, and low-cost procedure commonly performed worldwide, but a technique underutilized by urologists in the United States. The purpose of this article is to familiarize the practicing urologist with methods for ultrasound guidance for percutaneous renal access. We discuss two alternative techniques for gaining renal access for PCNL under ultrasound guidance. We also describe a novel technique of using the puncture needle to reposition residual stone fragments to avoid additional tract dilation. With appropriate training, ultrasound-guided renal access for PCNL can lead to reduced radiation exposure, accurate renal access, and excellent stone-free success rates and clinical outcomes. PMID:26414304
2012-01-01
Background The purpose of the research was to assess access to sexual and reproductive health services for migrant women who work as beer promoters. This mixed methods research was conducted in Phnom Penh, Cambodia, Bangkok, Thailand, Vientiane, Laos, and Hanoi, Vietnam during 2010 to 2011. Methods Focus groups were held with beer promoters and separate focus groups or interviews with key informants to explore the factors affecting beer promoters’ access to health care institutions for reproductive health care. The findings of the focus groups were used to develop a survey for beer promoters. This survey was conducted in popular health institutions for these women in each of the four Asian cities. Results Several common themes were evident. Work demands prevented beer promoters from accessing health care. Institutional factors affecting care included cost, location, environmental factors (e.g. waiting times, cleanliness and confidentiality) and service factors (e.g. staff attitudes, clinic hours, and availability of medications). Personal factors affecting access were shyness and fear, lack of knowledge, and support from family and friends. The survey of the beer promoters confirmed that cost, location and both environmental and service factors impact on access to health care services for beer promoters. Many beer promoters are sexually active, and a significant proportion of those surveyed rely on sex work to supplement their income. Many also drink with their clients. Despite a few differences amongst the surveyed population, the findings were remarkably similar across the four research sites. Conclusions Recommendations from the research include the provision of evening and weekend clinic hours to facilitate access, free or low cost clinics, and health insurance through employer or government plans which are easy to access for migrants. Other improvements that would facilitate the access of beer promoters to these services include increased funding to hire more staff (reducing waiting times) and to stock more needed medications, mobile clinics to come to the workplace or free transportation for beer promoters to the clinics, improved training to reduce health care provider stigma against beer promoters, and public education about the importance of reproductive health care, including preventative services. PMID:22747607
Analysis of astronomical data from optical superconducting tunnel junctions
NASA Astrophysics Data System (ADS)
de Bruijne, J. H.; Reynolds, A. P.; Perryman, Michael A.; Favata, Fabio; Peacock, Anthony J.
2002-06-01
Currently operating optical superconducting tunnel junction (STJ) detectors, developed at the European Space Agency (ESA), can simultaneously measure the wavelength ((Delta) (gamma) equals 50 nm at 500 nm) and arrival time (to within approximately 5 microsecond(s) ) of individual photons in the range 310 to 720 nm with an efficiency of approximately 70%, and with count rates of the order of 5000 photons s-1 per junction. A number of STJs placed in an array format generates 4-D data: photon arrival time, energy, and array element (X,Y). Such STJ cameras are ideally suited for, e.g., high-time-resolution spectrally resolved monitoring of variable sources or low- resolution spectroscopy of faint extragalactic objects. The reduction of STJ data involves detector efficiency correction, atmospheric extinction correction, sky background subtraction, and, unlike that of data from CCD-based systems, a more complex energy calibration, barycentric arrival time correction, energy range selection, and time binning; these steps are, in many respects, analogous to procedures followed in high-energy astrophysics. We discuss these calibration steps in detail using a representative observation of the cataclysmic variable UZ Fornacis; these data were obtained with ESA's S-Cam2 6 X 6-pixel device. We furthermore discuss issues related to telescope pointing and guiding, differential atmospheric refraction, and atmosphere-induced image motion and image smearing (`seeing') in the focal plane. We also present a simple and effective recipe for extracting the evolution of atmospheric seeing with time from any science exposure and discuss a number of caveats in the interpretation of STJ-based time-binned data, such as light curves and hardness ratio plots.
Pan, Jay; Zhao, Hanqing; Wang, Xiuli; Shi, Xun
2016-12-01
In 2009, the Chinese government launched a new round of healthcare reform, which encourages development of private hospitals. Meanwhile, many public hospitals in China also became increasingly profit-oriented. These trends have led to concerns about social justice and regional disparity. However, there is a lack of empirical scientific analysis to support the debate. We started to fill this gap by conducting a regional-level analysis of spatial variation in spatial access to hospitals in the Sichuan Province. Such variation is an important indication of (in) equity in healthcare resource allocation. Using data of 2012, we intended to provide a snapshot of the situation that was a few years later since the new policies had set out. We employed two methods to quantify the spatial access: the nearest-neighbor method and the enhanced two-step floating catchment area (E2SFCA) method. We recognized two sub-regions of Sichuan: the rural West Sichuan and the well-developed East Sichuan. We classified the hospitals using both ownership and level. We applied the analysis to the resulting groups of hospitals and their combinations in the two sub-regions. The two sub-regions have a high contrast in the spatial access to hospitals, in terms of both quantity and spatial pattern. Public hospitals still dominated the service in the province, especially in the West Sichuan, which had been solely relying on public hospitals. Private hospitals only occurred in the East Sichuan, and at the primary level, they had surpassed public hospitals in terms of spatial accessibility. However, the governmental health expenditures seemed to be disconnected with the actual situation of the spatial access to hospitals. The government should continue carrying on its responsibility in allocating healthcare resources, be cautious about marketizing public hospitals, and encourage private hospitals to expand into rural areas. Methodologically, the results from the two methods are concurring but not identical. The E2SFCA method calculates population-adjusted density of hospitals, which measures deviation from the expected pattern, and therefore is more meaningful in assessing associations of the spatial access to hospitals with other factors (e.g., population density and investment). Copyright © 2016 Elsevier Ltd. All rights reserved.
Web accessibility support for visually impaired users using link content analysis.
Iwata, Hajime; Kobayashi, Naofumi; Tachibana, Kenji; Shirogane, Junko; Fukazawa, Yoshiaki
2013-12-01
Web pages are used for a variety of purposes. End users must understand dynamically changing content and sequentially follow page links to find desired material, requiring significant time and effort. However, for visually impaired users using screen readers, it can be difficult to find links to web pages when link text and alternative text descriptions are inappropriate. Our method supports the discovery of content by analyzing 8 categories of link types, and allows visually impaired users to be aware of the content represented by links in advance. This facilitates end users access to necessary information on web pages. Our method of classifying web page links is therefore effective as a means of evaluating accessibility.
Direct access midwifery booking for prenatal care and its role in Down syndrome screening.
Nawaz, Tariq S; Tringham, Gillian M; Holding, Stephen; McFarlane, Jane; Lindow, Stephen W
2011-10-01
To compare the uptake of Down syndrome screening by women following referral by direct access and general practitioner (GP) modes. The method of referral by either GP or direct access, for women who booked into prenatal care in Hull and East Yorkshire in 2010, was analysed using data collected from the Protos database at the Women and Children's Hospital, Hull. Subsequently, the uptake of first and second trimester screening for Down syndrome was reviewed by combining the Protos database to the screening data collected by the Clinical Biochemistry Laboratory at Hull Royal Infirmary, Hull. Women booked into prenatal care significantly earlier when referred by GP in comparison to direct access with a significant difference in screening uptake of 49.5 and 42.7%, respectively. The ratio of uptake between first and second trimester screening was not significantly different. Further research on the new direct access method of referral is required, as it may have a role in the uptake of prenatal screening for Down syndrome. More time is needed to show a definitive effect. Copyright © 2011 John Wiley & Sons, Ltd.
Yang, Dan; Xu, Bin; Rao, Kaiyou; Sheng, Weihua
2018-01-24
Indoor occupants' positions are significant for smart home service systems, which usually consist of robot service(s), appliance control and other intelligent applications. In this paper, an innovative localization method is proposed for tracking humans' position in indoor environments based on passive infrared (PIR) sensors using an accessibility map and an A-star algorithm, aiming at providing intelligent services. First the accessibility map reflecting the visiting habits of the occupants is established through the integral training with indoor environments and other prior knowledge. Then the PIR sensors, which placement depends on the training results in the accessibility map, get the rough location information. For more precise positioning, the A-start algorithm is used to refine the localization, fused with the accessibility map and the PIR sensor data. Experiments were conducted in a mock apartment testbed. The ground truth data was obtained from an Opti-track system. The results demonstrate that the proposed method is able to track persons in a smart home environment and provide a solution for home robot localization.
Yang, Dan; Xu, Bin; Rao, Kaiyou; Sheng, Weihua
2018-01-01
Indoor occupants’ positions are significant for smart home service systems, which usually consist of robot service(s), appliance control and other intelligent applications. In this paper, an innovative localization method is proposed for tracking humans’ position in indoor environments based on passive infrared (PIR) sensors using an accessibility map and an A-star algorithm, aiming at providing intelligent services. First the accessibility map reflecting the visiting habits of the occupants is established through the integral training with indoor environments and other prior knowledge. Then the PIR sensors, which placement depends on the training results in the accessibility map, get the rough location information. For more precise positioning, the A-start algorithm is used to refine the localization, fused with the accessibility map and the PIR sensor data. Experiments were conducted in a mock apartment testbed. The ground truth data was obtained from an Opti-track system. The results demonstrate that the proposed method is able to track persons in a smart home environment and provide a solution for home robot localization. PMID:29364188
Machiyama, Kazuyo; Cleland, John
2014-06-01
In Ghana, despite a 38 percent decline in the total fertility rate from 1988 to 2008, unmet need for family planning among married women exposed to pregnancy risk declined only modestly in this period: from 50 percent to 42 percent. Examining data from the five DHS surveys conducted in Ghana during these years, we find that the relative contribution to unmet need of lack of access to contraceptive methods has diminished, whereas attitudinal resistance has grown. In 2008, 45 percent of women with unmet need experienced no apparent obstacles associated with access or attitude, 32 percent had access but an unfavorable attitude, and 23 percent had no access. Concerns regarding health as a reason for nonuse have been reported in greater numbers over these years and are now the dominant reason, followed by infrequent sex. An enduring resistance to hormonal methods, much of it based on prior experience of side effects, may lead many Ghanaian women, particularly the educated in urban areas, to use periodic abstinence or reduced coital frequency as an alternative to modern contraception. © 2013 The Population Council, Inc.
The last bite was deadly--about responsibility in scientific publishing.
Pavlovic, Dragan; Usichenko, Taras I; Lehmann, Christian
2014-01-01
Some open access journals are believed to have devaluated the highly respected image of the scientific journal. This has been, it is claimed, verified. Yet the project we believe failed and we show why we think that it failed. The study itself was badly conducted and the report, which Science published, was itself a perfect example of "bad science". If the article that was published in Science were to be taken as one of the "test" articles and Science as a victim journal (a perfect control though), the study would show the opposite of what author concluded in his paper: 100% of the controls (normal non-open access journals, in the present study this was Science) accepted the "bait" paper for publication, while in the experimental group only about 60% (open access journals) accepted the bait paper for publication. The conclusion is that, with respect to non-open access and open access, the probability of accepting pseudoscience is well in favor of this being done by a non-open access journal. Since this interpretation is based on some facts that were not included in the project itself, the only warranted result of this study would be that nothing could be concluded from it. It is concluded that the method that Bohannon used was heavily flawed and in addition immoral; that the report that was published by Science was inconclusive and that the act of publishing such report cannot be morally justified either. Various methods to improve the quality of published papers exist but scientific fraud with "good intentions" as a method to promote scientific publishing should be avoided.
Map data-driven assessment of urban areas accessibility
NASA Astrophysics Data System (ADS)
Parygin, D. S.; Aleshkevich, A. A.; Golubev, A. V.; Smykovskaya, T. K.; Finogeev, A. G.
2018-05-01
The study analyzes the existing approaches to assessment of the city territory transport accessibility. The method for the city territory sections connectedness assessment through the personal and public transport was developed. The assessment of transport accessibility is proposed based on an analysis of open cartographic data. The technology of calculation and visualization of urban areas interconnectedness with the use of a street network graph and public transport routes, data obtained from Internet map services have been developed. An example of territory accessibility assessments visualization on an online map is given.
Code of Federal Regulations, 2014 CFR
2014-01-01
... alternative storage method. (d) Access to and retrieval of records during a record hold. The record retention program of each regulated entity or the Office of Finance shall ensure access to and retrieval of records... records and existing information technology. ...
Code of Federal Regulations, 2013 CFR
2013-01-01
... alternative storage method. (d) Access to and retrieval of records during a record hold. The record retention program of each regulated entity or the Office of Finance shall ensure access to and retrieval of records... records and existing information technology. ...
Code of Federal Regulations, 2012 CFR
2012-01-01
... alternative storage method. (d) Access to and retrieval of records during a record hold. The record retention program of each regulated entity or the Office of Finance shall ensure access to and retrieval of records... records and existing information technology. ...
Profiling a Periodicals Collection
ERIC Educational Resources Information Center
Bolgiano, Christina E.; King, Mary Kathryn
1978-01-01
Libraries need solid information upon which to base collection development decisions. Specific evaluative methods for determining scope, access, and usefullness are described. Approaches used for data collection include analysis of interlibrary loan requests, comparison with major bibliographies, and analysis of accessibility through available…
DOT National Transportation Integrated Search
1974-06-01
The report synthesizes a set of satellite communications systems configurations to provide services to aircraft flying oceanic routes. These configurations are combined with access control methods to form complete systems. These systems are analyzed ...
Nahar, Nazmun; Mondal, Utpal Kumar; Sultana, Rebeca; Hossain, M Jahangir; Khan, M Salah Uddin; Gurley, Emily S; Oliveras, Elizabeth; Luby, Stephen P
2013-09-01
People in Bangladesh frequently drink fresh date palm sap. Fruit bats (Pteropus giganteus) also drink raw sap and may contaminate the sap by shedding Nipah virus through saliva and urine. In a previous study we identified two indigenous methods to prevent bats accessing the sap, bamboo skirts and lime (calcium carbonate). We conducted a pilot study to assess the acceptability of these two methods among sap harvesters. We used interactive community meetings and group discussions to encourage all the sap harvesters (n = 12) from a village to use either bamboo skirts or lime smear that some of them (n = 4) prepared and applied. We measured the preparation and application time and calculated the cost of bamboo skirts. We conducted interviews after the use of each method. The sap harvesters found skirts effective in preventing bats from accessing sap. They were sceptical that lime would be effective as the lime was washed away by the sap flow. Preparation of the skirt took ∼105 min. The application of each method took ∼1 min. The cost of the bamboo skirt is minimal because bamboo is widely available and they made the skirts with pieces of used bamboo. The bamboo skirt method appeared practical and affordable to the sap harvesters. Further studies should explore its ability to prevent bats from accessing date palm sap and assess if its use produces more or better quality sap, which would provide further incentives to make it more acceptable for its regular use.
