Evaluation of modified work zone traffic control devices at business accesses
DOT National Transportation Integrated Search
2001-01-01
Modified work zone traffic control devices at business accesses were evaluated on two Oregon Department of Transportation (ODOT) projects in 1999 and 2000. On one section project, blue Temporary Business Access" signs were used at business accesses d...
Evaluating the effectiveness of biometric access control systems
NASA Astrophysics Data System (ADS)
Lively, Valerie M.
2005-05-01
This paper describes the contribution by the National Safe Skies Alliance (Safe Skies) in operational testing of biometric access control systems under the guidance of the Transportation Security Administration (TSA). Safe Skies has been conducting operational tests of biometric access control systems on behalf of the TSA for approximately four years. The majority of this testing has occurred at the McGhee Tyson Airport (TYS) in Knoxville, Tennessee. Twelve separate biometric devices - eight fingerprint, facial, iris, hand geometry, and fingerprint and iris, have been tested to date. Tests were conducted at a TYS administrative door and different airports to evaluate the access control device under normal, abnormal, and attempt-to-defeat conditions.
DOT National Transportation Integrated Search
2014-04-01
This report describes the methodology and results of analyses performed to identify and evaluate : alternative methods to control traffic entering a lane closure on a two-lane, two-way road from low-volume : access points. Researchers documented the ...
Kim, Seungjoo
2014-01-01
There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943
Baek, Seungsoo; Kim, Seungjoo
2014-01-01
There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.
On the generalization of attitude accessibility after repeated attitude expression
Spruyt, Adriaan; Fazio, Russell H.; Hermans, Dirk
2016-01-01
Abstract The more accessible an attitude is, the stronger is its influence on information processing and behavior. Accessibility can be increased through attitude rehearsal, but it remains unknown whether attitude rehearsal also affects the accessibility of related attitudes. To investigate this hypothesis, participants in an experimental condition repeatedly expressed their attitudes towards exemplars of several semantic categories during an evaluative categorization task. Participants in a control condition performed a non‐evaluative task with the same exemplars and evaluated unrelated attitude objects. After a 30‐minute interval, participants in the experimental condition were faster than controls to evaluate not only the original exemplars but also novel exemplars of the same categories. This finding suggests that the effect of attitude rehearsal on accessibility generalizes to attitudes towards untrained but semantically related attitude objects. © 2016 The Authors. European Journal of Social Psychology published by John Wiley & Sons, Ltd. PMID:28701803
Policy reconciliation for access control in dynamic cross-enterprise collaborations
NASA Astrophysics Data System (ADS)
Preuveneers, D.; Joosen, W.; Ilie-Zudor, E.
2018-03-01
In dynamic cross-enterprise collaborations, different enterprises form a - possibly temporary - business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.
Information Assurance and Cyber Defence (Assurance de l’information et cyberdefense)
2010-11-01
project is that knowledge exchange in a timely fashion is highly significant. Authentication and Authorisation of Users and Services in Federated...Detection, Protection and Countermeasures; • Security Models and Architectures; • Security Policies, Evaluation, Authorisation and Access Control; and...Evaluation, Authorisation and Access Control • Network and Information Security Awareness The topics for the symposium had been established
A novel asynchronous access method with binary interfaces
2008-01-01
Background Traditionally synchronous access strategies require users to comply with one or more time constraints in order to communicate intent with a binary human-machine interface (e.g., mechanical, gestural or neural switches). Asynchronous access methods are preferable, but have not been used with binary interfaces in the control of devices that require more than two commands to be successfully operated. Methods We present the mathematical development and evaluation of a novel asynchronous access method that may be used to translate sporadic activations of binary interfaces into distinct outcomes for the control of devices requiring an arbitrary number of commands to be controlled. With this method, users are required to activate their interfaces only when the device under control behaves erroneously. Then, a recursive algorithm, incorporating contextual assumptions relevant to all possible outcomes, is used to obtain an informed estimate of user intention. We evaluate this method by simulating a control task requiring a series of target commands to be tracked by a model user. Results When compared to a random selection, the proposed asynchronous access method offers a significant reduction in the number of interface activations required from the user. Conclusion This novel access method offers a variety of advantages over traditionally synchronous access strategies and may be adapted to a wide variety of contexts, with primary relevance to applications involving direct object manipulation. PMID:18959797
Proximity-based access control for context-sensitive information provision in SOA-based systems
NASA Astrophysics Data System (ADS)
Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew
2014-06-01
Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.
Design of an Efficient CAC for a Broadband DVB-S/DVB-RCS Satellite Access Network
NASA Astrophysics Data System (ADS)
Inzerilli, Tiziano; Montozzi, Simone
2003-07-01
This paper deals with efficient utilization of network resources in an advanced broadband satellite access system. It proposes a technique for admission control of IP streams with guaranteed QoS which does not interfere with the particular BoD (Bandwidth on Demand) algorithm that handles access to uplink bandwidth, an essential part of a DVB- RCS architecture. This feature of the admission control greatly simplify its integration in the satellite network. The purpose of this admission control algorithm in particular is to suitably and dynamically configure the overall traffic control parameters, in the access terminal of the user and service segment, with a simple approach which does not introduces limitations and/or constraints to the BoD algorithm. Performance of the proposed algorithm is evaluated thorugh Opnet simulations using an ad-hoc platform modeling DVB-based satellite access.The results presented in this paper were obtained within SATIP6 project, which is sponsored within the 5th EU Research Programme, IST. The aims of the project are to evaluate and demonstrate key issues of the integration of satellite-based access networks into the Internet in order to support multimedia services over wide areas. The satellite link layer is based on DVB-S on the forward link and DVB-RCS on the return link. Adaptation and optimization of the DVB-RCS access standard in order to support QoS provision are central issues of the project. They are handled through an integration of Connection Admission Control (CAC), Traffic Shaping and Policing techniques.
DOT National Transportation Integrated Search
2016-02-01
In August 2014, The Washington State Department of Transportation (WSDOT) changed the access : controls for the HOT (High Occupancy Toll) lanes on State Route (SR) 167. The lanes were initially designed : and implemented to allow access at only six p...
Data General Corporation Advanced Operating System/Virtual Storage (AOS/ VS). Revision 7.60
1989-02-22
control list for each directory and data file. An access control list includes the users who can and cannot access files as well as the access...and any required data, it can -5- February 22, 1989 Final Evaluation Report Data General AOS/VS SYSTEM OVERVIEW operate asynchronously and in parallel...memory. The IOC can perform the data transfer without further interventiin from the CPU. The I/O channels interface with the processor or system
A slotted access control protocol for metropolitan WDM ring networks
NASA Astrophysics Data System (ADS)
Baziana, P. A.; Pountourakis, I. E.
2009-03-01
In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.
Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R
2018-03-20
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.
2018-01-01
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406
Mandatory and Location-Aware Access Control for Relational Databases
NASA Astrophysics Data System (ADS)
Decker, Michael
Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.
ERIC Educational Resources Information Center
Campero, Lourdes; Walker, Dilys; Atienzo, Erika E.; Gutierrez, Juan Pablo
2011-01-01
Objective: To evaluate the effectiveness of an educational intervention for parents of first year high school students in the State of Morelos, Mexico, whose aim was to impact adolescents' sexual behavior, knowledge and access to contraception. Material and methods: Quasi-experimental prospective study with eleven control and eleven intervention…
Intelligent Facial Recognition Systems: Technology advancements for security applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Beer, C.L.
1993-07-01
Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g.,more » fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.« less
Access control design on highway interchanges.
DOT National Transportation Integrated Search
2008-01-01
The adequate spacing and design of access to crossroads in the vicinity of freeway ramps are critical to the safety and traffic operations of both the freeway and the crossroad. The research presented in this report develops a methodology to evaluate...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-08
... the program (60 percent) or the control (40 percent) group. The evaluation includes: An implementation... participants to either the program group, which was offered program services, or the control group, which was... control groups (the latter could access non-RExO services) as well as variations across grantees. By...
Evaluation of Standards for Access Control Enabling PHR-S Federation.
Mense, Alexander; Urbauer, Philipp; Sauermann, Stefan
2017-01-01
The adoption of the Internet of Things (IoT) and mobile applications in the healthcare may transform the healthcare industry by offering better disease tracking and management as well as patient empowerment. Unfortunately, almost all of these new systems set up their own ecosystem and to be really valuable for the care process they need to be integrated or federated with user managed access control services based on international standards and profiles to enable interoperability. Thus, this work presents the results of an evaluation of available specifications for federated authorization, based on a set of basic requirements.
NASA Astrophysics Data System (ADS)
Hirono, Masahiko; Nojima, Toshio
This paper presents a new signaling architecture for radio-access control in wireless communications systems. Called THREP (for THREe-phase link set-up Process), it enables systems with low-cost configurations to provide tetherless access and wide-ranging mobility by using autonomous radio-link controls for fast cell searching and distributed call management. A signaling architecture generally consists of a radio-access part and a service-entity-access part. In THREP, the latter part is divided into two steps: preparing a communication channel, and sustaining it. Access control in THREP is thus composed of three separated parts, or protocol phases. The specifications of each phase are determined independently according to system requirements. In the proposed architecture, the first phase uses autonomous radio-link control because we want to construct low-power indoor wireless communications systems. Evaluation of channel usage efficiency and hand-over loss probability in the personal handy-phone system (PHS) shows that THREP makes the radio-access sub-system operations in a practical application model highly efficient, and the results of a field experiment show that THREP provides sufficient protection against severe fast CNR degradation in practical indoor propagation environments.
Gans, Kim M; Gorham, Gemma; Risica, Patricia M; Dulin-Keita, Akilah; Dionne, Laura; Gao, Tina; Peters, Sarah; Principato, Ludovica
2016-06-28
Adequate fruit and vegetable (F&V) intake is important for disease prevention. Yet, most Americans, especially low-income and racial/ethnic minorities, do not eat adequate amounts. These disparities are partly attributable to food environments in low-income neighborhoods where residents often have limited access to affordable, healthful food and easy access to inexpensive, unhealthful foods. Increasing access to affordable healthful food in underserved neighborhoods through mobile markets is a promising, year-round strategy for improving dietary behaviors and reducing F&V intake disparities. However, to date, there have been no randomized controlled trials studying their effectiveness. The objective of the 'Live Well, Viva Bien' (LWVB) cluster randomized controlled trial is to evaluate the efficacy of a multicomponent mobile market intervention at increasing F&V intake among residents of subsidized housing complexes. One housing complex served as a pilot site for the intervention group and the remaining 14 demographically-matched sites were randomized into either the intervention or control group. The intervention group received bimonthly, discount, mobile, fresh F&V markets in conjunction with a nutrition education intervention (two F&V campaigns, newsletters, DVDs and cooking demonstrations) for 12 months. The control group received physical activity and stress reduction interventions. Outcome measures include F&V intake (measured by two validated F&V screeners at baseline, six-month and twelve-months) along with potential psychosocial mediating variables. Extensive quantitative and qualitative process evaluation was also conducted throughout the study. Modifying neighborhood food environments in ways that increase access to affordable, healthful food is a promising strategy for improving dietary behaviors among low-income, racial and ethnic minority groups at increased risk for obesity and other food-related chronic diseases. Discount, mobile F&V markets address all the major barriers to eating more F&V (high cost, poor quality, limited access and limited time to shop and cook) and provide a year-round solution to limited access to healthful food in low-income neighborhoods. LWVB is the first randomized controlled trial evaluating the effectiveness of mobile markets at increasing F&V intake. If proven efficacious at increasing F&V consumption, LWVB could be disseminated widely to neighborhoods that have low access to fresh F&V. Clinicatrials.gov registration number: NCT02669472 First Received: January 19, 2016.
Evaluating Self-Control and Impulsivity in Children with Severe Behavior Disorders.
ERIC Educational Resources Information Center
Vollmer, Timothy R.; Borrero, John C.; Lalli, Joseph S.; Daniel, Dency
1999-01-01
This study evaluated self-control and impulsivity in two nine-year- old males with severe developmental disabilities and behavior disorders. Functional analyses suggested that aggression was reinforced by food access. A differential reinforcement procedure to reinforce appropriate mands was implemented. Although aggression occurred when it…
Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors.
Uriarte Itzazelaia, Mikel; Astorga, Jasone; Jacob, Eduardo; Huarte, Maider; Romaña, Pedro
2018-02-13
Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.
Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors
Huarte, Maider; Romaña, Pedro
2018-01-01
Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model. PMID:29438338
Kim, Heon Woong; Kim, Jung Bong; Shanmugavelan, Poovan; Kim, Se Na; Cho, Young Sook; Kim, Haeng Ran; Lee, Jeong-Tae; Jeon, Weon-Tai; Lee, Dong Jin
2013-04-15
Rice is the staple food and one of the world’s three major grain crops. Rice contains more than 100 bioactive substances including phytic acid, isovitexin, γ-oryzanol, phytosterols, octacosanol, squalene, γ-aminobutyric acid (GABA), tocopherol, tocotrienol derivatives, etc. Out of them, γ-oryzanol is known to have important biological profile such as anti-oxidants, inhibitor of cholesterol oxidation, reduce serum cholesterol levels in animals, effective in the treatment of inflammatory diseases, inhibit tumor growth, reduce blood pressure and promotes food storage stability when used as a food additive, etc. Hence in the present investigation, we aimed to evaluate the content and composition of γ-oryzanol from pigmented rice germplasms using a liquid chromatography with diode array detection and electrospray ionization-mass spectrometry (LC-DAD-ESI/MS). In the present study, 33 exotic pigmented rice accessions (red, white and purple) have been evaluated. Among them, the contents of γ-oryzanol varied from 3.5 to 21.0 mg/100 g with a mean of 11.2 mg/100 g. A total of ten components of γ-oryzanol including Δ⁷-stigmastenyl ferulate were identified of which, cycloartenyl ferulate, 24-methylenecycloartanyl ferulate, campesteryl ferulate and sitosteryl ferulate were identified as the major components. The mean proportions of steryl ferulates were in the descending order of 24-methylenecycloartanyl ferulate > cycloartenyl ferulate > campesteryl ferulate > sitosteryl ferulate > Δ⁷-campestenyl ferulate > campestanyl ferulate > sitostanyl ferulate > Δ⁷-stigmastenyl ferulate > stigamsteryl ferulate > Δ⁷-sitostenyl ferulate. Almost 11 accessions (33%) showed higher content than the control rice Chucheongbyeo and higher proportions ranged from 10 to 15 mg/100 g. Interestingly, the red rice accession Liberian Coll. B11/B-11 (21.0 mg/100 g) showed higher content γ-oryzanol than control rice Jeokjinjubyeo (19.1 mg/100 g) and the purple rice accession Padi Adong Dumarat, Mardi No.4376 (20.3 mg/100 g) showed a similar content with control rice Heugjinjubyeo (21.4 mg/100 g). Most of analyzed rice accessions were found to possess higher contents of γ-oryzanol than the control rice, Chucheongbyeo. In particular, the red accessions showed highest content than the white and purpleaccessions. The content and composition of γ-oryzanol in 33 exotic pigmented rice accessions have been evaluated and compared significantly by the present investigation.
Batterman, Jared M; Martin, Vincent F; Yeung, Derek; Walker, Bruce N
2018-01-01
Accessibility of assistive consumer devices is an emerging research area with potential to benefit both users with and without visual impairments. In this article, we discuss the research and evaluation of using a tactile button interface to control an iOS device's native VoiceOver Gesture navigations (Apple Accessibility, 2014). This research effort identified potential safety and accessibility issues for users trying to interact and control their touchscreen mobile iOS devices while traveling independently. Furthermore, this article discusses the participatory design process in creating a solution that aims to solve issues in utilizing a tactile button interface in a novel device. The overall goal of this study is to enable visually impaired white cane users to access their mobile iOS device's capabilities navigation aids more safely and efficiently on the go.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bouchier, F.; Ahrens, J.S.; Wells, G.
One thing that all access control applications have in common is the need to identify those individuals authorized to gain access to an area. Traditionally, the identification is based on something that person possesses, such as a key or badge, or something they know, such as a PIN or password. Biometric identifiers make their decisions based on the physiological or behavioral characteristics of individuals. The potential of biometrics devices to positively identify individuals has made them attractive for use in access control and computer security applications. However, no systems perform perfectly, so it is important to understand what a biometricmore » device`s performance is under real world conditions before deciding to implement one in an access control system. This paper will describe the evaluation of a prototype biometric identifier provided by IriScan Incorporated. This identifier was developed to recognize individual human beings based on the distinctive visual characteristics of the irises of their eyes. The main goal of the evaluation was to determine whether the system has potential as an access control device within the Department of Energy (DOE). The primary interest was an estimate of the accuracy of the system in terms of false accept and false reject rates. Data was also collected to estimate throughput time and user acceptability. The performance of the system during the test will be discussed. Lessons learned during the test which may aid in further testing and simplify implementation of a production system will also be discussed.« less
Oliveira, Frederico I C DE; Fiege, Leonardo B C; Celin, Elaine F; Innecco, Renato; Nunes, Glauber H S; Aragão, Fernando A S DE
2017-01-01
Melon is one of the most important vegetable crops in the world. With short cycle in a system of phased planting, phytosanitary control is compromised, and a great volume of agricultural chemicals is used to control vegetable leafminer. Genetic control is an ideal alternative to avoid the damage caused by this insect. Thus, the aim of this study was to evaluate Cucumis accessions in regard to resistance to leafminer and correlate the variables analyzed. Fifty-four accessions and four commercial hybrids of melon were tested. The study was divided into two experiments: with and with no choice. The following characteristics were evaluated: with choice, in field - subjective score based on the infestation and the number of mines per leaf; and with no choice, in cage - number of mines per leaf, chlorophyll content, and leaf colorimetry. The results showed variability among the accessions and some genotypes showed favorable results for resistance in both experiments. There was correlation between the two variables in the experiment in the field. The accessions CNPH 11-282, CNPH 06-1047, and CNPH 11-1077 are the most recommended for future breeding programs with aim on introgression of resistance to vegetable leafminer in melon.
2013-01-01
Background Rice is the staple food and one of the world’s three major grain crops. Rice contains more than 100 bioactive substances including phytic acid, isovitexin, γ-oryzanol, phytosterols, octacosanol, squalene, γ-aminobutyric acid (GABA), tocopherol, tocotrienol derivatives, etc. Out of them, γ-oryzanol is known to have important biological profile such as anti-oxidants, inhibitor of cholesterol oxidation, reduce serum cholesterol levels in animals, effective in the treatment of inflammatory diseases, inhibit tumor growth, reduce blood pressure and promotes food storage stability when used as a food additive, etc. Hence in the present investigation, we aimed to evaluate the content and composition of γ-oryzanol from pigmented rice germplasms using a liquid chromatography with diode array detection and electrospray ionization-mass spectrometry (LC-DAD-ESI/MS). Findings In the present study, 33 exotic pigmented rice accessions (red, white and purple) have been evaluated. Among them, the contents of γ-oryzanol varied from 3.5 to 21.0Âmg/100Âg with a mean of 11.2Âmg/100Âg. A total of ten components of γ-oryzanol including ∆7-stigmastenyl ferulate were identified of which, cycloartenyl ferulate, 24-methylenecycloartanyl ferulate, campesteryl ferulate and sitosteryl ferulate were identified as the major components. The mean proportions of steryl ferulates were in the descending order of 24-methylenecycloartanyl ferulate > cycloartenyl ferulate > campesteryl ferulate > sitosteryl ferulate > ∆7-campestenyl ferulate > campestanyl ferulate > sitostanyl ferulate > ∆7-stigmastenyl ferulate > stigamsteryl ferulate > ∆7-sitostenyl ferulate. Almost 11 accessions (33%) showed higher content than the control rice Chucheongbyeo and higher proportions ranged from 10 to 15Âmg/100Âg. Interestingly, the red rice accession Liberian Coll. B11/B-11 (21.0Âmg/100Âg) showed higher content γ-oryzanol than control rice Jeokjinjubyeo (19.1Âmg/100Âg) and the purple rice accession Padi Adong Dumarat, Mardi No.4376 (20.3Âmg/100Âg) showed a similar content with control rice Heugjinjubyeo (21.4Âmg/100Âg). Conclusions Most of analyzed rice accessions were found to possess higher contents of γ-oryzanol than the control rice, Chucheongbyeo. In particular, the red accessions showed highest content than the white and purple accessions. The content and composition of γ-oryzanol in 33 exotic pigmented rice accessions have been evaluated and compared significantly by the present investigation. PMID:23587158
ERIC Educational Resources Information Center
General Accounting Office, Washington, DC. Accounting and Information Management Div.
This report presents an evaluation of the general controls over the Federal Family Education Loan Program (FFELP) information system maintained and operated by a contractor for the U.S. Department of Education (ED), which administers FFELP. The evaluation found that ED's general controls over the FFELP information system did not adequately protect…
Mauro, Vincenzo; Biggeri, Mario; Deepak, Sunil; Trani, Jean-Francois
2014-11-01
Community-based rehabilitation (CBR) programmes have been described as highly effective means of promoting the rights and opportunities of persons with disabilities (PwD). Although CBR is often the main way in which PwD in low-income and middle-income countries access rehabilitation services, there is little literature providing rigorous evaluation of their impact on people's well-being. Data were collected in the Mandya and Ramanagar districts (Karnataka state, India), between December 2009 and May 2010. In total 2540 PwD were interviewed using stratified random sampling: 1919 CBR beneficiaries (who joined the programme between 1997 and 2009) and 621 persons who were living in villages not covered by the programme. We controlled for the systematic differences between people joining and not joining the programme using the propensity score matching method controlling for covariates at individual and village level. We evaluated the impact of the programme on the subgroups of PwD who are disadvantaged on the dimensions of interest: access to pensions, use of aid appliances, access to paid jobs and improvement in personal-practical autonomy after 4 and 7 years of joining the CBR. We observed a positive and significant impact of the programme on access to services, rights and opportunities of PwD. The results indicate that compared with the control group access to pensions and allowances, aid appliances, access to paid jobs and personal-practical autonomy increased by 29.7%, 9.4%, 12.3% and 36.2%, respectively, after 7 years. The CBR programme analysed has a positive impact on access to services and the well-being of PwD who are particularly deprived on outcomes of interest. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Pre-enlistment hearing loss and hearing loss disability among US soldiers and marines.
Gubata, Marlene E; Packnett, Elizabeth R; Feng, Xiaoshu; Cowan, David N; Niebuhr, David W
2013-01-01
Hearing loss is a common condition among US adults, with some evidence of increasing prevalence in young adults. Noise-induced hearing loss attributable to employment is a significant source of preventable morbidity world-wide. The US military population is largely comprised of young adult males serving in a wide variety of occupations, many in high noise-level conditions, at least episodically. To identify accession and service-related risk factors for hearing-related disability, matched case-control study of US military personnel was conducted. Individuals evaluated for hearing loss disability in the US Army and Marine Corps were frequency matched to controls without history of disability evaluation on service and enlistment year. Conditional logistic regression was used to examine the association between accession and service-related factors and hearing-related disability evaluations between October 2002 and September 2010. Individuals with medically disqualifying audiograms or hearing loss diagnoses at application for military service were 8 and 4 times more likely, respectively, to have a disability evaluation related to hearing loss, after controlling for relevant accession, demographic, and service-related factors. Conservative hearing loss thresholds on pre-enlistment audiograms, stricter hearing loss medical waiver policies or qualified baseline audiograms pre-enlistment are needed in the U.S military. Industrial corporations or labor unions may also benefit from identifying individuals with moderate hearing loss at the time of employment to ensure use of personal protective equipment and engineer controls of noise.
Access Control for Mobile Assessment Systems Using ID.
Nakayama, Masaharu; Ishii, Tadashi; Morino, Kazuma
2015-01-01
The assessment of shelters during disaster is critical to ensure the health of evacuees and prevent pandemic. In the Ishinomaki area, one of the areas most damaged by the Great East Japan Earthquake, the highly organized assessment helped to successfully manage a total of 328 shelters with a total of 46,480 evacuees. The input and analysis of vast amounts of data was tedious work for staff members. However, a web-based assessment system that utilized mobile devices was thought to decrease workload and standardize the evaluation form. The necessary access of information should be controlled in order to maintain individuals' privacy. We successfully developed an access control system using IDs. By utilizing a unique numerical ID, users can access the input form or assessment table. This avoids unnecessary queries to the server, resulting in a quick response and easy availability, even with poor internet connection.
Rethinking unmet need: Determinants of contraceptive use in Santiago, the Dominican Republic.
DeGette, R Lipinsky; Jennings, A; Goyal, V
2015-04-01
Inadequate access to contraceptives is often considered the primary source of unmet need among women who desire to prevent pregnancy. This study evaluates two potential determinants of contraceptive use among Dominican women: (1) perceived access to family planning and (2) perceived personal reproductive control, a measure based in psychological theories of locus of control. Sexually active women aged 18-45 who did not desire fertility were surveyed to assess influences on contraceptive use. In-depth interviews were conducted among a subset of participants to contextualise survey results. Fewer than half (49%) of the 80 survey respondents had used contraception in the last 3 months. Higher personal reproductive control was significantly related to contraceptive use (aOR 1.18, 95% CI 1.04-1.34), however, higher perceived access to contraceptives was not (aOR 1.09, 95% CI 0.97-1.23). Male partner influence was identified as a barrier to contraceptive use. In this population, high personal reproductive control is a better predictor of contraceptive use than perceived access.
NASA Astrophysics Data System (ADS)
Miyatake, Teruhiko; Chiba, Kazuki; Hamamura, Masanori; Tachikawa, Shin'ichi
We propose a novel asynchronous direct-sequence codedivision multiple access (DS-CDMA) using feedback-controlled spreading sequences (FCSSs) (FCSS/DS-CDMA). At the receiver of FCSS/DS-CDMA, the code-orthogonalizing filter (COF) produces a spreading sequence, and the receiver returns the spreading sequence to the transmitter. Then the transmitter uses the spreading sequence as its updated version. The performance of FCSS/DS-CDMA is evaluated over time-dispersive channels. The results indicate that FCSS/DS-CDMA greatly suppresses both the intersymbol interference (ISI) and multiple access interference (MAI) over time-invariant channels. FCSS/DS-CDMA is applicable to the decentralized multiple access.
34 CFR 361.82 - Evaluation standards.
Code of Federal Regulations, 2011 CFR
2011-07-01
... with disabilities under the VR program. (b) A DSU must achieve successful performance on both evaluation standards during each performance period. (c) The evaluation standards for the VR program are— (1... equal access to VR services. (Approved by the Office of Management and Budget under control number 1820...
34 CFR 361.82 - Evaluation standards.
Code of Federal Regulations, 2010 CFR
2010-07-01
... with disabilities under the VR program. (b) A DSU must achieve successful performance on both evaluation standards during each performance period. (c) The evaluation standards for the VR program are— (1... equal access to VR services. (Approved by the Office of Management and Budget under control number 1820...
34 CFR 361.82 - Evaluation standards.
Code of Federal Regulations, 2012 CFR
2012-07-01
... with disabilities under the VR program. (b) A DSU must achieve successful performance on both evaluation standards during each performance period. (c) The evaluation standards for the VR program are— (1... equal access to VR services. (Approved by the Office of Management and Budget under control number 1820...
34 CFR 361.82 - Evaluation standards.
Code of Federal Regulations, 2013 CFR
2013-07-01
... with disabilities under the VR program. (b) A DSU must achieve successful performance on both evaluation standards during each performance period. (c) The evaluation standards for the VR program are— (1... equal access to VR services. (Approved by the Office of Management and Budget under control number 1820...
34 CFR 361.82 - Evaluation standards.
Code of Federal Regulations, 2014 CFR
2014-07-01
... with disabilities under the VR program. (b) A DSU must achieve successful performance on both evaluation standards during each performance period. (c) The evaluation standards for the VR program are— (1... equal access to VR services. (Approved by the Office of Management and Budget under control number 1820...
Fine-grained policy control in U.S. Army Research Laboratory (ARL) multimodal signatures database
NASA Astrophysics Data System (ADS)
Bennett, Kelly; Grueneberg, Keith; Wood, David; Calo, Seraphin
2014-06-01
The U.S. Army Research Laboratory (ARL) Multimodal Signatures Database (MMSDB) consists of a number of colocated relational databases representing a collection of data from various sensors. Role-based access to this data is granted to external organizations such as DoD contractors and other government agencies through a client Web portal. In the current MMSDB system, access control is only at the database and firewall level. In order to offer finer grained security, changes to existing user profile schemas and authentication mechanisms are usually needed. In this paper, we describe a software middleware architecture and implementation that allows fine-grained access control to the MMSDB at a dataset, table, and row level. Result sets from MMSDB queries issued in the client portal are filtered with the use of a policy enforcement proxy, with minimal changes to the existing client software and database. Before resulting data is returned to the client, policies are evaluated to determine if the user or role is authorized to access the data. Policies can be authored to filter data at the row, table or column level of a result set. The system uses various technologies developed in the International Technology Alliance in Network and Information Science (ITA) for policy-controlled information sharing and dissemination1. Use of the Policy Management Library provides a mechanism for the management and evaluation of policies to support finer grained access to the data in the MMSDB system. The GaianDB is a policy-enabled, federated database that acts as a proxy between the client application and the MMSDB system.
McCarty, Elizabeth; Morress, Claire
2009-08-01
Children with a diagnosis of cerebral palsy often have significant physical limitations that prevent exploration and full participation in the environment. Assistive technology systems can provide opportunities for children with physical limitations to interact with their world, enabling play, communication, and daily living skills. Efficient access to and control of the technology is critical for successful use; however, establishing consistent access is often difficult because of the nature of the movement patterns exhibited by children with cerebral palsy. This article describes a 3-phase model of evaluation and intervention developed and used by Assistive Technology Services at the Aaron W. Perlman Center, Cincinnati Children's Hospital Medical Center, to establish successful access to technology systems in children with cerebral palsy.
Evaluation of analytical performance of a new high-sensitivity immunoassay for cardiac troponin I.
Masotti, Silvia; Prontera, Concetta; Musetti, Veronica; Storti, Simona; Ndreu, Rudina; Zucchelli, Gian Carlo; Passino, Claudio; Clerico, Aldo
2018-02-23
The study aim was to evaluate and compare the analytical performance of the new chemiluminescent immunoassay for cardiac troponin I (cTnI), called Access hs-TnI using DxI platform, with those of Access AccuTnI+3 method, and high-sensitivity (hs) cTnI method for ARCHITECT platform. The limits of blank (LoB), detection (LoD) and quantitation (LoQ) at 10% and 20% CV were evaluated according to international standardized protocols. For the evaluation of analytical performance and comparison of cTnI results, both heparinized plasma samples, collected from healthy subjects and patients with cardiac diseases, and quality control samples distributed in external quality assessment programs were used. LoB, LoD and LoQ at 20% and 10% CV values of the Access hs-cTnI method were 0.6, 1.3, 2.1 and 5.3 ng/L, respectively. Access hs-cTnI method showed analytical performance significantly better than that of Access AccuTnI+3 method and similar results to those of hs ARCHITECT cTnI method. Moreover, the cTnI concentrations measured with Access hs-cTnI method showed close linear regressions with both Access AccuTnI+3 and ARCHITECT hs-cTnI methods, although there were systematic differences between these methods. There was no difference between cTnI values measured by Access hs-cTnI in heparinized plasma and serum samples, whereas there was a significant difference between cTnI values, respectively measured in EDTA and heparin plasma samples. Access hs-cTnI has analytical sensitivity parameters significantly improved compared to Access AccuTnI+3 method and is similar to those of the high-sensitivity method using ARCHITECT platform.
Why does asking questions change health behaviours? The mediating role of attitude accessibility
Wood, Chantelle; Conner, Mark; Sandberg, Tracy; Godin, Gaston; Sheeran, Paschal
2013-01-01
Objective The question-behaviour effect (QBE) refers to the finding that measuring behavioural intentions increases performance of the relevant behaviour. This effect has been used to change health behaviours. The present research asks why the QBE occurs and evaluates one possible mediator – attitude accessibility. Design University staff and students (N = 151) were randomly assigned to an intention measurement condition where they reported their intentions to eat healthy foods, or to one of two control conditions. Main outcome measures Participants completed a response latency measure of attitude accessibility, before healthy eating behaviour was assessed unobtrusively using an objective measure of snacking. Results Intention measurement participants exhibited more accessible attitudes towards healthy foods, and were more likely to choose a healthy snack, relative to control participants. Furthermore, attitude accessibility mediated the relationship between intention measurement and behaviour. Conclusion This research demonstrates that increased attitude accessibility may explain the QBE, extending the findings of previous research to the domain of health behaviour. PMID:24245778
Raptis, Nikos; Pikasis, Evangelos; Syvridis, Dimitris
2016-08-01
The exploitation of optical wireless communication channels in a non-line-of-sight regime is studied for point-to-point and networking configurations considering the use of light-emitting diodes. Two environments with different scattering center densities are considered, assuming operation at 265 nm. The bit error rate performance of both pulsed and multicarrier modulation schemes is examined, using numerical approaches. In the networking scenario, a central node only receives data, one node transmits useful data, and the rest of them act as interferers. The performance of the desirable node's transmissions is evaluated. The access to the medium is controlled by a code division multiple access scheme.
Reliability of retrievable cemented implant-supported prostheses.
Nissan, Joseph; Snir, David; Rosner, Ofir; Kolerman, Roni; Chaushu, Liat; Chaushu, Gavriel
2016-05-01
One of the disadvantages of a cemented implant restoration is the potential difficulty of retrieving it. The restoration may be destroyed during removal. The purpose of this retrospective clinical study was to assess the long-term survival rates of cemented posterior metal ceramic implant-supported prostheses (ISPs) with a metal screw access hole. During a 12-year period, 274 cemented ISPs with an abutment screw access hole in the metal framework were assessed and served as the study group, and 119 conventional cemented ISPs (without access hole) served as the control group. Participants were followed every 6 months in the first year and once a year subsequently. Ceramic fracture, screw loosening, and refabrication were the prosthetic outcome parameters evaluated at the recall. The Pearson Chi square and Fisher exact test were used to compare the outcome parameters between the control and study groups. A total of 1005 implants and 393 ISPs were evaluated. Ceramic fracture occurred in 6.6% of the ISPs (6.2% test and 7.6% control). Screw loosening occurred in 3.28% of the test group and 3.36% of the control group. Refabrication of ISPs was done in 2.79% of all restorations, (1.45% test and 6.72% control [P=.012]). Within the limits of this study, preparing cemented ISPs with a screw access hole in the metal framework improves ISP survival rates over time and lowers the cost of maintenance without increasing the risk for porcelain fracture or screw loosening. Copyright © 2016 Editorial Council for the Journal of Prosthetic Dentistry. Published by Elsevier Inc. All rights reserved.
Care for the chronically ill: Nursing home incentive payment experiment
Weissert, William G.; Scanlon, William J.; Wan, Thomas T. H.; Skinner, Douglas E.
1983-01-01
Nursing home reinbursement systems which do not adjust payment levels to patient care needs lead to access problems for heavy-care patients. Unnecessarily long and costly hospital stays may result. A patient-based nursing home incentive reimbursement system has been designed and is being evaluated in a controlled field experiment in 36 California skilled nursing facilities. Incentives are paid for admitting heavy-care patients, meeting outcome goals on some patients, and discharging and maintaining some patients in the community. This article describes a nursing home reimbursement system which is intended to simultaneously mitigate problems of restricted access, inefficient use of beds, and nonoptimal care. It also discusses the approach to evaluating this broad social intervention by application of a controlled experimental design. PMID:10310528
Content Classification: Leveraging New Tools and Librarians' Expertise.
ERIC Educational Resources Information Center
Starr, Jennie
1999-01-01
Presents factors for librarians to consider when decision-making about information retrieval. Discusses indexing theory; thesauri aids; controlled vocabulary or thesauri to increase access; humans versus machines; automated tools; product evaluations and evaluation criteria; automated classification tools; content server products; and document…
ERIC Educational Resources Information Center
Seaman, Don F.; Cuellar, Sylvia
The Houston Community College (Texas) program (TOTAL ACCESS) designed in response to the Immigration Reform and Control Act of 1986, is described and evaluated. The program offers classes to eligible aliens (97% Hispanic Americans from Mexico, El Salvador, and Guatemala) wishing to pursue the educational program required for legalization. Program…
Detection and response to unauthorized access to a communication device
Smith, Rhett; Gordon, Colin
2015-09-08
A communication gateway consistent with the present disclosure may detect unauthorized physical or electronic access and implement security actions in response thereto. A communication gateway may provide a communication path to an intelligent electronic device (IED) using an IED communications port configured to communicate with the IED. The communication gateway may include a physical intrusion detection port and a network port. The communication gateway may further include control logic configured to evaluate physical intrusion detection signal. The control logic may be configured to determine that the physical intrusion detection signal is indicative of an attempt to obtain unauthorized access to one of the communication gateway, the IED, and a device in communication with the gateway; and take a security action based upon the determination that the indication is indicative of the attempt to gain unauthorized access.
NASA Astrophysics Data System (ADS)
Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko
We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.
Meena, Yogesh Kumar; Cecotti, Hubert; Wong-Lin, Kongfatt; Dutta, Ashish; Prasad, Girijesh
2018-04-01
Virtual keyboard applications and alternative communication devices provide new means of communication to assist disabled people. To date, virtual keyboard optimization schemes based on script-specific information, along with multimodal input access facility, are limited. In this paper, we propose a novel method for optimizing the position of the displayed items for gaze-controlled tree-based menu selection systems by considering a combination of letter frequency and command selection time. The optimized graphical user interface layout has been designed for a Hindi language virtual keyboard based on a menu wherein 10 commands provide access to type 88 different characters, along with additional text editing commands. The system can be controlled in two different modes: eye-tracking alone and eye-tracking with an access soft-switch. Five different keyboard layouts have been presented and evaluated with ten healthy participants. Furthermore, the two best performing keyboard layouts have been evaluated with eye-tracking alone on ten stroke patients. The overall performance analysis demonstrated significantly superior typing performance, high usability (87% SUS score), and low workload (NASA TLX with 17 scores) for the letter frequency and time-based organization with script specific arrangement design. This paper represents the first optimized gaze-controlled Hindi virtual keyboard, which can be extended to other languages.
ERIC Educational Resources Information Center
Erickson, William; Trerise, Sharon; Lee, Camille; VanLooy, Sara; Knowlton, Samuel; Bruyère, Susanne
2013-01-01
Thirty community college websites were evaluated for compliance with federal web accessibility standards found in Section 508 of the Rehabilitation Act of 1973 (29 U.S.C. 794d). Two typical sites were tested for usability by individuals with visual impairments, individuals with reading-related learning disabilities (LD), and a control group of…
76 FR 35219 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-16
... service environment in which the evaluation is implemented and the opportunities for control group members to access the same or similar services as the treatment group members. Respondents: Individuals enrolled in ISIS demonstration interventions, control group members, ISIS program operators (BIF and SAQ...
NASA Astrophysics Data System (ADS)
Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung
2010-12-01
This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.
Detecting Payload Attacks on Programmable Logic Controllers (PLCs)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Huan
Programmable logic controllers (PLCs) play critical roles in industrial control systems (ICS). Providing hardware peripherals and firmware support for control programs (i.e., a PLC’s “payload”) written in languages such as ladder logic, PLCs directly receive sensor readings and control ICS physical processes. An attacker with access to PLC development software (e.g., by compromising an engineering workstation) can modify the payload program and cause severe physical damages to the ICS. To protect critical ICS infrastructure, we propose to model runtime behaviors of legitimate PLC payload program and use runtime behavior monitoring in PLC firmware to detect payload attacks. By monitoring themore » I/O access patterns, network access patterns, as well as payload program timing characteristics, our proposed firmware-level detection mechanism can detect abnormal runtime behaviors of malicious PLC payload. Using our proof-of-concept implementation, we evaluate the memory and execution time overhead of implementing our proposed method and find that it is feasible to incorporate our method into existing PLC firmware. In addition, our evaluation results show that a wide variety of payload attacks can be effectively detected by our proposed approach. The proposed firmware-level payload attack detection scheme complements existing bumpin- the-wire solutions (e.g., external temporal-logic-based model checkers) in that it can detect payload attacks that violate realtime requirements of ICS operations and does not require any additional apparatus.« less
Is the digitization of laparoscopic movement using accessible alternative technologies possible?
Lorias Espinoza, Daniel; Gutiérrez Gnecchi, José Antonio; Martínez, Arturo Minor
2012-05-01
It is widely documented that laparoscopic surgeons require training, and an objective evaluation of the training that they receive. The most advanced evaluation systems integrate the digitization of the movement of laparoscopic tools. A great number of these systems, however, do not permit the use of real tools and their high cost limits their academic impact. Likewise, it is documented that new and accessible systems need to be developed. The aim of this article is to explore the possibility of digitizing the movement of laparoscopic tools in a three-dimensional workspace, using accessible alternative technology. Our proposal uses a commercial Wii video game control in conjunction with a program for determining kinematic variables during the execution of a recognition task.
The impact of free access to the scientific literature: a review of recent research.
Davis, Philip M; Walters, William H
2011-07-01
The paper reviews recent studies that evaluate the impact of free access (open access) on the behavior of scientists as authors, readers, and citers in developed and developing nations. It also examines the extent to which the biomedical literature is used by the general public. The paper is a critical review of the literature, with systematic description of key studies. Researchers report that their access to the scientific literature is generally good and improving. For authors, the access status of a journal is not an important consideration when deciding where to publish. There is clear evidence that free access increases the number of article downloads, although its impact on article citations is not clear. Recent studies indicate that large citation advantages are simply artifacts of the failure to adequately control for confounding variables. The effect of free access on the general public's use of the primary medical literature has not been thoroughly evaluated. Recent studies provide little evidence to support the idea that there is a crisis in access to the scholarly literature. Further research is needed to investigate whether free access is making a difference in non-research contexts and to better understand the dissemination of scientific literature through peer-to-peer networks and other informal mechanisms.
The impact of free access to the scientific literature: a review of recent research
Walters, William H
2011-01-01
Objectives: The paper reviews recent studies that evaluate the impact of free access (open access) on the behavior of scientists as authors, readers, and citers in developed and developing nations. It also examines the extent to which the biomedical literature is used by the general public. Method: The paper is a critical review of the literature, with systematic description of key studies. Results: Researchers report that their access to the scientific literature is generally good and improving. For authors, the access status of a journal is not an important consideration when deciding where to publish. There is clear evidence that free access increases the number of article downloads, although its impact on article citations is not clear. Recent studies indicate that large citation advantages are simply artifacts of the failure to adequately control for confounding variables. The effect of free access on the general public's use of the primary medical literature has not been thoroughly evaluated. Conclusions: Recent studies provide little evidence to support the idea that there is a crisis in access to the scholarly literature. Further research is needed to investigate whether free access is making a difference in non-research contexts and to better understand the dissemination of scientific literature through peer-to-peer networks and other informal mechanisms. PMID:21753913
Learning Relational Policies from Electronic Health Record Access Logs
Malin, Bradley; Nyemba, Steve; Paulett, John
2011-01-01
Modern healthcare organizations (HCOs) are composed of complex dynamic teams to ensure clinical operations are executed in a quick and competent manner. At the same time, the fluid nature of such environments hinders administrators' efforts to define access control policies that appropriately balance patient privacy and healthcare functions. Manual efforts to define these policies are labor-intensive and error-prone, often resulting in systems that endow certain care providers with overly broad access to patients' medical records while restricting other providers from legitimate and timely use. In this work, we propose an alternative method to generate these policies by automatically mining usage patterns from electronic health record (EHR) systems. EHR systems are increasingly being integrated into clinical environments and our approach is designed to be generalizable across HCOs, thus assisting in the design and evaluation of local access control policies. Our technique, which is grounded in data mining and social network analysis theory, extracts a statistical model of the organization from the access logs of its EHRs. In doing so, our approach enables the review of predefined policies, as well as the discovery of unknown behaviors. We evaluate our approach with five months of access logs from the Vanderbilt University Medical Center and confirm the existence of stable social structures and intuitive business operations. Additionally, we demonstrate that there is significant turnover in the interactions between users in the HCO and that policies learned at the department level afford greater stability over time. PMID:21277996
Accessible microscopy workstation for students and scientists with mobility impairments.
Duerstock, Bradley S
2006-01-01
An integrated accessible microscopy workstation was designed and developed to allow persons with mobility impairments to control all aspects of light microscopy with minimal human assistance. This system, named AccessScope, is capable of performing brightfield and fluorescence microscopy, image analysis, and tissue morphometry requisite for undergraduate science courses to graduate-level research. An accessible microscope is necessary for students and scientists with mobility impairments to be able to use a microscope independently to better understand microscopical imaging concepts and cell biology. This knowledge is not always apparent by simply viewing a catalog of histological images. The ability to operate a microscope independently eliminates the need to hire an assistant or rely on a classmate and permits one to take practical laboratory examinations by oneself. Independent microscope handling is also crucial for graduate students and scientists with disabilities to perform scientific research. By making a personal computer as the user interface for controlling AccessScope functions, different upper limb mobility impairments could be accommodated by using various computer input devices and assistive technology software. Participants with a range of upper limb mobility impairments evaluated the prototype microscopy workstation. They were able to control all microscopy functions including loading different slides without assistance.
A threat intelligence framework for access control security in the oil industry
NASA Astrophysics Data System (ADS)
Alaskandrani, Faisal T.
The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.
... controlled. Talk openly with your partner about your relationship and sex life. Seek counseling if you and your ... Accessed January 23, 2018. Burnett AL. Evaluation and management of erectile dysfunction. In: Wein AJ, Kavoussi LR, ...
40 CFR 300.415 - Removal action.
Code of Federal Regulations, 2013 CFR
2013-07-01
..., provision for post-removal site control following a CERCLA Fund-financed removal action at both NPL and non... lead agency shall conduct an engineering evaluation/cost analysis (EE/CA) or its equivalent. The EE/CA...) Fences, warning signs, or other security or site control precautions—where humans or animals have access...
Development of fine-leaved Festuca grass for forage and wildfire control in the Great Basin
USDA-ARS?s Scientific Manuscript database
Drought and heat tolerant fine-leaved fescue (Festuca ssp.) grasses have potential as components in rangeland greenstrips for wildfire control in semi-arid climates, although such grasses have not been evaluated under rangeland conditions. Therefore, 64 geographically diverse Festuca accessions of ...
47 CFR 301.7 - Waiver of household eligibility.
Code of Federal Regulations, 2010 CFR
2010-10-01
... and audio segments to evaluate the performance as perceived by a human observer. For subjective...Remote control may have dedicated keys to provide direct access to closed captioning and descriptive...
Vieira-da-Silva, Ligia Maria; Chaves, Sonia Cristina Lima; Esperidião, Monique Azevedo; Lopes-Martinho, Rosana Machado
2010-12-01
Organisational barriers to primary healthcare are still relevant in developing countries. Although descriptive reports of some experiences focusing on improving accessibility have been published, few studies have evaluated specific interventions aimed at overcoming the organisational obstacles. To evaluate the results of a project designed to improve accessibility to healthcare services in Salvador, Bahia, Brazil. An evaluative, cross-sectional, ex post facto study that included a control group was carried out in a random sample of 710 users of 25 healthcare units of the primary municipal healthcare network. The association between the project implementation degree and outcome variables was measured by prevalence ratios (PR) and statistical inference was based on Taylor series 95% CIs. Better access to primary healthcare was found in units in which the intervention had been implemented than in those in which it had not been implemented, particularly with respect to reducing avoidable queues, the waiting time for scheduling a consultation (PR=0.23; 95% CI 0.15 to 0.34); the time of arrival in the queue (PR=0.16; 95% CI 0.09 to 0.31) and the introduction of a system for scheduling appointments by telephone (PR=0.76; 95% CI 0.70 to 0.83). Owing to the simplicity of the programme and the impact it achieved, it may be reproduced in other underdeveloped countries to improve access to healthcare services. In addition, some of the instruments may be used in routine programme evaluation.
NASA Technical Reports Server (NTRS)
Karl, D. R.
1972-01-01
An evaluation was made of the feasibility of utilizing a simplified man machine interface concept to manage and control a complex space system involving multiple redundant computers that control multiple redundant subsystems. The concept involves the use of a CRT for display and a simple keyboard for control, with a tree-type control logic for accessing and controlling mission, systems, and subsystem elements. The concept was evaluated in terms of the Phase B space shuttle orbiter, to utilize the wide scope of data management and subsystem control inherent in the central data management subsystem provided by the Phase B design philosophy. Results of these investigations are reported in four volumes.
Phunchongharn, Phond; Hossain, Ekram; Camorlinga, Sergio
2011-11-01
We study the multiple access problem for e-Health applications (referred to as secondary users) coexisting with medical devices (referred to as primary or protected users) in a hospital environment. In particular, we focus on transmission scheduling and power control of secondary users in multiple spatial reuse time-division multiple access (STDMA) networks. The objective is to maximize the spectrum utilization of secondary users and minimize their power consumption subject to the electromagnetic interference (EMI) constraints for active and passive medical devices and minimum throughput guarantee for secondary users. The multiple access problem is formulated as a dual objective optimization problem which is shown to be NP-complete. We propose a joint scheduling and power control algorithm based on a greedy approach to solve the problem with much lower computational complexity. To this end, an enhanced greedy algorithm is proposed to improve the performance of the greedy algorithm by finding the optimal sequence of secondary users for scheduling. Using extensive simulations, the tradeoff in performance in terms of spectrum utilization, energy consumption, and computational complexity is evaluated for both the algorithms.
Koyyappurath, Sayuj; Conéjéro, Geneviève; Dijoux, Jean Bernard; Lapeyre-Montès, Fabienne; Jade, Katia; Chiroleu, Frédéric; Gatineau, Frédéric; Verdeil, Jean Luc; Besse, Pascale; Grisoni, Michel
2015-01-01
Root and stem rot (RSR) disease caused by Fusarium oxysporum f. sp. radicis-vanillae (Forv) is the most damaging disease of vanilla (Vanilla planifolia and V. × tahitensis, Orchidaceae). Breeding programs aimed at developing resistant vanilla varieties are hampered by the scarcity of sources of resistance to RSR and insufficient knowledge about the histopathology of Forv. In this work we have (i) identified new genetic resources resistant to RSR including V. planifolia inbreds and vanilla relatives, (ii) thoroughly described the colonization pattern of Forv into selected vanilla accessions, confirming its necrotic non-vascular behavior in roots, and (iii) evidenced the key role played by hypodermis, and particularly lignin deposition onto hypodermal cell walls, for resistance to Forv in two highly resistant vanilla accessions. Two hundred and fifty-four vanilla accessions were evaluated in the field under natural conditions of infection and in controlled conditions using in vitro plants root-dip inoculated by the highly pathogenic isolate Fo072. For the 26 accessions evaluated in both conditions, a high correlation was observed between field evaluation and in vitro assay. The root infection process and plant response of one susceptible and two resistant accessions challenged with Fo072 were studied using wide field and multiphoton microscopy. In susceptible V. planifolia, hyphae penetrated directly into the rhizodermis in the hairy root region then invaded the cortex through the passage cells where it induced plasmolysis, but never reached the vascular region. In the case of the resistant accessions, the penetration was stopped at the hypodermal layer. Anatomical and histochemical observations coupled with spectral analysis of the hypodermis suggested the role of lignin deposition in the resistance to Forv. The thickness of lignin constitutively deposited onto outer cell walls of hypodermis was highly correlated with the level of resistance for 21 accessions tested. The accumulation of p-coumaric and sinapic acids, two phenolic precursors of lignin, was observed in the resistant plants inoculated with Fo072, but not in the susceptible one. Altogether, our analyses enlightened the mechanisms at work in RSR resistant genotypes and should enhance the development of novel breeding strategies aimed at improving the genetic control of RSR of vanilla.
Gen IV Materials Handbook Beta Release for Structural and Functional Evaluation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ren, Weiju; Luttrell, Claire
2006-09-12
Development of the Gen IV Materials Handbook is briefly summarized up to date. Current status of the Handbook website construction is described. The developed Handbook components and access control of the beta version are discussed for the present evaluation release. Detailed instructions and examples are given to provide guidance for evaluators to browse the constructed parts and use all the currently developed functionalities of the Handbook in evaluation.
