Sample records for public access computers

  1. Who's in the Queue? A Demographic Analysis of Public Access Computer Users and Uses in U.S. Public Libraries. Research Brief Number 4

    ERIC Educational Resources Information Center

    Manjarrez, Carlos A.; Schoembs, Kyle

    2011-01-01

    Over the past decade, policy discussions about public access computing in libraries have focused on the role that these institutions play in bridging the digital divide. In these discussions, public access computing services are generally targeted at individuals who either cannot afford a computer and Internet access, or have never received formal…

  2. 36 CFR § 1254.32 - What rules apply to public access use of the Internet on NARA-supplied computers?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... access use of the Internet on NARA-supplied computers? § 1254.32 Section § 1254.32 Parks, Forests, and... public access use of the Internet on NARA-supplied computers? (a) Public access computers (workstations... equipment. (b) You should not expect privacy while using these workstations. These workstations are operated...

  3. 36 CFR 1254.32 - What rules apply to public access use of the Internet on NARA-supplied computers?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... access use of the Internet on NARA-supplied computers? 1254.32 Section 1254.32 Parks, Forests, and Public... of the Internet on NARA-supplied computers? (a) Public access computers (workstations) are available for Internet use in all NARA research rooms. The number of workstations varies per location. We...

  4. 36 CFR 1254.32 - What rules apply to public access use of the Internet on NARA-supplied computers?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... access use of the Internet on NARA-supplied computers? 1254.32 Section 1254.32 Parks, Forests, and Public... of the Internet on NARA-supplied computers? (a) Public access computers (workstations) are available for Internet use in all NARA research rooms. The number of workstations varies per location. We...

  5. 36 CFR 1254.32 - What rules apply to public access use of the Internet on NARA-supplied computers?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... access use of the Internet on NARA-supplied computers? 1254.32 Section 1254.32 Parks, Forests, and Public... of the Internet on NARA-supplied computers? (a) Public access computers (workstations) are available... should not expect privacy while using these workstations. These workstations are operated and maintained...

  6. 36 CFR 1254.32 - What rules apply to public access use of the Internet on NARA-supplied computers?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... access use of the Internet on NARA-supplied computers? 1254.32 Section 1254.32 Parks, Forests, and Public... of the Internet on NARA-supplied computers? (a) Public access computers (workstations) are available... should not expect privacy while using these workstations. These workstations are operated and maintained...

  7. Public computing options for individuals with cognitive impairments: survey outcomes.

    PubMed

    Fox, Lynn Elizabeth; Sohlberg, McKay Moore; Fickas, Stephen; Lemoncello, Rik; Prideaux, Jason

    2009-09-01

    To examine availability and accessibility of public computing for individuals with cognitive impairment (CI) who reside in the USA. A telephone survey was administered as a semi-structured interview to 145 informants representing seven types of public facilities across three geographically distinct regions using a snowball sampling technique. An Internet search of wireless (Wi-Fi) hotspots supplemented the survey. Survey results showed the availability of public computer terminals and Internet hotspots was greatest in the urban sample, followed by the mid-sized and rural cities. Across seven facility types surveyed, libraries had the highest percentage of access barriers, including complex queue procedures, login and password requirements, and limited technical support. University assistive technology centres and facilities with a restricted user policy, such as brain injury centres, had the lowest incidence of access barriers. Findings suggest optimal outcomes for people with CI will result from a careful match of technology and the user that takes into account potential barriers and opportunities to computing in an individual's preferred public environments. Trends in public computing, including the emergence of widespread Wi-Fi and limited access to terminals that permit auto-launch applications, should guide development of technology designed for use in public computing environments.

  8. Computers for Political Change: PeaceNet and Public Data Access.

    ERIC Educational Resources Information Center

    Downing, John D. H.

    1989-01-01

    Describes two computer communication projects: PeaceNet, devoted to peace issues; and Public Data Access, devoted to making U.S. government information more broadly available. Discusses the potential of new technology (computer communication) for grass-roots political movements. (SR)

  9. Policy Issues in Computer Networks: Multi-Access Information Systems.

    ERIC Educational Resources Information Center

    Lyons, Patrice A.

    As computer databases become more publicly accessible through public networks, there is a growing need to provide effective protection for proprietary information. Without adequate assurances that their works will be protected, authors and other copyright owners may be reluctant to allow the full text of their works to be accessed through computer…

  10. The "Magic" of Wireless Access in the Library

    ERIC Educational Resources Information Center

    Balas, Janet L.

    2006-01-01

    It seems that the demand for public access computers grows exponentially every time a library network is expanded, making it impossible to ever have enough computers available for patrons. One solution that many libraries are implementing to ease the demand for public computer use is to offer wireless technology that allows patrons to bring in…

  11. Path Not Found: Disparities in Access to Computer Science Courses in California High Schools

    ERIC Educational Resources Information Center

    Martin, Alexis; McAlear, Frieda; Scott, Allison

    2015-01-01

    "Path Not Found: Disparities in Access to Computer Science Courses in California High Schools" exposes one of the foundational causes of underrepresentation in computing: disparities in access to computer science courses in California's public high schools. This report provides new, detailed data on these disparities by student body…

  12. The Use of Public Computing Facilities by Library Patrons: Demography, Motivations, and Barriers

    ERIC Educational Resources Information Center

    DeMaagd, Kurt; Chew, Han Ei; Huang, Guanxiong; Khan, M. Laeeq; Sreenivasan, Akshaya; LaRose, Robert

    2013-01-01

    Public libraries play an important part in the development of a community. Today, they are seen as more than store houses of books; they are also responsible for the dissemination of online, and offline information. Public access computers are becoming increasingly popular as more and more people understand the need for internet access. Using a…

  13. Ames Research Center publications: A continuing bibliography, 1980

    NASA Technical Reports Server (NTRS)

    1981-01-01

    This bibliography lists formal NASA publications, journal articles, books, chapters of books, patents, contractor reports, and computer programs that were issued by Ames Research Center and indexed by Scientific and Technical Aerospace Reports, Limited Scientific and Technical Aerospace Reports, International Aerospace Abstracts, and Computer Program Abstracts in 1980. Citations are arranged by directorate, type of publication, and NASA accession numbers. Subject, personal author, corporate source, contract number, and report/accession number indexes are provided.

  14. Improving Access to Data While Protecting Confidentiality: Prospects for the Future.

    ERIC Educational Resources Information Center

    Duncan, George T.; Pearson, Robert W.

    Providing researchers, especially those in the social sciences, with access to publicly collected microdata furthers research while advancing public policy goals in a democratic society. However, while technological improvements have eased remote access to these databases and enabled computer using researchers to perform sophisticated statistical…

  15. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  16. 45 CFR 602.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Retention and access requirements for records. 602.42 Section 602.42 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... computer usage chargeback rates or composite fringe benefit rates). (i) If submitted for negotiation. If...

  17. 45 CFR 602.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false Retention and access requirements for records. 602.42 Section 602.42 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... computer usage chargeback rates or composite fringe benefit rates). (i) If submitted for negotiation. If...

  18. 45 CFR 602.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false Retention and access requirements for records. 602.42 Section 602.42 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... computer usage chargeback rates or composite fringe benefit rates). (i) If submitted for negotiation. If...

  19. 45 CFR 602.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 3 2013-10-01 2013-10-01 false Retention and access requirements for records. 602.42 Section 602.42 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... computer usage chargeback rates or composite fringe benefit rates). (i) If submitted for negotiation. If...

  20. 45 CFR 602.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false Retention and access requirements for records. 602.42 Section 602.42 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... computer usage chargeback rates or composite fringe benefit rates). (i) If submitted for negotiation. If...

  1. The Cybermobile: A Gateway for Public Access to Network-Based Information.

    ERIC Educational Resources Information Center

    Drumm, John E.; Groom, Frank M.

    1997-01-01

    Though the bookmobile has fallen on hard times, the cybermobile, a technology platform combining personal computing, CD-ROMs, fiber network, and wireless access to the Internet, may be the next step in mobile library services. Discusses standard vehicle, computer hardware, software, wireless access, and alliances with users, vendors, and community…

  2. ComputerTown. A Do-It-Yourself Community Computer Project.

    ERIC Educational Resources Information Center

    Loop, Liza; And Others

    This manual based on Menlo Park's experiences in participating in a nationwide experimental computer literacy project provides guidelines for the development and management of a ComputerTown. This project, which was begun in September 1981 in the Menlo Park Public Library, concentrates on providing public access to microcomputers through hands-on…

  3. An Overview of Public Access Computer Software Management Tools for Libraries

    ERIC Educational Resources Information Center

    Wayne, Richard

    2004-01-01

    An IT decision maker gives an overview of public access PC software that's useful in controlling session length and scheduling, Internet access, print output, security, and the latest headaches: spyware and adware. In this article, the author describes a representative sample of software tools in several important categories such as setup…

  4. Public Computer Assisted Learning Facilities for Children with Visual Impairment: Universal Design for Inclusive Learning

    ERIC Educational Resources Information Center

    Siu, Kin Wai Michael; Lam, Mei Seung

    2012-01-01

    Although computer assisted learning (CAL) is becoming increasingly popular, people with visual impairment face greater difficulty in accessing computer-assisted learning facilities. This is primarily because most of the current CAL facilities are not visually impaired friendly. People with visual impairment also do not normally have access to…

  5. A Comparative Assessment of Computer Literacy of Private and Public Secondary School Students in Lagos State, Nigeria

    ERIC Educational Resources Information Center

    Osunwusi, Adeyinka Olumuyiwa; Abifarin, Michael Segun

    2013-01-01

    The aim of this study was to conduct a comparative assessment of computer literacy of private and public secondary school students. Although the definition of computer literacy varies widely, this study treated computer literacy in terms of access to, and use of, computers and the internet, basic knowledge and skills required to use computers and…

  6. Providing the Public with Online Access to Large Bibliographic Data Bases.

    ERIC Educational Resources Information Center

    Firschein, Oscar; Summit, Roger K.

    DIALOG, an interactive, computer-based information retrieval language, consists of a series of computer programs designed to make use of direct access memory devices in order to provide the user with a rapid means of identifying records within a specific memory bank. Using the system, a library user can be provided access to sixteen distinct and…

  7. Drafted: I Want You to Deliver E-Government

    ERIC Educational Resources Information Center

    Bertot, John Carlo; Jaeger, Paul T.; Langa, Lesley A.; McClure, Charles R.

    2006-01-01

    Public access to the Internet and computers is transforming public libraries into de facto e-government access points, for such disparate services as disaster relief, Medicare drug plans, and even benefits for children and families. This new role for public libraries is not just user-initiated. Government agencies now refer people to public…

  8. 77 FR 64834 - Computational Fluid Dynamics Best Practice Guidelines for Dry Cask Applications

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... NUCLEAR REGULATORY COMMISSION [NRC-2012-0250] Computational Fluid Dynamics Best Practice... public comments on draft NUREG-2152, ``Computational Fluid Dynamics Best Practice Guidelines for Dry Cask... System (ADAMS): You may access publicly-available documents online in the NRC Library at http://www.nrc...

  9. How You Can Protect Public Access Computers "and" Their Users

    ERIC Educational Resources Information Center

    Huang, Phil

    2007-01-01

    By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…

  10. Computational perspectives in the history of science: to the memory of Peter Damerow.

    PubMed

    Laubichler, Manfred D; Maienschein, Jane; Renn, Jürgen

    2013-03-01

    Computational methods and perspectives can transform the history of science by enabling the pursuit of novel types of questions, dramatically expanding the scale of analysis (geographically and temporally), and offering novel forms of publication that greatly enhance access and transparency. This essay presents a brief summary of a computational research system for the history of science, discussing its implications for research, education, and publication practices and its connections to the open-access movement and similar transformations in the natural and social sciences that emphasize big data. It also argues that computational approaches help to reconnect the history of science to individual scientific disciplines.

  11. The meaning of computers to a group of men who are homeless.

    PubMed

    Miller, Kathleen Swenson; Bunch-Harrison, Stacey; Brumbaugh, Brett; Kutty, Rekha Sankaran; FitzGerald, Kathleen

    2005-01-01

    The purpose of this pilot study was to explore the experience with computers and the meaning of computers to a group of homeless men living in a long-term shelter. This descriptive exploratory study used semistructured interviews with seven men who had been given access to computers and had participated in individually tailored occupation based interventions through a Work Readiness Program. Three themes emerged from analyzing the interviews: access to computers, computers as a bridge to life-skill development, and changed self-perceptions as a result of connecting to technology. Because they lacked computer knowledge and feared failure, the majority of study participants had not sought out computers available through public access. The need for access to computers, the potential use of computers as a medium for intervention, and the meaning of computers to these men who represent the digital divide are described in this study.

  12. The FELICIA bulletin board system and the IRBIS anonymous FTP server: Computer security information sources for the DOE community. CIAC-2302

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orvis, W.J.

    1993-11-03

    The Computer Incident Advisory Capability (CIAC) operates two information servers for the DOE community, FELICIA (formerly FELIX) and IRBIS. FELICIA is a computer Bulletin Board System (BBS) that can be accessed by telephone with a modem. IRBIS is an anonymous ftp server that can be accessed on the Internet. Both of these servers contain all of the publicly available CIAC, CERT, NIST, and DDN bulletins, virus descriptions, the VIRUS-L moderated virus bulletin board, copies of public domain and shareware virus- detection/protection software, and copies of useful public domain and shareware utility programs. This guide describes how to connect these systemsmore » and obtain files from them.« less

  13. Serving up Access

    ERIC Educational Resources Information Center

    Rich, Sarah

    2011-01-01

    When low-income students returned to Chicago public schools this fall, many had better access to technology, thanks to a public-private partnership. Chicago families with children enrolled in the National School Lunch Program are eligible for subsidized computers and Internet connections through an agreement between the city and telecom giant…

  14. Protecting Public-Access Computers in Libraries.

    ERIC Educational Resources Information Center

    King, Monica

    1999-01-01

    Describes one public library's development of a computer-security plan, along with helpful products used. Discussion includes Internet policy, physical protection of hardware, basic protection of the operating system and software on the network, browser dilemmas and maintenance, creating clear intuitive interface, and administering fair use and…

  15. 78 FR 47805 - Test Documentation for Digital Computer Software Used in Safety Systems of Nuclear Power Plants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-06

    ... Documents Access and Management System (ADAMS): You may access publicly available documents online in the... Management Plans for Digital Computer Software used in Safety Systems of Nuclear Power Plants,'' issued for... Used in Safety Systems of Nuclear Power Plants AGENCY: Nuclear Regulatory Commission. ACTION: Revision...

  16. A Quantitative Examination of Factors that Impact Technology Integration in Urban Public Secondary Mathematics Classrooms

    ERIC Educational Resources Information Center

    Harvey-Buschel, Phyllis

    2009-01-01

    The problem explored in this study was whether access to technology impacted technology integration in mathematics instruction in urban public secondary schools. Access to technology was measured by availability of computers in the classroom, teacher experience, and teacher professional development. Technology integration was measured by…

  17. Information Resources on Online Public Access Catalogs. A Selected ERIC Bibliography.

    ERIC Educational Resources Information Center

    ERIC Clearinghouse on Information Resources, Syracuse, NY.

    Sixteen articles, books, and reports published between 1978 and 1983 and cited in "Resources in Education" and "Current Index to Journals in Education" are listed in this bibliography on online public access catalogs (OPACs). Emphasis is on the movement toward computer-based alternatives to library card catalogs and user…

  18. The Battle to Secure Our Public Access Computers

    ERIC Educational Resources Information Center

    Sendze, Monique

    2006-01-01

    Securing public access workstations should be a significant part of any library's network and information-security strategy because of the sensitive information patrons enter on these workstations. As the IT manager for the Johnson County Library in Kansas City, Kan., this author is challenged to make sure that thousands of patrons get the access…

  19. The Distribution of Information: The Role for Online Public Access Catalogs.

    ERIC Educational Resources Information Center

    Matthews, Joseph R.

    1994-01-01

    Describes the Online Public Access Catalog (OPAC) and the inclusion of abstracting and indexing industry databases in OPACs. Topics addressed include the implications of including abstracting and indexing tape and CD-ROM products in OPACs; the need for standards allowing library systems to communicate with dissimilar CD-ROM products; and computer,…

  20. Online Public Access Catalogs. ERIC Fact Sheet.

    ERIC Educational Resources Information Center

    Cochrane, Pauline A.

    A listing is presented of 17 documents in the ERIC database concerning the Online Catalog (sometimes referred to as OPAC or Online Public Access Catalog), a computer-based and supported library catalog designed for patron use. The database usually represents recent acquisitions and often contains information about books on order and items in…

  1. Public librarians as a resource for promoting health: results from the Health for Everyone in Libraries Project (HELP) librarian survey.

    PubMed

    Linnan, Laura A; Wildemuth, Barbara M; Gollop, Claudia; Hull, Peggy; Silbajoris, Christie; Monnig, Ruth

    2004-04-01

    Public libraries are located in all communities, and two thirds of adults visit one each year. Libraries give the public access to computers and the Internet, and librarians offer technical assistance for accessing information. The interests and training needs of public librarians for assisting the public in accessing health information have not been addressed. One public library/librarian in each North Carolina county was randomly selected to complete a written questionnaire to assess health-related information services and librarians' skills for providing these services. 84% of librarians (83/99) completed the questionnaire. Results indicate that librarians answer more than 10 health-related questions per week, feel moderately comfortable answering these questions, and are very interested in receiving additional training for addressing health-related questions. Creating public library/public health partnerships holds much promise for enhancing the ability of community members to access desired health information.

  2. The Ever-Present Demand for Public Computing Resources. CDS Spotlight

    ERIC Educational Resources Information Center

    Pirani, Judith A.

    2014-01-01

    This Core Data Service (CDS) Spotlight focuses on public computing resources, including lab/cluster workstations in buildings, virtual lab/cluster workstations, kiosks, laptop and tablet checkout programs, and workstation access in unscheduled classrooms. The findings are derived from 758 CDS 2012 participating institutions. A dataset of 529…

  3. 45 CFR 150.429 - Computation of time and extensions of time.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Computation of time and extensions of time. 150.429 Section 150.429 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS CMS ENFORCEMENT IN GROUP AND INDIVIDUAL INSURANCE MARKETS Administrative Hearings...

  4. 45 CFR 150.429 - Computation of time and extensions of time.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Computation of time and extensions of time. 150.429 Section 150.429 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS CMS ENFORCEMENT IN GROUP AND INDIVIDUAL INSURANCE MARKETS Administrative Hearings...

  5. Key Lessons in Building "Data Commons": The Open Science Data Cloud Ecosystem

    NASA Astrophysics Data System (ADS)

    Patterson, M.; Grossman, R.; Heath, A.; Murphy, M.; Wells, W.

    2015-12-01

    Cloud computing technology has created a shift around data and data analysis by allowing researchers to push computation to data as opposed to having to pull data to an individual researcher's computer. Subsequently, cloud-based resources can provide unique opportunities to capture computing environments used both to access raw data in its original form and also to create analysis products which may be the source of data for tables and figures presented in research publications. Since 2008, the Open Cloud Consortium (OCC) has operated the Open Science Data Cloud (OSDC), which provides scientific researchers with computational resources for storing, sharing, and analyzing large (terabyte and petabyte-scale) scientific datasets. OSDC has provided compute and storage services to over 750 researchers in a wide variety of data intensive disciplines. Recently, internal users have logged about 2 million core hours each month. The OSDC also serves the research community by colocating these resources with access to nearly a petabyte of public scientific datasets in a variety of fields also accessible for download externally by the public. In our experience operating these resources, researchers are well served by "data commons," meaning cyberinfrastructure that colocates data archives, computing, and storage infrastructure and supports essential tools and services for working with scientific data. In addition to the OSDC public data commons, the OCC operates a data commons in collaboration with NASA and is developing a data commons for NOAA datasets. As cloud-based infrastructures for distributing and computing over data become more pervasive, we ask, "What does it mean to publish data in a data commons?" Here we present the OSDC perspective and discuss several services that are key in architecting data commons, including digital identifier services.

  6. Pilot Test of the Online Public Access Catalog Project's User and Nonuser Questionnaires. Final Report.

    ERIC Educational Resources Information Center

    Markey, Karen

    This report describes the pilot data collections and post-questionnaire interview activities of the Council on Library Resources (CLR)/Online Computer Library Center (OCLC) Online Public Access Project. The background of the project is briefly described, the purpose and adminstration of the post-questionnaire interviews are outlined, and pilot…

  7. [Datanet 1 and the convergence of the computer and telecommunications].

    PubMed

    de Wit, Onno

    2008-01-01

    This article describes the efforts of the Dutch national company for telecommunication, PTT, in introducing and developing a public network for data communication in the Netherlands in the last decades of the twentieth century. As early as the 1960s, private companies started to connect their local computers. As a result, small private computer networks started to emerge. As the state company offering general access to public services in telephony, the PTT strove to develop a public data network, accessible to every user and telephone subscriber. This ambition was realized with Datanet 1, the public data network which was officially opened in 1982. In the years that followed, Datanet became the dominant network for data transmission, despite competing efforts by private companies and computer manufacturers. The large-scale application of Datanet in public municipal administration serves as a case study for the development of data communication in practice, that shows that there was a gradual migration from X-25 to TCP/IP protocols. The article concludes by stating that the introduction and development of data transmission transformed the role of the PTT in Dutch society, brought new working practices, new services and new responsibilities, and resulted in a whole new phase in the history of the computer.

  8. Librarian of the Year 2009: Team Cedar Rapids

    ERIC Educational Resources Information Center

    Berry, John N., III

    2009-01-01

    When flood came to Cedar Rapids city, the Cedar Rapids Public Library (CRPL), IA, lost 160,000 items including large parts of its adult and youth collections, magazines, newspapers, reference materials, CDs, and DVDs. Most of its public access computers were destroyed as was its computer lab and microfilm equipment. The automatic circulation and…

  9. Mass-Spectrometry Based Structure Identification of "Known-Unknowns" Using the EPA's CompTox Dashboard (ACS Spring National Meeting) 4 of 7

    EPA Science Inventory

    The CompTox Dashboard is a publicly accessible database provided by the National Center for Computational Toxicology at the US-EPA. The dashboard provides access to a database containing ~720,000 chemicals and integrates a number of our public-facing projects (e.g. ToxCast and Ex...

  10. 36 CFR 1254.30 - Does NARA provide any supplies?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... ADMINISTRATION PUBLIC AVAILABILITY AND USE USING RECORDS AND DONATED HISTORICAL MATERIALS Research Room Rules... research rooms. NARA also provides diskettes and paper for our public access computers. Return unused...

  11. A scoping review of cloud computing in healthcare.

    PubMed

    Griebel, Lena; Prokosch, Hans-Ulrich; Köpcke, Felix; Toddenroth, Dennis; Christoph, Jan; Leb, Ines; Engel, Igor; Sedlmayr, Martin

    2015-03-19

    Cloud computing is a recent and fast growing area of development in healthcare. Ubiquitous, on-demand access to virtually endless resources in combination with a pay-per-use model allow for new ways of developing, delivering and using services. Cloud computing is often used in an "OMICS-context", e.g. for computing in genomics, proteomics and molecular medicine, while other field of application still seem to be underrepresented. Thus, the objective of this scoping review was to identify the current state and hot topics in research on cloud computing in healthcare beyond this traditional domain. MEDLINE was searched in July 2013 and in December 2014 for publications containing the terms "cloud computing" and "cloud-based". Each journal and conference article was categorized and summarized independently by two researchers who consolidated their findings. 102 publications have been analyzed and 6 main topics have been found: telemedicine/teleconsultation, medical imaging, public health and patient self-management, hospital management and information systems, therapy, and secondary use of data. Commonly used features are broad network access for sharing and accessing data and rapid elasticity to dynamically adapt to computing demands. Eight articles favor the pay-for-use characteristics of cloud-based services avoiding upfront investments. Nevertheless, while 22 articles present very general potentials of cloud computing in the medical domain and 66 articles describe conceptual or prototypic projects, only 14 articles report from successful implementations. Further, in many articles cloud computing is seen as an analogy to internet-/web-based data sharing and the characteristics of the particular cloud computing approach are unfortunately not really illustrated. Even though cloud computing in healthcare is of growing interest only few successful implementations yet exist and many papers just use the term "cloud" synonymously for "using virtual machines" or "web-based" with no described benefit of the cloud paradigm. The biggest threat to the adoption in the healthcare domain is caused by involving external cloud partners: many issues of data safety and security are still to be solved. Until then, cloud computing is favored more for singular, individual features such as elasticity, pay-per-use and broad network access, rather than as cloud paradigm on its own.