ERIC Educational Resources Information Center
Packer, Jaclyn; Reuschel, William
2018-01-01
Introduction: Accessibility of Voice over Internet Protocol (VoIP) systems was tested with a hands-on usability study and an online survey of VoIP users who are visually impaired. The survey examined the importance of common VoIP features, and both methods assessed difficulty in using those features. Methods: The usability test included four paid…
Indexing and retrieving point and region objects
NASA Astrophysics Data System (ADS)
Ibrahim, Azzam T.; Fotouhi, Farshad A.
1996-03-01
R-tree and its variants are examples of spatial data structures for paged-secondary memory. To process a query, these structures require multiple path traversals. In this paper, we present a new image access method, SB+-tree which requires a single path traversal to process a query. Also, SB+-tree will allow commercial databases an access method for spatial objects without a major change, since most commercial databases already support B+-tree as an access method for text data. The SB+-tree can be used for zero and non-zero size data objects. Non-zero size objects are approximated by their minimum bounding rectangles (MBRs). The number of SB+-trees generated is dependent upon the number of dimensions of the approximation of the object. The structure supports efficient spatial operations such as regions-overlap, distance and direction. In this paper, we experimentally and analytically demonstrate the superiority of SB+-tree over R-tree.
Being Single as a Social Barrier to Access Reproductive Healthcare Services by Iranian Girls
Kohan, Shahnaz; Mohammadi, Fatemeh; Mostafavi, Firoozeh; Gholami, Ali
2017-01-01
Background: Iranian single women are deprived of reproductive healthcare services, though the provision of such services to the public has increased. This study aimed to explore the experiences of Iranian single women on their access to reproductive health services. Methods: A qualitative design using a conventional content analysis method was used. Semi-structured interviews were held with 17 single women and nine health providers chosen using the purposive sampling method. Results: Data analysis resulted in the development of three categories: ‘family’s attitudes and performance about single women’s reproductive healthcare,’ ‘socio-cultural factors influencing reproductive healthcare,’ and ‘cultural factors influencing being a single woman.’ Conclusion: Cultural and contextual factors affect being a single woman in every society. Therefore, healthcare providers need to identify such factors during the designing of strategies for improving the facilitation of access to reproductive healthcare services. PMID:28812794
Rocha, Thiago Augusto Hernandes; da Silva, Núbia Cristina; Amaral, Pedro Vasconcelos; Barbosa, Allan Claudius Queiroz; Rocha, João Victor Muniz; Alvares, Viviane; de Almeida, Dante Grapiuna; Thumé, Elaine; Thomaz, Erika Bárbara Abreu Fonseca; de Sousa Queiroz, Rejane Christine; de Souza, Marta Rovery; Lein, Adriana; Lopes, Daniel Paulino; Staton, Catherine A; Vissoci, João Ricardo Nickenig; Facchini, Luiz Augusto
2017-08-22
Unequal distribution of emergency care services is a critical barrier to be overcome to assure access to emergency and surgical care. Considering this context it was objective of the present work analyze geographic access barriers to emergency care services in Brazil. A secondary aim of the study is to define possible roles to be assumed by small hospitals in the Brazilian healthcare network to overcome geographic access challenges. The present work can be classified as a cross-sectional ecological study. To carry out the present study, data of all 5843 Brazilian hospitals were categorized among high complexity centers and small hospitals. The geographical access barriers were identified through the use of two-step floating catchment area method. Once concluded the previous step an evaluation using the Getis-Ord-Gi method was performed to identify spatial clusters of municipalities with limited access to high complexity centers but well covered by well-equipped small hospitals. The analysis of accessibility index of high complexity centers highlighted large portions of the country with nearly zero hospital beds by inhabitant. In contrast, it was possible observe a group of 1595 municipalities with high accessibility to small hospitals, simultaneously with a low coverage of high complexity centers. Among the 1595 municipalities with good accessibility to small hospitals, 74% (1183) were covered by small hospitals with at least 60% of minimum emergency service requirements. The spatial clusters analysis aggregated 589 municipalities with high values related to minimum emergency service requirements. Small hospitals in these 589 cities could promote the equity in access to emergency services benefiting more than eight million people. There is a spatial disequilibrium within the country with prominent gaps in the health care network for emergency services. Taking this challenge into consideration, small hospitals could be a possible solution and foster equity in access to emergency and surgical care. However more investments in are necessary to improve small hospitals capabilities to fill this gap.
Onsite Provision of Specialized Contraceptive Services: Does Title X Funding Enhance Access?
Riedel, Julie Cross; Menz, Mary; Darney, Philip D.; Brindis, Claire D.
2014-01-01
Abstract Background: This article presents the extent to which providers enrolled in California's Family Planning, Access, Care, and Treatment (Family PACT) program offer contraceptive methods onsite, thus eliminating one important access barrier. Family PACT has a diverse provider network, including public-sector providers receiving Title X funding, public-sector providers not receiving Title X funding, and private-sector providers. We explored whether Title X funding enhances providers' ability to offer contraceptive methods that require specialized skills onsite. Methods: Data were derived from 1,072 survey responses to a 2010 provider-capacity survey matched by unique identifier to administrative claims data. Results: A significantly greater proportion of Title X–funded providers compared to non–Title X public and private providers offered onsite services for the following studied methods: intrauterine contraceptives (90% Title X, 51% public non–Title X, 38% private); contraceptive implants (58% Title X, 19% public non–Title X, 7% private); vasectomy (8% Title X, 4% public non–Title X, 1% private); and fertility-awareness methods (69% Title X, 55% public non–Title X, 49% private) (all p<0.0001). The association between onsite provision and Title X funding remained after stratifying individually by clinic specialty, facility capacity to provide reproductive health services (based on staffing), and rural/urban location. Conclusions: Extra funding for publicly funded family-planning programs, through mechanisms such as Title X, appears to be associated with increased onsite access to a wide range of contraceptive services, including those that require special skills and training. PMID:24405313
Souliotis, Kyriakos; Papageorgiou, Manto; Politi, Anastasia; Ioakeimidis, Dimitrios; Sidiropoulos, Prodromos
2014-01-01
The latest regulatory change in the distribution system of biologic disease-modifying, antirheumatic drugs limited their sale only through the designated pharmacies of the National Organization for Healthcare Services Provision (EOPYY) or the National Health System (NHS) hospitals, adding to the complexity of access to effective treatment for rheumatoid arthritis (RA) in Greece. The aim of this paper was to assess the barriers to access RA treatment, by recording patients', rheumatologists' and EOPYY pharmacists' experiences. One twenty-three patients, 12 rheumatologists and 27 pharmacists from Athens and other urban areas in Greece participated in the study. Three types of standardized questionnaires were used to elicit information from each group of respondents using the method of personal interview for patients and the method of postal survey for doctors and pharmacists. During the last year, 26% of patients encountered problems in accessing their rheumatologist and 49% of patients experienced difficulties in accessing their medication. Ninety-two percent of rheumatologists and 96% of pharmacists confirmed that patients experience difficulties in accessing RA medication. The most commonly reported reasons for reduced access to medical treatment were travel difficulties and long distance from doctor's clinic, as well as delays in booking an appointment. The most frequently reported barriers to access pharmaceutical treatment were difficulties in the prescription process, distance from EOPYY pharmacies and medicine shortages in NHS hospitals. The study showed that RA patients are facing increased barriers to access timely and effective treatment. Redesign of the current system of distribution ensuring the operation of additional points of sale is deemed necessary.
Insurance + Access ≠ Health Care: Typology of Barriers to Health Care Access for Low-Income Families
DeVoe, Jennifer E.; Baez, Alia; Angier, Heather; Krois, Lisa; Edlund, Christine; Carney, Patricia A.
2007-01-01
PURPOSE Public health insurance programs have expanded coverage for the poor, and family physicians provide essential services to these vulnerable populations. Despite these efforts, many Americans do not have access to basic medical care. This study was designed to identify barriers faced by low-income parents when accessing health care for their children and how insurance status affects their reporting of these barriers. METHODS A mixed methods analysis was undertaken using 722 responses to an open-ended question on a health care access survey instrument that asked low-income Oregon families, “Is there anything else you would like to tell us?” Themes were identified using immersion/crystallization techniques. Pertinent demographic attributes were used to conduct matrix coded queries. RESULTS Families reported 3 major barriers: lack of insurance coverage, poor access to services, and unaffordable costs. Disproportionate reporting of these themes was most notable based on insurance status. A higher percentage of uninsured parents (87%) reported experiencing difficulties obtaining insurance coverage compared with 40% of those with insurance. Few of the uninsured expressed concerns about access to services or health care costs (19%). Access concerns were the most common among publicly insured families, and costs were more often mentioned by families with private insurance. Families made a clear distinction between insurance and access, and having one or both elements did not assure care. Our analyses uncovered a 3-part typology of barriers to health care for low-income families. CONCLUSIONS Barriers to health care can be insurmountable for low-income families, even those with insurance coverage. Patients who do not seek care in a family medicine clinic are not necessarily getting their care elsewhere. PMID:18025488
Lu, Christine Y; Ritchie, Jan; Williams, Ken; Day, Ric
2007-01-01
Background In Australia, government-subsidised access to high-cost medicines is "targeted" to particular sub-sets of patients under the Pharmaceutical Benefits Scheme to achieve cost-effective use. In order to determine how this access system could be improved, the opinions of key stakeholders on access to biological agents for rheumatoid arthritis were explored. Methods Thirty-six semi-structured interviews were conducted with persons from relevant stakeholder groups. These were transcribed verbatim, and analysed thematically. Results Controlled access to expensive medicines was considered to be equitable and practical; however, there was disagreement as to the method of defining the target patient populations. Other concerns included timeliness of access, excessive bureaucracy, and the need for additional resources to facilitate the scheme. Collaboration between stakeholders was deemed important because it allows more equitable distribution of limited resources. The majority considered that stakeholder consultation should have been broader. Most wanted increased transparency of the decision-making process, ongoing and timely review of access criteria, and an increased provision of information for patients. More structured communication between stakeholders was proposed. Conclusion The Pharmaceutical Benefit Scheme is adapting to meet the changing needs of patients. Provision of subsidised access to high-cost medicines in a manner that is affordable for individuals and society, and that is equitable and efficiently managed is challenging. The views of stakeholders on targeted access to anti-rheumatic biological medicines in Australia acknowledged this challenge and provided a number of suggestions for modifications. These could serve as a basis to inform the debate on how to change the processes and policies so as to improve the scheme. PMID:18096055
Access control and privilege management in electronic health record: a systematic literature review.
Jayabalan, Manoj; O'Daniel, Thomas
2016-12-01
This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.
Automating testbed documentation and database access using World Wide Web (WWW) tools
NASA Technical Reports Server (NTRS)
Ames, Charles; Auernheimer, Brent; Lee, Young H.
1994-01-01
A method for providing uniform transparent access to disparate distributed information systems was demonstrated. A prototype testing interface was developed to access documentation and information using publicly available hypermedia tools. The prototype gives testers a uniform, platform-independent user interface to on-line documentation, user manuals, and mission-specific test and operations data. Mosaic was the common user interface, and HTML (Hypertext Markup Language) provided hypertext capability.
Lethality of firearms relative to other suicide methods: a population based study.
Shenassa, E D; Catlin, S N; Buka, S L
2003-02-01
(1) To quantify lethality of firearms relative to other suicide methods, (2) to quantify the extent to which suicide mortality may be reduced by limiting access to firearms. Data on suicides and hospitalised para-suicides that occurred in the state of Illinois from 1990 to 1997 were combined. Total number of episodes for each suicide method was estimated as the sum of the number of suicides and the number of para-suicides for that method. Gender and suicide method were used as proxies for intention to die, and estimated lethality of suicide methods within method-gender groups (for example, male firearm users). Logistic regression was used to quantify the lethality of firearms relative to other suicide methods. Excess mortality associated with the use of firearms was estimated by conservatively assuming that in the absence of firearms the next most lethal suicide method would be used. From January 1990 to December 1997, among individuals 10 years or older in the state of Illinois, there were 37,352 hospital admissions for para-suicide and 10,287 completed suicides. Firearms are the most lethal suicide method. Episodes involving firearms are 2.6 times (95% CI 2.1 to 3.1) more lethal than those involving suffocation-the second most lethal suicide method. Preventing access to firearms can reduce the proportion of fatal firearms related suicides by 32% among minors, and 6.5% among adults. Limiting access to firearms is a potentially effective means of reducing suicide mortality.
Conservation, Preservation, and Digitization.
ERIC Educational Resources Information Center
Lynch, Clifford A.; Brownrigg, Edwin B.
1986-01-01
Digital technologies should be considered a method of preservation for library materials. Current conservation strategies of restoration, deacidification, and microfilming are expensive, and they limit access. Digitization offers improved access while preserving materials and reflects a change in the library role from depository of printed…
The quality of orthodontic practice websites.
Parekh, J; Gill, D S
2014-05-01
To evaluate orthodontic practice websites for the reliability of information presented, accessibility, usability for patients and compliance to General Dental Council (GDC) regulations on ethical advertising. World Wide Web. The term 'orthodontic practice' was entered into three separate search engines. The 30 websites from the UK were selected and graded according to the LIDA tool (a validated method of evaluating healthcare websites) for accessibility, usability of the website and reliability of information on orthodontic treatment. The websites were then evaluated against the GDC's Principles for ethical advertising in nine different criteria. On average, each website fulfilled six out of nine points of the GDC's criteria, with inclusion of a complaints policy being the most poorly fulfilled criteria. The mean LIDA score (a combination of usability, reliability and accessibility) was 102/144 (standard deviation 8.38). The websites scored most poorly on reliability (average 43% SD 11.7), with no single website reporting a clear, reliable method of content production. Average accessibility was 81% and usability 73%. In general, websites did not comply with GDC guidelines on ethical advertising. Furthermore, practitioners should consider reporting their method of information production, particularly when making claims about efficiency and speed of treatment in order to improve reliability.