Harris, S
2013-01-01
The recommendations for controlling HIV/AIDS, whether prescriptive or descriptive, underscore the value of information: its translation into knowledge, and knowledge into behaviour. Thus, accessing, evaluating, disseminating and applying authoritative, credible and scholarly information on HIV/AIDS are critical elements in the control of this pandemic in the Web 2.0 era. The University of the West Indies (UWI) Mona libraries have embraced this information role. This article provides insights into three of the information initiatives implemented by the UWI Mona libraries in this important capacity. In this regard, it also provides ideas for other West Indian information units and enhances communication on access to information products and services, albeit incrementally, in an important area of health services for the West Indies.
Open-access and multi-directional electroosmotic flow chip for positioning heterotypic cells.
Terao, Kyohei; Kitazawa, Yuko; Yokokawa, Ryuji; Okonogi, Atsuhito; Kotera, Hidetoshi
2011-04-21
We propose a novel method of cell positioning using electroosmotic flow (EOF) to analyze cell-cell interactions. The EOF chip has an open-to-air configuration, is equipped with four electrodes to induce multi-directional EOF, and allows access of tools for liquid handling and of physical probes for cell measurements. Evaluation of the flow within this chip indicated that it controlled hydrodynamic transport of cells, in terms of both speed and direction. We also evaluated cell viability after EOF application and determined appropriate conditions for cell positioning. Two cells were successively positioned in pocket-like microstructures, one in each micropocket, by controlling the EOF direction. As an experimental demonstration, we observed contact interactions between two individual cells through gap junction channels. The EOF chip should provide ways to elucidate various cell-cell interactions between heterotypic cells.
Evaluating COCA--What Do Teachers Think?
ERIC Educational Resources Information Center
Major, Nigel
COCA, which consists of both authoring tools and a runtime shell, is a system intended to provide teachers with genuine access to intelligent tutoring system (ITS) technology and to give them control over domain material and teaching strategies. To evaluate the effectiveness of COCA, 10 subjects (five university teachers and five school teachers)…
Akbari, M; Salehi, H; Niazi, A
2018-04-01
The main goals of the present study were to screen Iranian common bermudagrasses to find cold-tolerant accessions and evaluate their genetic and morphological variabilities. In this study, 49 accessions were collected from 18 provinces of Iran. One foreign cultivar of common bermudagrass was used as control. Morphological variation was evaluated based on 14 morphological traits to give information about taxonomic position of Iranian common bermudagrass. Data from morphological traits were evaluated to categorize all accessions as either cold sensitive or tolerant using hierarchical clustering with Ward's method in SPSS software. Inter-Simple Sequence Repeat (ISSR) primers were employed to evaluate genetic variability of accessions. The results of our taxonomic investigation support the existence of two varieties of Cynodon dactylon in Iran: var. dactylon (hairless plant) and var. villosous (plant with hairs at leaf underside and/or upper side surfaces or exterior surfaces of sheath). All 15 primers amplified and gave clear and highly reproducible DNA fragments. In total, 152 fragments were produced, of which 144 (94.73%) being polymorphic. The polymorphic information content (PIC) values ranged from 0.700 to 0.928. The average PIC value obtained with 15 ISSR primers was 0.800, which shows that all primers were informative. Probability identity (PI) and discriminating power between all primers ranged from 0.029 to 0.185 and 0.815 to 0.971, respectively. Genetic data were converted into a binary data matrix. NTSYS software was used for data analysis. Clustering was done by the unweighted pair-group method with arithmetic averages and principle coordinate analysis, separated the accessions into six main clusters. According to both morphological and genetic diversity investigations of accessions, they can be clustered into three groups: cold sensitive, cold semi-tolerant, and cold tolerant. The most cold-tolerant accessions were: Taft, Malayear, Gorgan, Safashahr, Naein, Aligoudarz, and the foreign cultivar. This study may provide useful information for further breeding programs on common bermudagrass. Selected genotypes can be evaluated for other abiotic stresses such as drought and salinity.
Holding the Hunger Games Hostage at the Gym: An Evaluation of Temptation Bundling
Milkman, Katherine L.; Minson, Julia A.; Volpp, Kevin G. M.
2014-01-01
We introduce and evaluate the effectiveness of temptation bundling—a method for simultaneously tackling two types of self-control problems by harnessing consumption complementarities. We describe a field experiment measuring the impact of bundling instantly gratifying but guilt-inducing “want” experiences (enjoying page-turner audiobooks) with valuable “should” behaviors providing delayed rewards (exercising). We explore whether such bundles increase should behaviors and whether people would pay to create these restrictive bundles. Participants were randomly assigned to a full treatment condition with gym-only access to tempting audio novels, an intermediate treatment involving encouragement to restrict audiobook enjoyment to the gym, or a control condition. Initially, full and intermediate treatment participants visited the gym 51% and 29% more frequently, respectively, than control participants, but treatment effects declined over time (particularly following Thanksgiving). After the study, 61% of participants opted to pay to have gym-only access to iPods containing tempting audiobooks, suggesting demand for this commitment device. PMID:25843979
An Ultra-low-power Medium Access Control Protocol for Body Sensor Network.
Li, Huaming; Tan, Jindong
2005-01-01
In this paper, a medium access control (MAC) protocol designed for Body Sensor Network (BSN-MAC) is proposed. BSN-MAC is an adaptive, feedback-based and IEEE 802.15.4-compatible MAC protocol. Due to the traffic coupling and sensor diversity characteristics of BSNs, common MAC protocols can not satisfy the unique requirements of the biomedical sensors in BSN. BSN-MAC exploits the feedback information from the deployed sensors to form a closed-loop control of the MAC parameters. A control algorithm is proposed to enable the BSN coordinator to adjust parameters of the IEEE 802.15.4 superframe to achieve both energy efficiency and low latency on energy critical nodes. We evaluate the performance of BSN-MAC using energy efficiency as the primary metric.
Method for Evaluation of Outage Probability on Random Access Channel in Mobile Communication Systems
NASA Astrophysics Data System (ADS)
Kollár, Martin
2012-05-01
In order to access the cell in all mobile communication technologies a so called random-access procedure is used. For example in GSM this is represented by sending the CHANNEL REQUEST message from Mobile Station (MS) to Base Transceiver Station (BTS) which is consequently forwarded as an CHANNEL REQUIRED message to the Base Station Controller (BSC). If the BTS decodes some noise on the Random Access Channel (RACH) as random access by mistake (so- called ‘phantom RACH') then it is a question of pure coincidence which èstablishment cause’ the BTS thinks to have recognized. A typical invalid channel access request or phantom RACH is characterized by an IMMEDIATE ASSIGNMENT procedure (assignment of an SDCCH or TCH) which is not followed by sending an ESTABLISH INDICATION from MS to BTS. In this paper a mathematical model for evaluation of the Power RACH Busy Threshold (RACHBT) in order to guaranty in advance determined outage probability on RACH is described and discussed as well. It focuses on Global System for Mobile Communications (GSM) however the obtained results can be generalized on remaining mobile technologies (
NASA Technical Reports Server (NTRS)
Defeo, P.; Chen, M.
1987-01-01
Means for evaluating data bus architectures and protocols for highly integrated flight control system applications are needed. Described are the criteria and plans to do this by using the NASA/Ames Intelligent Redundant Actuation System (IRAS) experimental set-up. Candidate bus architectures differ from one another in terms of: topology, access control, message transfer schemes, message characteristics, initialization. data flow control, transmission rates, fault tolerance, and time synchronization. The evaluation criteria are developed relative to these features. A preliminary, analytical evaluation of four candidate busses (MIL-STD-1553B, DATAC, Ethernet, and HSIS) is described. A bus must be exercised in a real-time environment to evaluate its dynamic characteristics. A plan for real-time evaluation of these four busses using a combination of hardware and simulation techniques is presented.
Mathur, Shawn; Schmidt, Christian
2007-01-01
Sovereign power is retained and shared by the citizens of a country. Using electoral tools, governing structures are formed to ensure protection of national interests. As with any institution, proper control of the government guarantees its adherence to the tasks delegated to it by its citizens. In turn, citizens have to be provided with, and are encouraged to access and evaluate, information generated by the government. On the other hand, governments generate sensitive information (e.g., intelligence, internal reports, etc) that are required for self-evaluation and defense against threats to the nation. Governments are granted a privilege to collect, store and use such information to perform necessary tasks. How far does governmental privilege go relative tothe intrinsic right of citizens to access and evaluate information? PMID:17608934
Hanna, Timothy P; Kangolle, Alfred C T
2010-10-13
Cancer is a rapidly increasing problem in developing countries. Access, quality and efficiency of cancer services in developing countries must be understood to advance effective cancer control programs. Health services research can provide insights into these areas. This article provides an overview of oncology health services in developing countries. We use selected examples from peer-reviewed literature in health services research and relevant publicly available documents. In spite of significant limitations in the available data, it is clear there are substantial barriers to access to cancer control in developing countries. This includes prevention, early detection, diagnosis/treatment and palliation. There are also substantial limitations in the quality of cancer control and a great need to improve economic efficiency. We describe how the application of health data may assist in optimizing (1) Structure: strengthening planning, collaboration, transparency, research development, education and capacity building. (2) PROCESS: enabling follow-up, knowledge translation, patient safety and quality assurance. (3) OUTCOME: facilitating evaluation, monitoring and improvement of national cancer control efforts. There is currently limited data and capacity to use this data in developing countries for these purposes. There is an urgent need to improve health services for cancer control in developing countries. Current resources and much-needed investments must be optimally managed. To achieve this, we would recommend investment in four key priorities: (1) Capacity building in oncology health services research, policy and planning relevant to developing countries. (2) Development of high-quality health data sources. (3) More oncology-related economic evaluations in developing countries. (4) Exploration of high-quality models of cancer control in developing countries. Meeting these needs will require national, regional and international collaboration as well as political leadership. Horizontal integration with programs for other diseases will be important.
Windows NT Attacks for the Evaluation of Intrusion Detection Systems
2000-06-01
their passwords never expire. Their privileges allow telnet access and FTP access to the system, but do not allow local logins . Each user can...default: • Administrator: This root account allows remote and local logins and full control of system software. • Guest: This default account, setup by...realizing that the Netbus server was installed. The attack also edits the Windows NT Registry so the Netbus server restarts at every login . This
Fair Trade Metaphor as a Control Privacy Method for Pervasive Environments: Concepts and Evaluation
Esquivel, Abraham; Haya, Pablo; Alamán, Xavier
2015-01-01
This paper presents a proof of concept from which the metaphor of “fair trade” is validated as an alternative to manage the private information of users. Our privacy solution deals with user's privacy as a tradable good for obtaining environmental services. Thus, users gain access to more valuable services as they share more personal information. This strategy, combined with optimistic access control and transaction registry mechanisms, enhances users' confidence in the system while encouraging them to share their information, with the consequent benefit for the community. The study results are promising considering the user responses regarding the usefulness, ease of use, information classification and perception of control with the mechanisms proposed by the metaphor. PMID:26087373
Fair Trade Metaphor as a Control Privacy Method for Pervasive Environments: Concepts and Evaluation.
Esquivel, Abraham; Haya, Pablo; Alamán, Xavier
2015-06-16
This paper presents a proof of concept from which the metaphor of "fair trade" is validated as an alternative to manage the private information of users. Our privacy solution deals with user's privacy as a tradable good for obtaining environmental services. Thus, users gain access to more valuable services as they share more personal information. This strategy, combined with optimistic access control and transaction registry mechanisms, enhances users' confidence in the system while encouraging them to share their information, with the consequent benefit for the community. The study results are promising considering the user responses regarding the usefulness, ease of use, information classification and perception of control with the mechanisms proposed by the metaphor.
SERVER DEVELOPMENT FOR NSLS-II PHYSICS APPLICATIONS AND PERFORMANCE ANALYSIS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shen, G.; Kraimer, M.
2011-03-28
The beam commissioning software framework of NSLS-II project adopts a client/server based architecture to replace the more traditional monolithic high level application approach. The server software under development is available via an open source sourceforge project named epics-pvdata, which consists of modules pvData, pvAccess, pvIOC, and pvService. Examples of two services that already exist in the pvService module are itemFinder, and gather. Each service uses pvData to store in-memory transient data, pvService to transfer data over the network, and pvIOC as the service engine. The performance benchmarking for pvAccess and both gather service and item finder service are presented inmore » this paper. The performance comparison between pvAccess and Channel Access are presented also. For an ultra low emittance synchrotron radiation light source like NSLS II, the control system requirements, especially for beam control are tight. To control and manipulate the beam effectively, a use case study has been performed to satisfy the requirement and theoretical evaluation has been performed. The analysis shows that model based control is indispensable for beam commissioning and routine operation. However, there are many challenges such as how to re-use a design model for on-line model based control, and how to combine the numerical methods for modeling of a realistic lattice with the analytical techniques for analysis of its properties. To satisfy the requirements and challenges, adequate system architecture for the software framework for beam commissioning and operation is critical. The existing traditional approaches are self-consistent, and monolithic. Some of them have adopted a concept of middle layer to separate low level hardware processing from numerical algorithm computing, physics modelling, data manipulating and plotting, and error handling. However, none of the existing approaches can satisfy the requirement. A new design has been proposed by introducing service oriented architecture technology, and client interface is undergoing. The design and implementation adopted a new EPICS implementation, namely epics-pvdata [9], which is under active development. The implementation of this project under Java is close to stable, and binding to other language such as C++ and/or Python is undergoing. In this paper, we focus on the performance benchmarking and comparison for pvAccess and Channel Access, the performance evaluation for 2 services, gather and item finder respectively.« less
Diets of angora goats grazing leafy spurge Euphorbia esula-infested rangelands
Donald Kirby; Thomas P. Hanson; Carolyn Hull Sieg
1997-01-01
Angora goats have been suggested as biological control agents for leafy spurge, especially in environmentally sensitive or limited access areas. Dietary preferences and dietary nutritive content of herded Angora goats were evaluated over a two-year period in North Dakota. Relative preferences of forages were evaluated by comparing botanical composition of diets as...
Science or Snake Oil? Teaching Critical Evaluation of "Research" Reports on the Internet
ERIC Educational Resources Information Center
Connor-Greene, Patricia A.; Greene, Dan J.
2002-01-01
The proliferation of information on the Internet introduces new challenges for educators. Although the Internet can provide quick and easy access to a wealth of information, it has virtually no quality control. Consequently, the Internet has rendered faculty more essential than ever as teachers of the analytic and evaluative skills students need…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, T.
SPI/U3.1 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Inspector Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, Tony
SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
SPI/U3.2. Security Profile Inspector for UNIX Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, A.
1994-08-01
SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
Frequency-selective design of wireless power transfer systems for controlled access applications
NASA Astrophysics Data System (ADS)
Maschino, Tyler Stephen
Wireless power transfer (WPT) has become a common way to charge or power many types of devices, ranging from cell phones to electric toothbrushes. WPT became popular through the introduction of a transmission mode known as strongly coupled magnetic resonance (SCMR). This means of transmission is non-radiative and enables mid-range WPT. Shortly after the development of WPT via SCMR, a group of researchers introduced the concept of resonant repeaters, which allows power to hop from the source to the device. These repeaters are in resonance with the WPT system, which enables them to propagate the power wirelessly with minimal losses to the environment. Resonant repeaters have rekindled the dream of ubiquitous wireless power. Inherent risks come with the realization of such a dream. One of the most prominent risks, which we set out in this thesis to address, is that of accessibility to the WPT system. We propose the incorporation of a controlled access schema within a WPT system to prevent unwarranted use of wireless power. Our thesis discusses the history of electromagnetism, examines the inception of WPT via SCMR, evaluates recent developments in WPT, and further elaborates on the controlled access schema we wish to contribute to the field.
Access control mechanism of wireless gateway based on open flow
NASA Astrophysics Data System (ADS)
Peng, Rong; Ding, Lei
2017-08-01
In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.
An Attribute Based Access Control Framework for Healthcare System
NASA Astrophysics Data System (ADS)
Afshar, Majid; Samet, Saeed; Hu, Ting
2018-01-01
Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.
Improving work-zone delineation on limited access highways.
DOT National Transportation Integrated Search
1989-01-01
The purpose of this study was to investigate vehicle guidance through work zones by evaluating the effectiveness of two primary components of traffic control relative to delineation. First, a comparison of the steady-burn lights presently used on top...
Koyyappurath, Sayuj; Conéjéro, Geneviève; Dijoux, Jean Bernard; Lapeyre-Montès, Fabienne; Jade, Katia; Chiroleu, Frédéric; Gatineau, Frédéric; Verdeil, Jean Luc; Besse, Pascale; Grisoni, Michel
2015-01-01
Root and stem rot (RSR) disease caused by Fusarium oxysporum f. sp. radicis-vanillae (Forv) is the most damaging disease of vanilla (Vanilla planifolia and V. × tahitensis, Orchidaceae). Breeding programs aimed at developing resistant vanilla varieties are hampered by the scarcity of sources of resistance to RSR and insufficient knowledge about the histopathology of Forv. In this work we have (i) identified new genetic resources resistant to RSR including V. planifolia inbreds and vanilla relatives, (ii) thoroughly described the colonization pattern of Forv into selected vanilla accessions, confirming its necrotic non-vascular behavior in roots, and (iii) evidenced the key role played by hypodermis, and particularly lignin deposition onto hypodermal cell walls, for resistance to Forv in two highly resistant vanilla accessions. Two hundred and fifty-four vanilla accessions were evaluated in the field under natural conditions of infection and in controlled conditions using in vitro plants root-dip inoculated by the highly pathogenic isolate Fo072. For the 26 accessions evaluated in both conditions, a high correlation was observed between field evaluation and in vitro assay. The root infection process and plant response of one susceptible and two resistant accessions challenged with Fo072 were studied using wide field and multiphoton microscopy. In susceptible V. planifolia, hyphae penetrated directly into the rhizodermis in the hairy root region then invaded the cortex through the passage cells where it induced plasmolysis, but never reached the vascular region. In the case of the resistant accessions, the penetration was stopped at the hypodermal layer. Anatomical and histochemical observations coupled with spectral analysis of the hypodermis suggested the role of lignin deposition in the resistance to Forv. The thickness of lignin constitutively deposited onto outer cell walls of hypodermis was highly correlated with the level of resistance for 21 accessions tested. The accumulation of p-coumaric and sinapic acids, two phenolic precursors of lignin, was observed in the resistant plants inoculated with Fo072, but not in the susceptible one. Altogether, our analyses enlightened the mechanisms at work in RSR resistant genotypes and should enhance the development of novel breeding strategies aimed at improving the genetic control of RSR of vanilla. PMID:26734032
ERIC Educational Resources Information Center
Eastman-Mueller, Heather P.; Gomez-Scott, Jessica R.; Jung, Ae-Kyung; Oswalt, Sara B.; Hagglund, Kristofer
2016-01-01
The U.S. Centers for Disease Control and Prevention advocate access to condoms as a critical sexual health prevention strategy. The purpose of this article is to discuss the implementation and evaluation of a condom availability program using dispensing machines in residence halls at a Midwestern U.S. university. Undergraduate students (N = 337)…
2016-01-01
Background Mindfulness meditation interventions improve a variety of health conditions and quality of life, are inexpensive, easy to implement, have minimal if any side effects, and engage patients to take an active role in their treatment. However, the group format can be an obstacle for many to take structured meditation programs. Internet Mindfulness Meditation Intervention (IMMI) is a program that could make mindfulness meditation accessible to all people who want and need to receive it. However, the feasibility, acceptability, and ability of IMMI to increase meditation practice have yet to be evaluated. Objectives The primary objectives of this pilot randomized controlled study were to (1) evaluate the feasibility and acceptability of IMMIs in the general population and (2) to evaluate IMMI’s ability to change meditation practice behavior. The secondary objective was to collect preliminary data on health outcomes. Methods Potential participants were recruited from online and offline sources. In a randomized controlled trial, participants were allocated to IMMI or Access to Guided Meditation arm. IMMI included a 1-hour Web-based training session weekly for 6 weeks along with daily home practice guided meditations between sessions. The Access to Guided Meditation arm included a handout on mindfulness meditation and access to the same guided meditation practices that the IMMI participants received, but not the 1-hour Web-based training sessions. The study activities occurred through the participants’ own computer and Internet connection and with research-assistant telephone and email contact. Feasibility and acceptability were measured with enrollment and completion rates and participant satisfaction. The ability of IMMI to modify behavior and increase meditation practice was measured by objective adherence of daily meditation practice via Web-based forms. Self-report questionnaires of quality of life, self-efficacy, depression symptoms, sleep disturbance, perceived stress, and mindfulness were completed before and after the intervention period via Web-based surveys. Results We enrolled 44 adults were enrolled and 31 adults completed all study activities. There were no group differences on demographics or important variables at baseline. Participants rated the IMMI arm higher than the Access to Guided Meditation arm on Client Satisfaction Questionnaire. IMMI was able to increase home practice behavior significantly compared to the Access to Guided Meditation arm: days practiced (P=.05), total minutes (P=.01), and average minutes (P=.05). As expected, there were no significant differences on health outcomes. Conclusions In conclusion, IMMI was found to be feasible and acceptable. The IMMI arm had increased daily meditation practice compared with the Access to Guided Meditation control group. More interaction through staff and/or through built-in email or text reminders may increase daily practice even more. Future studies will examine IMMI’s efficacy at improving health outcomes in the general population and also compare it directly to the well-studied mindfulness-based group interventions to evaluate relative efficacy. Trial Registration Clinicaltrials.gov NCT02655835; http://clinicaltrials.gov/ct2/show/NCT02655835 (Archived by WebCite at http://www.webcitation/ 6jUDuQsG2) PMID:27502759
The effect of a healthy school tuck shop program on the access of students to healthy foods.
Kim, Kirang; Hong, Seo Ah; Yun, Sung Ha; Ryou, Hyun Joo; Lee, Sang Sun; Kim, Mi Kyung
2012-04-01
The objective of this study was to evaluate the effect of a healthy school tuck shop program, developed as a way of creating a healthy and nutritional school environment, on students' access to healthy foods. Five middle schools and four high schools (775 students) participated in the healthy school tuck shop program, and nine schools (1,282 students) were selected as the control group. The intervention program included restriction of unhealthy foods sold in tuck shops, provision of various fruits, and indirect nutritional education with promotion of healthy food products. The program evaluation involved the examination of students' purchase and intake patterns of healthy foods, satisfaction with the available foodstuffs, and utilization of and satisfaction with nutritional educational resources. Our results indicated that among of the students who utilized the tuck shop, about 40% purchased fruit products, showing that availability of healthy foods in the tuck shop increased the accessibility of healthy foods for students. Overall food purchase and intake patterns did not significantly change during the intervention period. However, students from the intervention schools reported higher satisfaction with the healthy food products sold in the tuck shop than did those from the control schools (all P < 0.001), and they were highly satisfied with the educational resources provided to them. In conclusion, the healthy school tuck shop program had a positive effect on the accessibility of healthy food. The findings suggest that a healthy school tuck shop may be an effective environmental strategy for promoting students' access to healthy foods.
The effect of a healthy school tuck shop program on the access of students to healthy foods
Kim, Kirang; Hong, Seo Ah; Yun, Sung Ha; Ryou, Hyun Joo; Lee, Sang Sun
2012-01-01
The objective of this study was to evaluate the effect of a healthy school tuck shop program, developed as a way of creating a healthy and nutritional school environment, on students' access to healthy foods. Five middle schools and four high schools (775 students) participated in the healthy school tuck shop program, and nine schools (1,282 students) were selected as the control group. The intervention program included restriction of unhealthy foods sold in tuck shops, provision of various fruits, and indirect nutritional education with promotion of healthy food products. The program evaluation involved the examination of students' purchase and intake patterns of healthy foods, satisfaction with the available foodstuffs, and utilization of and satisfaction with nutritional educational resources. Our results indicated that among of the students who utilized the tuck shop, about 40% purchased fruit products, showing that availability of healthy foods in the tuck shop increased the accessibility of healthy foods for students. Overall food purchase and intake patterns did not significantly change during the intervention period. However, students from the intervention schools reported higher satisfaction with the healthy food products sold in the tuck shop than did those from the control schools (all P < 0.001), and they were highly satisfied with the educational resources provided to them. In conclusion, the healthy school tuck shop program had a positive effect on the accessibility of healthy food. The findings suggest that a healthy school tuck shop may be an effective environmental strategy for promoting students' access to healthy foods. PMID:22586503
Ahern, Elayne; Kinsella, Stephen; Semkovska, Maria
2018-02-01
Leading cause of disability worldwide, depression is the most prevalent mental disorder with growing societal costs. As mental health services demand often outweighs provision, accessible treatment options are needed. Our systematic review and meta-analysis evaluated the clinical efficacy and economic evidence for the use of online cognitive behavioral therapy (oCBT) as an accessible treatment solution for depression. Areas covered: Electronic databases were searched for controlled trials published between 2006 and 2016. Of the reviewed 3,324 studies, 29 met the criteria for inclusion in the efficacy meta-analysis. The systematic review identified five oCBT economic evaluations. Therapist-supported oCBT was equivalent to face-to-face CBT at improving depressive symptoms and superior to treatment-as-usual, waitlist control, and attention control. Depression severity, number of sessions, or support did not affect efficacy. From a healthcare provider perspective, oCBT tended to show greater costs with greater benefits in the short term, relative to comparator treatments. Expert commentary: Although efficacious, further economic evidence is required to support the provision of oCBT as a cost-effective treatment for depression. Economic evaluations that incorporate a societal perspective will better account for direct and indirect treatment costs. Nevertheless, oCBT shows promise of effectively improving depressive symptoms, considering limited mental healthcare resources.
Expert opinions on optimal enforcement of minimum purchase age laws for tobacco.
Levy, D T; Chaloupka, F; Slater, S
2000-05-01
A questionnaire on how youth access laws should be enforced was sent to 20 experts who had administered and/or evaluated a youth access enforcement program. Respondents agreed on the need for a high level of retail compliance, checkers representative of the community, checks at least twice per year, a graduated penalty structure with license revocation, and bans on self-service and vending machines. Respondents indicated the need for research on the effects of ID use, frequency of checks, penalty structures, and the effects on smoking rates of youth access policies alone and in conjunction with other tobacco control policies.
Choe, Sun; Lim, Rod Seung-Hwan; Clark, Karen; Wang, Regina; Branz, Patricia; Sadler, Georgia Robins
2009-01-01
Deaf women encounter barriers to accessing cancer information. In this study, we evaluated whether deaf women's knowledge could be increased by viewing a graphically enriched, American Sign Language (ASL) cervical cancer education video. A blind, randomized trial evaluated knowledge gain and retention. Deaf women (n = 130) completed questionnaires before, after, and 2 months after viewing the video. With only a single viewing of the in-depth video, the experimental group gained and retained significantly more cancer knowledge than the control group. Giving deaf women access to the ASL cervical cancer education video (http://cancer.ucsd.edu/deafinfo) significantly increased their knowledge of cervical cancer.
Campero, Lourdes; Walker, Dilys; Atienzo, Erika E; Gutierrez, Juan Pablo
2011-04-01
To evaluate the effectiveness of an educational intervention for parents of first year high school students in the State of Morelos, Mexico, whose aim was to impact adolescents' sexual behavior, knowledge and access to contraception. Quasi-experimental prospective study with eleven control and eleven intervention schools using self-administered questionnaires for parents and adolescents pre- and post-intervention. Parent-child dyads in the control and intervention schools were matched according to parents' propensity score; the average treatment effect (ATE) was estimated for adolescent's outcome variables. At follow-up, we found significant differences for adolescents in the intervention schools: 6.8% delayed initiation of sexual intercourse, 14.4% had correct knowledge about emergency contraception (EC), and 164% reported having received condoms from their parents, when comparing with students in control schools. Our results suggest that parent-focused interventions could be an innovative and effective strategy to promote adolescents sexual health. Copyright © 2010 The Association for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.
Access to Preventive Health Care for Cancer Survivors
Yabroff, K. Robin; Short, Pamela Farley; Machlin, Steven; Dowling, Emily; Rozjabek, Heather; Li, Chunyu; McNeel, Timothy; Ekwueme, Donatus U.; Virgo, Katherine S.
2013-01-01
Background Access to healthcare, particularly effective primary and secondary preventive care, is critical for cancer survivors, in order to minimize the adverse sequelae of cancer and its treatment. Purpose The goal of the study was to evaluate the association between cancer survivorship and access to primary and preventive health care. Methods Cancer survivors (n=4960) and individuals without a cancer history (n=64,431) aged ≥18 years, from the 2008–2010 Medical Expenditure Panel Survey (MEPS), were evaluated. Multiple measures of access and preventive services use were compared. The association between cancer survivorship and access and preventive services was evaluated with multivariate logistic regression models, stratified by age group (18–64 years and ≥65 years), controlling for the effects of age, gender, race/ethnicity, education, marital status, and comorbidities. Data were analyzed in 2013. Results Cancer survivors aged ≥65 years had equivalent or greater access and preventive services use than individuals without a cancer history, in adjusted analyses. However, among those aged 18–64 years with private health insurance, cancer survivors were more likely than other individuals to have a usual source of care and to use preventive services, whereas uninsured or publicly insured cancer survivors were generally less likely to have a usual source of care and to use preventive services than were uninsured or publicly insured adults without a cancer history. Conclusions Although access and preventive care use in cancer survivors is generally equivalent or greater compared to that of other individuals, disparities for uninsured and publicly insured cancer survivors aged 18–64 years suggest that improvements in survivor care are needed. PMID:23953357
Efficient Access Control in Multimedia Social Networks
NASA Astrophysics Data System (ADS)
Sachan, Amit; Emmanuel, Sabu
Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.
Impact of Advanced (Open) Access Scheduling on Patients With Chronic Diseases
Degani, N
2013-01-01
Background The goal of advanced access scheduling is to eliminate wait times for physician visits by ensuring access to same-day appointments, regardless of urgency or health care need. The intent is to reduce delays in access, leading to improvements in clinical care and patient satisfaction, and reductions in the use of urgent care. Objective To evaluate whether implementation of an advanced access scheduling system reduced other types of health service utilization and/or improved clinical measures and patient satisfaction among adults with chronic diseases. Data Sources and Review Methods A literature search was performed on January 29, 2012, for studies published from 1946 (OVID) or 1980 (EMBASE) to January 29, 2012. Systematic reviews, randomized controlled trials, and observational studies were eligible if they evaluated advanced access implementation in adults with chronic diseases and reported health resource utilization, patient outcomes, or patient satisfaction. Results were summarized descriptively. Results One systematic review in a primary care population and 4 observational studies (5 papers) in chronic disease and/or geriatric populations were identified. The systematic review concluded that advanced access did not improve clinical outcomes, but there was no evidence of harm. Findings from the observational studies in chronic disease populations were consistent with those of the systematic review. Advanced access implementation was not consistently associated with changes in clinical outcomes, patient satisfaction, or health service utilization. Limitations All studies were retrospective: 3 studies (4 papers) included historical controls only, and 1 included contemporaneous controls. Findings were inconsistent across studies for a number of outcomes. Conclusions Based on low to very low quality evidence, advanced access did not have a statistically (or clinically) significant impact on health service utilization among patients with diabetes and/or coronary artery disease (CAD). Very low quality evidence showed a significant reduction in the proportion of patients with diabetes and CAD admitted to hospital whose length of stay was greater than 3 days. Evidence was inconsistent for changes in clinical outcomes for patients with diabetes or CAD. Very low quality evidence showed no increase in patient satisfaction with an advanced access scheduling system. Plain Language Summary Timeliness of health care access—reducing wait times and delays for those receiving and providing care—is a key measure of health system quality. However, in international comparison studies, Canada ranked either last or next to last when it came to timely access to regular doctors. Efforts in Ontario to address delays in access have included the implementation of the Advanced Access and Efficiency for Primary Care initiative through the Quality Improvement and Innovation Partnership, later incorporated into Health Quality Ontario. Advanced access is a physician appointment scheduling system that aims to eliminate wait times for physician visits and ensure same-day access for all patients, regardless of urgency or health care need. While it can generally be agreed that timely access to health care is necessary for all patients, same-day access may not always be required. Indeed, advanced access may adversely affect the care of patients with chronic diseases if clinics implement strict same-day appointment rules and patients cannot pre-book follow-up appointments. This review evaluated the effect of advanced access scheduling on clinical outcomes, patient satisfaction, and health service utilization in patients with selected chronic diseases, as part of the Optimizing Chronic Disease Management in the Outpatient (Community) Setting mega-analysis. In patients with diabetes or coronary artery disease, advanced access implementation had little or no impact on acute health care use (hospitalizations, emergency department visits, and/or urgent care visits) and had inconsistent effects on clinical outcomes (blood glucose, low-density lipoprotein [LDL] cholesterol, and blood pressure). Two studies reported reduced monitoring of patients with chronic diseases after implementation of advanced access. Another study reported improved patient management (regular blood glucose and cholesterol testing) after advanced access implementation, but this was attributed to improved provider continuity rather than to reduced appointment wait times. There was no increase in patient satisfaction with the advanced access scheduling system. The quality of the evidence ranged from low to very low. PMID:24133569
Evaluation of an internet-based animated preparatory video for children undergoing non-sedated MRI.
McGlashan, Hannah L; Dineen, Rob A; Szeszak, Sofia; Whitehouse, William P; Chow, Gabriel; Love, Andrew; Langmack, Gill; Wharrad, Heather
2018-05-10
We evaluate the value of an internet-based educational animated video designed to prepare children for MRI scans, and whether this video reduces scan-related anxiety in children with a neurological disorder, and healthy controls. Participants completed a pre- and post-scan questionnaire evaluating participant online viewing behaviour, understanding of the MRI procedure, anxiety regarding the MRI, impact of animation in preparing the child and whether the child's expectation of the MRI scan matched their experience. 21 children were recruited (12 healthy controls) ranging in age from 6.5 to 11.5 years. The animation was successfully accessed by participants on a range of digital devices and had high levels of approval. Children who viewed the animation had a good understanding of the MRI procedure and low anxiety levels prior to the scan, and reported that their expectations broadly matched the real-life MRI experience. Children reported that the animation positively impacted on their preparation with similar ratings before and after the scan, and the impact on preparation was rated greater by younger children. There were no group differences between healthy children and those with the neurological disorder for ratings of anxiety, impact on preparation and expectation of the experience. This evaluation demonstrates accessibility, acceptability and relevance of internet-based educational animation for typically developing children, and children with a neurodisability aged 6 to 11 years, with positive impact on preparation for MRI. Advances in knowledge: The internet-based educational animation provides a widely accessible tool to support preparation of children for non-sedated MRI.
Foley, N M; O'Connell, E P; Lehane, E A; Livingstone, V; Maher, B; Kaimkhani, S; Cil, T; Relihan, N; Bennett, M W; Redmond, H P; Corrigan, M A
2016-12-01
The information needs of cancer patients are highly variable. Literature suggests an improved ability to modulate personalised stress, increased patient involvement with decision making, greater satisfaction with treatment choices and reduced anxiety levels in cancer patients who have access to information. The aim of this project was to evaluate the effects of a mobile information application on anxiety levels of patients undergoing surgery for breast cancer. An application was developed for use with Apple iPad containing information on basic breast cancer biology, different treatments used and surgical techniques. Content and face validity studies were performed. A randomized control trial was designed, with a 1:2 allocation. Data collected include basic demographics and type of surgery. Questionnaires used included: the HADS, Mini-MAC, information technology familiarity and information satisfaction. A total of 39 women participated. 13 women had access to an iPad containing additional information and 26 women acted as controls. The mean age was 54 and technology familiarity was similar among both groups. Anxiety and depression scores at seven days were significantly lower in control patients without access to the additional information provided by the mobile application (p = 0.022 and 0.029 respectively). Anxiety and depression in breast cancer patients is both multifactorial and significant, with anxiety levels directly correlating with reduced quality of life. Intuitively, information should improve anxiety levels, however, we have demonstrated that surgical patients with less information reported significantly lower anxiety. We advise the thorough testing and auditing of information initiatives before deployment. Copyright © 2016 Elsevier Ltd. All rights reserved.
Reducing Hospital Toxicity: Impact on Patient Outcomes.
Milani, Richard V; Bober, Robert M; Lavie, Carl J; Wilt, Jonathan K; Milani, Alexander R; White, Christopher J
2018-05-02
Circadian rhythms are endogenous 24-hour oscillations in biologic processes that drive nearly all physiologic and behavioral functions. Disruption in circadian rhythms can adversely impact short and long-term health outcomes. Routine hospital care often causes significant disruption in sleep-wake patterns that is further compounded by loss of personal control of health information and health decisions. We wished to evaluate measures directed at improving circadian rhythm and access to daily health information on hospital outcomes. We evaluated 3,425 consecutive patients admitted to a medical-surgical unit comprised of an intervention wing (n=1,185) or standard control wing (n=2,240) over a 2.5-year period. Intervention patients received measures to improve sleep that included reduction of nighttime noise, delay of routine morning phlebotomy, passive vital sign monitoring, and use of red-enriched lighting after sunset, as well as access to daily health information utilizing an inpatient portal. Intervention patients accessed the inpatient portal frequently during hospitalization seeking personal health and care team information. Measures impacting the quality and quantity of sleep were significantly improved. LOS was 8.6 hours less (p=0.04), 30 and 90-day readmission rates were 16% and 12% lower, respectively (both p≤ 0.02), and self-rated emotional/mental health was higher (69.2% vs. 52.4%; p=0.03) in the intervention group compared to controls. Modest changes in routine hospital care can improve the hospital environment impacting sleep and access to health knowledge, leading to improvements in hospital outcomes. Sleep-wake patterns of hospitalized patients represent a potential avenue for further enhancing hospital quality and safety. Copyright © 2018. Published by Elsevier Inc.
Burkhart, Lisa; Sohn, Min-Woong; Jordan, Neil; Tarlov, Elizabeth; Gampetro, Pamela; LaVela, Sherri L
2016-01-01
The Veterans Health Administration piloted patient-centered care (PCC) innovations beginning in 2010 to improve patient and provider experience and environment in ambulatory care. We use secondary data to look at longitudinal trends, evaluate system redesign, and identify areas for further quality improvement. This was a retrospective, observational study using existing secondary data from multiple US Department of Veteran Affairs sources to evaluate changes in veteran and facility outcomes associated with PCC innovations at 2 innovation and matched comparison sites between FY 2008-2010 (pre-PCC innovations) and FY 2011-2012 (post-PCC innovations). Outcomes included access to primary care providers (PCPs); primary, specialty, and emergency care use; and clinical indicators for chronic disease. Longitudinal trends revealed a different story at each site. One site demonstrated better PCP access, decrease in emergency and primary care use, increase in specialty care use, and improvement in diabetic glucose control. The other site demonstrated a decrease in PCP access and primary care use, no change in specialty care use, and an increase in diastolic blood pressure in relation to the comparison site. Secondary data analysis can reveal longitudinal trends associated with system changes, thereby informing program evaluation and identifying opportunities for quality improvement.
Evaluating Predicates over Encrypted Data
2008-10-01
Predicate encryption is a new encryption paradigm where the secret key owner can perform fine-grained access control over the encrypted data. In...particular, the secret key owner can generate a capability corresponding to a query predicate (e.g., whether an encrypted email contains the keyword
A service-oriented data access control model
NASA Astrophysics Data System (ADS)
Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali
2017-01-01
The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.
Methodological proceedings to evaluate the physical accessibility in urban historic sites.
Ribeiro, Gabriela Sousa; Martins, Laura Bezerra; Monteiro, Circe Maria Gama
2012-01-01
Historic urban sites are set by cultural and social diversities, generating multiple activities and use and access to these sites should be available to all people including those with disabilities. Taking into consideration that using the same methodology that was used in different historic sites researches with positive results facilitates replication, we aimed to develop methodological procedures that identify conditions of physical accessibility in open public spaces and access to public buildings in historic urban sites to support proposals about design requirements for improvements to the problems diagnosed and control inadequacies of the physical environment. The study methods and techniques from different areas of knowledge culminated in a proposal built with an emphasis on user participation that could be applied with low cost and in relatively short period of time.
A passive RFID-based location system for personnel and asset monitoring.
Hsiao, Rong-Shue; Kao, Chun-Hao; Chen, Tian-Xiang; Chen, Jui-Lun
2018-01-01
Typical radio frequency identification (RFID) access control system can be ineffective if an unauthorized person tailgates an authorized person through an access area. To propose a system by using indoor locating and tracking techniques address this problem, which is to prevent unauthorized Alzheimer's and dementia patients from getting lost including by tailgating. To achieve accurate target location, passive RFID deployment strategy is studied and a fingerprinting based passive RFID localization algorithm is proposed. The proposed system was evaluated in a building environment to simulate the performance of access control. RFID reader was installed on ceiling near the access area and tags were stitched on both shoulders of the experiment subject's garments. The probability of the error distance within 0.3 m achieved 97% in the warning area; the location precision achieved 97% within 0.4 m in the monitoring area. The result showed that if an unauthorized person enters the restricted area, the system can initiate an alert signal accurately. Therefore, the proposed system is very suitable to be used in nursing home or hospital to prevent unauthorized personnel and assets entering/exiting a confined location.
Hutten, Helmut; Stiegmaier, Wolfgang; Rauchegger, Günter
2005-09-01
Modern life style requires new methods for individual lifelong learning, based on access at every time and from every place. This fundamental requirement is provided by the Internet. The Internet technology promises an increasing potential in the future for e-learning or tele-learning. Some special requirements are password-controlled access, applicability of most commercially available PCs and laptops equipped with standard software (Microsoft Internet Explorer 6.0), central evaluation of the students' performance, inclusion of an examination part, provision of a picture gallery and a comprehensive glossary accessible in the learning mode. The KISS-shell has been developed based on the Oracle 10g application server in combination with a relational data base (Oracle 8i) on the server side and a web browser based interface using JavaScript for user control of data input on the client side (Kontrolliertes Intelligentes Selbstgesteuertes Studium, KISS). The first tutorial application has been realized with a chapter about cardiac pacemakers. The weight of that chapter (or module) is about 2 ECTS (i.e. the equivalent of 30 working hours; European Credit Transfer System, ECTS). The internal structure of the chapter is organized in sequential mode. It consists of five main sections. Each of those five sections is subdivided into five subsections of comparable length. Progression from one subsection to the next is possible only after successfully passing through the respective examination. The whole learning programme with the pacemaker chapter has been evaluated by 10 students. The system will be presented together with first experiences including the evaluation results. Until now the program has not been used for training purposes.
Controlled Human Malaria Infection: Applications, Advances, and Challenges.
Stanisic, Danielle I; McCarthy, James S; Good, Michael F
2018-01-01
Controlled human malaria infection (CHMI) entails deliberate infection with malaria parasites either by mosquito bite or by direct injection of sporozoites or parasitized erythrocytes. When required, the resulting blood-stage infection is curtailed by the administration of antimalarial drugs. Inducing a malaria infection via inoculation with infected blood was first used as a treatment (malariotherapy) for neurosyphilis in Europe and the United States in the early 1900s. More recently, CHMI has been applied to the fields of malaria vaccine and drug development, where it is used to evaluate products in well-controlled early-phase proof-of-concept clinical studies, thus facilitating progression of only the most promising candidates for further evaluation in areas where malaria is endemic. Controlled infections have also been used to immunize against malaria infection. Historically, CHMI studies have been restricted by the need for access to insectaries housing infected mosquitoes or suitable malaria-infected individuals. Evaluation of vaccine and drug candidates has been constrained in these studies by the availability of a limited number of Plasmodium falciparum isolates. Recent advances have included cryopreservation of sporozoites, the manufacture of well-characterized and genetically distinct cultured malaria cell banks for blood-stage infection, and the availability of Plasmodium vivax -specific reagents. These advances will help to accelerate malaria vaccine and drug development by making the reagents for CHMI more widely accessible and also enabling a more rigorous evaluation with multiple parasite strains and species. Here we discuss the different applications of CHMI, recent advances in the use of CHMI, and ongoing challenges for consideration. Copyright © 2017 American Society for Microbiology.
Macroscopic characterisations of Web accessibility
NASA Astrophysics Data System (ADS)
Lopes, Rui; Carriço, Luis
2010-12-01
The Web Science framework poses fundamental questions on the analysis of the Web, by focusing on how microscopic properties (e.g. at the level of a Web page or Web site) emerge into macroscopic properties and phenomena. One research topic on the analysis of the Web is Web accessibility evaluation, which centres on understanding how accessible a Web page is for people with disabilities. However, when framing Web accessibility evaluation on Web Science, we have found that existing research stays at the microscopic level. This article presents an experimental study on framing Web accessibility evaluation into Web Science's goals. This study resulted in novel accessibility properties of the Web not found at microscopic levels, as well as of Web accessibility evaluation processes themselves. We observed at large scale some of the empirical knowledge on how accessibility is perceived by designers and developers, such as the disparity of interpretations of accessibility evaluation tools warnings. We also found a direct relation between accessibility quality and Web page complexity. We provide a set of guidelines for designing Web pages, education on Web accessibility, as well as on the computational limits of large-scale Web accessibility evaluations.
Review and Evaluation of Internal Control in the Department of the Navy.
1984-03-01
marketing Formulating adver- Controlling placement policies tising programs of advertisements Setting research Deciding on policies research projects Choosing...proper command level. with laws, regulations, treatires, and management policy. The command, base, or unit Written defintions of authorized activities...informa- tion to the members of the operating management ... Management also has a responsibility to maintain its access to the capital market and ... to
Quality Control Review of the Defense Logistics Agency Audit Organization
2014-12-19
Management Information Distribution and Access System ( MIDAS ). The auditors used data generated from MIDAS to analyze property receipt transaction...However, because there was no evaluation of the effectiveness of controls over MIDAS , the auditors may not have assessed audit risk adequately...Operations in Afghanistan, auditors used property receipt transaction data that were generated from MIDAS to determine whether the audited entity had
The prioritisation of paediatrics and palliative care in cancer control plans in Africa.
Weaver, M S; Yao, A J J; Renner, L A; Harif, M; Lam, C G
2015-06-09
Given the burden of childhood cancer and palliative care need in Africa, this paper investigated the paediatric and palliative care elements in cancer control plans. We conducted a comparative content analysis of accessible national cancer control plans in Africa, using a health systems perspective attentive to context, development, scope, and monitoring/evaluation. Burden estimates were derived from World Bank, World Health Organisation, and Worldwide Palliative Care Alliance. Eighteen national plans and one Africa-wide plan (10 English, 9 French) were accessible, representing 9 low-, 4 lower-middle-, and 5 upper-middle-income settings. Ten plans discussed cancer control in the context of noncommunicable diseases. Paediatric cancer was mentioned in 7 national plans, representing 5127 children, or 13% of the estimated continental burden for children aged 0-14 years. Palliative care needs were recognised in 11 national plans, representing 157 490 children, or 24% of the estimated Africa-wide burden for children aged 0-14 years; four plans specified paediatric palliative needs. Palliative care was itemised in four budgets. Sample indicators and equity measures were identified, including those highlighting contextual needs for treatment access and completion. Recognising explicit strategies and funding for paediatric and palliative services may guide prioritised cancer control efforts in resource-limited settings.
Abuya, Timothy O.; Fegan, Greg; Amin, Abdinasir A.; Akhwale, Willis S.; Noor, Abdisalan M.; Snow, Robert W.; Marsh, Vicki
2010-01-01
Background Private medicine retailers (PMRs) are key partners in the home management of fevers in many settings. Current evidence on effectiveness for PMR interventions at scale is limited. This study presents evaluation findings of two different programs implemented at moderate scale targeting PMRs for malaria control in the Kisii and Kwale districts of Kenya. Key components of this evaluation were measurement of program performance, including coverage, PMR knowledge, practices, and utilization based on spatial analysis. Methodology/Principal Findings The study utilized mixed quantitative methods including retail audits and surrogate client surveys based on post-intervention cross-sectional surveys in intervention and control areas and mapping of intervention outlets. There was a large and significant impact on PMR knowledge and practices of the program in Kisii, with 60.5% of trained PMRs selling amodiaquine medicines in adequate doses compared to 2.8% of untrained ones (OR; 53.5: 95% CI 6.7, 428.3), a program coverage of 69.7% targeted outlets, and a potential utilization of about 30,000 children under five. The evaluation in Kwale also indicates a significant impact with 18.8% and 2.3% intervention and control PMRs selling amodiaquine with correct advice, respectively (OR; 9.4: 95% CI 1.1, 83.7), a program coverage of 25.3% targeted outlets, and a potential utilization of about 48,000 children under five. A provisional benchmark of 7.5 km was a reasonable threshold distance for households to access PMR services. Conclusions/Significance This evaluation show that PMR interventions operationalized in the district level settings are likely to impact PMR knowledge and practices and lead to increased coverage of appropriate treatment to target populations. There is value of evaluating different dimensions of public health programs, including quality, spatial access, and implementation practice. This approach strengthens the potential contribution of pragmatic study designs to evaluating public health programs in the real world. PMID:20126620
USDA-ARS?s Scientific Manuscript database
Understanding of plant-bacterial interactions is of critical importance for developing effective control measures against infectious diseases caused by foodborne human pathogens. However, limitations of existing scientific tools to access and evaluate natural plant tissues, and the large variations ...
2010-01-01
Background Cancer is a rapidly increasing problem in developing countries. Access, quality and efficiency of cancer services in developing countries must be understood to advance effective cancer control programs. Health services research can provide insights into these areas. Discussion This article provides an overview of oncology health services in developing countries. We use selected examples from peer-reviewed literature in health services research and relevant publicly available documents. In spite of significant limitations in the available data, it is clear there are substantial barriers to access to cancer control in developing countries. This includes prevention, early detection, diagnosis/treatment and palliation. There are also substantial limitations in the quality of cancer control and a great need to improve economic efficiency. We describe how the application of health data may assist in optimizing (1) Structure: strengthening planning, collaboration, transparency, research development, education and capacity building. (2) Process: enabling follow-up, knowledge translation, patient safety and quality assurance. (3) Outcome: facilitating evaluation, monitoring and improvement of national cancer control efforts. There is currently limited data and capacity to use this data in developing countries for these purposes. Summary There is an urgent need to improve health services for cancer control in developing countries. Current resources and much-needed investments must be optimally managed. To achieve this, we would recommend investment in four key priorities: (1) Capacity building in oncology health services research, policy and planning relevant to developing countries. (2) Development of high-quality health data sources. (3) More oncology-related economic evaluations in developing countries. (4) Exploration of high-quality models of cancer control in developing countries. Meeting these needs will require national, regional and international collaboration as well as political leadership. Horizontal integration with programs for other diseases will be important. PMID:20942937
AEROSAT Access Control Summary
DOT National Transportation Integrated Search
1976-10-01
The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...
Aerosat Access Control Summary
DOT National Transportation Integrated Search
1976-10-01
The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...
Choe, Sun; Lim, Rod Seung-Hwan; Clark, Karen; Wang, Regina; Branz, Patricia; Sadler, Georgia Robins
2013-01-01
Background Deaf women encounter barriers to accessing cancer information. In this study, we evaluated whether deaf women's knowledge could be increased by viewing a graphically enriched, American Sign Language (ASL) cervical cancer education video. Methods A blind, randomized trial evaluated knowledge gain and retention. Deaf women (n = 130) completed questionnaires before, after, and 2 months after viewing the video. Results With only a single viewing of the in-depth video, the experimental group gained and retained significantly more cancer knowledge than the control group. Conclusions Giving deaf women access to the ASL cervical cancer education video (http://cancer.ucsd.edu/deafinfo) significantly increased their knowledge of cervical cancer. PMID:19259859
Price, Matthew; Yuen, Erica K; Davidson, Tatiana M; Hubel, Grace; Ruggiero, Kenneth J
2015-08-01
Although Web-based treatments have significant potential to assess and treat difficult-to-reach populations, such as trauma-exposed adolescents, the extent that such treatments are accessed and used is unclear. The present study evaluated the proportion of adolescents who accessed and completed a Web-based treatment for postdisaster mental health symptoms. Correlates of access and completion were examined. A sample of 2,000 adolescents living in tornado-affected communities was assessed via structured telephone interview and invited to a Web-based treatment. The modular treatment addressed symptoms of posttraumatic stress disorder, depression, and alcohol and tobacco use. Participants were randomized to experimental or control conditions after accessing the site. Overall access for the intervention was 35.8%. Module completion for those who accessed ranged from 52.8% to 85.6%. Adolescents with parents who used the Internet to obtain health-related information were more likely to access the treatment. Adolescent males were less likely to access the treatment. Future work is needed to identify strategies to further increase the reach of Web-based treatments to provide clinical services in a postdisaster context. (c) 2015 APA, all rights reserved).