  12. The Computer Catalog: A Democratic or Authoritarian Technology?

    ERIC Educational Resources Information Center

    Adams, Judith A.

    1988-01-01

    Discussion of consequences of library automation argues that technology should be used to augment access to information. Online public access catalogs are considered in this context, along with several related issues such as system incompatibility, invasion of privacy, barriers to database access and manipulation, and user fees, which contribute…

  13. The EPA Comptox Chemistry Dashboard . (BOSC)

    EPA Science Inventory

    A consolidated web platform is necessary for researchers to access chemical information look-up, models and model predictions and linkages to Agency and public resources. This will provide access to: curated chemical structures, computed and measured physchem properties, exposure...

  14. Data-driven prediction of adverse drug reactions induced by drug drug interactions

    DTIC Science & Technology

    2017-06-08

    currently on the market and for which drug-protein interaction information is available . These predictions are publicly accessible at http://avoid...associated with these ADRs via DDIs. We made the predictions publicly available via internet access. Keywords: Drug-drug interactions, Adverse drug reactions...ˆDeceased Department of Defense Biotechnology High Performance Computing Software Applications Institute, Telemedicine and Advanced Technology Research

  15. Students and Teachers Accessing Tomorrow (STAT): Baltimore County Public School's One-to-One Digital Conversion Case in Practice

    ERIC Educational Resources Information Center

    Imbriale, Ryan; Schiner, Nicholas; Elmendorf, Douglas

    2017-01-01

    Baltimore County Public Schools is in the midst of a transformation of teaching and learning; the goal being the creation of student-centered classrooms supported by a one-to-one computer for every student. This transformation, known as Students and Teachers Accessing Tomorrow, began in 2014 and is now in its third academic year. We present this…

  16. Public library computer training for older adults to access high-quality Internet health information

    PubMed Central

    Xie, Bo; Bugg, Julie M.

    2010-01-01

    An innovative experiment to develop and evaluate a public library computer training program to teach older adults to access and use high-quality Internet health information involved a productive collaboration among public libraries, the National Institute on Aging and the National Library of Medicine of the National Institutes of Health (NIH), and a Library and Information Science (LIS) academic program at a state university. One hundred and thirty-one older adults aged 54–89 participated in the study between September 2007 and July 2008. Key findings include: a) participants had overwhelmingly positive perceptions of the training program; b) after learning about two NIH websites (http://nihseniorhealth.gov and http://medlineplus.gov) from the training, many participants started using these online resources to find high quality health and medical information and, further, to guide their decision-making regarding a health- or medically-related matter; and c) computer anxiety significantly decreased (p < .001) while computer interest and efficacy significantly increased (p = .001 and p < .001, respectively) from pre- to post-training, suggesting statistically significant improvements in computer attitudes between pre- and post-training. The findings have implications for public libraries, LIS academic programs, and other organizations interested in providing similar programs in their communities. PMID:20161649

  17. 76 FR 5973 - Privacy Act of 1974; Notice; Publication of the Systems of Records Managed by the Commodity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-02

    ...: Paper records are stored in file folders, binders, computer files (eLaw) and computer disks. Electronic records, including computer files, are stored on the Commission's network and other electronic media as... physical security measures. Technical security measures within CFTC include restrictions on computer access...

  18. Library Computing

    ERIC Educational Resources Information Center

    Library Computing, 1985

    1985-01-01

    Special supplement to "Library Journal" and "School Library Journal" covers topics of interest to school, public, academic, and special libraries planning for automation: microcomputer use, readings in automation, online searching, databases of microcomputer software, public access to microcomputers, circulation, creating a…

  19. Keeping Current: The Digital Divide: Can School Library Media Specialists Help Build the Bridge?

    ERIC Educational Resources Information Center

    Barron, Daniel D.

    2000-01-01

    Discusses the growth of electronic commerce as well as electronic education and suggests ways that schools and public libraries can help overcome inequity of access. Highlights include access to the Internet and computers; educational levels; Blacks; race and ethnic origin; rural access; use of the Internet; and income. (LRW)

  20. Benchmarking information needs and use in the Tennessee public health community*

    PubMed Central

    Lee, Patricia; Giuse, Nunzia B.; Sathe, Nila A.

    2003-01-01

    Objective: The objective is to provide insight to understanding public health officials' needs and promote access to data repositories and communication tools. Methods: Survey questions were identified by a focus group with members drawn from the fields of librarianship, public health, and informatics. The resulting comprehensive information needs survey, organized in five distinct broad categories, was distributed to 775 Tennessee public health workers from ninety-five counties in 1999 as part of the National Library of Medicine–funded Partners in Information Access contract. Results: The assessment pooled responses from 571 public health workers (73% return rate) representing seventy-two of ninety-five counties (53.4% urban and 46.6% rural) about their information-seeking behaviors, frequency of resources used, computer skills, and level of Internet access. Sixty-four percent of urban and 43% of rural respondents had email access at work and more than 50% of both urban and rural respondents had email at home (N = 289). Approximately 70% of urban and 78% of rural public health officials never or seldom used or needed the Centers for Disease Control (CDC) Website. Frequency data pooled from eleven job categories representing a subgroup of 232 health care professionals showed 72% never or seldom used or needed MEDLINE. Electronic resources used daily or weekly were email, Internet search engines, internal databases and mailing lists, and the Tennessee Department of Health Website. Conclusions: While, due to the small sample size, data cannot be generalized to the larger population, a clear trend of significant barriers to computer and Internet access can be identified across the public health community. This contributes to an overall limited use of existing electronic resources that inhibits evidence-based practice. PMID:12883562

  1. ComputerTown: A Do-It-Yourself Community Computer Project. [Computer Town, USA and Other Microcomputer Based Alternatives to Traditional Learning Environments].

    ERIC Educational Resources Information Center

    Zamora, Ramon M.

    Alternative learning environments offering computer-related instruction are developing around the world. Storefront learning centers, museum-based computer facilities, and special theme parks are some of the new concepts. ComputerTown, USA! is a public access computer literacy project begun in 1979 to serve both adults and children in Menlo Park…

  2. Computer and Internet usage by Canadian dentists.

    PubMed

    Flores-Mir, Carlos; Palmer, Neal G; Northcott, Herbert C; Huston, Carolyn; Major, Paul W

    2006-03-01

    To determine the frequency of computers in Canadian dental offices and to assess their use; to evaluate Internet access and use in Canadian dental offices; and to compare use of computers and the Internet by Canadian dentists, by the general public and by other dental groups. An anonymous, self-administered survey of Canadian dentists was conducted by mail. A potential mailing list of 14,052 active Canadian dentists was compiled from the 2003 records of provincial regulatory bodies. For each province, 7.8% of the general dentists were randomly selected with the help of computer software. The surveys were mailed to this stratified random sample of 1,096 dentists. The response rate was 28%. Of the 312 respondents, 4 (1%) were in full-time academic positions, 15 (5%) were not practising, and 9 (3%) provided incomplete data. Therefore, 284 survey responses were available for descriptive analysis. Two hundred and fifty-seven (90%) of the respondents had a computer in their primary practice. Computers were used mainly for administrative tasks (accounting, bookkeeping and scheduling) rather than clinical tasks. Internet access was common (185/250 or 74%), and high-speed Internet access (93/250 or 37%) was increasingly common, judging from the results of previous studies on computer use. The main reasons given for not having in-office Internet access were security or privacy concerns and no reported need for or interest in the service. Computer use was high in this sample of Canadian dentists, but a small proportion of dental offices remained without computers. Canadian dentists" use of the Internet was greater than that of American dentists, private enterprise and the North American public in general.

  3. Follow up: Compound data sets and software tools for chemoinformatics and medicinal chemistry applications: update and data transfer.

    PubMed

    Hu, Ye; Bajorath, Jürgen

    2014-01-01

    In 2012, we reported 30 compound data sets and/or programs developed in our laboratory in a data article and made them freely available to the scientific community to support chemoinformatics and computational medicinal chemistry applications. These data sets and computational tools were provided for download from our website. Since publication of this data article, we have generated 13 new data sets with which we further extend our collection of publicly available data and tools. Due to changes in web servers and website architectures, data accessibility has recently been limited at times. Therefore, we have also transferred our data sets and tools to a public repository to ensure full and stable accessibility. To aid in data selection, we have classified the data sets according to scientific subject areas. Herein, we describe new data sets, introduce the data organization scheme, summarize the database content and provide detailed access information in ZENODO (doi: 10.5281/zenodo.8451 and doi:10.5281/zenodo.8455).

  4. Pubcast and Genecast: Browsing and Exploring Publications and Associated Curated Content in Biology Through Mobile Devices.

    PubMed

    Goldweber, Scott; Theodore, Jamal; Torcivia-Rodriguez, John; Simonyan, Vahan; Mazumder, Raja

    2017-01-01

    Services such as Facebook, Amazon, and eBay were once solely accessed from stationary computers. These web services are now being used increasingly on mobile devices. We acknowledge this new reality by providing users a way to access publications and a curated cancer mutation database on their mobile device with daily automated updates. http://hive. biochemistry.gwu.edu/tools/HivePubcast.

  5. Access Control to Information in Pervasive Computing Environments

    DTIC Science & Technology

    2005-08-01

    for foo’s public key. (Digital signatures are omitted.) indicate a set of location and time intervals. A service will return location information only...stands for foo’s public key. (Digital signatures are omitted.) it describes the resource to which access is granted. Currently, we allow only resources...information relationship. Alice’s location information is bun- dled in her personal information. (The digital signature is omitted.) We use extended

  6. Opportunity for All: How the American Public Benefits from Internet Access at U.S. Libraries

    ERIC Educational Resources Information Center

    Becker, Samantha; Crandall, Michael D.; Fisher, Karen E.; Kinney, Bo; Landry, Carol; Rocha, Anita

    2010-01-01

    Over the past decade and a half, free access to computers and the Internet in U.S. public libraries evolved from a rare commodity into a core service. Now, people from all walks of life rely on this service every day to look for jobs, find health care, and read the latest news. As the nation struggled through a historic recession, nearly one-third…

  7. New developments in delivering public access to data from the National Center for Computational Toxicology at the EPA

    EPA Science Inventory

    Researchers at EPA’s National Center for Computational Toxicology integrate advances in biology, chemistry, and computer science to examine the toxicity of chemicals and help prioritize chemicals for further research based on potential human health risks. The goal of this researc...

  8. E-Powering the People: South Africa's Smart Cape Access Project

    ERIC Educational Resources Information Center

    Valentine, Susan

    2004-01-01

    This document examines the launch of the Smart Cape Access Project in Cape Town, South Africa. In a city where more than 80 percent of the citizens do not have access to computers and fewer still can access the Internet, public officials set out to build a "smart city," where "informed people could connect to the world and to each other by the…

  9. Math and science technology access and use in South Dakota public schools grades three through five

    NASA Astrophysics Data System (ADS)

    Schwietert, Debra L.

    The development of K-12 technology standards, soon to be added to state testing of technology proficiency, and the increasing presence of computers in homes and classrooms reflects the growing importance of technology in current society. This study examined math and science teachers' responses on a survey of technology use in grades three through five in South Dakota. A researcher-developed survey instrument was used to collect data from a random sample of 100 public schools throughout the South Dakota. Forced choice and open-ended responses were recorded. Most teachers have access to computers, but they lack resources to purchase software for their content areas, especially in science areas. Three-fourths of teachers in this study reported multiple computers in their classrooms and 67% reported access to labs in other areas of the school building. These numbers are lower than the national average of 84% of teachers with computers in their classrooms and 95% with access to computers elsewhere in the building (USDOE, 2000). Almost eight out of 10 teachers noted time as a barrier to learning more about educational software. Additional barriers included lack of school funds (38%), access to relevant training (32%), personal funds (30%), and poor quality of training (7%). Teachers most often use math and science software as supplemental, with practice tutorials cited as another common use. The most common interest for software was math for both boys and girls. The second most common choice for boys was science and for girls, language arts. Teachers reported that there was no preference for either individual or group work on computers for girls or boys. Most teachers do not systematically evaluate software for gender preferences, but review software over subjectively.

  10. 77 FR 31851 - Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-30

    ... identification, U.S. visa number, FCC point of contact, visitor signature, professional title, organizational... pertinent records, or to another public authority or professional organization, if necessary to obtain... secured by limited access card readers. The computer servers themselves are password-protected. Access to...

  11. Aggregated Computational Toxicology Online Resource

    EPA Pesticide Factsheets

    Aggregated Computational Toxicology Online Resource (AcTOR) is EPA's online aggregator of all the public sources of chemical toxicity data. ACToR aggregates data from over 1,000 public sources on over 500,000 chemicals and is searchable by chemical name, other identifiers and by chemical structure. It can be used to query a specific chemical and find all publicly available hazard, exposure and risk assessment data. It also provides access to EPA's ToxCast, ToxRefDB, DSSTox, Dashboard and DSSTox data.

  12. Web-Based Consumer Health Information: Public Access, Digital Division, and Remainders

    PubMed Central

    Lorence, Daniel; Park, Heeyoung

    2006-01-01

    Public access Internet portals and decreasing costs of personal computers have created a growing consensus that unequal access to information, or a “digital divide,” has largely disappeared for US consumers. A series of technology initiatives in the late 1990s were believed to have largely eliminated the divide. For healthcare patients, access to information is an essential part of the consumer-centric framework outlined in the recently proposed national health information initiative. Data from a recent study of health information-seeking behaviors on the Internet suggest that a “digitally underserved group” persists, effectively limiting the planned national health information infrastructure to wealthier Americans. PMID:16926743

  13. Beyond information access: Support for complex cognitive activities in public health informatics tools.

    PubMed

    Sedig, Kamran; Parsons, Paul; Dittmer, Mark; Ola, Oluwakemi

    2012-01-01

    Public health professionals work with a variety of information sources to carry out their everyday activities. In recent years, interactive computational tools have become deeply embedded in such activities. Unlike the early days of computational tool use, the potential of tools nowadays is not limited to simply providing access to information; rather, they can act as powerful mediators of human-information discourse, enabling rich interaction with public health information. If public health informatics tools are designed and used properly, they can facilitate, enhance, and support the performance of complex cognitive activities that are essential to public health informatics, such as problem solving, forecasting, sense-making, and planning. However, the effective design and evaluation of public health informatics tools requires an understanding of the cognitive and perceptual issues pertaining to how humans work and think with information to perform such activities. This paper draws on research that has examined some of the relevant issues, including interaction design, complex cognition, and visual representations, to offer some human-centered design and evaluation considerations for public health informatics tools.

  14. 10 CFR 2.4 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... (including security plans, procedures, and equipment) for the physical protection of source, byproduct, or... computer that contains the participant's name, e-mail address, and participant's digital signature, proves... inspection. It is also the place where NRC makes computer terminals available to access the Publicly...

  15. 10 CFR 2.4 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... (including security plans, procedures, and equipment) for the physical protection of source, byproduct, or... computer that contains the participant's name, e-mail address, and participant's digital signature, proves... inspection. It is also the place where NRC makes computer terminals available to access the Publicly...

  16. New Toxico-Cheminformatics & Computational Toxicology Initiatives At EPA

    EPA Science Inventory

    EPA’s National Center for Computational Toxicology is building capabilities to support a new paradigm for toxicity screening and prediction. The DSSTox project is improving public access to quality structure-annotated chemical toxicity information in less summarized forms than tr...

  17. 76 FR 7818 - Announcing a Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-11

    ... will be open to the public. The ISPAB was established by the Computer Security Act of 1987 (Pub. L. 100..., --Presentation on Science of Security relating to computer security research, --Presentation on Access of..., --A panel of Inspector Generals regarding privacy and security, and --Update on NIST Computer Security...

  18. Toward the Geoscience Paper of the Future: Best practices for documenting and sharing research from data to software to provenance

    NASA Astrophysics Data System (ADS)

    Gil, Yolanda; David, Cédric H.; Demir, Ibrahim; Essawy, Bakinam T.; Fulweiler, Robinson W.; Goodall, Jonathan L.; Karlstrom, Leif; Lee, Huikyo; Mills, Heath J.; Oh, Ji-Hyun; Pierce, Suzanne A.; Pope, Allen; Tzeng, Mimi W.; Villamizar, Sandra R.; Yu, Xuan

    2016-10-01

    Geoscientists now live in a world rich with digital data and methods, and their computational research cannot be fully captured in traditional publications. The Geoscience Paper of the Future (GPF) presents an approach to fully document, share, and cite all their research products including data, software, and computational provenance. This article proposes best practices for GPF authors to make data, software, and methods openly accessible, citable, and well documented. The publication of digital objects empowers scientists to manage their research products as valuable scientific assets in an open and transparent way that enables broader access by other scientists, students, decision makers, and the public. Improving documentation and dissemination of research will accelerate the pace of scientific discovery by improving the ability of others to build upon published work.

  19. 75 FR 75393 - Schools and Libraries Universal Service Support Mechanism and A National Broadband Plan for Our...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-03

    ... anchors, both as centers for digital literacy and as hubs for access to public computers. While their... expansion of computer labs, and facilitated deployment of new educational applications that would not have... computer fees to help defray the cost of computers or training fees to help cover the cost of training...

  20. 10 CFR 2.4 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... and safety or the common defense and security; security measures for the physical protection and... computer that contains the participant's name, e-mail address, and participant's digital signature, proves... inspection. It is also the place where NRC makes computer terminals available to access the Publicly...

  1. 10 CFR 2.4 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... and safety or the common defense and security; security measures for the physical protection and... computer that contains the participant's name, e-mail address, and participant's digital signature, proves... inspection. It is also the place where NRC makes computer terminals available to access the Publicly...

  2. GLIDE: a grid-based light-weight infrastructure for data-intensive environments

    NASA Technical Reports Server (NTRS)

    Mattmann, Chris A.; Malek, Sam; Beckman, Nels; Mikic-Rakic, Marija; Medvidovic, Nenad; Chrichton, Daniel J.

    2005-01-01

    The promise of the grid is that it will enable public access and sharing of immense amounts of computational and data resources among dynamic coalitions of individuals and institutions. However, the current grid solutions make several limiting assumptions that curtail their widespread adoption. To address these limitations, we present GLIDE, a prototype light-weight, data-intensive middleware infrastructure that enables access to the robust data and computational power of the grid on DREAM platforms.

  3. Nencki Genomics Database--Ensembl funcgen enhanced with intersections, user data and genome-wide TFBS motifs.

    PubMed

    Krystkowiak, Izabella; Lenart, Jakub; Debski, Konrad; Kuterba, Piotr; Petas, Michal; Kaminska, Bozena; Dabrowski, Michal

    2013-01-01

    We present the Nencki Genomics Database, which extends the functionality of Ensembl Regulatory Build (funcgen) for the three species: human, mouse and rat. The key enhancements over Ensembl funcgen include the following: (i) a user can add private data, analyze them alongside the public data and manage access rights; (ii) inside the database, we provide efficient procedures for computing intersections between regulatory features and for mapping them to the genes. To Ensembl funcgen-derived data, which include data from ENCODE, we add information on conserved non-coding (putative regulatory) sequences, and on genome-wide occurrence of transcription factor binding site motifs from the current versions of two major motif libraries, namely, Jaspar and Transfac. The intersections and mapping to the genes are pre-computed for the public data, and the result of any procedure run on the data added by the users is stored back into the database, thus incrementally increasing the body of pre-computed data. As the Ensembl funcgen schema for the rat is currently not populated, our database is the first database of regulatory features for this frequently used laboratory animal. The database is accessible without registration using the mysql client: mysql -h database.nencki-genomics.org -u public. Registration is required only to add or access private data. A WSDL webservice provides access to the database from any SOAP client, including the Taverna Workbench with a graphical user interface.

  4. Nencki Genomics Database—Ensembl funcgen enhanced with intersections, user data and genome-wide TFBS motifs

    PubMed Central

    Krystkowiak, Izabella; Lenart, Jakub; Debski, Konrad; Kuterba, Piotr; Petas, Michal; Kaminska, Bozena; Dabrowski, Michal

    2013-01-01

    We present the Nencki Genomics Database, which extends the functionality of Ensembl Regulatory Build (funcgen) for the three species: human, mouse and rat. The key enhancements over Ensembl funcgen include the following: (i) a user can add private data, analyze them alongside the public data and manage access rights; (ii) inside the database, we provide efficient procedures for computing intersections between regulatory features and for mapping them to the genes. To Ensembl funcgen-derived data, which include data from ENCODE, we add information on conserved non-coding (putative regulatory) sequences, and on genome-wide occurrence of transcription factor binding site motifs from the current versions of two major motif libraries, namely, Jaspar and Transfac. The intersections and mapping to the genes are pre-computed for the public data, and the result of any procedure run on the data added by the users is stored back into the database, thus incrementally increasing the body of pre-computed data. As the Ensembl funcgen schema for the rat is currently not populated, our database is the first database of regulatory features for this frequently used laboratory animal. The database is accessible without registration using the mysql client: mysql –h database.nencki-genomics.org –u public. Registration is required only to add or access private data. A WSDL webservice provides access to the database from any SOAP client, including the Taverna Workbench with a graphical user interface. Database URL: http://www.nencki-genomics.org. PMID:24089456

  5. 40 CFR 1400.4 - Vulnerable zone indicator system.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 33 2014-07-01 2014-07-01 false Vulnerable zone indicator system. 1400... INFORMATION Public Access § 1400.4 Vulnerable zone indicator system. (a) In general. The Administrator shall provide access to a computer-based indicator that shall inform any person located in any state whether an...

  6. 40 CFR 1400.4 - Vulnerable zone indicator system.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 34 2012-07-01 2012-07-01 false Vulnerable zone indicator system. 1400... INFORMATION Public Access § 1400.4 Vulnerable zone indicator system. (a) In general. The Administrator shall provide access to a computer-based indicator that shall inform any person located in any state whether an...

  7. 40 CFR 1400.4 - Vulnerable zone indicator system.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 34 2013-07-01 2013-07-01 false Vulnerable zone indicator system. 1400... INFORMATION Public Access § 1400.4 Vulnerable zone indicator system. (a) In general. The Administrator shall provide access to a computer-based indicator that shall inform any person located in any state whether an...

  8. 40 CFR 1400.4 - Vulnerable zone indicator system.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 33 2011-07-01 2011-07-01 false Vulnerable zone indicator system. 1400... INFORMATION Public Access § 1400.4 Vulnerable zone indicator system. (a) In general. The Administrator shall provide access to a computer-based indicator that shall inform any person located in any state whether an...

  9. Wheelchair accessibility to public buildings in the Kumasi metropolis, Ghana.

    PubMed

    Yarfi, Cosmos; Ashigbi, Evans Y K; Nakua, Emmanuel K

    2017-01-01

    Accessibility implies making public places accessible to every individual, irrespective of his or her disability or special need, ensuring the integration of the wheelchair user into the society and thereby granting them the capability of participating in activities of daily living and ensuring equality in daily life. This study was carried out to assess the accessibility of the physical infrastructures (public buildings) in the Kumasi metropolis to wheelchairs after the passage of the Ghanaian Disability Law (Act 716, 2006). Eighty-four public buildings housing education facilities, health facilities, ministries, departments and agencies, sports and recreation, religious groups and banks were assessed. The routes, entrances, height of steps, grade of ramps, sinks, entrance to washrooms, toilets, urinals, automated teller machines and tellers' counters were measured and computed. Out of a total of 84 buildings assessed, only 34 (40.5%) of the buildings, 52.3% of the entrances and 87.4% of the routes of the buildings were accessible to wheelchair users. A total of 25% (13 out of 52) of the public buildings with more than one floor were fitted with elevators to connect the different levels of floors. The results of this study show that public buildings in the Kumasi metropolis are not wheelchair accessible. An important observation made during this study was that there is an intention to improve accessibility when buildings are being constructed or renovated, but there are no laid down guidelines as how to make the buildings accessible for wheelchair users.

  10. Wheelchair accessibility to public buildings in the Kumasi metropolis, Ghana

    PubMed Central

    Ashigbi, Evans Y.K.