Genome Consortium for Active Teaching: Meeting the Goals of BIO2010
Ledbetter, Mary Lee S.; Hoopes, Laura L.M.; Eckdahl, Todd T.; Heyer, Laurie J.; Rosenwald, Anne; Fowlks, Edison; Tonidandel, Scott; Bucholtz, Brooke; Gottfried, Gail
2007-01-01
The Genome Consortium for Active Teaching (GCAT) facilitates the use of modern genomics methods in undergraduate education. Initially focused on microarray technology, but with an eye toward diversification, GCAT is a community working to improve the education of tomorrow's life science professionals. GCAT participants have access to affordable microarrays, microarray scanners, free software for data analysis, and faculty workshops. Microarrays provided by GCAT have been used by 141 faculty on 134 campuses, including 21 faculty that serve large numbers of underrepresented minority students. An estimated 9480 undergraduates a year will have access to microarrays by 2009 as a direct result of GCAT faculty workshops. Gains for students include significantly improved comprehension of topics in functional genomics and increased interest in research. Faculty reported improved access to new technology and gains in understanding thanks to their involvement with GCAT. GCAT's network of supportive colleagues encourages faculty to explore genomics through student research and to learn a new and complex method with their undergraduates. GCAT is meeting important goals of BIO2010 by making research methods accessible to undergraduates, training faculty in genomics and bioinformatics, integrating mathematics into the biology curriculum, and increasing participation by underrepresented minority students. PMID:17548873
Genome Consortium for Active Teaching: meeting the goals of BIO2010.
Campbell, A Malcolm; Ledbetter, Mary Lee S; Hoopes, Laura L M; Eckdahl, Todd T; Heyer, Laurie J; Rosenwald, Anne; Fowlks, Edison; Tonidandel, Scott; Bucholtz, Brooke; Gottfried, Gail
2007-01-01
The Genome Consortium for Active Teaching (GCAT) facilitates the use of modern genomics methods in undergraduate education. Initially focused on microarray technology, but with an eye toward diversification, GCAT is a community working to improve the education of tomorrow's life science professionals. GCAT participants have access to affordable microarrays, microarray scanners, free software for data analysis, and faculty workshops. Microarrays provided by GCAT have been used by 141 faculty on 134 campuses, including 21 faculty that serve large numbers of underrepresented minority students. An estimated 9480 undergraduates a year will have access to microarrays by 2009 as a direct result of GCAT faculty workshops. Gains for students include significantly improved comprehension of topics in functional genomics and increased interest in research. Faculty reported improved access to new technology and gains in understanding thanks to their involvement with GCAT. GCAT's network of supportive colleagues encourages faculty to explore genomics through student research and to learn a new and complex method with their undergraduates. GCAT is meeting important goals of BIO2010 by making research methods accessible to undergraduates, training faculty in genomics and bioinformatics, integrating mathematics into the biology curriculum, and increasing participation by underrepresented minority students.
Use of Mobile Devices to Access Resources Among Health Professions Students: A Systematic Review.
Mi, Misa; Wu, Wendy; Qiu, Maylene; Zhang, Yingting; Wu, Lin; Li, Jie
2016-01-01
This systematic review examines types of mobile devices used by health professions students, kinds of resources and tools accessed via mobile devices, and reasons for using the devices to access the resources and tools. The review included 20 studies selected from articles published in English between January 2010 and April 2015, retrieved from PubMed and other sources. Data extracted included participants, study designs, mobile devices used, mobile resources/apps accessed, outcome measures, and advantages of and barriers to using mobile devices. The review indicates significant variability across the studies in terms of research methods, types of mobile programs implemented, resources accessed, and outcomes. There were beneficial effects of using mobile devices to access resources as well as conspicuous challenges or barriers in using mobile devices.
Pearson, Amber L; de Latour, Phillip; Kemp, Gabrielle; Findlay, Nohoana; Halim, Angela; Atkinson, Nicola; Chong, Mark; Cameron, Rose; Brown, Courtney; Kim, Grace; Campbell, Paul; Hills, Toby; Jayawant, Aditya; Chae, Matthew; Bhagavan, Chiranth; French, Claire; Jenkin, Gabrielle; Smith, Moira; Signal, Louise
2014-11-01
Access to water fountains and sugar-sweetened beverages (SSBs) in children׳s environments may impact on child obesity and may vary with neighbourhood deprivation. Our pilot analyses of access to water fountains and SSBs in Wellington, New Zealand revealed that water fountain access was high in school environments and low in recreational environments. There were also differences in water fountain and SSB access points by neighbourhood deprivation. The methods piloted in this study could be translated in a larger study, more capable of detecting significant differences in access and allowing for more sophisticated analyses. Such future studies may provide important evidence for the improvement of children׳s health and well-being. Copyright © 2014 Elsevier Ltd. All rights reserved.
The 'SAFARI' Technique Using Retrograde Access Via Peroneal Artery Access
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhuang, Kun Da, E-mail: zkunda@gmail.com; Tan, Seck Guan; Tay, Kiang Hiong
2012-08-15
The 'SAFARI' technique or subintimal arterial flossing with antegrade-retrograde intervention is a method for recanalisation of chronic total occlusions (CTOs) when subintimal angioplasty fails. Retrograde access is usually obtained via the popliteal, distal anterior tibial artery (ATA)/dorsalis pedis (DP), or distal posterior tibial artery (PTA). Distal access via the peroneal artery has not been described and has a risk of continued bleeding, leading to compartment syndrome due to its deep location. We describe our experience in two patients with retrograde access via the peroneal artery and the use of balloon-assisted hemostasis for these retrograde punctures. This approach may potentially givemore » more options for endovascular interventions in lower limb CTOs.« less
Wireless augmented reality communication system
NASA Technical Reports Server (NTRS)
Devereaux, Ann (Inventor); Agan, Martin (Inventor); Jedrey, Thomas (Inventor)
2006-01-01
The system of the present invention is a highly integrated radio communication system with a multimedia co-processor which allows true two-way multimedia (video, audio, data) access as well as real-time biomedical monitoring in a pager-sized portable access unit. The system is integrated in a network structure including one or more general purpose nodes for providing a wireless-to-wired interface. The network architecture allows video, audio and data (including biomedical data) streams to be connected directly to external users and devices. The portable access units may also be mated to various non-personal devices such as cameras or environmental sensors for providing a method for setting up wireless sensor nets from which reported data may be accessed through the portable access unit. The reported data may alternatively be automatically logged at a remote computer for access and viewing through a portable access unit, including the user's own.
Wireless Augmented Reality Communication System
NASA Technical Reports Server (NTRS)
Jedrey, Thomas (Inventor); Agan, Martin (Inventor); Devereaux, Ann (Inventor)
2014-01-01
The system of the present invention is a highly integrated radio communication system with a multimedia co-processor which allows true two-way multimedia (video, audio, data) access as well as real-time biomedical monitoring in a pager-sized portable access unit. The system is integrated in a network structure including one or more general purpose nodes for providing a wireless-to-wired interface. The network architecture allows video, audio and data (including biomedical data) streams to be connected directly to external users and devices. The portable access units may also be mated to various non-personal devices such as cameras or environmental sensors for providing a method for setting up wireless sensor nets from which reported data may be accessed through the portable access unit. The reported data may alternatively be automatically logged at a remote computer for access and viewing through a portable access unit, including the user's own.
Wireless Augmented Reality Communication System
NASA Technical Reports Server (NTRS)
Agan, Martin (Inventor); Devereaux, Ann (Inventor); Jedrey, Thomas (Inventor)
2016-01-01
The system of the present invention is a highly integrated radio communication system with a multimedia co-processor which allows true two-way multimedia (video, audio, data) access as well as real-time biomedical monitoring in a pager-sized portable access unit. The system is integrated in a network structure including one or more general purpose nodes for providing a wireless-to-wired interface. The network architecture allows video, audio and data (including biomedical data) streams to be connected directly to external users and devices. The portable access units may also be mated to various non-personal devices such as cameras or environmental sensors for providing a method for setting up wireless sensor nets from which reported data may be accessed through the portable access unit. The reported data may alternatively be automatically logged at a remote computer for access and viewing through a portable access unit, including the user's own.
Accessibility of Health Clubs for People with Mobility Disabilities and Visual Impairments
Rimmer, James H.; Riley, Barth; Wang, Edward; Rauworth, Amy
2005-01-01
Objective. We sought to examine the accessibility of health clubs to persons with mobility disabilities and visual impairments. Methods. We assessed 35 health clubs and fitness facilities as part of a national field trial of a new instrument, Accessibility Instruments Measuring Fitness and Recreation Environments (AIMFREE), designed to assess accessibility of fitness facilities in the following domains: (1) built environment, (2) equipment, (3) swimming pools, (4) information, (5) facility policies, and (6) professional behavior. Results. All facilities had a low to moderate level of accessibility. Some of the deficiencies concerned specific Americans with Disabilities Act guidelines pertaining to the built environment, whereas other deficiency areas were related to aspects of the facilities’ equipment, information, policies, and professional staff. Conclusions. Persons with mobility disabilities and visual impairments have difficulty accessing various areas of fitness facilities and health clubs. AIMFREE is an important tool for increasing awareness of these accessibility barriers for people with disabilities. PMID:16254234
A synthesis of studies of access point density as a risk factor for road accidents.
Elvik, Rune
2017-10-01
Studies of the relationship between access point density (number of access points, or driveways, per kilometre of road) and accident frequency or rate (number of accidents per unit of exposure) have consistently found that accident rate increases when access point density increases. This paper presents a formal synthesis of the findings of these studies. It was found that the addition of one access point per kilometre of road is associated with an increase of 4% in the expected number of accidents, controlling for traffic volume. Although studies consistently indicate an increase in accident rate as access point density increases, the size of the increase varies substantially between studies. In addition to reviewing studies of access point density as a risk factor, the paper discusses some issues related to formally synthesising regression coefficients by applying the inverse-variance method of meta-analysis. Copyright © 2017 Elsevier Ltd. All rights reserved.
Managing healthcare information using short message service (SMS) in wireless broadband networks
NASA Astrophysics Data System (ADS)
Documet, Jorge; Tsao, Sinchai; Documet, Luis; Liu, Brent J.; Zhou, Zheng; Joseph, Anika O.
2007-03-01
Due to the ubiquity of cell phones, SMS (Short Message Service) has become an ideal means to wirelessly manage a Healthcare environment and in particular PACS (Picture Archival and Communications System) data. SMS is a flexible and mobile method for real-time access and control of Healthcare information systems such as HIS (Hospital Information System) or PACS. Unlike conventional wireless access methods, SMS' mobility is not limited by the presence of a WiFi network or any other localized signal. It provides a simple, reliable yet flexible method to communicate with an information system. In addition, SMS services are widely available for low costs from cellular phone service providers and allows for more mobility than other services such as wireless internet. This paper aims to describe a use case of SMS as a means of remotely communicating with a PACS server. Remote access to a PACS server and its Query-Retrieve services allows for a more convenient, flexible and streamlined radiology workflow. Wireless access methods such as SMS will increase dedicated PACS workstation availability for more specialized DICOM (Digital Imaging and Communications in Medicine) workflow management. This implementation will address potential security, performance and cost issues of applying SMS as part of a healthcare information management system. This is in an effort to design a wireless communication system with optimal mobility and flexibility at minimum material and time costs.
Astolfi, Maria Luisa; Di Filippo, Patrizia; Gentili, Alessandra; Canepari, Silvia
2017-11-01
We describe the optimization and validation of a sequential extractive method for the determination of the polycyclic aromatic hydrocarbons (PAHs) and elements (Al, As, Cd, Cr, Cu, Fe, Mn, Ni, Pb, Se, V and Zn) that are chemically fractionated into bio-accessible and mineralized residual fractions on a single particulate matter filter. The extraction is performed by automatic accelerated solvent extraction (ASE); samples are sequentially treated with dichloromethane/acetone (4:1) for PAHs extraction and acetate buffer (0.01M; pH 4.5) for elements extraction (bio-accessible fraction). The remaining solid sample is then collected and subjected to acid digestion with HNO 3 :H 2 O 2 (2:1) to determine the mineralized residual element fraction. We also describe a homemade ASE cell that reduces the blank values for most elements; in this cell, the steel frit was replaced by a Teflon pierced disk and a Teflon cylinder was used as the filler. The performance of the proposed method was evaluated in terms of recovery from standard reference material (SRM 1648 and SRM 1649a) and repeatability. The equivalence between the new ASE method and conventional methods was verified for PAHs and for bio-accessible and mineralized residual fractions of elements on PM 10 twin filters. Copyright © 2017 Elsevier B.V. All rights reserved.
Asymmetric Methods for the Synthesis of Flavanones, Chromanones, and Azaflavanones
Nibbs, Antoinette E.
2012-01-01
Flavanones, chromanones, and related structures are privileged natural products that display a wide variety of biological activities. Although flavanoids are abundant in nature, there are a limited number of available general and efficient synthetic methods for accessing molecules of this class in a stereoselective manner. Their structurally simple architectures belie the difficulties involved in installation and maintenance of the stereogenic configuration at the C2 position, which can be sensitive and can undergo epimerization under mildly acidic, basic, and thermal reaction conditions. This review presents the methods currently used to access these related structures. The synthetic methods include manipulation of the flavone/flavanone core, carbon-carbon bond formation, and carbon–heteroatom bond formation. PMID:22876166
Statistical methods to detect novel genetic variants using publicly available GWAS summary data.
Guo, Bin; Wu, Baolin
2018-03-01
We propose statistical methods to detect novel genetic variants using only genome-wide association studies (GWAS) summary data without access to raw genotype and phenotype data. With more and more summary data being posted for public access in the post GWAS era, the proposed methods are practically very useful to identify additional interesting genetic variants and shed lights on the underlying disease mechanism. We illustrate the utility of our proposed methods with application to GWAS meta-analysis results of fasting glucose from the international MAGIC consortium. We found several novel genome-wide significant loci that are worth further study. Copyright © 2018 Elsevier Ltd. All rights reserved.
Information campaign and advocacy efforts to promote access to emergency contraception in Mexico.
Ellertson, Charlotte; Heimburger, Angela; Acevedo-Garcia, Dolores; Schiavon, Raffaela; Mejia, Guillermina; Corona, Georgina; del Castillo, Eduardo; Langer, Ana
2002-11-01
Emergency contraception (EC) has the potential to reduce unwanted pregnancy significantly, in Mexico as elsewhere. Recent years have seen tremendous growth in programs and research devoted to expanding access to emergency methods worldwide. In Mexico we developed a comprehensive model introduction effort that included four components: provider training, public information (through a dedicated hotline and website, free media, paid radio and TV spots, participation in talk shows, and alternative media channels), collaboration with the public sector to include EC in the official family planning norms, and assistance to partner with commercial firms to register a dedicated EC product. Ongoing efforts to combat misperceptions and overcome opposition are crucial to informing the public and ensuring greater access to the method.