Price, Matthew; Yuen, Erica; Davidson, Tatiana M.; Hubel, Grace; Ruggiero, Kenneth J.
2015-01-01
Although web-based treatments have significant potential to assess and treat difficult to reach populations, such as trauma-exposed adolescents, the extent that such treatments are accessed and used is unclear. The present study evaluated the proportion of adolescents who accessed and completed a web-based treatment for post-disaster mental health symptoms. Correlates of access and completion were examined. A sample of 2,000 adolescents living in tornado-affected communities was assessed via structured telephone interview and invited to a web-based treatment. The modular treatment addressed symptoms of PTSD, depression, and alcohol and tobacco use. Participants were randomized to experimental or control conditions after accessing the site. Overall access for the intervention was 35.8%. Module completion for those who accessed ranged from 52.8% to 85.6%. Adolescents with parents who used the Internet to obtain health-related information were more likely to access the treatment. Adolescent males were less likely to access the treatment. Future work is needed to identify strategies to further increase the reach of web-based treatments to provide clinical services in a post-disaster context. PMID:25622071
Positive Affect Modulates Flexibility and Evaluative Control
ERIC Educational Resources Information Center
van Wouwe, Nelleke C.; Band, Guido P. H.; Ridderinkhof, K. Richard
2011-01-01
The ability to interact with a constantly changing environment requires a balance between maintaining the currently relevant working memory content and being sensitive to potentially relevant new information that should be given priority access to working memory. Mesocortical dopamine projections to frontal brain areas modulate working memory…
Tsenov, B G; Emery, R J; Whitehead, L W; Gonzalez, J Reingle; Gemeinhardt, G L
2018-03-01
While many organizations maintain multiple layers of security control methodologies to prevent outsiders from gaining unauthorized access, persons such as employees or contractors who have been granted legitimate access can represent an "insider threat" risk. Interestingly, some of the most notable radiological events involving the purposeful contamination or exposure of individuals appear to have been perpetrated by insiders. In the academic and medical settings, radiation safety professionals focus their security efforts on (1) ensuring controls are in place to prevent unauthorized access or removal of sources, and (2) increasing security controls for the unescorted accessing of large sources of radioactivity (known as "quantities of concern"). But these controls may not completely address the threat insiders represent when radioactive materials below these quantities are present. The goal of this research project was to characterize the methodologies currently employed to counteract the insider security threat for the misuse or purposeful divergence of radioactive materials used in the academic and medical settings. A web-based survey was used to assess how practicing radiation safety professionals in academic and medical settings anticipate, evaluate, and control insider threat security risks within their institutions. While all respondents indicated that radioactive sources are being used in amounts below quantities of concern, only 6 % consider insider threat security issues as part of the protocol review for the use of general radioactive materials. The results of this survey identify several opportunities for improvement for institutions to address security gaps.
Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs
Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin
2017-01-01
Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings. PMID:28208590
Assessing the present state and potential of Medicaid controlled substance lock-in programs.
Roberts, Andrew W; Skinner, Asheley Cockrell
2014-05-01
Nonmedical use of prescription medications--particularly controlled substances--has risen dramatically in recent decades, resulting in alarming increases in overdose-related health care utilization, costs, and mortality. The Centers for Disease Control and Prevention estimate that 80% of abused and misused controlled substances originate as legal prescriptions. As such, policymakers and payers have the opportunity to combat nonmedical use by regulating controlled substance accessibility within legal prescribing and dispensing processes. One common policy strategy is found in Medicaid controlled substance lock-in programs. Lock-in programs identify Medicaid beneficiaries exhibiting high-risk controlled substance seeking behavior and "lock in" these patients to, typically, a single prescriber and pharmacy from which they may obtain Medicaid-covered controlled substance prescriptions. Lock-in restrictions are intended to improve care coordination between providers, reduce nonmedical use behaviors, and limit Medicaid costs stemming from nonmedical use and diversion. Peer-reviewed and gray literature have been examined to assess the current prevalence and design of Medicaid lock-in programs, as well as the current evidence base for informing appropriate program design and understanding program effectiveness. Forty-six state Medicaid agencies currently operate lock-in programs. Program design varies widely between states in terms of defining high-risk controlled substance use, the scope of actual lock-in restrictions, and length of program enrollment. Additionally, there is a remarkable dearth of peer-reviewed literature evaluating the design and effectiveness of Medicaid lock-in programs. Nearly all outcomes evidence stemmed from publicly accessible internal Medicaid program evaluations, which largely investigated cost savings to the state. Lock-in programs are highly prevalent and poised to play a meaningful role in curbing the prescription drug abuse epidemic. However, achieving these ends requires a concerted effort from the academic and policy communities to rigorously evaluate the effect of lock-in programs on patient outcomes, determine optimal program design, and explore opportunities to enhance lock-in program impact through coordination with parallel controlled substance policy efforts, namely prescription drug-monitoring programs.
Clinical predictors of oral leukoplakia recurrence following CO₂ laser vaporization.
Chainani-Wu, Nita; Lee, Dustin; Madden, Erin; Sim, Chelsia; Collins, Kornelia; Silverman, Sol
2015-11-01
The objective of this study was to determine whether risk of early leukoplakia recurrence (within 3 months) following carbon dioxide (CO2) laser removal varies by clinical characteristics including lesion size, site and accessibility of margins. A retrospective cohort study included patients with oral leukoplakia who had their first CO2 laser surgery for removal of oral leukoplakia between 2005 and 2010 at the UCSF oral medicine clinic. Twenty-six patients with 32 separate lesions met the eligibility criteria after a clinic database search was followed by review of clinical notes and biopsy reports from existing patient charts. Data analysis included computation of summary statistics, and logistic regression analyses to evaluate recurrence of leukoplakia by clinical characteristics of the lesions. Patient data and the characteristics of lesions were evaluated as possible predictors of early recurrence following laser removal; these included age, sex, duration, size, appearance and histopathology of the lesion. The only one that reached statistical significance was poor accessibility of the margins of the lesion (vs. good accessibility, OR = 24.57 (95% CI: 1.59-16.68), p = 0.016); the probability for trend for good, questionable, and poor accessibility was 0.0028. This finding remained significant after controlling for age, sex, duration and size of lesion. Four out of five lesions with poor accessibility showed recurrence at 3 months. Of these, three involved the gingiva and one the lateral tongue. This study has identified poor accessibility of the lesion margins as a predictor for early recurrence of leukoplakia following laser removal. Other variables evaluated did not reach statistical significance, possibly due to lack of power. Copyright © 2015 European Association for Cranio-Maxillo-Facial Surgery. Published by Elsevier Ltd. All rights reserved.
Arteriovenous Vascular Access Selection and Evaluation
MacRae, Jennifer M.; Oliver, Matthew; Clark, Edward; Dipchand, Christine; Hiremath, Swapnil; Kappel, Joanne; Kiaii, Mercedeh; Lok, Charmaine; Luscombe, Rick; Miller, Lisa M.; Moist, Louise
2016-01-01
When making decisions regarding vascular access creation, the clinician and vascular access team must evaluate each patient individually with consideration of life expectancy, timelines for dialysis start, risks and benefits of access creation, referral wait times, as well as the risk for access complications. The role of the multidisciplinary team in facilitating access choice is reviewed, as well as the clinical evaluation of the patient. PMID:28270917
Ho, Kendall; Newton, Lana; Boothe, Allison; Novak-Lauscher, Helen
2015-01-01
The mobile Digital Access to a Web-enhanced Network (mDAWN) program was implemented as an online, mobile self-management system to support patients with type-2 diabetes and their informal caregivers. Patients used wireless physiological sensors, received text messages, and had access to a secure web platform with health resources and semi-facilitated discussion forum. Outcomes were evaluated using (1) pre and post self-reported health behavior measures, (2) physiological outcomes, (3) program cost, and (4) in-depth participant interviews. The group had significantly decreased health distress, HbA1c levels, and systolic blood pressure. Participants largely saw the mDAWN as providing good value for the costs involved and found the program to be empowering in gaining control over their diabetes. mHealth programs have the potential to improve clinical outcomes through cost effective patient-led care for chronic illness. Further evaluation needs to examine integration of similar mHealth programs into the patient-physician relationship.
Mobula, Linda Meta; Sarfo, Stephen; Arthur, Lynda; Burnham, Gilbert; Plange-Rhule, Jacob; Ansong, Daniel; Gavor, Edith; Ofori-Adjei, David
2018-02-07
Background: There is evidence to suggest that the prevalence of non-communicable diseases (NCDs), in particular cardiovascular diseases and diabetes, are being recognized as forming a substantial proportion of the burden of disease among populations in Low- and Middle-Income Countries (LMICs). Access to treatment is likely a key barrier to the control and prevention of NCD outcomes. Differential pricing, an approach used to price drugs based on the purchasing power of patients in different socioeconomic segments, has been shown to be beneficial and leads to improved access and affordability. Methods: This is a quasi-experimental study, with a pragmatic trial design, to be conducted over the course of three years. A mixed methods design will be used to evaluate the effects of health systems strengthening and differential pricing on the management of diabetes, hypertension and selected cancers in Ghana. A public private partnership was established between all sites that will receive multi-level interventions, including health systems strengthening and access to medicines interventions. Study populations and sites: Study participants will include individuals with new or recently diagnosed hypertension and diabetes (n=3,300), who present to two major referral hospitals, Komfo Anokye Teaching Hospital and Tamale Teaching Hospital, as well as three district hospitals, namely Kings Medical Centre, Agogo Presbyterian District Hospital, and Atua Government Hospital. Discussion: The objective of this study aims to test approaches intended to improve access to drugs for the treatment of hypertension and diabetes, and improve disease control. Patients with these conditions will benefit from health systems strengthening interventions (education, counseling, improved management of disease), and increased access to innovative medicines via differential pricing. Pilot programs also will facilitate health system strengthening at the participating institutions, which includes training of clinicians and updating of guidelines and production of protocols for the treatment of diabetes, hypertension and cancer.
de Castro Nizio, Daniela Aparecida; Fujimoto, Rodrigo Yudi; Maria, Alexandre Nizio; Carneiro, Paulo César Falanghe; França, Carina Caroline Silva; da Costa Sousa, Natalino; de Andrade Brito, Fabiany; Sampaio, Taís Santos; de Fátima Arrigoni-Blank, Maria; Blank, Arie Fitzgerald
2018-01-01
The aim of this study was to evaluate the antiprotozoal activity of essential oils from Varronia curassavica accessions against different stages of Ichthyophthirius multifiliis. Essential oils from each accession were tested in vitro at the concentrations 0, 10, 25, 50, 75, 100, and 200 mg/L. The VCUR-001, VCUR-202, VCUR-509, and VCUR-601 accessions presented the major compounds α-pinene, germacrene D-4-ol, (E)-caryophyllene and epiglobulol, and sabinene, respectively. These isolated compounds were tested in vitro at a concentration proportional to that found in the essential oil which caused 100% mortality of the parasite. The concentrations of 10 and 50 mg/L of the essential oil of accession VCUR-202 provided 100% mortality of trophonts and tomonts, respectively. For the accession VCUR-509, 100% mortality of trophonts and tomonts was observed at concentrations 75 and 200 mg/L of essential oil, respectively. The same mortality was observed at concentration 200 mg/L in both stages of the parasite for the other accessions. The major compounds α-pinene, sabinene, and the (E)-caryophyllene + epiglobulol mixture caused 100% mortality of trophonts and tomonts. The in vivo assay for white spot disease control was performed in a therapeutic bath of 1 h with the essential oil of accession VCUR-202 at concentrations of 0.5 and 2.0 mg/L. A significant reduction of about 30% of trophonts on infected fish was observed, independent of the oil concentration. The V. curassavica essential oil, especially the VCUR-202 accession, is a potential source of raw material for the formulation and commercialization of bioproducts to control freshwater white spot disease in fish.
Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F L; Utzinger, Jürg; Kristensen, Thomas K; Vounatsou, Penelope
2011-12-01
After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and 'grey literature'), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a global NTD database is feasible and should be expanded without delay.
Evaluation of the resistance of a geopolymer-based drug delivery system to tampering.
Cai, Bing; Engqvist, Håkan; Bredenberg, Susanne
2014-04-25
Tamper-resistance is an important property of controlled-release formulations of opioid drugs. Tamper-resistant formulations aim to increase the degree of effort required to override the controlled release of the drug molecules from extended-release formulations for the purpose of non-medical use. In this study, the resistance of a geopolymer-based formulation to tampering was evaluated by comparing it with a commercial controlled-release tablet using several methods commonly used by drug abusers. Because of its high compressive strength and resistance to heat, much more effort and time was required to extract the drug from the geopolymer-based formulation. Moreover, in the drug-release test, the geopolymer-based formulation maintained its controlled-release characteristics after milling, while the drug was released immediately from the milled commercial tablets, potentially resulting in dose dumping. Although the tampering methods used in this study does not cover all methods that abuser could access, the results obtained by the described methods showed that the geopolymer matrix increased the degree of effort required to override the controlled release of the drug, suggesting that the formulation has improved resistance to some common drug-abuse tampering methods. The geopolymer matrix has the potential to make the opioid product less accessible and attractive to non-medical users. Copyright © 2014 Elsevier B.V. All rights reserved.
Morgan, Amy J; Rapee, Ronald M; Tamir, Elli; Goharpey, Nahal; Salim, Agus; McLellan, Lauren F; Bayer, Jordana K
2015-11-05
Anxiety disorders are the most common type of mental health problem and begin early in life. Early intervention to prevent anxiety problems in young children who are at risk has the potential for long-term impact. The 'Cool Little Kids' parenting group program was previously established to prevent anxiety disorders in young children at risk because of inhibited temperament. This group program was efficacious in two randomised controlled trials and has recently been adapted into an online format. 'Cool Little Kids Online' was developed to widen and facilitate access to the group program's preventive content. A pilot evaluation of the online program demonstrated its perceived utility and acceptability among parents. This study aims to evaluate the efficacy of Cool Little Kids Online in a large randomised controlled trial. Parents of young children who are 3-6 years old and who have an inhibited temperament will be recruited (n = 385) and randomly assigned to either immediate access to Cool Little Kids Online or delayed access after a waiting period of 24 weeks. The online program contains eight modules that help parents address key issues in the development of anxiety problems in inhibited children, including children's avoidant coping styles, overprotective parenting behaviours, and parents' own fears and worries. Intervention participants will be offered clinician support when requested. The primary outcome will be change in parent-reported child anxiety symptoms. Secondary outcomes will be child internalising symptoms, child and family life interference due to anxiety, over-involved/protective parenting, plus child anxiety diagnoses assessed by using a new online diagnostic tool. Assessments will take place at baseline and 12 and 24 weeks after baseline. This trial expands upon previous research on the Cool Little Kids parenting group program and will evaluate the efficacy of online delivery. Online delivery of the program could result in an easily accessible evidence-based resource to help families with young children at temperamental risk for anxiety disorders. Australian New Zealand Clinical Trials Registry 12615000217505 (registered 5 March 2015).
A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems
Choi, Donghee; Kim, Dohoon; Park, Seog
2015-01-01
Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013
Mansoor, Awais; Ahmed, Wamiq M; Samarapungavan, Ala; Cirillo, John; Schwarte, David; Robinson, J Paul; Duerstock, Bradley S
2010-01-01
A web-based application was developed to remotely view slide specimens and control all functions of a research-level light microscopy workstation, called AccessScope. Students and scientists with upper limb mobility and visual impairments are often unable to use a light microscope by themselves and must depend on others in its operation. Users with upper limb mobility impairments and low vision were recruited to assist in the design process of the AccessScope personal computer (PC) user interface. Participants with these disabilities were evaluated in their ability to use AccessScope to perform microscopical tasks. AccessScope usage was compared with inspecting prescanned slide images by grading participants' identification and understanding of histological features and knowledge of microscope operation. With AccessScope subjects were able to independently perform common light microscopy functions through an Internet browser by employing different PC pointing devices or accessibility software according to individual abilities. Subjects answered more histology and microscope usage questions correctly after first participating in an AccessScope test session. AccessScope allowed users with upper limb or visual impairments to successfully perform light microscopy without assistance. This unprecedented capability is crucial for students and scientists with disabilities to perform laboratory coursework or microscope-based research and pursue science, technology, engineering, and mathematics fields.
Gershman, Jennifer A; Gershman, Jason A; Fass, Andrea D; Popovici, Ioana
2014-12-01
The purpose of this study is to assess Florida physicians' attitudes and knowledge toward accessing the state's prescription drug monitoring program (PDMP). Five thousand medical doctors and osteopathic physicians licensed in Florida were randomly selected for a voluntary and anonymous 15-question self-administered survey approved by the Institutional Review Board. Surveys were distributed through U.S. postal service mail. Likert-scale questions were used to assess prior knowledge (1 = none to 5 = excellent) and attitudes toward accessing the PDMP (1 = strongly disagree to 5 = strongly agree). The study yielded a response rate of 7.8%, 71.5% of whom agreed or strongly agreed that the PDMP is a useful tool. Among participants that have access and answered the PDMP usefulness question, 94.8% agree or strongly agree that it is a useful tool. There were 63 out of 64 physicians (98.4%) who conducted 25 or more searches who agreed or strongly agreed that the PDMP is a useful tool for monitoring patients' controlled substance histories. There were 72.5% of participants with access that answered the "doctor shopping" question who agreed that "doctor shopping" will decrease. Among the 64 most frequent PDMP users, 69.4% agreed or strongly agreed that they have prescribed fewer controlled substances after accessing the PDMP. The study revealed that a majority of participants believe that the PDMP is a useful tool for monitoring patients' controlled substance histories. More continuing education programs should be provided to Florida physicians to enhance their knowledge regarding PDMPs. Wiley Periodicals, Inc.
Juraimi, Abdul Shukor; Rafii, M. Y.; Abdul Hamid, Azizah
2015-01-01
13 selected purslane accessions were subjected to five salinity levels 0, 8, 16, 24, and 32 dS m−1. Salinity effect was evaluated on the basis of biomass yield reduction, physiological attributes, and stem-root anatomical changes. Aggravated salinity stress caused significant (P < 0.05) reduction in all measured parameters and the highest salinity showed more detrimental effect compared to control as well as lower salinity levels. The fresh and dry matter production was found to increase in Ac1, Ac9, and Ac13 from lower to higher salinity levels but others were badly affected. Considering salinity effect on purslane physiology, increase in chlorophyll content was seen in Ac2, Ac4, Ac6, and Ac8 at 16 dS m−1 salinity, whereas Ac4, Ac9, and Ac12 showed increased photosynthesis at the same salinity levels compared to control. Anatomically, stem cortical tissues of Ac5, Ac9, and Ac12 were unaffected at control and 8 dS m−1 salinity but root cortical tissues did not show any significant damage except a bit enlargement in Ac12 and Ac13. A dendrogram was constructed by UPGMA based on biomass yield and physiological traits where all 13 accessions were grouped into 5 clusters proving greater diversity among them. The 3-dimensional principal component analysis (PCA) has also confirmed the output of grouping from cluster analysis. Overall, salinity stressed among all 13 purslane accessions considering biomass production, physiological growth, and anatomical development Ac9 was the best salt-tolerant purslane accession and Ac13 was the most affected accession. PMID:25802833
What Is the Minimum Information Needed to Estimate Average Treatment Effects in Education RCTs?
ERIC Educational Resources Information Center
Schochet, Peter Z.
2014-01-01
Randomized controlled trials (RCTs) are considered the "gold standard" for evaluating an intervention's effectiveness. Recently, the federal government has placed increased emphasis on the use of opportunistic experiments. A key criterion for conducting opportunistic experiments, however, is that there is relatively easy access to data…
A School-Based Program for Overweight and Obese Adolescents: A Randomized Controlled Trial
ERIC Educational Resources Information Center
Pbert, Lori; Druker, Susan; Barton, Bruce; Schneider, Kristin L.; Olendzki, Barbara; Gapinski, Mary A.; Kurtz, Stephen; Osganian, Stavroula
2016-01-01
Background: Given the dramatic increase in adolescent overweight and obesity, models are needed for implementing weight management treatment through readily accessible venues. We evaluated the acceptability and efficacy of a school-based intervention consisting of school nurse-delivered counseling and an afterschool exercise program in improving…
Access control and privilege management in electronic health record: a systematic literature review.
Jayabalan, Manoj; O'Daniel, Thomas
2016-12-01
This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.
Access control based on attribute certificates for medical intranet applications.
Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M
2001-01-01
Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.
Solon, Orville; Peabody, John W; Woo, Kimberly; Quimbo, Stella A; Florentino, Jhiedon; Shimkhada, Riti
2009-09-01
Even when health insurance coverage is available, health policies may not be effective at increasing coverage among vulnerable populations. New approaches are needed to improve access to care. We experimentally introduced a novel intervention that uses Policy Navigators to increase health insurance enrollment in a poor population. We used data from the Quality Improvement Demonstration Study (QIDS), a randomized experiment taking place at the district level in the Visayas region of the Philippines. In two arms of the study, we compared the effects of introducing Policy Navigators to controls. The Policy Navigators advocated for improved access to care by providing regular system-level expertise directly to the policy-makers, municipal mayors and governors responsible for paying for and enrolling poor households into the health insurance program. Using regression models, we compared levels of enrollment in our intervention versus control sites. We also assessed the cost-effectiveness of marginal increases in enrollment. We found that Policy Navigators improved enrollment in health insurance between 39% and 102% compared to the controls. Policy navigators were cost-effective at 0.86 USD per enrollee. However, supplementary national government campaigns, which were implemented to further increase coverage, attenuated normal enrollment efforts. Policy Navigators appear to be effective in improving access to care and their success underscores the importance of local-level strategies for improving enrollment.
Solon, Orville; Peabody, John W.; Woo, Kimberly; Quimbo, Stella A.; Florentino, Jhiedon; Shimkhada, Riti
2009-01-01
Objectives Even when health insurance coverage is available, health policies may not be effective at increasing coverage among vulnerable populations. New approaches are needed to improve access to care. We experimentally introduced a novel intervention that uses Policy Navigators to increase health insurance enrollment in a poor population. Methods We used data from the Quality Improvement Demonstration Study (QIDS), a randomized experiment taking place at the district level in the Visayas region of the Philippines. In two arms of the study, we compared the effects of introducing Policy Navigators to controls. The Policy Navigators advocated for improved access to care by providing regular system-level expertise directly to the policy-makers, municipal mayors and governors responsible for paying for and enrolling poor households into the health insurance program. Using regression models, we compared levels of enrollment in our intervention versus control sites. We also assessed the cost effectiveness of marginal increases in enrollment. Results We found that Policy Navigators improved enrollment in health insurance between 39 and 102% compared to the controls. Policy navigators were cost-effective at $0.86 USD per enrollee. However, supplementary national government campaigns, which were implemented to further increase coverage, attenuated normal enrollment efforts. Conclusion Policy Navigators appear to be effective in improving access to care and their success underscores the importance of local-level strategies for improving enrollment. PMID:19349090
Mugler, Emily M; Ruf, Carolin A; Halder, Sebastian; Bensch, Michael; Kubler, Andrea
2010-12-01
An electroencephalographic (EEG) brain-computer interface (BCI) internet browser was designed and evaluated with 10 healthy volunteers and three individuals with advanced amyotrophic lateral sclerosis (ALS), all of whom were given tasks to execute on the internet using the browser. Participants with ALS achieved an average accuracy of 73% and a subsequent information transfer rate (ITR) of 8.6 bits/min and healthy participants with no prior BCI experience over 90% accuracy and an ITR of 14.4 bits/min. We define additional criteria for unrestricted internet access for evaluation of the presented and future internet browsers, and we provide a review of the existing browsers in the literature. The P300-based browser provides unrestricted access and enables free web surfing for individuals with paralysis.
Decentralizing Centralized Control: Reorienting a Fundamental Tenet for Resilient Air Operation
2008-05-22
Forward Air Controller FBIS Foreign Broadcast Information Service FCC Functional Component Commander FM Field Manual GBU - 39 Guided Bomb Unit - 39...Diameter Bomb ( GBU - 39 ) TEG Test and Evaluation Group TST Time Sensitive Target UAV Unmanned Aerial Vehicle USAF United States Air Force USAFWS United...www.afmc.af.mil/news/story.asp?id=123017916 (accessed November 11, 2007). Recent fielding of the GBU - 39 , Small Diameter Bomb (SDB), enables a
Microcomputer Software Engineering, Documentation and Evaluation
1981-03-31
local dealer or call for complete specificalons. eAUTOMATIC INC To proceed step by step, we need toUe G T A TOMA IC NC. know where we are going and a...MICROPROCESSOR normal sequence that should be DIRECT MEMORY ACCESS preserved in the documentation. For INTRODUCTION 2.2 DRIVE CONTROLS example, you...with linear, sequential logic (like a computer). It is also the verbal side and controls language. The right side specializes in images, music, pictures
An Evaluation of the Latent Tuberculosis Control Program in the United States Military at Accession
2010-10-15
and costs associated with lost productivity. Cost-of-illness estimates for the health outcomes will be obtained from the TRICARE management agency...National Collaborating Centre for Chronic Conditions. Tuberculosis: national clinical guidelines for diagnosis, management , prevention, and control...N, Ranganathan SC. A three- way comparison of tuberculin skin testing, QuantiFERON-TB gold and T-SPOT.TB in children. PLoS ONE. 2008;3(7):e2624
Rosenheck, R; Morrissey, J; Lam, J; Calloway, M; Johnsen, M; Goldman, H; Randolph, F; Blasinsky, M; Fontana, A; Calsyn, R; Teague, G
1998-11-01
This study evaluated the hypothesis that greater integration and coordination between agencies within service systems is associated with greater accessibility of services and improved client housing outcomes. As part of the Access to Community Care and Effective Services and Supports program, data were obtained on baseline client characteristics, service use, and 3-month and 12-month outcomes from 1832 clients seen at 18 sites during the first year of program operation. Data on interorganizational relationships were obtained from structured interviews with key informants from relevant organizations in each community (n = 32-82 at each site). Complete follow-up data were obtained from 1340 clients (73%). After control for baseline characteristics, service system integration was associated with superior housing outcomes at 12 months, and this relationship was mediated through greater access to housing agencies. Service system integration is related to improved access to housing services and better housing outcomes among homeless people with mental illness.
75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-24
... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held December 9, 2010...
75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-23
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held January 13, 2011...
76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-18
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held March 10, 2011, from...
76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-21
... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held February 8, 2011...
10 CFR 36.23 - Access control.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...
10 CFR 36.23 - Access control.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...
10 CFR 36.23 - Access control.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...
Reflective Database Access Control
ERIC Educational Resources Information Center
Olson, Lars E.
2009-01-01
"Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…
75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-06
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held November 2, 2010...
76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-23
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems DATES: The meeting will be held April 13, 2011, from...
75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-26
... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... or other persons, to implement risk management controls and supervisory procedures reasonably... access may not utilize any pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access...
The Influence of Social Comparison on Visual Representation of One's Face
Zell, Ethan; Balcetis, Emily
2012-01-01
Can the effects of social comparison extend beyond explicit evaluation to visual self-representation—a perceptual stimulus that is objectively verifiable, unambiguous, and frequently updated? We morphed images of participants' faces with attractive and unattractive references. With access to a mirror, participants selected the morphed image they perceived as depicting their face. Participants who engaged in upward comparison with relevant attractive targets selected a less attractive morph compared to participants exposed to control images (Study 1). After downward comparison with relevant unattractive targets compared to control images, participants selected a more attractive morph (Study 2). Biased representations were not the products of cognitive accessibility of beauty constructs; comparisons did not influence representations of strangers' faces (Study 3). We discuss implications for vision, social comparison, and body image. PMID:22662124
Access Control based on Attribute Certificates for Medical Intranet Applications
Georgiadis, Christos; Pangalos, George; Khair, Marie
2001-01-01
Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951
Sucurovic, Snezana; Milutinovic, Veljko
2008-01-01
The Internet based distributed large scale information systems implements attribute based access control (ABAC) rather than Role Based Access Control (RBAC). The reason is that the Internet is identity less and that ABAC scales better. EXtensible Access Control Markup Language is standardized language for writing access control policies, access control requests and access control responses in ABAC. XACML can provide decentralized administration and credentials distribution. In year 2002 version of CEN ENV 13 606 attributes have been attached to EHCR components and in such a system ABAC and XACML have been easy to implement. This paper presents writing XACML policies in the case when attributes are in hierarchical structure. It is presented two possible solutions to write XACML policy in that case and that the solution when set functions are used is more compact and provides 10% better performances.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-30
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the seventeenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-24
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-04
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the nineteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-12
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty first meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-30
... Committee 224, Airport Security Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the thirteenth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...
77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-15
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twelfth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...
Okwaro, Ferdinand M; Chandler, Clare I R; Hutchinson, Eleanor; Nabirye, Christine; Taaka, Lilian; Kayendeke, Miriam; Nayiga, Susan; Staedke, Sarah G
2015-04-01
Health systems in many African countries are failing to provide populations with access to good quality health care. Morbidity and mortality from curable diseases such as malaria remain high. The PRIME trial in Tororo, rural Uganda, designed and tested an intervention to improve care at health centres, with the aim of reducing ill-health due to malaria in surrounding communities. This paper presents the impact and context of this trial from the perspective of community members in the study area. Fieldwork was carried out for a year from the start of the intervention in June 2011, and involved informal observation and discussions as well as 13 focus group discussions with community members, 10 in-depth interviews with local stakeholders, and 162 context descriptions recorded through quarterly interviews with community members, health workers and district officials. Community members observed a small improvement in quality of care at most, but not all, intervention health centres. However, this was diluted by other shortfalls in health services beyond the scope of the intervention. Patients continued to seek care at health centres they considered inadequate as well as positioning themselves and their children to access care through other sources such as research and nongovernmental organization (NGO) projects. These findings point to challenges of designing and delivering interventions within a paradigm that requires factorial (reduced to predictable factors) problem definition with easily actionable and evaluable solutions by small-scale projects. Such requirements mean that interventions often work on the periphery of a health system rather than tackling the murky political and economic realities that shape access to care but are harder to change or evaluate with randomized controlled trials. Highly projectified settings further reduce the ability to genuinely 'control' for different health care access scenarios. We argue for a raised consciousness of how evaluation paradigms impact on intervention choices. Copyright © 2015 Elsevier Ltd. All rights reserved.
Security middleware infrastructure for DICOM images in health information systems.
Kallepalli, Vijay N V; Ehikioya, Sylvanus A; Camorlinga, Sergio; Rueda, Jose A
2003-12-01
In health care, it is mandatory to maintain the privacy and confidentiality of medical data. To achieve this, a fine-grained access control and an access log for accessing medical images are two important aspects that need to be considered in health care systems. Fine-grained access control provides access to medical data only to authorized persons based on priority, location, and content. A log captures each attempt to access medical data. This article describes an overall middleware infrastructure required for secure access to Digital Imaging and Communication in Medicine (DICOM) images, with an emphasis on access control and log maintenance. We introduce a hybrid access control model that combines the properties of two existing models. A trust relationship between hospitals is used to make the hybrid access control model scalable across hospitals. We also discuss events that have to be logged and where the log has to be maintained. A prototype of security middleware infrastructure is implemented.
Raut, Chetan Purushottam; Sethi, Kunal Sunder; Kohale, Bhagyashree; Mamajiwala, Alefiya; Warang, Ayushya
2018-01-01
Postsurgical root sensitivity has always been an enigma to the periodontists. There is a plethora of evidence suggesting the presence of root sensitivity following periodontal flap surgical procedures. Thus, the aim of the present study was to compare and evaluate the effect of low-power diode lasers with and without topical application of stannous fluoride (SnF 2 ) gel in the treatment of root sensitivity and also evaluate whether laser creates any placebo effect in the control group or not. Thirty patients participated in this study and 99 teeth were included. Root sensitivity was assessed for all groups with a Verbal Rating Scale (VRS). For each patient, the teeth were randomized into three groups. In the test Group I, sensitive teeth were treated with SnF 2 and diode laser. In the test Group II, sensitive teeth were irradiated with laser only. In the control group, no treatment was performed. The mean ± standard deviation (SD) score for VRS and Visual Analog Scale at baseline was not statistically significant ( P > 0.05) between the three groups. After 15 min, statistical significant difference was seen in test Group I and test Group II, although no difference was found in the control group. At 15 th day and 30 th day, the mean ± SD scores were statistically significant ( P < 0.05). Within the limitations of the study, it can be concluded that diode lasers alone and in combination with 0.4% SnF 2 was effective in the treatment of root sensitivity after access flap surgery.
Kumar, Sundeep; Archak, Sunil; Tyagi, R K; Kumar, Jagdish; Vk, Vikas; Jacob, Sherry R; Srinivasan, Kalyani; Radhamani, J; Parimalan, R; Sivaswamy, M; Tyagi, Sandhya; Yadav, Mamata; Kumari, Jyotisna; Deepali; Sharma, Sandeep; Bhagat, Indoo; Meeta, Madhu; Bains, N S; Chowdhury, A K; Saha, B C; Bhattacharya, P M; Kumari, Jyoti; Singh, M C; Gangwar, O P; Prasad, P; Bharadwaj, S C; Gogoi, Robin; Sharma, J B; Gm, Sandeep Kumar; Saharan, M S; Bag, Manas; Roy, Anirban; Prasad, T V; Sharma, R K; Dutta, M; Sharma, Indu; Bansal, K C
2016-01-01
A comprehensive germplasm evaluation study of wheat accessions conserved in the Indian National Genebank was conducted to identify sources of rust and spot blotch resistance. Genebank accessions comprising three species of wheat-Triticum aestivum, T. durum and T. dicoccum were screened sequentially at multiple disease hotspots, during the 2011-14 crop seasons, carrying only resistant accessions to the next step of evaluation. Wheat accessions which were found to be resistant in the field were then assayed for seedling resistance and profiled using molecular markers. In the primary evaluation, 19,460 accessions were screened at Wellington (Tamil Nadu), a hotspot for wheat rusts. We identified 4925 accessions to be resistant and these were further evaluated at Gurdaspur (Punjab), a hotspot for stripe rust and at Cooch Behar (West Bengal), a hotspot for spot blotch. The second round evaluation identified 498 accessions potentially resistant to multiple rusts and 868 accessions potentially resistant to spot blotch. Evaluation of rust resistant accessions for seedling resistance against seven virulent pathotypes of three rusts under artificial epiphytotic conditions identified 137 accessions potentially resistant to multiple rusts. Molecular analysis to identify different combinations of genetic loci imparting resistance to leaf rust, stem rust, stripe rust and spot blotch using linked molecular markers, identified 45 wheat accessions containing known resistance genes against all three rusts as well as a QTL for spot blotch resistance. The resistant germplasm accessions, particularly against stripe rust, identified in this study can be excellent potential candidates to be employed for breeding resistance into the background of high yielding wheat cultivars through conventional or molecular breeding approaches, and are expected to contribute toward food security at national and global levels.
Jacob, Sherry R.; Srinivasan, Kalyani; Radhamani, J.; Parimalan, R.; Sivaswamy, M.; Tyagi, Sandhya; Yadav, Mamata; Kumari, Jyotisna; Deepali; Sharma, Sandeep; Bhagat, Indoo; Meeta, Madhu; Bains, N. S.; Chowdhury, A. K.; Saha, B. C.; Bhattacharya, P. M.; Kumari, Jyoti; Singh, M. C.; Gangwar, O. P.; Prasad, P.; Bharadwaj, S. C.; Gogoi, Robin; Sharma, J. B.; GM, Sandeep Kumar; Saharan, M. S.; Bag, Manas; Roy, Anirban; Prasad, T. V.; Sharma, R. K.; Dutta, M.; Sharma, Indu; Bansal, K. C.
2016-01-01
A comprehensive germplasm evaluation study of wheat accessions conserved in the Indian National Genebank was conducted to identify sources of rust and spot blotch resistance. Genebank accessions comprising three species of wheat–Triticum aestivum, T. durum and T. dicoccum were screened sequentially at multiple disease hotspots, during the 2011–14 crop seasons, carrying only resistant accessions to the next step of evaluation. Wheat accessions which were found to be resistant in the field were then assayed for seedling resistance and profiled using molecular markers. In the primary evaluation, 19,460 accessions were screened at Wellington (Tamil Nadu), a hotspot for wheat rusts. We identified 4925 accessions to be resistant and these were further evaluated at Gurdaspur (Punjab), a hotspot for stripe rust and at Cooch Behar (West Bengal), a hotspot for spot blotch. The second round evaluation identified 498 accessions potentially resistant to multiple rusts and 868 accessions potentially resistant to spot blotch. Evaluation of rust resistant accessions for seedling resistance against seven virulent pathotypes of three rusts under artificial epiphytotic conditions identified 137 accessions potentially resistant to multiple rusts. Molecular analysis to identify different combinations of genetic loci imparting resistance to leaf rust, stem rust, stripe rust and spot blotch using linked molecular markers, identified 45 wheat accessions containing known resistance genes against all three rusts as well as a QTL for spot blotch resistance. The resistant germplasm accessions, particularly against stripe rust, identified in this study can be excellent potential candidates to be employed for breeding resistance into the background of high yielding wheat cultivars through conventional or molecular breeding approaches, and are expected to contribute toward food security at national and global levels. PMID:27942031
Krause, K M; Dhuyvetter, D V; Oetzel, G R
2009-01-01
The objective of this study was to evaluate the effect of a low-moisture buffer block on ruminal pH and milk production in cows induced with subacute ruminal acidosis (SARA). Sixteen ruminally cannulated cows were randomly assigned to treatment (access to buffer blocks) or control (no buffer blocks). Ruminal pH was recorded each minute; dry matter intake (DMI), milk yield, and milk composition were measured daily. The experiment lasted 12 d and consisted of a 3-d pre-SARA period (without access to buffer blocks; d 1 to 3), after which 8 cows were given access to buffer blocks and 8 cows continued without access to buffer blocks. The next 4 d (d 4 to 7) were for evaluating the response to buffer blocks. On d 8, cows were restricted to 50% of previous DMI, and on d 9 SARA was induced (addition of 4 kg of wheat/barley pellet to pre-SARA total mixed ration (TMR). Cows were then monitored for a 3-d recovery period (d 10 to 12). The SARA challenge was successful in decreasing mean ruminal pH and time and area below pH 5.6. Intake of buffer blocks averaged 0.33 kg of DM/cow per day and was greatest on d 4 and d 8. Total DMI (TMR plus buffer block) and yields of milk and milk components were not affected by treatment. Although there was no overall effect of treatment on any of the ruminal pH variables measured, there were significant treatment by period interactions for several ruminal pH variables. Cows on the control treatment tended to experience a greater decrease in mean ruminal pH when induced with SARA than cows with access to buffer blocks (-0.55 vs. -0.20 pH units). Cows on the control treatment also experienced a greater increase in time (9.7 vs. 4.1 h/d) and area (249 vs. 83 min x pH units/d) below pH 5.6 compared with cows with access to buffer blocks. Ruminal volatile fatty acids, lactate, ethanol, and succinate concentrations during the SARA challenge did not differ between treatments. Eating behavior was not affected by treatment. Size of the first meal of the day was greater on the SARA challenge day than during the pre-SARA period (11.0 vs. 5.7 kg, as fed). Giving cows access to a buffer-containing molasses block may reduce the duration and the severity of a 1-d SARA challenge.
Both Handwriting Speed and Selective Attention Are Important to Lecture Note-Taking
ERIC Educational Resources Information Center
Peverly, Stephen T.; Garner, Joanna K.; Vekaria, Pooja C.
2014-01-01
The primary purpose of this investigation was to evaluate the relationship of handwriting speed, fine motor fluency, speed of verbal access, language comprehension, working memory, and attention (executive control; selective) to note-taking and all of the aforementioned variables to test performance (written recall). A second purpose was to…
Evaluation of Student Learning in Remotely Controlled Instrumental Analyses
ERIC Educational Resources Information Center
Meintzer, Chris; Sutherland, Frances; Kennepohl, Dietmar K.
2017-01-01
The Canadian Remote Sciences Laboratories (CRSL) website (www.remotelab.ca) was successfully employed in a study of the differences in the performance and perceptions of students' about their learning in the laboratory (in-person) versus learning at a remote location (remote access). The experiment was completed both in-person and via remote…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-20
... manufacture, process or distribute industrial chemicals. Since other entities may also be interested, the..., 6, and 8 of the Toxic Substances Control Act (TSCA). Some of the information may be claimed or... evaluating the exposure of new chemical substances, including microorganisms and nanomaterials. They will...
NERISK: AN EXPERT SYSTEM TO ENHANCE THE INTEGRATION OF PESTICIDES WITH ARTHROPOD BIOLOGICAL CONTROL
An expert system termed NERISK was developed to evaluate the effects of pesticides on arthropod predators and parasitoids in a variety of agroecosystems. ased on a shell system (RECOG) with minor coding modifications, the system was designed to let even a novice user access the v...
Wang, Jin; Cao, Xianshuang; Jiang, Hao; Qi, Yadong; Chin, Kit L; Yue, Yongde
2014-12-17
Hibiscus sabdariffa has gained attention for its antioxidant activity. There are many accessions of H. sabdariffa in the world. However, information on the quantification of antioxidant compounds in different accessions is rather limited. In this paper, a liquid chromatography/quadrupole-time-of-flight mass spectrometry (LC-Q-TOF-MS) method for simultaneous determination of five antioxidant compounds (neochlorogenic acid, chlorogenic acid, cryptochlorogenic acid, rutin, and isoquercitrin) in H. sabdariffa leaves was developed. The method was validated for linearity, sensitivity, precision, repeatability and accuracy. The validated method has been successfully applied for determination of the five analytes in eight accessions of H. sabdariffa. The eight accessions of H. sabdariffa were evaluated for their antioxidant activities by DPPH free radical scavenging assay. The investigated accessions of H. sabdariffa were rich in rutin and exhibited strong antioxidant activity. The two accessions showing the highest antioxidant activities were from Cuba (No. 2) and Taiwan (No. 5). The results indicated that H. sabdariffa leaves could be considered as a potential antioxidant source for the food industry. The developed LC-Q-TOF-MS method is helpful for quality control of H. sabdariffa.
Enhancement of Speed Margins for 16× Digital Versatile Disc-Random Access Memory
NASA Astrophysics Data System (ADS)
Watanabe, Koichi; Minemura, Hiroyuki; Miyamoto, Makoto; Iimura, Makoto
2006-02-01
We have evaluated the speed margins of write/read 16× digital versatile disc-random access memory (DVD-RAM) test discs using write strategies for 6--16× constant angular velocity (CAV) control. Our approach is to determine the writing parameters for the middle zones by interpolating the zone numbers. Using this interpolation strategy, we successfully obtained overwrite jitter values of less than 8% and bit error rates of less than 10-5 in 6--16× DVD-RAM. Moreover, we confirmed that the speed margins were ± 20% for a 6--16× CAV.
Garcia-Zapirain, Begoña; de la Torre Díez, Isabel; Sainz de Abajo, Beatriz; López-Coronado, Miguel
2016-09-01
The main objective of this research was to develop and evaluate a Web-based mobile application (app) known as "Diario Diabetes" on both a technical and user level, by means of which individuals with diabetes may monitor their illness easily at any time and in any place using any device that has Internet access. The technologies used to develop the app were HTML, CSS, JavaScript, PHP, and MySQL, all of which are an open source. Once the app was developed, it was evaluated on a technical level (by measuring loading times) and on a user level, through a survey. Different loading times for the application were measured, with it being noted that under no circumstances does this exceed 2 s. Usability was evaluated by 150 users who initially used the application. A majority (71%) of users used a PC to access the app, 83% considered the app's design to be attractive, 67% considered the tasks to be very useful, and 67% found it very easy to use. Although applications exist for controlling diabetes both at mobile virtual shops or on a research level, our app may help to improve the administration of these types of patients and they are the ones who will ultimately opt for one or the other. According to the results obtained, we can state that all users would recommend the app's use to other users.
Evaluation of Various Navigation System Concepts
1982-03-01
Naigatimon aar01 N DAutomatic x xx Parallel 0fn x x x x x’ "OLeg t dung. n Mrankuhld M ni raia x N x to~g TAN is I OmuI,2 2mN 0 x "to - - -x...and must permit design of indicators and controls which can be directly interpreted or operated by the pilot at his normal station aboard the...the responsibility of control. The organization that controls the system can theoretically limit access to the system. Because VOVO/DME, Loran-C, and
ERIC Educational Resources Information Center
Hulsey, Lara; Gordon, Anne; Leftin, Joshua; Beyler, Nicholas; Schirm, Allen; Smither-Wulsin, Claire; Crumbley, Will
2015-01-01
This report presents findings from the Access Evaluation, a study component that is designed to assess the potential impacts of direct certification-Medicaid (DC-M) on students' access to free school meals by conducting retrospective simulations of DC-M in school year 2011-2012, the year before the demonstration began. For the Access Evaluation,…
Why build limited access highways?.
DOT National Transportation Integrated Search
1991-01-01
This report first explains what a limited access highway is, then describes the benefits and advantages of limited access highways. As compared with highways with no control of access, limited access highways (especially those with full control) have...
Towards an Approach of Semantic Access Control for Cloud Computing
NASA Astrophysics Data System (ADS)
Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai
With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.
2013-03-01
1989. Evaluation of the cotton fabric model for screening topical mosquito repellents . J Am Mosq Control Assoc 5:73–76. WHO [World Health Organization...institutions, research libraries, and research funders in the common goal of maximizing access to critical research. High-Throughput Mosquito and Fly Bioassay...A. Allan , Todd W. Walker , Christopher J. Geden , Jerome A. Hogsette , and Kenneth J. Linthicum Source: Journal of the American Mosquito Control
Versatile simulation testbed for rotorcraft speech I/O system design
NASA Technical Reports Server (NTRS)
Simpson, Carol A.
1986-01-01
A versatile simulation testbed for the design of a rotorcraft speech I/O system is described in detail. The testbed will be used to evaluate alternative implementations of synthesized speech displays and speech recognition controls for the next generation of Army helicopters including the LHX. The message delivery logic is discussed as well as the message structure, the speech recognizer command structure and features, feedback from the recognizer, and random access to controls via speech command.
Chambers, Georgina M; Randall, Sean; Hoang, Van Phuong; Sullivan, Elizabeth A; Highet, Nicole; Croft, Maxine; Mihalopoulos, Cathrine; Morgan, Vera A; Reilly, Nicole; Austin, Marie-Paule
2016-03-01
To evaluate the impact of the National Perinatal Depression Initiative on access to Medicare services for women at risk of perinatal mental illness. Retrospective cohort study using difference-in-difference analytical methods to quantify the impact of the National Perinatal Depression Initiative policies on Medicare Benefits Schedule mental health usage by Australian women giving birth between 2006 and 2010. A random sample of women of reproductive age enrolled in Medicare who had not given birth where used as controls. The main outcome measures were the proportions of women giving birth each month who accessed a Medicare Benefits Schedule mental health items during the perinatal period (pregnancy through to the end of the first postnatal year) before and after the introduction of the National Perinatal Depression Initiative. The proportion of women giving birth who accessed at least one mental health item during the perinatal period increased from 88 to 141 per 1000 between 2007 and 2010. The difference-in-difference analysis showed that while there was an overall increase in Medicare Benefits Schedule mental health item access as a result of the National Perinatal Depression Initiative, this did not reach statistical significance. However, the National Perinatal Depression Initiative was found to significantly increase access in subpopulations of women, particularly those aged under 25 and over 34 years living in major cities. In the 2 years following its introduction, the National Perinatal Depression Initiative was found to have increased access to Medicare funded mental health services in particular groups of women. However, an overall increase across all groups did not reach statistical significance. Further studies are needed to assess the impact of the National Perinatal Depression Initiative on women during childbearing years, including access to tertiary care, the cost-effectiveness of the initiative, and mental health outcomes. It is recommended that new mental health policy initiatives incorporate a planned strategic approach to evaluation, which includes sufficient follow-up to assess the impact of public health strategies. © The Royal Australian and New Zealand College of Psychiatrists 2015.
Bright, Tess; Felix, Lambert; Kuper, Hannah; Polack, Sarah
2018-05-01
The populations of many low- and middle-income countries (LMIC) are young. Despite progress made towards achieving Universal Health Coverage and remarkable health gains, evidence suggests that many children in LMIC are still not accessing needed healthcare services. Delayed or lack of access to health services can lead to a worsening of health and can in turn negatively impact a child's ability to attend school, and future employment opportunities. We conducted a systematic review to assess the effectiveness of interventions aimed at increasing access to health services for children over 5 years in LMIC settings. Four electronic databases were searched in March 2017. Studies were included if they evaluated interventions that aimed to increase: healthcare utilisation, immunisation uptake and compliance with medication/referral. Randomised controlled trials and non-randomised study designs were included in the review. Data extraction included study characteristics, intervention type and measures of access to health services for children above 5 years of age. Study outcomes were classified as positive, negative, mixed or null in terms of their impact on access outcomes. Ten studies met the criteria for inclusion in the review. Interventions were evaluated in Nicaragua (1), Brazil (1), Turkey (1), India (1), China (1), Uganda (1), Ghana (1), Nigeria (1), South Africa (1) and Swaziland (1). Intervention types included education (2), incentives (1), outreach (1), SMS/phone call reminders (2) and multicomponent interventions (4). All evaluations reported positive findings on measured health access outcomes; however, the quality and strength of evidence were mixed. This review provides evidence of the range of interventions that were used to increase healthcare access for children above 5 years old in LMIC. Nevertheless, further research is needed to examine each of the identified intervention types and the influence of contextual factors, with robust study designs. There is also a need to assess the cost-effectiveness of the interventions to inform decision-makers on which are suitable for scale-up in their particular contexts. © 2018 John Wiley & Sons Ltd.
Dynamic access control model for privacy preserving personalized healthcare in cloud environment.
Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon
2015-01-01
When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.
Grünzig, Sasha-Denise; Baumeister, Harald; Bengel, Jürgen; Ebert, David; Krämer, Lena
2018-05-22
Due to limited resources, waiting periods for psychotherapy are often long and burdening for those in need of treatment and the health care system. In order to bridge the gap between initial contact and the beginning of psychotherapy, web-based interventions can be applied. The implementation of a web-based depression intervention during waiting periods has the potential to reduce depressive symptoms and enhance well-being in depressive individuals waiting for psychotherapy. In a two-arm randomized controlled trial, effectiveness and acceptance of a guided web-based intervention for depressive individuals on a waitlist for psychotherapy are evaluated. Participants are recruited in several German outpatient clinics. All those contacting the outpatient clinics with the wish to enter psychotherapy receive study information and a depression screening. Those adults (age ≥ 18) with depressive symptoms above cut-off (CES-D scale > 22) and internet access are randomized to either intervention condition (treatment as usual and immediate access to the web-based intervention) or waiting control condition (treatment as usual and delayed access to the web-based intervention). At three points of assessment (baseline, post-treatment, 3-months-follow-up) depressive symptoms and secondary outcomes, such as quality of life, attitudes towards psychotherapy and web-based interventions and adverse events are assessed. Additionally, participants' acceptance of the web-based intervention is evaluated, using measures of intervention adherence and satisfaction. This study investigates a relevant setting for the implementation of web-based interventions, potentially improving the provision of psychological health care. The results of this study contribute to the evaluation of innovative and resource-preserving health care models for outpatient psychological treatment. This trial has been registered on 13 February 2017 in the German clinical trials register (DRKS); registration number DRKS00010282 .
Accuracy assessment of minimum control points for UAV photography and georeferencing
NASA Astrophysics Data System (ADS)
Skarlatos, D.; Procopiou, E.; Stavrou, G.; Gregoriou, M.