    2017-01-01

    Background Accessibility implies making public places accessible to every individual, irrespective of his or her disability or special need, ensuring the integration of the wheelchair user into the society and thereby granting them the capability of participating in activities of daily living and ensuring equality in daily life. Objective This study was carried out to assess the accessibility of the physical infrastructures (public buildings) in the Kumasi metropolis to wheelchairs after the passage of the Ghanaian Disability Law (Act 716, 2006). Methods Eighty-four public buildings housing education facilities, health facilities, ministries, departments and agencies, sports and recreation, religious groups and banks were assessed. The routes, entrances, height of steps, grade of ramps, sinks, entrance to washrooms, toilets, urinals, automated teller machines and tellers’ counters were measured and computed. Results Out of a total of 84 buildings assessed, only 34 (40.5%) of the buildings, 52.3% of the entrances and 87.4% of the routes of the buildings were accessible to wheelchair users. A total of 25% (13 out of 52) of the public buildings with more than one floor were fitted with elevators to connect the different levels of floors. Conclusion The results of this study show that public buildings in the Kumasi metropolis are not wheelchair accessible. An important observation made during this study was that there is an intention to improve accessibility when buildings are being constructed or renovated, but there are no laid down guidelines as how to make the buildings accessible for wheelchair users. PMID:29062761

  11. High-Tech: Help or Hindrance to Hispanics in College?

    ERIC Educational Resources Information Center

    Mellander, Gustavo A.

    2007-01-01

    The effect of an inability to purchase computers for home use and a lack of computers and instruction at public schools has had on the ability of Hispanic students to develop technology skills related to computer and Internet use is discussed. This article asks if the nation's emphasis on technology in schools has hindered Hispanic access to…

  12. Utility of two cancer organization websites for a multiethnic, public hospital oncology population: comparative cross-sectional survey.

    PubMed

    Nguyen, Katherine D; Hara, Belinda; Chlebowski, Rowan T

    2005-07-01

    While information websites have been developed by major cancer organizations, their appropriateness for patients in multiethnic, multilingual public hospital settings has received limited attention. The objective of the study was to determine the utility of cancer information websites for a public hospital patient population. A 70-item questionnaire was developed to evaluate cancer information seeking behavior, Internet access and use, and content appropriateness of two cancer information websites: People Living with Cancer from the American Society of Clinical Oncology (ASCO) and Breast Cancer Info from the Susan Komen Breast Cancer Foundation (SKF). Interviews were conducted with consecutive consenting oncology patients seen in a public hospital oncology clinic. Fifty-nine persons participated in the survey. The response rate was 80%. Participants were Caucasian (25%), African American (19%), Hispanic (42%), and Asian/Pacific Islander (11%). English was the primary language in 53% of participants, 56% had a high school education or less, and 74% had an annual income less than US 35000 dollars. With respect to computer and Internet use, 71% had computer access, and 44% searched for cancer information online, with more being interested in obtaining online information in the future (63%). Participants who had computer access were likely to be English speaking (P = .04). Those less likely to have previously used a computer tended to have a lower annual income (P = .02) or to be males aged 55 years or older (P < .05). When shown sample content from the two websites, almost all participants stated that it was "easy to understand" (ASCO 96%, SKF 96%) and had "easy to understand terms" (ASCO 94%, SKF 92%). Somewhat fewer respondents agreed that the websites provided "information they could use" (ASCO 88%, SKF 80%) or that they would return to these websites (ASCO 73%, SKF 68%). The majority planned to "discuss website information with their oncologists" (ASCO 82%, SKF 70%). Multiethnic, multilingual cancer patients at a public county hospital commonly had Internet access and found the content of two websites representative of major cancer organizations to be both understandable and useful.

  13. A National Study of the Relationship between Home Access to a Computer and Academic Performance Scores of Grade 12 U.S. Science Students: An Analysis of the 2009 NAEP Data

    NASA Astrophysics Data System (ADS)

    Coffman, Mitchell Ward

    The purpose of this dissertation was to examine the relationship between student access to a computer at home and academic achievement. The 2009 National Assessment of Educational Progress (NAEP) dataset was probed using the National Data Explorer (NDE) to investigate correlations in the subsets of SES, Parental Education, Race, and Gender as it relates to access of a home computer and improved performance scores for U.S. public school grade 12 science students. A causal-comparative approach was employed seeking clarity on the relationship between home access and performance scores. The influence of home access cannot overcome the challenges students of lower SES face. The achievement gap, or a second digital divide, for underprivileged classes of students, including minorities does not appear to contract via student access to a home computer. Nonetheless, in tests for significance, statistically significant improvement in science performance scores was reported for those having access to a computer at home compared to those not having access. Additionally, regression models reported evidence of correlations between and among subsets of controls for the demographic factors gender, race, and socioeconomic status. Variability in these correlations was high; suggesting influence from unobserved factors may have more impact upon the dependent variable. Having access to a computer at home increases performance scores for grade 12 general science students of all races, genders and socioeconomic levels. However, the performance gap is roughly equivalent to the existing performance gap of the national average for science scores, suggesting little influence from access to a computer on academic achievement. The variability of scores reported in the regression analysis models reflects a moderate to low effect, suggesting an absence of causation. These statistical results are accurate and confirm the literature review, whereby having access to a computer at home and the predictor variables were found to have a significant impact on performance scores, although the data presented suggest computer access at home is less influential upon performance scores than poverty and its correlates.

  14. Hagerstown-Jefferson Township Public Library Internet Web Site.

    ERIC Educational Resources Information Center

    Albertson, Marie

    1997-01-01

    Describes the development of the Hagerstown (Indiana) public library's Web site. Highlights include writing successful grant proposals for funding; software from Microsoft; community support; free community access to the Internet from home computers as well as at the library; problems encountered; and future plans. (LRW)

  15. Monitoring and Evaluating Use of the World Wide Web in an Academic Library: An Exploratory Study.

    ERIC Educational Resources Information Center

    Abramson, Alicia D.

    1998-01-01

    Examines use of the World Wide Web on public-access computers at the American University Library (Washington, D.C.) to identify the most frequently accessed Web sites, the frequency with which library-owned Web resources were accessed, and Web-usage patterns in the library in relation to the time of day and day of the week. (Author/AEF)

  16. The Association between Access to Public Transportation and Self-Reported Active Commuting

    PubMed Central

    Djurhuus, Sune; Hansen, Henning S.; Aadahl, Mette; Glümer, Charlotte

    2014-01-01

    Active commuting provides routine-based regular physical activity which can reduce the risk of chronic diseases. Using public transportation involves some walking or cycling to a transit stop, transfers and a walk to the end location and users of public transportation have been found to accumulate more moderate physical activity than non-users. Understanding how public transportation characteristics are associated with active transportation is thus important from a public health perspective. This study examines the associations between objective measures of access to public transportation and self-reported active commuting. Self-reported time spent either walking or cycling commuting each day and the distance to workplace were obtained for adults aged 16 to 65 in the Danish National Health Survey 2010 (n = 28,928). Access to public transportation measures were computed by combining GIS-based road network distances from home address to public transit stops an integrating their service level. Multilevel logistic regression was used to examine the association between access to public transportation measures and active commuting. Distance to bus stop, density of bus stops, and number of transport modes were all positively associated with being an active commuter and with meeting recommendations of physical activity. No significant association was found between bus services at the nearest stop and active commuting. The results highlight the importance of including detailed measurements of access to public transit in order to identify the characteristics that facilitate the use of public transportation and active commuting. PMID:25489998

  17. The association between access to public transportation and self-reported active commuting.

    PubMed

    Djurhuus, Sune; Hansen, Henning S; Aadahl, Mette; Glümer, Charlotte

    2014-12-05

    Active commuting provides routine-based regular physical activity which can reduce the risk of chronic diseases. Using public transportation involves some walking or cycling to a transit stop, transfers and a walk to the end location and users of public transportation have been found to accumulate more moderate physical activity than non-users. Understanding how public transportation characteristics are associated with active transportation is thus important from a public health perspective. This study examines the associations between objective measures of access to public transportation and self-reported active commuting. Self-reported time spent either walking or cycling commuting each day and the distance to workplace were obtained for adults aged 16 to 65 in the Danish National Health Survey 2010 (n = 28,928). Access to public transportation measures were computed by combining GIS-based road network distances from home address to public transit stops an integrating their service level. Multilevel logistic regression was used to examine the association between access to public transportation measures and active commuting. Distance to bus stop, density of bus stops, and number of transport modes were all positively associated with being an active commuter and with meeting recommendations of physical activity. No significant association was found between bus services at the nearest stop and active commuting. The results highlight the importance of including detailed measurements of access to public transit in order to identify the characteristics that facilitate the use of public transportation and active commuting.

  18. Adjusting to Technology

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2007-01-01

    With classroom Internet access nearly universal in public schools and computers ubiquitous on every school and university campus, classroom furnishings have evolved to accommodate the machines so students can take full advantage of the technology. The desks, tables and other furniture that a school chooses for its computers will depend on the…

  19. Laptops and Inspired Writing

    ERIC Educational Resources Information Center

    Warschauer, Mark; Arada, Kathleen; Zheng, Binbin

    2010-01-01

    Can daily access to laptop computers help students become better writers? Are such programs affordable? Evidence from the Inspired Writing program in Littleton Public Schools, Colorado, USA, provides a resounding yes to both questions. The program employs student netbooks, open-source software, cloud computing, and social media to help students in…

  20. Investigation of the Public Library as a Linking Agent to Major Scientific, Educational, Social and Environmental Data Bases. Two-Year Interim Report.

    ERIC Educational Resources Information Center

    Summit, Roger K.; Firschein, Oscar

    Eight public libraries participated in a two-year experiment to investigate the potential of the public library as a "linking agent" between the public and the many machine-readable data bases currently accessible using on line computer terminals. The investigation covered users of the service, impact on the library, conditions for…

  1. Public census data on CD-ROM at Lawrence Berkeley Laboratory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Merrill, D.W.

    The Comprehensive Epidemiologic Data Resource (CEDR) and Populations at Risk to Environmental Pollution (PAREP) projects, of the Information and Computing Sciences Division (ICSD) at Lawrence Berkeley Laboratory (LBL), are using public socio-economic and geographic data files which are available to CEDR and PAREP collaborators via LBL`s computing network. At this time 70 CD-ROM diskettes (approximately 36 gigabytes) are on line via the Unix file server cedrcd. lbl. gov. Most of the files are from the US Bureau of the Census, and most pertain to the 1990 Census of Population and Housing. All the CD-ROM diskettes contain documentation in the formmore » of ASCII text files. Printed documentation for most files is available for inspection at University of California Data and Technical Assistance (UC DATA), or the UC Documents Library. Many of the CD-ROM diskettes distributed by the Census Bureau contain software for PC compatible computers, for easily accessing the data. Shared access to the data is maintained through a collaboration among the CEDR and PAREP projects at LBL, and UC DATA, and the UC Documents Library. Via the Sun Network File System (NFS), these data can be exported to Internet computers for direct access by the user`s application program(s).« less

  2. Public census data on CD-ROM at Lawrence Berkeley Laboratory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Merrill, D.W.

    The Comprehensive Epidemiologic Data Resource (CEDR) and Populations at Risk to Environmental Pollution (PAREP) projects, of the Information and Computing Sciences Division (ICSD) at Lawrence Berkeley Laboratory (LBL), are using public socio-economic and geographic data files which are available to CEDR and PAREP collaborators via LBL's computing network. At this time 70 CD-ROM diskettes (approximately 36 gigabytes) are on line via the Unix file server cedrcd. lbl. gov. Most of the files are from the US Bureau of the Census, and most pertain to the 1990 Census of Population and Housing. All the CD-ROM diskettes contain documentation in the formmore » of ASCII text files. Printed documentation for most files is available for inspection at University of California Data and Technical Assistance (UC DATA), or the UC Documents Library. Many of the CD-ROM diskettes distributed by the Census Bureau contain software for PC compatible computers, for easily accessing the data. Shared access to the data is maintained through a collaboration among the CEDR and PAREP projects at LBL, and UC DATA, and the UC Documents Library. Via the Sun Network File System (NFS), these data can be exported to Internet computers for direct access by the user's application program(s).« less

  3. Computer Technology Standards of Learning for Virginia's Public Schools

    ERIC Educational Resources Information Center

    Virginia Department of Education, 2005

    2005-01-01

    The Computer/Technology Standards of Learning identify and define the progressive development of essential knowledge and skills necessary for students to access, evaluate, use, and create information using technology. They provide a framework for technology literacy and demonstrate a progression from physical manipulation skills for the use of…

  4. Building a Library Network from Scratch: Eric & Veronica's Excellent Adventure.

    ERIC Educational Resources Information Center

    Sisler, Eric; Smith, Veronica

    2000-01-01

    Describes library automation issues during the planning and construction of College Hill Library (Colorado), a joint-use facility shared by a community college and a public library. Discuses computer networks; hardware selection; public access to catalogs and electronic resources; classification schemes and bibliographic data; children's…

  5. Learning from Public Television and the Web: Positioning Continuing Education as a Knowledge Portal.

    ERIC Educational Resources Information Center

    Vedro, Steven R.

    1999-01-01

    Digital convergence--the merging of television and computing--challenges localized monopolies of public television and continuing education. Continuing educators can reposition themselves in the electronic marketplace by serving as an educational portal, bringing their strengths of "brand recognition," local customer base, and access to…

  6. EPA DSSTox and ToxCast Project Updates: Generating New Data and Linkages in Support of Public Toxico-Cheminformatics Efforts

    EPA Science Inventory

    EPA’s National Center for Computational Toxicology is generating data and capabilities to support a new paradigm for toxicity screening and prediction. The DSSTox project is improving public access to quality structure-annotated chemical toxicity information in less summarized fo...

  7. Web-based analysis and publication of flow cytometry experiments.

    PubMed

    Kotecha, Nikesh; Krutzik, Peter O; Irish, Jonathan M

    2010-07-01

    Cytobank is a Web-based application for storage, analysis, and sharing of flow cytometry experiments. Researchers use a Web browser to log in and use a wide range of tools developed for basic and advanced flow cytometry. In addition to providing access to standard cytometry tools from any computer, Cytobank creates a platform and community for developing new analysis and publication tools. Figure layouts created on Cytobank are designed to allow transparent access to the underlying experiment annotation and data processing steps. Since all flow cytometry files and analysis data are stored on a central server, experiments and figures can be viewed or edited by anyone with the proper permission, from any computer with Internet access. Once a primary researcher has performed the initial analysis of the data, collaborators can engage in experiment analysis and make their own figure layouts using the gated, compensated experiment files. Cytobank is available to the scientific community at http://www.cytobank.org. (c) 2010 by John Wiley & Sons, Inc.

  8. Web-Based Analysis and Publication of Flow Cytometry Experiments

    PubMed Central

    Kotecha, Nikesh; Krutzik, Peter O.; Irish, Jonathan M.

    2014-01-01

    Cytobank is a web-based application for storage, analysis, and sharing of flow cytometry experiments. Researchers use a web browser to log in and use a wide range of tools developed for basic and advanced flow cytometry. In addition to providing access to standard cytometry tools from any computer, Cytobank creates a platform and community for developing new analysis and publication tools. Figure layouts created on Cytobank are designed to allow transparent access to the underlying experiment annotation and data processing steps. Since all flow cytometry files and analysis data are stored on a central server, experiments and figures can be viewed or edited by anyone with the proper permissions from any computer with Internet access. Once a primary researcher has performed the initial analysis of the data, collaborators can engage in experiment analysis and make their own figure layouts using the gated, compensated experiment files. Cytobank is available to the scientific community at www.cytobank.org PMID:20578106

  9. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.

    PubMed

    Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia

    2018-05-17

    Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional "encrypt-then-sign" or "sign-then-encrypt" strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation.

  10. The Performance Improvement of the Lagrangian Particle Dispersion Model (LPDM) Using Graphics Processing Unit (GPU) Computing

    DTIC Science & Technology

    2017-08-01

    access to the GPU for general purpose processing .5 CUDA is designed to work easily with multiple programming languages , including Fortran. CUDA is a...Using Graphics Processing Unit (GPU) Computing by Leelinda P Dawson Approved for public release; distribution unlimited...The Performance Improvement of the Lagrangian Particle Dispersion Model (LPDM) Using Graphics Processing Unit (GPU) Computing by Leelinda

  11. Accessing the public MIMIC-II intensive care relational database for clinical research.

    PubMed

    Scott, Daniel J; Lee, Joon; Silva, Ikaro; Park, Shinhyuk; Moody, George B; Celi, Leo A; Mark, Roger G

    2013-01-10

    The Multiparameter Intelligent Monitoring in Intensive Care II (MIMIC-II) database is a free, public resource for intensive care research. The database was officially released in 2006, and has attracted a growing number of researchers in academia and industry. We present the two major software tools that facilitate accessing the relational database: the web-based QueryBuilder and a downloadable virtual machine (VM) image. QueryBuilder and the MIMIC-II VM have been developed successfully and are freely available to MIMIC-II users. Simple example SQL queries and the resulting data are presented. Clinical studies pertaining to acute kidney injury and prediction of fluid requirements in the intensive care unit are shown as typical examples of research performed with MIMIC-II. In addition, MIMIC-II has also provided data for annual PhysioNet/Computing in Cardiology Challenges, including the 2012 Challenge "Predicting mortality of ICU Patients". QueryBuilder is a web-based tool that provides easy access to MIMIC-II. For more computationally intensive queries, one can locally install a complete copy of MIMIC-II in a VM. Both publicly available tools provide the MIMIC-II research community with convenient querying interfaces and complement the value of the MIMIC-II relational database.

  12. Smartphones as Tools for Delivering Sun-Smart Education to Students

    ERIC Educational Resources Information Center

    Igoe, Damien; Parisi, Alfio; Carter, Brad

    2013-01-01

    Smartphones are used widely by the general public and students. They are one of the most popular and easily accessible technologies. These devices were originally designed as a means of communication. However, they have evolved into a mobile computing platform with built in sensors and the ability to access a vast number of applications. This…

  13. 75 FR 16123 - Dave & Buster’s, Inc.; Analysis of Proposed Consent Order to Aid Public Comment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-31

    ... computer networks or to conduct security investigations, such as by employing an intrusion detection system and monitoring system logs; (b) failed to adequately restrict third-party access to its networks, such... reasonable and appropriate security for personal information on its computer networks. Among other things...

  14. Information Technology Planning: Computers in the School Library--How Many Are Enough?

    ERIC Educational Resources Information Center

    Simpson, Carol

    2002-01-01

    Describes the development of a formula to determine the needed quantity of computers for a school library. Four types of information technology activities (administrative, personal productive, class/group productive, online public access catalog) and several variables (age levels served, campus focus, number of staff, size of student body, average…

  15. Education and Library Services for Community Information Utilities.

    ERIC Educational Resources Information Center

    Farquhar, John A.

    The concept of "computer utility"--the provision of computing and information service by a utility in the form of a national network to which any person desiring information could gain access--has been gaining interest among the public and among the technical community. This report on planning community information utilities discusses the…

  16. Employees with Myasthenia Gravis

    MedlinePlus

    ... of Disabilities Publications Resources Home | Accommodation and Compliance Series: Employees with Myasthenia Gravis By Linda Carter Batiste, ... rest breaks Fine Motor Impairment: Implement ergonomic workstation design Provide alternative computer and telephone access Provide arm ...

  17. 46 CFR 525.3 - Availability of marine terminal operator schedules.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... that is made available to the public shall be available during normal business hours and in electronic... computer (PC) by: (1) Dial-up connection via public switched telephone networks (PSTN); or (2) The Internet... incoming calls, (ii) Smart terminal capability for VT-100 terminal or terminal emulation access, and (iii...

  18. 46 CFR 525.3 - Availability of marine terminal operator schedules.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... that is made available to the public shall be available during normal business hours and in electronic... computer (PC) by: (1) Dial-up connection via public switched telephone networks (PSTN); or (2) The Internet... incoming calls, (ii) Smart terminal capability for VT-100 terminal or terminal emulation access, and (iii...

  19. 46 CFR 525.3 - Availability of marine terminal operator schedules.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... that is made available to the public shall be available during normal business hours and in electronic... computer (PC) by: (1) Dial-up connection via public switched telephone networks (PSTN); or (2) The Internet... incoming calls, (ii) Smart terminal capability for VT-100 terminal or terminal emulation access, and (iii...

  20. Structure Identification Using High Resolution Mass Spectrometry Data and the EPAs Chemistry Dashboard (ACS Fall meeting)

    EPA Science Inventory

    The iCSS Chemistry Dashboard is a publicly accessible dashboard provided by the National Center for Computation Toxicology at the US-EPA. It serves a number of purposes, including providing a chemistry database underpinning many of our public-facing projects (e.g. ToxCast and Exp...

  1. Exploring Social Contextual Correlates of Computer Ownership and Frequency of Use Among Urban, Low-Income, Public Housing Adult Residents

    PubMed Central

    Puleo, Elaine; Bennett, Gary G; Emmons, Karen M

    2007-01-01

    Background As advances in computer access continue to be made, there is a need to better understand the challenges of increasing access for racial/ethnic minorities, particularly among those with lower incomes. Larger social contextual factors, such as social networks and neighborhood factors, may influence computer ownership and the number of places where individuals have access to computers. Objectives We examined the associations of sociodemographic and social contextual factors with computer ownership and frequency of use among 1554 adults living in urban public housing. Methods Bivariate associations between dependent variables (computer ownership and regular computer use) and independent variables were used to build multivariable logistic models adjusted for age and site clusters. Results Participants (N = total weighted size of 2270) were on average 51.0 (± 21.4) years old, primarily African American or Hispanic, and earned less than US $20000 per year. More than half owned a computer, and 42% were regular computer users. Reporting computer ownership was more likely if participants lived above the poverty level (OR = 1.78, 95% CI = 1.39-2.29), completed high school (OR = 2.46, 95% CI = 1.70-3.55), were in financial hardship (OR = 1.38, 95% CI = 1.06-1.81), were employed and supervised others (OR = 1.94, 95% CI = 1.08-3.46), and had multiple role responsibilities (OR = 2.18, 95% CI = 1.31-3.61). Regular computer use was more likely if participants were non-Hispanic (OR = 1.94, 95% CI = 1.30-2.91), lived above the poverty level (OR = 2.84, 95% CI = 1.90-4.24), completed high school (OR = 4.43, 95% CI = 3.04-6.46), were employed and supervised others (OR = 2.41, 95% CI = 1.37-4.22), felt safe in their neighborhood (OR = 1.57, 95% CI = 1.08-2.30), and had greater social network ties (OR = 3.09, 95% CI = 1.26-7.59). Conclusions Disparities in computer ownership and use are narrowing, even among those with very low incomes; however, identifying factors that contribute to disparities in access for these groups will be necessary to ensure the efficacy of future technology-based interventions. A unique finding of our study is that it may be equally as important to consider specific social contextual factors when trying to increase access and use among low-income minorities, such as social network ties, household responsibilities, and neighborhood safety. PMID:18093903

  2. An Intelligent System Proposal for Improving the Safety and Accessibility of Public Transit by Highway

    PubMed Central

    García, Carmelo R.; Quesada-Arencibia, Alexis; Cristóbal, Teresa; Padrón, Gabino; Pérez, Ricardo; Alayón, Francisco

    2015-01-01

    The development of public transit systems that are accessible and safe for everyone, including people with special needs, is an objective that is justified from the civic and economic points of view. Unfortunately, public transit services are conceived for people who do not have reduced physical or cognitive abilities. In this paper, we present an intelligent public transit system by highway with the goal of facilitating access and improving the safety of public transit for persons with special needs. The system is deployed using components that are commonly available in transport infrastructure, e.g., sensors, mobile communications systems, and positioning systems. In addition, the system can operate in non-urban transport contexts, e.g., isolated rural areas, where the availability of basic infrastructure, such as electricity and communications infrastructures, is not always guaranteed. To construct the system, the principles and techniques of Ubiquitous Computing and Ambient Intelligence have been employed. To illustrate the utility of the system, two cases of services rendered by the system are described: the first case involves a surveillance system to guarantee accessibility at bus stops; the second case involves a route assistant for blind people. PMID:26295234

  3. The business of demographics.

    PubMed

    Russell, C

    1984-06-01

    The emergence of "demographics" in the past 15 years is a vital tool for American business research and planning. Tracing demographic trends became important for businesses when traditional consumer markets splintered with the enormous changes since the 1960s in US population growth, age structure, geographic distribution, income, education, living arrangements, and life-styles. The mass of reliable, small-area demographic data needed for market estimates and projections became available with the electronic census--public release of Census Bureau census and survey data on computer tape, beginning with the 1970 census. Census Bureau tapes as well as printed reports and microfiche are now widely accessible at low cost through summary tape processing centers designated by the bureau and its 12 regional offices and State Data Center Program. Data accessibility, plummeting computer costs, and businessess' unfamiliarity with demographics spawned the private data industry. By 1984, 70 private companies were offering demographic services to business clients--customized information repackaged from public data or drawn from proprietary data bases created from such data. Critics protest the for-profit use of public data by companies able to afford expensive mainframe computer technology. Business people defend their rights to public data as taxpaying ceitzens, but they must ensure that the data are indeed used for the public good. They must also question the quality of demographic data generated by private companies. Business' demographic expertise will improve when business schools offer training in demography, as few now do, though 40 of 88 graduate-level demographic programs now include business-oriented courses. Lower cost, easier access to business demographics is growing as more census data become available on microcomputer diskettes and through on-line linkages with large data bases--from private data companies and the Census Bureau itself. A directory of private and public demographic resources is appended, including forecasting, consulting and research services available.