41 CFR 101-8.311 - Historic Preservation Programs.
Code of Federal Regulations, 2010 CFR
2010-07-01
...; (iii) Importance of the historic features of the property to the conduct of the program or activity.... (b) Obligation—(1) Accessibility. A recipient shall operate any program or activity involving... by handicapped persons. Methods of achieving accessibility include: (i) Making physical alterations...
34 CFR 98.3 - Access to instructional material used in a research or experimentation program.
Code of Federal Regulations, 2012 CFR
2012-07-01
... RIGHTS IN RESEARCH, EXPERIMENTAL PROGRAMS, AND TESTING § 98.3 Access to instructional material used in a... designed to explore or develop new or unproven teaching methods or techniques. (c) For the purpose of the...
34 CFR 98.3 - Access to instructional material used in a research or experimentation program.
Code of Federal Regulations, 2013 CFR
2013-07-01
... RIGHTS IN RESEARCH, EXPERIMENTAL PROGRAMS, AND TESTING § 98.3 Access to instructional material used in a... designed to explore or develop new or unproven teaching methods or techniques. (c) For the purpose of the...
34 CFR 98.3 - Access to instructional material used in a research or experimentation program.
Code of Federal Regulations, 2010 CFR
2010-07-01
... RIGHTS IN RESEARCH, EXPERIMENTAL PROGRAMS, AND TESTING § 98.3 Access to instructional material used in a... designed to explore or develop new or unproven teaching methods or techniques. (c) For the purpose of the...
34 CFR 98.3 - Access to instructional material used in a research or experimentation program.
Code of Federal Regulations, 2014 CFR
2014-07-01
... RIGHTS IN RESEARCH, EXPERIMENTAL PROGRAMS, AND TESTING § 98.3 Access to instructional material used in a... designed to explore or develop new or unproven teaching methods or techniques. (c) For the purpose of the...
34 CFR 98.3 - Access to instructional material used in a research or experimentation program.
Code of Federal Regulations, 2011 CFR
2011-07-01
... RIGHTS IN RESEARCH, EXPERIMENTAL PROGRAMS, AND TESTING § 98.3 Access to instructional material used in a... designed to explore or develop new or unproven teaching methods or techniques. (c) For the purpose of the...
47 CFR 79.2 - Accessibility of programming providing emergency information.
Code of Federal Regulations, 2014 CFR
2014-10-01
...) BROADCAST RADIO SERVICES ACCESSIBILITY OF VIDEO PROGRAMMING Video Programming Owners, Providers, and... of programming providing emergency information. (1) Video programming distributors must make... or by using a method of visual presentation, as described in § 79.1. (2) Video programming...
Tian, Miao; Zeng, Xiang-Qing; Song, Huan-Lei; Hu, Shan-Xin; Wang, Fu-Jun; Zhao, Jian; Hu, Zhi-Bi
2015-04-01
Momordica charantia (MC) has been used for treating diabetes mellitus from ancient times in Asia, Africa and South America. There are many MC accessions in local markets. Polypeptide-P as a main hypoglycemic component in MC was first studied in this experiment to illustrate the different contents in MC of different accessions and different harvesting times. Nineteen MC accessions collected from different regions were clustered into three groups using random amplified polymorphic DNA (RAPD) and inter-simple sequence repeat (ISSR) molecular markers. Content of polypeptide-P in the tested MC accessions was detected by western blot (WB) method. The WB results revealed that polypeptide-P was detected in MC accessions harvested in June and July but not in September and October. Furthermore, Polypeptide-P content corresponded well with the MC accessions. Our results suggest that the MC accessions and the harvesting times or the weather during harvest play significant roles in high content of polypeptide-P. © 2014 Society of Chemical Industry.
Health-related quality of life as a main determinant of access to rheumatologic care.
Leon, Leticia; Jover, Juan Angel; Loza, Estibaliz; Zunzunegui, Maria Victoria; Lajas, Cristina; Vadillo, Cristina; Fontsere, Oscar; Rodriguez-Rodriguez, Luis; Martinez, Cristina; Fernandez-Gutierrez, Benjamin; Abasolo, Lydia
2013-07-01
To evaluate a rheumatology outpatient consultation access system for new patients. New patients seen from April 2005 to April 2006 at our rheumatology clinic (n = 4,460) were included and classified according to their appointment type: ordinary appointments (OA) to be seen within 30 days, urgent appointments (UA) and work disability appointments (WDA) to be seen within 3 days. Age, sex, diagnosis, and health-related quality of life (HRQoL) as determined by the Rosser Index were recorded. Logistic regression models were run to identify factors that contribute to each type of appointment. OA was the method of access for 1,938 new patients, while 1,194 and 1,328 patients were seen through WDA and UA appointments, respectively. Younger male patients, and those with microcrystalline arthritis, sciatica, shoulder, back, or neck pain, were more likely to use the faster access systems (UA or WDA), whereas patients with a degenerative disease were mainly seen through OA (<0.001). Subjects with poor (3.96; 95 % CI, 2.8-5.5) or very poor HRQoL (70.8; 95 % CI, 14.9-334) were strongly associated to visiting a rheumatologist through the WDA or UA access systems, respectively, compared to OA. Age, gender, diagnosis, and mainly health-related quality of life are associated with the referral pattern of access to rheumatologic outpatient care. Among new patients subjects with the worst HRQoL were more likely to access with faster methods (UA or WDA) than those with better HRQoL.
Boxwala, Aziz A; Kim, Jihoon; Grillo, Janice M; Ohno-Machado, Lucila
2011-01-01
To determine whether statistical and machine-learning methods, when applied to electronic health record (EHR) access data, could help identify suspicious (ie, potentially inappropriate) access to EHRs. From EHR access logs and other organizational data collected over a 2-month period, the authors extracted 26 features likely to be useful in detecting suspicious accesses. Selected events were marked as either suspicious or appropriate by privacy officers, and served as the gold standard set for model evaluation. The authors trained logistic regression (LR) and support vector machine (SVM) models on 10-fold cross-validation sets of 1291 labeled events. The authors evaluated the sensitivity of final models on an external set of 58 events that were identified as truly inappropriate and investigated independently from this study using standard operating procedures. The area under the receiver operating characteristic curve of the models on the whole data set of 1291 events was 0.91 for LR, and 0.95 for SVM. The sensitivity of the baseline model on this set was 0.8. When the final models were evaluated on the set of 58 investigated events, all of which were determined as truly inappropriate, the sensitivity was 0 for the baseline method, 0.76 for LR, and 0.79 for SVM. The LR and SVM models may not generalize because of interinstitutional differences in organizational structures, applications, and workflows. Nevertheless, our approach for constructing the models using statistical and machine-learning techniques can be generalized. An important limitation is the relatively small sample used for the training set due to the effort required for its construction. The results suggest that statistical and machine-learning methods can play an important role in helping privacy officers detect suspicious accesses to EHRs.
Access to parks and physical activity: an eight country comparison.
Schipperijn, Jasper; Cerin, Ester; Adams, Marc A; Reis, Rodrigo; Smith, Graham; Cain, Kelli; Christiansen, Lars B; van Dyck, Delfien; Gidlow, Christopher; Frank, Lawrence D; Mitáš, Josef; Pratt, Michael; Salvo, Deborah; Schofield, Grant; Sallis, James F
2017-10-01
Several systematic reviews have reported mixed associations between access to parks and physical activity, and suggest that this is due to inconsistencies in the study methods or differences across countries. An international study using consistent methods is needed to investigate the association between access to parks and physical activity. The International Physical Activity and Environment Network (IPEN) Adult Study is a multi-country cross-sectional study using a common design and consistent methods. Accelerometer, survey and Geographic Information Systems (GIS) data for 6,181 participants from 12 cities in 8 countries (Belgium, Brazil, Czech Republic, Denmark, Mexico, New Zealand, UK, USA) were used to estimate the strength and shape of associations of 11 measures of park access (1 perceived and 10 GIS-based measures) with accelerometer-based moderate-to-vigorous physical activity (MVPA) and four types of self-reported leisure-time physical activity. Associations were estimated using generalized additive mixed models. More parks within 1 km from participants' homes were associated with greater leisure-time physical activity and accelerometer-measured MVPA. Respondents who lived in the neighborhoods with the most parks did on average 24 minutes more MVPA per week than those living in the neighborhoods with the lowest number of parks. Perceived proximity to a park was positively associated with multiple leisure-time physical activity outcomes. Associations were homogeneous across all cities studied. Living in neighborhoods with many parks could contribute with up to 1/6 of the recommended weekly Having multiple parks nearby was the strongest positive correlate of PA. To increase comparability and validity of park access measures, we recommend that researchers, planners and policy makers use the number of parks within 1 km travel distance of homes as an objective indicator for park access in relation to physical activity.
2014-07-01
useful to them before they applied to OCS, and 86% of candidates saying they would refer someone else to the RJP. 15. SUBJECT TERMS Officers...Candidate School,” or AccessOCS, used qualitative methods (Oliver, Ardison, Russell, & Babin, 2010) to (a) identify and describe OCS applicants in terms...job previews (RJPs) that would provide OCS applicants with useful information in a single, but comprehensive document to facilitate the accessioning
Optimal Access to NASA Water Cycle Data for Water Resources Management
NASA Astrophysics Data System (ADS)
Teng, W. L.; Arctur, D. K.; Espinoza, G. E.; Rui, H.; Strub, R. F.; Vollmer, B.
2016-12-01
A "Digital Divide" in data representation exists between the preferred way of data access by the hydrology community (i.e., as time series of discrete spatial objects) and the common way of data archival by earth science data centers (i.e., as continuous spatial fields, one file per time step). This Divide has been an obstacle, specifically, between the Consortium of Universities for the Advancement of Hydrologic Science, Inc. Hydrologic Information System (CUAHSI HIS) and NASA Goddard Earth Sciences Data and Information Services Center (GES DISC). An optimal approach to bridging the Divide, developed by the GES DISC, is to reorganize data from the way they are archived to some way that is optimal for the desired method of data access. Specifically for CUAHSI HIS, selected data sets were reorganized into time series files, one per geographical "point." These time series files, termed "data rods," are pre-generated or virtual (generated on-the-fly). Data sets available as data rods include North American Land Data Assimilation System (NLDAS), Global Land Data Assimilation System (GLDAS), TRMM Multi-satellite Precipitation Analysis (TMPA), Land Parameter Retrieval Model (LPRM), Modern-Era Retrospective Analysis for Research and Applications (MERRA)-Land, and Groundwater and Soil Moisture Conditions from Gravity Recovery and Climate Experiment (GRACE) Data Assimilation drought indicators for North America Drought Monitor (GRACE-DA-DM). In order to easily avail the operational water resources community the benefits of optimally reorganized data, we have developed multiple methods of making these data more easily accessible and usable. These include direct access via RESTful Web services, a browser-based Web map and statistical tool for selected NLDAS variables for the U.S. (CONUS), a HydroShare app (Data Rods Explorer, under development) on the Tethys Platform, and access via the GEOSS Portal. Examples of drought-related applications of these data and data access methods are provided.
Augustin, J; Austermann, J; Erasmi, S
2016-10-18
Background: One of the overall objectives of the legislator is to ensure an overall "homogeneous", and easily accessible medical care for the population. The physician-patient ratio can be used to describe the regional health care situation. But this method does not provide information concerning the availability of, for instance, the nearest doctor. Therefore, further parameters such as accessibility must be taken into consideration. For this purpose, network analyses are an appropriate method. The objective of this study is to present methodological tools to evaluate the healthcare situation in the metropolitan region of Hamburg, primarily focusing on accessibility using dermatologists as an example. Methods: Analyzing data of 20 counties, the geographical distribution of N=357 dermatologists and the physician-patient ratio were calculated. In a second step, a network analysis regarding accessibility was performed. In order to calculate accessibility, address data (physicians) were transformed into coordinates, consisting of defined places (N=303) and restrictions (e. g. speed, turn restrictions) of the network. The calculation of population-based accessibility is based on grid cells for the population density. Results: Despite adequacy of the overall medical situation, differences in the availability of the nearest dermatologists in the metropolitan region are remarkable, particularly when use of public transport is taken into consideration. In some counties, over 60% of the population require at least one hour to get to the nearest dermatologist using public transportation. In rural regions within the metropolitan area are particularly affected. Conclusion: The network analysis has shown that the choice and availability of transportation in combination with the location (rural/urban) is essential for health care access. Especially elderly people in rural areas with restricted mobility are at a disadvantage. Therefore, modern health care approaches (e. g. telemedicine) are necessary to optimize the health care situation in rural areas. Network analyses can make a valuable methodological contribution to the analysis of regional health care disparities. © Georg Thieme Verlag KG Stuttgart · New York.
Web client and ODBC access to legacy database information: a low cost approach.
Sanders, N. W.; Mann, N. H.; Spengler, D. M.
1997-01-01
A new method has been developed for the Department of Orthopaedics of Vanderbilt University Medical Center to access departmental clinical data. Previously this data was stored only in the medical center's mainframe DB2 database, it is now additionally stored in a departmental SQL database. Access to this data is available via any ODBC compliant front-end or a web client. With a small budget and no full time staff, we were able to give our department on-line access to many years worth of patient data that was previously inaccessible. PMID:9357735
Judge, Colleen P; Wolgemuth, Tierney E; Hamm, Megan E; Borrero, Sonya
2017-11-01
Following the 2016US presidential election, social media posts and news stories amplified concerns about the potential for reduced access to contraception under the incoming administration and urged women to seek long-acting reversible contraception. We aimed to describe women's concerns about future access to contraception, in their own words. A social-media-based, anonymous online survey assessing thoughts and concerns about future access to contraception was distributed to reproductive-aged US women for 1 week in mid-January 2017. Participants who were concerned about future access to contraception could share their thoughts and feelings in an open-ended comments box. We qualitatively analyzed 449 written responses for content and themes, with the goal of characterizing key concerns. Women who provided written comments had a mean age of 28years; 85% were white, 88% had at least a college degree, and 93% identified as Democratic or Democratic-leaning. Women were highly concerned about future affordability of contraceptive methods due to potential loss of insurance, reduced insurance coverage for contraceptive methods and reduced access to low-cost care at Planned Parenthood. Many also worried about increased restrictions on abortion. Participants' concerns regarding access to contraception and abortion centered around themes of reproductive and bodily autonomy, which women described as fundamental rights. Women in this study expressed considerable fear and uncertainty regarding their future access to contraception and abortion following the 2016US presidential election. The potential for restricted access to affordable contraception and abortion was viewed as an unacceptable limitation on bodily autonomy. As the future of US health care policy is debated, many women are concerned about the impact of policy changes on their ability to access affordable contraception and abortion, which many view as essential to the preservation of bodily and reproductive autonomy. Copyright © 2017 Elsevier Inc. All rights reserved.