2013-08-01
In recent years, Autonomous Unmanned Aerial Vehicles (AUAV) became popular among researchers across disciplines because they combine many advantages. One major application is monitoring and mapping. Their ability to fly beyond eye sight autonomously, collecting data over large areas whenever, wherever, makes them excellent platform for monitoring hazardous areas or disasters. In both cases rapid mapping is needed while human access isn't always a given. Indeed, current automatic processing of aerial photos using photogrammetry and computer vision algorithms allows for rapid orthophomap production and Digital Surface Model (DSM) generation, as tools for monitoring and damage assessment. In such cases, control point measurement using GPS is either impossible, or time consuming or costly. This work investigates accuracies that can be attained using few or none control points over areas of one square kilometer, in two test sites; a typical block and a corridor survey. On board GPS data logged during AUAV's flight are being used for direct georeferencing, while ground check points are being used for evaluation. In addition various control point layouts are being tested using bundle adjustment for accuracy evaluation. Results indicate that it is possible to use on board single frequency GPS for direct georeferencing in cases of disaster management or areas without easy access, or even over featureless areas. Due to large numbers of tie points in the bundle adjustment, horizontal accuracy can be fulfilled with a rather small number of control points, but vertical accuracy may not.
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems
Mell, Peter; Shook, James; Harang, Richard; Gavrila, Serban
2017-01-01
An important way to limit malicious insiders from distributing sensitive information is to as tightly as possible limit their access to information. This has always been the goal of access control mechanisms, but individual approaches have been shown to be inadequate. Ensemble approaches of multiple methods instantiated simultaneously have been shown to more tightly restrict access, but approaches to do so have had limited scalability (resulting in exponential calculations in some cases). In this work, we take the Next Generation Access Control (NGAC) approach standardized by the American National Standards Institute (ANSI) and demonstrate its scalability. The existing publicly available reference implementations all use cubic algorithms and thus NGAC was widely viewed as not scalable. The primary NGAC reference implementation took, for example, several minutes to simply display the set of files accessible to a user on a moderately sized system. In our approach, we take these cubic algorithms and make them linear. We do this by reformulating the set theoretic approach of the NGAC standard into a graph theoretic approach and then apply standard graph algorithms. We thus can answer important access control decision questions (e.g., which files are available to a user and which users can access a file) using linear time graph algorithms. We also provide a default linear time mechanism to visualize and review user access rights for an ensemble of access control mechanisms. Our visualization appears to be a simple file directory hierarchy but in reality is an automatically generated structure abstracted from the underlying access control graph that works with any set of simultaneously instantiated access control policies. It also provide an implicit mechanism for symbolic linking that provides a powerful access capability. Our work thus provides the first efficient implementation of NGAC while enabling user privilege review through a novel visualization approach. This may help transition from concept to reality the idea of using ensembles of simultaneously instantiated access control methodologies, thereby limiting insider threat. PMID:28758045
Auditing the Accessibility of Massive Open Online Courses (MOOCs).
Iniesto, Francisco; McAndrew, Patrick; Minocha, Shailey; Coughlan, Tim
2017-01-01
The outcome from the research being reported in this paper is the design of an accessibility audit to evaluate Massive Open Online Courses (MOOCs) for accessibility and to arrive at solutions and adaptations that can meet user needs. This accessibility audit includes expert-based heuristic evaluations and user-based evaluations of the MOOC platforms and individual courses.
Enabling Flexible and Continuous Capability Invocation in Mobile Prosumer Environments
Alcarria, Ramon; Robles, Tomas; Morales, Augusto; López-de-Ipiña, Diego; Aguilera, Unai
2012-01-01
Mobile prosumer environments require the communication with heterogeneous devices during the execution of mobile services. These environments integrate sensors, actuators and smart devices, whose availability continuously changes. The aim of this paper is to design a reference architecture for implementing a model for continuous service execution and access to capabilities, i.e., the functionalities provided by these devices. The defined architecture follows a set of software engineering patterns and includes some communication paradigms to cope with the heterogeneity of sensors, actuators, controllers and other devices in the environment. In addition, we stress the importance of the flexibility in capability invocation by allowing the communication middleware to select the access technology and change the communication paradigm when dealing with smart devices, and by describing and evaluating two algorithms for resource access management. PMID:23012526
[Innovative medicines and market access agreements].
Toumi, M; Zard, J; Duvillard, R; Jommi, C
2013-09-01
Market Access Agreements (MAA) for drugs have emerged in response to the need to control health expenditures, as well as to the uncertainty about the true benefit of a drug. It is possible to group MAA in two types of agreements: financial agreements and outcome-based agreements. MAA is a growing trend and is shifting towards conditional access. However, the willingness to use these contracts and their implementation differ across countries, and some are still resistant to put them in place. The MAA challenges to overcome encompass the complexity of the schemes, the administrative burden and the difficulty of evaluating MAA. It is likely that these agreements might experience further evolution in the future to become a faster pathway for therapeutic innovations, at a fair price. Copyright © 2013 Elsevier Masson SAS. All rights reserved.
Evaluation of a multimedia online tool for teaching bronchial hygiene to physical therapy students.
Silva, Cibele C B Marques da; Toledo, Sonia L P; Silveira, Paulo S P; Carvalho, Celso R F
2012-01-01
Advances in information technology have been widely used in teaching health care professionals. The use of multimedia resources may be important for clinical learning and we are not aware of previous reports using such technology in respiratory physical therapy education. Our approach was to evaluate a conventional bronchial hygiene techniques (BHTs) course with an interactive online environment, including multimedia resources. Previous developed audiovisual support material comprised: physiology, physiopathology and BHTs, accessible to students through the Internet in conjunction with BHTs classes. Two groups of students were compared and both attended regular classes: the on-line group (n=8) received access to online resources, while the control group (n=8) received conventional written material. Student's performance was evaluated before and after the course. A preliminary test (score 0 to 10) was applied before the beginning of the course, showing that the initial knowledge of both groups was comparable [online, 6.75 (SD=0.88) vs. control, 6.125 (SD=1.35); p>0.05]. Two weeks after the end of the course, a second test showed that the online group performed significantly better than the control group [respectively, 7.75 (SD=1.28) vs. 5.93 (SD=0.72); p>0.05]. The use of a multimedia online resource had a positive impact on student's learning in respiratory therapy field in which instrumental and manual resources are often used and can be explored using this technology.
Chittleborough, Catherine R.; Nicholson, Alexandra L.; Basker, Elaine; Bell, Sarah; Campbell, Rona
2013-01-01
This paper explores factors that may influence hand washing behaviour among pupils and staff in primary schools. A qualitative process evaluation within a cluster randomised controlled trial included pupil focus groups (n=16, ages 6 to 11, semi-structured interviews (n=16 teachers) and observations of hand washing facilities (n=57). Pupils and staff in intervention and control schools demonstrated a similar level of understanding of how, when and why they should wash their hands. Lack of time, poor adult modelling of regular hand washing and unattractive facilities were seen as important barriers to regular hand washing. Reminders and explanations for the importance of hand hygiene were thought to have a positive impact. Influencing individual choices about hand washing through education and information may be necessary, but not sufficient, for initiating and maintaining good hand washing practices. Structural factors, including having time to wash hands using accessible, clean facilities, and being encouraged through the existence of hand washing opportunities in the daily routine and hand washing being viewed as the social norm, will also influence hand washing behaviour. The effectiveness of educational interventions at improving hand hygiene in primary schools may be improved by changing priorities of staff and increasing accessibility to quality facilities. PMID:22623617
Chittleborough, Catherine R; Nicholson, Alexandra L; Basker, Elaine; Bell, Sarah; Campbell, Rona
2012-12-01
This article explores factors that may influence hand washing behaviour among pupils and staff in primary schools. A qualitative process evaluation within a cluster randomized controlled trial included pupil focus groups (n = 16, aged 6-11 years), semi-structured interviews (n = 16 teachers) and observations of hand washing facilities (n = 57). Pupils and staff in intervention and control schools demonstrated a similar level of understanding of how, when and why they should wash their hands. Lack of time, poor adult modelling of regular hand washing and unattractive facilities were seen as important barriers to regular hand washing. Reminders and explanations for the importance of hand hygiene were thought to have a positive impact. Influencing individual choices about hand washing through education and information may be necessary, but not sufficient, for initiating and maintaining good hand washing practices. Structural factors, including having time to wash hands using accessible, clean facilities, and being encouraged through the existence of hand washing opportunities in the daily routine and hand washing being viewed as the social norm, will also influence hand washing behaviour. The effectiveness of educational interventions at improving hand hygiene in primary schools may be improved by changing priorities of staff and increasing accessibility to quality facilities.
Investing in youth tobacco control: a review of smoking prevention and control strategies.
Lantz, P M; Jacobson, P D; Warner, K E; Wasserman, J; Pollack, H A; Berson, J; Ahlstrom, A
2000-03-01
To provide a comprehensive review of interventions and policies aimed at reducing youth cigarette smoking in the United States, including strategies that have undergone evaluation and emerging innovations that have not yet been assessed for efficacy. Medline literature searches, books, reports, electronic list servers, and interviews with tobacco control advocates. Interventions and policy approaches that have been assessed or evaluated were categorised using a typology with seven categories (school based, community interventions, mass media/public education, advertising restrictions, youth access restrictions, tobacco excise taxes, and direct restrictions on smoking). Novel and largely untested interventions were described using nine categories. Youth smoking prevention and control efforts have had mixed results. However, this review suggests a number of prevention strategies that are promising, especially if conducted in a coordinated way to take advantage of potential synergies across interventions. Several types of strategies warrant additional attention and evaluation, including aggressive media campaigns, teen smoking cessation programmes, social environment changes, community interventions, and increasing cigarette prices. A significant proportion of the resources obtained from the recent settlement between 46 US states and the tobacco industry should be devoted to expanding, improving and evaluating "youth centred" tobacco prevention and control activities.
Bjerkvig, Christopher Kalhagen; Fosse, Theodor Kaurin; Apelseth, Torunn Oveland; Sivertsen, Joar; Braathen, Hanne; Eliassen, Håkon Skogrand; Guttormsen, Anne Berit; Cap, Andrew P; Strandenes, Geir
2018-06-01
Intraosseous (IO) vascular access is increasingly used as an emergency tool for achieving access to the systemic circulation in critically ill patients. The role of IO transfusion of blood in damage control resuscitation is however questionable due to possible inadequate flow rate and hemolysis. Some experts claim that IO transfusion is contraindicated. In this study, we have challenged this statement by looking at flow rates of autologous fresh whole blood reinfusion and hemolysis using two of the commonly used Food and Drug Administration-approved and Conformité Européenne (CE)-marked sternal needles. Additionally, the success rate of sternal access between the two devices is evaluated. Volunteer professional military personnel, were enrolled prospectively in a nonrandomized observational study design. We collected 450 mL of autologous whole blood from each participant. Participants were divided into the following three groups of 10: Tactically Advanced Lifesaving IO Needle (T.A.L.O.N.) IO, FAST1 IO, and intravenous group. The reinfusion was done by gravity only. Blood sampling was performed before blood collection and 30 minutes after reinfusion. Investigation of hemolysis was performed by measurements of haptoglobin and lactate dehydrogenase. Success rate was evaluated by correct aspiration of bone marrow. Median reinfusion rate was 46.2 mL/min in the FAST1 group, 32.4 mL/min in the T.A.L.O.N. group, and 74.1 mL/min in the intravenous group. Blood samples from all participants were within normal ranges. There was no statistically significant difference in haptoglobin and lactate dehydrogenase between the groups. In the FAST1 group, 1 (9%) of 11 procedures failed. In the T.A.L.O.N. group, 4 (29%) of 14 procedures failed. Although preferable, achieving peripheral venous access in the bleeding patient is a major problem. Our findings suggest that fresh whole-blood transfusion through the IO route is safe, reliable, and provide sufficient flow for resuscitation. Therapeutic/Care management study, level III.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-01
... Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and Products Containing Same... synchronous dynamic random access memory controllers and products containing same by reason of infringement of... semiconductor chips having synchronous dynamic random access memory controllers and products containing same...
Can biosimilars help achieve the goals of US health care reform?
Boccia, Ralph; Jacobs, Ira; Popovian, Robert; de Lima Lopes, Gilberto
2017-01-01
The US Patient Protection and Affordable Care Act (ACA) aims to expand health care coverage, contain costs, and improve health care quality. Accessibility and affordability of innovative biopharmaceuticals are important to the success of the ACA. As it is substantially more difficult to manufacture them compared with small-molecule drugs, many of which have generic alternatives, biologics may increase drug costs. However, biologics offer demonstrated improvements in patient care that can reduce expensive interventions, thus lowering net health care costs. Biosimilars, which are highly similar to their reference biologics, cost less than the originators, potentially increasing access through reduced prescription drug costs while providing equivalent therapeutic results. This review evaluates 1) the progress made toward enacting health care reform since the passage of the ACA and 2) the role of biosimilars, including the potential impact of expanded biosimilar use on access, health care costs, patient management, and outcomes. Barriers to biosimilar adoption in the USA are noted, including low awareness and financial disincentives relating to reimbursement. The evaluated evidence suggests that the ACA has partly achieved some of its aims; however, the opportunity remains to transform health care to fully achieve reform. Although the future is uncertain, increased use of biosimilars in the US health care system could help achieve expanded access, control costs, and improve the quality of care.
Brain-controlled applications using dynamic P300 speller matrices.
Halder, Sebastian; Pinegger, Andreas; Käthner, Ivo; Wriessnegger, Selina C; Faller, Josef; Pires Antunes, João B; Müller-Putz, Gernot R; Kübler, Andrea
2015-01-01
Access to the world wide web and multimedia content is an important aspect of life. We present a web browser and a multimedia user interface adapted for control with a brain-computer interface (BCI) which can be used by severely motor impaired persons. The web browser dynamically determines the most efficient P300 BCI matrix size to select the links on the current website. This enables control of the web browser with fewer commands and smaller matrices. The multimedia player was based on an existing software. Both applications were evaluated with a sample of ten healthy participants and three end-users. All participants used a visual P300 BCI with face-stimuli for control. The healthy participants completed the multimedia player task with 90% accuracy and the web browsing task with 85% accuracy. The end-users completed the tasks with 62% and 58% accuracy. All healthy participants and two out of three end-users reported that they felt to be in control of the system. In this study we presented a multimedia application and an efficient web browser implemented for control with a BCI. Both applications provide access to important areas of modern information retrieval and entertainment. Copyright © 2014 Elsevier B.V. All rights reserved.
A federated capability-based access control mechanism for internet of things (IoTs)
NASA Astrophysics Data System (ADS)
Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe
2018-05-01
The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.
Greenberg, J; Simon, L; Pyszczynski, T; Solomon, S; Chatel, D
1992-08-01
Terror management research has shown that reminding Ss of their mortality leads to intolerance. The present research assessed whether mortality salience would lead to increased intolerance when the value of tolerance is highly accessible. In Study 1, given that liberals value tolerance more than conservatives, it was hypothesized that with mortality salience, dislike of dissimilar others would increase among conservatives but decrease among liberals. Liberal and conservative Ss were induced to think about their own mortality or a neutral topic and then were asked to evaluate 2 target persons, 1 liberal, the other conservative. Ss' evaluations of the targets supported these hypotheses. In Study 2, the value of tolerance was primed for half the Ss and, under mortality-salient or control conditions, Ss evaluated a target person who criticized the United States. Mortality salience did not lead to negative reactions to the critic when the value of tolerance was highly accessible.
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
Bray, Lucy; Sanders, Caroline; McKenna, Jacqueline
2013-12-01
To investigate health professionals' evaluation of a computer-based resource designed to improve discussions about sexual and relationship health with young people. Evidence suggests that some health professionals can experience discomfort discussing sexual health and relationship issues with young people. Professionals within hospital settings should have the knowledge, competencies and skills to be able to ask young people sexual health questions and provide accurate sexual health education. Despite some educational material being available for community and adult services, there are no resources available, which are directly relevant to holding opportunistic discussions with young people within an acute children's hospital. A descriptive survey design. One hundred and fourteen health professionals from a children's hospital in the UK were involved in evaluating a computer-based resource. All completed an online questionnaire survey comprising of closed and open questions. The health professionals reported that the computer-based resource had a positive influence on their knowledge and clinical practice. The videos as well as the concise nature of the resource were evaluated highly. Learning was facilitated by professionals being able to control their learning through rerunning and accessing the resource on numerous occasions. An engaging, accessible computer-based resource has the capability to positively impact on health professionals' knowledge of, and skills in, starting and holding sexual health conversations with young people accessing a children's hospital. Health professionals working with children and young people value accessible, relevant and short computer-based training. This can facilitate knowledge and skill acquisition despite variation in working patterns. Improving the knowledge and skills of professionals working with young people to facilitate appropriate yet opportunistic sexual health discussions is important within the public health agenda. © 2013 John Wiley & Sons Ltd.
Supplier Assessment System (SAS)
NASA Technical Reports Server (NTRS)
Dietrich, Kristen
2016-01-01
Background: Sponsored by NASA Headquarters; Charter - provide information to assist the quality assurance community in evaluating and determining supplier risk; Comprehensive on-line repository of supplier information; Available to approved civil service personnel from all NASA Centers, other U.S. Government Agencies, Prime Contractors, and NASA direct support contractors; User access to specific data types or documents is controlled as needed.
USDA-ARS?s Scientific Manuscript database
The indica rice accession, PI 312777 (a.k.a. WC 4644), is highly productive and can suppress barnyardgrass (Echinochloa crus-galli) in reduced-input systems, but the genetic control of this weed suppression is unknown. A set of 330 recombinant inbred lines (RILs) was developed using single seed desc...
ERIC Educational Resources Information Center
Smith-Khan, Laura
2017-01-01
Theories of language policy increasingly emphasise focusing on the specific contexts in which language management occurs. In government settings, policy seeks to shape how individuals interact with officials. Australian asylum procedure is an area where policy aims at tight control. I examine how communication is managed in this setting, in which…
ERIC Educational Resources Information Center
Kirby, Paul J.; And Others
The design, development, test, and evaluation of an electronic hardware device interfacing a commercially available slide projector with a plasma panel computer terminal is reported. The interface device allows an instructional computer program to select slides for viewing based upon the lesson student situation parameters of the instructional…
Formative Evaluation of Bugscope: A Sustainable World Wide Laboratory for K-12.
ERIC Educational Resources Information Center
Thakkar, U.; Carragher, B.; Carroll, L.; Conway, C.; Grosser, B.; Kisseberth, N.; Potter, C. S.; Robinson, S.; Sinn-Hanlon, J.; Stone, D.; Weber, D.
Bugscope is an emerging educational technology project that allows students and teachers across grades K-12 to study insects and other arthropods through remote access and control of an environmental scanning electron microscope from their classroom computers. Teachers and students in 33 schools from 18 states and the U.S. Virgin Islands were…
Code of Federal Regulations, 2011 CFR
2011-10-01
... under the influence of, or impaired by, alcohol or a controlled substance, and for traffic violations... social security account number, if a State collects such data. Access to NDR Data Essentially only... information to that being mandated by FRA. Furnishing additional information, such as the person's Social...
Health Self-Advocacy Training for Persons with Intellectual Disabilities
ERIC Educational Resources Information Center
Feldman, M. A.; Owen, F.; Andrews, A.; Hamelin, J.; Barber, R.; Griffiths, D.
2012-01-01
Background: People with intellectual disabilities (ID) have unequal access to health care. While systemic efforts are addressing health inequalities, there remains a need to demonstrate that persons with ID can increase their health self-advocacy skills. Method: A randomised control design with up to 6-month follow-up was used to evaluate the 3Rs…
Wiki and Digital Video Use in Strategic Interaction-Based Experiential EFL Learning
ERIC Educational Resources Information Center
Dehaan, Jonathan; Johnson, Neil H.; Yoshimura, Noriko; Kondo, Takako
2012-01-01
This paper details the use of a free and access-controlled wiki as the learning management system for a four-week teaching module designed to improve the oral communication skills of Japanese university EFL students. Students engaged in repeated experiential learning cycles of planning, doing, observing, and evaluating their performance of a role…
Relational Memory Is Evident in Eye Movement Behavior despite the Use of Subliminal Testing Methods.
Nickel, Allison E; Henke, Katharina; Hannula, Deborah E
2015-01-01
While it is generally agreed that perception can occur without awareness, there continues to be debate about the type of representational content that is accessible when awareness is minimized or eliminated. Most investigations that have addressed this issue evaluate access to well-learned representations. Far fewer studies have evaluated whether or not associations encountered just once prior to testing might also be accessed and influence behavior. Here, eye movements were used to examine whether or not memory for studied relationships is evident following the presentation of subliminal cues. Participants assigned to experimental or control groups studied scene-face pairs and test trials evaluated implicit and explicit memory for these pairs. Each test trial began with a subliminal scene cue, followed by three visible studied faces. For experimental group participants, one face was the studied associate of the scene (implicit test); for controls none were a match. Subsequently, the display containing a match was presented to both groups, but now it was preceded by a visible scene cue (explicit test). Eye movements were recorded and recognition memory responses were made. Participants in the experimental group looked disproportionately at matching faces on implicit test trials and participants from both groups looked disproportionately at matching faces on explicit test trials, even when that face had not been successfully identified as the associate. Critically, implicit memory-based viewing effects seemed not to depend on residual awareness of subliminal scene cues, as subjective and objective measures indicated that scenes were successfully masked from view. The reported outcomes indicate that memory for studied relationships can be expressed in eye movement behavior without awareness.
Relational Memory Is Evident in Eye Movement Behavior despite the Use of Subliminal Testing Methods
Nickel, Allison E.; Henke, Katharina; Hannula, Deborah E.
2015-01-01
While it is generally agreed that perception can occur without awareness, there continues to be debate about the type of representational content that is accessible when awareness is minimized or eliminated. Most investigations that have addressed this issue evaluate access to well-learned representations. Far fewer studies have evaluated whether or not associations encountered just once prior to testing might also be accessed and influence behavior. Here, eye movements were used to examine whether or not memory for studied relationships is evident following the presentation of subliminal cues. Participants assigned to experimental or control groups studied scene-face pairs and test trials evaluated implicit and explicit memory for these pairs. Each test trial began with a subliminal scene cue, followed by three visible studied faces. For experimental group participants, one face was the studied associate of the scene (implicit test); for controls none were a match. Subsequently, the display containing a match was presented to both groups, but now it was preceded by a visible scene cue (explicit test). Eye movements were recorded and recognition memory responses were made. Participants in the experimental group looked disproportionately at matching faces on implicit test trials and participants from both groups looked disproportionately at matching faces on explicit test trials, even when that face had not been successfully identified as the associate. Critically, implicit memory-based viewing effects seemed not to depend on residual awareness of subliminal scene cues, as subjective and objective measures indicated that scenes were successfully masked from view. The reported outcomes indicate that memory for studied relationships can be expressed in eye movement behavior without awareness. PMID:26512726
Malinowsky, Camilla; Nygård, Louise; Kottorp, Anders
2014-01-01
E-health services are increasingly offered to provide clients with information and a link to healthcare services. The aim of this study is to investigate the perceived access to and the potential to use technologies important for e-health services among older adults with mild cognitive impairment (MCI) or mild Alzheimer's disease (AD) and controls. The perceived access to and perception of difficulty in the use of everyday technology (such as cell phones, coffee machines, computers) was investigated in a sample of older adults (n = 118) comprising three subsamples: adults with MCI (n = 37), with mild AD (n = 37), and controls (n = 44) using the Everyday Technology Use Questionnaire (ETUQ). The use of seven technologies important for e-health services was specifically examined for each subsample and compared between the subsamples. The findings demonstrated that the older adults in all subsamples perceive access to e-health technologies and potentially would use them competently in several e-health services. However, among persons with AD a lower proportion of perceived access to the technology was described, as well as for persons with MCI. To make the benefits of e-health services available and used by all clients, it is important to consider access to the technology required in e-health services and also to support the clients' capabilities to understand and use the technologies. Also, the potential use of the ETUQ to explore the perceived access to and competence in using e-health technologies is a vital issue in the use of e-health services.
Abbott, Rebecca A; Smith, Anne J; Howie, Erin K; Pollock, Clare; Straker, Leon
2014-08-01
Active-input videogames could provide a useful conduit for increasing physical activity by improving a child's self-confidence, physical activity enjoyment, and reducing anxiety. Therefore this study evaluated the impact of (a) the removal of home access to traditional electronic games or (b) their replacement with active-input videogames, on child self-perception, enjoyment of physical activity, and electronic game use anxiety. This was a crossover, randomized controlled trial, conducted over a 6-month period in participants' family homes in metropolitan Perth, Australia, from 2007 to 2010. Children 10-12 years old were recruited through school and community media. Of 210 children who were eligible, 74 met inclusion criteria, and 8 withdrew, leaving 66 children (33 girls) for analysis. A counterbalanced randomized order of three conditions sustained for 8 weeks each: No home access to electronic games, home access to traditional electronic games, and home access to active-input electronic games. Perception of self-esteem (Harter's Self Perception Profile for Children), enjoyment of physical activity (Physical Activity Enjoyment Scale questionnaire), and anxiety toward electronic game use (modified Loyd and Gressard Computer Anxiety Subscale) were assessed. Compared with home access to traditional electronic games, neither removal of all electronic games nor replacement with active-input games resulted in any significant change to child self-esteem, enjoyment of physical activity, or anxiety related to electronic games. Although active-input videogames have been shown to be enjoyable in the short term, their ability to impact on psychological outcomes is yet to be established.
Logical Access Control Mechanisms in Computer Systems.
ERIC Educational Resources Information Center
Hsiao, David K.
The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…
Brenner, Stephan; Muula, Adamson S; Robyn, Paul Jacob; Bärnighausen, Till; Sarker, Malabika; Mathanga, Don P; Bossert, Thomas; De Allegri, Manuela
2014-04-22
In this article we present a study design to evaluate the causal impact of providing supply-side performance-based financing incentives in combination with a demand-side cash transfer component on equitable access to and quality of maternal and neonatal healthcare services. This intervention is introduced to selected emergency obstetric care facilities and catchment area populations in four districts in Malawi. We here describe and discuss our study protocol with regard to the research aims, the local implementation context, and our rationale for selecting a mixed methods explanatory design with a quasi-experimental quantitative component. The quantitative research component consists of a controlled pre- and post-test design with multiple post-test measurements. This allows us to quantitatively measure 'equitable access to healthcare services' at the community level and 'healthcare quality' at the health facility level. Guided by a theoretical framework of causal relationships, we determined a number of input, process, and output indicators to evaluate both intended and unintended effects of the intervention. Overall causal impact estimates will result from a difference-in-difference analysis comparing selected indicators across intervention and control facilities/catchment populations over time.To further explain heterogeneity of quantitatively observed effects and to understand the experiential dimensions of financial incentives on clients and providers, we designed a qualitative component in line with the overall explanatory mixed methods approach. This component consists of in-depth interviews and focus group discussions with providers, service user, non-users, and policy stakeholders. In this explanatory design comprehensive understanding of expected and unexpected effects of the intervention on both access and quality will emerge through careful triangulation at two levels: across multiple quantitative elements and across quantitative and qualitative elements. Combining a traditional quasi-experimental controlled pre- and post-test design with an explanatory mixed methods model permits an additional assessment of organizational and behavioral changes affecting complex processes. Through this impact evaluation approach, our design will not only create robust evidence measures for the outcome of interest, but also generate insights on how and why the investigated interventions produce certain intended and unintended effects and allows for a more in-depth evaluation approach.
Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F.; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F. L.; Utzinger, Jürg; Kristensen, Thomas K.; Vounatsou, Penelope
2011-01-01
Background After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. Methodology With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and ‘grey literature’), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. Principal Findings At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. Conclusions An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a global NTD database is feasible and should be expanded without delay. PMID:22180793
Abdelwahab, Hisham; Shigidi, Mazin; El-Tohami, Alyaa; Ibrahim, Lamees
2013-05-01
Hemodialysis (HD) is a complex procedure with many specifications and requires adherence to a set of particular clinical practice guidelines. These guidelines had already been established by globally acclaimed renal authorities and their implementation was shown to correlate with patients' morbidity and mortality. This study was conducted to evaluate the adherence of healthcare professionals to the evidence-based clinical practice patterns in Khartoum State HD units. A cross-sectional study was conducted in Khartoum State HD units during the period from September 2010 to January of 2011. Data was collected from the healthcare professionals using a specially designed checklist. The checklist included the evidence-based clinical practice guidelines for the HD vascular access, HD adequacy, anemia of chronic kidney disease (CKD), nutrition, cardiovascular risk assessment, and hepatitis B and C virus infection control. Implementation of these guidelines was evaluated, and further graded using a Likert-type scale. Four randomly selected HD units were included in the study. The rate of implementation of the HD vascular access guidelines was 54.8%, adequacy guidelines 57%, anemia of CKD 68.8%, nutrition 58.4%, cardiovascular risk assessment 57%, and hepatitis B and C infection control guidelines was 79.2%. Overall, the four HD units assessed showed moderate deviations from the practice guidelines of anemia of CKD and hepatitis B and C infection control. Extreme deviations from the clinical practice guidelines were seen in HD vascular access practices, adequacy assessments, nutrition and cardiovascular risk assessment. Hemodialysis services in Khartoum State are in need of great improvements regarding adherence to protocols and the standards of care.
NASA Technical Reports Server (NTRS)
Schwab, Andrew J. (Inventor); Aylor, James (Inventor); Hitchcock, Charles Young (Inventor); Wulf, William A. (Inventor); McKee, Sally A. (Inventor); Moyer, Stephen A. (Inventor); Klenke, Robert (Inventor)
2000-01-01
A data processing system is disclosed which comprises a data processor and memory control device for controlling the access of information from the memory. The memory control device includes temporary storage and decision ability for determining what order to execute the memory accesses. The compiler detects the requirements of the data processor and selects the data to stream to the memory control device which determines a memory access order. The order in which to access said information is selected based on the location of information stored in the memory. The information is repeatedly accessed from memory and stored in the temporary storage until all streamed information is accessed. The information is stored until required by the data processor. The selection of the order in which to access information maximizes bandwidth and decreases the retrieval time.
Emani, Srinivas; Healey, Michael; Ting, David Y; Lipsitz, Stuart R; Ramelson, Harley; Suric, Vladimir; Bates, David W
2016-04-13
Patient portals are being used to provide a clinical summary of the office visit or the after-visit summary (AVS) to patients. There has been relatively little research on the characteristics of patients who access the AVS through a patient portal and their beliefs about the AVS. The aim was to (1) assess the characteristics of patients who are aware of and access the AVS through a patient portal and (2) apply the Theory of Planned Behavior (TPB) to predict behavioral intention of patients toward accessing the AVS provided through a patient portal. We developed a survey capturing the components of TPB (beliefs, attitude, perceived norm, and perceived behavioral control). Over a 6-month period, patients with a patient portal account with an office visit in the previous week were identified using our organization's scheduling system. These patients were sent an email about the study and a link to the survey via their portal account. We applied univariate statistical analysis (Pearson chi-square and 1-way ANOVA) to assess differences among groups (aware/unaware of AVS and accessed/did not access AVS). We reported means and standard deviations to depict belief strengths and presented correlations between beliefs and attitude, perceived norm, and perceived behavioral control. We used hierarchical regression analysis to predict behavioral intention toward accessing the AVS through the patient portal. Of the 23,336 patients who were sent the survey, 5370 responded for a response rate of 23.01%. Overall, 76.52% (4109/5370) were aware that the AVS was available through the patient portal and 54.71% of those (2248/4109) accessed the AVS within 5 days of the office visit. Patients who accessed the AVS had a greater number of sessions with the portal (mean 119, SD 221.5) than those who did not access the AVS (mean 79.1, SD 123.3, P<.001); the difference was not significant for awareness of the AVS. The strongest behavioral beliefs with accessing the AVS were being able to track visits and tests (mean 2.53, SD 1.00) followed by having medical information more readily accessible (mean 2.48, SD 1.07). In all, 56.7% of the variance in intention to access the AVS through the portal was accounted for by attitude, perceived norm, and perceived behavioral control. Most users of a patient portal were aware that the AVS was accessible through the portal. Patients had stronger beliefs about accessing the AVS with the goal of timely and efficient access of information than with engaging in their health care. Interventions to improve patient access of the AVS can focus on providers promoting patient beliefs about the value of the AVS for tracking tests and visits, and timely and efficient access of information.
Healey, Michael; Ting, David Y; Lipsitz, Stuart R; Ramelson, Harley; Suric, Vladimir; Bates, David W
2016-01-01
Background Patient portals are being used to provide a clinical summary of the office visit or the after-visit summary (AVS) to patients. There has been relatively little research on the characteristics of patients who access the AVS through a patient portal and their beliefs about the AVS. Objective The aim was to (1) assess the characteristics of patients who are aware of and access the AVS through a patient portal and (2) apply the Theory of Planned Behavior (TPB) to predict behavioral intention of patients toward accessing the AVS provided through a patient portal. Methods We developed a survey capturing the components of TPB (beliefs, attitude, perceived norm, and perceived behavioral control). Over a 6-month period, patients with a patient portal account with an office visit in the previous week were identified using our organization’s scheduling system. These patients were sent an email about the study and a link to the survey via their portal account. We applied univariate statistical analysis (Pearson chi-square and 1-way ANOVA) to assess differences among groups (aware/unaware of AVS and accessed/did not access AVS). We reported means and standard deviations to depict belief strengths and presented correlations between beliefs and attitude, perceived norm, and perceived behavioral control. We used hierarchical regression analysis to predict behavioral intention toward accessing the AVS through the patient portal. Results Of the 23,336 patients who were sent the survey, 5370 responded for a response rate of 23.01%. Overall, 76.52% (4109/5370) were aware that the AVS was available through the patient portal and 54.71% of those (2248/4109) accessed the AVS within 5 days of the office visit. Patients who accessed the AVS had a greater number of sessions with the portal (mean 119, SD 221.5) than those who did not access the AVS (mean 79.1, SD 123.3, P<.001); the difference was not significant for awareness of the AVS. The strongest behavioral beliefs with accessing the AVS were being able to track visits and tests (mean 2.53, SD 1.00) followed by having medical information more readily accessible (mean 2.48, SD 1.07). In all, 56.7% of the variance in intention to access the AVS through the portal was accounted for by attitude, perceived norm, and perceived behavioral control. Conclusions Most users of a patient portal were aware that the AVS was accessible through the portal. Patients had stronger beliefs about accessing the AVS with the goal of timely and efficient access of information than with engaging in their health care. Interventions to improve patient access of the AVS can focus on providers promoting patient beliefs about the value of the AVS for tracking tests and visits, and timely and efficient access of information. PMID:27076485
A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.
Gope, Prosanta; Amin, Ruhul
2016-11-01
Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.
Sword, David O; Thomas, K Jackson; Wise, Holly H; Brown, Deborah D
2017-01-01
Sophisticated high-fidelity human simulation (HFHS) manikins allow for practice of both evaluation and treatment techniques in a controlled environment in which real patients are not put at risk. However, due to high demand, access to HFHS by students has been very competitive and limited. In the present study, a basic CPR manikin with a speaker implanted in the chest cavity and internet access to a variety of heart and breath sounds was used. Students were evaluated on their ability to locate and identify auscultation sites and heart/breath sounds. A five-point Likert scale survey was administered to gain insight into student perceptions on the use of this simulation method. Our results demonstrated that 95% of students successfully identified the heart and breath sounds. Furthermore, survey results indicated that 75% of students agreed or strongly agreed that this manner of evaluation was an effective way to assess their auscultation skills. Based on performance and perception, we conclude that a simulation method as described in this paper is a viable and cost-effective means of evaluating auscultation competency in not only student physical therapists but across other health professions as well.
The Global Opioid Policy Initiative: a wealth of information, but what is next?
Scholten, Willem
2014-03-01
Recently, the outcomes were published of the Global Opioid Policy Initiative, evaluating the availability, cost of opioid medicines and the regulatory barriers that are possibly impeding access for the management of cancer pain in developing countries. Other studies have shown that the vast majority of the world population has no access to opioid analgesics. This study shows by country which opioid medicines are available, what they cost to the patient, and investigates the presence of barriers for access to these medicines. Data from the project will be an important resource for those who advocate for improved access to opioid analgesics. Yet, like so often, many more aspects of inadequate opioid analgesic consumption require exploration and reporting, including legislative barriers. The last publication on the project is a "What's next?" that is over focusing on palliative care, forgetting that outside palliative care is also a huge need for opioid analgesics in moderate and severe pain. While promoting access to palliative care and pain management, their recognition as a human right by UN bodies would be of great help. Moreover, WHO's Access to Controlled Medicines Programme, could be an important programme to support the countries in making these improvements.
NASA Astrophysics Data System (ADS)
Natsui, Masanori; Hanyu, Takahiro
2018-04-01
In realizing a nonvolatile microcontroller unit (MCU) for sensor nodes in Internet-of-Things (IoT) applications, it is important to solve the data-transfer bottleneck between the central processing unit (CPU) and the nonvolatile memory constituting the MCU. As one circuit-oriented approach to solving this problem, we propose a memory access minimization technique for magnetoresistive-random-access-memory (MRAM)-embedded nonvolatile MCUs. In addition to multiplexing and prefetching of memory access, the proposed technique realizes efficient instruction fetch by eliminating redundant memory access while considering the code length of the instruction to be fetched and the transition of the memory address to be accessed. As a result, the performance of the MCU can be improved while relaxing the performance requirement for the embedded MRAM, and compact and low-power implementation can be performed as compared with the conventional cache-based one. Through the evaluation using a system consisting of a general purpose 32-bit CPU and embedded MRAM, it is demonstrated that the proposed technique increases the peak efficiency of the system up to 3.71 times, while a 2.29-fold area reduction is achieved compared with the cache-based one.
A Review of Economic Evaluations of Tobacco Control Programs
Kahende, Jennifer W.; Loomis, Brett R.; Adhikari, Bishwa; Marshall, LaTisha
2009-01-01
Each year, an estimated 443,000 people die of smoking-related diseases in the United States. Cigarette smoking results in more than $193 billion in medical costs and productivity losses annually. In an effort to reduce this burden, many states, the federal government, and several national organizations fund tobacco control programs and policies. For this report we reviewed existing literature on economic evaluations of tobacco control interventions. We found that smoking cessation therapies, including nicotine replacement therapy (NRT) and self-help are most commonly studied. There are far fewer studies on other important interventions, such as price and tax increases, media campaigns, smoke free air laws and workplace smoking interventions, quitlines, youth access enforcement, school-based programs, and community-based programs. Although there are obvious gaps in the literature, the existing studies show in almost every case that tobacco control programs and policies are either cost-saving or highly cost-effective. PMID:19440269
Morrison, Deborah; Wyke, Sally; Thomson, Neil C; McConnachie, Alex; Agur, Karolina; Saunderson, Kathryn; Chaudhuri, Rekha; Mair, Frances S
2014-05-24
The financial costs associated with asthma care continue to increase while care remains suboptimal. Promoting optimal self-management, including the use of asthma action plans, along with regular health professional review has been shown to be an effective strategy and is recommended in asthma guidelines internationally. Despite evidence of benefit, guided self-management remains underused, however the potential for online resources to promote self-management behaviors is gaining increasing recognition. The aim of this paper is to describe the protocol for a pilot evaluation of a website 'Living well with asthma' which has been developed with the aim of promoting self-management behaviors shown to improve outcomes. The study is a parallel randomized controlled trial, where adults with asthma are randomly assigned to either access to the website for 12 weeks, or usual asthma care for 12 weeks (followed by access to the website if desired). Individuals are included if they are over 16-years-old, have a diagnosis of asthma with an Asthma Control Questionnaire (ACQ) score of greater than, or equal to 1, and have access to the internet. Primary outcomes for this evaluation include recruitment and retention rates, changes at 12 weeks from baseline for both ACQ and Asthma Quality of Life Questionnaire (AQLQ) scores, and quantitative data describing website usage (number of times logged on, length of time logged on, number of times individual pages looked at, and for how long). Secondary outcomes include clinical outcomes (medication use, health services use, lung function) and patient reported outcomes (including adherence, patient activation measures, and health status). Piloting of complex interventions is considered best practice and will maximise the potential of any future large-scale randomized controlled trial to successfully recruit and be able to report on necessary outcomes. Here we will provide results across a range of outcomes which will provide estimates of efficacy to inform the design of a future full-scale randomized controlled trial of the 'Living well with asthma' website. This trial is registered with Current Controlled Trials ISRCTN78556552 on 18/06/13.
Distributed clinical data sharing via dynamic access-control policy transformation.
Rezaeibagha, Fatemeh; Mu, Yi
2016-05-01
Data sharing in electronic health record (EHR) systems is important for improving the quality of healthcare delivery. Data sharing, however, has raised some security and privacy concerns because healthcare data could be potentially accessible by a variety of users, which could lead to privacy exposure of patients. Without addressing this issue, large-scale adoption and sharing of EHR data are impractical. The traditional solution to the problem is via encryption. Although encryption can be applied to access control, it is not applicable for complex EHR systems that require multiple domains (e.g. public and private clouds) with various access requirements. This study was carried out to address the security and privacy issues of EHR data sharing with our novel access-control mechanism, which captures the scenario of the hybrid clouds and need of access-control policy transformation, to provide secure and privacy-preserving data sharing among different healthcare enterprises. We introduce an access-control mechanism with some cryptographic building blocks and present a novel approach for secure EHR data sharing and access-control policy transformation in EHR systems for hybrid clouds. We propose a useful data sharing system for healthcare providers to handle various EHR users who have various access privileges in different cloud environments. A systematic study has been conducted on data sharing in EHR systems to provide a solution to the security and privacy issues. In conclusion, we introduce an access-control method for privacy protection of EHRs and EHR policy transformation that allows an EHR access-control policy to be transformed from a private cloud to a public cloud. This method has never been studied previously in the literature. Furthermore, we provide a protocol to demonstrate policy transformation as an application scenario. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-26
... Control Systems (Update to DO-230B): Agenda October 20, 2011 Welcome/Introductions/Administrative Remarks... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...
76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-16
... Control Systems (Update to DO-230B): Agenda September 15, 2011 Welcome/Introductions/Administrative... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...
Access Control in Location-Based Services
NASA Astrophysics Data System (ADS)
Ardagna, Claudio A.; Cremonini, Marco; de Capitani di Vimercati, Sabrina; Samarati, Pierangela
Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of users. Such applications introduces new aspects of access control which should be addressed. On the one side, precise location information may play an important role and can be used to develop Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with conditions based on the physical position of users. On the other side, location information of users can be considered sensitive and access control solutions should be developed to protect it against unauthorized accesses and disclosures. In this chapter, we address these two aspects related to the use and protection of location information, discussing existing solutions, open issues, and some research directions.
NASA Astrophysics Data System (ADS)
Weagant, Scott; Karanassios, Vassili
2015-06-01
The use of portable hand held computing devices for the acquisition of spectrochemical data is briefly discussed using examples from the author's laboratory. Several network topologies are evaluated. At present, one topology that involves a portable computing device for data acquisition and spectrometer control and that has wireless access to the internet at one end and communicates with a smart phone at the other end appears to be better suited for "taking part of the lab to the sample" types of applications. Thus, spectrometric data can be accessed from anywhere in the world.
Evaluation of Web Accessibility of Consumer Health Information Websites
Zeng, Xiaoming; Parmanto, Bambang
2003-01-01
The objectives of the study are to construct a comprehensive framework for web accessibility evaluation, to evaluate the current status of web accessibility of consumer health information websites and to investigate the relationship between web accessibility and property of the websites. We selected 108 consumer health information websites from the directory service of a Web search engine. We used Web accessibility specifications to construct a framework for the measurement of Web Accessibility Barriers (WAB) of website. We found that none of the websites is completely accessible to people with disabilities, but governmental and educational health information websites exhibit better performance on web accessibility than other categories of websites. We also found that the correlation between the WAB score and the popularity of a website is statistically significant. PMID:14728272
Evaluation of web accessibility of consumer health information websites.
Zeng, Xiaoming; Parmanto, Bambang
2003-01-01
The objectives of the study are to construct a comprehensive framework for web accessibility evaluation, to evaluate the current status of web accessibility of consumer health information websites and to investigate the relationship between web accessibility and property of the websites. We selected 108 consumer health information websites from the directory service of a Web search engine. We used Web accessibility specifications to construct a framework for the measurement of Web Accessibility Barriers (WAB) of website. We found that none of the websites is completely accessible to people with disabilities, but governmental and educational health information websites exhibit better performance on web accessibility than other categories of websites. We also found that the correlation between the WAB score and the popularity of a website is statistically significant.
2012-01-01
Background Low fruit and vegetable ( FV) consumption is a key risk factor for morbidity and mortality. Consumption of FV is limited by a lack of access to FV. Enhanced understanding of interventions and their impact on both access to and consumption of FV can provide guidance to public health decision-makers. The purpose of this scoping review is to identify and map literature that has evaluated effects of community-based interventions designed to increase FV access or consumption among five to 18-year olds. Methods The search included 21 electronic bibliographic databases, grey literature, targeted organization websites, and 15 key journals for relevant studies published up to May 2011. Retrieved citations were screened in duplicate for relevance. Data extracted from included studies covered: year, country, study design, target audience, intervention setting, intervention strategies, interventionists, and reported outcomes. Results The search located 19,607 unique citations. Full text relevance screening was conducted on 1,908 studies. The final 289 unique studies included 30 knowledge syntheses, 27 randomized controlled trials, 55 quasi-experimental studies, 113 cluster controlled studies, 60 before-after studies, one mixed method study, and three controlled time series studies. Of these studies, 46 included access outcomes and 278 included consumption outcomes. In terms of target population, 110 studies focused on five to seven year olds, 175 targeted eight to 10 year olds, 192 targeted 11 to 14 year olds, 73 targeted 15 to 18 year olds, 55 targeted parents, and 30 targeted teachers, other service providers, or the general public. The most common intervention locations included schools, communities or community centres, and homes. Most studies implemented multi-faceted intervention strategies to increase FV access or consumption. Conclusions While consumption measures were commonly reported, this review identified a small yet important subset of literature examining access to FV. This is a critically important issue since consumption is contingent upon access. Future research should examine the impact of interventions on direct outcome measures of FV access and a focused systematic review that examines these interventions is also needed. In addition, research on interventions in low- and middle-income countries is warranted based on a limited existing knowledge base. PMID:22931474
A dynamic access control method based on QoS requirement
NASA Astrophysics Data System (ADS)
Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang
2013-03-01
A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.
Task Delegation Based Access Control Models for Workflow Systems
NASA Astrophysics Data System (ADS)
Gaaloul, Khaled; Charoy, François
e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.
NASA Astrophysics Data System (ADS)
Jay, Caroline; Lunn, Darren; Michailidou, Eleni
As new technologies emerge, and Web sites become increasingly sophisticated, ensuring they remain accessible to disabled and small-screen users is a major challenge. While guidelines and automated evaluation tools are useful for informing some aspects of Web site design, numerous studies have demonstrated that they provide no guarantee that the site is genuinely accessible. The only reliable way to evaluate the accessibility of a site is to study the intended users interacting with it. This chapter outlines the processes that can be used throughout the design life cycle to ensure Web accessibility, describing their strengths and weaknesses, and discussing the practical and ethical considerations that they entail. The chapter also considers an important emerging trend in user evaluations: combining data from studies of “standard” Web use with data describing existing accessibility issues, to drive accessibility solutions forward.
76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-01
... Control Systems (Update to DO-230B): Agenda July 15, 2011 Welcome/Introductions/Administrative Remarks... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to...
Access Control of Web- and Java-Based Applications
NASA Technical Reports Server (NTRS)
Tso, Kam S.; Pajevski, Michael J.
2013-01-01
Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers
Cater, J P; Huffman, S D
1995-01-01
This paper presents a unique virtual reality training and assessment tool developed under a NASA grant, "Research in Human Factors Aspects of Enhanced Virtual Environments for Extravehicular Activity (EVA) Training and Simulation." The Remote Access Virtual Environment Network (RAVEN) was created to train and evaluate the verbal, mental and physical coordination required between the intravehicular (IVA) astronaut operating the Remote Manipulator System (RMS) arm and the EVA astronaut standing in foot restraints on the end of the RMS. The RAVEN system currently allows the EVA astronaut to approach the Hubble Space Telescope (HST) under control of the IVA astronaut and grasp, remove, and replace the Wide Field Planetary Camera drawer from its location in the HST. Two viewpoints, one stereoscopic and one monoscopic, were created all linked by Ethernet, that provided the two trainees with the appropriate training environments.
[Public control and equity of access to hospitals under non-State public administration].
Carneiro Junior, Nivaldo; Elias, Paulo Eduardo
2006-10-01
To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.
Common Badging and Access Control System (CBACS)
NASA Technical Reports Server (NTRS)
Dischinger, Portia
2005-01-01
This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.
Medicaid Managed Care Structures and Care Coordination.
Gilchrist-Scott, Douglas H; Feinstein, James A; Agrawal, Rishi
2017-09-01
Child enrollment in Medicaid managed care (MMC) has expanded dramatically, primarily through state mandates. Care coordination is a key metric in MMC evaluation because it drives much of the proposed cost savings and may be associated with improved health outcomes and utilization. We evaluated the relationships between enrollment in 2 MMC structures, primary care case management (PCCM) and health maintenance organization (HMO) and access to and receipt of care coordination by children. Using data from the 2011/2012 National Survey of Children's Health and the Medicaid Statistical Information System state data mart, we conducted a retrospective, cross-sectional analysis of the relationships between fee-for-service, PCCM or HMO enrollment, and access to and receipt of care coordination. State-level univariate analyses and individual and state multilevel multivariable analyses evaluated correlations between MMC enrollment and care coordination, controlling for demographic characteristics and state financing levels. In univariate and multilevel multivariable analyses, the PCCM penetration rate was significantly associated with increased access to care coordination (adjusted odds ratio: 1.23, P = .034) and receipt of care coordination (adjusted odds ratio: 1.37, P = .02). The HMO penetration rate was significantly associated with lower access to care coordination (adjusted odds ratio: 0.85, P = .05) and receipt of care coordination (adjusted odds ratio: 0.71, P < .001). Fee-for-service served as the referent. State utilization of MMC varied widely. These data suggest that care coordination may be more effective in PCCM than HMO structures. States should consider care coordination outcomes when structuring their Medicaid programs. Copyright © 2017 by the American Academy of Pediatrics.
Stevenson, E G J; Ambelu, A; Caruso, B A; Tesfaye, Y; Freeman, M C
2016-01-01
Over 650 million people worldwide lack access to safe water supplies, and even among those who have gained access to 'improved' sources, water may be seasonally unreliable, far from homes, expensive, and provide insufficient quantity. Measurement of water access at the level of communities and households remains crude, and better measures of household water insecurity are urgently needed to inform needs assessments and monitoring and evaluation. We set out to assess the validity of a quantitative scale of household water insecurity, and to investigate (1) whether improvements to community water supply reduce water insecurity, (2) whether water interventions affect women's psychological distress, and (3) the impacts of water insecurity on psychological distress, independent of socio-economic status, food security, and harvest quality. Measures were taken before and one to six months after a community water supply improvement in three villages in rural northern Ethiopia. Villages similar in size and access to water sources and other amenities did not receive interventions, and served as controls. Household water insecurity was assessed using a 21-item scale based on prior qualitative work in Ethiopia. Women's psychological distress was assessed using the WHO Self-Reporting Questionnaire (SRQ-20). Respondents were either female heads of household or wives of the heads of household (n = 247 at baseline, n = 223 at endline); 123 households provided data at both rounds. The intervention was associated with a decline of approximately 2 points on the water insecurity scale between baseline and endline compared to the control (beta -1.99; 95% CI's -3.15, -0.84). We did not find evidence of impact of the intervention on women's psychological distress. Water insecurity was, however, predictive of psychological distress (p <0.01), independent of household food security and the quality of the previous year's harvest. These results contribute to the construct validity of our water insecurity scale, and establish our approach to measuring water insecurity as a plausible means of evaluating water interventions. Improvements to community water supplies were effective in reducing household water insecurity, but not psychological distress, in this population. Water insecurity was an important predictor of psychological distress. This study contributes to an emerging literature on quantitative assessment of household water insecurity, and draws attention to the potential impact of improved access to water on women's mental well-being.
Marques, Cristiano Corrêa de Azevedo; Carvalheiro, José da Rocha
2017-01-01
to assess the performance of the diagnostic network in the implementation process of the Program for Viral Hepatitis Prevention and Control in São Paulo State, Brazil, from 1997 to 2012. evaluation study based on documentary research and structured interviews, combined with a historical series analysis of indicators developed to assess the implementation process of the program, using data from the Department of the Brazilian National Health System. from 1997 to 2012, the serology, biopsy and molecular biology diagnostic networks showed an increase in the coefficients of coverage of 7.4, 7.3, and 62.0 times, respectively, with an increase in cases detection and treatment access. despite the effective implementation of the diagnostic network, there is a need to review the search strategy for new cases, and access to liver biopsy, still insufficient to the program demand.