  4. Cloud BioLinux: pre-configured and on-demand bioinformatics computing for the genomics community.

    PubMed

    Krampis, Konstantinos; Booth, Tim; Chapman, Brad; Tiwari, Bela; Bicak, Mesude; Field, Dawn; Nelson, Karen E

    2012-03-19

    A steep drop in the cost of next-generation sequencing during recent years has made the technology affordable to the majority of researchers, but downstream bioinformatic analysis still poses a resource bottleneck for smaller laboratories and institutes that do not have access to substantial computational resources. Sequencing instruments are typically bundled with only the minimal processing and storage capacity required for data capture during sequencing runs. Given the scale of sequence datasets, scientific value cannot be obtained from acquiring a sequencer unless it is accompanied by an equal investment in informatics infrastructure. Cloud BioLinux is a publicly accessible Virtual Machine (VM) that enables scientists to quickly provision on-demand infrastructures for high-performance bioinformatics computing using cloud platforms. Users have instant access to a range of pre-configured command line and graphical software applications, including a full-featured desktop interface, documentation and over 135 bioinformatics packages for applications including sequence alignment, clustering, assembly, display, editing, and phylogeny. Each tool's functionality is fully described in the documentation directly accessible from the graphical interface of the VM. Besides the Amazon EC2 cloud, we have started instances of Cloud BioLinux on a private Eucalyptus cloud installed at the J. Craig Venter Institute, and demonstrated access to the bioinformatic tools interface through a remote connection to EC2 instances from a local desktop computer. Documentation for using Cloud BioLinux on EC2 is available from our project website, while a Eucalyptus cloud image and VirtualBox Appliance is also publicly available for download and use by researchers with access to private clouds. Cloud BioLinux provides a platform for developing bioinformatics infrastructures on the cloud. An automated and configurable process builds Virtual Machines, allowing the development of highly customized versions from a shared code base. This shared community toolkit enables application specific analysis platforms on the cloud by minimizing the effort required to prepare and maintain them.

  5. Cloud BioLinux: pre-configured and on-demand bioinformatics computing for the genomics community

    PubMed Central

    2012-01-01

    Background A steep drop in the cost of next-generation sequencing during recent years has made the technology affordable to the majority of researchers, but downstream bioinformatic analysis still poses a resource bottleneck for smaller laboratories and institutes that do not have access to substantial computational resources. Sequencing instruments are typically bundled with only the minimal processing and storage capacity required for data capture during sequencing runs. Given the scale of sequence datasets, scientific value cannot be obtained from acquiring a sequencer unless it is accompanied by an equal investment in informatics infrastructure. Results Cloud BioLinux is a publicly accessible Virtual Machine (VM) that enables scientists to quickly provision on-demand infrastructures for high-performance bioinformatics computing using cloud platforms. Users have instant access to a range of pre-configured command line and graphical software applications, including a full-featured desktop interface, documentation and over 135 bioinformatics packages for applications including sequence alignment, clustering, assembly, display, editing, and phylogeny. Each tool's functionality is fully described in the documentation directly accessible from the graphical interface of the VM. Besides the Amazon EC2 cloud, we have started instances of Cloud BioLinux on a private Eucalyptus cloud installed at the J. Craig Venter Institute, and demonstrated access to the bioinformatic tools interface through a remote connection to EC2 instances from a local desktop computer. Documentation for using Cloud BioLinux on EC2 is available from our project website, while a Eucalyptus cloud image and VirtualBox Appliance is also publicly available for download and use by researchers with access to private clouds. Conclusions Cloud BioLinux provides a platform for developing bioinformatics infrastructures on the cloud. An automated and configurable process builds Virtual Machines, allowing the development of highly customized versions from a shared code base. This shared community toolkit enables application specific analysis platforms on the cloud by minimizing the effort required to prepare and maintain them. PMID:22429538

  6. Access to Inter-Organization Computer Networks.

    DTIC Science & Technology

    1985-08-01

    management of computing and information systems, system management . 20. ABSTRACT (Continue on reverse aide it neceeery end identify by block number) When two...necessary control mechanisms. Message-based gateways that support non-real-time invocation of services (e.g., file and print servers, financial ...operations (C.2.3), electronic mail (H.4.3), public policy issues (K.4.1), organizationa impacts (K.4.3), management of computing and information systems (K.6

  7. The Changing Dynamics of Military Advantage in the Information Age

    DTIC Science & Technology

    2004-06-17

    exploit information technologies . The continued integration of functions into Internet web-based activity will also continue to accelerate. Technological ...commercialization of the Internet and associated information technologies . The development and proliferation of computing 35 and communications...motivations. Moreover, the cost of access to information technology continues to diminish. Consider the ability to access the Internet in a public

  8. Cloud Computing Technologies Facilitate Earth Research

    NASA Technical Reports Server (NTRS)

    2015-01-01

    Under a Space Act Agreement, NASA partnered with Seattle-based Amazon Web Services to make the agency's climate and Earth science satellite data publicly available on the company's servers. Users can access the data for free, but they can also pay to use Amazon's computing services to analyze and visualize information using the same software available to NASA researchers.

  9. Computer Cataloging of Electronic Journals in Unstable Aggregator Databases: The Hong Kong Baptist University Library Experience.

    ERIC Educational Resources Information Center

    Li, Yiu-On; Leung, Shirley W.

    2001-01-01

    Discussion of aggregator databases focuses on a project at the Hong Kong Baptist University library to integrate full-text electronic journal titles from three unstable aggregator databases into its online public access catalog (OPAC). Explains the development of the electronic journal computer program (EJCOP) to generate MARC records for…

  10. Digital Literature: Finding New Ways to Motivate Students to Read Brazilian Literature Electronic Books

    ERIC Educational Resources Information Center

    Barbosa, Vania Soares; Lima, Vera; Silva, Rejane; Silva, Willy; Soares, Ana Carolina; de Sousa, Aline

    2012-01-01

    This quantitative and qualitative study is aimed to diagnose and promote the use of new technologies in teaching literature reading in Public (State) Schools, assessing materials accessibility and computer skills. The research consisted of three distinct steps: (1) A survey to detect teachers' and students' computer skills, their use of computers…

  11. Experiences of registered nurses with regard to accessing health information at the point-of-care via mobile computing devices.

    PubMed

    Ricks, Esmeralda; Benjamin, Valencia; Williams, Margaret

    2015-11-19

    The volume of health information necessary to provide competent health care today has become overwhelming. Mobile computing devices are fast becoming an essential clinical tool for accessing health information at the point-of-care of patients. This study explored and described how registered nurses experienced accessing information at the point-of-care via mobile computing devices (MCDs). A qualitative, exploratory, descriptive and contextual design was used. Ten in-depth interviews were conducted with purposively sampled registered nurses employed by a state hospital in the Nelson Mandela Bay Municipality (NMBM). Interviews were recorded, transcribed verbatim and analysed using Tesch's data analysis technique. Ethical principles were adhered to throughout the study. Guba's model of trustworthiness was used to confirm integrity of the study. Four themes emerged which revealed that the registered nurses benefited from the training they received by enabling them to develop, and improve, their computer literacy levels. Emphasis was placed on the benefits that the accessed information had for educational purposes for patients and the public, for colleagues and students. Furthermore the ability to access information at the point-of-care was considered by registered nurses as valuable to improve patient care because of the wide range of accurate and readily accessible information available via the mobile computing device. The registered nurses in this study felt that being able to access information at the point-of-care increased their confidence and facilitated the provision of quality care because it assisted them in being accurate and sure of what they were doing.

  12. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation

    PubMed Central

    Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia

    2018-01-01

    Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional “encrypt-then-sign” or “sign-then-encrypt” strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation. PMID:29772840

  13. Opportunities for engaging low-income, vulnerable populations in health care: a systematic review of homeless persons' access to and use of information technologies.

    PubMed

    McInnes, D Keith; Li, Alice E; Hogan, Timothy P

    2013-12-01

    We systematically reviewed the health and social science literature on access to and use of information technologies by homeless persons by searching 5 bibliographic databases. Articles were included if they were in English, represented original research, appeared in peer-reviewed publications, and addressed our research questions. Sixteen articles met our inclusion criteria. We found that mobile phone ownership ranged from 44% to 62%; computer ownership, from 24% to 40%; computer access and use, from 47% to 55%; and Internet use, from 19% to 84%. Homeless persons used technologies for a range of purposes, some of which were health related. Many homeless persons had access to information technologies, suggesting possible health benefits to developing programs that link homeless persons to health care through mobile phones and the Internet.

  14. Structure Identification Using High Resolution Mass Spectrometry Data and the EPA’s CompTox Chemistry Dashboard (EAS)

    EPA Science Inventory

    The iCSS CompTox Dashboard is a publicly accessible dashboard provided by the National Center for Computation Toxicology at the US-EPA. It serves a number of purposes, including providing a chemistry database underpinning many of our public-facing projects (e.g. ToxCast and ExpoC...

  15. Making Spatial Statistics Service Accessible On Cloud Platform

    NASA Astrophysics Data System (ADS)

    Mu, X.; Wu, J.; Li, T.; Zhong, Y.; Gao, X.

    2014-04-01

    Web service can bring together applications running on diverse platforms, users can access and share various data, information and models more effectively and conveniently from certain web service platform. Cloud computing emerges as a paradigm of Internet computing in which dynamical, scalable and often virtualized resources are provided as services. With the rampant growth of massive data and restriction of net, traditional web services platforms have some prominent problems existing in development such as calculation efficiency, maintenance cost and data security. In this paper, we offer a spatial statistics service based on Microsoft cloud. An experiment was carried out to evaluate the availability and efficiency of this service. The results show that this spatial statistics service is accessible for the public conveniently with high processing efficiency.

  16. The impact of commercialisation and genetic data sharing arrangements on public trust and the intention to participate in biobank research.

    PubMed

    Critchley, Christine; Nicol, Dianne; Otlowski, Margaret

    2015-01-01

    The necessity for biobanks to share their resources with third parties poses potential risks to public trust and the intention to participate in genetic research. We explore the effects of data sharing and the type of third-party access (public vs. private) on public trust and, in turn, the intention to participate in biobank research. An experimental design was used to assess a national sample of 1,701 Australians via a computer-assisted telephone interview. The results revealed that trust and the intention to participate significantly decreased in relation to private compared to public biobanks, and when access to third-party researchers was allowed compared to when it was not. Somewhat surprisingly, no differences were found in relation to the third party being international compared to Australian, but trust and the intention to participate were significantly eroded when private third parties were allowed access. Those with a university education were particularly distrustful of private biobanks and biobanks that allowed access, while those who were more aware of genetic databases appeared more confident with biobanks sharing with private-sector third parties. The pattern of results suggests that public awareness of the need for biobanks to share their resources widely needs to be increased to maintain public trust and support. © 2015 S. Karger AG, Basel.

  17. Simplified Key Management for Digital Access Control of Information Objects

    DTIC Science & Technology

    2016-07-02

    0001, Task BC-5-2283, “Architecture, Design of Services for Air Force Wide Distributed Systems,” for USAF HQ USAF SAF/CIO A6. The views, opinions...Challenges for Cloud Computing,” Lecture Notes in Engineering and Computer Science: Proceedings World Congress on Engineering and Computer Science 2011...P. Konieczny USAF HQ USAF SAF/CIO A6 11. SPONSOR’S / MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION / AVAILABILITY STATEMENT Approved for public

  18. OMPC: an Open-Source MATLAB®-to-Python Compiler

    PubMed Central

    Jurica, Peter; van Leeuwen, Cees

    2008-01-01

    Free access to scientific information facilitates scientific progress. Open-access scientific journals are a first step in this direction; a further step is to make auxiliary and supplementary materials that accompany scientific publications, such as methodological procedures and data-analysis tools, open and accessible to the scientific community. To this purpose it is instrumental to establish a software base, which will grow toward a comprehensive free and open-source language of technical and scientific computing. Endeavors in this direction are met with an important obstacle. MATLAB®, the predominant computation tool in many fields of research, is a closed-source commercial product. To facilitate the transition to an open computation platform, we propose Open-source MATLAB®-to-Python Compiler (OMPC), a platform that uses syntax adaptation and emulation to allow transparent import of existing MATLAB® functions into Python programs. The imported MATLAB® modules will run independently of MATLAB®, relying on Python's numerical and scientific libraries. Python offers a stable and mature open source platform that, in many respects, surpasses commonly used, expensive commercial closed source packages. The proposed software will therefore facilitate the transparent transition towards a free and general open-source lingua franca for scientific computation, while enabling access to the existing methods and algorithms of technical computing already available in MATLAB®. OMPC is available at http://ompc.juricap.com. PMID:19225577

  19. Accessing the public MIMIC-II intensive care relational database for clinical research

    PubMed Central

    2013-01-01

    Background The Multiparameter Intelligent Monitoring in Intensive Care II (MIMIC-II) database is a free, public resource for intensive care research. The database was officially released in 2006, and has attracted a growing number of researchers in academia and industry. We present the two major software tools that facilitate accessing the relational database: the web-based QueryBuilder and a downloadable virtual machine (VM) image. Results QueryBuilder and the MIMIC-II VM have been developed successfully and are freely available to MIMIC-II users. Simple example SQL queries and the resulting data are presented. Clinical studies pertaining to acute kidney injury and prediction of fluid requirements in the intensive care unit are shown as typical examples of research performed with MIMIC-II. In addition, MIMIC-II has also provided data for annual PhysioNet/Computing in Cardiology Challenges, including the 2012 Challenge “Predicting mortality of ICU Patients”. Conclusions QueryBuilder is a web-based tool that provides easy access to MIMIC-II. For more computationally intensive queries, one can locally install a complete copy of MIMIC-II in a VM. Both publicly available tools provide the MIMIC-II research community with convenient querying interfaces and complement the value of the MIMIC-II relational database. PMID:23302652

  20. The Galaxy platform for accessible, reproducible and collaborative biomedical analyses: 2016 update

    PubMed Central

    Afgan, Enis; Baker, Dannon; van den Beek, Marius; Blankenberg, Daniel; Bouvier, Dave; Čech, Martin; Chilton, John; Clements, Dave; Coraor, Nate; Eberhard, Carl; Grüning, Björn; Guerler, Aysam; Hillman-Jackson, Jennifer; Von Kuster, Greg; Rasche, Eric; Soranzo, Nicola; Turaga, Nitesh; Taylor, James; Nekrutenko, Anton; Goecks, Jeremy

    2016-01-01

    High-throughput data production technologies, particularly ‘next-generation’ DNA sequencing, have ushered in widespread and disruptive changes to biomedical research. Making sense of the large datasets produced by these technologies requires sophisticated statistical and computational methods, as well as substantial computational power. This has led to an acute crisis in life sciences, as researchers without informatics training attempt to perform computation-dependent analyses. Since 2005, the Galaxy project has worked to address this problem by providing a framework that makes advanced computational tools usable by non experts. Galaxy seeks to make data-intensive research more accessible, transparent and reproducible by providing a Web-based environment in which users can perform computational analyses and have all of the details automatically tracked for later inspection, publication, or reuse. In this report we highlight recently added features enabling biomedical analyses on a large scale. PMID:27137889

  1. The Effectiveness of Educational Technology Applications for Enhancing Mathematics Achievement in K-12 Classrooms: A Meta-Analysis. Best Evidence Encyclopedia (BEE)

    ERIC Educational Resources Information Center

    Cheung, Alan C. K.; Slavin, Robert E.

    2011-01-01

    The use of educational technology in K-12 classrooms has been gaining tremendous momentum across the country since the 1990s. Many school districts have been investing heavily in various types of technology, such as computers, mobile devices, internet access, and interactive whiteboards. Almost all public schools have access to the internet and…

  2. Printable, scannable biometric templates for secure documents and materials

    NASA Astrophysics Data System (ADS)

    Cambier, James L.; Musgrave, Clyde

    2000-04-01

    Biometric technology has been widely acknowledged as an effective means for enhancing private and public security through applications in physical access control, computer and computer network access control, medical records protection, banking security, public identification programs, and others. Nearly all of these applications involve use of a biometric token to control access to a physical entity or private information. There are also unique benefits to be derived from attaching a biometric template to a physical entity such as a document, package, laboratory sample, etc. Such an association allows fast, reliable, and highly accurate association of an individual person's identity to the physical entity, and can be used to enhance security, convenience, and privacy in many types of transactions. Examples include authentication of documents, tracking of laboratory samples in a testing environment, monitoring the movement of physical evidence within the criminal justice system, and authenticating the identity of both sending and receiving parties in shipment of high value parcels. A system is described which combines a biometric technology based on iris recognition with a printing and scanning technology for high-density bar codes.

  3. Home-School Networking To Support Constructivist Learning in a Rural Elementary School: Lessons from Families, Schools, and Researchers.

    ERIC Educational Resources Information Center

    Ehrich, Roger W.; McCreary, Faith; Reaux, Ray; Rowland, Keith; Ramsey, Amy

    The U.S. Department of Education is supporting a 3-year program involving Virginia Tech's computer department and a rural public elementary school. The project seeks to determine whether immersive access to networked computing by students and their families has measurable effects on long-term student achievement. A fifth-grade classroom was…

  4. The Impact of Computer-Based Assignments on Student Motivation to Complete Homework Assignments for Sixth-Grade Students

    ERIC Educational Resources Information Center

    Cyr, Mary Ann

    2013-01-01

    The purpose of this qualitative study was to examine the engagement of 11 middle school-aged students from a southeast Michigan public school, who were given laptop computers with twenty-four-hour-a-day Internet access in order to complete homework assignments. Specifically, this study examined the perceptions of sixth-grade students regarding the…

  5. Students' Experiences of the Implementation of an Interactive Learning System in Their Eighth Grade Mathematics Classes: An Exploratory Study.

    ERIC Educational Resources Information Center

    FitzPatrick, Sarah B.

    During the last decade, United States K-12 schools have approximately tripled their spending on increasingly powerful computers, and have expanded network access and novel computer applications. The number of questions being asked by educators, policymakers, and the general public about the extent to which students are using these educational…

  6. Computer User's Guide to the Protection of Information Resources. NIST Special Publication 500-171.

    ERIC Educational Resources Information Center

    Helsing, Cheryl; And Others

    Computers have changed the way information resources are handled. Large amounts of information are stored in one central place and can be accessed from remote locations. Users have a personal responsibility for the security of the system and the data stored in it. This document outlines the user's responsibilities and provides security and control…

  7. An Exploratory Study of the Implementation of an Interactive Learning System in Two Eighth Grade Mathematics Classes.

    ERIC Educational Resources Information Center

    FitzPatrick, Sarah B.; Faux, Russell

    During the last decade, U.S. K-12 schools have approximately tripled their spending on increasingly powerful computers, expanded network access, and novel computer applications. The number of questions being asked by educators, policymakers, and the general public about the extent to which these technologies are being used in classrooms, for what…

  8. The Generation Challenge Programme Platform: Semantic Standards and Workbench for Crop Science

    PubMed Central

    Bruskiewich, Richard; Senger, Martin; Davenport, Guy; Ruiz, Manuel; Rouard, Mathieu; Hazekamp, Tom; Takeya, Masaru; Doi, Koji; Satoh, Kouji; Costa, Marcos; Simon, Reinhard; Balaji, Jayashree; Akintunde, Akinnola; Mauleon, Ramil; Wanchana, Samart; Shah, Trushar; Anacleto, Mylah; Portugal, Arllet; Ulat, Victor Jun; Thongjuea, Supat; Braak, Kyle; Ritter, Sebastian; Dereeper, Alexis; Skofic, Milko; Rojas, Edwin; Martins, Natalia; Pappas, Georgios; Alamban, Ryan; Almodiel, Roque; Barboza, Lord Hendrix; Detras, Jeffrey; Manansala, Kevin; Mendoza, Michael Jonathan; Morales, Jeffrey; Peralta, Barry; Valerio, Rowena; Zhang, Yi; Gregorio, Sergio; Hermocilla, Joseph; Echavez, Michael; Yap, Jan Michael; Farmer, Andrew; Schiltz, Gary; Lee, Jennifer; Casstevens, Terry; Jaiswal, Pankaj; Meintjes, Ayton; Wilkinson, Mark; Good, Benjamin; Wagner, James; Morris, Jane; Marshall, David; Collins, Anthony; Kikuchi, Shoshi; Metz, Thomas; McLaren, Graham; van Hintum, Theo

    2008-01-01

    The Generation Challenge programme (GCP) is a global crop research consortium directed toward crop improvement through the application of comparative biology and genetic resources characterization to plant breeding. A key consortium research activity is the development of a GCP crop bioinformatics platform to support GCP research. This platform includes the following: (i) shared, public platform-independent domain models, ontology, and data formats to enable interoperability of data and analysis flows within the platform; (ii) web service and registry technologies to identify, share, and integrate information across diverse, globally dispersed data sources, as well as to access high-performance computational (HPC) facilities for computationally intensive, high-throughput analyses of project data; (iii) platform-specific middleware reference implementations of the domain model integrating a suite of public (largely open-access/-source) databases and software tools into a workbench to facilitate biodiversity analysis, comparative analysis of crop genomic data, and plant breeding decision making. PMID:18483570

  9. Provision of Computer Printing Capabilities to Library Patrons. SPEC Kit 183.

    ERIC Educational Resources Information Center

    Taylor, Suzanne; Welch, C. Brigid, Ed.

    1992-01-01

    This publication reports on the results of a 1992 survey of 80 Association of Research Libraries (ARL) member libraries on their use of printers for recording references found in online public access catalog (OPAC) and CD-ROM searches. As was found in a 1990 survey on the same topic, only a small proportion of libraries reported that they charged…

  10. Extension of research data repository system to support direct compute access to biomedical datasets: enhancing Dataverse to support large datasets

    PubMed Central

    McKinney, Bill; Meyer, Peter A.; Crosas, Mercè; Sliz, Piotr

    2016-01-01

    Access to experimental X-ray diffraction image data is important for validation and reproduction of macromolecular models and indispensable for the development of structural biology processing methods. In response to the evolving needs of the structural biology community, we recently established a diffraction data publication system, the Structural Biology Data Grid (SBDG, data.sbgrid.org), to preserve primary experimental datasets supporting scientific publications. All datasets published through the SBDG are freely available to the research community under a public domain dedication license, with metadata compliant with the DataCite Schema (schema.datacite.org). A proof-of-concept study demonstrated community interest and utility. Publication of large datasets is a challenge shared by several fields, and the SBDG has begun collaborating with the Institute for Quantitative Social Science at Harvard University to extend the Dataverse (dataverse.org) open-source data repository system to structural biology datasets. Several extensions are necessary to support the size and metadata requirements for structural biology datasets. In this paper, we describe one such extension—functionality supporting preservation of filesystem structure within Dataverse—which is essential for both in-place computation and supporting non-http data transfers. PMID:27862010

  11. Opportunities for Engaging Low-Income, Vulnerable Populations in Health Care: A Systematic Review of Homeless Persons’ Access to and Use of Information Technologies

    PubMed Central

    Li, Alice E.; Hogan, Timothy P.