Goicolea, Isabel; Carson, Dean; San Sebastian, Miguel; Christianson, Monica; Wiklund, Maria; Hurtig, Anna-Karin
2018-01-11
The purpose of this paper is to propose a protocol for researching the impact of rural youth health service strategies on health care access. There has been no published comprehensive assessment of the effectiveness of youth health strategies in rural areas, and there is no clearly articulated model of how such assessments might be conducted. The protocol described here aims to gather information to; i) Assess rural youth access to health care according to their needs, ii) Identify and understand the strategies developed in rural areas to promote youth access to health care, and iii) Propose actions for further improvement. The protocol is described with particular reference to research being undertaken in the four northernmost counties of Sweden, which contain a widely dispersed and diverse youth population. The protocol proposes qualitative and quantitative methodologies sequentially in four phases. First, to map youth access to health care according to their health care needs, including assessing horizontal equity (equal use of health care for equivalent health needs,) and vertical equity (people with greater health needs should receive more health care than those with lesser needs). Second, a multiple case study design investigates strategies developed across the region (youth clinics, internet applications, public health programs) to improve youth access to health care. Third, qualitative comparative analysis of the 24 rural municipalities in the region identifies the best combination of conditions leading to high youth access to health care. Fourth, a concept mapping study involving rural stakeholders, care providers and youth provides recommended actions to improve rural youth access to health care. The implementation of this research protocol will contribute to 1) generating knowledge that could contribute to strengthening rural youth access to health care, as well as to 2) advancing the application of mixed methods to explore access to health care.
Edirippulige, Sisira; Reyno, John; Armfield, Nigel R; Bambling, Matthew; Lloyd, Owen; McNevin, Elizabeth
2016-10-01
The purpose of this study was to understand the methods of current delivery of health care services to cerebral palsy (CP) patients in Queensland, Australia. The study also examines the current use of telehealth by clinicians and their perceptions about telehealth use. Patient records during July 2013-July 2014 were accessed from the Queensland Paediatric Rehabilitation Service (QPRS) to collect information relating to the service delivery for CP patients. Analysis was carried out to examine the patient locations and travel distances using ArcMap geoprocessing software. In addition, 13 face-to-face semi structured interviews were conducted with clinicians from the QPRS and the Cerebral Palsy Health Service (CPHS) to understand the perceptions of clinicians relating to the current level of health care delivery. We also examined the clinicians' current use of telehealth and their opinions about this method. Records of 329 paediatric CP patients were accessed and reviewed. The majority of patients (96%, n = 307) who attended the clinics at the Royal Children's Hospital (RCH), Brisbane, were from remote, rural or regional areas of Queensland. Only 4% of patients (n = 13) were from major cities. During 12 months, patients had attended nine outreach programmes that were conducted by the QPRS and CPHS. The study found that non-local patients were required to travel an average distance of 836 km to access QPRS and CPHS services in Brisbane. The average distance for receiving a consultation at an outreach clinic was 173 km. Clinicians perceived that access to health care services to CP patients in Queensland is inadequate. Nearly all clinicians interviewed had some experience in using telehealth. They had high satisfaction levels with the method. Traditional methods of delivering services to CP patients do not meet their needs. Clinicians have found telehealth is a feasible and satisfactory delivery method. However, the use of telehealth is still limited. © The Author(s) 2015.
A method for evaluating the funding of components of natural resource and conservation projects
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wellington, John F., E-mail: welling@ipfw.edu; Lewis, Stephen A., E-mail: lewis.sa07@gmail.com
Many public and private entities such as government agencies and private foundations have missions related to the improvement, protection, and sustainability of the environment. In pursuit of their missions, they fund projects with related outcomes. Typically, the funding scene consists of scarce funding dollars for the many project requests. In light of funding limitations and funder's search for innovative funding schemes, a method to support the allocation of scarce dollars among project components is presented. The proposed scheme has similarities to methods in the project selection literature but differs in its focus on project components and its connection to andmore » enumeration of the universe of funding possibilities. The value of having access to the universe is demonstrated with illustrations. The presentation includes Excel implementations that should appeal to a broad spectrum of project evaluators and reviewers. Access to the space of funding possibilities facilitates a rich analysis of funding alternatives. - Highlights: • Method is given for allocating scarce funding dollars among competing projects. • Allocations are made to fund parts of projects • Proposed method provides access to the universe of funding possibilities. • Proposed method facilitates a rich analysis of funding possibilities. • Excel spreadsheet implementations are provided.« less
Freyssenge, J; Renard, F; Schott, A M; Derex, L; Nighoghossian, N; Tazarourte, K; El Khoury, C
2018-01-12
The World Health Organization refers to stroke, the second most frequent cause of death in the world, in terms of pandemic. Present treatments are only effective within precise time windows. Only 10% of thrombolysis patients are eligible. Late assessment of the patient resulting from admission and lack of knowledge of the symptoms is the main explanation of lack of eligibility. The aim is the measurement of the time of access to treatment facilities for stroke victims, using ambulances (firemen ambulances or EMS ambulances) and private car. The method proposed analyses the potential geographic accessibility of stroke care infrastructure in different scenarios. The study allows better considering of the issues inherent to an area: difficult weather conditions, traffic congestion and failure to respect the distance limits of emergency transport. Depending on the scenario, access times vary considerably within the same commune. For example, between the first and the second scenario for cities in the north of Rhône county, there is a 10 min difference to the nearest Primary Stroke Center (PSC). For the first scenario, 90% of the population is 20 min away of the PSC and 96% for the second scenario. Likewise, depending on the modal vector (fire brigade or emergency medical service), overall accessibility from the emergency call to admission to a Comprehensive Stroke Center (CSC) can vary by as much as 15 min. The setting up of the various scenarios and modal comparison based on the calculation of overall accessibility makes this a new method for calculating potential access to care facilities. It is important to take into account the specific pathological features and the availability of care facilities for modelling. This method is innovative and recommendable for measuring accessibility in the field of health care. This study makes possible to highlight the patients' extension of care delays. Thus, this can impact the improvement of patient care and rethink the healthcare organization. Stroke is addressed here but it is applicable to other pathologies.
Finding Food Deserts: A Comparison of Methods Measuring Spatial Access to Food Stores.
Jaskiewicz, Lara; Block, Daniel; Chavez, Noel
2016-05-01
Public health research has increasingly focused on how access to resources affects health behaviors. Mapping environmental factors, such as distance to a supermarket, can identify intervention points toward improving food access in low-income and minority communities. However, the existing literature provides little guidance on choosing the most appropriate measures of spatial access. This study compared the results of different measures of spatial access to large food stores and the locations of high and low access identified by each. The data set included U.S. Census population data and the locations of large food stores in the six-county area around Chicago, Illinois. Six measures of spatial access were calculated at the census block group level and the results compared. The analysis found that there was little agreement in the identified locations of high or low access between measures. This study illustrates the importance of considering the access measure used when conducting research, interpreting results, or comparing studies. Future research should explore the correlation of different measures with health behaviors and health outcomes. © 2015 Society for Public Health Education.
NASA Astrophysics Data System (ADS)
Li, J.; Zhang, T.; Huang, Q.; Liu, Q.
2014-12-01
Today's climate datasets are featured with large volume, high degree of spatiotemporal complexity and evolving fast overtime. As visualizing large volume distributed climate datasets is computationally intensive, traditional desktop based visualization applications fail to handle the computational intensity. Recently, scientists have developed remote visualization techniques to address the computational issue. Remote visualization techniques usually leverage server-side parallel computing capabilities to perform visualization tasks and deliver visualization results to clients through network. In this research, we aim to build a remote parallel visualization platform for visualizing and analyzing massive climate data. Our visualization platform was built based on Paraview, which is one of the most popular open source remote visualization and analysis applications. To further enhance the scalability and stability of the platform, we have employed cloud computing techniques to support the deployment of the platform. In this platform, all climate datasets are regular grid data which are stored in NetCDF format. Three types of data access methods are supported in the platform: accessing remote datasets provided by OpenDAP servers, accessing datasets hosted on the web visualization server and accessing local datasets. Despite different data access methods, all visualization tasks are completed at the server side to reduce the workload of clients. As a proof of concept, we have implemented a set of scientific visualization methods to show the feasibility of the platform. Preliminary results indicate that the framework can address the computation limitation of desktop based visualization applications.
ERIC Educational Resources Information Center
Goble, Don
2009-01-01
This article describes the many learning opportunities that broadcast technology students at Ladue Horton Watkins High School in St. Louis, Missouri, experience because of their unique access to technology and methods of learning. Through scaffolding, stepladder techniques, and trial by fire, students learn to produce multiple television programs,…
NASA Technical Reports Server (NTRS)
Kelley, Steve; Roussopoulos, Nick; Sellis, Timos; Wallace, Sarah
1993-01-01
The Universal Index System (UIS) is an index management system that uses a uniform interface to solve the heterogeneity problem among database management systems. UIS provides an easy-to-use common interface to access all underlying data, but also allows different underlying database management systems, storage representations, and access methods.
Accessing Electronic Theses: Progress?
ERIC Educational Resources Information Center
Tennant, Roy
2000-01-01
Describes various ways by which universities provide access to their electronic theses and dissertations (ETDs), discussing UMI (University Microfilms International), XML (eXtensible Markup Language), and other formats. Discusses key leaders--national and international--in the ETD effort. Outlines the two main methods for locating ETDs. Presents a…
Huang, Chunqiong; Liu, Guodao; Bai, Changjun; Wang, Wenqiang
2014-01-01
Although Cynodon dactylon (C. dactylon) is widely distributed in China, information on its genetic diversity within the germplasm pool is limited. The objective of this study was to reveal the genetic variation and relationships of 430 C. dactylon accessions collected from 22 Chinese provinces using sequence-related amplified polymorphism (SRAP) markers. Fifteen primer pairs were used to amplify specific C. dactylon genomic sequences. A total of 481 SRAP fragments were generated, with fragment sizes ranging from 260–1800 base pairs (bp). Genetic similarity coefficients (GSC) among the 430 accessions averaged 0.72 and ranged from 0.53–0.96. Cluster analysis conducted by two methods, namely the unweighted pair-group method with arithmetic averages (UPGMA) and principle coordinate analysis (PCoA), separated the accessions into eight distinct groups. Our findings verify that Chinese C. dactylon germplasms have rich genetic diversity, which is an excellent basis for C. dactylon breeding for new cultivars. PMID:25338051
The local food environment and diet: a systematic review.
Caspi, Caitlin E; Sorensen, Glorian; Subramanian, S V; Kawachi, Ichiro
2012-09-01
Despite growing attention to the problem of obesogenic environments, there has not been a comprehensive review evaluating the food environment-diet relationship. This study aims to evaluate this relationship in the current literature, focusing specifically on the method of exposure assessment (GIS, survey, or store audit). This study also explores 5 dimensions of "food access" (availability, accessibility, affordability, accommodation, acceptability) using a conceptual definition proposed by Penchansky and Thomas (1981). Articles were retrieved through a systematic keyword search in Web of Science and supplemented by the reference lists of included studies. Thirty-eight studies were reviewed and categorized by the exposure assessment method and the conceptual dimensions of access it captured. GIS-based measures were the most common measures, but were less consistently associated with diet than other measures. Few studies examined dimensions of affordability, accommodation, and acceptability. Because GIS-based measures on their own may not capture important non-geographic dimensions of access, a set of recommendations for future researchers is outlined. Copyright © 2012 Elsevier Ltd. All rights reserved.
A Tool and Application Programming Interface for Browsing Historical Geostationary Satellite Data
NASA Astrophysics Data System (ADS)
Chee, T.; Nguyen, L.; Minnis, P.; Spangenberg, D.; Ayers, J.
2013-12-01
Providing access to information is a key concern for NASA Langley Research Center. We describe a tool and method that allows end users to easily browse and access information that is otherwise difficult to acquire and manipulate. The tool described has as its core the application-programming interface that is made available to the public. One goal of the tool is to provide a demonstration to end users so that they can use the enhanced imagery as an input into their own work flows. This project builds upon NASA Langley Cloud and Radiation Group's experience with making real-time and historical satellite imagery accessible and easily searchable. As we see the increasing use of virtual supply chains that provide additional value at each link there is value in making satellite imagery available through a simple access method as well as allowing users to browse and view that imagery as they need rather than in a manner most convenient for the data provider.
Lince-Deroche, Naomi; Hargey, Adila; Holt, Kelsey; Shochet, Tara
2015-03-01
Young women and girls in South Africa are at high risk of unintended pregnancy and HIV. Previous studies have reported barriers to contraceptive and other sexual and reproductive health (SRH) services among young women in this context. We aimed to assess young women's SRH knowledge and experiences and to determine how they get SRH information and services in Soweto, South Africa using quantitative and qualitative methods. Young women, aged 18-24, recruited from primary health clinics and a shopping mall, reported that they have access to SRH information and know where to obtain services. However there are challenges to accessing and utilizing information and services including providers' unsupportive attitudes, uneven power dynamics in relationships and communication issues with parents and community members. There is a need to assist young women in understanding the significance of SRH information. They need access to age-appropriate, youth-friendly services in order to have healthy sexual experiences.