ERIC Educational Resources Information Center
Halupa, Colleen M.; Caldwell, Benjamin W.
2015-01-01
This quasi-experimental research study evaluated two intact undergraduate engineering statics classes at a private university in Texas. Students in the control group received traditional lecture, readings and homework assignments. Those in the experimental group also were given access to a complete set of online video lectures and videos…
Contamination and Micropropulsion Technology
2012-07-01
23, 027101 (2011) Evaluation of active flow control applied to wind turbine blade section J. Renewable Sustainable Energy 2, 063101 (2010) Effect...field lines at high latitudes where solar wind electrons can readily access the upper atmosphere. The electron energy distribution in the auroral... slip behavior of n-hexadecane in large amplitude oscillatory shear flow via nonequilibrium molecular dynamic simulation J. Chem. Phys. 136, 104904
Evaluation of Ferroelectric Materials for Memory Applications
1990-06-01
as automobile odometers, access counters, and flight time recorders. Detailed product information is provided in Appendix A. 3. Optical Read...volatility but by definition are not reprogrammable , which severely restricts flexibility and makes error correction difficult. Magnetic core is non...battery-backed SRAMs as well. The programs for embedded controllers, such as those increasingly used in automobiles , are kept in nonvolatile memory. The
Darragh, Amy Rowntree; Stallones, Lorann; Bigelow, Phillip L; Keefe, Thomas J
2004-02-01
The construction industry typically has one of the highest fatal and non-fatal injury rates compared with other industries. Residential construction workers are at particular risk of injury (work is in remote sites with small crews, there are often many subcontractors, and they have limited access to safety programs). Difficulty accessing information specific to this group has made research more challenging, therefore, there are few studies. This study evaluated the effectiveness of the HomeSafe Pilot Program, a safety education and training program designed to reduce injuries among residential construction workers. Researchers evaluated whether overall and severe injury incidence rates declined during the intervention period. Data were analyzed using incidence rates and Poisson regression to control for the effect of antecedent secular trend. Injury incidence rates declined significantly following HomeSafe; however, this effect was not statistically significant once temporal variation was controlled. The decline in injury rates following HomeSafe cannot be attributed solely to HomeSafe, however, programmatic and methodologic limitations contributed to the inconclusive results. Further research into the hazards faced by residential construction workers is needed. Am. J. Ind. Med. 45:210-217, 2004. Copyright 2004 Wiley-Liss, Inc.
Interventions to Improve Access to Primary Care for People Who Are Homeless: A Systematic Review
2016-01-01
Background People who are homeless encounter barriers to primary care despite having greater needs for health care, on average, than people who are not homeless. We evaluated the effectiveness of interventions to improve access to primary care for people who are homeless. Methods We performed a systematic review to identify studies in English published between January 1, 1995, and July 8, 2015, comparing interventions to improve access to a primary care provider with usual care among people who are homeless. The outcome of interest was access to a primary care provider. The risk of bias in the studies was evaluated, and the quality of the evidence was assessed according to the Grading of Recommendations Assessment, Development, and Evaluation (GRADE) Working Group criteria. Results From a total of 4,047 citations, we identified five eligible studies (one randomized controlled trial and four observational studies). With the exception of the randomized trial, the risk of bias was considered high in the remaining studies. In the randomized trial, people who were homeless, without serious mental illness, and who received either an outreach intervention plus clinic orientation or clinic orientation alone, had improved access to a primary care provider compared with those receiving usual care. An observational study that compared integration of primary care and other services for people who are homeless with usual care did not observe any difference in access to a primary care provider between the two groups. A small observational study showed improvement among participants with a primary care provider after receiving an intervention consisting of housing and supportive services compared with the period before the intervention. The quality of the evidence was considered moderate for both the outreach plus clinic orientation and clinic orientation alone, and low to very low for the other interventions. Despite limitations, the literature identified reports of interventions developed to overcome barriers in access to primary care in people who are homeless. The interventions studied are complex and include multiple components that are consistent with proposed dimensions of access to care (availability, affordability, and acceptability). Conclusions Our systematic review of the literature identified various types of interventions that seek to improve access to primary care by attempting to address barriers to care encountered by people who are homeless. Moderate-quality evidence indicates that orientation to clinic services (either alone or combined with outreach) improves access to a primary care provider in adults who are homeless, without serious mental illness, and living in urban centres. PMID:27099645
Interventions to Improve Access to Primary Care for People Who Are Homeless: A Systematic Review.
2016-01-01
People who are homeless encounter barriers to primary care despite having greater needs for health care, on average, than people who are not homeless. We evaluated the effectiveness of interventions to improve access to primary care for people who are homeless. We performed a systematic review to identify studies in English published between January 1, 1995, and July 8, 2015, comparing interventions to improve access to a primary care provider with usual care among people who are homeless. The outcome of interest was access to a primary care provider. The risk of bias in the studies was evaluated, and the quality of the evidence was assessed according to the Grading of Recommendations Assessment, Development, and Evaluation (GRADE) Working Group criteria. From a total of 4,047 citations, we identified five eligible studies (one randomized controlled trial and four observational studies). With the exception of the randomized trial, the risk of bias was considered high in the remaining studies. In the randomized trial, people who were homeless, without serious mental illness, and who received either an outreach intervention plus clinic orientation or clinic orientation alone, had improved access to a primary care provider compared with those receiving usual care. An observational study that compared integration of primary care and other services for people who are homeless with usual care did not observe any difference in access to a primary care provider between the two groups. A small observational study showed improvement among participants with a primary care provider after receiving an intervention consisting of housing and supportive services compared with the period before the intervention. The quality of the evidence was considered moderate for both the outreach plus clinic orientation and clinic orientation alone, and low to very low for the other interventions. Despite limitations, the literature identified reports of interventions developed to overcome barriers in access to primary care in people who are homeless. The interventions studied are complex and include multiple components that are consistent with proposed dimensions of access to care (availability, affordability, and acceptability). Our systematic review of the literature identified various types of interventions that seek to improve access to primary care by attempting to address barriers to care encountered by people who are homeless. Moderate-quality evidence indicates that orientation to clinic services (either alone or combined with outreach) improves access to a primary care provider in adults who are homeless, without serious mental illness, and living in urban centres.
Semantically Enriched Data Access Policies in eHealth.
Drozdowicz, Michał; Ganzha, Maria; Paprzycki, Marcin
2016-11-01
Internet of Things (IoT) requires novel solutions to facilitate autonomous, though controlled, resource access. Access policies have to facilitate interactions between heterogeneous entities (devices and humans). Here, we focus our attention on access control in eHealth. We propose an approach based on enriching policies, based on well-known and widely-used eXtensible Access Control Markup Language, with semantics. In the paper we describe an implementation of a Policy Information Point integrated with the HL7 Security and Privacy Ontology.
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-17
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the eleventh meeting of RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
Jaïdi, Faouzi; Labbene-Ayachi, Faten; Bouhoula, Adel
2016-12-01
Nowadays, e-healthcare is a main advancement and upcoming technology in healthcare industry that contributes to setting up automated and efficient healthcare infrastructures. Unfortunately, several security aspects remain as main challenges towards secure and privacy-preserving e-healthcare systems. From the access control perspective, e-healthcare systems face several issues due to the necessity of defining (at the same time) rigorous and flexible access control solutions. This delicate and irregular balance between flexibility and robustness has an immediate impact on the compliance of the deployed access control policy. To address this issue, the paper defines a general framework to organize thinking about verifying, validating and monitoring the compliance of access control policies in the context of e-healthcare databases. We study the problem of the conformity of low level policies within relational databases and we particularly focus on the case of a medical-records management database defined in the context of a Medical Information System. We propose an advanced solution for deploying reliable and efficient access control policies. Our solution extends the traditional lifecycle of an access control policy and allows mainly managing the compliance of the policy. We refer to an example to illustrate the relevance of our proposal.
Gray, Kelsey; Korn, Abraham; Zane, Joshua; Gonzalez, Gabriel; Kaji, Amy; Bowens, Nina; de Virgilio, Christian
2018-05-01
Formal preoperative ultrasound (US) mapping of vascular anatomy by radiology is recommended before hemodialysis access surgery. We hypothesized that US performed by general surgery residents in place of formal US would decrease the time from initial consult to creation of dialysis access without affecting patient outcomes. This is a retrospective review of all patients who underwent dialysis access surgery from November 2014 to July 2016 and received preoperative upper extremity US vein and artery evaluation by either radiology or general surgery residents. The primary endpoints were days from initial consult to dialysis access creation, rate of arteriovenous fistula (AVF) creation, fistula maturation, and 1-year primary assisted patency. Of 242 patients, 167 (69%) had formal US, and 75 (31%) had only a resident US. The resident US group had 100% AVF creation compared with the formal US group with 92.2% AVF creation (P = 0.01). There was no difference between the groups in rate of fistula maturation (P = 0.1) and 1-year assisted patency (P = 0.9). Of the resident US 90.7% occurred in the outpatient setting. On multivariable analysis controlling for outpatient consult, the average time to the operating room was 13.7 days longer for the formal US group in the outpatient setting (P = 0.0006). Ultrasound vein and artery evaluation at the time of the initial consult by general surgery residents can decrease the time to dialysis access creation by bypassing the need for formal US with a higher rate of AVF creation and no difference in fistula maturation or 1-year primary assisted patency. Copyright © 2018 Elsevier Inc. All rights reserved.
Veggie Rx: an outcome evaluation of a healthy food incentive programme.
Cavanagh, Michelle; Jurkowski, Janine; Bozlak, Christine; Hastings, Julia; Klein, Amy
2017-10-01
One challenge to healthy nutrition, especially among low-income individuals, is access to and consumption of fresh fruits and vegetables. To address this problem, Veggie Rx, a healthy food incentive programme, was established within a community clinic to increase access to fresh produce for low-income patients diagnosed with obesity, hypertension and/or type 2 diabetes. The current research aimed to evaluate Veggie Rx programme effectiveness. A retrospective pre/post design using medical records and programme data was used to evaluate the programme. The study was approved by the University of Albany Institutional Review Board and the Patient Interest Committee of a community clinic. The study was conducted in a low-income, urban neighbourhood in upstate New York. Medical record data and Veggie Rx programme data were analysed for fifty-four eligible participants. An equal-sized control group of patients who were not programme participants were matched on age, ethnicity and co-morbidity status. A statistically significant difference in mean BMI change (P=0·02) between the intervention and the control group was calculated. The intervention group had a mean decrease in BMI of 0·74 kg/m2. Greater improvement in BMI was found among Veggie Rx programme participants. This information will guide programme changes and inform the field on the effectiveness of healthy food incentive programmes for improving health outcomes for low-income populations.
Veggie Rx: an outcome evaluation of a healthy food incentive programme
Cavanagh, Michelle; Jurkowski, Janine; Bozlak, Christine; Hastings, Julia; Klein, Amy
2017-01-01
Objective One challenge to healthy nutrition, especially among low-income individuals, is access to and consumption of fresh fruits and vegetables. To address this problem, Veggie Rx, a healthy food incentive programme, was established within a community clinic to increase access to fresh produce for low-income patients diagnosed with obesity, hypertension and/or type 2 diabetes. The current research aimed to evaluate Veggie Rx programme effectiveness. Design A retrospective pre/post design using medical records and programme data was used to evaluate the programme. The study was approved by the University of Albany Institutional Review Board and the Patient Interest Committee of a community clinic. Setting The study was conducted in a low-income, urban neighbourhood in upstate New York. Subjects Medical record data and Veggie Rx programme data were analysed for fifty-four eligible participants. An equal-sized control group of patients who were not programme participants were matched on age, ethnicity and co-morbidity status. Results: A statistically significant difference in mean BMI change (P = 0.02) between the intervention and the control group was calculated. The intervention group had a mean decrease in BMI of 0.74 kg/m2. Conclusions Greater improvement in BMI was found among Veggie Rx programme participants. This information will guide programme changes and inform the field on the effectiveness of healthy food incentive programmes for improving health outcomes for low-income populations. PMID:27539192
Handicap Accessibility: A Self-Evaluation Guidebook for ACTION and Its Grantees. Handbook 240.
ERIC Educational Resources Information Center
ACTION, Washington, DC. Office of Equal Opportunity.
This handbook is designed to assist managers of ACTION grantee programs in evaluating the degree to which the needs of persons with disabilities are incorporated into their programs for physical accessibility of buildings and facilities. After a general discussion of self-evaluation principles and accessibility guidelines, a checklist is provided…
NASA Astrophysics Data System (ADS)
Bingsheng, Xu; Ling, Lin; Jin, Huang; Geng, Wang; Jianhua, Chen; Shuo, Yang; Huiting, Guo
2017-11-01
The paper focuses on developing the operational efficiency of air pollution reducing facilities and the treatment effect of the third-party governance on environmental pollution. Comprehensive analysis method and influence factor analysis are employed to build an evaluation index system by means of discussing major pollution control factors derived from the performance of pollution control equipment operation, environmental protection, technological economy, recourse consumption and manufacturing management. Based on the pattern of environmental pollution control offered by the third-party company, the static games model is further established between the government and the pollution emission firm by considering the whole process of the pollution abatement including investment, construction and operation of the treatment project, which focuses on establishing the policy condition and consequence by discussing the cost and benefit in a short and a long time, respectively. The research results can improve the market access requests of the pollution control equipment and normalize the environmental protection service offered by the third-party company. Moreover, the establishment of the evaluation index system for pollution control equipment and the evaluation mechanism for the third-party governance on environmental pollution has guiding significance on leading environmental protection industry and promoting market-oriented development
NASA Astrophysics Data System (ADS)
Tsaur, Woei-Jiunn; Pai, Haw-Tyng
2008-11-01
The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.
Evaluating improvements in landside access for airports.
DOT National Transportation Integrated Search
1998-10-01
The purpose of this research was to describe the elements that comprise airport access and develop a methodology for identifying and evaluating existing landside access performance and proposed improvements from a passenger perspective. The scope was...
Shorey, Shefaly; Ng, Yvonne Peng Mei; Danbjørg, Dorthe Boe; Dennis, Cindy-Lee; Morelius, Evalotte
2017-01-01
The aim of this study was to describe a study protocol that evaluates the effectiveness of the 'Home-but not Alone' educational programme delivered via a mobile health application in improving parenting outcomes. The development in mobile-based technology gives us the opportunity to develop an accessible educational programme that can be potentially beneficial to new parents. However, there is a scarcity of theory-based educational programmes that have incorporated technology such as a mobile health application in the early postpartum period. A randomized controlled trial with a two-group pre-test and post-test design. The data will be collected from 118 couples. Eligible parents will be randomly allocated to either a control group (receiving routine care) or an intervention group (routine care plus access to the 'Home-but not Alone' mobile health application. Outcome measures comprise of parenting self-efficacy, social support, parenting satisfaction and postnatal depression. Data will be collected at the baseline (on the day of discharge) and at four weeks postpartum. This will be an empirical study that evaluates a theory-based educational programme delivered via an innovative mobile health application on parental outcomes. Results from this study will enhance parenting self-efficacy, social support and parenting satisfaction, which may then reduce parental risks of postnatal depression. © 2016 John Wiley & Sons Ltd.
NASA Technical Reports Server (NTRS)
Tilmes, Curt A.; Fleig, Albert J.
2008-01-01
NASA's traditional science data processing systems have focused on specific missions, and providing data access, processing and services to the funded science teams of those specific missions. Recently NASA has been modifying this stance, changing the focus from Missions to Measurements. Where a specific Mission has a discrete beginning and end, the Measurement considers long term data continuity across multiple missions. Total Column Ozone, a critical measurement of atmospheric composition, has been monitored for'decades on a series of Total Ozone Mapping Spectrometer (TOMS) instruments. Some important European missions also monitor ozone, including the Global Ozone Monitoring Experiment (GOME) and SCIAMACHY. With the U.S.IEuropean cooperative launch of the Dutch Ozone Monitoring Instrument (OMI) on NASA Aura satellite, and the GOME-2 instrumental on MetOp, the ozone monitoring record has been further extended. In conjunction with the U.S. Department of Defense (DoD) and the National Oceanic and Atmospheric Administration (NOAA), NASA is now preparing to evaluate data and algorithms for the next generation Ozone Mapping and Profiler Suite (OMPS) which will launch on the National Polar-orbiting Operational Environmental Satellite System (NPOESS) Preparatory Project (NPP) in 2010. NASA is constructing the Science Data Segment (SDS) which is comprised of several elements to evaluate the various NPP data products and algorithms. The NPP SDS Ozone Product Evaluation and Test Element (PEATE) will build on the heritage of the TOMS and OM1 mission based processing systems. The overall measurement based system that will encompass these efforts is the Atmospheric Composition Processing System (ACPS). We have extended the system to include access to publically available data sets from other instruments where feasible, including non-NASA missions as appropriate. The heritage system was largely monolithic providing a very controlled processing flow from data.ingest of satellite data to the ultimate archive of specific operational data products. The ACPS allows more open access with standard protocols including HTTP, SOAPIXML, RSS and various REST incarnations. External entities can be granted access to various modules within the system, including an extended data archive, metadata searching, production planning and processing. Data access is provided with very fine grained access control. It is possible to easily designate certain datasets as being available to the public, or restricted to groups of researchers, or limited strictly to the originator. This can be used, for example, to release one's best validated data to the public, but restrict the "new version" of data processed with a new, unproven algorithm until it is ready. Similarly, the system can provide access to algorithms, both as modifiable source code (where possible) and fully integrated executable Algorithm Plugin Packages (APPs). This enables researchers to download publically released versions of the processing algorithms and easily reproduce the processing remotely, while interacting with the ACPS. The algorithms can be modified allowing better experimentation and rapid improvement. The modified algorithms can be easily integrated back into the production system for large scale bulk processing to evaluate improvements. The system includes complete provenance tracking of algorithms, data and the entire processing environment. The origin of any data or algorithms is recorded and the entire history of the processing chains are stored such that a researcher can understand the entire data flow. Provenance is captured in a form suitable for the system to guarantee scientific reproducability of any data product it distributes even in cases where the physical data products themselves have been deleted due to space constraints. We are currently working on Semantic Web ontologies for representing the various provenance information. A new web site focusing on consolidating informaon about the measurement, processing system, and data access has been established to encourage interaction with the overall scientific community. We will describe the system, its data processing capabilities, and the methods the community can use to interact with the standard interfaces of the system.
Accessibility and usability OCW data: The UTPL OCW.
Rodríguez, Germania; Perez, Jennifer; Cueva, Samanta; Torres, Rommel
2017-08-01
This data article provides a data description on article entitled "A framework for improving web accessibility and usability of Open Course Ware sites" [3] This Data in Brief presents the data obtained from the accessibility and usability evaluation of the UTPL OCW. The data obtained from the framework evaluation consists of the manual evaluation of the standards criteria and the automatic evaluation of the tools Google PageSpeed and Google Analytics. In addition, this article presents the synthetized tables from standards that are used by the framework to evaluate the accessibility and usability of OCW, and the questionnaires required to extract the data. As a result, the article also provides the data required to reproduce the evaluation of other OCW.
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
The engineering design integration (EDIN) system. [digital computer program complex
NASA Technical Reports Server (NTRS)
Glatt, C. R.; Hirsch, G. N.; Alford, G. E.; Colquitt, W. N.; Reiners, S. J.
1974-01-01
A digital computer program complex for the evaluation of aerospace vehicle preliminary designs is described. The system consists of a Univac 1100 series computer and peripherals using the Exec 8 operating system, a set of demand access terminals of the alphanumeric and graphics types, and a library of independent computer programs. Modification of the partial run streams, data base maintenance and construction, and control of program sequencing are provided by a data manipulation program called the DLG processor. The executive control of library program execution is performed by the Univac Exec 8 operating system through a user established run stream. A combination of demand and batch operations is employed in the evaluation of preliminary designs. Applications accomplished with the EDIN system are described.
Moghaddam, Sina Siavash; Jaafar, Hawa; Ibrahim, Rusli; Rahmat, Asmah; Aziz, Maheran Abdul; Philip, Elizabeth
2011-06-17
In the present study, two accessions of Centella asiatica (CA03 and CA23) were subjected to gamma radiation to examine the response of these accessions in terms of survival rate, flavonoid contents, leaf gas exchange and leaf mass. Radiation Sensitivity Tests revealed that based on the survival rate, the LD(50) (gamma doses that killed 50% of the plantlets) of the plantlets were achieved at 60 Gy for CA03 and 40 Gy for CA23. The nodal segments were irradiated with gamma rays at does of 30 and 40 Gy for Centella asiatica accession 'CA03' and 20 and 30 Gy for accession 'CA23. The nodal segment response to the radiation was evaluated by recording the flavonoid content, leaf gas exchange and leaf biomass. The experiment was designed as RCBD with five replications. Results demonstrated that the irradiated plantlets exhibited greater total flavonoid contents (in eight weeks) significantly than the control where the control also exhibited the highest total flavonoid contents in the sixth week of growth; 2.64 ± 0.02 mg/g DW in CA03 and 8.94 ± 0.04 mg/g DW in CA23. The total flavonoid content was found to be highest after eight weeks of growth, and this, accordingly, stands as the best time for leaf harvest. Biochemical differentiation based on total flavonoid content revealed that irradiated plantlets in CA23 at 20 and 30 Gy after eight weeks contained the highest total flavonoid concentrations (16.827 ± 0.02; 16.837 ± 0.008 mg/g DW, respectively) whereas in CA03 exposed to 30 and 40 Gy was found to have the lowest total flavonid content (5.83 ± 0.11; 5.75 ± 0.03 mg/g DW). Based on the results gathered in this study, significant differences were found between irradiated accessions and control ones in relation to the leaf gas. The highest PN and gs were detected in CA23 as control followed by CA23 irradiated to 20Gy (CA23G20) and CA23G30 and the lowest PN and gs were observed in CA03 irradiated to 40Gy (CA03G40). Moreover, there were no significant differences in terms of PN and gs among the irradiated plants in each accession. The WUE of both irradiated accessions of Centella asiatica were reduced as compared with the control plants (p < 0.01) while Ci and E were enhanced. There were no significant differences in the gas exchange parameters among radiated plants in each accession. Moreover, malondialdehyde (MDA) of accessions after gamma treatments were significantly higher than the control, however, flavonoids which were higher concentration in irradiated plants can scavenge surplus free radicals. Therefore, the findings of this study have proven an efficient method of in vitro mutagenesis through gamma radiation based on the pharmaceutical demand to create economically superior mutants of C. asiatica. In other words, the results of this study suggest that gamma irradiation on C. asiatica can produce mutants of agricultural and economical importance.
Formalization of the Access Control on ARM-Android Platform with the B Method
NASA Astrophysics Data System (ADS)
Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing
2018-01-01
ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.
Blaya, Joaquín A; Shin, Sonya; Contreras, Carmen; Yale, Gloria; Suarez, Carmen; Asencios, Luis; Kim, Jihoon; Rodriguez, Pablo; Cegielski, Peter; Fraser, Hamish S F
2011-01-01
To evaluate the time to communicate laboratory results to health centers (HCs) between the e-Chasqui web-based information system and the pre-existing paper-based system. Cluster randomized controlled trial in 78 HCs in Peru. In the intervention group, 12 HCs had web access to results via e-Chasqui (point-of-care HCs) and forwarded results to 17 peripheral HCs. In the control group, 22 point-of-care HCs received paper results directly and forwarded them to 27 peripheral HCs. Baseline data were collected for 15 months. Post-randomization data were collected for at least 2 years. Comparisons were made between intervention and control groups, stratified by point-of-care versus peripheral HCs. For point-of-care HCs, the intervention group took less time to receive drug susceptibility tests (DSTs) (median 9 vs 16 days, p<0.001) and culture results (4 vs 8 days, p<0.001) and had a lower proportion of 'late' DSTs taking >60 days to arrive (p<0.001) than the control. For peripheral HCs, the intervention group had similar communication times for DST (median 22 vs 19 days, p=0.30) and culture (10 vs 9 days, p=0.10) results, as well as proportion of 'late' DSTs (p=0.57) compared with the control. Only point-of-care HCs with direct access to the e-Chasqui information system had reduced communication times and fewer results with delays of >2 months. Peripheral HCs had no benefits from the system. This suggests that health establishments should have point-of-care access to reap the benefits of electronic laboratory reporting.
Shin, Sonya; Contreras, Carmen; Yale, Gloria; Suarez, Carmen; Asencios, Luis; Kim, Jihoon; Rodriguez, Pablo; Cegielski, Peter; Fraser, Hamish S F
2010-01-01
Objective To evaluate the time to communicate laboratory results to health centers (HCs) between the e-Chasqui web-based information system and the pre-existing paper-based system. Methods Cluster randomized controlled trial in 78 HCs in Peru. In the intervention group, 12 HCs had web access to results via e-Chasqui (point-of-care HCs) and forwarded results to 17 peripheral HCs. In the control group, 22 point-of-care HCs received paper results directly and forwarded them to 27 peripheral HCs. Baseline data were collected for 15 months. Post-randomization data were collected for at least 2 years. Comparisons were made between intervention and control groups, stratified by point-of-care versus peripheral HCs. Results For point-of-care HCs, the intervention group took less time to receive drug susceptibility tests (DSTs) (median 9 vs 16 days, p<0.001) and culture results (4 vs 8 days, p<0.001) and had a lower proportion of ‘late’ DSTs taking >60 days to arrive (p<0.001) than the control. For peripheral HCs, the intervention group had similar communication times for DST (median 22 vs 19 days, p=0.30) and culture (10 vs 9 days, p=0.10) results, as well as proportion of ‘late’ DSTs (p=0.57) compared with the control. Conclusions Only point-of-care HCs with direct access to the e-Chasqui information system had reduced communication times and fewer results with delays of >2 months. Peripheral HCs had no benefits from the system. This suggests that health establishments should have point-of-care access to reap the benefits of electronic laboratory reporting. PMID:21113076
Evaluating Web accessibility at different processing phases
NASA Astrophysics Data System (ADS)
Fernandes, N.; Lopes, R.; Carriço, L.
2012-09-01
Modern Web sites use several techniques (e.g. DOM manipulation) that allow for the injection of new content into their Web pages (e.g. AJAX), as well as manipulation of the HTML DOM tree. This has the consequence that the Web pages that are presented to users (i.e. after browser processing) are different from the original structure and content that is transmitted through HTTP communication (i.e. after browser processing). This poses a series of challenges for Web accessibility evaluation, especially on automated evaluation software. This article details an experimental study designed to understand the differences posed by accessibility evaluation after Web browser processing. We implemented a Javascript-based evaluator, QualWeb, that can perform WCAG 2.0 based accessibility evaluations in the two phases of browser processing. Our study shows that, in fact, there are considerable differences between the HTML DOM trees in both phases, which have the consequence of having distinct evaluation results. We discuss the impact of these results in the light of the potential problems that these differences can pose to designers and developers that use accessibility evaluators that function before browser processing.
Ogden, Trevor
2006-11-01
The past 10 years have seen a doubling of the number of papers submitted to the Annals, and a 5-fold increase in the number of institutions with access to the journal. Electronic access is now far more important than print access. Papers from British authors dominated the first 20 years of the journal, but the rest of Europe is now more important, with Scandinavia and The Netherlands being the major continental sources. North America is the other major source. For British papers, there has been a big growth in government authors, and a decline in papers from industry and armed forces. From many possible topics, trends are selectively reviewed in: standards and exposure limits; measurement methods and criteria; sampling strategy and statistics; fibres; control banding; dermal exposure; and evaluation of control. For the future, we will continue to have the same aims and standards, but the changes of the past few years, and the growth of new approaches such as open access, have emphasized the difficulty of forecasting. The growth in submissions from countries which we presently regard as 'developing', and especially the growth in higher education in China, and the amount of occupational disease there, are bound to have major impacts. Perhaps the English language will not continue to dominate scientific publishing, but in any case an eastward shift in the source of papers must lead to other changes.
Walkyourplace - Evaluating Neighbourhood Accessibility at Street Level
NASA Astrophysics Data System (ADS)
Steiniger, S.; Poorazizi, M. E.; Hunter, A. J. S.
2013-05-01
The popularity of a neighbourhood is often explained by its perceived "higher" quality of life. Good access to shops, restaurants, parks, etc., is seen as an indicator that reflects improved quality of life. We present a web-based tool for assessment of accessibility to such services. The system evaluates in real time an area that is accessible using pedestrian, transit, and cycling infrastructure. The accessible area is evaluated using "quality of life" indicators, such as the number of grocery stores, shopping and recreation facilities, and local crime within that area. This tool sets itself apart from pre-computed and neighbourhood-level walkability indices, because it makes use of detailed street-level data, rather than block-level generalizations. It uses real network travel time, and, when transit data are provided, permits the creation and evaluation of accessibility areas for a combination of travel modes such as walking with transit use.
Development and Evaluation of Algorithms for Breath Alcohol Screening.
Ljungblad, Jonas; Hök, Bertil; Ekström, Mikael
2016-04-01
Breath alcohol screening is important for traffic safety, access control and other areas of health promotion. A family of sensor devices useful for these purposes is being developed and evaluated. This paper is focusing on algorithms for the determination of breath alcohol concentration in diluted breath samples using carbon dioxide to compensate for the dilution. The examined algorithms make use of signal averaging, weighting and personalization to reduce estimation errors. Evaluation has been performed by using data from a previously conducted human study. It is concluded that these features in combination will significantly reduce the random error compared to the signal averaging algorithm taken alone.
Facility for the evaluation of space communications and related systems
NASA Technical Reports Server (NTRS)
Kerczewski, Robert J.; Svoboda, James S.; Kachmar, Brian A.
1995-01-01
NASA Lewis Research Center's Communications Projects Branch has developed a facility for the evaluation of space communications systems and related types of systems, called the Advanced Space Communications (ASC) Laboratory. The ASC Lab includes instrumentation, testbed hardware, and experiment control and monitor software for the evaluation of components, subsystems, systems, and networks. The ASC lab has capabilities to perform radiofrequency (RF), microwave, and millimeter-wave characterizations as well as measurements using low, medium, or high data rate digital signals. In addition to laboratory measurements, the ASC Lab also includes integrated satellite ground terminals allowing experimentation and measurements accessing operational satellites through real space links.
Improving School Access Control
ERIC Educational Resources Information Center
National Clearinghouse for Educational Facilities, 2008
2008-01-01
Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…
77 FR 551 - Privacy Act of 1974; Amended System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-05
... Act system of records entitled ``Treasury/BEP .027--Access Control and Alarm Monitoring Systems (ACAMS... .027--Access Control and Alarm Monitoring Systems (ACAMS).'' BEP proposes to amend that system of... records entitled ``BEP .027--Access Control and Alarm Monitoring Systems (ACAMS),'' as follows: Treasury...
Pilot evaluation of a web-based intervention targeting sexual health service access.
Brown, K E; Newby, K; Caley, M; Danahay, A; Kehal, I
2016-04-01
Sexual health service access is fundamental to good sexual health, yet interventions designed to address this have rarely been implemented or evaluated. In this article, pilot evaluation findings for a targeted public health behavior change intervention, delivered via a website and web-app, aiming to increase uptake of sexual health services among 13-19-year olds are reported. A pre-post questionnaire-based design was used. Matched baseline and follow-up data were identified from 148 respondents aged 13-18 years. Outcome measures were self-reported service access, self-reported intention to access services and beliefs about services and service access identified through needs analysis. Objective service access data provided by local sexual health services were also analyzed. Analysis suggests the intervention had a significant positive effect on psychological barriers to and antecedents of service access among females. Males, who reported greater confidence in service access compared with females, significantly increased service access by time 2 follow-up. Available objective service access data support the assertion that the intervention may have led to increases in service access. There is real promise for this novel digital intervention. Further evaluation is planned as the model is licensed to and rolled out by other local authorities in the United Kingdom. © The Author 2016. Published by Oxford University Press. All rights reserved. For permissions, please email: journals.permissions@oup.com.
A Public-Health-Based Vision for the Management and Regulation of Psychedelics.
Haden, Mark; Emerson, Brian; Tupper, Kenneth W
2016-01-01
The Health Officers Council of British Columbia has proposed post-prohibition regulatory models for currently illegal drugs based on public health principles, and this article continues this work by proposing a model for the regulation and management of psychedelics. This article outlines recent research on psychedelic substances and the key determinants of benefit and harm from their use. It then describes a public-health-based model for the regulation of psychedelics, which includes governance, supervision, set and setting controls, youth access, supply control, demand limitation, and evaluation.
36 CFR 1256.70 - What controls access to national security-classified information?
Code of Federal Regulations, 2010 CFR
2010-07-01
... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...
Development and Use of a Virtual NMR Facility
NASA Astrophysics Data System (ADS)
Keating, Kelly A.; Myers, James D.; Pelton, Jeffrey G.; Bair, Raymond A.; Wemmer, David E.; Ellis, Paul D.
2000-03-01
We have developed a "virtual NMR facility" (VNMRF) to enhance access to the NMR spectrometers in Pacific Northwest National Laboratory's Environmental Molecular Sciences Laboratory (EMSL). We use the term virtual facility to describe a real NMR facility made accessible via the Internet. The VNMRF combines secure remote operation of the EMSL's NMR spectrometers over the Internet with real-time videoconferencing, remotely controlled laboratory cameras, real-time computer display sharing, a Web-based electronic laboratory notebook, and other capabilities. Remote VNMRF users can see and converse with EMSL researchers, directly and securely control the EMSL spectrometers, and collaboratively analyze results. A customized Electronic Laboratory Notebook allows interactive Web-based access to group notes, experimental parameters, proposed molecular structures, and other aspects of a research project. This paper describes our experience developing a VNMRF and details the specific capabilities available through the EMSL VNMRF. We show how the VNMRF has evolved during a test project and present an evaluation of its impact in the EMSL and its potential as a model for other scientific facilities. All Collaboratory software used in the VNMRF is freely available from http://www.emsl.pnl.gov:2080/docs/collab.
Hart, Kristen M.; Schofield, Pamela J.; Gregoire, Denise R.
2012-01-01
In a laboratory setting, we tested the ability of 24 non-native, wild-caught hatchling Burmese pythons (Python molurus bivittatus) collected in the Florida Everglades to survive when given water containing salt to drink. After a one-month acclimation period in the laboratory, we grouped snakes into three treatments, giving them access to water that was fresh (salinity of 0, control), brackish (salinity of 10), or full-strength sea water (salinity of 35). Hatchlings survived about one month at the highest marine salinity and about five months at the brackish-water salinity; no control animals perished during the experiment. These results are indicative of a "worst-case scenario", as in the laboratory we denied access to alternate fresh-water sources that may be accessible in the wild (e.g., through rainfall). Therefore, our results may underestimate the potential of hatchling pythons to persist in saline habitats in the wild. Because of the effect of different salinity regimes on survival, predictions of ultimate geographic expansion by non-native Burmese pythons that consider salt water as barriers to dispersal for pythons may warrant re-evaluation, especially under global climate change and associated sea-level-rise scenarios.
Hart, K.M.; Schofield, P.J.; Gregoire, D.R.
2012-01-01
In a laboratory setting, we tested the ability of 24 non-native, wild-caught hatchling Burmese pythons (Python molurus bivittatus) collected in the Florida Everglades to survive when given water containing salt to drink. After a one-month acclimation period in the laboratory, we grouped snakes into three treatments, giving them access to water that was fresh (salinity of 0, control), brackish (salinity of 10), or full-strength sea water (salinity of 35). Hatchlings survived about one month at the highest marine salinity and about five months at the brackish-water salinity; no control animals perished during the experiment. These results are indicative of a "worst-case scenario", as in the laboratory we denied access to alternate fresh-water sources that may be accessible in the wild (e.g., through rainfall). Therefore, our results may underestimate the potential of hatchling pythons to persist in saline habitats in the wild. Because of the effect of different salinity regimes on survival, predictions of ultimate geographic expansion by non-native Burmese pythons that consider salt water as barriers to dispersal for pythons may warrant re-evaluation, especially under global climate change and associated sea-level-rise scenarios. ?? 2011.
Health and agricultural productivity: Evidence from Zambia.
Fink, Günther; Masiye, Felix
2015-07-01
We evaluate the productivity effects of investment in preventive health technology through a randomized controlled trial in rural Zambia. In the experiment, access to subsidized bed nets was randomly assigned at the community level; 516 farmers were followed over a one-year farming period. We find large positive effects of preventative health investment on productivity: among farmers provided with access to free nets, harvest value increased by US$ 76, corresponding to about 14.7% of the average output value. While only limited information was collected on farming inputs, shifts in the extensive and the intensive margins of labor supply appear to be the most likely mechanism underlying the productivity improvements observed. Copyright © 2015 Elsevier B.V. All rights reserved.
78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-18
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-23
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-11
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-22
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Analysis of Access Control Policies in Operating Systems
ERIC Educational Resources Information Center
Chen, Hong
2009-01-01
Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…
An access control model with high security for distributed workflow and real-time application
NASA Astrophysics Data System (ADS)
Han, Ruo-Fei; Wang, Hou-Xiang
2007-11-01
The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.
Viecelli, Andrea K; Irish, Ashley B; Polkinghorne, Kevan R; Hawley, Carmel M; Johnson, David W; Mori, Trevor A; Pascoe, Elaine M; Strippoli, Giovanni F M; Lok, Charmaine E; Palmer, Suetonia C
2018-07-01
Arteriovenous access failure frequently occurs in people on hemodialysis and is associated with morbidity, mortality and large healthcare expenditures. Omega-3 polyunsaturated fatty acids (omega-3 PUFA) may improve access outcomes via pleiotropic effects on access maturation and function, but may cause bleeding complications. Systematic review with meta-analysis. Adults requiring hemodialysis via arteriovenous fistula or graft. Trials evaluating omega-3 PUFA for arteriovenous access outcomes identified by searches in CENTRAL, MEDLINE, and Embase to 24 January 2017. Omega-3 PUFA. Primary patency loss, dialysis suitability failure, access abandonment, interventions to maintain patency or assist maturation, bleeding, gastrointestinal side-effects, all-cause and cardiovascular mortality, hospitalization, and treatment adherence. Treatment effects were summarized as relative risks (RR) and 95% confidence intervals (CI). Evidence was assessed using GRADE. Five eligible trials (833 participants) with a median follow-up of 12 months compared peri-operative omega-3 PUFA supplementation with placebo. One trial (n=567) evaluated treatment for fistulae and four (n=266) for grafts. Omega-3 PUFA supplementation prevented primary patency loss with moderate certainty (761 participants, RR 0.81, CI 0.68-0.98). Low quality evidence suggested, that omega-3 PUFA may have had little or no effect on dialysis suitability failure (536 participants, RR 0.95, CI 0.73-1.23), access abandonment (732 participants, RR 0.78, CI 0.59-1.03), need for interventions (732 participants, RR 0.82, CI 0.64-1.04), or all-cause mortality (799 participants, RR 0.99, CI 0.51-1.92). Bleeding risk (793 participants, RR 1.40, CI 0.78-2.49) or gastrointestinal side-effects (816 participants, RR 1.22, CI 0.64-2.34) from treatment were uncertain. There was no evidence of different treatment effects for grafts and fistulae. Small number and methodological limitations of included trials. Omega-3 PUFA supplementation probably protects against primary loss of arteriovenous access patency, but may have little or no effect on dialysis suitability failure, access interventions or access abandonment. Potential treatment harms are uncertain. Copyright © 2018 National Kidney Foundation, Inc. All rights reserved.
Simpson, Tyler; Gauthier, Michel; Prochazka, Arthur
2010-02-01
Computer access can play an important role in employment and leisure activities following spinal cord injury. The authors' prior work has shown that a tooth-click detecting device, when paired with an optical head mouse, may be used by people with tetraplegia for controlling cursor movement and mouse button clicks. To compare the efficacy of tooth clicks to speech recognition and that of an optical head mouse to a gyrometer head mouse for cursor and mouse button control of a computer. Six able-bodied and 3 tetraplegic subjects used the devices listed above to produce cursor movements and mouse clicks in response to a series of prompts displayed on a computer. The time taken to move to and click on each target was recorded. The use of tooth clicks in combination with either an optical head mouse or a gyrometer head mouse can provide hands-free cursor movement and mouse button control at a speed of up to 22% of that of a standard mouse. Tooth clicks were significantly faster at generating mouse button clicks than speech recognition when paired with either type of head mouse device. Tooth-click detection performed better than speech recognition when paired with both the optical head mouse and the gyrometer head mouse. Such a system may improve computer access for people with tetraplegia.
Uncoordinated MAC for Adaptive Multi Beam Directional Networks: Analysis and Evaluation
2016-08-01
control (MAC) policies for emerging systems that are equipped with fully digital antenna arrays which are capable of adaptive multi-beam directional...Adaptive Beam- forming, Multibeam, Directional Networking, Random Access, Smart Antennas I. INTRODUCTION Fully digital beamforming antenna arrays that...are capable of adaptive multi-beam communications are quickly becoming a reality. These antenna arrays allow users to form multiple simultaneous
Reasoning on Weighted Delegatable Authorizations
NASA Astrophysics Data System (ADS)
Ruan, Chun; Varadharajan, Vijay
This paper studies logic based methods for representing and evaluating complex access control policies needed by modern database applications. In our framework, authorization and delegation rules are specified in a Weighted Delegatable Authorization Program (WDAP) which is an extended logic program. We show how extended logic programs can be used to specify complex security policies which support weighted administrative privilege delegation, weighted positive and negative authorizations, and weighted authorization propagations. We also propose a conflict resolution method that enables flexible delegation control by considering priorities of authorization grantors and weights of authorizations. A number of rules are provided to achieve delegation depth control, conflict resolution, and authorization and delegation propagations.
Typing for Conflict Detection in Access Control Policies
NASA Astrophysics Data System (ADS)
Adi, Kamel; Bouzida, Yacine; Hattak, Ikhlass; Logrippo, Luigi; Mankovskii, Serge
In this paper we present an access control model that considers both abstract and concrete access control policies specifications. Permissions and prohibitions are expressed within this model with contextual conditions. This situation may lead to conflicts. We propose a type system that is applied to the different rules in order to check for inconsistencies. If a resource is well typed, it is guaranteed that access rules to the resource contain no conflicts.
Nipp, Ryan D; Shui, Amy M; Perez, Giselle K; Kirchhoff, Anne C; Peppercorn, Jeffrey M; Moy, Beverly; Kuhlthau, Karen; Park, Elyse R
2018-06-01
Cancer survivors face ongoing health issues and need access to affordable health care, yet studies examining health care access and affordability in this population are lacking. To evaluate health care access and affordability in a national sample of cancer survivors compared with adults without cancer and to evaluate temporal trends during implementation of the Affordable Care Act. We used data from the National Health Interview Survey from 2010 through 2016 to conduct a population-based study of 30 364 participants aged 18 years or older. We grouped participants as cancer survivors (n = 15 182) and those with no reported history of cancer, whom we refer to as control respondents (n = 15 182), matched on age. We excluded individuals reporting a cancer diagnosis prior to age 18 years and those with nonmelanoma skin cancers. We compared issues with health care access (eg, delayed or forgone care) and affordability (eg, unable to afford medications or health care services) between cancer survivors and control respondents. We also explored trends over time in the proportion of cancer survivors reporting these difficulties. Of the 30 364 participants, 18 356 (57.4%) were women. The mean (SD) age was 63.5 (23.5) years. Cancer survivors were more likely to be insured (14 412 [94.8%] vs 13 978 [92.2%], P < .001) and to have government-sponsored insurance (7266 [44.3%] vs 6513 [38.8%], P < .001) compared with control respondents. In multivariable models, cancer survivors were more likely than control respondents to report delayed care (odds ratio [OR], 1.38; 95% CI, 1.16-1.63), forgone medical care (OR, 1.76; 95% CI, 1.45-2.12), and/or inability to afford medications (OR, 1.77; 95% CI, 1.46-2.14) and health care services (OR, 1.46; 95% CI, 1.27-1.68) (P < .001 for all). From 2010 to 2016, the proportion of survivors reporting delayed medical care decreased each year (B = 0.47; P = .047), and the proportion of those needing and not getting medical care also decreased each year (B = 0.35; P = .04). In addition, the proportion of cancer survivors who reported being unable to afford prescription medication decreased each year (B=0.66; P = .004) and the proportion of those unable to afford at least 1 of 6 services decreased each year (B = 0.51; P = .01). Despite higher rates of insurance coverage, cancer survivors reported greater difficulties accessing and affording health care compared with adults without cancer. Importantly, the proportion of survivors reporting these issues continued a downward trend throughout our observation period in the years following the implementation of the Affordable Care Act. Our findings suggest incremental improvement in health care access and affordability after recent health care reform and provide an important benchmark as additional changes are likely to occur in the coming years.
Variation in cooking and eating quality traits in Japanese rice germplasm accessions
Hori, Kiyosumi; Suzuki, Keitaro; Iijima, Ken; Ebana, Kaworu
2016-01-01
The eating quality of cooked rice is important and determines its market price and consumer acceptance. To comprehensively describe the variation of eating quality in 183 rice germplasm accessions, we evaluated 33 eating-quality traits including amylose and protein contents, pasting properties of rice flour, and texture of cooked rice grains. All eating-quality traits varied widely in the germplasm accessions. Principal-components analysis (PCA) revealed that allelic differences in the Wx gene explained the largest proportion of phenotypic variation of the eating-quality traits. In 146 accessions of non-glutinous temperate japonica rice, PCA revealed that protein content and surface texture of the cooked rice grains significantly explained phenotypic variations of the eating-quality traits. An allelic difference based on simple sequence repeats, which was located near a quantitative trait locus (QTL) on the short arm of chromosome 3, was associated with differences in the eating quality of non-glutinous temperate japonica rice. These results suggest that eating quality is controlled by genetic factors, including the Wx gene and the QTL on chromosome 3, in Japanese rice accessions. These genetic factors have been consciously selected for eating quality during rice breeding programs in Japan. PMID:27162502
Variation in cooking and eating quality traits in Japanese rice germplasm accessions.
Hori, Kiyosumi; Suzuki, Keitaro; Iijima, Ken; Ebana, Kaworu
2016-03-01
The eating quality of cooked rice is important and determines its market price and consumer acceptance. To comprehensively describe the variation of eating quality in 183 rice germplasm accessions, we evaluated 33 eating-quality traits including amylose and protein contents, pasting properties of rice flour, and texture of cooked rice grains. All eating-quality traits varied widely in the germplasm accessions. Principal-components analysis (PCA) revealed that allelic differences in the Wx gene explained the largest proportion of phenotypic variation of the eating-quality traits. In 146 accessions of non-glutinous temperate japonica rice, PCA revealed that protein content and surface texture of the cooked rice grains significantly explained phenotypic variations of the eating-quality traits. An allelic difference based on simple sequence repeats, which was located near a quantitative trait locus (QTL) on the short arm of chromosome 3, was associated with differences in the eating quality of non-glutinous temperate japonica rice. These results suggest that eating quality is controlled by genetic factors, including the Wx gene and the QTL on chromosome 3, in Japanese rice accessions. These genetic factors have been consciously selected for eating quality during rice breeding programs in Japan.
Ford, Tamsin; Edwards, Vanessa; Sharkey, Siobhan; Ukoumunne, Obioha C; Byford, Sarah; Norwich, Brahm; Logan, Stuart
2012-08-30
Childhood antisocial behaviour has high immediate and long-term costs for society and the individual, particularly in relation to mental health and behaviours that jeopardise health. Managing challenging behaviour is a commonly reported source of stress and burn out among teachers, ultimately resulting in a substantial number leaving the profession. Interventions to improve parenting do not transfer easily to classroom-based problems and the most vulnerable parents may not be easily able to access them. Honing teachers' skills in proactive behaviour management and the promotion of socio-emotional regulation, therefore, has the potential to improve both child and teacher mental health and well-being and the advantage that it might potentially benefit all the children subsequently taught by any teacher that accesses the training. Cluster randomised controlled trial (RCT) of the Incredible Years teacher classroom management (TCM) course with combined economic and process evaluations.One teacher of children aged 4-9 years, from 80 schools in the South West Peninsula will be randomised to attend the TCM (intervention arm) or to "teach as normal" (control arm). The primary outcome measure will be the total difficulties score from the Strengths and Difficulties Questionnaire (SDQ) completed by the current class teachers prior to randomisation, and at 9, 18 and 30 months follow-up, supplemented by parent SDQs. Secondary measures include academic attainment (teacher report supplemented by direct measurement in a sub-sample), children's enjoyment of school, and teacher reports of their professional self-efficacy, and levels of burn out and stress, supplemented by structured observations of teachers classroom management skills in a subsample. Cost data for the economic evaluation will be based on parental reports of services accessed. Cost-effectiveness, using the SDQ as the measure of effect, will be examined over the period of the RCT and over the longer term using decision analytic modelling. The process evaluation will use quantitative and qualitative approaches to assess fidelity to model, as well as explore Head teacher and teachers' experiences of TCM and investigate school factors that influence the translation of skills learnt to practice. This study will provide important information about whether the Teacher Classroom Management course influences child and teacher mental health and well-being in both the short and long term. It will also provide valuable insights into factors that may facilitate or impede any impact.The trial has been registered with ISCTRN (Controlled Trials Ltd) and assigned an ISRCTN number ISRCTN84130388. (http://www.controlled-trials.com/isrctn/search.html?srch=ISRCTN84130388&sort=3&dir=desc&max=10).
2012-01-01
Background Childhood antisocial behaviour has high immediate and long-term costs for society and the individual, particularly in relation to mental health and behaviours that jeopardise health. Managing challenging behaviour is a commonly reported source of stress and burn out among teachers, ultimately resulting in a substantial number leaving the profession. Interventions to improve parenting do not transfer easily to classroom-based problems and the most vulnerable parents may not be easily able to access them. Honing teachers’ skills in proactive behaviour management and the promotion of socio-emotional regulation, therefore, has the potential to improve both child and teacher mental health and well-being and the advantage that it might potentially benefit all the children subsequently taught by any teacher that accesses the training. Methods/Design Cluster randomised controlled trial (RCT) of the Incredible Years teacher classroom management (TCM) course with combined economic and process evaluations. One teacher of children aged 4–9 years, from 80 schools in the South West Peninsula will be randomised to attend the TCM (intervention arm) or to “teach as normal” (control arm). The primary outcome measure will be the total difficulties score from the Strengths and Difficulties Questionnaire (SDQ) completed by the current class teachers prior to randomisation, and at 9, 18 and 30 months follow-up, supplemented by parent SDQs. Secondary measures include academic attainment (teacher report supplemented by direct measurement in a sub-sample), children’s enjoyment of school, and teacher reports of their professional self-efficacy, and levels of burn out and stress, supplemented by structured observations of teachers classroom management skills in a subsample. Cost data for the economic evaluation will be based on parental reports of services accessed. Cost-effectiveness, using the SDQ as the measure of effect, will be examined over the period of the RCT and over the longer term using decision analytic modelling. The process evaluation will use quantitative and qualitative approaches to assess fidelity to model, as well as explore Head teacher and teachers’ experiences of TCM and investigate school factors that influence the translation of skills learnt to practice. Discussion This study will provide important information about whether the Teacher Classroom Management course influences child and teacher mental health and well-being in both the short and long term. It will also provide valuable insights into factors that may facilitate or impede any impact. The trial has been registered with ISCTRN (Controlled Trials Ltd) and assigned an ISRCTN number ISRCTN84130388. (http://www.controlled-trials.com/isrctn/search.html?srch=ISRCTN84130388&sort=3&dir=desc&max=10) PMID:22935476
Open versus Controlled-Access Data | Office of Cancer Genomics
OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data
Methods for Determining Aircraft Surface State at Lesser-Equipped Airports
NASA Technical Reports Server (NTRS)
Roach, Keenan; Null, Jody
2016-01-01
Tactical departure scheduling within a terminal airspace must accommodate a wide spectrum of surveillance and communication capabilities at multiple airports. The success of such a scheduler is highly dependent upon the knowledge of a departure's state while it is still on the surface. Airports within a common Terminal RAdar CONtrol (TRACON) airspace possess varying levels of surface surveillance infrastructure which directly impacts uncertainties in wheels-off times. Large airports have access to surface surveillance data, which is shared with the TRACON, while lesser-equipped airports still rely solely on controllers in Air Traffic Control Towers (Towers). Coordination between TRACON and Towers can be greatly enhanced when the TRACON controller has access to the surface surveillance and the associated decision-support tools at well-equipped airports. Similar coordination at lesser-equipped airports is still based on verbal communications. This paper investigates possible methods to reduce the uncertainty in wheels-off time predictions at the lesser-equipped airports through the novel use of Over-the-Air (OTA) data transmissions. We also discuss the methods and equipment used to collect sample data at lesser-equipped airports within a large US TRACON, as well as the data evaluation to determine if meaningful information can be extracted from it.