    2013-01-01

    We systematically reviewed the health and social science literature on access to and use of information technologies by homeless persons by searching 5 bibliographic databases. Articles were included if they were in English, represented original research, appeared in peer-reviewed publications, and addressed our research questions. Sixteen articles met our inclusion criteria. We found that mobile phone ownership ranged from 44% to 62%; computer ownership, from 24% to 40%; computer access and use, from 47% to 55%; and Internet use, from 19% to 84%. Homeless persons used technologies for a range of purposes, some of which were health related. Many homeless persons had access to information technologies, suggesting possible health benefits to developing programs that link homeless persons to health care through mobile phones and the Internet. PMID:24148036

  12. A virtual reality atlas of craniofacial anatomy.

    PubMed

    Smith, Darren M; Oliker, Aaron; Carter, Christina R; Kirov, Miro; McCarthy, Joseph G; Cutting, Court B

    2007-11-01

    Head and neck anatomy is complex and represents an educational challenge to the student. Conventional two-dimensional illustrations inherently fall short in conveying intricate anatomical relationships that exist in three dimensions. A gratis three-dimensional virtual reality atlas of craniofacial anatomy is presented in an effort to address the paucity of readily accessible and customizable three-dimensional educational material available to the student of head and neck anatomy. Three-dimensional model construction was performed in Alias Maya 4.5 and 6.0. A basic three-dimensional skull model was altered to include surgical landmarks and proportions. Some of the soft tissues were adapted from previous work, whereas others were constructed de novo. Texturing was completed with Adobe Photoshop 7.0 and Maya. The Internet application was designed in Viewpoint Enliven 1.0. A three-dimensional computer model of craniofacial anatomy (bone and soft tissue) was completed. The model is compatible with many software packages and can be accessed by means of the Internet or downloaded to a personal computer. As the three-dimensional meshes are publicly available, they can be extensively manipulated by the user, even at the polygonal level. Three-dimensional computer graphics has yet to be fully exploited for head and neck anatomy education. In this context, the authors present a publicly available computer model of craniofacial anatomy. This model may also find applications beyond clinical medicine. The model can be accessed gratis at the Plastic and Reconstructive Surgery Web site or obtained as a three-dimensional mesh, also gratis, by contacting the authors.

  13. Study of basic computer competence among public health nurses in Taiwan.

    PubMed

    Yang, Kuei-Feng; Yu, Shu; Lin, Ming-Sheng; Hsu, Chia-Ling

    2004-03-01

    Rapid advances in information technology and media have made distance learning on the Internet possible. This new model of learning allows greater efficiency and flexibility in knowledge acquisition. Since basic computer competence is a prerequisite for this new learning model, this study was conducted to examine the basic computer competence of public health nurses in Taiwan and explore factors influencing computer competence. A national cross-sectional randomized study was conducted with 329 public health nurses. A questionnaire was used to collect data and was delivered by mail. Results indicate that basic computer competence of public health nurses in Taiwan is still needs to be improved (mean = 57.57 +- 2.83, total score range from 26-130). Among the five most frequently used software programs, nurses were most knowledgeable about Word and least knowledgeable about PowerPoint. Stepwise multiple regression analysis revealed eight variables (weekly number of hours spent online at home, weekly amount of time spent online at work, weekly frequency of computer use at work, previous computer training, computer at workplace and Internet access, job position, education level, and age) that significantly influenced computer competence, which accounted for 39.0 % of the variance. In conclusion, greater computer competence, broader educational programs regarding computer technology, and a greater emphasis on computers at work are necessary to increase the usefulness of distance learning via the Internet in Taiwan. Building a user-friendly environment is important in developing this new media model of learning for the future.

  14. Computer interfaces for the visually impaired

    NASA Technical Reports Server (NTRS)

    Higgins, Gerry

    1991-01-01

    Information access via computer terminals extends to blind and low vision persons employed in many technical and nontechnical disciplines. Two aspects are detailed of providing computer technology for persons with a vision related handicap. First, research into the most effective means of integrating existing adaptive technologies into information systems was made. This was conducted to integrate off the shelf products with adaptive equipment for cohesive integrated information processing systems. Details are included that describe the type of functionality required in software to facilitate its incorporation into a speech and/or braille system. The second aspect is research into providing audible and tactile interfaces to graphics based interfaces. Parameters are included for the design and development of the Mercator Project. The project will develop a prototype system for audible access to graphics based interfaces. The system is being built within the public domain architecture of X windows to show that it is possible to provide access to text based applications within a graphical environment. This information will be valuable to suppliers to ADP equipment since new legislation requires manufacturers to provide electronic access to the visually impaired.

  15. DNA Compass: a secure, client-side site for navigating personal genetic information

    PubMed Central

    Curnin, Charles; Gordon, Assaf; Erlich, Yaniv

    2017-01-01

    Abstract Motivation: Millions of individuals have access to raw genomic data using direct-to-consumer companies. The advent of large-scale sequencing projects, such as the Precision Medicine Initiative, will further increase the number of individuals with access to their own genomic information. However, querying genomic data requires a computer terminal and computational skill to analyze the data—an impediment for the general public. Results: DNA Compass is a website designed to empower the public by enabling simple navigation of personal genomic data. Users can query the status of their genomic variants for over 1658 markers or tens of millions of documented single nucleotide polymorphisms (SNPs). DNA Compass presents the relevant genotypes of the user side-by-side with explanatory scientific resources. The genotype data never leaves the user’s computer, a feature that provides improved security and performance. More than 12 000 unique users, mainly from the general genetic genealogy community, have already used DNA Compass, demonstrating its utility. Availability and Implementation: DNA Compass is freely available on https://compass.dna.land. Contact: yaniv@cs.columbia.edu PMID:28334237

  16. Executive Summaries: CIL '90.

    ERIC Educational Resources Information Center

    Elsweiler, John A., Jr.; And Others

    1990-01-01

    Presents summaries of 12 papers presented at the 1990 Computers in Libraries Conference. Topics discussed include online searching; microcomputer-based serials management; microcomputer-based workstations; online public access catalogs (OPACs); multitype library networking; CD-ROM searches; locally mounted online databases; collection evaluation;…

  17. Southwest Watershed Research Center Data Access Project

    NASA Astrophysics Data System (ADS)

    Nichols, M. H.; Anson, E.

    2008-05-01

    Hydrologic data, including rainfall and runoff data, have been collected on experimental watersheds operated by the U.S. Department of Agriculture Agricultural Research Service (USDA-ARS) in southern Arizona since the 1950s. These data are of national and international importance and make up one of the most comprehensive semiarid watershed data sets in the world. The USDA-ARS Southwest Watershed Research Center has recently developed an electronic data processing system that includes an online interface (http://tucson.ars.ag.gov/dap) to provide public access to the data. The goal of the system is to promote analyses and interpretations of historic and current data by improving data access. Data are collected from sensors in the field and are transmitted to computers in the office. The data are then processed, quality checked, and made available to users via the Internet. The publicly accessible part of the system consists of an interactive Web site, which provides an interface to the data, and a relational database, which is used to process, store, and manage data. The system was released to the public in October 2003, and since that time the online data access Web site has received more than 4500 visitors.

  18. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access scheme in Cloud computing environments is proven flexible and secure and could effectively correspond to real-time appending and deleting user access authorization and appending and revising PHR records.

  19. OMPC: an Open-Source MATLAB-to-Python Compiler.

    PubMed

    Jurica, Peter; van Leeuwen, Cees

    2009-01-01

    Free access to scientific information facilitates scientific progress. Open-access scientific journals are a first step in this direction; a further step is to make auxiliary and supplementary materials that accompany scientific publications, such as methodological procedures and data-analysis tools, open and accessible to the scientific community. To this purpose it is instrumental to establish a software base, which will grow toward a comprehensive free and open-source language of technical and scientific computing. Endeavors in this direction are met with an important obstacle. MATLAB((R)), the predominant computation tool in many fields of research, is a closed-source commercial product. To facilitate the transition to an open computation platform, we propose Open-source MATLAB((R))-to-Python Compiler (OMPC), a platform that uses syntax adaptation and emulation to allow transparent import of existing MATLAB((R)) functions into Python programs. The imported MATLAB((R)) modules will run independently of MATLAB((R)), relying on Python's numerical and scientific libraries. Python offers a stable and mature open source platform that, in many respects, surpasses commonly used, expensive commercial closed source packages. The proposed software will therefore facilitate the transparent transition towards a free and general open-source lingua franca for scientific computation, while enabling access to the existing methods and algorithms of technical computing already available in MATLAB((R)). OMPC is available at http://ompc.juricap.com.

  20. ScipionCloud: An integrative and interactive gateway for large scale cryo electron microscopy image processing on commercial and academic clouds.

    PubMed

    Cuenca-Alba, Jesús; Del Cano, Laura; Gómez Blanco, Josué; de la Rosa Trevín, José Miguel; Conesa Mingo, Pablo; Marabini, Roberto; S Sorzano, Carlos Oscar; Carazo, Jose María

    2017-10-01

    New instrumentation for cryo electron microscopy (cryoEM) has significantly increased data collection rate as well as data quality, creating bottlenecks at the image processing level. Current image processing model of moving the acquired images from the data source (electron microscope) to desktops or local clusters for processing is encountering many practical limitations. However, computing may also take place in distributed and decentralized environments. In this way, cloud is a new form of accessing computing and storage resources on demand. Here, we evaluate on how this new computational paradigm can be effectively used by extending our current integrative framework for image processing, creating ScipionCloud. This new development has resulted in a full installation of Scipion both in public and private clouds, accessible as public "images", with all the required preinstalled cryoEM software, just requiring a Web browser to access all Graphical User Interfaces. We have profiled the performance of different configurations on Amazon Web Services and the European Federated Cloud, always on architectures incorporating GPU's, and compared them with a local facility. We have also analyzed the economical convenience of different scenarios, so cryoEM scientists have a clearer picture of the setup that is best suited for their needs and budgets. Copyright © 2017 The Authors. Published by Elsevier Inc. All rights reserved.

  1. An efficient General Transit Feed Specification (GTFS) enabled algorithm for dynamic transit accessibility analysis.

    PubMed

    Fayyaz S, S Kiavash; Liu, Xiaoyue Cathy; Zhang, Guohui

    2017-01-01

    The social functions of urbanized areas are highly dependent on and supported by the convenient access to public transportation systems, particularly for the less privileged populations who have restrained auto ownership. To accurately evaluate the public transit accessibility, it is critical to capture the spatiotemporal variation of transit services. This can be achieved by measuring the shortest paths or minimum travel time between origin-destination (OD) pairs at each time-of-day (e.g. every minute). In recent years, General Transit Feed Specification (GTFS) data has been gaining popularity for between-station travel time estimation due to its interoperability in spatiotemporal analytics. Many software packages, such as ArcGIS, have developed toolbox to enable the travel time estimation with GTFS. They perform reasonably well in calculating travel time between OD pairs for a specific time-of-day (e.g. 8:00 AM), yet can become computational inefficient and unpractical with the increase of data dimensions (e.g. all times-of-day and large network). In this paper, we introduce a new algorithm that is computationally elegant and mathematically efficient to address this issue. An open-source toolbox written in C++ is developed to implement the algorithm. We implemented the algorithm on City of St. George's transit network to showcase the accessibility analysis enabled by the toolbox. The experimental evidence shows significant reduction on computational time. The proposed algorithm and toolbox presented is easily transferable to other transit networks to allow transit agencies and researchers perform high resolution transit performance analysis.

  2. An efficient General Transit Feed Specification (GTFS) enabled algorithm for dynamic transit accessibility analysis

    PubMed Central

    Fayyaz S., S. Kiavash; Zhang, Guohui

    2017-01-01

    The social functions of urbanized areas are highly dependent on and supported by the convenient access to public transportation systems, particularly for the less privileged populations who have restrained auto ownership. To accurately evaluate the public transit accessibility, it is critical to capture the spatiotemporal variation of transit services. This can be achieved by measuring the shortest paths or minimum travel time between origin-destination (OD) pairs at each time-of-day (e.g. every minute). In recent years, General Transit Feed Specification (GTFS) data has been gaining popularity for between-station travel time estimation due to its interoperability in spatiotemporal analytics. Many software packages, such as ArcGIS, have developed toolbox to enable the travel time estimation with GTFS. They perform reasonably well in calculating travel time between OD pairs for a specific time-of-day (e.g. 8:00 AM), yet can become computational inefficient and unpractical with the increase of data dimensions (e.g. all times-of-day and large network). In this paper, we introduce a new algorithm that is computationally elegant and mathematically efficient to address this issue. An open-source toolbox written in C++ is developed to implement the algorithm. We implemented the algorithm on City of St. George’s transit network to showcase the accessibility analysis enabled by the toolbox. The experimental evidence shows significant reduction on computational time. The proposed algorithm and toolbox presented is easily transferable to other transit networks to allow transit agencies and researchers perform high resolution transit performance analysis. PMID:28981544

  3. Exploring the experience of clients with tetraplegia utilizing assistive technology for computer access.

    PubMed

    Folan, Alyce; Barclay, Linda; Cooper, Cathy; Robinson, Merren

    2015-01-01

    Assistive technology for computer access can be used to facilitate people with a spinal cord injury to utilize mainstream computer applications, thereby enabling participation in a variety of meaningful occupations. The aim of this study was to gain an understanding of the experiences of clients with tetraplegia trialing assistive technologies for computer access during different stages in a public rehabilitation service. In order to explore the experiences of clients with tetraplegia trialing assistive technologies for computer use, qualitative methodology was selected. Data were collected from seven participants using semi-structured interviews, which were audio-taped, transcribed and analyzed thematically. Three main themes were identified. These were: getting back into life, assisting in adjusting to injury and learning new skills. The findings from this study demonstrated that people with tetraplegia can be assisted to return to previous life roles or engage in new roles, through developing skills in the use of assistive technology for computer access. Being able to use computers for meaningful activities contributed to the participants gaining an enhanced sense of self-efficacy, and thereby quality of life. Implications for Rehabilitation Findings from this pilot study indicate that people with tetraplegia can be assisted to return to previous life roles, and develop new roles that have meaning to them through the use of assistive technologies for computer use. Being able to use the internet to socialize, and complete daily tasks, contributed to the participants gaining a sense of control over their lives. Early introduction to assistive technology is important to ensure sufficient time for newly injured people to feel comfortable enough with the assistive technology to use the computers productively by the time of discharge. Further research into this important and expanding area is indicated.

  4. Secure Genomic Computation through Site-Wise Encryption

    PubMed Central

    Zhao, Yongan; Wang, XiaoFeng; Tang, Haixu

    2015-01-01

    Commercial clouds provide on-demand IT services for big-data analysis, which have become an attractive option for users who have no access to comparable infrastructure. However, utilizing these services for human genome analysis is highly risky, as human genomic data contains identifiable information of human individuals and their disease susceptibility. Therefore, currently, no computation on personal human genomic data is conducted on public clouds. To address this issue, here we present a site-wise encryption approach to encrypt whole human genome sequences, which can be subject to secure searching of genomic signatures on public clouds. We implemented this method within the Hadoop framework, and tested it on the case of searching disease markers retrieved from the ClinVar database against patients’ genomic sequences. The secure search runs only one order of magnitude slower than the simple search without encryption, indicating our method is ready to be used for secure genomic computation on public clouds. PMID:26306278

  5. Microcomputers and the future of epidemiology.

    PubMed Central

    Dean, A G

    1994-01-01

    The Workshop on Microcomputers and the Future of Epidemiology was held March 8-9, 1993, at the Turner Conference Center, Atlanta, GA, with 130 public health professionals participating. The purpose of the workshop was to define microcomputer needs in epidemiology and to propose future initiatives. Thirteen groups representing public health disciplines defined their needs for better and more useful data, development of computer technology appropriate to epidemiology, user support and human infrastructure development, and global communication and planning. Initiatives proposed were demonstration of health surveillance systems, new software and hardware, computer-based training, projects to establish or improve data bases and community access to data bases, improved international communication, conferences on microcomputer use in particular disciplines, a suggestion to encourage competition in the production of public-domain software, and longrange global planning for epidemiologic computing and data management. Other interested groups are urged to study, modify, and implement those ideas. PMID:7910692

  6. Secure Genomic Computation through Site-Wise Encryption.

    PubMed

    Zhao, Yongan; Wang, XiaoFeng; Tang, Haixu

    2015-01-01

    Commercial clouds provide on-demand IT services for big-data analysis, which have become an attractive option for users who have no access to comparable infrastructure. However, utilizing these services for human genome analysis is highly risky, as human genomic data contains identifiable information of human individuals and their disease susceptibility. Therefore, currently, no computation on personal human genomic data is conducted on public clouds. To address this issue, here we present a site-wise encryption approach to encrypt whole human genome sequences, which can be subject to secure searching of genomic signatures on public clouds. We implemented this method within the Hadoop framework, and tested it on the case of searching disease markers retrieved from the ClinVar database against patients' genomic sequences. The secure search runs only one order of magnitude slower than the simple search without encryption, indicating our method is ready to be used for secure genomic computation on public clouds.

  7. Magazine Development: Creative Arts Magazines Can Take on More Creativity through Staff Innovation, Desktop Publishing.

    ERIC Educational Resources Information Center

    Cutsinger, John

    1988-01-01

    Explains how a high school literary magazine staff accessed the journalism department's Apple Macintosh computers to typeset its publication. Provides examples of magazine layouts designed partially or completely by "Pagemaker" software on a Macintosh. (MM)

  8. A Project to Computerize Performance Objectives and Criterion-Referenced Measures in Occupational Education for Research and Determination of Applicability to Handicapped Learners. Final Report.

    ERIC Educational Resources Information Center

    Lee, Connie W.; Hinson, Tony M.

    This publication is the final report of a 21-month project designed to (1) expand and refine the computer capabilities of the Vocational-Technical Education Consortium of States (V-TECS) to ensure rapid data access for generating routine and special occupational data-based reports; (2) develop and implement a computer storage and retrieval system…

  9. OpenFDA: an innovative platform providing access to a wealth of FDA's publicly available data.

    PubMed

    Kass-Hout, Taha A; Xu, Zhiheng; Mohebbi, Matthew; Nelsen, Hans; Baker, Adam; Levine, Jonathan; Johanson, Elaine; Bright, Roselie A

    2016-05-01

    The objective of openFDA is to facilitate access and use of big important Food and Drug Administration public datasets by developers, researchers, and the public through harmonization of data across disparate FDA datasets provided via application programming interfaces (APIs). Using cutting-edge technologies deployed on FDA's new public cloud computing infrastructure, openFDA provides open data for easier, faster (over 300 requests per second per process), and better access to FDA datasets; open source code and documentation shared on GitHub for open community contributions of examples, apps and ideas; and infrastructure that can be adopted for other public health big data challenges. Since its launch on June 2, 2014, openFDA has developed four APIs for drug and device adverse events, recall information for all FDA-regulated products, and drug labeling. There have been more than 20 million API calls (more than half from outside the United States), 6000 registered users, 20,000 connected Internet Protocol addresses, and dozens of new software (mobile or web) apps developed. A case study demonstrates a use of openFDA data to understand an apparent association of a drug with an adverse event. With easier and faster access to these datasets, consumers worldwide can learn more about FDA-regulated products. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved.

  10. OpenFDA: an innovative platform providing access to a wealth of FDA’s publicly available data

    PubMed Central

    Kass-Hout, Taha A; Mohebbi, Matthew; Nelsen, Hans; Baker, Adam; Levine, Jonathan; Johanson, Elaine; Bright, Roselie A

    2016-01-01

    Objective The objective of openFDA is to facilitate access and use of big important Food and Drug Administration public datasets by developers, researchers, and the public through harmonization of data across disparate FDA datasets provided via application programming interfaces (APIs). Materials and Methods Using cutting-edge technologies deployed on FDA’s new public cloud computing infrastructure, openFDA provides open data for easier, faster (over 300 requests per second per process), and better access to FDA datasets; open source code and documentation shared on GitHub for open community contributions of examples, apps and ideas; and infrastructure that can be adopted for other public health big data challenges. Results Since its launch on June 2, 2014, openFDA has developed four APIs for drug and device adverse events, recall information for all FDA-regulated products, and drug labeling. There have been more than 20 million API calls (more than half from outside the United States), 6000 registered users, 20,000 connected Internet Protocol addresses, and dozens of new software (mobile or web) apps developed. A case study demonstrates a use of openFDA data to understand an apparent association of a drug with an adverse event. Conclusion With easier and faster access to these datasets, consumers worldwide can learn more about FDA-regulated products. PMID:26644398

  11. A national survey of public support for restrictions on youth access to tobacco.

    PubMed

    Bailey, W J; Crowe, J W

    1994-10-01

    A national telephone survey was conducted to measure public support for seven proposals to restrict youth access to tobacco products, including increases in the cigarette excise tax. A random digit dialing survey, using computer-assisted telephone interviews and a two-stage Mitofsky-Waksberg design, was used to generate and replace telephone numbers and to select individuals from within households. More than 94% of respondents believed cigarette smoking by children and adolescents to be a "very serious" or "somewhat serious" problem. Most respondents expressed support for all the proposed measures to restrict youth access to tobacco products (fines for sellers, fines for youthful violators, licensing of all tobacco vendors, restrictions on cigarette vending machines, ban on sponsorship of youth-oriented events, and ban on all tobacco advertising), and for increases in the cigarette excise tax.

  12. Extension of research data repository system to support direct compute access to biomedical datasets: enhancing Dataverse to support large datasets.

    PubMed

    McKinney, Bill; Meyer, Peter A; Crosas, Mercè; Sliz, Piotr

    2017-01-01

    Access to experimental X-ray diffraction image data is important for validation and reproduction of macromolecular models and indispensable for the development of structural biology processing methods. In response to the evolving needs of the structural biology community, we recently established a diffraction data publication system, the Structural Biology Data Grid (SBDG, data.sbgrid.org), to preserve primary experimental datasets supporting scientific publications. All datasets published through the SBDG are freely available to the research community under a public domain dedication license, with metadata compliant with the DataCite Schema (schema.datacite.org). A proof-of-concept study demonstrated community interest and utility. Publication of large datasets is a challenge shared by several fields, and the SBDG has begun collaborating with the Institute for Quantitative Social Science at Harvard University to extend the Dataverse (dataverse.org) open-source data repository system to structural biology datasets. Several extensions are necessary to support the size and metadata requirements for structural biology datasets. In this paper, we describe one such extension-functionality supporting preservation of file system structure within Dataverse-which is essential for both in-place computation and supporting non-HTTP data transfers. © 2016 New York Academy of Sciences.

  13. Secure public cloud platform for medical images sharing.

    PubMed

    Pan, Wei; Coatrieux, Gouenou; Bouslimi, Dalel; Prigent, Nicolas

    2015-01-01

    Cloud computing promises medical imaging services offering large storage and computing capabilities for limited costs. In this data outsourcing framework, one of the greatest issues to deal with is data security. To do so, we propose to secure a public cloud platform devoted to medical image sharing by defining and deploying a security policy so as to control various security mechanisms. This policy stands on a risk assessment we conducted so as to identify security objectives with a special interest for digital content protection. These objectives are addressed by means of different security mechanisms like access and usage control policy, partial-encryption and watermarking.

  14. 32 CFR Appendix H to Part 505 - Definitions

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC... Department of Defense are considered a single agency. For other purposes including access, amendment, appeals... approves all computer matching agreements between the Department of Defense (DOD) and other Federal, State...

  15. Quiet, Computer at Work.

    ERIC Educational Resources Information Center

    Black, Claudia

    Libraries are becoming information access points, not just book repositories. With greater distribution of printed materials, increased use of optical disks and other compact storage techniques, the emergence of publication on demand, and the proliferation of electronic databases, libraries without large collections will be able to provide prompt…

  16. 32 CFR Appendix H to Part 505 - Definitions

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC... Department of Defense are considered a single agency. For other purposes including access, amendment, appeals... approves all computer matching agreements between the Department of Defense (DOD) and other Federal, State...

  17. Online Catalogs and Their Users.

    ERIC Educational Resources Information Center

    Broadus, Robert N.

    1983-01-01

    Review of research on online public access catalogs sponsored by Council on Library Resources notes the scope and method (questionnaires administered to catalog users and nonusers in 29 participating institutions) and findings and applications (including organizational setting and computer system, catalog use and satisfaction, and implications).…

  18. Population Education Accessions Lists, July-December 1986.

    ERIC Educational Resources Information Center

    United Nations Educational, Scientific, and Cultural Organization, Bangkok (Thailand). Regional Office for Education in Asia and the Pacific.