Ker, Katharine; Tansley, Gavin; Beecher, Deirdre; Perner, Anders; Shakur, Haleema; Harris, Tim; Roberts, Ian
2015-01-01
Background Dehydration is an important cause of death in patients with Ebola virus disease (EVD). Parenteral fluids are often required in patients with fluid requirements in excess of their oral intake. The peripheral intravenous route is the most commonly used method of parenteral access, but inserting and maintaining an intravenous line can be challenging in the context of EVD. Therefore it is important to consider the advantages and disadvantages of different routes for achieving parenteral access (e.g. intravenous, intraosseous, subcutaneous and intraperitoneal). Objectives To compare the reliability, ease of use and speed of insertion of different parenteral access methods. Search methods We ran the search on 17 November 2014. We searched the Cochrane Injuries Group's Specialised Register, Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library), Ovid MEDLINE(R) In-Process & Other Non-Indexed Citations, Ovid MEDLINE(R) Daily, Ovid MEDLINE(R) and Ovid OLDMEDLINE(R), Embase Classic + Embase (OvidSP), CINAHL (EBSCOhost), clinicaltrials.gov and screened reference lists. Selection criteria Randomised controlled trials comparing different parenteral routes for the infusion of fluids or medication. Data collection and analysis Two review authors examined the titles and abstracts of records obtained by searching the electronic databases to determine eligibility. Two review authors extracted data from the included trials and assessed the risk of bias. Outcome measures of interest were success of insertion; time required for insertion; number of insertion attempts; number of dislodgements; time period with functional access; local site reactions; clinicians' perception of ease of administration; needlestick injury to healthcare workers; patients' discomfort; and mortality. For trials involving the administration of fluids we also collected data on the volume of fluid infused, changes in serum electrolytes and markers of renal function. We rated the quality of the evidence as 'high', 'moderate', 'low' or 'very low' according to the GRADE approach for the following outcomes: success of insertion, time required for insertion, number of dislodgements, volume of fluid infused and needlestick injuries. Main results We included 17 trials involving 885 participants. Parenteral access was used to infuse fluids in 11 trials and medications in six trials. None of the trials involved patients with EVD. Intravenous and intraosseous access was compared in four trials; intravenous and subcutaneous access in 11; peripheral intravenous and intraperitoneal access in one; saphenous vein cutdown and intraosseous access in one; and intraperitoneal with subcutaneous access in one. All of the trials assessing the intravenous method involved peripheral intravenous access. We judged few trials to be at low risk of bias for any of the assessed domains. Compared to the intraosseous group, patients in the intravenous group were more likely to experience an insertion failure (risk ratio (RR) 3.89, 95% confidence interval (CI) 2.39 to 6.33; n = 242; GRADE rating: low). We did not pool data for time to insertion but estimates from the trials suggest that inserting intravenous access takes longer (GRADE rating: moderate). Clinicians judged the intravenous route to be easier to insert (RR 0.15, 95% CI 0.04 to 0.61; n = 182). A larger volume of fluids was infused via the intravenous route (GRADE rating: moderate). There was no evidence of a difference between the two routes for any other outcomes, including adverse events. Compared to the subcutaneous group, patients in the intravenous group were more likely to experience an insertion failure (RR 14.79, 95% CI 2.87 to 76.08; n = 238; GRADE rating: moderate) and dislodgement of the device (RR 3.78, 95% CI 1.16 to 12.34; n = 67; GRADE rating: low). Clinicians also judged the intravenous route as being more difficult to insert and patients were more likely to be agitated in the intravenous group. Patients in the intravenous group were more likely to develop a local infection and phlebitis, but were less likely to develop erythema, oedema or swelling than those in the subcutaneous group. A larger volume of fluids was infused into patients via the intravenous route. There was no evidence of a difference between the two routes for any other outcome. There were insufficient data to reliably determine if the risk of insertion failure differed between the saphenous vein cutdown (SVC) and intraosseous method (RR 4.00, 95% CI 0.51 to 31.13; GRADE rating: low). Insertion using SVC took longer than the intraosseous method (MD 219.60 seconds, 95% CI 135.44 to 303.76; GRADE rating: moderate). There were no data and therefore there was no evidence of a difference between the two routes for any other outcome. There were insufficient data to reliably determine the relative effects of intraperitoneal or central intravenous access relative to any other parenteral access method. Authors' conclusions There are several different ways of achieving parenteral access in patients who are unable meet their fluid requirements with oral intake alone. The quality of the evidence, as assessed using the GRADE criteria, is somewhat limited because of the lack of adequately powered trials at low risk of bias. However, we believe that there is sufficient evidence to draw the following conclusions: if peripheral intravenous access can be achieved easily, this allows infusion of larger volumes of fluid than other routes; but if this is not possible, the intraosseous and subcutaneous routes are viable alternatives. The subcutaneous route may be suitable for patients who are not severely dehydrated but in whom ongoing fluid losses cannot be met by oral intake. A film to accompany this review can be viewed here (http://youtu.be/ArVPzkf93ng). PLAIN LANGUAGE SUMMARY Comparison of the different ways of giving fluids to patients who cannot drink enough, such as patients with Ebola virus disease Background Many patients with Ebola virus disease (EVD) die because they are dehydrated. Patients with EVD often experience severe vomiting and diarrhoea, which causes them to lose fluids that are difficult to replace by drinking alone. It is possible to give fluids in ways that do not involve the digestive tract; this is known as parenteral access. This includes infusing fluids into a vein (intravenously), into bone marrow (intraosseously), into fatty tissue under the skin (subcutaneously) or into the abdominal space (intraperitoneally). Giving fluids intravenously is the usual method, but can be problematic in patients with EVD because starting intravenous fluids can be difficult in very dehydrated patients, and infection control practices may make maintaining the infusion challenging. It is therefore useful if those caring for patients with EVD know the advantages and disadvantages of the other ways to give fluids, so that they can decide which is the most suitable for their patients. Searches for trials We carried out searches for trials comparing different parenteral access methods on 17 November 2014. Trial characteristics We found 17 trials involving 885 participants. None involved patients with EVD. Fifteen trials involved patients who required parenteral access for the infusion of fluids or medicines and two trials assessed different methods under simulated conditions, such as on a training manikin. Many trials were of poor quality. Key results When the results of these trials were gathered together, they suggested that both the intraosseous and subcutaneous routes may be easier and quicker to insert into patients than the intravenous route, but more fluid can be given intravenously than by either the intraosseous or subcutaneous method. There has not been enough research into the intraperitoneal method to know how it compares to the other methods. Conclusions Healthcare workers caring for patients with EVD should be aware of the alternative ways of giving fluids. The trials we found were not of very high quality, therefore we need to be cautious when drawing conclusions based on their results. However, together they suggest if intravenous access can be achieved easily, then this should be used as it allows the infusion of larger volumes of fluid. However, if intravenous access is not possible, intraosseous and subcutaneous routes are alternatives that can be inserted quickly. Many of the trials conducted so far are of poor quality and none involved patients with EVD, therefore more trials should be carried out. A film to accompany this review can be viewed here. PMID:25914907
Wright, Kikelomo; Sonoiki, Olatunji; Ilozumba, Onaedo; Ajayi, Babatunde; Okikiolu, Olawunmi; Akinola, Oluwarotimi
2017-01-01
Globally, Nigeria is the second most unsafe country to be pregnant, with Lagos, its economic nerve center having disproportionately higher maternal deaths than the national average. Emergency obstetric care (EmOC) is effective in reducing pregnancyrelated morbidities and mortalities. This mixed-methods study quantitatively assessed women’s satisfaction with EmOC received and qualitatively engaged multiple key stakeholders to better understand issues around EmOC access, availability and utilization in Lagos. Qualitative interviews revealed that regarding access, while government opined that EmOC facilities have been strategically built across Lagos, women flagged issues with difficulty in access, compounded by perceived high EmOC cost. For availability, though health workers were judged competent, they appeared insufficient, overworked and felt poorly remunerated. Infrastructure was considered inadequate and paucity of blood and blood products remained commonplace. Although pregnant women positively rated the clinical aspects of care, as confirmed by the survey, satisfaction gaps remained in the areas of service delivery, care organization and responsiveness. These areas of discordance offer insight to opportunities for improvements, which would ensure that every woman can access and use quality EmOC that is sufficiently available. PMID:29456825
Zago, B W; Barelli, M A A; Hoogerheide, E S S; Corrêa, C L; Delforno, G I S; da Silva, C J
2017-08-17
Genetic variability of cassava (Manihot esculenta Crantz) in Brazil is wide, being this the result of natural and cultural selection during pre- and post-domestication of the species in different environments. Given the number of species of the genus found in the region (38 of a total of 98 species), the central region of Brazil was defined as the primary center of cassava diversity. Therefore, genetic diversity characterization of cassava accessions is fundamental, both for farmers and for plant breeders, because it allows the organization of genetic resources and better utilization of available genetic diversity. This research aims to assess genetic divergence of cassava accessions from the south-central region of the State of Mato Grosso, based on multi-categorical morphological traits. For this purpose, 38 qualitative and quantitative morphological descriptors were used. Genetic diversity was expressed by the genetic similarity index, with subsequent clustering of accessions by the modified Tocher's procedure and UPGMA. Of 38 descriptors, only growth habit of stem showed no variability. Tocher and UPGMA methods were efficient and corroborated on group composition. Both methods were able to group accessions of different localities in distinct group consistency.
Committee Opinion No 707: Access to Emergency Contraception.
2017-07-01
Emergency contraception refers to contraceptive methods used to prevent pregnancy in the first few days after unprotected intercourse, sexual assault, or contraceptive failure. Although the U.S. Food and Drug Administration approved the first dedicated product for emergency contraception in 1998, numerous barriers to emergency contraception remain. The purpose of this Committee Opinion is to examine barriers to the use of emergency contraception, emphasize the importance of increasing access, and review new methods of emergency contraception and limitations in efficacy in special populations.
Committee Opinion No. 707 Summary: Access to Emergency Contraception.
2017-07-01
Emergency contraception refers to contraceptive methods used to prevent pregnancy in the first few days after unprotected intercourse, sexual assault, or contraceptive failure. Although the U.S. Food and Drug Administration approved the first dedicated product for emergency contraception in 1998, numerous barriers to emergency contraception remain. The purpose of this Committee Opinion is to examine barriers to the use of emergency contraception, emphasize the importance of increasing access, and review new methods of emergency contraception and limitations in efficacy in special populations.
Design of mechanisms to lock/latch systems under rotational or translational motion
NASA Technical Reports Server (NTRS)
Billimoria, R. P.
1976-01-01
Bodies/systems need to be stopped and locked/latched at the end of their path. Some examples of these systems in the aerospace industry (including launch vehicle, spacecraft, and the ground support equipment) are the command module access arm, service arms, docking module of the ASTP and the orbiter access arm for the space shuttle. Two major aspects are covered: (1) various methods of latching and (2) selection of the optimum method for latching, depending on the application and the design requirement criteria.
Otaki, Yusuke; Kido, Nobuhide; Omiya, Tomoko; Ono, Kaori; Ueda, Miya; Azumano, Akinori; Tanaka, Sohei
2015-01-01
Various training methods have been developed for animal husbandry and health care in zoos and one of these trainings is blood collection. One training method, recently widely used for blood collection in Ursidae, requires setting up a sleeve outside the cage and gives access to limited blood collection sites. A new voluntary blood collection method without a sleeve was applied to the Andean bear (Tremarctos ornatus) and Asiatic black bear (Ursus thibetanus) with access to various veins at the same time. The present study evaluated the effectiveness of this new method and suggests improvements. Two Andean and two Asiatic black bears in Yokohama and Nogeyama Zoological Gardens, respectively, were trained to hold a bamboo pipe outside their cages. We could, thereby, simultaneously access superficial dorsal veins, the dorsal venous network of the hand, the cephalic vein from the carpal joint, and an area approximately 10 cm proximal to the carpal joint. This allowed us to evaluate which vein was most suitable for blood collection. We found that the cephalic vein, approximately 10 cm proximal to the carpal joint, was the most suitable for blood collection. This new method requires little or no modification of zoo facilities and provides a useful alternative method for blood collection. It could be adapted for use in other clinical examinations such as ultrasound examination. © 2015 Wiley Periodicals, Inc.
Catarci, Tiziana; De Giovanni, Loredana; Gabrielli, Silvia; Kimani, Stephen; Mirabella, Valeria
2008-08-01
There exist various guidelines for facilitating the design, preparation, and deployment of accessible eLearning applications and contents. However, such guidelines prevalently address accessibility in a rather technical sense, without giving sufficient consideration to the cognitive aspects and issues related to the use of eLearning materials by learners with disabilities. In this paper we describe how a user-centered design process was applied to develop a method and set of guidelines for didactical experts to scaffold their creation of accessible eLearning content, based on a more sound approach to accessibility. The paper also discusses possible design solutions for tools supporting eLearning content authors in the adoption and application of the proposed approach.
Informal politics and inequity of access to health care in Lebanon
2012-01-01
Introduction Despite the importance of political institutions in shaping the social environment, the causal impact of politics on health care access and inequalities has been understudied. Even when considered, research tends to focus on the effects of formal macro-political institutions such as the welfare state. We investigate how micro-politics and informal institutions affect access to care. Methods This study uses a mixed-methods approach, combining findings from a household survey (n = 1789) and qualitative interviews (n = 310) in Lebanon. Multivariate logistic regression was employed in the analysis of the survey to examine the effect of political activism on access to health care while controlling for age, sex, socioeconomic status, religious commitment and piety. Results We note a significantly positive association between political activism and the probability of receiving health aid (p < .001), with an OR of 4.0 when comparing individuals with the highest political activity to those least active in our sample. Interviews with key informants also reveal that, although a form of “universal coverage” exists in Lebanon whereby any citizen is eligible for coverage of hospitalization fees and treatments, in practice, access to health services is used by political parties and politicians as a deliberate strategy to gain and reward political support from individuals and their families. Conclusions Individuals with higher political activism have better access to health services than others. Informal, micro-level political institutions can have an important impact on health care access and utilization, with potentially detrimental effects on the least politically connected. A truly universal health care system that provides access based on medical need rather than political affiliation is needed to help to alleviate growing health disparities in the Lebanese population. PMID:22571591
A study comparing centralized CD-ROM and decentralized intranet access to MEDLINE
Darmoni, Stefan J.; Benichou, Jacques; Thirion, Benoit; Hellot, Marie France; Fuss, Jacques
2000-01-01
Objective: The purpose of this study was to evaluate the efficacy of a decentralized intranet access in each medical department as opposed to centralized unique MEDLINE access in the medical library. Design: A two-phase questionnaire to evaluate MEDLINE use was given to junior and senior physicians at Rouen University Hospital (RUH). Phase I (August–October 1996) corresponded to a time period when centralized access was the only means of access available and phase II (August–October 1997) to a time period following the introduction of decentralized intranet access. Results: A total of 168 physicians filled out at least one phase of the questionnaire, among whom 123 (73%) filled out both phases. Use of MEDLINE significantly increased in 1997 (average of 10.2 ± 1.1 searches in three months) versus 1996 (average of 4.9 ± 0.7 searches in three months, P < 0.0001). The aim of searches changed, becoming significantly more care oriented in phase II (P < 0.0001). The number of searches performed by the physicians alone increased (P < 0.0001) and searches performed by the librarian decreased (P < 0.0001) in phase II. The method of searches also changed, as searches by author (P < 0.0001), by journal (P = 0.0042), and by free word (P = 0.0027) increased in phase II. Knowledge of the following concepts of MEDLINE significantly increased: explosion (P < 0.0001), scope note (P < 0.0001), Abridged Index Medicus (AIM) journals (P < 0.0001), Medical Subject Headings (MeSH) qualifier (P < 0.0001), and focus (P < 0.0001). Conclusion: A decentralized intranet access to MEDLINE increased the number of searches and knowledge of this bibliographic database. MEDLINE intranet access modified the purpose and the methods of searching. PMID:10783970
Developing a Virtual Teach-To-Goal™ Inhaler Technique Learning Module: A Mixed Methods Approach.