Review of SDDOT's highway access control process
DOT National Transportation Integrated Search
2000-02-01
This report presents the results and recommendations of a review of the South Dakota Department of Transportation's (SDDOT's) highway access control process. This document presents recommendations that improve South Dakota's access policy. The docume...
DOT National Transportation Integrated Search
1974-06-01
The report presents a summary of a study conducted for the Transportation Systems Center of promising access control techniques which are applicable to an aeronautical satellite system. Several frequency division multiple access (FDMA) and time divis...
Feasibility of BCI Control in a Realistic Smart Home Environment.
Kosmyna, Nataliya; Tarpin-Bernard, Franck; Bonnefond, Nicolas; Rivet, Bertrand
2016-01-01
Smart homes have been an active area of research, however despite considerable investment, they are not yet a reality for end-users. Moreover, there are still accessibility challenges for the elderly or the disabled, two of the main potential targets for home automation. In this exploratory study we design a control mechanism for smart homes based on Brain Computer Interfaces (BCI) and apply it in the "Domus" smart home platform in order to evaluate the potential interest of users about BCIs at home. We enable users to control lighting, a TV set, a coffee machine and the shutters of the smart home. We evaluate the performance (accuracy, interaction time), usability and feasibility (USE questionnaire) on 12 healthy subjects and 2 disabled subjects. We find that healthy subjects achieve 77% task accuracy. However, disabled subjects achieved a better accuracy (81% compared to 77%).
Feasibility of BCI Control in a Realistic Smart Home Environment
Kosmyna, Nataliya; Tarpin-Bernard, Franck; Bonnefond, Nicolas; Rivet, Bertrand
2016-01-01
Smart homes have been an active area of research, however despite considerable investment, they are not yet a reality for end-users. Moreover, there are still accessibility challenges for the elderly or the disabled, two of the main potential targets for home automation. In this exploratory study we design a control mechanism for smart homes based on Brain Computer Interfaces (BCI) and apply it in the “Domus”1 smart home platform in order to evaluate the potential interest of users about BCIs at home. We enable users to control lighting, a TV set, a coffee machine and the shutters of the smart home. We evaluate the performance (accuracy, interaction time), usability and feasibility (USE questionnaire) on 12 healthy subjects and 2 disabled subjects. We find that healthy subjects achieve 77% task accuracy. However, disabled subjects achieved a better accuracy (81% compared to 77%). PMID:27616986
Kypri, Kypros; Wilson, Amanda
2012-01-01
Background Internet research may raise older ethical issues in new forms or pose new issues. It has been recommended that debriefing information online be kept very short, with further information including study results made available if requested by participants. There are no empirical studies that compare possible alternative methods of debriefing in online studies. Objective To undertake a randomized controlled trial evaluating how to implement the recommended approach by assessing the effects of two different approaches on accessing of additional information. Methods All 11,943 participants in the Effects of Study Design and Allocation (ESDA) study, which employed deception, were randomly assigned to one of two methods of debriefing: Group A received the debriefing information in the body of an email with links to protocol and results pages; Group B was presented with these links after clicking on an initial link in the body of the email to view the debriefing information on a website. Outcomes assessed were the proportions clicking on the links to the protocol and results summary and the time spent on these pages by those accessing them. Results The group who were presented with no debriefing information in the body of the email and went to a website for this information (Group B) were approximately twice as likely to subsequently access the protocol and the results summary. These differences between the two groups were highly statistically significant. Although these differences are clear, the overall proportions accessing such information were low, and there were no differences in mean time spent reading these pages. Only one quarter of Group B actually accessed debriefing information. Conclusions In circumstances where the uptake of fuller information on study design, methods, and findings is deemed important, debriefing information may be better provided via a link and not included in the body of an email. Doing so may, however, reduce the extent of receiving any debriefing information at all. There is a wider need for high quality empirical studies to inform ethical evaluations. Trial Registration Australian New Zealand Clinical Trials Registry, ACTRN12610000846022 (http://www.anzctr.org.au/) PMID:23160103
ERIC Educational Resources Information Center
Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.
One of a series of three resource guides concerned with communication, control, and computer access for disabled and elderly individuals, the directory focuses on switches and environmental controls. The book's three chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by…
The relationship of travel distance with cystectomy access and outcomes.
Smith, Angela B; Meyer, Anne-Marie; Meng, Ke; Nielsen, Matthew E; Pruthi, Raj; Wallen, Eric; Woods, Michael; Tan, Hung-Jui
2018-06-01
Regionalization of care and travel distance may result in unintended consequences for complex surgery such as cystectomy. Our objective was to evaluate effect of differential distance on cystectomy receipt among patients with muscle-invasive bladder cancer (MIBC) and investigate the association between travel distance and cystectomy outcomes such as readmission. Using a linked data resource combining the NC Central Cancer Registry with claims data from Medicare, Medicaid, and private insurance plans, we included 736 patients with MIBC and 1,082 who underwent cystectomy. To evaluate access, differential distance was calculated as the difference between the nearest urologist and nearest cystectomy provider. To assess outcomes, logistic regression was used to evaluate rehospitalization and major complications, and Cox proportional hazards model for survival analysis. To evaluate access and outcomes, 736 patients with MIBC and 1,082 patients undergoing cystectomy were evaluated, respectively. Overall, 29% (211 of 736) with MIBC underwent cystectomy. Differential distance was not a predictor of cystectomy receipt (odds ratio = 1.0; 95% CI: 1.00, 1.01). Among patients undergoing cystectomy, travel distance from cystectomy provider was not a significant predictor of 30- or 31 to 90day readmissions (odds ratio = 1.0; 95% CI: 1.00, 1.00) although patients who lived further from their cystectomy provider were more likely to be readmitted to a nonindex hospital (P<0.001) when controlling for other factors. Although travel distance did not have a significant effect on overall survival, patients readmitted between 31 to 90days had worse overall survival (P<0.0001). The additional distance needed to reach a cystectomy provider did not predict receipt of surgery for MIBC. Furthermore, travel distance from cystectomy provider was not a significant predictor for subsequent readmission after cystectomy and did not affect overall survival. Copyright © 2018 Elsevier Inc. All rights reserved.
ERIC Educational Resources Information Center
Hecker, JayEtta Z.
A series of reviews of the Department of Transportation's (DOT's) Job Access and Reverse Commute (Job Access) Program explored DOT's and grantees' challenges in implementing the Job Access program and the status of DOT's program evaluation efforts. DOT and grantees faced significant challenges in implementing the Job Access program. DOT's process…
Delgado, Dolores; Alonso-Blanco, Carlos; Fenoll, Carmen; Mena, Montaña
2011-01-01
Background and Aims Current understanding of stomatal development in Arabidopsis thaliana is based on mutations producing aberrant, often lethal phenotypes. The aim was to discover if naturally occurring viable phenotypes would be useful for studying stomatal development in a species that enables further molecular analysis. Methods Natural variation in stomatal abundance of A. thaliana was explored in two collections comprising 62 wild accessions by surveying adaxial epidermal cell-type proportion (stomatal index) and density (stomatal and pavement cell density) traits in cotyledons and first leaves. Organ size variation was studied in a subset of accessions. For all traits, maternal effects derived from different laboratory environments were evaluated. In four selected accessions, distinct stomatal initiation processes were quantitatively analysed. Key Results and Conclusions Substantial genetic variation was found for all six stomatal abundance-related traits, which were weakly or not affected by laboratory maternal environments. Correlation analyses revealed overall relationships among all traits. Within each organ, stomatal density highly correlated with the other traits, suggesting common genetic bases. Each trait correlated between organs, supporting supra-organ control of stomatal abundance. Clustering analyses identified accessions with uncommon phenotypic patterns, suggesting differences among genetic programmes controlling the various traits. Variation was also found in organ size, which negatively correlated with cell densities in both organs and with stomatal index in the cotyledon. Relative proportions of primary and satellite lineages varied among the accessions analysed, indicating that distinct developmental components contribute to natural diversity in stomatal abundance. Accessions with similar stomatal indices showed different lineage class ratios, revealing hidden developmental phenotypes and showing that genetic determinants of primary and satellite lineage initiation combine in several ways. This first systematic, comprehensive natural variation survey for stomatal abundance in A. thaliana reveals cryptic developmental genetic variation, and provides relevant relationships amongst stomatal traits and extreme or uncommon accessions as resources for the genetic dissection of stomatal development. PMID:21447490
A Web-Based Remote Access Laboratory Using SCADA
ERIC Educational Resources Information Center
Aydogmus, Z.; Aydogmus, O.
2009-01-01
The Internet provides an opportunity for students to access laboratories from outside the campus. This paper presents a Web-based remote access real-time laboratory using SCADA (supervisory control and data acquisition) control. The control of an induction motor is used as an example to demonstrate the effectiveness of this remote laboratory,…
ERIC Educational Resources Information Center
Antony, Laljith
2016-01-01
Failing to prevent leaks of confidential and proprietary information to unauthorized users from software applications is a major challenge that companies face. Access control policies defined in software applications with access control mechanisms are unable to prevent information leaks from software applications to unauthorized users. Role-based…
76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-28
... 224, Airport Security Access Control AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The... (Pub. L. 92-463, 5 U.S.C., App.), notice is hereby given for a Special Committee 224, Airport Security...
Tool independence for the Web Accessibility Quantitative Metric.
Vigo, Markel; Brajnik, Giorgio; Arrue, Myriam; Abascal, Julio
2009-07-01
The Web Accessibility Quantitative Metric (WAQM) aims at accurately measuring the accessibility of web pages. One of the main features of WAQM among others is that it is evaluation tool independent for ranking and accessibility monitoring scenarios. This article proposes a method to attain evaluation tool independence for all foreseeable scenarios. After demonstrating that homepages have a more similar error profile than any other web page in a given web site, 15 homepages were measured with 10,000 different values of WAQM parameters using EvalAccess and LIFT, two automatic evaluation tools for accessibility. A similar procedure was followed with random pages and with several test files obtaining several tuples that minimise the difference between both tools. One thousand four hundred forty-nine web pages from 15 web sites were measured with these tuples and those values that minimised the difference between the tools were selected. Once the WAQM was tuned, the accessibility of 15 web sites was measured with two metrics for web sites, concluding that even if similar values can be produced, obtaining the same scores is undesirable since evaluation tools behave in a different way.
Evaluating online diagnostic decision support tools for the clinical setting.
Pryor, Marie; White, David; Potter, Bronwyn; Traill, Roger
2012-01-01
Clinical decision support tools available at the point of care are an effective adjunct to support clinicians to make clinical decisions and improve patient outcomes. We developed a methodology and applied it to evaluate commercially available online clinical diagnostic decision support (DDS) tools for use at the point of care. We identified 11 commercially available DDS tools and assessed these against an evaluation instrument that included 6 categories; general information, content, quality control, search, clinical results and other features. We developed diagnostically challenging clinical case scenarios based on real patient experience that were commonly missed by junior medical staff. The evaluation was divided into 2 phases; an initial evaluation of all identified and accessible DDS tools conducted by the Clinical Information Access Portal (CIAP) team and a second phase that further assessed the top 3 tools identified in the initial evaluation phase. An evaluation panel consisting of senior and junior medical clinicians from NSW Health conducted the second phase. Of the eleven tools that were assessed against the evaluation instrument only 4 tools completely met the DDS definition that was adopted for this evaluation and were able to produce a differential diagnosis. From the initial phase of the evaluation 4 DDS tools scored 70% or more (maximum score 96%) for the content category, 8 tools scored 65% or more (maximum 100%) for the quality control category, 5 tools scored 65% or more (maximum 94%) for the search category, and 4 tools score 70% or more (maximum 81%) for the clinical results category. The second phase of the evaluation was focused on assessing diagnostic accuracy for the top 3 tools identified in the initial phase. Best Practice ranked highest overall against the 6 clinical case scenarios used. Overall the differentiating factor between the top 3 DDS tools was determined by diagnostic accuracy ranking, ease of use and the confidence and credibility of the clinical information. The evaluation methodology used here to assess the quality and comprehensiveness of clinical DDS tools was effective in identifying the most appropriate tool for the clinical setting. The use of clinical case scenarios is fundamental in determining the diagnostic accuracy and usability of the tools.
Hamlet, Jason R [Albuquerque, NM; Robertson, Perry J [Albuquerque, NM; Pierson, Lyndon G [Albuquerque, NM; Olsberg, Ronald R [Albuquerque, NM
2012-02-28
A deflate decompressor includes at least one decompressor unit, a memory access controller, a feedback path, and an output buffer unit. The memory access controller is coupled to the decompressor unit via a data path and includes a data buffer to receive the data stream and temporarily buffer a first portion the data stream. The memory access controller transfers fixed length data units of the data stream from the data buffer to the decompressor unit with reference to a memory pointer pointing into the memory buffer. The feedback path couples the decompressor unit to the memory access controller to feed back decrement values to the memory access controller for updating the memory pointer. The decrement values each indicate a number of bits unused by the decompressor unit when decoding the fixed length data units. The output buffer unit buffers a second portion of the data stream after decompression.
Pham, Quynh; Khatib, Yasmin; Stansfeld, Stephen; Fox, Simon; Green, Tobias
2016-02-01
Meeting the complex needs of patients with chronic common mental health disorders (CMHDs) may be the greatest challenge facing organized medical practice. On the basis of a well-established and proven theoretical foundation for controlled respiration as a behavioral intervention for CMHDs, as well as preliminary evidence that gamification can improve health outcomes through increasing patient engagement, this randomized controlled pilot study evaluated the feasibility and clinical efficacy of a mobile health game called "Flowy" ( www.flowygame.com ) that digitally delivered breathing retraining exercises for anxiety, panic, and hyperventilation symptom management. We designed an unblinded, Web-based, parallel-group randomized controlled trial focusing on feasibility, clinical efficacy, and design proof of concept. In the intervention condition (n = 31), participants received free access to "Flowy" for 4 weeks. In the control condition (n = 32), participants were placed on a waitlist for 4 weeks before being offered free access to "Flowy." Online measurements using psychological self-report questionnaires were made at 2 and 4 weeks post-baseline. At trial conclusion, participants found "Flowy" acceptable as an anxiety management intervention. "Flowy" engaged participants sufficiently to endorse proactive gameplay. Intent-to-treat analysis revealed a reduction in anxiety, panic, and self-report hyperventilation scores in both trial arms, with the intervention arm experiencing greater quality of life. Participants perceived "Flowy" as a fun and useful intervention, proactively used "Flowy" as part of their care, and would recommend "Flowy" to family and friends. Our results suggest that a digital delivery of breathing retraining exercises through a mobile health game can manage anxiety, panic, and hyperventilation symptoms associated with CMHDs.
Managed care and the quality of substance abuse treatment.
Shepard, Donald S; Daley, Marilyn; Ritter, Grant A; Hodgkin, Dominic; Beinecke, Richard H
2002-12-01
In the US, the spiraling costs of substance abuse and mental health treatment caused many state Medicaid agencies to adopt managed behavioral health care (MBHC) plans during the 1990s. Although research suggests that these plans have successfully reduced public sector spending, their impact on the quality of substance abuse treatment has not been established. The Massachusetts Medicaid program started a risk-sharing contract with MHMA, a private, for-profit specialty managed behavioral health care (MBHC) carve-out vendor on July 1, 1992. This paper evaluates the carve-out s impact on spending per inpatient episode and three proxy measures of quality: (i) access to inpatient treatment (ii) 30-day re-admissions and (iii) continuity of care. Medicaid claims for inpatient treatment were collapsed into episodes. Clients were tracked across the five-year period and an interrupted time series design was used to compare the three quality outcomes and spending in the year prior to (FY1992) and the four years during MHMA (FY1993-FY1996). Logistic and linear regression models were used to control for race, disability status, age, gender and primary diagnosis. Despite a 99% reduction in the use of hospital-based settings, access to 24-hour services overall increased by 38%, largely due to an expansion in the use of freestanding detoxification and acute residential services. Continuity improved by 73%. Nevertheless, rates of 7-day (58%) and 30-day (24%) readmission increased significantly, even after controlling for increases in disability status. Per episode spending decreased by 76% ($2,773), characterized by a dramatic spending reduction in FY1993 that was maintained but not augmented in subsequent years. The carve-out had mixed effects on the quality of substance abuse treatment. While one of the three measures (readmission rates) deteriorated, two improved (access and continuity). Rapid re-admissions were strongly associated with shorter lengths of stay, suggesting that strengthening discharge planning may preserve the benefits of MBHC while avoiding its risks. Since reductions in Medicaid spending were impressive but finite, MBHC may not be the permanent solution to inflation in behavioral health care. MBHC firms should implement quality-monitoring programs to ensure that aggressive utilization management strategies do not compromise quality of care. The impact of managed behavioral health care should ideally be evaluated in randomized controlled studies. In addition, research is needed to establish that the quality measures employed in this evaluation - improved access, enhanced continuity and fewer rapid re-admissions actually correspond to reductions in drug or alcohol use and other favorable outcomes obtained through client self-report or urinalysis.
Visits to Registered Nurses: An Opportunity to Increase Contraceptive Access in California.
Parker, Emese C; Kong, Kevin; Watts, Leslie A; Schwarz, Eleanor B; Darney, Philip D; Thiel de Bocanegra, Heike
In 2013, California passed Assembly Bill (A.B.) 2348, approving registered nurses (RNs) to dispense patient self-administered hormonal contraceptives and administer injections of hormonal contraceptives. The Family Planning, Access, Care and Treatment (Family PACT) program, which came into effect in 1997 to expand low-income, uninsured California resident access to contraceptives at no cost, is one program in which qualified RNs can dispense and administer contraceptives. The aims of this study were to (a) describe utilization of RN visits within California's Family PACT program and (b) evaluate the impact of RN visits on client birth control acquisition during the first 18 months after implementation of A.B. 2348 (January 1, 2013 to June 30, 2014). A descriptive observational design using administrative databases was used. Family PACT claims were retrieved for RN visits and contraception. Paid claims for contraceptive dispensing and/or administration visits by physicians, nurse practitioners, certified nurse midwives, and physician assistants were compared before and after the implementation of A.B. 2348 at practice sites where RN visits were and were not utilized. Contraceptive methods and administration procedures were identified using Healthcare Common Procedure Coding System codes, National Drug Codes, and Common Procedural Terminology codes. Claims data for healthcare facilities were abstracted by site location based on a unique combination of National Provider Identifier (NPI), NPI Owner, and NPI location number. RN visits were found mainly in Northern California and the Central Valley (73%). Sixty-eight percent of RN visits resulted in same-day dispensing and/or administration of hormonal (and/or barrier) methods. Since benefit implementation, RN visits resulted in a 10% increase in access to birth control dispensing and/or administration visits. RN visits were also associated with future birth control acquisition and other healthcare utilization within the subsequent 30 days. RN visits, though underutilized across the state, have resulted in increased access to contraception in some communities, an effect that may continue to grow with time and can serve as a model for other states.
Evaluating the impact of social franchising on family planning use in Kenya.
Chakraborty, Nirali M; Mbondo, Mwende; Wanderi, Joyce
2016-06-18
In Kenya, as in many low-income countries, the private sector is an important component of health service delivery and of providing access to preventive and curative health services. The Tunza Social Franchise Network, operated by Population Services Kenya, is Kenya's largest network of private providers, comprising 329 clinics. Franchised clinics are only one source of family planning (FP), and this study seeks to understand whether access to a franchise increases the overall use or provides another alternative for women who would have found FP services in the public sector. A quasi-experimental study compared 50 catchment areas where there is a Tunza franchise and no other franchised provider with 50 purposively matched control areas within 20 km of each selected Tunza area, with a health facility, but no franchised facility. Data from 5609 women of reproductive age were collected on demographic and socioeconomic status, FP use, and care-seeking behavior. Multivariate logistic regression, with intervention and control respondents matched using coarsened exact matching, was conducted. Overall modern contraceptive use in this population was 53 %, with 24.8 % of women using a long-acting or permanent method (LAPM). There was no significant difference in odds of current or new FP use by group, adjusted for age. However, respondents in Tunza catchment areas are significantly more likely to be LAPM users (adj. OR = 1.49, p = 0.015). Further, women aged 18-24 and 41-49 in Tunza catchment areas have a significantly higher marginal probability of LAPM use than those in control areas. This study indicates that access to a franchise is correlated with access to and increased use of LAPMs, which are more effective, and cost-effective, methods of FP. While franchised facilities may provide additional points of access for FP and other services, the presence of the franchise does not, in and of itself, increase the use of FP in Kenya.
Kristiniak, Susan; Harpel, Jean; Breckenridge, Diane M; Buckle, Jane
2012-11-01
To evaluate the effect of topically applied black pepper essential oil on easing intravenous catheter insertion (IVC) in patients with no palpable or visible veins compared to a control group (standard nursing practice). Randomized, controlled study. One hundred twenty hospitalized patients, who were referred to a hospital vascular team because of difficulty in accessing veins for IVC insertion. Topical application of 20% essential oil of black pepper in aloe vera gel or standard nursing care (hot packs with or without vigorous tactile stimulation). Pre- and post-test vein visibility and/or palpability and number of attempts at IVC insertion. A higher percentage of patients achieved optimal scoring (vein score=2) or improved scoring (vein score of 1 or 2) to black pepper intervention than standard nursing care. The black pepper group also reduced the number of patients whose veins were still not visible or palpable after the intervention to nearly half that of the control group (p<0.05). The number of IVC attempts following black pepper was also half that of the control group. Topical application of black pepper is a viable and effective way to enhance vein visibility and palpability prior to intravenous insertion in patients with limited vein accessibility; it also improves ease of IVC insertion.
Security of social network credentials for accessing course portal: Users' experience
NASA Astrophysics Data System (ADS)
Katuk, Norliza; Fong, Choo Sok; Chun, Koo Lee
2015-12-01
Social login (SL) has recently emerged as a solution for single sign-on (SSO) within the web and mobile environments. It allows users to use their existing social network credentials (SNC) to login to third party web applications without the need to create a new identity in the intended applications' database. Although it has been used by many web application providers, its' applicability in accessing learning materials is not yet fully investigated. Hence, this research aims to explore users' (i.e., instructors' and students') perception and experience on the security of SL for accessing learning contents. A course portal was developed for students at a higher learning institution and it provides two types of user authentications (i) traditional user authentication, and (ii) SL facility. Users comprised instructors and students evaluated the login facility of the course portal through a controlled lab experimental study following the within-subject design. The participants provided their feedback in terms of the security of SL for accessing learning contents. The study revealed that users preferred to use SL over the traditional authentication, however, they concerned on the security of SL and their privacy.
Yuan, S; Kerr, G; Salmon, K; Speedy, P; Freeman, R
2007-03-01
This was to evaluate the effectiveness of a community-based program to promote dental registration and access to dental services for preschool children residing in areas of high social deprivation using monthly registration data provided by the Central Services Agency (CSA). A quasi-experimental non-equivalent two group comparison. Areas of high social deprivation in the greater Belfast area. The dental registration program was conducted by community-based nurses (health visitors). The health visitors provided oral health education and distributed registration vouchers to mothers of new babies during home visits. The mothers exchanged the vouchers for motivational materials from the participating dental practices. Preschool child registration data were obtained from the CSA to evaluate the effectiveness of the program. The registration rates were significantly greater 5 months after the program for 0-2-year old children residing in the intervention wards compared with control wards. During the program the rate of change in registration for the 0-2-year-old group residing in the intervention wards was significantly greater compared with those residing in the control wards (t [DF:21]=4.26: p<0.001). There was a significant increase in registration rate 5 months after the program compared with 6 months before the study started for the 0-2 year old group residing in the intervention wards compared with those residing in the control wards (t [df: 21]=3.33: P=0.003). There were no equivalent effects for the 3-5-year old group. The adoption of a community-based approach assisted in promoting dental registration and access to dental services for preschool children residing in areas of high social deprivation.
Fertility Effects of Abortion and Birth Control Pill Access for Minors
GULDI, MELANIE
2008-01-01
This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors’ fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors’ access to abortion and minors’ birthrates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment—including abortion—in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor’s legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women’s birthrates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birthrates among whites. PMID:19110899
Fertility effects of abortion and birth control pill access for minors.
Guldi, Melanie
2008-11-01
This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors' fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors' access to abortion and minors' birth rates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment-including abortion-in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor's legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women's birth rates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birth rates among whites.
Hormone-dependent control of developmental timing through regulation of chromatin accessibility
Uyehara, Christopher M.; Nystrom, Spencer L.; Niederhuber, Matthew J.; Leatham-Jensen, Mary; Ma, Yiqin; Buttitta, Laura A.
2017-01-01
Specification of tissue identity during development requires precise coordination of gene expression in both space and time. Spatially, master regulatory transcription factors are required to control tissue-specific gene expression programs. However, the mechanisms controlling how tissue-specific gene expression changes over time are less well understood. Here, we show that hormone-induced transcription factors control temporal gene expression by regulating the accessibility of DNA regulatory elements. Using the Drosophila wing, we demonstrate that temporal changes in gene expression are accompanied by genome-wide changes in chromatin accessibility at temporal-specific enhancers. We also uncover a temporal cascade of transcription factors following a pulse of the steroid hormone ecdysone such that different times in wing development can be defined by distinct combinations of hormone-induced transcription factors. Finally, we show that the ecdysone-induced transcription factor E93 controls temporal identity by directly regulating chromatin accessibility across the genome. Notably, we found that E93 controls enhancer activity through three different modalities, including promoting accessibility of late-acting enhancers and decreasing accessibility of early-acting enhancers. Together, this work supports a model in which an extrinsic signal triggers an intrinsic transcription factor cascade that drives development forward in time through regulation of chromatin accessibility. PMID:28536147
A responsive evaluation of an Aboriginal nursing education access program.
Curran, Vernon; Solberg, Shirley; LeFort, Sandra; Fleet, Lisa; Hollett, Ann
2008-01-01
Nursing education access programs have been introduced in a number of countries to address the shortage of healthcare providers of Aboriginal descent. An evaluation study of a nursing education access program in Labrador, Canada, was undertaken using a Responsive Evaluation approach. Interviews and focus groups with program stakeholders were conducted. Program effectiveness was influenced by culturally relevant curriculum, experiential and authentic learning opportunities, academic and social support, and the need for partnership building between stakeholders. The authors report key findings resulting from the Responsive Evaluation.
Baedecker, P.A.; Grossman, J.N.
1995-01-01
A PC based system has been developed for the analysis of gamma-ray spectra and for the complete reduction of data from INAA experiments, including software to average the results from mulitple lines and multiple countings and to produce a final report of analysis. Graphics algorithms may be called for the analysis of complex spectral features, to compare the data from alternate photopeaks and to evaluate detector performance during a given counting cycle. A database of results for control samples can be used to prepare quality control charts to evaluate long term precision and to search for systemic variations in data on reference samples as a function of time. The entire software library can be accessed through a user-friendly menu interface with internal help.
50 CFR 648.262 - Effort-control program for red crab limited access vessels.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Effort-control program for red crab... UNITED STATES Management Measures for the Atlantic Deep-Sea Red Crab Fishery § 648.262 Effort-control program for red crab limited access vessels. (a) General. A vessel issued a limited access red crab permit...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-02
... will have expanded access to Pell grants; or (2) a control group, which will not have access. Within both substudies, the treatment group will be very similar to the control at the time of random... between treatment and control group members can then be attributed to Pell grant access. The first...
Report #2006-P-00005, December 14, 2005. Controls needed to be improved in areas such as visitor access to facilities, use of contractor access badges, and general physical access to the NCC, computer rooms outside the NCC, and media storage rooms.
Experience with ActiveX control for simple channel access
DOE Office of Scientific and Technical Information (OSTI.GOV)
Timossi, C.; Nishimura, H.; McDonald, J.
2003-05-15
Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls.
Investing in youth tobacco control: a review of smoking prevention and control strategies
Lantz, P.; Jacobson, P.; Warner, K.; Wasserman, J.; Pollack, H.; Berson, J.; Ahlstrom, A.
2000-01-01
OBJECTIVE—To provide a comprehensive review of interventions and policies aimed at reducing youth cigarette smoking in the United States, including strategies that have undergone evaluation and emerging innovations that have not yet been assessed for efficacy. DATA SOURCES—Medline literature searches, books, reports, electronic list servers, and interviews with tobacco control advocates. DATA SYNTHESIS—Interventions and policy approaches that have been assessed or evaluated were categorised using a typology with seven categories (school based, community interventions, mass media/public education, advertising restrictions, youth access restrictions, tobacco excise taxes, and direct restrictions on smoking). Novel and largely untested interventions were described using nine categories. CONCLUSIONS—Youth smoking prevention and control efforts have had mixed results. However, this review suggests a number of prevention strategies that are promising, especially if conducted in a coordinated way to take advantage of potential synergies across interventions. Several types of strategies warrant additional attention and evaluation, including aggressive media campaigns, teen smoking cessation programmes, social environment changes, community interventions, and increasing cigarette prices. A significant proportion of the resources obtained from the recent settlement between 46 US states and the tobacco industry should be devoted to expanding, improving and evaluating "youth centred" tobacco prevention and control activities. Keywords: youth smoking prevention; teen cessation programmes; community interventions; policy PMID:10691758
Odeen, Magnus; Ihlebæk, Camilla; Indahl, Aage; Wormgoor, Marjon E A; Lie, Stein A; Eriksen, Hege R
2013-06-01
To evaluate whether information and reassurance about low back pain (LBP) given to employees at the workplace could reduce sick leave. A Cluster randomized controlled trial with 135 work units of about 3,500 public sector employees in two Norwegian municipalities, randomized into two intervention groups; Education and peer support (EPS) (n = 45 units), education and "peer support and access to an outpatient clinic" (EPSOC) (n = 48 units), and a control group (n = 42 units). Both interventions consisted of educational meetings based on a "non-injury model" and a "peer adviser" appointed by colleagues. Employees in the EPSOC group had access to an outpatient clinic for medical examination and further education. The control group received no intervention. The main outcome was sick leave based on municipal records. Secondary outcomes were self-reported pain, pain related fear of movement, coping, and beliefs about LBP from survey data of 1,746 employees (response rate about 50 %). EPS reduced sick leave by 7 % and EPSOC reduced sick leave by 4 % during the intervention year, while sick leave in the control group was increased by 7 % during the same period. Overall, Rate Ratios (RR) were statistically significant for EPSOC (RR = .84 (C.I = 0.71-.99) but not EPS (RR = .92 (C.I = 0.78-1.09)) in a mixed Poisson regression analysis. Faulty beliefs about LBP were reduced in both intervention groups. Educational meetings, combined with peer support and access to an outpatient clinic, were effective in reducing sick leave in public sector employees.
Access to Sign Language Interpreters in the Criminal Justice System.
ERIC Educational Resources Information Center
Miller, Katrina R.
2001-01-01
This study surveyed 46 professional sign language interpreters working in criminal justice settings and evaluated 22 cases to evaluate access issues for individuals with hearing impairments. Recommendations to increase the accessibility of interpreting services included providing ongoing awareness training to criminal justice personnel and…
Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley
2010-10-01
Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
International Access to Aerospace Information.
1980-04-01
data that belong into the category ’reproducible" belong here into the category ’conditions controlled by man" " non reproducible data’ belong into the...SESSION IV - NON -LITERATURE DATA IN AEROSPACE RESEARCH AND DEVELOPMENT THE NUMERIC AEROSPACE DATA: PROBLEMS OF EVALUATION, HANDLING AND DISSEMINATION...34. Sessions III and IV, held on 18 October, were entitled "Problems of Utilization of Aerospace Literature" and " Non -Literature Data in Aerospace and
The Salt Lake City EPA Environmental
Monitoring for Public Access and Community Tracking (EMPACT) project,
initiated in October 1999, is designed to evaluate the usefulness of a
newly developed real-time continuous monitor (RAMS) for total
(non-volatil...
An Evaluation of the Coupled LVT Concept.
1979-11-01
DISTRIBUT’ION/ AVAILABILIT Y CODES DIST AVAIL AND/ORt SPECIAL DATE ACCESSIONED DIST RIBUTION STAMP 81 7 17 006 DATE RECEIVED IN DTIC PHOTOGRAPH THIS...with the objective of improving the land and water performance. Recommendations are made for a coupling system and its controls and for an articulated...configuration. The advantages in land and water performance, as well as the drawbacks, are presented in comparison to single vehicles. The advantages
Coupling Spatial Segregation with Synthetic Circuits to Control Bacterial Survival (Open Access)
2016-02-29
Subject Categories Synthetic Biology & Biotechnology; Quantitative Biology & Dynamical Systems DOI 10.15252/msb.20156567 | Received 9 September 2015...survival. Experimentally , we program collective survival using three different gene circuits, which allow us to evaluate the modularity of the...QS-CAT circuit depends on QS regulation. The QS-BlaM circuit depends on both QS regulation and enzyme release (by lysis and export). G–I Experimental
Defense AT&L (Volume 37, Number 2, March-April 2008)
2008-04-01
environment. Operational suit- ability is the degree to which a system can be satisfactorily placed in field use, with consideration given to reliability...devise the most effective test-and-evaluation strategy. Whenever possible, the program should be developed and fielded in small increments and provided... ability to control access to design-related informa- tion and availability of technology, and it will raise grave security considerations. Do you develop
Evaluation of a polymer implanted port access device.
Brown, J M
1996-01-01
The implanted port vascular access system has provided many patients with safe and reliable vascular access. Its implanted design provides improved body image, reduced maintenance and a better quality of life. The Huber needle has been the standard means of accessing the implanted port system. Because of the problems associated with the Huber needle system, current standards recommend that the Huber needle be changed every 7 days. This evaluation examines the use of a polymer cannula to access the implanted port system. This polymer cannula eliminates many of the problems associated with the Huber needle and provides longer dwell times without increased complications. Seventy nine patients were accessed for a total of 1533 days with the mean dwell time being 19.4 days with no increase in complications associated with port access. To establish implanted port access times of greater than 7 days without increased complications. A multicenter voluntary enrollment evaluation of a medical device. Patients were offered the opportunity to participate in the evaluation if they had an implanted port and were going to be accessed for therapy for periods of 7 days or more. Patients were observed for adverse cutaneous reactions at the insertion site and any port access complications such as sepsis, leakage, changes in portal chamber integrity, and implant pocket integrity. From October 1994 through November 1995, 79 L-Cath for Ports (Luther Medical Products) polymer catheter port access devices (Illustration 1) were inserted in 54 patients. This polymer port access device was used instead of a rigid metal Huber needle for port access. The total number of access days was 1533 days with the mean duration of access being 19.4 days. Two patients experienced blood stream infections while they were accessed with the polymer port access device. These infections ensued with fever of unknown origin as the presenting symptom during neutropenic episodes after chemotherapy treatment. The port access device was removed and the port access device tip was cultured with culture results being negative. No other patients experienced complications related to the port access device. The polymer port access device provided a safe and effective means of extending port access times. This reduced the number of restarts for the patients and could extend portal septum life by exposing the portal septum to fewer accesses.
Chow, Clara K; Thiagalingam, Aravinda; Rogers, Kris; Chalmers, John; Redfern, Julie
2017-01-01
Introduction The growing number of smartphone health applications available in the app stores makes these apps a promising tool to help reduce the global problem of non-adherence to long-term medications. However, to date, there is limited evidence that available medication reminder apps are effective. This study aims to determine the impact of medication reminder apps on adherence to cardiovascular medication when compared with usual care for people with coronary heart disease (CHD) and to determine whether an advanced app compared with a basic app is associated with higher adherence. Methods and analysis Randomised controlled trial with follow-up at 3 months to evaluate the feasibility and effectiveness of medication reminder apps on medication adherence compared with usual care. An estimated sample size of 156 patients with CHD will be randomised to one of three groups (usual care group, basic medication reminder app group and advanced medication reminder app group). The usual care group will receive standard care for CHD with no access to a medication reminder app. The basic medication reminder app group will have access to a medication reminder app with a basic feature of providing simple daily reminders with no interactivity. The advanced medication reminder app group will have access to a medication reminder app with additional interactive and customisable features. The primary outcome is medication adherence measured by the eight-item Morisky Medication Adherence Scale at 3 months. Secondary outcomes include clinical measurements of blood pressure and cholesterol levels, and medication knowledge. A process evaluation will also be performed to assess the feasibility of the intervention by evaluating the acceptability, utility and engagement with the apps. Ethics and dissemination Ethical approval has been obtained from the Western Sydney Local Health Network Human Research Ethics Committee (AU/RED/HREC/1/WMEAD/3). Study findings will be disseminated via usual scientific forums. Trial registration number ACTRN12616000661471; Pre-results PMID:28993388
Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks
2017-01-01
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle’s safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given. PMID:29231882
Huo, Xueliang; Ghovanloo, Maysam
2010-01-01
The tongue drive system (TDS) is an unobtrusive, minimally invasive, wearable and wireless tongue–computer interface (TCI), which can infer its users' intentions, represented in their volitional tongue movements, by detecting the position of a small permanent magnetic tracer attached to the users' tongues. Any specific tongue movements can be translated into user-defined commands and used to access and control various devices in the users' environments. The latest external TDS (eTDS) prototype is built on a wireless headphone and interfaced to a laptop PC and a powered wheelchair. Using customized sensor signal processing algorithms and graphical user interface, the eTDS performance was evaluated by 13 naive subjects with high-level spinal cord injuries (C2–C5) at the Shepherd Center in Atlanta, GA. Results of the human trial show that an average information transfer rate of 95 bits/min was achieved for computer access with 82% accuracy. This information transfer rate is about two times higher than the EEG-based BCIs that are tested on human subjects. It was also demonstrated that the subjects had immediate and full control over the powered wheelchair to the extent that they were able to perform complex wheelchair navigation tasks, such as driving through an obstacle course. PMID:20332552
Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.
Song, Caixia
2017-12-12
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.
Hatchett, Andrew; Hallam, Jeffrey S; Ford, M Allison
2013-04-01
The aim of this study is to evaluate a 12-week social cognitive theory (SCT)-based email intervention designed to influence the physical activity of survivors of breast cancer. Seventy-four volunteers (intervention group, n = 36; control group, n = 38) were recruited by mass email and written letter solicitation. Participants completed a series of online questionnaires measuring demographic characteristics, physical activity readiness, level of physical activity and selected SCT variables at baseline, 6 and 12 weeks. The intervention group received email messages based on SCT designed specifically for breast cancer survivors and targeting physical activity. For the first 6 weeks of the intervention, participants assigned to the intervention group received messages weekly, from weeks 7 to 12, participants received messages every other week and had access to an e-counselor. The control group did not receive email messages, nor did they have access to an e-counselor. Significant differences in levels of self-reported vigorous physical activity were found between groups at 6 and 12 weeks. Significant differences were also found for self-reported moderate physical activity at 12 weeks. Email-based interventions based on SCT can significantly influence levels of self-reported physical activity of breast cancer survivors. Copyright © 2012 John Wiley & Sons, Ltd.
Evaluating existing access opportunities for disabled persons at remote shoreline recreation sites
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bley, M.R.; Kearns, M.T.
1995-12-31
Draft guidelines for providing outdoor recreation access opportunities for disabled persons have been recommended by the Recreation Access Advisory Committee and in the Universal Access to Outdoor Recreation: A Design Guide. The Federal Energy Regulatory Commission requires applicants for new hydropower licenses to consider access opportunities for disabled persons at existing hydropower projects. A process for evaluating existing access opportunities for disabled persons at remote shoreline recreation sites at hydropower projects is described. The process includes five steps: (1) preparing a preliminary map of existing recreation sites; (2) data collection in the field; (3) evaluating compliance of existing facilities; (4)more » feasibility of enhancing existing facilities; and (5) designing enhancements. The process will be refined when final standards and processes are approved by the appropriate agencies and organizations.« less
Wilson, Charlotte; Alam, Rahul; Latif, Saima; Knighting, Katherine; Williamson, Susan; Beaver, Kinta
2012-01-01
A higher risk of diabetes mellitus in South Asian and Black African populations combined with lower reported access and self-management-related health outcomes informed the aims of this study. Our aims were to synthesise and evaluate evidence relating to patient self-management and access to healthcare services for ethnic minority groups living with diabetes. A comprehensive search strategy was developed capturing a full range of study types from 1995-2010, including relevant hand-searched literature pre-dating 1995. Systematic database searches of MEDLINE, Cochrane, DARE, HTA and NHSEED, the British Nursing Index, CAB abstracts, EMBASE, Global Health, Health Management Information Consortium and PsychInfo were conducted, yielding 21,288 abstracts. Following search strategy refinement and the application of review eligibility criteria; 11 randomised controlled trials (RCTs), 18 qualitative studies and 18 quantitative studies were evaluated and principal results extracted. Results suggest that self-management practices are in need of targeted intervention in terms of patients' knowledge and understanding of their illness, inadequacy of information and language and communication difficulties arising from cultural differences. Access to health-care is similarly hindered by a lack of cultural sensitivity in service provision and under use of clinic-based interpreters and community-based services. Recommendations for practice and subsequent intervention primarily rest at the service level but key barriers at patient and provider levels are also identified. © 2011 Blackwell Publishing Ltd.
Emerson, C; Lipke, V; Kapata, N; Mwananyambe, N; Mwinga, A; Garekwe, M; Lanje, S; Moshe, Y; Pals, S L; Nakashima, A K; Miller, B
2016-07-01
Out-patient human immunodeficiency virus (HIV) care and treatment clinics in Zambia and Botswana, countries with a high burden of HIV and TB infection. To develop a tuberculosis infection control (TB IC) training and implementation package and evaluate the implementation of TB IC activities in facilities implementing the package. Prospective program evaluation of a TB IC training and implementation package using a standardized facility risk assessment tool, qualitative interviews with facility health care workers and measures of pre- and post-test performance. A composite measure of facility performance in TB IC improved from 32% at baseline to 50% at 1 year among eight facilities in Zambia, and from 27% to 80% at 6 months among 10 facilities in Botswana. Although there was marked improvement in indicators of managerial, administrative and environmental controls, key ongoing challenges remained in ensuring access to personal protective equipment and implementing TB screening in health care workers. TB IC activities at out-patient HIV clinics in Zambia and Botswana improved after training using the implementation package. Continued infrastructure support, as well as monitoring and evaluation, are needed to support the scale-up and sustainability of TB IC programs in facilities in low-resource countries.
High-Moisture Diet for Laboratory Rats: Nutrient Analysis, Growth, and Organ Weights
NASA Technical Reports Server (NTRS)
Battles, August H.; Knapka, Joseph T.; Lewis, Laura; Lang, Marie T.; Gruendel, Douglas J.
1991-01-01
A diet (KSC-25) to be sterilized by irradiation was formulated to contain 66% moisture and to provide the required nutrients for growing rats. Analyses of the irradiated dry diet provided data to evaluate its nutrient content. The diet was evaluated for its ability to supply all nutrients, including water, required by immature rats. Sixteen Sprague-Dawley rats were fed the high-moisture diet with or without access to a water bottle. Rats (n = 16) fed an irradiated purified diet in a meal form with access to a water bottle were the control animals. Feed efficiency, food and water consumption, and growth rate data were collected during the 28-day study. Organ weights were collected on day 28. The test diet met or exceeded the National Research Council (NRC) estimated nutritional requirements for immature laboratory rats. The 66% moisture KSC-25 diet provided all nutrients, including water, required by weanling male Sprague-Dawley rats for growth equivalent to the established purified diet.
Hawk, Mary
2013-12-01
African American women in the United States experience significant HIV health disparities. The majority of evidence-based risk reduction interventions do not incorporate HIV testing, and most are targeted only to narrow segments of the population such as women who are pregnant or seen in STI clinics. This pilot study assessed the feasibility and efficacy of The Girlfriends Project (TGP), a community developed and community evaluated HIV risk reduction and testing intervention. A group randomized wait-list design was used to recruit 149 women and to compare findings for intervention group versus control group participants. Women in the intervention group demonstrated statistically-significant increases in HIV knowledge scores and in condom use during vaginal sex. Eighty-seven percent of participants accessed HIV testing with a 100% return rate for results. Study findings suggest that TGP has the potential to be an effective intervention and to increase number of African American women who access HIV testing.
Brown, Joe; Cumming, Oliver; Bartram, Jamie; Cairncross, Sandy; Ensink, Jeroen; Holcomb, David; Knee, Jackie; Kolsky, Peter; Liang, Kaida; Liang, Song; Nala, Rassul; Norman, Guy; Rheingans, Richard; Stewart, Jill; Zavale, Olimpio; Zuin, Valentina; Schmidt, Wolf-Peter
2015-01-01
Introduction Access to safe sanitation in low-income, informal settlements of Sub-Saharan Africa has not significantly improved since 1990. The combination of a high faecal-related disease burden and inadequate infrastructure suggests that investment in expanding sanitation access in densely populated urban slums can yield important public health gains. No rigorous, controlled intervention studies have evaluated the health effects of decentralised (non-sewerage) sanitation in an informal urban setting, despite the role that such technologies will likely play in scaling up access. Methods and analysis We have designed a controlled, before-and-after (CBA) trial to estimate the health impacts of an urban sanitation intervention in informal neighbourhoods of Maputo, Mozambique, including an assessment of whether exposures and health outcomes vary by localised population density. The intervention consists of private pour-flush latrines (to septic tank) shared by multiple households in compounds or household clusters. We will measure objective health outcomes in approximately 760 children (380 children with household access to interventions, 380 matched controls using existing shared private latrines in poor sanitary conditions), at 2 time points: immediately before the intervention and at follow-up after 12 months. The primary outcome is combined prevalence of selected enteric infections among children under 5 years of age. Secondary outcome measures include soil-transmitted helminth (STH) reinfection in children following baseline deworming and prevalence of reported diarrhoeal disease. We will use exposure assessment, faecal source tracking, and microbial transmission modelling to examine whether and how routes of exposure for diarrhoeagenic pathogens and STHs change following introduction of effective sanitation. Ethics Study protocols have been reviewed and approved by human subjects review boards at the London School of Hygiene and Tropical Medicine, the Georgia Institute of Technology, the University of North Carolina at Chapel Hill, and the Ministry of Health, Republic of Mozambique. Trial registration number NCT02362932. PMID:26088809
Zheng, Mengyi; McClay, Carrie-Anne; Wilson, Sarah; Williams, Christopher
2015-01-01
Low mood is a common mental health problem affecting up to 121 million people worldwide and is common in students, particularly international students. Cognitive behavioural therapy (CBT) is known to be effective as a treatment for low mood and anxiety when delivered one to one by an expert practitioner, however this can be expensive and many services have waiting lists and delayed access. A range of additional ways of increasing access to services includes the offer of online courses such as computerised CBT as a possible additional pathway for care. This project aims to test the feasibility of a pilot randomised controlled trial of an online CBT-based life skills course with Chinese-speaking international students experiencing low mood and anxiety. Chinese-speaking international students with symptoms of low mood and/or anxiety will be recruited from the University of Glasgow, Scotland. Participants will be remotely randomised to receive either immediate access (IA) or delayed access (DA) to a guided/supported online CBT-based life skills package, the "Living Life" package (Chinese version). Participants will be randomly assigned to IA or DA to the intervention. The primary end point will be at 3 months when the delayed group will be offered the intervention. Levels of depression, anxiety, social functioning and satisfaction will be assessed. This pilot study will test the trial design, ability to recruit, gather completed questionnaires, test drop-out rates and investigate completion and acceptability of the package. The study aims to reduce uncertainties about the delivery of a future substantive study and will also inform a sample size calculation for that subsequent substantive randomised controlled trial (RCT) which will be carried out to determine the effectiveness of the online package in improving low mood and anxiety in the Chinese-speaking student population. Current Controlled Trials ISRCTN30816908.
Harper, Felicity W K; Eggly, Susan; Crider, Beverly; Kobayashi, Hitomi; Kathleen, R N; Meert, L; Ball, Allison; Penner, Louis A; Gray, Herman; Albrecht, Terrance L
2015-06-01
We thank Cathy Eames (Director, Library Services, Detroit Medical Center) for valuable input and assistance with the search strategy. Funding for this research was supported by a grant from Children's Hospital of Michigan Research Foundation (Principal Investigator: Terrance L. Albrecht, Ph.D.). Patient- and family-centered care (PFCC) has the potential to address disparities in access and quality of healthcare for African American pediatric asthma patients by accommodating and responding to the individual needs of patients and families. To identify and evaluate research on the impact of family-provider interventions that reflect elements of PFCC on reducing disparities in the provision, access, quality, and use of healthcare services for African American pediatric asthma patients. Electronic searches were conducted using PubMed, CINAHL, and Psyclnfo databases. Inclusion criteria were peer-reviewed, English-language articles on family-provider interventions that (a) reflected one or more elements of PFCC and (b) addressed healthcare disparities in urban African American pediatric asthma patients (≤18years). Thirteen interventions or programs were identified and reviewed. Designs included randomized clinical trials, controlled clinical trials, pre- and post-interventions, and program evaluations. Few interventions were identified as explicitly providing PFCC in a pediatric asthma context, possibly because of a lack of consensus on what constitutes PFCC in practice. Some studies have demonstrated that PFCC improves satisfaction and communication during clinical interactions. More empirical research is needed to understand whether PFCC interventions reduce care disparities and improve the provision, access, and quality of asthma healthcare for urban African American children. PubMed, CINAHL, and Psyclnfo AA-African American: CCT-Controlled clinical trial; ED-Emergency Department; ETS-Environmental tobacco smoke; FCC- Family Centered Care; PFCC-Patient and Family Centered Care; RCT- Randomized, controlled trial. © 2015 National Medical Association. Published by Elsevier Inc. All rights reserved.
Access control for electronic patient records.
Glagola, M J
1998-01-01
The transition from hardcopy records to electronic records is in the forefront for healthcare today. For healthcare facilities, a major issue is determining who can access patients' medical information and how access to this information can be controlled. There are three components to access control: identification, authentication and authorization. Checking proof of identity is a means of authenticating someone--through a driver's license, passport or their fingerprints. Similar processes are needed in a computer environment, through the use of passwords, one-time passwords or smartcards, encryption and kerberos, and call-back procedures. New in the area of access control are biometric devices, which are hardware/software combinations that digitize a physical characteristic and compare the sample with previously stored samples. Fingerprints, voiceprints and facial features are examples. Their cost is currently prohibitive, but in time, they may become more common. Digital certificates and certification authorities are other means used to authenticate identify. When a system challenges a user's identity at log on, the user provides a certification that tells the system to go to the issuing certification authority and find proof the user's claim is valid. Low-level certifications offer little value for sensitive data, but high-level certification is now being introduced. It requires more specific, detailed information on the applicant. Authorization, the final component of access control, establishes what a specific user can and cannot access. To have effective access control, transaction logging and system monitoring are needed to ensure the various techniques are being used and performing properly.
Round, Jeff; Drake, Robyn; Kendall, Edward; Addicott, Rachael; Agelopoulos, Nicky; Jones, Louise
2015-01-01
Objectives We report the use of difference in differences (DiD) methodology to evaluate a complex, system-wide healthcare intervention. We use the worked example of evaluating the Marie Curie Delivering Choice Programme (DCP) for advanced illness in a large urban healthcare economy. Methods DiD was selected because a randomised controlled trial was not feasible. The method allows for before and after comparison of changes that occur in an intervention site with a matched control site. This enables analysts to control for the effect of the intervention in the absence of a local control. Any policy, seasonal or other confounding effects over the test period are assumed to have occurred in a balanced way at both sites. Data were obtained from primary care trusts. Outcomes were place of death, inpatient admissions, length of stay and costs. Results Small changes were identified between pre- and post-DCP outputs in the intervention site. The proportion of home deaths and median cost increased slightly, while the number of admissions per patient and the average length of stay per admission decreased slightly. None of these changes was statistically significant. Conclusions Effects estimates were limited by small numbers accessing new services and selection bias in sample population and comparator site. In evaluating the effect of a complex healthcare intervention, the choice of analysis method and output measures is crucial. Alternatives to randomised controlled trials may be required for evaluating large scale complex interventions and the DiD approach is suitable, subject to careful selection of measured outputs and control population. PMID:24644163
Mixed-methods evaluation of a novel online STI results service.