    Part I of this resource guide contains listings of instructional materials, computer-assisted instructions, classroom activities and teaching methods. Part II deals with the knowledge base of population education. These publications are divided into 11 topics including: (1) demography; (2) documentation; (3) education (including environmental,…

  19. Home Care Nursing via Computer Networks: Justification and Design Specifications

    PubMed Central

    Brennan, Patricia Flatley

    1988-01-01

    High-tech home care includes the use of information technologies, such as computer networks, to provide direct care to patients in the home. This paper presents the justification and design of a project using a free, public access computer network to deliver home care nursing. The intervention attempts to reduce isolation and improve problem solving among home care patients and their informal caregivers. Three modules comprise the intervention: a decision module, a communications module, and an information data base. This paper describes the experimental evaluation of the project, and discusses issues in the delivery of nursing care via computers.

  20. Minimizing Overhead for Secure Computation and Fully Homomorphic Encryption: Overhead

    DTIC Science & Technology

    2015-11-01

    many inputs. We also improved our compiler infrastructure to handle very large circuits in a more scalable way. In Jan’13, we employed the AESNI and...Amazon’s elastic compute infrastructure , and is running under a Xen hypervisor. Since we do not have direct access to the bare metal, we cannot...creating novel opportunities for compressing au- thentication overhead. It is especially compelling that existing public key infrastructures can be used

  1. Benchmarking gate-based quantum computers

    NASA Astrophysics Data System (ADS)

    Michielsen, Kristel; Nocon, Madita; Willsch, Dennis; Jin, Fengping; Lippert, Thomas; De Raedt, Hans

    2017-11-01

    With the advent of public access to small gate-based quantum processors, it becomes necessary to develop a benchmarking methodology such that independent researchers can validate the operation of these processors. We explore the usefulness of a number of simple quantum circuits as benchmarks for gate-based quantum computing devices and show that circuits performing identity operations are very simple, scalable and sensitive to gate errors and are therefore very well suited for this task. We illustrate the procedure by presenting benchmark results for the IBM Quantum Experience, a cloud-based platform for gate-based quantum computing.

  2. Enabling Data Intensive Science through Service Oriented Science: Virtual Laboratories and Science Gateways

    NASA Astrophysics Data System (ADS)

    Lescinsky, D. T.; Wyborn, L. A.; Evans, B. J. K.; Allen, C.; Fraser, R.; Rankine, T.

    2014-12-01

    We present collaborative work on a generic, modular infrastructure for virtual laboratories (VLs, similar to science gateways) that combine online access to data, scientific code, and computing resources as services that support multiple data intensive scientific computing needs across a wide range of science disciplines. We are leveraging access to 10+ PB of earth science data on Lustre filesystems at Australia's National Computational Infrastructure (NCI) Research Data Storage Infrastructure (RDSI) node, co-located with NCI's 1.2 PFlop Raijin supercomputer and a 3000 CPU core research cloud. The development, maintenance and sustainability of VLs is best accomplished through modularisation and standardisation of interfaces between components. Our approach has been to break up tightly-coupled, specialised application packages into modules, with identified best techniques and algorithms repackaged either as data services or scientific tools that are accessible across domains. The data services can be used to manipulate, visualise and transform multiple data types whilst the scientific tools can be used in concert with multiple scientific codes. We are currently designing a scalable generic infrastructure that will handle scientific code as modularised services and thereby enable the rapid/easy deployment of new codes or versions of codes. The goal is to build open source libraries/collections of scientific tools, scripts and modelling codes that can be combined in specially designed deployments. Additional services in development include: provenance, publication of results, monitoring, workflow tools, etc. The generic VL infrastructure will be hosted at NCI, but can access alternative computing infrastructures (i.e., public/private cloud, HPC).The Virtual Geophysics Laboratory (VGL) was developed as a pilot project to demonstrate the underlying technology. This base is now being redesigned and generalised to develop a Virtual Hazards Impact and Risk Laboratory (VHIRL); any enhancements and new capabilities will be incorporated into a generic VL infrastructure. At same time, we are scoping seven new VLs and in the process, identifying other common components to prioritise and focus development.

  3. Building a High-Tech Library in a Period of Austerity.

    ERIC Educational Resources Information Center

    Bazillion, Richard J.; Scott, Sue

    1991-01-01

    Describes the planning process for designing a new library for Algoma University College (Ontario). Topics discussed include the building committee, library policy, design considerations, an electric system that supports computer technology, library automation, the online public access catalog (OPAC), furnishings and interior environment, and…

  4. The Future of Access Technology for Blind and Visually Impaired People.

    ERIC Educational Resources Information Center

    Schreier, E. M.

    1990-01-01

    This article describes potential use of new technological products and services by blind/visually impaired people. Items discussed include computer input devices, public telephones, automatic teller machines, airline and rail arrival/departure displays, ticketing machines, information retrieval systems, order-entry terminals, optical character…

  5. Roads On The U.S. nation Forests: An Analysis of Public Attitudes, Beliefs, and Values Expressed in the News Media

    Treesearch

    David N. Bengston; David P. Fan

    1999-01-01

    Public attitudes, beliefs, and underlying values about roads on the U.S. national forests expressed in more than 4,000 on-line news stories during a 3-year period are analyzed by using computer methods. The belief that forest roads provide access for recreation was expressed most frequently, accounting for about 40% of all beliefs expressed. The belief that roads cause...

  6. Public-domain-software solution to data-access problems for numerical modelers

    USGS Publications Warehouse

    Jenter, Harry; Signell, Richard

    1992-01-01

    Unidata's network Common Data Form, netCDF, provides users with an efficient set of software for scientific-data-storage, retrieval, and manipulation. The netCDF file format is machine-independent, direct-access, self-describing, and in the public domain, thereby alleviating many problems associated with accessing output from large hydrodynamic models. NetCDF has programming interfaces in both the Fortran and C computer language with an interface to C++ planned for release in the future. NetCDF also has an abstract data type that relieves users from understanding details of the binary file structure; data are written and retrieved by an intuitive, user-supplied name rather than by file position. Users are aided further by Unidata's inclusion of the Common Data Language, CDL, a printable text-equivalent of the contents of a netCDF file. Unidata provides numerous operators and utilities for processing netCDF files. In addition, a number of public-domain and proprietary netCDF utilities from other sources are available at this time or will be available later this year. The U.S. Geological Survey has produced and is producing a number of public-domain netCDF utilities.

  7. KAPSE (Kernel ADA Programming Support Environment) Interface Team Public Report. Volume 5.

    DTIC Science & Technology

    1985-08-01

    Computer Nons , April 1964. e The K Ma policy statent mde the Language Control Fcility Newsletter for the Ada Jovial Wmkng Group. e There will be a CRIS...cre-ed, the initial access control inA-mIion my be splied by the ACCSS parmeter. If non -nll, this parumter speci fi the initia access tolicontr olti...assigned, or controlled by the operating system to &,.sure consistent and non -conflicting usage by programs under execution. Examples of resources

  8. Diagnostic Accuracy of Computer Tomography Angiography and Magnetic Resonance Angiography in the Stenosis Detection of Autologuous Hemodialysis Access: A Meta-Analysis

    PubMed Central

    Liu, Shiyuan

    2013-01-01

    Purpose To compare the diagnostic performances of computer tomography angiography (CTA) and magnetic resonance angiography (MRA) for detection and assessment of stenosis in patients with autologuous hemodialysis access. Materials and Methods Search of PubMed, MEDLINE, EMBASE and Cochrane Library database from January 1984 to May 2013 for studies comparing CTA or MRA with DSA or surgery for autologuous hemodialysis access. Eligible studies were in English language, aimed to detect more than 50% stenosis or occlusion of autologuous vascular access in hemodialysis patients with CTA and MRA technology and provided sufficient data about diagnosis performance. Methodological quality was assessed by the Quality Assessment of Diagnostic Studies (QUADAS) instrument. Sensitivities (SEN), specificities (SPE), positive likelihood ratio (PLR), negative likelihood values (NLR), diagnostic odds ratio (DOR) and areas under the receiver operator characteristic curve (AUC) were pooled statistically. Potential threshold effect, heterogeneity and publication bias was evaluated. The clinical utility of CTA and MRA in detection of stenosis was also investigated. Result Sixteen eligible studies were included, with a total of 500 patients. Both CTA and MRA were accurate modality (sensitivity, 96.2% and 95.4%, respectively; specificity, 97.1 and 96.1%, respectively; DOR [diagnostic odds ratio], 393.69 and 211.47, respectively) for hemodialysis vascular access. No significant difference was detected between the diagnostic performance of CTA (AUC, 0.988) and MRA (AUC, 0.982). Meta-regression analyses and subgroup analyses revealed no statistical difference. The Deek’s funnel plots suggested a publication bias. Conclusion Diagnostic performance of CTA and MRA for detecting stenosis of hemodialysis vascular access had no statistical difference. Both techniques may function as an alternative or an important complement to conventional digital subtraction angiography (DSA) and may be able to help guide medical management. PMID:24194928

  9. PDS: A Performance Database Server

    DOE PAGES

    Berry, Michael W.; Dongarra, Jack J.; Larose, Brian H.; ...

    1994-01-01

    The process of gathering, archiving, and distributing computer benchmark data is a cumbersome task usually performed by computer users and vendors with little coordination. Most important, there is no publicly available central depository of performance data for all ranges of machines from personal computers to supercomputers. We present an Internet-accessible performance database server (PDS) that can be used to extract current benchmark data and literature. As an extension to the X-Windows-based user interface (Xnetlib) to the Netlib archival system, PDS provides an on-line catalog of public domain computer benchmarks such as the LINPACK benchmark, Perfect benchmarks, and the NAS parallelmore » benchmarks. PDS does not reformat or present the benchmark data in any way that conflicts with the original methodology of any particular benchmark; it is thereby devoid of any subjective interpretations of machine performance. We believe that all branches (research laboratories, academia, and industry) of the general computing community can use this facility to archive performance metrics and make them readily available to the public. PDS can provide a more manageable approach to the development and support of a large dynamic database of published performance metrics.« less

  10. A Computing Infrastructure for Supporting Climate Studies

    NASA Astrophysics Data System (ADS)

    Yang, C.; Bambacus, M.; Freeman, S. M.; Huang, Q.; Li, J.; Sun, M.; Xu, C.; Wojcik, G. S.; Cahalan, R. F.; NASA Climate @ Home Project Team

    2011-12-01

    Climate change is one of the major challenges facing us on the Earth planet in the 21st century. Scientists build many models to simulate the past and predict the climate change for the next decades or century. Most of the models are at a low resolution with some targeting high resolution in linkage to practical climate change preparedness. To calibrate and validate the models, millions of model runs are needed to find the best simulation and configuration. This paper introduces the NASA effort on Climate@Home project to build a supercomputer based-on advanced computing technologies, such as cloud computing, grid computing, and others. Climate@Home computing infrastructure includes several aspects: 1) a cloud computing platform is utilized to manage the potential spike access to the centralized components, such as grid computing server for dispatching and collecting models runs results; 2) a grid computing engine is developed based on MapReduce to dispatch models, model configuration, and collect simulation results and contributing statistics; 3) a portal serves as the entry point for the project to provide the management, sharing, and data exploration for end users; 4) scientists can access customized tools to configure model runs and visualize model results; 5) the public can access twitter and facebook to get the latest about the project. This paper will introduce the latest progress of the project and demonstrate the operational system during the AGU fall meeting. It will also discuss how this technology can become a trailblazer for other climate studies and relevant sciences. It will share how the challenges in computation and software integration were solved.

  11. Libraries Online!: Microsoft Partnering with American Library Association (ALA).

    ERIC Educational Resources Information Center

    Machovec, George S., Ed.

    1995-01-01

    Describes Libraries Online, a pilot project created by Microsoft and the American Library Association to develop ways to provide access to information technologies to underserved populations. Presents the nine public libraries that will receive cash grants, staff training, computer hardware and software, and technical support to help support local…

  12. EPA Project Updates: DSSTox and ToxCast Generating New Data and Data Linkages for Use in Predictive Modeling

    EPA Science Inventory

    EPAs National Center for Computational Toxicology is building capabilities to support a new paradigm for toxicity screening and prediction. The DSSTox project is improving public access to quality structure-annotated chemical toxicity information in less summarized forms than tr...

  13. Z39.50 and the Scholar's Workstation Concept.

    ERIC Educational Resources Information Center

    Phillips, Gary Lee

    1992-01-01

    Examines the potential application of the American National Standards Institute (ANSI)/National Information Standards Organization (NISO) Z39.50 library networking protocol as a client/server environment for a scholar's workstation. Computer networking models are described, and linking the workstation to an online public access catalog (OPAC) is…

  14. From Web 2.0 to Teacher 2.0

    ERIC Educational Resources Information Center

    Thomas, David A.; Li, Qing

    2008-01-01

    The World Wide Web is evolving in response to users who demand faster and more efficient access to information, portability, and reusability of digital objects between Web-based and computer-based applications and powerful communication, publication, collaboration, and teaching and learning tools. This article reviews current uses of Web-based…

  15. Publication Of Oceanographic Data on CD-ROM

    NASA Technical Reports Server (NTRS)

    Hilland, Jeffrey E.; Smith, Elizabeth A.; Martin, Michael D.

    1992-01-01

    Large collections of oceanographic data and other large collections of data published on CD-ROM's in formats facilitating access and analysis. Involves four major steps: preprocessing, premastering, mastering, and verification. Large capacity, small size, commercial availability, long-life, and standard format of CD-ROM's offer advantages over computer-compatible magnetic tape.

  16. Education Statistics on Disk. [CD-ROM.

    ERIC Educational Resources Information Center

    National Center for Education Statistics (ED), Washington, DC.

    This CD-ROM disk contains a computer program developed by the Office of Educational Research and Improvement to provide convenient access to the wealth of education statistics published by the National Center for Education Statistics (NCES). The program contains over 1,800 tables, charts, and text files from the following NCES publications,…

  17. Recreation and Natural Area Needs Assessment (GREAT III)

    DTIC Science & Technology

    1982-01-01

    1970 The Pennsylvania State University: Research and Computer Technician for Dr. E. L. Bergman, Department of Horticulture . Education B.S. The...Publication 1974 Becker, R. H. and R. 0. Ray. "Accessibility: An Application of the New Technology." Therapeutic Recreation Journal, Vol. 8, No. 4. 1976 Becker

  18. Planning for the Automation of School Library Media Centers.

    ERIC Educational Resources Information Center

    Caffarella, Edward P.

    1996-01-01

    Geared for school library media specialists whose centers are in the early stages of automation or conversion to a new system, this article focuses on major components of media center automation: circulation control; online public access catalogs; machine readable cataloging; retrospective conversion of print catalog cards; and computer networks…

  19. Electronic Journals in Academic Libraries: A Comparison of ARL and Non-ARL Libraries.

    ERIC Educational Resources Information Center

    Shemberg, Marian; Grossman, Cheryl

    1999-01-01

    Describes a survey dealing with academic library provision of electronic journals and other electronic resources that compared ARL (Association of Research Libraries) members to non-ARL members. Highlights include full-text electronic journals; computers in libraries; online public access catalogs; interlibrary loan and electronic reserves; access…

  20. Sharing a Vision.

    ERIC Educational Resources Information Center

    Cox, Susan M.

    1999-01-01

    Explains how one New Orleans (LA) school is making a positive difference in a low-income community by serving as the community's focal point and providing the community access to a public library, computers, and a learning center. Highlights the development of the Greater New Orleans Education Foundation and its assessment process, designed to…

  1. 48 CFR 1804.470-3 - IT security requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false IT security requirements... security requirements. (a) These IT security requirements cover all NASA awards in which IT plays a role in... physical or electronic access beyond that granted the general public to NASA's computer systems, networks...

  2. 48 CFR 1804.470-3 - IT security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false IT security requirements... security requirements. (a) These IT security requirements cover all NASA awards in which IT plays a role in... physical or electronic access beyond that granted the general public to NASA's computer systems, networks...

  3. Public Access to Environmental Chemistry Data via the CompTox Chemistry Dashboard (ACS Fall Meeting 6 of 12)

    EPA Science Inventory

    The National Center for Computational Toxicology (NCCT) has assembled and delivered an enormous quantity and diversity of data for the environmental sciences through the CompTox Chemistry Dashboard. These data include high-throughput in vitro screening data, in vivo and functiona...

  4. 48 CFR 1804.470-3 - IT security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false IT security requirements... security requirements. (a) These IT security requirements cover all NASA awards in which IT plays a role in... physical or electronic access beyond that granted the general public to NASA's computer systems, networks...

  5. Opening Reproducible Research

    NASA Astrophysics Data System (ADS)

    Nüst, Daniel; Konkol, Markus; Pebesma, Edzer; Kray, Christian; Klötgen, Stephanie; Schutzeichel, Marc; Lorenz, Jörg; Przibytzin, Holger; Kussmann, Dirk

    2016-04-01

    Open access is not only a form of publishing such that research papers become available to the large public free of charge, it also refers to a trend in science that the act of doing research becomes more open and transparent. When science transforms to open access we not only mean access to papers, research data being collected, or data being generated, but also access to the data used and the procedures carried out in the research paper. Increasingly, scientific results are generated by numerical manipulation of data that were already collected, and may involve simulation experiments that are completely carried out computationally. Reproducibility of research findings, the ability to repeat experimental procedures and confirm previously found results, is at the heart of the scientific method (Pebesma, Nüst and Bivand, 2012). As opposed to the collection of experimental data in labs or nature, computational experiments lend themselves very well for reproduction. Some of the reasons why scientists do not publish data and computational procedures that allow reproduction will be hard to change, e.g. privacy concerns in the data, fear for embarrassment or of losing a competitive advantage. Others reasons however involve technical aspects, and include the lack of standard procedures to publish such information and the lack of benefits after publishing them. We aim to resolve these two technical aspects. We propose a system that supports the evolution of scientific publications from static papers into dynamic, executable research documents. The DFG-funded experimental project Opening Reproducible Research (ORR) aims for the main aspects of open access, by improving the exchange of, by facilitating productive access to, and by simplifying reuse of research results that are published over the Internet. Central to the project is a new form for creating and providing research results, the executable research compendium (ERC), which not only enables third parties to reproduce the original research and hence recreate the original research results (figures, tables), but also facilitates interaction with them as well as their recombination with new data or methods. Building on existing open standards and software, this project develops standards and tools for ERCs, and will demonstrate and evaluate these, focusing on the geosciences domains. The project goes beyond a technical solution for ERCs by evaluating the system from the perspectives of geoscience researchers as participants in a scientific publication process. It will focus on the statistical environment R, but also evaluate larger run time systems captured in virtual environments (Docker containers). ERCs are built upon and integrate well with both established day-to-day workflows of digital research and the scientific publication process. They make research accessible on different levels at any stage to anyone via open web platforms. Other scientists can transfer a compendium of software and tools to their own local environment and collaborate, while others make minimal changes and compare changed results in a web browser. Building on recent advances in mainstream IT, ORR envisions a new architecture for storing, executing and interacting with the original analysis environment alongside the corresponding research data and text. ORR bridges the gap between long-term archives, practical geoscience researchers, as well as publication media. Consequently, the project team seeks input and feedback from researchers working with geospatial data to ensure usable and useful open access publications as well as a publication process that minimizes effort while maximizing usability and re-usability. {References} Pebesma, E., D. Nüst, R. Bivand, 2012. The R software environment in reproducible geoscientific research. Eos, Transactions American Geophysical Union 93, vol 16, p. http://dx.doi.org/10.1029/2012EO160003{163-164}. Opening Reproducible Research project description and website: https://www.uni-muenster.de/forschungaz/project/9520?lang=en

  6. The Open Data Repositorys Data Publisher

    NASA Technical Reports Server (NTRS)

    Stone, N.; Lafuente, B.; Downs, R. T.; Blake, D.; Bristow, T.; Fonda, M.; Pires, A.

    2015-01-01

    Data management and data publication are becoming increasingly important components of researcher's workflows. The complexity of managing data, publishing data online, and archiving data has not decreased significantly even as computing access and power has greatly increased. The Open Data Repository's Data Publisher software strives to make data archiving, management, and publication a standard part of a researcher's workflow using simple, web-based tools and commodity server hardware. The publication engine allows for uploading, searching, and display of data with graphing capabilities and downloadable files. Access is controlled through a robust permissions system that can control publication at the field level and can be granted to the general public or protected so that only registered users at various permission levels receive access. Data Publisher also allows researchers to subscribe to meta-data standards through a plugin system, embargo data publication at their discretion, and collaborate with other researchers through various levels of data sharing. As the software matures, semantic data standards will be implemented to facilitate machine reading of data and each database will provide a REST application programming interface for programmatic access. Additionally, a citation system will allow snapshots of any data set to be archived and cited for publication while the data itself can remain living and continuously evolve beyond the snapshot date. The software runs on a traditional LAMP (Linux, Apache, MySQL, PHP) server and is available on GitHub (http://github.com/opendatarepository) under a GPLv2 open source license. The goal of the Open Data Repository is to lower the cost and training barrier to entry so that any researcher can easily publish their data and ensure it is archived for posterity.

  7. Integrating Radar Image Data with Google Maps

    NASA Technical Reports Server (NTRS)

    Chapman, Bruce D.; Gibas, Sarah

    2010-01-01

    A public Web site has been developed as a method for displaying the multitude of radar imagery collected by NASA s Airborne Synthetic Aperture Radar (AIRSAR) instrument during its 16-year mission. Utilizing NASA s internal AIRSAR site, the new Web site features more sophisticated visualization tools that enable the general public to have access to these images. The site was originally maintained at NASA on six computers: one that held the Oracle database, two that took care of the software for the interactive map, and three that were for the Web site itself. Several tasks were involved in moving this complicated setup to just one computer. First, the AIRSAR database was migrated from Oracle to MySQL. Then the back-end of the AIRSAR Web site was updated in order to access the MySQL database. To do this, a few of the scripts needed to be modified; specifically three Perl scripts that query that database. The database connections were then updated from Oracle to MySQL, numerous syntax errors were corrected, and a query was implemented that replaced one of the stored Oracle procedures. Lastly, the interactive map was designed, implemented, and tested so that users could easily browse and access the radar imagery through the Google Maps interface.

  8. Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services.

    PubMed

    Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Lee, Sungyoung; Chung, Tae Choong

    2016-01-01

    Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to pre-defined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider.

  9. Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services

    PubMed Central

    Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Lee, Sungyoung; Chung, Tae Choong

    2016-01-01

    Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to pre-defined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider. PMID:27571421

  10. Computational biology for ageing

    PubMed Central

    Wieser, Daniela; Papatheodorou, Irene; Ziehm, Matthias; Thornton, Janet M.

    2011-01-01

    High-throughput genomic and proteomic technologies have generated a wealth of publicly available data on ageing. Easy access to these data, and their computational analysis, is of great importance in order to pinpoint the causes and effects of ageing. Here, we provide a description of the existing databases and computational tools on ageing that are available for researchers. We also describe the computational approaches to data interpretation in the field of ageing including gene expression, comparative and pathway analyses, and highlight the challenges for future developments. We review recent biological insights gained from applying bioinformatics methods to analyse and interpret ageing data in different organisms, tissues and conditions. PMID:21115530

  11. Discussing sexual and relationship health with young people in a children's hospital: evaluation of a computer-based resource.

    PubMed

    Bray, Lucy; Sanders, Caroline; McKenna, Jacqueline

    2013-12-01

    To investigate health professionals' evaluation of a computer-based resource designed to improve discussions about sexual and relationship health with young people. Evidence suggests that some health professionals can experience discomfort discussing sexual health and relationship issues with young people. Professionals within hospital settings should have the knowledge, competencies and skills to be able to ask young people sexual health questions and provide accurate sexual health education. Despite some educational material being available for community and adult services, there are no resources available, which are directly relevant to holding opportunistic discussions with young people within an acute children's hospital. A descriptive survey design. One hundred and fourteen health professionals from a children's hospital in the UK were involved in evaluating a computer-based resource. All completed an online questionnaire survey comprising of closed and open questions. The health professionals reported that the computer-based resource had a positive influence on their knowledge and clinical practice. The videos as well as the concise nature of the resource were evaluated highly. Learning was facilitated by professionals being able to control their learning through rerunning and accessing the resource on numerous occasions. An engaging, accessible computer-based resource has the capability to positively impact on health professionals' knowledge of, and skills in, starting and holding sexual health conversations with young people accessing a children's hospital. Health professionals working with children and young people value accessible, relevant and short computer-based training. This can facilitate knowledge and skill acquisition despite variation in working patterns. Improving the knowledge and skills of professionals working with young people to facilitate appropriate yet opportunistic sexual health discussions is important within the public health agenda. © 2013 John Wiley & Sons Ltd.