Wu, Meng; Woodrick, Nicole M; Arora, Vineet M; Farnan, Jeanne M; Press, Valerie G
Most hospitalized patients with asthma or chronic obstructive pulmonary disease misuse respiratory inhalers. An in-person educational strategy, teach-to-goal (TTG), improves inpatients' inhaler technique. To develop an effective, portable education intervention that remains accessible to hospitalized patients postdischarge for reinforcement of proper inhaler technique. A mixed methods approach at an urban academic hospital was used to iteratively develop, modify, and test a virtual teach-to-goal ™ (V-TTG ™ ) educational intervention using patient end-user feedback. A survey examined access and willingness to use technology for self-management education. Focus groups evaluated patients' feedback on access, functionality, and quality of V-TTG ™ . Forty-eight participants completed the survey, with most reporting having Internet access; 77% used the Internet at home and 82% used the Internet at least once every few weeks. More than 80% reported that they were somewhat or very likely to use V-TTG ™ to gain skills to improve their health. Most participants reported smartphone access (73%); half owned laptop computers (52%). Participants with asthma versus chronic obstructive pulmonary disease were more likely to own a smartphone, have a data plan, and have daily Internet use (P < .05). Nine focus groups (n = 25) identified themes for each domain: access-platform and delivery, Internet access, and technological literacy; functionality-usefulness, content, and teaching strategy; and quality-clarity, ease of use, length, and likability. V-TTG ™ is a promising educational tool for improving patients' inhaler technique, iteratively developed and refined with patient input. Patients in our urban, academic hospital overwhelmingly reported access to platforms and willingness to use V-TTG ™ for health education. Copyright © 2017 American Academy of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.
Saxena, Raghvendra; Chandra, Amaresh
2011-11-01
Transferability of sequence-tagged-sites (STS) markers was assessed for genetic relationships study among accessions of marvel grass (Dichanthium annulatum Forsk.). In total, 17 STS primers of Stylosanthes origin were tested for their reactivity with thirty accessions of Dichanthium annulatum. Of these, 14 (82.4%) reacted and a total 106 (84 polymorphic) bands were scored. The number of bands generated by individual primer pairs ranged from 4 to 11 with an average of 7.57 bands, whereas polymorphic bands ranged from 4 to 9 with an average of 6.0 bands accounts to an average polymorphism of 80.1%. Polymorphic information content (PIC) ranged from 0.222 to 0.499 and marker index (MI) from 1.33 to 4.49. Utilizing Dice coefficient of genetic similarity dendrogram was generated through un-weighted pairgroup method with arithmetic mean (UPGMA) algorithm. Further, clustering through sequential agglomerative hierarchical and nested (SAHN) method resulted three main clusters constituted all accessions except IGBANG-D-2. Though there was intermixing of few accessions of one agro-climatic region to another, largely groupings of accessions were with their regions of collections. Bootstrap analysis at 1000 scale also showed large number of nodes (11 to 17) having strong clustering (> 50). Thus, results demonstrate the utility of STS markers of Stylosanthes in studying the genetic relationships among accessions of Dichanthium.
Palermo, Claire; Gardiner, Breeana; Gee, Carena; Charaktis, Stella; Blake, Miranda
2016-02-01
Retail stores are a promising setting for improving access to nutritious food. This study opportunistically evaluated an initiative that supported stores in small rural Victorian towns to sell fresh fruit and vegetables. It aimed to measure whether the initiative showed a trend towards improved access to fruit and vegetables in these rural communities. A mixed-methods, pre-post evaluation was employed to measure the range and price of 39 fruits and 45 vegetables, together with 15 interviews with stakeholders 2.5 years after the commencement of the initiative. Twenty-one of 35 eligible stores took up the initiative. Analysis of qualitative and quantitative data showed that the initiative improved the availability of and access to fruit and vegetables, and that stores have a role in improving access to fruit and vegetables. The overall range of fruit and vegetables increased over 18 months from a median of 10 varieties (n=10) to 17 varieties (n=15) (P=0.028) and the prices decreased over 12 months in five out of seven stores where data was available. The capacity to influence availability of fruit and vegetables was affected by time, human resources and community support. Sustaining change to fruit and vegetables access is challenging. Using stores for health promotion may be an effective strategy for improving rural populations' fruit and vegetable intake.
Access to contraception by minors in Jamaica: a public health concern
Crawford, Tazhmoye V.; McGrowder, Donovan A.; Crawford, Alexay
2009-01-01
Background: Access to contraceptive by minors (pre-adolescents and adolescents) has spurred policy and legislative debates, part of which is that in an effort to successfully meet government's objective of a healthy sexual lifestyle among minors. Aims: This study examined factors affecting sexual reproductive health in minors, namely: access to contraceptive advice and treatment, pregnancy, number of sexual partners, sexually transmitted infections (STIs) and confidentiality. Materials and Methods: This research involved quantitative and qualitative data. Two hundred and thirty eight sexually active cases were investigated in Jamaica by the researchers, during the period 2006-2007. The age group population was 9-11, 12-14, and 15-17. Results: The study showed that access to contraceptive advice and treatment by minors was more favorable to males than females. The difference in access to contraceptive between male and female was statistically significant (x2 = 20.16, p<0.05). Of the 80 male respondents, who are contraceptive users, 11 encountered challenges in legitimately accessing contraceptive methods, while 38 of the 40 female users also encountered challenges. This resulted in unintended pregnancies and impregnation (33.2%), as well as the contracting of STIs (21%). Conclusion: The findings of this study will be important in informing the development of reproductive health services and family life education programs for pre-adolescents and adolescents in Jamaica and other Caribbean countries. PMID:22666704
78 FR 29159 - Electric Power Research Institute; Seismic Evaluation Guidance
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-17
..., conducted field investigations, and used more recent methods than were previously available. In performing... available, by searching on http://www.regulations.gov under Docket ID NRC-2013-0038. Federal Rulemaking Web... Agencywide Documents Access and Management System (ADAMS): You may access publicly-available documents online...
22 CFR 142.16 - Existing facilities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Foreign Relations DEPARTMENT OF STATE CIVIL RIGHTS NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS... part is viewed in its entirety it is readily accessible to and usable by handicapped persons. This... facility accessible to and usable by handicapped persons. (b) Methods. A recipient may comply with the...
22 CFR 142.16 - Existing facilities.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Foreign Relations DEPARTMENT OF STATE CIVIL RIGHTS NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS... part is viewed in its entirety it is readily accessible to and usable by handicapped persons. This... facility accessible to and usable by handicapped persons. (b) Methods. A recipient may comply with the...
22 CFR 142.16 - Existing facilities.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Foreign Relations DEPARTMENT OF STATE CIVIL RIGHTS NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS... part is viewed in its entirety it is readily accessible to and usable by handicapped persons. This... facility accessible to and usable by handicapped persons. (b) Methods. A recipient may comply with the...
22 CFR 142.16 - Existing facilities.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Foreign Relations DEPARTMENT OF STATE CIVIL RIGHTS NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS... part is viewed in its entirety it is readily accessible to and usable by handicapped persons. This... facility accessible to and usable by handicapped persons. (b) Methods. A recipient may comply with the...
22 CFR 142.16 - Existing facilities.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Foreign Relations DEPARTMENT OF STATE CIVIL RIGHTS NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS... part is viewed in its entirety it is readily accessible to and usable by handicapped persons. This... facility accessible to and usable by handicapped persons. (b) Methods. A recipient may comply with the...
45 CFR 1153.150 - Program accessibility: Existing facilities.
Code of Federal Regulations, 2011 CFR
2011-10-01
... FOUNDATION ON THE ARTS AND THE HUMANITIES NATIONAL ENDOWMENT FOR THE ARTS ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE NATIONAL ENDOWMENT FOR THE ARTS...), alternative methods of achieving program accessibility include— (i) Using audio-visual materials and devices...
45 CFR 1153.150 - Program accessibility: Existing facilities.
Code of Federal Regulations, 2012 CFR
2012-10-01
... FOUNDATION ON THE ARTS AND THE HUMANITIES NATIONAL ENDOWMENT FOR THE ARTS ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE NATIONAL ENDOWMENT FOR THE ARTS...), alternative methods of achieving program accessibility include— (i) Using audio-visual materials and devices...
45 CFR 1153.150 - Program accessibility: Existing facilities.
Code of Federal Regulations, 2013 CFR
2013-10-01
... FOUNDATION ON THE ARTS AND THE HUMANITIES NATIONAL ENDOWMENT FOR THE ARTS ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE NATIONAL ENDOWMENT FOR THE ARTS...), alternative methods of achieving program accessibility include— (i) Using audio-visual materials and devices...
45 CFR 1153.150 - Program accessibility: Existing facilities.
Code of Federal Regulations, 2014 CFR
2014-10-01
... FOUNDATION ON THE ARTS AND THE HUMANITIES NATIONAL ENDOWMENT FOR THE ARTS ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE NATIONAL ENDOWMENT FOR THE ARTS...), alternative methods of achieving program accessibility include— (i) Using audio-visual materials and devices...
45 CFR 1153.150 - Program accessibility: Existing facilities.
Code of Federal Regulations, 2010 CFR
2010-10-01
... FOUNDATION ON THE ARTS AND THE HUMANITIES NATIONAL ENDOWMENT FOR THE ARTS ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE NATIONAL ENDOWMENT FOR THE ARTS...), alternative methods of achieving program accessibility include— (i) Using audio-visual materials and devices...
DOT National Transportation Integrated Search
2014-04-01
This report describes the methodology and results of analyses performed to identify and evaluate : alternative methods to control traffic entering a lane closure on a two-lane, two-way road from low-volume : access points. Researchers documented the ...
Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture
McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID
2012-05-08
Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Berco, Dan, E-mail: danny.barkan@gmail.com; Tseng, Tseung-Yuen, E-mail: tseng@cc.nctu.edu.tw
This study presents an evaluation method for resistive random access memory retention reliability based on the Metropolis Monte Carlo algorithm and Gibbs free energy. The method, which does not rely on a time evolution, provides an extremely efficient way to compare the relative retention properties of metal-insulator-metal structures. It requires a small number of iterations and may be used for statistical analysis. The presented approach is used to compare the relative robustness of a single layer ZrO{sub 2} device with a double layer ZnO/ZrO{sub 2} one, and obtain results which are in good agreement with experimental data.
Analytic Methods in Investigative Geometry.
ERIC Educational Resources Information Center
Dobbs, David E.
2001-01-01
Suggests an alternative proof by analytic methods, which is more accessible than rigorous proof based on Euclid's Elements, in which students need only apply standard methods of trigonometry to the data without introducing new points or lines. (KHR)
NASA Astrophysics Data System (ADS)
Sasongko, W.; Kurniasanti, R. P.; Siregar, J. P.
2017-06-01
Tulungagung has a public space that actively used by the community named Taman Aloon-aloon Tulungagung. The importance of research on the Development Concept of Taman Aloon-aloon Tulungagung as open public space is requiring location structuring for appeal aspects of public space in order to spread evenly and can be enjoyed by users of public space. Therefore, this study aimed to assess users’ perceptions of the attractiveness of public space by Importance Performance Analysis (IPA) method and assess the level of users’ visual accessibility by Visibility Graph Analysis (VGA) method and assess the diversity of users’ activity by Behavior Mapping method. As this study shows that the condition of the floor surface, the location of a bird cage, shade conditions of public space and location of lighting lamp become the top priority in the development concept of Taman Aloon-aloon Tulungagung. The location for the prioritized attributes are adjusted to the results of the visual accessibility level evaluation matrix and activities diversity.
Shcherbakova, Inna; Mitra, Somdeb; Beer, Robert H.; Brenowitz, Michael
2006-01-01
‘Footprinting’ describes assays in which ligand binding or structure formation protects polymers such as nucleic acids and proteins from either cleavage or modification; footprinting allows the accessibility of individual residues to be mapped in solution. Equilibrium and time-dependent footprinting links site-specific structural information with thermodynamic and kinetic transitions. The hydroxyl radical (·OH) is a particularly valuable footprinting probe by virtue of it being among the most reactive of chemical oxidants; it reports the solvent accessibility of reactive sites on macromolecules with as fine as a single residue resolution. A novel method of millisecond time-resolved ·OH footprinting has been developed based on the Fenton reaction, Fe(II) + H2O2 → Fe(III) + ·OH + OH−. This method can be implemented in laboratories using widely available three-syringe quench flow mixers and inexpensive reagents to study local changes in the solvent accessibility of DNA, RNA and proteins associated with their biological function. PMID:16582097
Interface methods for using intranet portal organizational memory information system.
Ji, Yong Gu; Salvendy, Gavriel
2004-12-01
In this paper, an intranet portal is considered as an information infrastructure (organizational memory information system, OMIS) supporting organizational learning. The properties and the hierarchical structure of information and knowledge in an intranet portal OMIS was identified as a problem for navigation tools of an intranet portal interface. The problem relates to navigation and retrieval functions of intranet portal OMIS and is expected to adversely affect user performance, satisfaction, and usefulness. To solve the problem, a conceptual model for navigation tools of an intranet portal interface was proposed and an experiment using a crossover design was conducted with 10 participants. In the experiment, a separate access method (tabbed tree tool) was compared to an unified access method (single tree tool). The results indicate that each information/knowledge repository for which a user has a different structural knowledge should be handled separately with a separate access to increase user satisfaction and the usefulness of the OMIS and to improve user performance in navigation.
Protecting our children's health: The ultimate government 'stimulus package'.