Gibbs, Jo; Aicken, Catherine R H; Sutcliffe, Lorna J; Gkatzidou, Voula; Tickle, Laura J; Hone, Kate; Sadiq, S Tariq; Sonnenberg, Pam; Estcourt, Claudia S
2018-01-11
Evidence on optimal methods for providing STI test results is lacking. We evaluated an online results service, developed as part of an eSexual Health Clinic (eSHC). We evaluated the online results service using a mixed-methods approach within large exploratory studies of the eSHC. Participants were chlamydia- positive and negative users of online postal self-sampling services in six National Chlamydia Screening Programme (NCSP) areas and chlamydia-positive patients from two genitourinary medicine (GUM) clinics between 21 July 2014 and 13 March 2015. Participants received a discreetly worded National Health Service 'NHS no-reply' text message (SMS) informing them that their test results were ready and providing a weblink to a secure website. Participants logged in with their date of birth and mobile telephone or clinic number. Chlamydia-positive patients were offered online management. All interactions with the eSHC system were automatically logged and their timing recorded. Post-treatment, a service evaluation survey (n=152) and qualitative interviews (n=36) were conducted by telephone. Chlamydia-negative patients were offered a short online survey (n=274). Data were integrated. 92% (134/146) of NCSP chlamydia-positive patients, 82% (161/197) of GUM chlamydia-positive patients and 89% (1776/1997) of NCSP chlamydia-negative participants accessed test results within 7 days. 91% of chlamydia-positive patients were happy with the results service; 64% of those who had tested previously found the results service better or much better than previous experiences. 90% of chlamydia-negative survey participants agreed they would be happy to receive results this way in the future. Interviewees described accessing results with ease and appreciated the privacy and control the two-step process gave them. A discreet SMS to alert users/patients that results are available, followed by provision of results via a secure website, was highly acceptable, irrespective of test result and testing history. The eSHC results service afforded users privacy and control over when they viewed results without compromising access. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Stevenson, E. G. J.; Ambelu, A.; Caruso, B. A.; Tesfaye, Y.; Freeman, M. C.
2016-01-01
Background Over 650 million people worldwide lack access to safe water supplies, and even among those who have gained access to ‘improved’ sources, water may be seasonally unreliable, far from homes, expensive, and provide insufficient quantity. Measurement of water access at the level of communities and households remains crude, and better measures of household water insecurity are urgently needed to inform needs assessments and monitoring and evaluation. We set out to assess the validity of a quantitative scale of household water insecurity, and to investigate (1) whether improvements to community water supply reduce water insecurity, (2) whether water interventions affect women’s psychological distress, and (3) the impacts of water insecurity on psychological distress, independent of socio-economic status, food security, and harvest quality. Methods and Findings Measures were taken before and one to six months after a community water supply improvement in three villages in rural northern Ethiopia. Villages similar in size and access to water sources and other amenities did not receive interventions, and served as controls. Household water insecurity was assessed using a 21-item scale based on prior qualitative work in Ethiopia. Women’s psychological distress was assessed using the WHO Self-Reporting Questionnaire (SRQ-20). Respondents were either female heads of household or wives of the heads of household (n = 247 at baseline, n = 223 at endline); 123 households provided data at both rounds. The intervention was associated with a decline of approximately 2 points on the water insecurity scale between baseline and endline compared to the control (beta -1.99; 95% CI’s -3.15, -0.84). We did not find evidence of impact of the intervention on women’s psychological distress. Water insecurity was, however, predictive of psychological distress (p <0.01), independent of household food security and the quality of the previous year’s harvest. Conclusion These results contribute to the construct validity of our water insecurity scale, and establish our approach to measuring water insecurity as a plausible means of evaluating water interventions. Improvements to community water supplies were effective in reducing household water insecurity, but not psychological distress, in this population. Water insecurity was an important predictor of psychological distress. This study contributes to an emerging literature on quantitative assessment of household water insecurity, and draws attention to the potential impact of improved access to water on women’s mental well-being. PMID:27124391
Review of manual control methods for handheld maneuverable instruments.
Fan, Chunman; Dodou, Dimitra; Breedveld, Paul
2013-06-01
By the introduction of new technologies, surgical procedures have been varying from free access in open surgery towards limited access in minimal access surgery. Improving access to difficult-to-reach anatomic sites, e.g. in neurosurgery or percutaneous interventions, needs advanced maneuverable instrumentation. Advances in maneuverable technology require the development of dedicated methods enabling surgeons to stay in direct, manual control of these complex instruments. This article gives an overview of the state-of-the-art in the development of manual control methods for handheld maneuverable instruments. It categorizes the manual control methods in three levels: a) number of steerable segments, b) number of Degrees Of Freedom (DOF), and c) coupling between control motion of the handle and steering motion of the tip. The literature research was completed by using Web of Science, Scopus and PubMed. The study shows that in controlling single steerable segments, direct as well as indirect control methods have been developed, whereas in controlling multiple steerable segments, a gradual shift can be noticed from parallel and serial control to integrated control. The development of multi-segmented maneuverable instruments is still at an early stage, and an intuitive and effective method to control them has to become a primary focus in the domain of minimal access surgery.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-16
... the firm controls access to market data and not for external interrogation devices or internal interrogation devices for which a vendor (and not the firm) controls access to market data. This program better... that its employees use and in respect of which the firm controls access to market data. The...
On the Design of a Comprehensive Authorisation Framework for Service Oriented Architecture (SOA)
2013-07-01
Authentication Server AZM Authorisation Manager AZS Authorisation Server BP Business Process BPAA Business Process Authorisation Architecture BPAD Business...Internet Protocol Security JAAS Java Authentication and Authorisation Service MAC Mandatory Access Control RBAC Role Based Access Control RCA Regional...the authentication process, make authorisation decisions using application specific access control functions that results in the practice of
2012-01-01
Background Children of substance-abusing parents are at risk for developing psychosocial development problems. In Germany it is estimated that approx. 2.65 million children are affected by parental substance abuse or dependence. Only ten percent of them receive treatment when parents are treated. To date, no evaluated programme for children from substance-affected families exists in Germany. The study described in this protocol is designed to test the effectiveness of the group programme TRAMPOLINE for children aged 8-12 years with at least one substance-abusing or -dependent caregiver. The intervention is specifically geared to issues and needs of children from substance-affected families. Methods/Design The effectiveness of the manualised nine-session group programme TRAMPOLINE is tested among N = 218 children from substance-affected families in a multicentre randomised controlled trial. Outpatient counselling facilities across the nation from different settings (rural/urban, Northern/Southern/Eastern/Western regions of the country) will deliver the interventions, as they hold the primary access to the target group in Germany. The control condition is a group programme with the same duration that is not addiction-specific. We expect that participants in the intervention condition will show a significant improvement in the use of adaptive coping strategies (in general and within the family) compared to the control condition as a direct result of the intervention. Data is collected shortly before and after as well as six months after the intervention. Discussion In Germany, the study presented here is the first to develop and evaluate a programme for children of substance-abusing parents. Limitations and strengths are discussed with a special focus on recruitment challenges as they appear to be the most potent threat to feasibility in the difficult-to-access target group at hand (Trial registration: ISRCTN81470784). PMID:22439919
Bröning, Sonja; Wiedow, Annika; Wartberg, Lutz; Ruths, Sylvia; Haevelmann, Andrea; Kindermann, Sally-Sophie; Moesgen, Diana; Schaunig-Busch, Ines; Klein, Michael; Thomasius, Rainer
2012-03-22
Children of substance-abusing parents are at risk for developing psychosocial development problems. In Germany it is estimated that approx. 2.65 million children are affected by parental substance abuse or dependence. Only ten percent of them receive treatment when parents are treated. To date, no evaluated programme for children from substance-affected families exists in Germany. The study described in this protocol is designed to test the effectiveness of the group programme TRAMPOLINE for children aged 8-12 years with at least one substance-abusing or -dependent caregiver. The intervention is specifically geared to issues and needs of children from substance-affected families. The effectiveness of the manualised nine-session group programme TRAMPOLINE is tested among N = 218 children from substance-affected families in a multicentre randomised controlled trial. Outpatient counselling facilities across the nation from different settings (rural/urban, Northern/Southern/Eastern/Western regions of the country) will deliver the interventions, as they hold the primary access to the target group in Germany. The control condition is a group programme with the same duration that is not addiction-specific. We expect that participants in the intervention condition will show a significant improvement in the use of adaptive coping strategies (in general and within the family) compared to the control condition as a direct result of the intervention. Data is collected shortly before and after as well as six months after the intervention. In Germany, the study presented here is the first to develop and evaluate a programme for children of substance-abusing parents. Limitations and strengths are discussed with a special focus on recruitment challenges as they appear to be the most potent threat to feasibility in the difficult-to-access target group at hand (Trial registration: ISRCTN81470784).
Thorne, B L; Breisch, N L; Scherer, C W
2015-10-01
Soil-applied liquid termiticides are the most common control measure for subterranean termites. Characteristics unique to insecticidal chemistries such as repellency, toxicity, and time between contact and mortality, influence the interaction of termites with treated soil and overall treatment success. Two different treated-tunnel bioassays were used to evaluate the behavioral impacts and mortality of termites from treatment with chlorantraniliprole (the active ingredient in Altriset® termiticide) to existing, mature tunnels. Termites that were provided constant access to a 10-cm-long mature tunnel within soil treated with 5 or 50 ppm chlorantraniliprole were not repelled by the treatment and began exhibiting slower, uncoordinated movement, and cessation of tunneling and feeding in as little as 1 h after access. Termites provided access for 7, 14, or 21 d to previously constructed tunnels recently treated with 50 ppm chlorantraniliprole exhibited complete or near complete mortality by 28 d. The second bioassay design resembled a more typical field situation with a 40-cm-long mature tunnel and termites allowed access for a maximum of 5 min. Termites collected after just 5 min of access to the previously constructed tunnels recently treated with 50 ppm chlorantraniliprole exhibited similar symptomology within an hour followed by complete mortality at 18 d after exposure. These test designs simulate what occurs in the soil around an infested structure at the time of treatment. Results from these evaluations suggest that termites readily crawl through chlorantraniliprole-treated mature tunnels, rapidly lose ability to feed, and acquire a lethal dose from brief exposures. © The Authors 2015. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
An operational system for subject switching between controlled vocabularies
NASA Technical Reports Server (NTRS)
Silvester, June P.; Klingbiel, Paul H.
1993-01-01
The NASA system of automatically converting sets of terms assigned by Department of Defense indexers to sets of NASA's authorized terms is described. This little-touted system, which has been operating successfully since 1983, matches concepts, rather than words. Subject Switching uses a translation table, known as the Lexical Dictionary, accessed by a program that determines which rules to follow in making the transition from DTIC's to NASA's authorized terms. The authors describe the four phases of development of Subject Switching, changes that have been made, evaluating the system, and benefits. Benefits to NASA include saving indexers' time, the addition of access points for documents indexed, the utilization of other government indexing, and a contribution towards the now-operational NASA, online, interactive, machine aided indexing.
Toward Privacy-preserving Content Access Control for Information Centric Networking
2014-03-01
REPORT Toward Privacy-preserving Content Access Control for Information Centric Networking 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Information...regardless the security mechanisms provided by different content hosting servers. However, using ABE has a drawback that the enforced content access...Encryption (ABE) is a flexible approach to enforce the content access policies regardless the security mechanisms provided by different content hosting
Masa, Rainier; Chowa, Gina; Nyirenda, Victor
2018-01-01
The objective of this study was to evaluate the impact of Chuma na Uchizi, a livelihood intervention for people living with HIV (PLHIV) in rural Eastern Province, Zambia, on food security. The intervention included cash transfers to purchase income-generating assets, access to a savings account, and life-skills training. The study employed a non-equivalent groups design to compare intervention (n = 50) and control participants (n = 51) who were receiving outpatient care from two comparable health facilities in distinct constituencies in the same geographic area. We collected data before and after implementation of the intervention. Chuma na Uchizi improved access to food. At follow-up, the intervention group reported lower food insecurity scores compared with the control group (β = -5.65; 95% CI - 10.85 --0.45). Livelihood programs for PLHIV are practical and may be a promising approach to address food insecurity and its adverse effects.
Securely and Flexibly Sharing a Biomedical Data Management System
Wang, Fusheng; Hussels, Phillip; Liu, Peiya
2011-01-01
Biomedical database systems need not only to address the issues of managing complex data, but also to provide data security and access control to the system. These include not only system level security, but also instance level access control such as access of documents, schemas, or aggregation of information. The latter is becoming more important as multiple users can share a single scientific data management system to conduct their research, while data have to be protected before they are published or IP-protected. This problem is challenging as users’ needs for data security vary dramatically from one application to another, in terms of who to share with, what resources to be shared, and at what access level. We develop a comprehensive data access framework for a biomedical data management system SciPort. SciPort provides fine-grained multi-level space based access control of resources at not only object level (documents and schemas), but also space level (resources set aggregated in a hierarchy way). Furthermore, to simplify the management of users and privileges, customizable role-based user model is developed. The access control is implemented efficiently by integrating access privileges into the backend XML database, thus efficient queries are supported. The secure access approach we take makes it possible for multiple users to share the same biomedical data management system with flexible access management and high data security. PMID:21625285
Utz, Bettina; Assarag, Bouchra; Essolbi, Amina; Barkat, Amina; El Ansari, Nawal; Fakhir, Bouchra; Delamou, Alexandre; De Brouwere, Vincent
2017-06-19
Morocco is facing a growing prevalence of diabetes and according to latest figures of the World Health Organization, already 12.4% of the population are affected. A similar prevalence has been reported for gestational diabetes (GDM) and although it is not yet high on the national agenda, immediate and long-term complications threaten the health of mothers and future generations. A situational analysis on GDM conducted in 2015 revealed difficulties in access to screening and delays in receiving appropriate care. This implementation study has as objective to evaluate a decentralized GDM detection and management approach through the primary level of care and assess its potential for scaling up. We will conduct a hybrid effectiveness-implementation research using a cluster randomized controlled trial design in two districts of Morocco. Using the health center as unit of randomization we randomly selected 20 health centers with 10 serving as intervention and 10 as control facilities. In the intervention arm, providers will screen pregnant women attending antenatal care for GDM by capillary glucose testing during antenatal care. Women tested positive will receive nutritional counselling and will be followed up through the health center. In the control facilities, screening and initial management of GDM will follow standard practice. Primary outcome will be birthweight with weight gain during pregnancy, average glucose levels and pregnancy outcomes including mode of delivery, presence or absence of obstetric or newborn complications and the prevalence of GDM at health center level as secondary outcomes. Furthermore we will assess the quality of life /care experienced by the women in both arms. Qualitative methods will be applied to evaluate the feasibility of the intervention at primary level and its adoption by the health care providers. In Morocco, gestational diabetes screening and its initial management is fragmented and coupled with difficulties in access and treatment delays. Implementation of a strategy that enables detection, management and follow-up of affected women at primary health care level is expected to positively impact on access to care and medical outcomes. The trial has been registered on clininicaltrials.gov ; identifier NCT02979756 ; retrospectively registered 22 November 2016.
Othim, Stephen T O; Ramasamy, Srinivasan; Kahuthia-Gathu, Ruth; Dubois, Thomas; Ekesi, Sunday; Fiaboe, Komi K M
2018-06-08
Spoladea recurvalis F. is a major pest moth of amaranth ( Amaranthus spp.) flowers worldwide, with a potential of causing complete foliage loss under severe outbreaks. Chemical insecticides are uneconomical for resource-poor farmers and pose health and environmental risks. Host plant resistance (HPR) to insects is an effective, economical and environmentally friendly alternative that is poorly understood and largely unexploited among traditional leafy vegetables. A total of 35 amaranth accessions were evaluated for the expression of their antixenotic and antibiotic traits against S. recurvalis , focusing on their effects on the biology of the pest in comparison with a susceptible accession. The accession VI036227 was found to be highly resistant against the pest, exhibiting exemplary antibiosis by causing 100% larval mortality within the first 36 h, despite not being deterrent for oviposition. The accessions VI048076, VI056563 and VI047555-B demonstrated moderate resistance against the pest for specific parameters including low oviposition, moderate early stage larval mortality and reduced adult longevity. Total mortality and weight gain in these three accessions were, however, not significantly different from the susceptible control. Higher numbers of eggs were laid in no-choice compared to choice situations. The implications of these findings in the management of S. recurvalis on amaranths are discussed.
LTE-advanced random access mechanism for M2M communication: A review
NASA Astrophysics Data System (ADS)
Mustafa, Rashid; Sarowa, Sandeep; Jaglan, Reena Rathee; Khan, Mohammad Junaid; Agrawal, Sunil
2016-03-01
Machine Type Communications (MTC) enables one or more self-sufficient machines to communicate directly with one another without human interference. MTC applications include smart grid, security, e-Health and intelligent automation system. To support huge numbers of MTC devices, one of the challenging issues is to provide a competent way for numerous access in the network and to minimize network overload. In this article, the different control mechanisms for overload random access are reviewed to avoid congestion caused by random access channel (RACH) of MTC devices. However, past and present wireless technologies have been engineered for Human-to-Human (H2H) communications, in particular, for transmission of voice. Consequently the Long Term Evolution (LTE) -Advanced is expected to play a central role in communicating Machine to Machine (M2M) and are very optimistic about H2H communications. Distinct and unique characteristics of M2M communications create new challenges from those in H2H communications. In this article, we investigate the impact of massive M2M terminals attempting random access to LTE-Advanced all at once. We discuss and review the solutions to alleviate the overload problem by Third Generation Partnership Project (3GPP). As a result, we evaluate and compare these solutions that can effectively eliminate the congestion on the random access channel for M2M communications without affecting H2H communications.
Dei, Vincent; Sebastian, Miguel San
2018-06-20
There is a lack of focused research on the older population in Ghana and about issues pertaining to their access to healthcare services. Furthermore, information is lacking regarding the fairness in the access to these services. This study aimed to ascertain whether horizontal and vertical equity requirements were being met in the healthcare utilisation among older adults aged 50 years and above. This study was based on a secondary cross-sectional data from the World Health Organization's Study on global AGEing (SAGE) and adult health wave 1 conducted from 2007 to 2008 in Ghana. Data on 4304 older adults aged 50 years-plus were analysed. Bivariate and multivariable analyses were carried out to analyse the association between outpatient/inpatient utilisation and (1) socioeconomic status (SES), controlling for need variables (horizontal equity) and (2) need variables, controlling for SES (vertical equity). Odds ratios with 95% confidence intervals were calculated to analyse the association between relevant variables. Horizontal and vertical inequities were found in the utilisation of outpatient services. Inpatient healthcare utilisation was both horizontally and vertically equitable. Women were found to be more likely to use outpatient services than men but had reduced odds of using inpatient services. Possessing a health insurance was also significantly associated with the use of both inpatient and outpatient services. Whilst equity exists in inpatient care utilisation, more needs to be done to achieve equity in the access to outpatient services. The study reaffirms the need to evaluate both the horizontal and vertical dimensions in the assessment of equity in healthcare access. It provides the basis for further research in bridging the healthcare access inequity gap among older adults in Ghana.
Genetic Diversity of Aromatic Rice Germplasm Revealed By SSR Markers.
Jasim Aljumaili, Saba; Rafii, M Y; Latif, M A; Sakimin, Siti Zaharah; Arolu, Ibrahim Wasiu; Miah, Gous
2018-01-01
Aromatic rice cultivars constitute a small but special group of rice and are considered the best in terms of quality and aroma. Aroma is one of the most significant quality traits of rice, and variety with aroma has a higher price in the market. This research was carried out to study the genetic diversity among the 50 aromatic rice accessions from three regions (Peninsular Malaysia, Sabah, and Sarawak) with 3 released varieties as a control using the 32 simple sequence repeat (SSR) markers. The objectives of this research were to quantify the genetic divergence of aromatic rice accessions using SSR markers and to identify the potential accessions for introgression into the existing rice breeding program. Genetic diversity index among the three populations such as Shannon information index ( I ) ranged from 0.25 in control to 0.98 in Sabah population. The mean numbers of effective alleles and Shannon's information index were 0.36 and 64.90%, respectively. Similarly, the allelic diversity was very high with mean expected heterozygosity ( H e ) of 0.60 and mean Nei's gene diversity index of 0.36. The dendrogram based on UPGMA and Nei's genetic distance classified the 53 rice accessions into 10 clusters. Analysis of molecular variance (AMOVA) revealed that 89% of the total variation observed in this germplasm came from within the populations, while 11% of the variation emanated among the populations. These results reflect the high genetic differentiation existing in this aromatic rice germplasm. Using all these criteria and indices, seven accessions (Acc9993, Acc6288, Acc6893, Acc7580, Acc6009, Acc9956, and Acc11816) from three populations have been identified and selected for further evaluation before introgression into the existing breeding program and for future aromatic rice varietal development.
Genetic Diversity of Aromatic Rice Germplasm Revealed By SSR Markers
Jasim Aljumaili, Saba; Sakimin, Siti Zaharah; Arolu, Ibrahim Wasiu; Miah, Gous
2018-01-01
Aromatic rice cultivars constitute a small but special group of rice and are considered the best in terms of quality and aroma. Aroma is one of the most significant quality traits of rice, and variety with aroma has a higher price in the market. This research was carried out to study the genetic diversity among the 50 aromatic rice accessions from three regions (Peninsular Malaysia, Sabah, and Sarawak) with 3 released varieties as a control using the 32 simple sequence repeat (SSR) markers. The objectives of this research were to quantify the genetic divergence of aromatic rice accessions using SSR markers and to identify the potential accessions for introgression into the existing rice breeding program. Genetic diversity index among the three populations such as Shannon information index (I) ranged from 0.25 in control to 0.98 in Sabah population. The mean numbers of effective alleles and Shannon's information index were 0.36 and 64.90%, respectively. Similarly, the allelic diversity was very high with mean expected heterozygosity (He) of 0.60 and mean Nei's gene diversity index of 0.36. The dendrogram based on UPGMA and Nei's genetic distance classified the 53 rice accessions into 10 clusters. Analysis of molecular variance (AMOVA) revealed that 89% of the total variation observed in this germplasm came from within the populations, while 11% of the variation emanated among the populations. These results reflect the high genetic differentiation existing in this aromatic rice germplasm. Using all these criteria and indices, seven accessions (Acc9993, Acc6288, Acc6893, Acc7580, Acc6009, Acc9956, and Acc11816) from three populations have been identified and selected for further evaluation before introgression into the existing breeding program and for future aromatic rice varietal development. PMID:29736396
Variation in cassava germplasm for tolerance to post-harvest physiological deterioration.
Venturini, M T; Santos, L R; Vildoso, C I A; Santos, V S; Oliveira, E J
2016-05-06
Tolerant varieties can effectively control post-harvest physiological deterioration (PPD) of cassava, although knowledge on the genetic variability and inheritance of this trait is needed. The objective of this study was to estimate genetic parameters and identify sources of tolerance to PPD and their stability in cassava accessions. Roots from 418 cassava accessions, grown in four independent experiments, were evaluated for PPD tolerance 0, 2, 5, and 10 days post-harvest. Data were transformed into area under the PPD-progress curve (AUP-PPD) to quantify tolerance. Genetic parameters, stability (Si), adaptability (Ai), and the joint analysis of stability and adaptability (Zi) were obtained via residual maximum likelihood (REML) and best linear unbiased prediction (BLUP) methods. Variance in the genotype (G) x environment (E) interaction and genotypic variance were important for PPD tolerance. Individual broad-sense heritability (hg(2)= 0.38 ± 0.04) and average heritability in accessions (hmg(2)= 0.52) showed high genetic control of PPD tolerance. Genotypic correlation of AUP-PPD in different experiments was of medium magnitude (ȓgA = 0.42), indicating significant G x E interaction. The predicted genotypic values o f G x E free of interaction (û + ĝi) showed high variation. Of the 30 accessions with high Zi, 19 were common to û + ĝi, Si, and Ai parameters. The genetic gain with selection of these 19 cassava accessions was -55.94, -466.86, -397.72, and -444.03% for û + ĝi, Si, Ai, and Zi, respectively, compared with the overall mean for each parameter. These results demonstrate the variability and potential of cassava germplasm to introduce PPD tolerance in commercial varieties.
Two Mechanisms to Avoid Control Conflicts Resulting from Uncoordinated Intent
NASA Technical Reports Server (NTRS)
Mishkin, Andrew H.; Dvorak, Daniel L.; Wagner, David A.; Bennett, Matthew B.
2013-01-01
This software implements a real-time access control protocol that is intended to make all connected users aware of the presence of other connected users, and which of them is currently in control of the system. Here, "in control" means that a single user is authorized and enabled to issue instructions to the system. The software The software also implements a goal scheduling mechanism that can detect situations where plans for the operation of a target system proposed by different users overlap and interact in conflicting ways. In such situations, the system can either simply report the conflict (rejecting one goal or the entire plan), or reschedule the goals in a way that does not conflict. The access control mechanism (and associated control protocol) is unique. Other access control mechanisms are generally intended to authenticate users, or exclude unauthorized access. This software does neither, and would likely depend on having some other mechanism to support those requirements.
Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds.
Guo, Cheng; Zhuang, Ruhan; Jie, Yingmo; Ren, Yizhi; Wu, Ting; Choo, Kim-Kwang Raymond
2016-11-01
An effectively designed e-healthcare system can significantly enhance the quality of access and experience of healthcare users, including facilitating medical and healthcare providers in ensuring a smooth delivery of services. Ensuring the security of patients' electronic health records (EHRs) in the e-healthcare system is an active research area. EHRs may be outsourced to a third-party, such as a community healthcare cloud service provider for storage due to cost-saving measures. Generally, encrypting the EHRs when they are stored in the system (i.e. data-at-rest) or prior to outsourcing the data is used to ensure data confidentiality. Searchable encryption (SE) scheme is a promising technique that can ensure the protection of private information without compromising on performance. In this paper, we propose a novel framework for controlling access to EHRs stored in semi-trusted cloud servers (e.g. a private cloud or a community cloud). To achieve fine-grained access control for EHRs, we leverage the ciphertext-policy attribute-based encryption (CP-ABE) technique to encrypt tables published by hospitals, including patients' EHRs, and the table is stored in the database with the primary key being the patient's unique identity. Our framework can enable different users with different privileges to search on different database fields. Differ from previous attempts to secure outsourcing of data, we emphasize the control of the searches of the fields within the database. We demonstrate the utility of the scheme by evaluating the scheme using datasets from the University of California, Irvine.
Two decades of reforms. Appraisal of the financial reforms in the Russian public healthcare sector.
Gordeev, Vladimir S; Pavlova, Milena; Groot, Wim
2011-10-01
This paper reviews the empirical evidence on the outcomes of the financial reforms in the Russian public healthcare sector. A systematic literature review identified 37 relevant publications that presented empirical evidence on changes in quality, equity, efficiency and sustainability in public healthcare provision due to the Russian public healthcare financial reforms. Evidence suggests that there are substantial inter-regional inequalities across income groups both in terms of financing and access to public healthcare services. There are large efficiency differences between regions, along with inter-regional variations in payment and reimbursement mechanisms. Informal and quasi-formal payments deteriorate access to public healthcare services and undermine the overall financing sustainability. The public healthcare sector is still underfinanced, although the implementation of health insurance gave some premises for future increases of efficiency. Overall, the available empirical data are not sufficient for an evidence-based evaluation of the reforms. More studies on the quality, equity, efficiency and sustainability impact of the reforms are needed. Future reforms should focus on the implementation of cost-efficiency and cost-control mechanisms; provide incentives for better allocation and distribution of resources; tackle problems in equity in access and financing; implement a system of quality controls; and stimulate healthy competition between insurance companies. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.
Syphard, Alexandra D.; Keeley, Jon E.; Brennan, Teresa J.
2011-01-01
As wildfires have increased in frequency and extent, so have the number of homes developed in the wildland-urban interface. In California, the predominant approach to mitigating fire risk is construction of fuel breaks, but there has been little empirical study of their role in controlling large fires.We constructed a spatial database of fuel breaks on the Los Padres National Forest in southern California to better understand characteristics of fuel breaks that affect the behaviour of large fires and to map where fires and fuel breaks most commonly intersect. We evaluated whether fires stopped or crossed over fuel breaks over a 28-year period and compared the outcomes with physical characteristics of the sites, weather and firefighting activities during the fire event. Many fuel breaks never intersected fires, but others intersected several, primarily in historically fire-prone areas. Fires stopped at fuel breaks 46% of the time, almost invariably owing to fire suppression activities. Firefighter access to treatments, smaller fires and longer fuel breaks were significant direct influences, and younger vegetation and fuel break maintenance indirectly improved the outcome by facilitating firefighter access. This study illustrates the importance of strategic location of fuel breaks because they have been most effective where they provided access for firefighting activities.
An energy-efficient rate adaptive media access protocol (RA-MAC) for long-lived sensor networks.
Hu, Wen; Chen, Quanjun; Corke, Peter; O'Rourke, Damien
2010-01-01
We introduce an energy-efficient Rate Adaptive Media Access Control (RA-MAC) algorithm for long-lived Wireless Sensor Networks (WSNs). Previous research shows that the dynamic and lossy nature of wireless communications is one of the major challenges to reliable data delivery in WSNs. RA-MAC achieves high link reliability in such situations by dynamically trading off data rate for channel gain. The extra gain that can be achieved reduces the packet loss rate which contributes to reduced energy expenditure through a reduced numbers of retransmissions. We achieve this at the expense of raw bit rate which generally far exceeds the application's link requirement. To minimize communication energy consumption, RA-MAC selects the optimal data rate based on the estimated link quality at each data rate and an analytical model of the energy consumption. Our model shows how the selected data rate depends on different channel conditions in order to minimize energy consumption. We have implemented RA-MAC in TinyOS for an off-the-shelf sensor platform (the TinyNode) on top of a state-of-the-art WSN Media Access Control Protocol, SCP-MAC, and evaluated its performance by comparing our implementation with the original SCP-MAC using both simulation and experiment.
MED31/437: A Web-based Diabetes Management System: DiabNet
Zhao, N; Roudsari, A; Carson, E
1999-01-01
Introduction A web-based system (DiabNet) was developed to provide instant access to the Electronic Diabetes Records (EDR) for end-users, and real-time information for healthcare professionals to facilitate their decision-making. It integrates portable glucometer, handheld computer, mobile phone and Internet access as a combined telecommunication and mobile computing solution for diabetes management. Methods: Active Server Pages (ASP) embedded with advanced ActiveX controls and VBScript were developed to allow remote data upload, retrieval and interpretation. Some advisory and Internet-based learning features, together with a video teleconferencing component make DiabNet web site an informative platform for Web-consultation. Results The evaluation of the system is being implemented among several UK Internet diabetes discussion groups and the Diabetes Day Centre at the Guy's & St. Thomas' Hospital. Many positive feedback are received from the web site demonstrating DiabNet is an advanced web-based diabetes management system which can help patients to keep closer control of self-monitoring blood glucose remotely, and is an integrated diabetes information resource that offers telemedicine knowledge in diabetes management. Discussion In summary, DiabNet introduces an innovative online diabetes management concept, such as online appointment and consultation, to enable users to access diabetes management information without time and location limitation and security concerns.
The association between internet and television access and disordered eating in a Chinese sample.
Peat, Christine M; Von Holle, Ann; Watson, Hunna; Huang, Lu; Thornton, Laura M; Zhang, Bing; Du, Shufa; Kleiman, Susan C; Bulik, Cynthia M
2015-09-01
China has historically reported a low prevalence of eating disorders. However, the rapid social and economic development of this country as well as Western ideals widely disseminated by television and the Internet have led to distinct patterns of behavioral choices that could affect eating disorder risk. Thus, the current study explored the relation between disordered eating and media use. Participants were females from the 2009 wave of the China Health and Nutrition Survey (N = 1,053). Descriptive statistics were obtained and logistic regression models, stratified by age (adolescents ages 12-17 years and adults ages 18-35 years), were used to evaluate the association of media use with disordered eating. In adolescents, 46.8% had access to the Internet and those with access averaged one hour per day each of Internet and television use. In adults, 41.4% had access to the Internet, and those with access averaged 1 h per day of Internet use and 2 h per day of television use. Internet access was significantly associated with a subjective belief of fatness (OR = 2.8, 95% CI: 1.6, 4.9) and worry over losing control over eating (OR = 4.8, 95% CI: 2.3, 9.8) only in adults. These findings help characterize the overall pattern of media use and report of eating disorder symptoms in a large sample of female Chinese adolescents and adults. That Internet access in adults was significantly associated with disordered eating cognitions might suggest that media access negatively influences these domains; however, more granular investigations are warranted. © 2014 Wiley Periodicals, Inc.
The Association Between Internet and Television Access and Disordered Eating in a Chinese Sample
Peat, Christine M.; Von Holle, Ann; Watson, Hunna; Huang, Lu; Thornton, Laura M.; Zhang, Bing; Du, Shufa; Kleiman, Susan C.; Bulik, Cynthia M.
2014-01-01
Objective China has historically reported a low prevalence of eating disorders. However, the rapid social and economic development of this country as well as Western ideals widely disseminated by television and the Internet have led to distinct patterns of behavioral choices that could affect eating disorder risk. Thus, the current study explored the relation between disordered eating and media use. Method Participants were females from the 2009 wave of the China Health and Nutrition Survey (N = 1,053). Descriptive statistics were obtained and logistic regression models, stratified by age (adolescents ages 12-17 and adults ages 18-35), were used to evaluate the association of media use with disordered eating. Results In adolescents, 46.8% had access to the Internet and those with access averaged one hour per day each of Internet and television use. In adults, 41.4% had access to the Internet, and those with access averaged one hour per day of Internet use and two hours per day of television use. Internet access was significantly associated with a subjective belief of fatness (OR = 2.8, 95% CI: 1.6, 4.9) and worry over losing control over eating (OR = 4.8, 95% CI: 2.3, 9.8) only in adults. Discussion These findings help characterize the overall pattern of media use and report of eating disorder symptoms in a large sample of female Chinese adolescents and adults. That Internet access in adults was significantly associated with disordered eating cognitions might suggest that media access negatively influences these domains;however,more granular investigations are warranted. PMID:25346164
Hassan, Sehar-un-Nisa; Siddiqui, Salma; Mahmood, Ayeshah
2015-01-01
Background and Objective: Fertility control preferences and maternal healthcare have recently become a major concern for developing nations with evidence suggesting that low fertility control rates and poor maternal healthcare are among major obstructions in ensuring health and social status for women. Our objective was toanalyze the factors that influence women’s autonomy, access to maternal healthcare, and fertility control preferences in Pakistan. Methods: Data consisted of 11,761 ever-married women of ages 15-49 years from PDHS, 2012-13. Variables included socio-demographics, women’s autonomy, fertility control preferences and access to maternal healthcare. Results: Findings from multivariate analysis showed that women’s younger age, having less than three number of children and independent or joint decision-making (indicators of high autonomy) remained the most significant predictors for access to better quality maternal healthcare and better fertility control preferences when other variables were controlled. Conclusion: Women’s access to good quality maternal health care and fertility control preferences are directly and indirectly influenced by their demographic characteristics and decision-making patterns in domestic affairs. PMID:26870096
Accessibility, stabilizability, and feedback control of continuous orbital transfer.
Gurfil, Pini
2004-05-01
This paper investigates the problem of low-thrust orbital transfer using orbital element feedback from a control-theoretic standpoint, concepts of controllability, feedback stabilizability, and their interaction. The Gauss variational equations (GVEs) are used to model the state-space dynamics. First, the notion of accessibility, a weaker form of controllability, is presented. It is then shown that the GVEs are globally accessible. Based on the accessibility result, a nonlinear feedback controller is derived that asymptotically steers a vehicle from an initial elliptic Keplerian orbit to any given elliptic Keplerian orbit. The performance of the new controller is illustrated by simulating an orbital transfer between two geosynchronous Earth orbits. It is shown that the low-thrust controller requires less fuel than an impulsive maneuver for the same transfer time. Closed-form, analytic expressions for the new orbital transfer controller are given. Finally, it is proved, based on a topological nonlinear stabilizability test, that there does not exist a continuous closed-loop controller that can transfer a spacecraft to a parabolic escape trajectory.
ERIC Educational Resources Information Center
Davidson, Richard A.; Giancola, Angela; Gast, Andrea; Ho, Janice; Waddell, Rhondda
2003-01-01
Evaluated the impact of Accessing Community Care through Eastside Social Services (ACCESS), a program that provided indigent patients with free primary care, on inpatient admissions, emergency room (ER) visits, and subsequent charges. Data on 19 people before and after program enrollment showed significant decreases in ER visits following…
DOT National Transportation Integrated Search
2016-12-16
The concept of accessibility has made inroads into planning practice, largely at the system level. That is, accessibility is measured or modeled for current or future regional transportation and land-use scenarios for evaluation or broad policy guida...
Evaluation of the Ugandan sorghum accessions for grain mold and anthracnose resistance
USDA-ARS?s Scientific Manuscript database
Sorghum accessions from Uganda were evaluated for grain mold and anthracnose resistance during the 2005 and 2006 growing seasons at the Texas A&M University Research Farm, near College Station, TX. Accession PI534117 and SC719-11E exhibited the lowest grain mold severities of 2.4, whereas, accessio...
Telecommunications access--matching available technologies to people with physical disabilities.
Nguyen, Toan; Garrett, Rob; Downing, Andrew; Walker, Lloyd; Hobbs, David
2006-03-01
People with a disability do not have equitable access to the modern telecommunication medium. Many experience difficulty typing, handling the phone, dialling or answering calls. For those who are unable to speak, the only option is to type messages using whatever functional control site exists on their body. The provision of accessible mobile phones for people with disabilities can significantly improve their quality of life through an increased range of accessible activities, and can improve their independence, safety, security and self-esteem. This research was aimed at providing practical ways for people with a disability to participate in the extensive community of home and mobile phone users. The outcomes of ten participants taking part in the evaluation and trial of off-the-shelf telecommunication options are presented. Nine out of ten participants showed high to very high results in terms of their overall performance and satisfaction with the use of the telecommunication equipment provided. With the right policies, processes and support through equipment matching, education, training and delivery, current off-the-shelf solutions can help people with disabilities to effectively communicate with other members of our society and to access the same range of information systems and services enjoyed by able-bodied members of the community.
Incentive Mechanism for P2P Content Sharing over Heterogenous Access Networks
NASA Astrophysics Data System (ADS)
Sato, Kenichiro; Hashimoto, Ryo; Yoshino, Makoto; Shinkuma, Ryoichi; Takahashi, Tatsuro
In peer-to-peer (P2P) content sharing, users can share their content by contributing their own resources to one another. However, since there is no incentive for contributing contents or resources to others, users may attempt to obtain content without any contribution. To motivate users to contribute their resources to the service, incentive-rewarding mechanisms have been proposed. On the other hand, emerging wireless technologies, such as IEEE 802.11 wireless local area networks, beyond third generation (B3G) cellular networks and mobile WiMAX, provide high-speed Internet access for wireless users. Using these high-speed wireless access, wireless users can use P2P services and share their content with other wireless users and with fixed users. However, this diversification of access networks makes it difficult to appropriately assign rewards to each user according to their contributions. This is because the cost necessary for contribution is different in different access networks. In this paper, we propose a novel incentive-rewarding mechanism called EMOTIVER that can assign rewards to users appropriately. The proposed mechanism uses an external evaluator and interactive learning agents. We also investigate a way of appropriately controlling rewards based on the system service's quality and managing policy.
[Access control management in electronic health records: a systematic literature review].
Carrión Señor, Inmaculada; Fernández Alemán, José Luis; Toval, Ambrosio
2012-01-01
This study presents the results of a systematic literature review of aspects related to access control in electronic health records systems, wireless security and privacy and security training for users. Information sources consisted of original articles found in Medline, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database, published between January 2006 and January 2011. A total of 1,208 articles were extracted using a predefined search string and were reviewed by the authors. The final selection consisted of 24 articles. Of the selected articles, 21 dealt with access policies in electronic health records systems. Eleven articles discussed whether access to electronic health records should be granted by patients or by health organizations. Wireless environments were only considered in three articles. Finally, only four articles explicitly mentioned that technical training of staff and/or patients is required. Role-based access control is the preferred mechanism to deploy access policy by the designers of electronic health records. In most systems, access control is managed by users and health professionals, which promotes patients' right to control personal information. Finally, the security of wireless environments is not usually considered. However, one line of research is eHealth in mobile environments, called mHealth. Copyright © 2011 SESPAS. Published by Elsevier Espana. All rights reserved.
Yi, Meng; Chen, Qingkui; Xiong, Neal N
2016-11-03
This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.
2012-01-01
Background In the United Kingdom and worldwide, there is significant policy interest in improving the quality of care for patients with mental health disorders and distress. Improving quality of care means addressing not only the effectiveness of interventions but also the issue of limited access to care. Research to date into improving access to mental health care has not been strongly rooted within a conceptual model, nor has it systematically identified the different elements of the patient journey from identification of illness to receipt of care. This paper set out to review core concepts underlying patient access to mental health care, synthesise these to develop a conceptual model of access, and consider the implications of the model for the development and evaluation of interventions for groups with poor access to mental health care such as older people and ethnic minorities. Methods Narrative review of the literature to identify concepts underlying patient access to mental health care, and synthesis into a conceptual model to support the delivery and evaluation of complex interventions to improve access to mental health care. Results The narrative review adopted a process model of access to care, incorporating interventions at three levels. The levels comprise (a) community engagement (b) addressing the quality of interactions in primary care and (c) the development and delivery of tailored psychosocial interventions. Conclusions The model we propose can form the basis for the development and evaluation of complex interventions in access to mental health care. We highlight the key methodological challenges in evaluating the overall impact of access interventions, and assessing the relative contribution of the different elements of the model. PMID:22889290
How Well Does Medicaid Work in Improving Access to Care?
Long, Sharon K; Coughlin, Teresa; King, Jennifer
2005-01-01
Objective To provide an assessment of how well the Medicaid program is working at improving access to and use of health care for low-income mothers. Data Source/Study Setting The 1997 and 1999 National Survey of America's Families, with state and county information drawn from the Area Resource File and other sources. Study Design Estimate the effects of Medicaid on access and use relative to private coverage and being uninsured, using instrumental variables methods to control for selection into insurance status. Data Collection/Extraction Method This study combines data from 1997 and 1999 for mothers in families with incomes below 200 percent of the federal poverty level. Principal Findings We find that Medicaid beneficiaries' access and use are significantly better than those obtained by the uninsured. Analysis that controls for insurance selection shows that the benefits of having Medicaid coverage versus being uninsured are substantially larger than what is estimated when selection is not accounted for. Our results also indicate that Medicaid beneficiaries' access and use are comparable to that of the low-income privately insured. Once insurance selection is controlled for, access and use under Medicaid is not significantly different from access and use under private insurance. Without controls for insurance selection, access and use for Medicaid beneficiaries is found to be significantly worse than for the low-income privately insured. Conclusions Our results show that the Medicaid program improved access to care relative to uninsurance for low-income mothers, achieving access and use levels comparable to those of the privately insured. Our results also indicate that prior research, which generally has not controlled for selection into insurance coverage, has likely understated the gains of Medicaid relative to uninsurance and overstated the gains of private coverage relative to Medicaid. PMID:15663701
Reference Manual for the Ada Programming Language
1983-01-01
Convercions 4-21 4.7 Qualified Expresclions 4-24 4.8 Allocators 4-24 4.9 Static Expressions and Static Subtypes 4-26 , 4.10 Universal Expressions 4-27 5...record type.•: • 2 Access types allow the construction of linked data structures created by the evaluation of / allocators . They allow several...the following: A * An assignment (In assignment statements and Initializations), an allocator , a membership test, or a short-circuit control form, * A
Does walking explain associations between access to greenspace and lower mortality?
Lachowycz, Kate; Jones, Andy P.
2014-01-01
Despite emerging evidence that access to greenspace is associated with longer life expectancy, little is understood about what causal mechanisms may explain this relationship. Based on social-ecological theories of health, greenspace has multifaceted potential to influence mortality but the potential alternative mediating pathways have not been empirically tested. This study evaluates relationships between access to greenspace, walking and mortality. Firstly, we test for an association between access to greenspace and self-reported levels of walking using a survey of 165,424 adults across England collected during 2007 and 2008. Negative binomial regression multilevel models were used to examine associations between greenspace access and self reported number of days walked in the last month, in total and for recreational and health purposes, after controlling for relevant confounders. Secondly we use an area level analysis of 6781 middle super output areas across England to examine if recreational walking mediates relationships between greenspace access and reduced premature mortality from circulatory disease. Results show clear evidence of better greenspace access being associated with higher reported recreational walking. There were between 13% and 18% more days of recreational walking in the greenest quintile compared with the least green after adjustment for confounders. Tests for mediation found no evidence that recreational walking explain the associations between greenspace and mortality. Futhermore, whilst the relationship between greenspace access and walking was observed for all areas, the relationship between greenspace access and reduced mortality was only apparent in the most deprived areas. These findings indicate that the association between greenspace and mortality, if causal, may be explained by mediators other than walking, such as psychosocial factors. Future research should concentrate on understanding the causal mechanisms underlying observed associations. PMID:24602966
An improved task-role-based access control model for G-CSCW applications
NASA Astrophysics Data System (ADS)
He, Chaoying; Chen, Jun; Jiang, Jie; Han, Gang
2005-10-01
Access control is an important and popular security mechanism for multi-user applications. GIS-based Computer Supported Cooperative Work (G-CSCW) application is one of such applications. This paper presents an improved Task-Role-Based Access Control (X-TRBAC) model for G-CSCW applications. The new model inherits the basic concepts of the old ones, such as role and task. Moreover, it has introduced two concepts, i.e. object hierarchy and operation hierarchy, and the corresponding rules to improve the efficiency of permission definition in access control models. The experiments show that the method can simplify the definition of permissions, and it is more applicable for G-CSCW applications.
Automating Access Control Logics in Simple Type Theory with LEO-II
NASA Astrophysics Data System (ADS)
Benzmüller, Christoph
Garg and Abadi recently proved that prominent access control logics can be translated in a sound and complete way into modal logic S4. We have previously outlined how normal multimodal logics, including monomodal logics K and S4, can be embedded in simple type theory and we have demonstrated that the higher-order theorem prover LEO-II can automate reasoning in and about them. In this paper we combine these results and describe a sound (and complete) embedding of different access control logics in simple type theory. Employing this framework we show that the off the shelf theorem prover LEO-II can be applied to automate reasoning in and about prominent access control logics.
Wood, Joanne M; McGwin, Gerald; Elgin, Jennifer; Searcey, Karen; Owsley, Cynthia
2013-05-01
To compare the on-road driving performance of visually impaired drivers using bioptic telescopes with age-matched controls. Participants included 23 persons (mean age = 33 ± 12 years) with visual acuity of 20/63 to 20/200 who were legally licensed to drive through a state bioptic driving program, and 23 visually normal age-matched controls (mean age = 33 ± 12 years). On-road driving was assessed in an instrumented dual-brake vehicle along 14.6 miles of city, suburban, and controlled-access highways. Two backseat evaluators independently rated driving performance using a standardized scoring system. Vehicle control was assessed through vehicle instrumentation and video recordings used to evaluate head movements, lane-keeping, pedestrian detection, and frequency of bioptic telescope use. Ninety-six percent (22/23) of bioptic drivers and 100% (23/23) of controls were rated as safe to drive by the evaluators. There were no group differences for pedestrian detection, or ratings for scanning, speed, gap judgments, braking, indicator use, or obeying signs/signals. Bioptic drivers received worse ratings than controls for lane position and steering steadiness and had lower rates of correct sign and traffic signal recognition. Bioptic drivers made significantly more right head movements, drove more often over the right-hand lane marking, and exhibited more sudden braking than controls. Drivers with central vision loss who are licensed to drive through a bioptic driving program can display proficient on-road driving skills. This raises questions regarding the validity of denying such drivers a license without the opportunity to train with a bioptic telescope and undergo on-road evaluation.
42 CFR 431.834 - Access to records: Claims processing assessment systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... ADMINISTRATION Quality Control Medicaid Quality Control (mqc) Claims Processing Assessment System § 431.834 Access to records: Claims processing assessment systems. The agency, upon written request, must provide HHS staff with access to all records pertaining to its MQC claims processing assessment system reviews...
ERIC Educational Resources Information Center
Villano, Matt
2008-01-01
Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…
Lubans, David R; Smith, Jordan J; Skinner, Geoff; Morgan, Philip J
2014-01-01
To describe the development and implementation of a smartphone application (app) designed to promote physical activity and reduce screen-time in adolescent boys considered "at-risk" of obesity. An app was developed to support the delivery of a face-to-face school-based obesity prevention program known as the "Active Teen Leaders Avoiding Screen-time" (ATLAS) program. ATLAS was guided by self-determination theory and social cognitive theory and evaluated using a cluster randomized controlled trial with 361 boys (12.7 ± 0.5 years) in 14 secondary schools. Following the completion of the study, participants in the intervention group completed a process evaluation questionnaire and focus groups were conducted with 42 students to explore their general perceptions of the ATLAS program and their experience with the smartphone app. Barriers and challenges encountered in the development, implementation, and evaluation of the app are also described. Participation in the study was not contingent on ownership of a smartphone, but 70% of participants in the intervention group reported having access to a smartphone or tablet device. Focus group participants reported an enjoyment of the program, and felt that it had provided them with new skills, techniques, and routines for the future. However, their engagement with the smartphone app was limited, due to a variety of reasons. Barriers to the implementation and evaluation of the app included limited access to smartphone devices, technical problems with the push notifications, lack of access to usage data, and the challenges of maintaining participants' interest in using the app. Although participants reported high levels of satisfaction with the ATLAS program in general, the smartphone app was not used extensively. Additional strategies and features may be needed to enhance engagement in adolescent boys.
Siesling, S; Louwman, W J; Kwast, A; van den Hurk, C; O'Callaghan, M; Rosso, S; Zanetti, R; Storm, H; Comber, H; Steliarova-Foucher, E; Coebergh, J W
2015-06-01
To provide insight into cancer registration coverage, data access and use in Europe. This contributes to data and infrastructure harmonisation and will foster a more prominent role of cancer registries (CRs) within public health, clinical policy and cancer research, whether within or outside the European Research Area. During 2010-12 an extensive survey of cancer registration practices and data use was conducted among 161 population-based CRs across Europe. Responding registries (66%) operated in 33 countries, including 23 with national coverage. Population-based oncological surveillance started during the 1940-50s in the northwest of Europe and from the 1970s to 1990s in other regions. The European Union (EU) protection regulations affected data access, especially in Germany and France, but less in the Netherlands or Belgium. Regular reports were produced by CRs on incidence rates (95%), survival (60%) and stage for selected tumours (80%). Evaluation of cancer control and quality of care remained modest except in a few dedicated CRs. Variables evaluated were support of clinical audits, monitoring adherence to clinical guidelines, improvement of cancer care and evaluation of mass cancer screening. Evaluation of diagnostic imaging tools was only occasional. Most population-based CRs are well equipped for strengthening cancer surveillance across Europe. Data quality and intensity of use depend on the role the cancer registry plays in the politico, oncomedical and public health setting within the country. Standard registration methodology could therefore not be translated to equivalent advances in cancer prevention and mass screening, quality of care, translational research of prognosis and survivorship across Europe. Further European collaboration remains essential to ensure access to data and comparability of the results. Copyright © 2014 Elsevier Ltd. All rights reserved.