  12. The Open Access Model of Meteorologische Zeitschrift and other meteorological journals

    NASA Astrophysics Data System (ADS)

    Emeis, S.

    2009-09-01

    Today's availability and possibilities of the internet have already brought significant changes to the means of scientific communication. This also affects the publication and reception of peer-reviewed papers in scientific journals. In pre-internet times, the publication of scientific journals was mainly financed through subscription fees paid by libraries and other subscribers. The readers went to the libraries of their institution to search, read, and photocopy these papers. Today, everybody expects to have scientific papers more or less freely available on their desktop computers and from their printers. This has forced the publishers to change the financial model for the publication of scientific papers. An increasing number of journals now publish papers whose production costs have to be paid before the publication by the author or its institution. Those "pre-paid” papers are then freely available from the internet. This publication model has become known as "Open Access (OA)” model. Also the 126-year old Meteorologische Zeitschrift has changed its publication model to an Optional Open Access model. The features of this model will be presented and compared to other OA models with meteorological journals. This change in the publication models with a shift of its payment from the end (libraries and subscribers) to the beginning of the publication process (authors) has also confronted the scientific research and funding institutions with some problems. They must now also change their structures in financing one of their major outputs, the publications of their researchers. A few aspects of the present state of this shift will be addressed.

  13. Progress in computational toxicology.

    PubMed

    Ekins, Sean

    2014-01-01

    Computational methods have been widely applied to toxicology across pharmaceutical, consumer product and environmental fields over the past decade. Progress in computational toxicology is now reviewed. A literature review was performed on computational models for hepatotoxicity (e.g. for drug-induced liver injury (DILI)), cardiotoxicity, renal toxicity and genotoxicity. In addition various publications have been highlighted that use machine learning methods. Several computational toxicology model datasets from past publications were used to compare Bayesian and Support Vector Machine (SVM) learning methods. The increasing amounts of data for defined toxicology endpoints have enabled machine learning models that have been increasingly used for predictions. It is shown that across many different models Bayesian and SVM perform similarly based on cross validation data. Considerable progress has been made in computational toxicology in a decade in both model development and availability of larger scale or 'big data' models. The future efforts in toxicology data generation will likely provide us with hundreds of thousands of compounds that are readily accessible for machine learning models. These models will cover relevant chemistry space for pharmaceutical, consumer product and environmental applications. Copyright © 2013 Elsevier Inc. All rights reserved.

  14. Informatics approaches in the Biological Characterization of ...

    EPA Pesticide Factsheets

    Adverse Outcome Pathways (AOPs) are a conceptual framework to characterize toxicity pathways by a series of mechanistic steps from a molecular initiating event to population outcomes. This framework helps to direct risk assessment research, for example by aiding in computational prioritization of chemicals, genes, and tissues relevant to an adverse health outcome. We have designed and implemented a computational workflow to access a wealth of public data relating genes, chemicals, diseases, pathways, and species, to provide a biological context for putative AOPs. We selected three AOP case studies: ER/Aromatase Antagonism Leading to Reproductive Dysfunction, AHR1 Activation Leading to Cardiotoxicity, and AChE Inhibition Leading to Acute Mortality, and deduced a taxonomic range of applicability for each AOP. We developed computational tools to automatically access and analyze the pathway activity of AOP-relevant protein orthologs, finding broad similarity among vertebrate species for the ER/Aromatase and AHR1 AOPs, and similarity extending to invertebrate animal species for AChE inhibition. Additionally, we used public gene expression data to find groups of highly co-expressed genes, and compared those groups across organisms. To interpret these findings at a higher level of biological organization, we created the AOPdb, a relational database that mines results from sources including NCBI, KEGG, Reactome, CTD, and OMIM. This multi-source database connects genes,

  15. A network of web multimedia medical information servers for a medical school and university hospital.

    PubMed

    Denier, P; Le Beux, P; Delamarre, D; Fresnel, A; Cleret, M; Courtin, C; Seka, L P; Pouliquen, B; Cleran, L; Riou, C; Burgun, A; Jarno, P; Leduff, F; Lesaux, H; Duvauferrier, R

    1997-08-01

    Modern medicine requires a rapid access to information including clinical data from medical records, bibliographic databases, knowledge bases and nomenclature databases. This is especially true for University Hospitals and Medical Schools for training as well as for fundamental and clinical research for diagnosis and therapeutic purposes. This implies the development of local, national and international cooperation which can be enhanced via the use and access to computer networks such as Internet. The development of professional cooperative networks goes with the development of the telecommunication and computer networks and our project is to make these new tools and technologies accessible to the medical students both during the teaching time in Medical School and during the training periods at the University Hospital. We have developed a local area network which communicates between the School of Medicine and the Hospital which takes advantage of the new Web client-server technology both internally (Intranet) and externally by access to the National Research Network (RENATER in France) connected to the Internet network. The address of our public web server is http:(/)/www.med.univ-rennesl.fr.

  16. Maximizing Computational Capability with Minimal Power

    DTIC Science & Technology

    2009-03-01

    Chip -Scale Energy and Power... and Heat Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of...OpticalBench Mounting Posts Imager Chip LCDinterfaced withthecomputer P o l a r i z e r P o l a r i z e r XYZ Translator Optical Slide VMM Computational Pixel...Signal routing power / memory: ? Power does not include comm off chip (i.e. accessing memory) Power = ½ C Vdd2 f for CMOS Chip to Chip (10pF load min

  17. Early experiences in developing and managing the neuroscience gateway.

    PubMed

    Sivagnanam, Subhashini; Majumdar, Amit; Yoshimoto, Kenneth; Astakhov, Vadim; Bandrowski, Anita; Martone, MaryAnn; Carnevale, Nicholas T

    2015-02-01

    The last few decades have seen the emergence of computational neuroscience as a mature field where researchers are interested in modeling complex and large neuronal systems and require access to high performance computing machines and associated cyber infrastructure to manage computational workflow and data. The neuronal simulation tools, used in this research field, are also implemented for parallel computers and suitable for high performance computing machines. But using these tools on complex high performance computing machines remains a challenge because of issues with acquiring computer time on these machines located at national supercomputer centers, dealing with complex user interface of these machines, dealing with data management and retrieval. The Neuroscience Gateway is being developed to alleviate and/or hide these barriers to entry for computational neuroscientists. It hides or eliminates, from the point of view of the users, all the administrative and technical barriers and makes parallel neuronal simulation tools easily available and accessible on complex high performance computing machines. It handles the running of jobs and data management and retrieval. This paper shares the early experiences in bringing up this gateway and describes the software architecture it is based on, how it is implemented, and how users can use this for computational neuroscience research using high performance computing at the back end. We also look at parallel scaling of some publicly available neuronal models and analyze the recent usage data of the neuroscience gateway.

  18. Early experiences in developing and managing the neuroscience gateway

    PubMed Central

    Sivagnanam, Subhashini; Majumdar, Amit; Yoshimoto, Kenneth; Astakhov, Vadim; Bandrowski, Anita; Martone, MaryAnn; Carnevale, Nicholas. T.

    2015-01-01

    SUMMARY The last few decades have seen the emergence of computational neuroscience as a mature field where researchers are interested in modeling complex and large neuronal systems and require access to high performance computing machines and associated cyber infrastructure to manage computational workflow and data. The neuronal simulation tools, used in this research field, are also implemented for parallel computers and suitable for high performance computing machines. But using these tools on complex high performance computing machines remains a challenge because of issues with acquiring computer time on these machines located at national supercomputer centers, dealing with complex user interface of these machines, dealing with data management and retrieval. The Neuroscience Gateway is being developed to alleviate and/or hide these barriers to entry for computational neuroscientists. It hides or eliminates, from the point of view of the users, all the administrative and technical barriers and makes parallel neuronal simulation tools easily available and accessible on complex high performance computing machines. It handles the running of jobs and data management and retrieval. This paper shares the early experiences in bringing up this gateway and describes the software architecture it is based on, how it is implemented, and how users can use this for computational neuroscience research using high performance computing at the back end. We also look at parallel scaling of some publicly available neuronal models and analyze the recent usage data of the neuroscience gateway. PMID:26523124

  19. Adolescents and Electronic Media: Growing up Plugged in. Research Brief. Publication #2009-29

    ERIC Educational Resources Information Center

    Brown, Brett; Marin, Pilar

    2009-01-01

    Over the last decade the daily experience of adolescents has been transformed by developments in electronic media, including the computer, the Internet, and cell phones. Relative rarities only a generation ago, they are the daily tools of communication, information, and amusement for a majority of adolescents. Beyond access, content and…

  20. 77 FR 1728 - Privacy Act of 1974; Publication of Five New Systems of Records; Amendments to Five Existing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-11

    ... assistance to correspondents; to use Web site based programs; to provide usage statistics associated with the... of individuals for surveys. Among other things, maintaining the names, addresses, etc. of individuals... information in the system. Safeguards: Access by authorized personnel only. Computer security safeguards are...

  1. 78 FR 27873 - Computation of, and Rules Relating to, Medical Loss Ratio

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-13

    ..., the public hearing, and/or to be placed on the business access list to attend the hearing... and the IRS have concluded that, for administrative convenience and to be consistent with the medical... calculating an organization's special deduction for items attributable to the health- related business of the...

  2. Educational Resources in the ASCC Library

    ERIC Educational Resources Information Center

    Lin, Steven

    2006-01-01

    After two years of construction, American Samoa Community College opened its new library on September 2, 2003. The library is located on the east side of campus and is equipped with ten computer workstations, four online public access catalogs, three copying machines, and an elevator that is in compliance with the Americans with Disabilities Act.…

  3. From Pipe Dream to Reality: Creating a Technology-Rich School Environment.

    ERIC Educational Resources Information Center

    Crafton, John A.

    1998-01-01

    Methuen Public Schools, Massachusetts, has become a wired school system with computers in every classroom, Internet access, and state-of-the-art mixed-media. Five citizens who work in the technology industry formed a steering committee to drive the project. A long-term partnership with a private vendor, Lucent Technologies, addresses the…

  4. ICLIS: A Model for Extending Knowledge to Residents in Rural Communities. A Planning Workbook.

    ERIC Educational Resources Information Center

    Utah State Univ., Logan.

    The Intermountain Community Learning and Information Services (ICLIS) project was begun in 1985 to provide rural communities in Colorado, Montana, Utah, and Wyoming with greater access to information and educational programming. Computer centers were housed in nine rural public libraries to provide services related to literacy, career guidance,…

  5. Vouchers, Tests, Loans, Privatization: Will They Help Tackle Corruption in Russian Higher Education?

    ERIC Educational Resources Information Center

    Osipian, Ararat L.

    2009-01-01

    Higher education in Russia is currently being reformed. A standardized computer-graded test and educational vouchers were introduced to make higher education more accessible, fund it more effectively, and reduce corruption in admissions to public colleges. The voucher project failed and the test faces furious opposition. This paper considers…

  6. OCLC Research: 2012 Activity Report

    ERIC Educational Resources Information Center

    OCLC Online Computer Library Center, Inc., 2013

    2013-01-01

    The mission of the Online Computer Library Center (OCLC) Research is to expand knowledge that advances OCLC's public purposes of furthering access to the world's information and reducing library costs. OCLC Research is dedicated to three roles: (1)To act as a community resource for shared research and development (R&D); (2) To provide advanced…

  7. Condensation Heat Transfer of Steam on a Single Horizontal Tube.

    DTIC Science & Technology

    1983-06-01

    public release; distribution unlimited 88 09 07 1?0 L_ I jmmAzzLEim. SICUR1TY CLASStFICATION o« THIS r-AOt (*»*< Data Enf«r»d) REPORT...steam side data were taken at atmospheric pressure to test the data acquisition/reduction computer programs.^— S N 0102- LF. 014-1601 Accession For...Dlst H Special UNCLASSIFIED ItCUHlTV CLASSIFICATION O» TMI( PAOtyWft«! Data >*H mtm Im. ! Approved for public release; distribution

  8. Technology skills assessment for deaf and hard of hearing students in secondary school.

    PubMed

    Luft, Pamela; Bonello, Mary; Zirzow, Nichole K

    2009-01-01

    To BE COMPETITIVE in the workplace, deaf and hard of hearing students must not only possess basic computer literacy but also know how to use and care for personal assistive and listening technology. An instrument was developed and pilot-tested on 45 middle school and high school deaf and hard of hearing students in 5 public school programs, 4 urban and 1 suburban, to assess these students' current technology skills and to prepare them for post-high school expectations. The researchers found that the students' computer skills depended on their access to technology, which was not always present in the schools. Many students also did not know basic care practices or troubleshooting techniques for their own personal hearing aids (if worn), or how to access or use personal assistive technology.

  9. Beyond the online catalog: developing an academic information system in the sciences.

    PubMed Central

    Crawford, S; Halbrook, B; Kelly, E; Stucki, L

    1987-01-01

    The online public access catalog consists essentially of a machine-readable database with network capabilities. Like other computer-based information systems, it may be continuously enhanced by the addition of new capabilities and databases. It may also become a gateway to other information networks. This paper reports the evolution of the Bibliographic Access and Control System (BACS) of Washington University in end-user searching, current awareness services, information management, and administrative functions. Ongoing research and development and the future of the online catalog are also discussed. PMID:3315052

  10. Beyond the online catalog: developing an academic information system in the sciences.

    PubMed

    Crawford, S; Halbrook, B; Kelly, E; Stucki, L

    1987-07-01

    The online public access catalog consists essentially of a machine-readable database with network capabilities. Like other computer-based information systems, it may be continuously enhanced by the addition of new capabilities and databases. It may also become a gateway to other information networks. This paper reports the evolution of the Bibliographic Access and Control System (BACS) of Washington University in end-user searching, current awareness services, information management, and administrative functions. Ongoing research and development and the future of the online catalog are also discussed.

  11. Nature apps: Waiting for the revolution.

    PubMed

    Jepson, Paul; Ladle, Richard J

    2015-12-01

    Apps are small task-orientated programs with the potential to integrate the computational and sensing capacities of smartphones with the power of cloud computing, social networking, and crowdsourcing. They have the potential to transform how humans interact with nature, cause a step change in the quantity and resolution of biodiversity data, democratize access to environmental knowledge, and reinvigorate ways of enjoying nature. To assess the extent to which this potential is being exploited in relation to nature, we conducted an automated search of the Google Play Store using 96 nature-related terms. This returned data on ~36 304 apps, of which ~6301 were nature-themed. We found that few of these fully exploit the full range of capabilities inherent in the technology and/or have successfully captured the public imagination. Such breakthroughs will only be achieved by increasing the frequency and quality of collaboration between environmental scientists, information engineers, computer scientists, and interested publics.

  12. A cloud-based workflow to quantify transcript-expression levels in public cancer compendia

    PubMed Central

    Tatlow, PJ; Piccolo, Stephen R.

    2016-01-01

    Public compendia of sequencing data are now measured in petabytes. Accordingly, it is infeasible for researchers to transfer these data to local computers. Recently, the National Cancer Institute began exploring opportunities to work with molecular data in cloud-computing environments. With this approach, it becomes possible for scientists to take their tools to the data and thereby avoid large data transfers. It also becomes feasible to scale computing resources to the needs of a given analysis. We quantified transcript-expression levels for 12,307 RNA-Sequencing samples from the Cancer Cell Line Encyclopedia and The Cancer Genome Atlas. We used two cloud-based configurations and examined the performance and cost profiles of each configuration. Using preemptible virtual machines, we processed the samples for as little as $0.09 (USD) per sample. As the samples were processed, we collected performance metrics, which helped us track the duration of each processing step and quantified computational resources used at different stages of sample processing. Although the computational demands of reference alignment and expression quantification have decreased considerably, there remains a critical need for researchers to optimize preprocessing steps. We have stored the software, scripts, and processed data in a publicly accessible repository (https://osf.io/gqrz9). PMID:27982081

  13. Online Information-Seeking Behaviors of Parents of Children With ADHD.

    PubMed

    Sage, Adam; Carpenter, Delesha; Sayner, Robyn; Thomas, Kathleen; Mann, Larry; Sulzer, Sandy; Sandler, Adrian; Sleath, Betsy

    2018-01-01

    This article describes ( a) parent questions about ADHD (attention deficit/hyperactivity disorder), ( b) parent Internet use to seek ADHD information, and ( c) associations between type of Internet access and ADHD information-seeking. Seventy parents of children (ages 7-17 years) with ADHD completed questionnaires after their child's visit with their pediatrician. Bivariate relationships were assessed using chi-square statistics, Pearson correlation coefficients, or t tests. Parents identified an average of 8.9 questions about ADHD for their child's provider. Common questions were related to medication and long-term implications of ADHD. A majority of parents searched the Internet for general ADHD information (87%) and ADHD medication information (81%). White parents accessed the Internet significantly more via home computer, mobile phone, and tablet, and significantly less via public library than non-White parents. Parents who accessed the Internet via home computers and tablets were more likely to search the Internet for ADHD medication information than parents who did not.

  14. The general public's willingness to pay for tax increases to support unrestricted access to an Alzheimer's disease medication.

    PubMed

    Oremus, Mark; Tarride, Jean-Eric; Raina, Parminder; Thabane, Lehana; Foster, Gary; Goldsmith, Charlie H; Clayton, Natasha

    2012-11-01

    Alzheimer's disease (AD) is a neurodegenerative disorder highlighted by progressive declines in cognitive and functional abilities. Our objective was to assess the general public's maximum willingness to pay ((M)WTP) for an increase in annual personal income taxes to fund unrestricted access to AD medications. We randomly recruited 500 Canadians nationally and used computer-assisted telephone interviewing to administer a questionnaire. The questionnaire contained four 'efficacy' scenarios describing an AD medication as capable of symptomatically treating cognitive decline or modifying disease progression. The scenarios also described the medication as having no adverse effects or a 30% chance of adverse effects. We randomized participants to order of scenarios and willingness-to-pay bid values; (M)WTP for each scenario was the highest accepted bid for that scenario. We conducted linear regression and bootstrap sensitivity analyses to investigate potential determinants of (M)WTP. Mean (M)WTP was highest for the 'disease modification/no adverse effects' scenario ($Can130.26) and lowest for the 'symptomatic treatment/30% chance of adverse effects' scenario ($Can99.16). Bootstrap analyses indicated none of our potential determinants (e.g. age, sex) were associated with participants' (M)WTP. The general public is willing to pay higher income taxes to fund unrestricted access to AD (especially disease-modifying) medications. Consequently, the public should favour placing new AD medications on public drug plans. As far as we are aware, no other study has elicited the general public's willingness to pay for AD medications.

  15. Making Cloud Computing Available For Researchers and Innovators (Invited)

    NASA Astrophysics Data System (ADS)

    Winsor, R.

    2010-12-01

    High Performance Computing (HPC) facilities exist in most academic institutions but are almost invariably over-subscribed. Access is allocated based on academic merit, the only practical method of assigning valuable finite compute resources. Cloud computing on the other hand, and particularly commercial clouds, draw flexibly on an almost limitless resource as long as the user has sufficient funds to pay the bill. How can the commercial cloud model be applied to scientific computing? Is there a case to be made for a publicly available research cloud and how would it be structured? This talk will explore these themes and describe how Cybera, a not-for-profit non-governmental organization in Alberta Canada, aims to leverage its high speed research and education network to provide cloud computing facilities for a much wider user base.

  16. Users guide for the Water Resources Division bibliographic retrieval and report generation system

    USGS Publications Warehouse

    Tamberg, Nora

    1983-01-01

    The WRDBIB Retrieval and Report-generation system has been developed by applying Multitrieve (CSD 1980, Reston) software to bibliographic data files. The WRDBIB data base includes some 9 ,000 records containing bibliographic citations and descriptors of WRD reports released for publication during 1968-1982. The data base is resident in the Reston Multics computer and may be accessed by registered Multics users in the field. The WRDBIB Users Guide provides detailed procedures on how to run retrieval programs using WRDBIB library files, and how to prepare custom bibliographic reports and author indexes. Users may search the WRDBIB data base on the following variable fields as described in the Data Dictionary: Authors, organizational source, title, citation, publication year, descriptors, and the WRSIC (accession) number. The Users Guide provides ample examples of program runs illustrating various retrieval and report generation aspects. Appendices include Multics access and file manipulation procedures; a ' Glossary of Selected Terms'; and a complete ' Retrieval Session ' with step-by-step outlines. (USGS)

  17. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Radtke, M.A.

    This paper will chronicle the activity at Wisconsin Public Service Corporation (WPSC) that resulted in the complete migration of a traditional, late 1970`s vintage, Energy Management System (EMS). The new environment includes networked microcomputers, minicomputers, and the corporate mainframe, and provides on-line access to employees outside the energy control center and some WPSC customers. In the late 1980`s, WPSC was forecasting an EMS computer upgrade or replacement to address both capacity and technology needs. Reasoning that access to diverse computing resources would best position the company to accommodate the uncertain needs of the energy industry in the 90`s, WPSC chosemore » to investigate an in-place migration to a network of computers, able to support heterogeneous hardware and operating systems. The system was developed in a modular fashion, with individual modules being deployed as soon as they were completed. The functional and technical specification was continuously enhanced as operating experience was gained from each operational module. With the migration off the original EMS computers complete, the networked system called DEMAXX (Distributed Energy Management Architecture with eXtensive eXpandability) has exceeded expectations in the areas of: cost, performance, flexibility, and reliability.« less

  18. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Radtke, M.A.

    This paper will chronicle the activity at Wisconsin Public Service Corporation (WPSC) that resulted in the complete migration of a traditional, late 1970`s vintage, Energy management System (EMS). The new environment includes networked microcomputers, minicomputers, and the corporate mainframe, and provides on-line access to employees outside the energy control center and some WPSC customers. In the late 1980`s, WPSC was forecasting an EMS computer upgrade or replacement to address both capacity and technology needs. Reasoning that access to diverse computing resources would best position the company to accommodate the uncertain needs of the energy industry in the 90`s, WPSC chosemore » to investigate an in-place migration to a network of computers, able to support heterogeneous hardware and operating systems. The system was developed in a modular fashion, with individual modules being deployed as soon as they were completed. The functional and technical specification was continuously enhanced as operating experience was gained from each operational module. With the migration of the original EMS computers complete, the networked system called DEMAXX (Distributed Energy Management Architecture with eXtensive eXpandability) has exceeded expectations in the areas of: cost, performance, flexibility, and reliability.« less

  19. Performing quantum computing experiments in the cloud

    NASA Astrophysics Data System (ADS)

    Devitt, Simon J.

    2016-09-01

    Quantum computing technology has reached a second renaissance in the past five years. Increased interest from both the private and public sector combined with extraordinary theoretical and experimental progress has solidified this technology as a major advancement in the 21st century. As anticipated my many, some of the first realizations of quantum computing technology has occured over the cloud, with users logging onto dedicated hardware over the classical internet. Recently, IBM has released the Quantum Experience, which allows users to access a five-qubit quantum processor. In this paper we take advantage of this online availability of actual quantum hardware and present four quantum information experiments. We utilize the IBM chip to realize protocols in quantum error correction, quantum arithmetic, quantum graph theory, and fault-tolerant quantum computation by accessing the device remotely through the cloud. While the results are subject to significant noise, the correct results are returned from the chip. This demonstrates the power of experimental groups opening up their technology to a wider audience and will hopefully allow for the next stage of development in quantum information technology.

  20. The Acquisition of Literacy Skills in 1:1 Classrooms--The Danish Case

    ERIC Educational Resources Information Center

    Andresen, Bent B.

    2017-01-01

    In Denmark, 1:1 classroom has been implemented in all public schools (grades 1-9). Each student regularly accesses, processes, produces and exchanges written material using a computer (PC, laptop, tablet, etc.). These devices are considered as tools to enhance educational objectives, and in the article I present findings from research about how…

  1. 75 FR 71789 - The Future of Aviation Advisory Committee (FAAC); Notice of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... from 8:45 a.m. to 9:30 a.m. Please arrive early for parking, security clearance, and escort to meeting...-mail registration. There is no facility parking and parking at public parking lots is limited. Car... DOT Headquarters Building. There is no Internet access. Bringing computers into the building requires...