Oliver, L Christine
2009-07-01
The Children's Environment and Health Action Plan for Europe has established four Regional Priority Goals (RPG) for the protection of the health of children. Hutter et al (JPHP 2009) have developed and tested an accessible method for addressing one aspect of RPG III: indoor and outdoor air pollution. The study provides an accessible method for use by communities to access effects of air pollution in and around the home on the respiratory health of children. This Commentary reviews that study, as well as other evidence in the scientific literature of effects of indoor and outdoor air pollution on children's respiratory health. In addition, this Commentary discusses the importance of air quality in schools to children's respiratory health and to school attendance and performance, citing supportive dat and urging action on this front.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chernoguzov, Alexander; Markham, Thomas R.; Haridas, Harshal S.
A method includes generating at least one access vector associated with a specified device in an industrial process control and automation system. The specified device has one of multiple device roles. The at least one access vector is generated based on one or more communication policies defining communications between one or more pairs of devices roles in the industrial process control and automation system, where each pair of device roles includes the device role of the specified device. The method also includes providing the at least one access vector to at least one of the specified device and one ormore » more other devices in the industrial process control and automation system in order to control communications to or from the specified device.« less
Method and system for a network mapping service
Bynum, Leo
2017-10-17
A method and system of publishing a map includes providing access to a plurality of map data files or mapping services between at least one publisher and at least one subscriber; defining a map in a map context comprising parameters and descriptors to substantially duplicate a map by reference to mutually accessible data or mapping services, publishing a map to a channel in a table file on server; accessing the channel by at least one subscriber, transmitting the mapping context from the server to the at least one subscriber, executing the map context by the at least one subscriber, and generating the map on a display software associated with the at least one subscriber by reconstituting the map from the references and other data in the mapping context.
LIBS-LIF-Raman: a new tool for the future E-RIHS
NASA Astrophysics Data System (ADS)
Detalle, Vincent; Bai, Xueshi; Bourguignon, Elsa; Menu, Michel; Pallot-Frossard, Isabelle
2017-07-01
France is one of the countries involved in the future E-RIHS - European Research Infrastructure for Heritage Science. The research infrastructure dedicated to the study of materials of cultural and natural heritage will provide transnational access to state-of-the-art technologies (synchrotron, ion beams, lasers, portable methods, etc.) and scientific archives. E-RIHS addresses the experimental problems of knowledge and conservation of heritage materials (collections of art and natural museums, monuments, archaeological sites, archives, libraries, etc.). The cultural artefacts are characterized by complementary methods at multi-scales. The variety and the hybrid are specific of these artefacts and induce complex problems that are not expected in traditional Natural Science: paints, ceramics and glasses, metals, palaeontological specimens, lithic materials, graphic documents, etc. E-RIHS develops in that purpose transnational access to distributed platforms in many European countries. Five complementary accesses are in this way available: FIXLAB (access to fixed platforms for synchrotron, neutrons, ion beams, lasers, etc.), MOLAB (access to mobile examination and analytical methods to study the works in situ), ARCHLAB (access to scientific archives kept in the cultural institutions), DIGILAB (access to a digital infrastructure for the processing of quantitative data, implementing a policy on (re)use of data, choice of data formats, etc.) and finally EXPERTLAB (panels of experts for the implementation of collaborative and multidisciplinary projects for the study, the analysis and the conservation of heritage works).Thus E-RIHS is specifically involved in complex studies for the development of advanced high-resolution analytical and imaging tools. The privileged field of intervention of the infrastructure is that of the study of large corpora, collections and architectural ensembles. Based on previous I3 European program, and especially IPERION-CH program that support the creation of new mobile instrumentation, the French institutions are involved in the development of LIBS/LIF/RAMAN portable instrumentation. After a presentation of the challenge and the multiple advantages in building the European Infrastructure and of the French E-RIHS hub, the major interests of associating the three lasers based on analytical methods for a more global and precise characterization of the heritage objects taking into account their precious characters and their specific constraints. Lastly some preliminary results will be presented in order to give a first idea of the power of this analytical tool.
Checking an integrated model of web accessibility and usability evaluation for disabled people.
Federici, Stefano; Micangeli, Andrea; Ruspantini, Irene; Borgianni, Stefano; Corradi, Fabrizio; Pasqualotto, Emanuele; Olivetti Belardinelli, Marta
2005-07-08
A combined objective-oriented and subjective-oriented method for evaluating accessibility and usability of web pages for students with disability was tested. The objective-oriented approach is devoted to verifying the conformity of interfaces to standard rules stated by national and international organizations responsible for web technology standardization, such as W3C. Conversely, the subjective-oriented approach allows assessing how the final users interact with the artificial system, accessing levels of user satisfaction based on personal factors and environmental barriers. Five kinds of measurements were applied as objective-oriented and subjective-oriented tests. Objective-oriented evaluations were performed on the Help Desk web page for students with disability, included in the website of a large Italian state university. Subjective-oriented tests were administered to 19 students labeled as disabled on the basis of their own declaration at the University enrolment: 13 students were tested by means of the SUMI test and six students by means of the 'Cooperative evaluation'. Objective-oriented and subjective-oriented methods highlighted different and sometimes conflicting results. Both methods have pointed out much more consistency regarding levels of accessibility than of usability. Since usability is largely affected by individual differences in user's own (dis)abilities, subjective-oriented measures underscored the fact that blind students encountered much more web surfing difficulties.
Solvent Flux Method (SFM): A Case Study of Water Access to Candida antarctica Lipase B.
Benson, Sven P; Pleiss, Jürgen
2014-11-11
The solvent flux method (SFM) was developed to comprehensively characterize the influx of solvent molecules from the solvent environment into the active site of a protein in the framework of molecular dynamics simulations. This was achieved by introducing a solvent concentration gradient as well as partially reorienting and rescaling the velocity vector of all solvent molecules contained within a spherical volume enclosing the protein, thus inducing an accelerated solvent influx toward the active site. In addition to the detection of solvent access pathway within the protein structure, it is hereby possible to identify potential amino acid positions relevant to solvent-related enzyme engineering with high statistical significance. The method is particularly aimed at improving the reverse hydrolysis reaction rates in nonaqueous media. Candida antarctica lipase B (CALB) binds to a triglyceride-water interface with its substrate entrance channel oriented toward the hydrophobic substrate interface. The lipase-triglyceride-water system served as a model system for SFM to evaluate the influx of water molecules to the active site. As a proof of principle for SFM, a previously known water access pathway in CALB was identified as the primary water channel. In addition, a secondary water channel and two pathways for water access which contribute to water leakage between the protein and the triglyceride-water interface were identified.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Heckeroth, S.; McLees, C.
1997-12-31
Land use planning is often no more than a strategy for getting the most economic value from a given piece of land while attempting to minimize the expense of mitigating environmental impacts. Because conventional fuels are currently inexpensive, development takes place with little consideration for energy efficiency or solar access. By identifying sites with solar access now, planners and building designers can assure that the south facing roofs and walls of future buildings will receive the solar energy necessary to satisfy the energy needs of their occupants. Planner Ian McHarg outlined scientific methods to map natural determinants including geology, hydrology,more » wildlife, soils, climate, as well as social determinants like population density, energy consumption, and transportation patterns in the late 60s. Overlays of these hand plotted maps gave planners a method of finding the most suitable sites for identified needs but were cost prohibitive for most projects. The affordability of studies done on high speed computers now allows general application of McHargian planning methods. At the time McHarg was developing his planning theory photovoltaics were so expensive their use was restricted to government projects. The low cost of heating with fossil fuels made solar heating expensive by comparison. Today advances in solar technology have made solar electricity and heating competitive with non-renewable energy resources. This paper will show how McHargian planning methods can be effectively used in conjunction with Geographic Information Systems (GIS) to include efficiency and renewable energy access in land use decision making.« less
Onsite provision of specialized contraceptive services: does Title X funding enhance access?
Thiel de Bocanegra, Heike; Cross Riedel, Julie; Menz, Mary; Darney, Philip D; Brindis, Claire D
2014-05-01
This article presents the extent to which providers enrolled in California's Family Planning, Access, Care, and Treatment (Family PACT) program offer contraceptive methods onsite, thus eliminating one important access barrier. Family PACT has a diverse provider network, including public-sector providers receiving Title X funding, public-sector providers not receiving Title X funding, and private-sector providers. We explored whether Title X funding enhances providers' ability to offer contraceptive methods that require specialized skills onsite. Data were derived from 1,072 survey responses to a 2010 provider-capacity survey matched by unique identifier to administrative claims data. A significantly greater proportion of Title X-funded providers compared to non-Title X public and private providers offered onsite services for the following studied methods: intrauterine contraceptives (90% Title X, 51% public non-Title X, 38% private); contraceptive implants (58% Title X, 19% public non-Title X, 7% private); vasectomy (8% Title X, 4% public non-Title X, 1% private); and fertility-awareness methods (69% Title X, 55% public non-Title X, 49% private) (all p<0.0001). The association between onsite provision and Title X funding remained after stratifying individually by clinic specialty, facility capacity to provide reproductive health services (based on staffing), and rural/urban location. Extra funding for publicly funded family-planning programs, through mechanisms such as Title X, appears to be associated with increased onsite access to a wide range of contraceptive services, including those that require special skills and training.
"On the Sidelines": Access to Autism-Related Services in the West Bank
ERIC Educational Resources Information Center
Dababnah, Sarah; Bulson, Kathleen
2015-01-01
We examined access to autism-related services among Palestinians (N = 24) raising children with autism spectrum disorder (ASD) in the West Bank. Using qualitative methods, we identified five primary interview themes. Poor screening, diagnostic, and psychoeducational practices were prevalent, as parents reported service providers minimized parental…
OCP: Opportunistic Carrier Prediction for Wireless Networks
2008-08-01
Many protocols have been proposed for medium access control in wireless networks. MACA [13], MACAW [3], and FAMA [8] are the earlier proposals for...world performance of carrier sense. In Proceedings of ACM SIGCOMM E-WIND Workshop, 2005. [13] P. Karn. MACA : A new channel access method for packet radio
Undersea Communication Network Self-Localization during the Unet Seatrial
2010-06-01
Multiple Access Collision Avoidance ( MACA ) suitable for underwater networks [6]. Control frames are short 9-byte utility packets which are...Proceedings of the MILCOM’08 Conference, San Diego, CA, USA, November 2008. [6] P. Karn, MACA --a new channel access method for packet radio, in ARRL/CRRL
Research on Multimedia Access to Microcomputers for Visually Impaired Youth.
ERIC Educational Resources Information Center
Ashcroft, S. C.
This final report discusses the outcomes of a federally funded project that studied visual, auditory, and tactual methods designed to give youth with visual impairments access to microcomputers for curricular, prevocational, and avocational purposes. The objectives of the project were: (1) to research microcomputer systems that could be made…
USDA-ARS?s Scientific Manuscript database
The USDA-ARS National Plant Germplasm System (NPGS) maintains 946 accessions of sugarcane (Saccharum spp.) in the field at the Subtropical Horticulture Research Station in Miami, Florida. These accessions are particularly vulnerable to hurricanes, diseases, and other threats. We sought to a identify...
Remote Patron Validation: Posting a Proxy Server at the Digital Doorway.
ERIC Educational Resources Information Center
Webster, Peter
2002-01-01
Discussion of remote access to library services focuses on proxy servers as a method for remote access, based on experiences at Saint Mary's University (Halifax). Topics include Internet protocol user validation; browser-directed proxies; server software proxies; vendor alternatives for validating remote users; and Internet security issues. (LRW)
ERIC Educational Resources Information Center
Stock, Steven E.; Davies, Daniel K.; Davies, Katelyn R.; Wehmeyer, Michael L.
2006-01-01
Background: Palmtop computers provide a promising mobile platform to address barriers to computer-based supports for people with intellectual disabilities. This study evaluated a specially designed interface to make navigation and features of palmtop computers more accessible to users with intellectual disabilities. Method: The specialised…
Teledermatology Consultations Provide Specialty Care for Farmworkers in Rural Clinics
ERIC Educational Resources Information Center
Vallejos, Quirina M.; Quandt, Sara A.; Feldman, Steven R.; Fleischer, Alan B., Jr.; Brooks, Thanh; Cabral, Gonzalo; Heck, Judy; Schulz, Mark R.; Verma, Amit; Whalley, Lara E.; Arcury, Thomas A.
2009-01-01
Context: Rural patients have limited access to dermatologic care. Farmworkers have high rates of skin disease and limited access to care. Purpose: This exploratory study assessed whether teledermatology consultations could help meet the needs of health care providers for farmworkers in rural clinics. Methods: Dermatologists provided 79…
Writing for Change: Engaging Juveniles through Alternative Literacy Education
ERIC Educational Resources Information Center
Jacobi, Tobi
2008-01-01
Research on incarceration and educational access continues to reveal the stark reality for many adjudicated youth: without access to educational opportunities recidivism is probable. Yet conventional methods of teaching critical reading, writing, and thinking skills are not always successful for juveniles who have found little success (or hope) in…
10 CFR 1040.72 - Existing facilities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Existing facilities. 1040.72 Section 1040.72 Energy... § 1040.72 Existing facilities. (a) Accessibility. A recipient shall operate any program or activity to... facilities or every part of a facility accessible to and useable by handicapped persons. (b) Methods. A...
A Parent-Focused Early Intervention Program for Autism: Who Gets Access?
ERIC Educational Resources Information Center
Birkin, Christina; Anderson, Angelika; Seymour, Fred; Moore, Dennis W.
2008-01-01
Background: The EarlyBird program is a psycho-educational early intervention program for parents of children with autistic spectrum disorder (ASD). It aims to provide parents with skills to increase their child's communication and manage challenging behaviour using behavioural techniques. Method: Two interlinked studies examined access to the…
First-Generation College Students: Perceptions, Access, and Participation at Urban University
ERIC Educational Resources Information Center
Lovano McCann, Erica
2017-01-01
This study explores how participation in a first-generation college student sophomore seminar course, a high impact practice, influences students' perceptions of campus climate, access to forms of capital and involvement behaviors. Utilizing a mixed methods approach of quantitative surveys and qualitative interviews to explore the experience of…
76 FR 64049 - Bank Secrecy Act Regulations: Definition of “Monetary Instrument”
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-17
..., and anti-money laundering program requirements on providers and sellers of prepaid access. While the..., stated: \\13\\ See Money Laundering Using New Payment Methods, Financial Action Task Force, October 2010... Money Laundering Strategy stated that prepaid access is ``* * * an emerging cash alternative for both...