Sahoo, Prasan Kumar; Pattanaik, Sudhir Ranjan; Wu, Shih-Lin
2017-06-07
The IEEE 802.15.4e standard proposes Medium Access Control (MAC) to support collision-free wireless channel access mechanisms for industrial, commercial and healthcare applications. However, unnecessary wastage of energy and bandwidth consumption occur due to inefficient backoff management and collisions. In this paper, a new channel access mechanism is designed for the buffer constraint sensor devices to reduce the packet drop rate, energy consumption and collisions. In order to avoid collision due to the hidden terminal problem, a new frame structure is designed for the data transmission. A new superframe structure is proposed to mitigate the problems due to WiFi and ZigBee interference. A modified superframe structure with a new retransmission opportunity for failure devices is proposed to reduce the collisions and retransmission delay with high reliability. Performance evaluation and validation of our scheme indicate that the packet drop rate, throughput, reliability, energy consumption and average delay of the nodes can be improved significantly.
Remacle, Marc; Prasad, Vyas M N
2018-03-01
This purpose of this case series is to present the first four cases utilizing micro-phonosurgical instrumentation designed specifically for use with a semi-flexible 'robotic' system-the Medrobotics Flex system and to evaluate the accessibility and feasibility of this platform in the context of transoral robotic surgery (TORS) for laryngeal surgery. Four patients (3 female, 1 male; age range 49-79 years) were operated by the senior author at CHL-a tertiary hospital centre between 2016 and 2017. The 'robot' was deployed in all cases to assess its accessibility and ability to perform surgery in the larynx. All four patients were successfully treated using the system along with newly developed instrumentation specifically focused on phonosurgery. This series has demonstrated accessibility and ability for laryngeal surgery using a novel semi-rigid operator-controlled 'robotic' system. We encountered no device failures and were able to perform all the selected cases uneventfully.
Morrison, James; Kaufman, John
2016-12-01
Vascular access is invaluable in the treatment of hospitalized patients. Central venous catheters provide a durable and long-term solution while saving patients from repeated needle sticks for peripheral IVs and blood draws. The initial catheter placement procedure and long-term catheter usage place patients at risk for infection. The goal of this project was to develop a system to track and evaluate central line-associated blood stream infections related to interventional radiology placement of central venous catheters. A customized web-based clinical database was developed via open-source tools to provide a dashboard for data mining and analysis of the catheter placement and infection information. Preliminary results were gathered over a 4-month period confirming the utility of the system. The tools and methodology employed to develop the vascular access tracking system could be easily tailored to other clinical scenarios to assist in quality control and improvement programs.
Kisker, E E; Brown, R S
1996-05-01
The purpose of this investigation was to assess the School-Based Adolescent Health Care Program, which provided comprehensive health-related services in 24 school-based health centers. The outcomes evaluation compared a cohort of students attending 19 participating schools and a national sample of urban youths, using logit models to control for observed differences between the two groups of youths. Outcome measures included self-reports concerning health center utilization, use of other health care providers, knowledge of key health facts, substance use, sexual activity, contraceptive use, pregnancies and births, and health status. The health centers increased students' access to health care and improved their health knowledge. However, the estimated impacts on health status and risky behaviors were inconsistent, and most were small and not statistically significant. School-based health centers can increase students' health knowledge and access to health-related services, but more intensive or different services are needed if they are to significantly reduce risk-taking behaviors.
Nguyen, Hoang Hiep; Park, Jeho; Hwang, Seungwoo; Kwon, Oh Seok; Lee, Chang-Soo; Shin, Yong-Beom; Ha, Tai Hwan; Kim, Moonil
2018-01-10
We report the development of on-chip fluorescence switching system based on DNA strand displacement and DNA hybridization for the construction of a rewritable and randomly accessible data storage device. In this study, the feasibility and potential effectiveness of our proposed system was evaluated with a series of wet experiments involving 40 bits (5 bytes) of data encoding a 5-charactered text (KRIBB). Also, a flexible data rewriting function was achieved by converting fluorescence signals between "ON" and "OFF" through DNA strand displacement and hybridization events. In addition, the proposed system was successfully validated on a microfluidic chip which could further facilitate the encoding and decoding process of data. To the best of our knowledge, this is the first report on the use of DNA hybridization and DNA strand displacement in the field of data storage devices. Taken together, our results demonstrated that DNA-based fluorescence switching could be applicable to construct a rewritable and randomly accessible data storage device through controllable DNA manipulations.
Sahoo, Prasan Kumar; Pattanaik, Sudhir Ranjan; Wu, Shih-Lin
2017-01-01
The IEEE 802.15.4e standard proposes Medium Access Control (MAC) to support collision-free wireless channel access mechanisms for industrial, commercial and healthcare applications. However, unnecessary wastage of energy and bandwidth consumption occur due to inefficient backoff management and collisions. In this paper, a new channel access mechanism is designed for the buffer constraint sensor devices to reduce the packet drop rate, energy consumption and collisions. In order to avoid collision due to the hidden terminal problem, a new frame structure is designed for the data transmission. A new superframe structure is proposed to mitigate the problems due to WiFi and ZigBee interference. A modified superframe structure with a new retransmission opportunity for failure devices is proposed to reduce the collisions and retransmission delay with high reliability. Performance evaluation and validation of our scheme indicate that the packet drop rate, throughput, reliability, energy consumption and average delay of the nodes can be improved significantly. PMID:28590434
NASA Technical Reports Server (NTRS)
Anderson, Molly; Westheimer, David
2006-01-01
All space vehicles or habitats require thermal management to maintain a safe and operational environment for both crew and hardware. Active Thermal Control Systems (ATCS) perform the functions of acquiring heat from both crew and hardware within a vehicle, transporting that heat throughout the vehicle, and finally rejecting that energy into space. Almost all of the energy used in a space vehicle eventually turns into heat, which must be rejected in order to maintain an energy balance and temperature control of the vehicle. For crewed vehicles, Active Thermal Control Systems are pumped fluid loops that are made up of components designed to perform these functions. NASA has recently evaluated all of the agency s technology development work and identified key areas that must be addressed to aid in the successful development of a Crew Exploration Vehicle (CEV) and a Lunar Surface Access Module (LSAM). The technologies that have been selected and are currently under development include: fluids that enable single loop ATCS architectures, a gravity insensitive vapor compression cycle heat pump, a sublimator with reduced sensitivity to feedwater contamination, an evaporative heat sink that can operate in multiple ambient pressure environments, a compact spray evaporator, and lightweight radiators that take advantage of carbon composites and advanced optical coatings.
Atom-Role-Based Access Control Model
NASA Astrophysics Data System (ADS)
Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong
Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.
Using the World Wide Web in health-related intervention research. A review of controlled trials.
Kirsch, Sallie E; Lewis, Frances M
2004-01-01
A review of published controlled trials was conducted to evaluate components, utility, and efficacy of Web-based healthcare interventions. Nine studies met the established review criteria. Knowledge gains were the most commonly reported significant changes; rarely were there measures or significant changes on behavioral outcomes. Studies varied in format of personal contact with participants, in the structure or sequence of intervention content, and in design features. Dosage was inconsistently measured and process evaluation was relatively absent. Despite limitations, several studies reported significant effects. Based on best evidence-to-date, elements of technologically mediated interventions important to future research are summarized. Taken together, research suggests that Web-based interventions may be an efficacious delivery system, especially for those with chronic conditions amenable to self-management and to those with various limitations to accessing healthcare.
Zwerenz, Rüdiger; Gerzymisch, Katharina; Edinger, Jens; Holme, Martin; Knickenberg, Rudolf J; Spörl-Dönch, Sieglinde; Kiwus, Ulrich; Beutel, Manfred E
2013-01-25
Mental disorders are the main reasons for rising proportions of premature pension in most high-income countries. Although inpatient medical rehabilitation has increasingly targeted work-related stress, there is still a lack of studies on the transfer of work-specific interventions into work contexts. Therefore, we plan to evaluate an online aftercare program aiming to improve vocational reintegration after medical rehabilitation. Vocationally strained patients (n = 800) aged between 18 and 59 years with private internet access are recruited in psychosomatic, orthopedic and cardiovascular rehabilitation clinics in Germany. During inpatient rehabilitation, participants in stress management group training are cluster-randomized to the intervention or control group. The intervention group (n = 400) is offered an internet-based aftercare with weekly writing tasks and therapeutic feedback, a patient forum, a self-test and relaxation exercises. The control group (n = 400) obtains regular e-mail reminders with links to publicly accessible information about stress management and coping. Assessments are conducted at the beginning of inpatient rehabilitation, the end of inpatient rehabilitation, the end of aftercare, and 9 months later. The primary outcome is a risk score for premature pension, measured by a screening questionnaire at follow-up. Secondary outcome measures include level of vocational stress, physical and mental health, and work capacity at follow-up. We expect the intervention group to stabilize the improvements achieved during inpatient rehabilitation concerning stress management and coping, resulting in an improved vocational reintegration. The study protocol demonstrates the features of internet-based aftercare in rehabilitation. International Standard Randomised Controlled Trial Number Register (ISRCTN:ISRCTN33957202).
2013-01-01
Background Mental disorders are the main reasons for rising proportions of premature pension in most high-income countries. Although inpatient medical rehabilitation has increasingly targeted work-related stress, there is still a lack of studies on the transfer of work-specific interventions into work contexts. Therefore, we plan to evaluate an online aftercare program aiming to improve vocational reintegration after medical rehabilitation. Methods Vocationally strained patients (n = 800) aged between 18 and 59 years with private internet access are recruited in psychosomatic, orthopedic and cardiovascular rehabilitation clinics in Germany. During inpatient rehabilitation, participants in stress management group training are cluster-randomized to the intervention or control group. The intervention group (n = 400) is offered an internet-based aftercare with weekly writing tasks and therapeutic feedback, a patient forum, a self-test and relaxation exercises. The control group (n = 400) obtains regular e-mail reminders with links to publicly accessible information about stress management and coping. Assessments are conducted at the beginning of inpatient rehabilitation, the end of inpatient rehabilitation, the end of aftercare, and 9 months later. The primary outcome is a risk score for premature pension, measured by a screening questionnaire at follow-up. Secondary outcome measures include level of vocational stress, physical and mental health, and work capacity at follow-up. Discussion We expect the intervention group to stabilize the improvements achieved during inpatient rehabilitation concerning stress management and coping, resulting in an improved vocational reintegration. The study protocol demonstrates the features of internet-based aftercare in rehabilitation. Trial registration International Standard Randomised Controlled Trial Number Register (ISRCTN:ISRCTN33957202) PMID:23351836
NASA Astrophysics Data System (ADS)
Glatter, Otto; Fuchs, Heribert; Jorde, Christian; Eigner, Wolf-Dieter
1987-03-01
The microprocessor of an 8-bit PC system is used as a central control unit for the acquisition and evaluation of data from quasi-elastic light scattering experiments. Data are sampled with a width of 8 bits under control of the CPU. This limits the minimum sample time to 20 μs. Shorter sample times would need a direct memory access channel. The 8-bit CPU can address a 64-kbyte RAM without additional paging. Up to 49 000 sample points can be measured without interruption. After storage, a correlation function or a power spectrum can be calculated from such a primary data set. Furthermore access is provided to the primary data for stability control, statistical tests, and for comparison of different evaluation methods for the same experiment. A detailed analysis of the signal (histogram) and of the effect of overflows is possible and shows that the number of pulses but not the number of overflows determines the error in the result. The correlation function can be computed with reasonable accuracy from data with a mean pulse rate greater than one, the power spectrum needs a three times higher pulse rate for convergence. The statistical accuracy of the results from 49 000 sample points is of the order of a few percent. Additional averages are necessary to improve their quality. The hardware extensions for the PC system are inexpensive. The main disadvantage of the present system is the high minimum sampling time of 20 μs and the fact that the correlogram or the power spectrum cannot be computed on-line as it can be done with hardware correlators or spectrum analyzers. These shortcomings and the storage size restrictions can be removed with a faster 16/32-bit CPU.
CAS. Controlled Access Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Martinez, B.; Pomeroy, G.
1989-12-01
The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.
Bernhardsson, Susanne; Larsson, Maria E H; Eggertsen, Robert; Olsén, Monika Fagevik; Johansson, Kajsa; Nilsen, Per; Nordeman, Lena; van Tulder, Maurits; Öberg, Birgitta
2014-03-04
Clinical practice guidelines are important for transmitting research findings into practice and facilitating the application of evidence-based practice (EBP). There is a paucity of knowledge about the impact of guideline implementation strategies in primary care physical therapy. The aim of this study was to evaluate the effect of a guideline implementation intervention in primary care physical therapy in western Sweden. An implementation strategy based on theory and current evidence was developed. A tailored, multi-component implementation intervention, addressing earlier identified determinants, was carried out in three areas comprising 28 physical therapy practices including 277 physical therapists (PTs) (intervention group). In two adjacent areas, 171 PTs at 32 practices received no intervention (control group). The core component of the intervention was an implementation seminar with group discussions. Among other components were a website and email reminders. Data were collected at baseline and follow-up with a web-based questionnaire. Primary outcomes were the self-reported awareness of, knowledge of, access to, and use of guidelines. Secondary outcomes were self-reported attitudes toward EBP and guidelines. Analyses were performed using Pearson's χ2 test and approximative z-test. 168 PTs (60.6%) in the intervention group and 88 PTs (51.5%) in the control group responded to the follow-up questionnaire. 186/277 PTs (67.1%) participated in the implementation seminars, of which 97 (52.2%) responded. The proportions of PTs reporting awareness of (absolute difference in change 20.6%, p = 0.023), knowledge where to find (20.4%, p = 0.007), access to (21.7%, p < 0.001), and frequent use of (9.5%, NS) guidelines increased more in the intervention group than in the control group. The proportion of PTs reporting frequent guideline use after participation in the implementation seminar was 15.2% (p = 0.043) higher than the proportion in the control group. A higher proportion considered EBP helpful in decision making (p = 0.018). There were no other significant differences in secondary outcomes. A tailored, theory- and evidence-informed, multi-component intervention for the implementation of clinical practice guidelines had a modest, positive effect on awareness of, knowledge of, access to, and use of guidelines, among PTs in primary care in western Sweden. In general, attitudes to EBP and guidelines were not affected.
Controlling Infrastructure Costs: Right-Sizing the Mission Control Facility
NASA Technical Reports Server (NTRS)
Martin, Keith; Sen-Roy, Michael; Heiman, Jennifer
2009-01-01
Johnson Space Center's Mission Control Center is a space vehicle, space program agnostic facility. The current operational design is essentially identical to the original facility architecture that was developed and deployed in the mid-90's. In an effort to streamline the support costs of the mission critical facility, the Mission Operations Division (MOD) of Johnson Space Center (JSC) has sponsored an exploratory project to evaluate and inject current state-of-the-practice Information Technology (IT) tools, processes and technology into legacy operations. The general push in the IT industry has been trending towards a data-centric computer infrastructure for the past several years. Organizations facing challenges with facility operations costs are turning to creative solutions combining hardware consolidation, virtualization and remote access to meet and exceed performance, security, and availability requirements. The Operations Technology Facility (OTF) organization at the Johnson Space Center has been chartered to build and evaluate a parallel Mission Control infrastructure, replacing the existing, thick-client distributed computing model and network architecture with a data center model utilizing virtualization to provide the MCC Infrastructure as a Service. The OTF will design a replacement architecture for the Mission Control Facility, leveraging hardware consolidation through the use of blade servers, increasing utilization rates for compute platforms through virtualization while expanding connectivity options through the deployment of secure remote access. The architecture demonstrates the maturity of the technologies generally available in industry today and the ability to successfully abstract the tightly coupled relationship between thick-client software and legacy hardware into a hardware agnostic "Infrastructure as a Service" capability that can scale to meet future requirements of new space programs and spacecraft. This paper discusses the benefits and difficulties that a migration to cloud-based computing philosophies has uncovered when compared to the legacy Mission Control Center architecture. The team consists of system and software engineers with extensive experience with the MCC infrastructure and software currently used to support the International Space Station (ISS) and Space Shuttle program (SSP).
Near, Aimee M.; Blackman, Kenneth; Currie, Laura M.
2014-01-01
Background: This study examines the effect of past tobacco control policies and projects the effect of future policies on smoking and snus use prevalence and associated premature mortality in Sweden. Methods: The established SimSmoke model was adapted with population, smoking rates and tobacco control policy data from Sweden. SimSmoke evaluates the effect of taxes, smoke-free air, mass media, marketing bans, warning labels, cessation treatment and youth access policies on smoking and snus prevalence and the number of deaths attributable to smoking and snus use by gender from 2010 to 2040. Results: Sweden SimSmoke estimates that significant inroads to reducing smoking and snus prevalence and premature mortality can be achieved through tax increases, especially when combined with other policies. Smoking prevalence can be decreased by as much as 26% in the first few years, reaching a 37% reduction within 30 years. Without effective tobacco control policies, almost 54 500 lives will be lost in Sweden due to tobacco use by the year 2040. Conclusion: Besides presenting the benefits of a comprehensive tobacco control strategy, the model identifies gaps in surveillance and evaluation that can help better focus tobacco control policy in Sweden. PMID:24287030
ERIC Educational Resources Information Center
McKinlay, Bruce; Adams, Daniel
The Occupational Information Access System (OIAS) improves the accessibility of occupational labor market information for career planning. Its operation at Churchill High School is evaluated from several angels: the likes and dislikes of users; the effect of OIAS on users' knowledge of occupational information and on their career plans; why other…
Comparison and Evaluation of End-User Interfaces for Online Public Access Catalogs.
ERIC Educational Resources Information Center
Zumer, Maja
End-user interfaces for the online public access catalogs (OPACs) of OhioLINK, a system linking major university and research libraries in Ohio, and its 16 member libraries, accessible through the Internet, are compared and evaluated from the user-oriented perspective. A common, systematic framework was used for the scientific observation of the…
ERIC Educational Resources Information Center
Nolan, Mary L.
2008-01-01
This paper describes the conception, planning, implementation and evaluation of an access programme arising out of an innovative collaboration between two charities, Straight Talking and the National Childbirth Trust. The access programme was designed at the request of a group of young mothers who had finished compulsory education and subsequently…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-26
... DEPARTMENT OF VETERANS AFFAIRS [OMB Control No. 2900-0739] Agency Information Collection (Access...) of 1995 (44 U.S.C. 3501-3521), this notice announces that the Veterans Benefits Administration (VBA... . Please refer to ``OMB Control No. 2900-0739.'' SUPPLEMENTARY INFORMATION: Title: Access to Financial...
Urban Studies: A Study of Bibliographic Access and Control.
ERIC Educational Resources Information Center
Anderson, Barbara E.
This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…
Comin, Eva; Catalan-Ramos, Arantxa; Iglesias-Rodal, Manuel; Grau, Maria; Del Val, Jose Luis; Consola, Alicia; Amado, Ester; Pons, Angels; Mata-Cases, Manel; Franzi, Alicia; Ciurana, Ramon; Frigola, Eva; Cos, Xavier; Davins, Josep; Verdu-Rotellar, Jose M
To evaluate the impact of computerized clinical practice guidelines on the management, diagnosis, treatment, control, and follow-up of the main cardiovascular risk factors: hypertension, hypercholesterolaemia, and type 2 diabetes mellitus. Pre-post controlled study. Catalonia, autonomous community located in north-eastern Spain. Individuals aged 35-74 years assigned to general practitioners of the Catalan Health Institute. The intervention group consisted of individuals whose general practitioners had accessed the computerized clinical practice guidelines at least twice a day, while the control group consisted of individuals whose general practitioner had never accessed the computerized clinical practice guidelines platform. The Chi-squared test was used to detect significant differences in the follow-up, control, and treatment variables for all three disorders (hypertension, hypercholesterolaemia, and type 2 diabetes mellitus) between individuals assigned to users and non-users of the computerized clinical practice guidelines, respectively. A total of 189,067 patients were included in this study, with a mean age of 56 years (standard deviation 12), and 55.5% of whom were women. Significant differences were observed in hypertension management, treatment and control; type 2 diabetes mellitus management, treatment and diagnoses, and the management and control of hypercholesterolaemia in both sexes. Computerized clinical practice guidelines are an effective tool for the control and follow-up of patients diagnosed with hypertension, type 2 diabetes mellitus, and hypercholesterolaemia. The usefulness of computerized clinical practice guidelines to diagnose and adequately treat individuals with these disorders remains unclear. Copyright © 2016 Elsevier España, S.L.U. All rights reserved.
Sefuba, Maria; Walingo, Tom; Takawira, Fambirai
2015-09-18
This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.
Sefuba, Maria; Walingo, Tom; Takawira, Fambirai
2015-01-01
This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608
An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application
Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo
2014-01-01
This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651
An action-based fine-grained access control mechanism for structured documents and its application.
Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo
2014-01-01
This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.
Spatiotemporal access model based on reputation for the sensing layer of the IoT.
Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan
2014-01-01
Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.
Grommon, Eric
2018-02-01
Cell phones in correctional facilities have emerged as one of the most pervasive forms of modern contraband. This issue has been identified as a top priority for many correctional administrators in the United States. Managed access, a technology that utilizes cellular signals to capture transmissions from contraband phones, has received notable attention as a promising tool to combat this problem. However, this technology has received little evaluative attention. The present study offers a foundational process evaluation and draws upon output measures and stakeholder interviews to identify salient operational challenges and subsequent lessons learned about implementing and maintaining a managed access system. Findings suggest that while managed access captures large volumes of contraband cellular transmissions, the technology requires significant implementation planning, personnel support, and complex partnerships with commercial cellular carriers. Lessons learned provide guidance for practitioners to navigate these challenges and for scholars to improve future evaluations of managed access. Copyright © 2017 Elsevier Ltd. All rights reserved.
Karlsson, Petra; Wallen, Margaret
2017-01-01
Eye-gaze control technology enables people with significant physical disability to access computers for communication, play, learning and environmental control. This pilot study used a multiple case study design with repeated baseline assessment and parents' evaluations to compare two eye-gaze control technology systems to identify any differences in factors such as ease of use and impact of the systems for their young children. Five children, aged 3 to 5 years, with dyskinetic cerebral palsy, and their families participated. Overall, families were satisfied with both the Tobii PCEye Go and myGaze® eye tracker, found them easy to position and use, and children learned to operate them quickly. This technology provides young children with important opportunities for learning, play, leisure, and developing communication.
Wireless control of powered wheelchairs with tongue motion using tongue drive assistive technology.
Huo, Xueliang; Wang, Jia; Ghovanloo, Maysam
2008-01-01
Tongue Drive system (TDS) is a tongue-operated unobtrusive wireless assistive technology, which can potentially provide people with severe disabilities with effective computer access and environment control. It translates users' intentions into control commands by detecting and classifying their voluntary tongue motion utilizing a small permanent magnet, secured on the tongue, and an array of magnetic sensors mounted on a headset outside the mouth or an orthodontic brace inside. We have developed customized interface circuitry and implemented four control strategies to drive a powered wheelchair (PWC) using an external TDS prototype. The system has been evaluated by five able-bodied human subjects. The results showed that all subjects could easily operate the PWC using their tongue movements, and different control strategies worked better depending on the users' familiarity with the TDS.
Preserved subliminal processing and impaired conscious access in schizophrenia
Del Cul, Antoine; Dehaene, Stanislas; Leboyer, Marion
2006-01-01
Background Studies of visual backward masking have frequently revealed an elevated masking threshold in schizophrenia. This finding has frequently been interpreted as indicating a low-level visual deficit. However, more recent models suggest that masking may also involve late and higher-level integrative processes, while leaving intact early “bottom-up” visual processing. Objectives We tested the hypothesis that the backward masking deficit in schizophrenia corresponds to a deficit in the late stages of conscious perception, whereas the subliminal processing of masked stimuli is fully preserved. Method 28 patients with schizophrenia and 28 normal controls performed two backward-masking experiments. We used Arabic digits as stimuli and varied quasi-continuously the interval with a subsequent mask, thus allowing us to progressively “unmask” the stimuli. We finely quantified their degree of visibility using both objective and subjective measures to evaluate the threshold duration for access to consciousness. We also studied the priming effect caused by the variably masked numbers on a comparison task performed on a subsequently presented and highly visible target number. Results The threshold delay between digit and mask necessary for the conscious perception of the masked stimulus was longer in patients compared to control subjects. This higher consciousness threshold in patients was confirmed by an objective and a subjective measure, and both measures were highly correlated for patients as well as for controls. However, subliminal priming of masked numbers was effective and identical in patients compared to controls. Conclusions Access to conscious report of masked stimuli is impaired in schizophrenia, while fast bottom-up processing of the same stimuli, as assessed by subliminal priming, is preserved. These findings suggest a high-level origin of the masking deficit in schizophrenia, although they leave open for further research its exact relation to previously identified bottom-up visual processing abnormalities. PMID:17146006
Issa, Ziad F; Amr, Bashar S
2015-11-01
Catheter ablation of atrial fibrillation (AF) requires utilizing multiple venous femoral sheaths in conjunction with aggressive periprocedural anticoagulation, which can lead to increased risk of vascular access complications. The objective of this study is to evaluate the safety and efficacy of the "figure-of-eight" ("F-8") suture technique for femoral venous hemostasis while on therapeutic doses of intravenous anticoagulation at the time of sheath removal. In this case-control analysis, 376 consecutive patients underwent AF ablation while on uninterrupted oral anticoagulation and received intraprocedural heparin. In the first 253 patients (the control group), manual pressure was used for femoral venous hemostasis after reversal of heparin effects. The subsequent 123 patients (the F-8 group) had femoral venous hemostasis using the F-8 suture technique and while under therapeutic heparin effects. The F-8 subcutaneous suture technique achieved adequate venous hemostasis in 98.4% of patients. As compared to the control group, there was significantly less frequent utilization of the FemoStop compression assist device (1.2 vs. 16.8%, p < 0.0001) and in a significantly shorter interval (6.8 ± 5.7 vs. 50.7 ± 12.2 min, p < 0.0001). Vascular access complications and thromboembolic events occurred in 9.8% in the F-8 group vs. 13.0% in the control group (p = 0.678). Immediate hemostasis of the femoral venous access sites after insertion of multiple sheaths for AF ablation in the presence of anticoagulation can be safely and effectively achieved using the F-8 suture technique. This technique helps minimize the period of inadequate anticoagulation immediately following ablation and shortens the time required to achieve adequate hemostasis.
Community-based colorectal cancer intervention in underserved Korean Americans.
Ma, Grace X; Shive, Steve; Tan, Yin; Gao, Wanzhen; Rhee, Joanne; Park, Micah; Kim, Jaesool; Toubbeh, Jamil I
2009-11-01
Despite evidence of a decline in both incidence and prevalence of colorectal cancer nationwide, it remains the second most commonly diagnosed cancer and the third highest cause of mortality among Asian Americans, including Korean Americans. This community-based and theoretically guided study evaluated a culturally appropriate intervention program that included a bilingual cancer educational program among Korean Americans including information on CRC risks, counseling to address psychosocial and access barriers, and patient navigation assistance. A two-group quasi-experimental design with baseline and post-intervention assessment and a 12-month follow-up on screening was used in the study. Korean Americans (N=167) were enrolled from six Korean churches. The intervention group received culturally appropriate intervention program addressing accessibility and psychosocial barriers, and navigation assistance for screening. The control group received general health education that included cancer-related health issues and screening. There was a significant difference (p<0.05) between the post-intervention and control groups in awareness of CRC risk factors. There was also a significant improvement in the pre-post across HBM measures in the intervention group for perceived susceptibility (p<0.05) and benefits and barriers to screening (p<0.001). At baseline, 13% of participants in the intervention group and 10% in control group reported having had a CRC cancer screening test in the previous year. At the 12-month post-intervention follow-up, 77.4% of participants in the intervention group had obtained screening compared to 10.8% in the control group. While health disparities result from numerous factors, a culturally appropriate and church-based intervention can be highly effective in increasing knowledge of and access to, and in reducing barriers to CRC screening among underserved Koreans.
Green, Beverly B; Ralston, James D; Fishman, Paul A; Catz, Sheryl L; Cook, Andrea; Carlson, Jim; Tyll, Lynda; Carrell, David; Thompson, Robert S
2008-05-01
Randomized controlled trials have provided unequivocal evidence that treatment of hypertension decreases mortality and major disability from cardiovascular disease; however, blood pressure remains inadequately treated in most affected individuals. This large gap continues despite the facts that more than 90% of adults with hypertension have health insurance, and hypertension is the leading cause of visits to the doctor. New approaches are needed to improve hypertension care. The Electronic Communications and Home Blood Pressure Monitoring (e-BP) study is a three-arm randomized controlled trial designed to determine whether care based on the Chronic Care Model and delivered over the Internet improves hypertension care. The primary study outcomes are systolic, diastolic, and blood pressure control; secondary outcomes are medication adherence, patient self-efficacy, satisfaction and quality of life, and healthcare utilization and costs. Hypertensive patients receiving care at Group Health medical centers are eligible if they have uncontrolled blood pressure on two screening visits and access to the Web and an e-mail address. Study participants are randomly assigned to three intervention groups: (a) usual care; (b) home blood pressure monitoring receipt and proficiency training on its use and the Group Health secure patient website (with secure e-mail access to their healthcare provider, access to a shared medical record, prescription refill and other services); or (c) this plus pharmacist care management (collaborative care management between the patient, the pharmacist, and the patient's physician via a secure patient website and the electronic medical record). We will determine whether a new model of patient-centered care that leverages Web communications, self-monitoring, and collaborative care management improves hypertension control. If this model proves successful and cost-effective, similar interventions could be used to improve the care of large numbers of patients with uncontrolled hypertension.
Koehlmoos, Tracey Perez; Gazi, Rukhsana; Hossain, S Shahed; Zaman, K
2009-01-21
Social franchising has developed as a possible means of improving provision of health services through engaging the non-state sector in low- and middle-income countries. To examine the evidence that social franchising has on access to and quality of health services in low- and middle-income countries. We searched the Cochrane Effective Practice and Organisation of Care (EPOC) Group Specialised Register (up to October 2007), Cochrane Central Register of Controlled Trials (The Cochrane Library 2007, Issue 3), MEDLINE, Ovid (1950 to September Week 3 2007), EMBASE, Ovid (1980 to 2007 Week 38), CINAHL, Ovid (1982 to September Week 3 2007), EconLit, WebSPIRS (1969 to Sept 2007), LILACS, Science Citation Index Expanded and Social Sciences Citation Index (1975 to March 2008), Sociological Abstracts, CSA Illumnia (1952 September 2007), WHOLIS (1948 November 2007). Randomized controlled trials, non-randomized controlled trials, controlled before and after studies and interrupted time series comparing social franchising models with other models of health service delivery, other social franchising models or absence of health services. Two review authors independently applied the criteria for inclusion and exclusion of studies to scan titles and abstracts. The same two review authors independently screened full reports of selected citations . At each stage, results were compared and discrepancies settled through discussion. No studies were found which were eligible for inclusion in this review. There is a need to develop rigorous studies to evaluate the effects of social franchising on access to and quality of health services in low- and middle-income countries. Such studies should be informed by the wider literature to identify models of social franchising that have a sound theoretical basis and empirical research addressing their reach, acceptability, feasibility, maintenance and measurability.
Benefits of postpyloric enteral access placement by a nutrition support dietitian.
Jimenez, L Lee; Ramage, James E
2004-10-01
Although enteral nutrition is considered the preferred strategy for nutrition support, it is often precluded by nasogastric feeding intolerance or the inability to place feeding access into the postpyloric position. In an effort to improve enteral nutrition (EN) outcomes at our institution, the nutrition support dietitian (NSD) began placing postpyloric feeding tubes (PPFT) in intensive care unit patients. Intensive care unit patients who received blind, bedside PPFT placements by the NSD (n = 18) were compared with a concurrent age- and diagnosis-matched control group that received standard nutritional care without NSD intervention (n = 18). Interruption of EN infusion, appropriateness of parenteral nutrition (PN) prescription (based on American Society of Parenteral and Enteral Nutrition guidelines), and incidence of ventilator-associated pneumonia (VAP), as defined by the American College of Chest Physicians practice guidelines, were determined in each group. The NSD was successful in positioning the PPFT at or distal to the third portion of the duodenum in 83% of attempts. The PPFT group demonstrated no interruption of enteral feeding compared with 56% in the control group (p < .01) and required 1 (6%) PN initiation in contrast to 8 (44%) in the control group (p < .01). There was a trend toward reduced VAP in the PPFT group (6% vs 28%, p = .07). Of the PN initiations in the control group, 88% were deemed to be potentially avoidable; 6 of 8 PNs were initiated because of gastric residuals. Enteral nutrition facilitated by NSD placement of postpyloric feeding access is associated with improved tube feeding tolerance and reduced PN use. Further studies are needed to evaluate a possible effect of postpyloric feeding on the incidence of VAP.
47 CFR 6.7 - Product design, development, and evaluation.
Code of Federal Regulations, 2014 CFR
2014-10-01
...) Manufacturers and service providers shall evaluate the accessibility, usability, and compatibility of equipment... identify barriers to accessibility and usability as part of such a product design and development process...
47 CFR 6.7 - Product design, development, and evaluation.
Code of Federal Regulations, 2013 CFR
2013-10-01
...) Manufacturers and service providers shall evaluate the accessibility, usability, and compatibility of equipment... identify barriers to accessibility and usability as part of such a product design and development process...
Open access publishing, article downloads, and citations: randomised controlled trial
Lewenstein, Bruce V; Simon, Daniel H; Booth, James G; Connolly, Mathew J L
2008-01-01
Objective To measure the effect of free access to the scientific literature on article downloads and citations. Design Randomised controlled trial. Setting 11 journals published by the American Physiological Society. Participants 1619 research articles and reviews. Main outcome measures Article readership (measured as downloads of full text, PDFs, and abstracts) and number of unique visitors (internet protocol addresses). Citations to articles were gathered from the Institute for Scientific Information after one year. Interventions Random assignment on online publication of articles published in 11 scientific journals to open access (treatment) or subscription access (control). Results Articles assigned to open access were associated with 89% more full text downloads (95% confidence interval 76% to 103%), 42% more PDF downloads (32% to 52%), and 23% more unique visitors (16% to 30%), but 24% fewer abstract downloads (−29% to −19%) than subscription access articles in the first six months after publication. Open access articles were no more likely to be cited than subscription access articles in the first year after publication. Fifty nine per cent of open access articles (146 of 247) were cited nine to 12 months after publication compared with 63% (859 of 1372) of subscription access articles. Logistic and negative binomial regression analysis of article citation counts confirmed no citation advantage for open access articles. Conclusions Open access publishing may reach more readers than subscription access publishing. No evidence was found of a citation advantage for open access articles in the first year after publication. The citation advantage from open access reported widely in the literature may be an artefact of other causes. PMID:18669565
The Effect of Medicaid Physician Fee Increases on Health Care Access, Utilization, and Expenditures.
Callison, Kevin; Nguyen, Binh T
2018-04-01
To evaluate the effect of Medicaid fee changes on health care access, utilization, and spending for Medicaid beneficiaries. We use the 2008 and 2012 waves of the Medical Expenditure Panel Survey linked to state-level Medicaid-to-Medicare primary care reimbursement ratios obtained through surveys conducted by the Urban Institute. We also incorporate data from the Current Population Survey and the Area Resource Files. Using a control group made up of the low-income privately insured, we conduct a difference-in-differences analysis to assess the relationship between Medicaid fee changes and access to care, utilization of health care services, and out-of-pocket medical expenditures for Medicaid enrollees. We find that an increase in the Medicaid-to-Medicare payment ratio for primary care services results in an increase in outpatient physician visits, emergency department utilization, and prescription fills, but only minor improvements in access to care. In addition, we report an increase in total annual out-of-pocket expenditures and spending on prescription medications. Compared to the low-income privately insured, increased primary care reimbursement for Medicaid beneficiaries leads to higher utilization and out-of-pocket spending for Medicaid enrollees. © Health Research and Educational Trust.
Turner, Cynthia; Heyman, Isobel; Futh, Annabel; Lovell, Karina
2009-07-01
Cognitive-behaviour therapy (CBT) is the recommended psychological treatment for obsessive compulsive disorder (OCD) in young people. Access to CBT may be limited by a number of factors, including lack of trained therapists, and geographic or financial factors preventing access to a specialized service. Telephone delivery of CBT represents one way of overcoming some of these accessibility issues. This pilot study describes outcomes for a telephone-based cognitive-behavioural treatment for obsessive-compulsive disorder (OCD) in young people. Ten participants, aged 13 to 17 years, and their parents received up to 16 sessions of telephone CBT (TCBT). Measures of OCD symptoms were obtained using multiple informants and a repeated measures design. Assessments were conducted at pre-treatment, post-treatment, and at 6- and 12-month follow-up. Improvements were found for OCD symptoms across all informants. Family satisfaction with treatment over the telephone was high. The findings suggest that TCBT is a clinically effective, feasible and acceptable means of service delivery that offers the potential to make CBT a more accessible treatment for young people. TCBT requires further evaluation in randomized, controlled trials to compare effectiveness with face-to-face CBT, which currently represents the usual care model.
Research into telecommunications options for people with physical disabilities.
Nguyen, Toan; Garrett, Rob; Downing, Andrew; Walker, Lloyd; Hobbs, David
2007-01-01
People with a disability do not have equitable access to the modern telecommunication medium. Many experience difficulty typing, handling the phone, dialing, or answering calls. For those who are unable to speak, the only option is to type messages using whatever functional control site exists on their body. The provision of accessible mobile phones for people with disabilities can significantly improve their quality of life through an increased range of accessible activities, and mobile phones can improve their independence, safety, security and self-esteem. This research was aimed at providing practical ways for people with a disability to participate in the extensive community of home and mobile phone users. The outcomes of 10 participants taking part in the evaluation and trial of off-the-shelf telecommunication options are presented. Nine out of 10 participants showed high to very high results in terms of their overall performance and satisfaction with the use of the telecommunication equipment provided. With the processes and support covering equipment matching, education, training, and delivery, current off-the-shelf solutions can help people with disabilities to effectively communicate with other members of our society and to access the same range of information systems and services enjoyed by able-bodied members of the community.
Round, Jeff; Drake, Robyn; Kendall, Edward; Addicott, Rachael; Agelopoulos, Nicky; Jones, Louise
2015-03-01
We report the use of difference in differences (DiD) methodology to evaluate a complex, system-wide healthcare intervention. We use the worked example of evaluating the Marie Curie Delivering Choice Programme (DCP) for advanced illness in a large urban healthcare economy. DiD was selected because a randomised controlled trial was not feasible. The method allows for before and after comparison of changes that occur in an intervention site with a matched control site. This enables analysts to control for the effect of the intervention in the absence of a local control. Any policy, seasonal or other confounding effects over the test period are assumed to have occurred in a balanced way at both sites. Data were obtained from primary care trusts. Outcomes were place of death, inpatient admissions, length of stay and costs. Small changes were identified between pre- and post-DCP outputs in the intervention site. The proportion of home deaths and median cost increased slightly, while the number of admissions per patient and the average length of stay per admission decreased slightly. None of these changes was statistically significant. Effects estimates were limited by small numbers accessing new services and selection bias in sample population and comparator site. In evaluating the effect of a complex healthcare intervention, the choice of analysis method and output measures is crucial. Alternatives to randomised controlled trials may be required for evaluating large scale complex interventions and the DiD approach is suitable, subject to careful selection of measured outputs and control population. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Haighton, Catherine; Moffatt, Suzanne; Howel, Denise; McColl, Elaine; Milne, Eugene; Deverill, Mark; Rubin, Greg; Aspray, Terry; White, Martin
2012-05-28
Older people in poor health are more likely to need extra money, aids and adaptations to allow them to remain independent and cope with ill health, yet in the UK many do not claim the welfare benefits to which they are entitled. Welfare rights advice interventions lead to greater welfare income, but have not been rigorously evaluated for health benefits. This study will evaluate the effects on health and well-being of a domiciliary welfare rights advice service provided by local government or voluntary organisations in North East England for independent living, socio-economically disadvantaged older people (aged ≥60 yrs), recruited from general (primary care) practices. The study is a pragmatic, individually randomised, single blinded, wait-list controlled trial of welfare rights advice versus usual care, with embedded economic and qualitative process evaluations. The qualitative study will examine whether the intervention is delivered as intended; explore responses to the intervention and examine reasons for the trial findings; and explore the potential for translation of the intervention into routine policy and practice. The primary outcome is the effect on health-related quality of life, measured using the CASP 19 questionnaire. Volunteer men and women aged ≥60 years (1/household) will be identified from general practice patient registers. Patients in nursing homes or hospitals at the time of recruitment will be excluded. General practice populations will be recruited from disadvantaged areas of North East England, including urban, rural and semi-rural areas, with no previous access to targeted welfare rights advice services delivered to primary care patients. A minimum of 750 participants will be randomised to intervention and control arms in a 1:1 ratio. Achieving a trial design that is both ethical and acceptable to potential participants, required methodological compromises. The choice of follow-up length required a trade-off between sufficient time to demonstrate health impact and the need to allow the control group access to the intervention as early as possible. The study will have implications for fundamental understanding of social inequalities and how to tackle them, and provides a model for similar evaluations of health-orientated social interventions. If the health benefits of this intervention are proven, targeted welfare rights advice services should be extended to ensure widespread provision for older people and other vulnerable groups. CURRENT CONTROLLED TRIALS ISRCTN NUMBER: ISRCTN37380518.
2012-01-01
Background Older people in poor health are more likely to need extra money, aids and adaptations to allow them to remain independent and cope with ill health, yet in the UK many do not claim the welfare benefits to which they are entitled. Welfare rights advice interventions lead to greater welfare income, but have not been rigorously evaluated for health benefits. This study will evaluate the effects on health and well-being of a domiciliary welfare rights advice service provided by local government or voluntary organisations in North East England for independent living, socio-economically disadvantaged older people (aged ≥60 yrs), recruited from general (primary care) practices. Methods/Design The study is a pragmatic, individually randomised, single blinded, wait-list controlled trial of welfare rights advice versus usual care, with embedded economic and qualitative process evaluations. The qualitative study will examine whether the intervention is delivered as intended; explore responses to the intervention and examine reasons for the trial findings; and explore the potential for translation of the intervention into routine policy and practice. The primary outcome is the effect on health-related quality of life, measured using the CASP 19 questionnaire. Volunteer men and women aged ≥60 years (1/household) will be identified from general practice patient registers. Patients in nursing homes or hospitals at the time of recruitment will be excluded. General practice populations will be recruited from disadvantaged areas of North East England, including urban, rural and semi-rural areas, with no previous access to targeted welfare rights advice services delivered to primary care patients. A minimum of 750 participants will be randomised to intervention and control arms in a 1:1 ratio. Discussion Achieving a trial design that is both ethical and acceptable to potential participants, required methodological compromises. The choice of follow-up length required a trade-off between sufficient time to demonstrate health impact and the need to allow the control group access to the intervention as early as possible. The study will have implications for fundamental understanding of social inequalities and how to tackle them, and provides a model for similar evaluations of health-orientated social interventions. If the health benefits of this intervention are proven, targeted welfare rights advice services should be extended to ensure widespread provision for older people and other vulnerable groups. Current Controlled Trials ISRCTN Number ISRCTN37380518 PMID:22639988
Evaluation of the automatic optical authentication technologies for control systems of objects
NASA Astrophysics Data System (ADS)
Averkin, Vladimir V.; Volegov, Peter L.; Podgornov, Vladimir A.
2000-03-01
The report considers the evaluation of the automatic optical authentication technologies for the automated integrated system of physical protection, control and accounting of nuclear materials at RFNC-VNIITF, and for providing of the nuclear materials nonproliferation regime. The report presents the nuclear object authentication objectives and strategies, the methodology of the automatic optical authentication and results of the development of pattern recognition techniques carried out under the ISTC project #772 with the purpose of identification of unique features of surface structure of a controlled object and effects of its random treatment. The current decision of following functional control tasks is described in the report: confirmation of the item authenticity (proof of the absence of its substitution by an item of similar shape), control over unforeseen change of item state, control over unauthorized access to the item. The most important distinctive feature of all techniques is not comprehensive description of some properties of controlled item, but unique identification of item using minimum necessary set of parameters, properly comprising identification attribute of the item. The main emphasis in the technical approach is made on the development of rather simple technological methods for the first time intended for use in the systems of physical protection, control and accounting of nuclear materials. The developed authentication devices and system are described.
46 CFR 154.320 - Cargo control stations.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) If a cargo control station is in accommodation, service, or control spaces or has access to such a space, the station must: (1) Be a gas safe space; (2) Have an access to the space that meets § 154.330...
46 CFR 154.320 - Cargo control stations.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) If a cargo control station is in accommodation, service, or control spaces or has access to such a space, the station must: (1) Be a gas safe space; (2) Have an access to the space that meets § 154.330...
Muellmann, Saskia; Bragina, Inna; Voelcker-Rehage, Claudia; Rost, Eric; Lippke, Sonia; Meyer, Jochen; Schnauber, Jochen; Wasmann, Merlin; Toborg, Merle; Koppelin, Frauke; Brand, Tilman; Zeeb, Hajo; Pischke, Claudia R
2017-05-25
Regular physical activity (PA) is a key contributor to healthy ageing. However, despite known health benefits, only one third of older adults in Germany reach the PA levels recommended for persons aged 65 years and above by the World Health Organization. The aim of the current study is to evaluate the effectiveness of two web-based interventions for the initiation and maintenance of regular PA (i.e., intervention groups 1 and 2) compared to a delayed intervention control group of older adults aged 65 to 75 years. Study participants will be randomly assigned to one of three study arms in five communities in the Bremen-Oldenburg metropolitan region: a) Participants in the first arm will receive access to a web-based intervention for 10 weeks allowing them to track their weekly PA (subjective self-monitoring, intervention group 1); b) participants in the second arm will receive access to the web-based intervention for 10 weeks and, in addition, track PA using Fitbit Zips (objective self-monitoring, intervention group 2); c) participants in the delayed intervention control group will receive access to the intervention implemented in the first study arm after completion of the 12-week follow-up in the other two groups within each community. In addition, weekly group meetings in the communities will be offered to study participants in the intervention groups providing the opportunity to address questions related to the use of the website and to practice PA in groups (e.g., neighborhood walks, strength and balance exercises). To evaluate short-term effects of the intervention on physical and psychological health, PA, physical fitness, and cognitive and psychological variables will be assessed at baseline and 12-week follow-up. This study will provide answers regarding acceptance and effectiveness of web-based interventions promoting uptake and maintenance of regular PA in persons aged 65-75 years. Study findings will contribute to a growing body of evidence in Germany concerning the role of community-based interventions for the promotion of PA and healthy ageing in older adults. German Clinical Trials Register DRKS00010052 (Date of registration 07-11-2016).
Method and apparatus for managing access to a memory
DOE Office of Scientific and Technical Information (OSTI.GOV)
DeBenedictis, Erik
A method and apparatus for managing access to a memory of a computing system. A controller transforms a plurality of operations that represent a computing job into an operational memory layout that reduces a size of a selected portion of the memory that needs to be accessed to perform the computing job. The controller stores the operational memory layout in a plurality of memory cells within the selected portion of the memory. The controller controls a sequence by which a processor in the computing system accesses the memory to perform the computing job using the operational memory layout. The operationalmore » memory layout reduces an amount of energy consumed by the processor to perform the computing job.« less
Trends in communicative access solutions for children with cerebral palsy.
Myrden, Andrew; Schudlo, Larissa; Weyand, Sabine; Zeyl, Timothy; Chau, Tom
2014-08-01
Access solutions may facilitate communication in children with limited functional speech and motor control. This study reviews current trends in access solution development for children with cerebral palsy, with particular emphasis on the access technology that harnesses a control signal from the user (eg, movement or physiological change) and the output device (eg, augmentative and alternative communication system) whose behavior is modulated by the user's control signal. Access technologies have advanced from simple mechanical switches to machine vision (eg, eye-gaze trackers), inertial sensing, and emerging physiological interfaces that require minimal physical effort. Similarly, output devices have evolved from bulky, dedicated hardware with limited configurability, to platform-agnostic, highly personalized mobile applications. Emerging case studies encourage the consideration of access technology for all nonverbal children with cerebral palsy with at least nascent contingency awareness. However, establishing robust evidence of the effectiveness of the aforementioned advances will require more expansive studies. © The Author(s) 2014.
Access Control Management for SCADA Systems
NASA Astrophysics Data System (ADS)
Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan
The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.
A Model Evaluation Data Set for the Tropical ARM Sites
Jakob, Christian
2008-01-15
This data set has been derived from various ARM and external data sources with the main aim of providing modelers easy access to quality controlled data for model evaluation. The data set contains highly aggregated (in time) data from a number of sources at the tropical ARM sites at Manus and Nauru. It spans the years of 1999 and 2000. The data set contains information on downward surface radiation; surface meteorology, including precipitation; atmospheric water vapor and cloud liquid water content; hydrometeor cover as a function of height; and cloud cover, cloud optical thickness and cloud top pressure information provided by the International Satellite Cloud Climatology Project (ISCCP).
Accessibility and usability of parks and playgrounds.
Perry, Meredith A; Devan, Hemakumar; Fitzgerald, Harry; Han, Karen; Liu, Li-Ting; Rouse, Jack
2018-04-01
Public parks and playgrounds are an environment for leisure activity, which all generations can enjoy at low or no financial cost. Evaluating the accessibility and usability of parks and playgrounds is crucial because their design, environment (natural and built) and safety could restrict participation of persons with disabilities. To evaluate the accessibility and usability of 21 public parks and playgrounds in three metropolitan cities of New Zealand. Secondary aims were to compare the accessibility and usability by park type (destination or neighborhood) and deprivation level (high and low). Twenty-one parks were evaluated. A stratified random sampling was used to select 18 parks (six from each city). Three additional parks were purposely selected (one from each city) at the request of each respective city council. The parks and playgrounds were evaluated using a customized tool. Data were analyzed using descriptive statistics. None of the parks we evaluated met the national standards and/or international guidelines for park and playground design. We identified potential accessibility and usability issues with car parking spaces, path surfaces and play equipment as well as lack of lighting and fencing. The presence of amenities (e.g. toilets and drinking fountains) was more common in destination parks. Fewer parks in areas of higher deprivation had accessible car parking spaces and main paths wider than 1.5 m. Our evaluation identified potential design, environmental and safety barriers to park and playground based participation for persons with disabilities across the lifespan. A larger, more comprehensive evaluation of parks and playgrounds is required. Copyright © 2017 Elsevier Inc. All rights reserved.
Yi, Meng; Chen, Qingkui; Xiong, Neal N.
2016-01-01
This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate. PMID:27827878
ERIC Educational Resources Information Center
Kimmons, Royce
2017-01-01
This study seeks to evaluate the basic Priority 1 web accessibility of all college and university websites in the US (n = 3141). Utilizing web scraping and automated content analysis, the study establishes that even in the case of high-priority, simple-to-address accessibility requirements, colleges and universities generally fail to make their…
Integrated semiconductor-magnetic random access memory system
NASA Technical Reports Server (NTRS)
Katti, Romney R. (Inventor); Blaes, Brent R. (Inventor)
2001-01-01
The present disclosure describes a non-volatile magnetic random access memory (RAM) system having a semiconductor control circuit and a magnetic array element. The integrated magnetic RAM system uses CMOS control circuit to read and write data magnetoresistively. The system provides a fast access, non-volatile, radiation hard, high density RAM for high speed computing.
Quantification of the benefits of access management for Kentucky : final report.
DOT National Transportation Integrated Search
2006-07-01
This report describes the benefits quantification performed for the proposed access management plan for Kentucky. This study evaluates the capacity, safety and economic impacts associated with access management programs. The proposed Kentucky access ...
Safety evaluation of access management policies and techniques, TechBrief
DOT National Transportation Integrated Search
2015-08-01
Access management is the process that provides (or manages) access to land development while simultaneously preserving the flow of traffic on the surrounding road network for safety, capacity, and speed. Access management provides important benefits ...
46 CFR 154.320 - Cargo control stations.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Arrangements § 154.320 Cargo control stations. (a) Cargo control stations must be above the weather deck. (b) If a cargo control station is in accommodation, service, or control spaces or has access to such a space, the station must: (1) Be a gas safe space; (2) Have an access to the space that meets § 154.330...
46 CFR 154.320 - Cargo control stations.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Arrangements § 154.320 Cargo control stations. (a) Cargo control stations must be above the weather deck. (b) If a cargo control station is in accommodation, service, or control spaces or has access to such a space, the station must: (1) Be a gas safe space; (2) Have an access to the space that meets § 154.330...