  2. Geo-Caching: Place-Based Discovery of Virginia State Parks and Museums

    ERIC Educational Resources Information Center

    Gray, Howard Richard

    2007-01-01

    The use of Global Positioning Systems (GPS) units has exploded in recent years along with the computer technology to access this data-based information. Geo-caching is an exciting game using GPS that provides place-based information regarding the public lands, facilities and cultural heritage programs within the Virginia Parks and Museum system.…

  3. Accessing a personalized bibliography with a searchable system on the World Wide Web

    Treesearch

    Malchus B. Baker; Daniel P. Huebner; Peter F. Ffolliott

    2000-01-01

    Researchers, educator's and land management personnel routinely construct bibliographies to assist them in managing publications that relate to their work. These personalized bibliographies are unique and valuable to others in the same discipline. This paper presents a computer data base system that provides users with the ability to search a bibliography through...

  4. Federal Support for Technology in K-12 Education

    ERIC Educational Resources Information Center

    Chapman, Gary

    2000-01-01

    The federal government has, on the whole, has done an excellent job, especially since 1996, in fostering the use of technology in K-12 public schools in the United States. The Department of Education's focus on getting computers and Internet access to low-income schools and communities is the right approach. This paper measures the impact of the…

  5. Examining the Digital Divide in K-12 Public Schools: Four-Year Trends for Supporting ICT Literacy in Florida

    ERIC Educational Resources Information Center

    Hohlfeld, Tina N.; Ritzhaupt, Albert D.; Barron, Ann E.; Kemker, Kate

    2008-01-01

    While there is evidence that access to computers in schools has increased, there remain questions about whether low socio-economic status (SES) schools provide students with equitable supports for achieving information communication technology (ICT) literacy. This research first presents a theoretical model to examine the digital divide within…

  6. 76 FR 47114 - Wireless E911 Location Accuracy Requirements; E911 Requirements for IP-Enabled Service Providers

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-04

    ... desktop computers and mobile devices, we expect significant innovation to continue in the provision of... inside of buildings.'' 47. Discussion. Publicly available reports, such as a March 2011 study from J. D... installed Wi-Fi access points, and a growing number of mobile devices (e.g., smartphones, laptops, and...

  7. The influence of data curation on QSAR Modeling - examining issues of quality versus quantity of data (American Chemical Society)

    EPA Science Inventory

    This presentation will examine the impact of data quality on the construction of QSAR models being developed within the EPA‘s National Center for Computational Toxicology. We have developed a public-facing platform to provide access to predictive models. As part of the work we ha...

  8. A Review of MS-DOS Bulletin Board Software Suitable for Long Distance Learning.

    ERIC Educational Resources Information Center

    Sessa, Anneliese

    This paper describes the advantages of using computer bulletin boards systems (BBS) for distance learning, including the use of the New York City Education Network (NYCENET) to access various databases and to communicate with individuals or the public. Questions to be answered in order to determine the most appropriate software for running a BBS…

  9. Integration and Exposure of Large Scale Computational Resources Across the Earth System Grid Federation (ESGF)

    NASA Astrophysics Data System (ADS)

    Duffy, D.; Maxwell, T. P.; Doutriaux, C.; Williams, D. N.; Chaudhary, A.; Ames, S.

    2015-12-01

    As the size of remote sensing observations and model output data grows, the volume of the data has become overwhelming, even to many scientific experts. As societies are forced to better understand, mitigate, and adapt to climate changes, the combination of Earth observation data and global climate model projects is crucial to not only scientists but to policy makers, downstream applications, and even the public. Scientific progress on understanding climate is critically dependent on the availability of a reliable infrastructure that promotes data access, management, and provenance. The Earth System Grid Federation (ESGF) has created such an environment for the Intergovernmental Panel on Climate Change (IPCC). ESGF provides a federated global cyber infrastructure for data access and management of model outputs generated for the IPCC Assessment Reports (AR). The current generation of the ESGF federated grid allows consumers of the data to find and download data with limited capabilities for server-side processing. Since the amount of data for future AR is expected to grow dramatically, ESGF is working on integrating server-side analytics throughout the federation. The ESGF Compute Working Team (CWT) has created a Web Processing Service (WPS) Application Programming Interface (API) to enable access scalable computational resources. The API is the exposure point to high performance computing resources across the federation. Specifically, the API allows users to execute simple operations, such as maximum, minimum, average, and anomalies, on ESGF data without having to download the data. These operations are executed at the ESGF data node site with access to large amounts of parallel computing capabilities. This presentation will highlight the WPS API, its capabilities, provide implementation details, and discuss future developments.

  10. Network Computing Infrastructure to Share Tools and Data in Global Nuclear Energy Partnership

    NASA Astrophysics Data System (ADS)

    Kim, Guehee; Suzuki, Yoshio; Teshima, Naoya

    CCSE/JAEA (Center for Computational Science and e-Systems/Japan Atomic Energy Agency) integrated a prototype system of a network computing infrastructure for sharing tools and data to support the U.S. and Japan collaboration in GNEP (Global Nuclear Energy Partnership). We focused on three technical issues to apply our information process infrastructure, which are accessibility, security, and usability. In designing the prototype system, we integrated and improved both network and Web technologies. For the accessibility issue, we adopted SSL-VPN (Security Socket Layer-Virtual Private Network) technology for the access beyond firewalls. For the security issue, we developed an authentication gateway based on the PKI (Public Key Infrastructure) authentication mechanism to strengthen the security. Also, we set fine access control policy to shared tools and data and used shared key based encryption method to protect tools and data against leakage to third parties. For the usability issue, we chose Web browsers as user interface and developed Web application to provide functions to support sharing tools and data. By using WebDAV (Web-based Distributed Authoring and Versioning) function, users can manipulate shared tools and data through the Windows-like folder environment. We implemented the prototype system in Grid infrastructure for atomic energy research: AEGIS (Atomic Energy Grid Infrastructure) developed by CCSE/JAEA. The prototype system was applied for the trial use in the first period of GNEP.

  11. A systematic review to identify areas of enhancements of pandemic simulation models for operational use at provincial and local levels

    PubMed Central

    2012-01-01

    Background In recent years, computer simulation models have supported development of pandemic influenza preparedness policies. However, U.S. policymakers have raised several concerns about the practical use of these models. In this review paper, we examine the extent to which the current literature already addresses these concerns and identify means of enhancing the current models for higher operational use. Methods We surveyed PubMed and other sources for published research literature on simulation models for influenza pandemic preparedness. We identified 23 models published between 1990 and 2010 that consider single-region (e.g., country, province, city) outbreaks and multi-pronged mitigation strategies. We developed a plan for examination of the literature based on the concerns raised by the policymakers. Results While examining the concerns about the adequacy and validity of data, we found that though the epidemiological data supporting the models appears to be adequate, it should be validated through as many updates as possible during an outbreak. Demographical data must improve its interfaces for access, retrieval, and translation into model parameters. Regarding the concern about credibility and validity of modeling assumptions, we found that the models often simplify reality to reduce computational burden. Such simplifications may be permissible if they do not interfere with the performance assessment of the mitigation strategies. We also agreed with the concern that social behavior is inadequately represented in pandemic influenza models. Our review showed that the models consider only a few social-behavioral aspects including contact rates, withdrawal from work or school due to symptoms appearance or to care for sick relatives, and compliance to social distancing, vaccination, and antiviral prophylaxis. The concern about the degree of accessibility of the models is palpable, since we found three models that are currently accessible by the public while other models are seeking public accessibility. Policymakers would prefer models scalable to any population size that can be downloadable and operable in personal computers. But scaling models to larger populations would often require computational needs that cannot be handled with personal computers and laptops. As a limitation, we state that some existing models could not be included in our review due to their limited available documentation discussing the choice of relevant parameter values. Conclusions To adequately address the concerns of the policymakers, we need continuing model enhancements in critical areas including: updating of epidemiological data during a pandemic, smooth handling of large demographical databases, incorporation of a broader spectrum of social-behavioral aspects, updating information for contact patterns, adaptation of recent methodologies for collecting human mobility data, and improvement of computational efficiency and accessibility. PMID:22463370

  12. An Integrated Approach to Engineering Education in a Minority Community

    NASA Technical Reports Server (NTRS)

    Taylor, Bill

    1998-01-01

    Northeastern New Mexico epitomizes regions which are economically depressed, rural, and predominantly Hispanic. New Mexico Highlands University (NMHU), with a small student population of approximately 2800, offers a familiar environment attracting students who might otherwise not attend college. An outreach computer network of minority schools was created in northeastern New Mexico with NASA funding. Rural and urban minority schools gained electronic access to each other, to computer resources, to technical help at New Mexico Highlands University and gained access to the world via the Internet. This outreach program was initiated in the fall of 1992 in an effort to attract and to involve minority students in Engineering and the Mathematical Sciences. We installed 56 Kbs Internet connections to eight elementary schools, two middle schools, two high schools, a public library (servicing the home schooling community) and an International Baccalaureate school. For another fourteen rural schools, we provided computers and free dial-up service to servers on the New Mexico Highlands University campus.

  13. Systematic Development of Intelligent Systems for Public Road Transport.

    PubMed

    García, Carmelo R; Quesada-Arencibia, Alexis; Cristóbal, Teresa; Padrón, Gabino; Alayón, Francisco

    2016-07-16

    This paper presents an architecture model for the development of intelligent systems for public passenger transport by road. The main objective of our proposal is to provide a framework for the systematic development and deployment of telematics systems to improve various aspects of this type of transport, such as efficiency, accessibility and safety. The architecture model presented herein is based on international standards on intelligent transport system architectures, ubiquitous computing and service-oriented architecture for distributed systems. To illustrate the utility of the model, we also present a use case of a monitoring system for stops on a public passenger road transport network.

  14. Systematic Development of Intelligent Systems for Public Road Transport

    PubMed Central

    García, Carmelo R.; Quesada-Arencibia, Alexis; Cristóbal, Teresa; Padrón, Gabino; Alayón, Francisco

    2016-01-01

    This paper presents an architecture model for the development of intelligent systems for public passenger transport by road. The main objective of our proposal is to provide a framework for the systematic development and deployment of telematics systems to improve various aspects of this type of transport, such as efficiency, accessibility and safety. The architecture model presented herein is based on international standards on intelligent transport system architectures, ubiquitous computing and service-oriented architecture for distributed systems. To illustrate the utility of the model, we also present a use case of a monitoring system for stops on a public passenger road transport network. PMID:27438836

  15. International distance-learning outreach: the APEC EINet experience.

    PubMed

    Kimball, A M; Shih, L; Brown, J; Harris, T G; Pautler, N; Jamieson, R W; Bolles, J; Horwitch, C

    2003-01-01

    The Emerging Infections Network is a mature electronic network that links Public Health professionals in the Asia Pacific through regular e-mail bulletins and an extensive Web site (http://www.apec.org/infectious). Emerging infections is a new area of study; learning materials help foster education. Our objective is to quantify the response of the network to the introduction of distance-learning materials on the Web site. Distance-learning materials, developed by the University of Washington School of Public Health, were field tested and launched on the site. Publicity was carried out prior to the launch of the materials. Access was tracked prospectively using server counts of page downloads. Web access increased substantially during the month after the materials were launched, especially among Asia based computers. The effect was isolated to the distance-learning pages, and not general to the site. This Web site appears to be responsive to the advertisement and to the materials. Prospective Web-site monitoring proved useful. Copyright 2002 Elsevier Science Ireland Ltd.

  16. The Image Data Resource: A Bioimage Data Integration and Publication Platform.

    PubMed

    Williams, Eleanor; Moore, Josh; Li, Simon W; Rustici, Gabriella; Tarkowska, Aleksandra; Chessel, Anatole; Leo, Simone; Antal, Bálint; Ferguson, Richard K; Sarkans, Ugis; Brazma, Alvis; Salas, Rafael E Carazo; Swedlow, Jason R

    2017-08-01

    Access to primary research data is vital for the advancement of science. To extend the data types supported by community repositories, we built a prototype Image Data Resource (IDR) that collects and integrates imaging data acquired across many different imaging modalities. IDR links data from several imaging modalities, including high-content screening, super-resolution and time-lapse microscopy, digital pathology, public genetic or chemical databases, and cell and tissue phenotypes expressed using controlled ontologies. Using this integration, IDR facilitates the analysis of gene networks and reveals functional interactions that are inaccessible to individual studies. To enable re-analysis, we also established a computational resource based on Jupyter notebooks that allows remote access to the entire IDR. IDR is also an open source platform that others can use to publish their own image data. Thus IDR provides both a novel on-line resource and a software infrastructure that promotes and extends publication and re-analysis of scientific image data.

  17. The Open Data Repository's Data Publisher

    NASA Astrophysics Data System (ADS)

    Stone, N.; Lafuente, B.; Downs, R. T.; Bristow, T.; Blake, D. F.; Fonda, M.; Pires, A.

    2015-12-01

    Data management and data publication are becoming increasingly important components of research workflows. The complexity of managing data, publishing data online, and archiving data has not decreased significantly even as computing access and power has greatly increased. The Open Data Repository's Data Publisher software (http://www.opendatarepository.org) strives to make data archiving, management, and publication a standard part of a researcher's workflow using simple, web-based tools and commodity server hardware. The publication engine allows for uploading, searching, and display of data with graphing capabilities and downloadable files. Access is controlled through a robust permissions system that can control publication at the field level and can be granted to the general public or protected so that only registered users at various permission levels receive access. Data Publisher also allows researchers to subscribe to meta-data standards through a plugin system, embargo data publication at their discretion, and collaborate with other researchers through various levels of data sharing. As the software matures, semantic data standards will be implemented to facilitate machine reading of data and each database will provide a REST application programming interface for programmatic access. Additionally, a citation system will allow snapshots of any data set to be archived and cited for publication while the data itself can remain living and continuously evolve beyond the snapshot date. The software runs on a traditional LAMP (Linux, Apache, MySQL, PHP) server and is available on GitHub (http://github.com/opendatarepository) under a GPLv2 open source license. The goal of the Open Data Repository is to lower the cost and training barrier to entry so that any researcher can easily publish their data and ensure it is archived for posterity. We gratefully acknowledge the support for this study by the Science-Enabling Research Activity (SERA), and NASA NNX11AP82A, Mars Science Laboratory Investigations and University of Arizona Geosciences.

  18. The JASMIN Cloud: specialised and hybrid to meet the needs of the Environmental Sciences Community

    NASA Astrophysics Data System (ADS)

    Kershaw, Philip; Lawrence, Bryan; Churchill, Jonathan; Pritchard, Matt

    2014-05-01

    Cloud computing provides enormous opportunities for the research community. The large public cloud providers provide near-limitless scaling capability. However, adapting Cloud to scientific workloads is not without its problems. The commodity nature of the public cloud infrastructure can be at odds with the specialist requirements of the research community. Issues such as trust, ownership of data, WAN bandwidth and costing models make additional barriers to more widespread adoption. Alongside the application of public cloud for scientific applications, a number of private cloud initiatives are underway in the research community of which the JASMIN Cloud is one example. Here, cloud service models are being effectively super-imposed over more established services such as data centres, compute cluster facilities and Grids. These have the potential to deliver the specialist infrastructure needed for the science community coupled with the benefits of a Cloud service model. The JASMIN facility based at the Rutherford Appleton Laboratory was established in 2012 to support the data analysis requirements of the climate and Earth Observation community. In its first year of operation, the 5PB of available storage capacity was filled and the hosted compute capability used extensively. JASMIN has modelled the concept of a centralised large-volume data analysis facility. Key characteristics have enabled success: peta-scale fast disk connected via low latency networks to compute resources and the use of virtualisation for effective management of the resources for a range of users. A second phase is now underway funded through NERC's (Natural Environment Research Council) Big Data initiative. This will see significant expansion to the resources available with a doubling of disk-based storage to 12PB and an increase of compute capacity by a factor of ten to over 3000 processing cores. This expansion is accompanied by a broadening in the scope for JASMIN, as a service available to the entire UK environmental science community. Experience with the first phase demonstrated the range of user needs. A trade-off is needed between access privileges to resources, flexibility of use and security. This has influenced the form and types of service under development for the new phase. JASMIN will deploy a specialised private cloud organised into "Managed" and "Unmanaged" components. In the Managed Cloud, users have direct access to the storage and compute resources for optimal performance but for reasons of security, via a more restrictive PaaS (Platform-as-a-Service) interface. The Unmanaged Cloud is deployed in an isolated part of the network but co-located with the rest of the infrastructure. This enables greater liberty to tenants - full IaaS (Infrastructure-as-a-Service) capability to provision customised infrastructure - whilst at the same time protecting more sensitive parts of the system from direct access using these elevated privileges. The private cloud will be augmented with cloud-bursting capability so that it can exploit the resources available from public clouds, making it effectively a hybrid solution. A single interface will overlay the functionality of both the private cloud and external interfaces to public cloud providers giving users the flexibility to migrate resources between infrastructures as requirements dictate.

  19. Translational bioinformatics in the cloud: an affordable alternative

    PubMed Central

    2010-01-01

    With the continued exponential expansion of publicly available genomic data and access to low-cost, high-throughput molecular technologies for profiling patient populations, computational technologies and informatics are becoming vital considerations in genomic medicine. Although cloud computing technology is being heralded as a key enabling technology for the future of genomic research, available case studies are limited to applications in the domain of high-throughput sequence data analysis. The goal of this study was to evaluate the computational and economic characteristics of cloud computing in performing a large-scale data integration and analysis representative of research problems in genomic medicine. We find that the cloud-based analysis compares favorably in both performance and cost in comparison to a local computational cluster, suggesting that cloud computing technologies might be a viable resource for facilitating large-scale translational research in genomic medicine. PMID:20691073

  20. NASA/UK TAP

    NASA Technical Reports Server (NTRS)

    1987-01-01

    The purpose of the Technology Applications Program (TAP) is to provide problem solving information and assistance to both the public and private sectors in the Commonwealth of Kentucky, with emphasis primarily in the public sector. The TAP accesses over 1200 online computer databases, including files from the U.S., Canada, Europe, and Australia. During the 1985 to 1986 contract period, TAP responded to 645 inquiries which resulted in an increase of 16 percent over the 1984 to 1985 contract period. The activities of TAP for the 1985 to 1986 contract period are summarized.

  1. Electronic media, violence, and adolescents: an emerging public health problem.

    PubMed

    David-Ferdon, Corinne; Hertz, Marci Feldman

    2007-12-01

    Adolescents' access to and use of new media technology (e.g., cell phone, personal data assistant, computer for Internet access) are on the rise, and this explosion of technology brings with it potential benefits and risks. Attention is growing about the risk of adolescents to become victims of aggression perpetrated by peers with new technology. In September 2006, the Centers for Disease Control and Prevention convened a panel of experts in technology and youth aggression to examine this specific risk. This special issue of the Journal of Adolescent Health presents the data and recommendations for future directions discussed at the meeting. The articles in the Journal support the argument that electronic aggression is an emerging public health problem in need of additional prevalence and etiological research to support the development and evaluation of effective prevention programs.

  2. Network and data security design for telemedicine applications.

    PubMed

    Makris, L; Argiriou, N; Strintzis, M G

    1997-01-01

    The maturing of telecommunication technologies has ushered in a whole new era of applications and services in the health care environment. Teleworking, teleconsultation, mutlimedia conferencing and medical data distribution are rapidly becoming commonplace in clinical practice. As a result, a set of problems arises, concerning data confidentiality and integrity. Public computer networks, such as the emerging ISDN technology, are vulnerable to eavesdropping. Therefore it is important for telemedicine applications to employ end-to-end encryption mechanisms securing the data channel from unauthorized access of modification. We propose a network access and encryption system that is both economical and easily implemented for integration in developing or existing applications, using well-known and thoroughly tested encryption algorithms. Public-key cryptography is used for session-key exchange, while symmetric algorithms are used for bulk encryption. Mechanisms for session-key generation and exchange are also provided.

  3. Are specialist physicians missing out on the e-Health boat?

    PubMed

    Osborn, M; Day, R; Westbrook, J

    2009-10-01

    Nationally health systems are making increasing investments in the use of clinical information systems. Little is known about current computer use by specialist physicians, particularly outside the hospital setting. To identify the extent and reasons physician Fellows of the Royal Australasian College of Physicians (RACP) use computers in their work. A self-administered survey was emailed from the RACP to all practising physicians in 2007 that were living in Australia and New Zealand who had consented to email contact with the College. The survey was sent to a total of 7445 eligible physicians, 2328 physicians responded (31.3% response rate), but only 1266 responses (21.0%) were able to be analysed. Most 97.5% had access to computers at work and 96.5% used home computers for work purposes. Physicians in public hospitals (72.6%) were more likely to use computers for work (65.6%) than those in private hospitals (12.6%) or consulting rooms (27.3%). Overall physicians working in public hospitals used a wider range of applications with 70.5% using their computers for searching the internet, 53.7% for receiving results and 52.7% used their computers to engage in specific educational activities. Physicians working from their consulting rooms (33.6%) were more likely to use electronic prescribing (11%) compared with physicians working in public hospitals (5.7%). Fellows have not incorporated computers into their consulting rooms over which they have control. This is in contrast to general practitioners who have embraced computers after the provision of various incentives. The rate of use of computers by physicians for electronic prescribing in consulting rooms (11%) is very low in comparison with general practitioners (98%). One reason may be that physicians work in multiple locations whereas general practitioners are more likely to work from one location.

  4. Using the US EPA's CompTox Dashboard to support identification and screening of emerging organic contaminants in the environment (ACS Spring National meeting) 2 of 7

    EPA Science Inventory

    The US EPA’s iCSS CompTox Dashboard is a curated, publicly accessible resource provided by the National Center for Computational Toxicology (https://comptox.epa.gov). The Dashboard provides support for toxicology and risk assessment within and external to the EPA (including ToxC...

  5. User Guide to the 1981 LC (Language Census) Database. Version 1.2.

    ERIC Educational Resources Information Center

    Kimbrough, Kenneth L.

    This guide is designed to introduce potential users of the California Language Census data to a means of accessing that data using an online, interactive computer system known as "1981 LC." The language census is an actual count of the numbers of pupils with a primary language other than English in California public schools as of March 1…

  6. Technology in Education, 2000: A Comprehensive Report on the State of Technology in the K-12 Market.

    ERIC Educational Resources Information Center

    Wujcik, Anne

    This report presents the results of Market Data Retrieval's (MDR's) annual survey (conducted during the 1999-2000 school year) of the technology market in public education. Each year the MDR survey asks schools to respond to essentially the same questions about their access to and use of computers, CD-ROMs, networks, Internet, and other…

  7. Apps in Literature-Based Classroom Instruction: Integrating Reading and Response through Traditional and Digital Media

    ERIC Educational Resources Information Center

    Möller, Karla J.

    2015-01-01

    For over two decades, the field of children's literature has been incorporating more digital technologies into publication of and access to texts. From early computer and CD-ROM adaptations of print picturebooks to the extensive visual and aural interactivity of the newest literature apps, what and how children read has changed significantly in…

  8. Access and Success for African American Engineers and Computer Scientists: A Case Study of Two Predominantly White Public Research Universities

    ERIC Educational Resources Information Center

    Newman, Christopher Bufford

    2011-01-01

    Over the past decade, three rationales have emerged for emphasizing the reinforcement of the United States' science, technology, engineering, and mathematics (STEM) pipeline. The first rationale pertains to U.S. global competitiveness, the second revolves around the benefits of a diverse workforce, and the third argument points to social justice…

  9. One to One Computing: A Summary of the Quantitative Results from the Berkshire Wireless Learning Initiative

    ERIC Educational Resources Information Center

    Bebell, Damian; Kay, Rachel

    2010-01-01

    This paper examines the educational impacts of the Berkshire Wireless Learning Initiative (BWLI), a pilot program that provided 1:1 technology access to all students and teachers across five public and private middle schools in western Massachusetts. Using a pre/post comparative study design, the current study explores a wide range of program…

  10. iBIOMES Lite: Summarizing Biomolecular Simulation Data in Limited Settings

    PubMed Central

    2015-01-01

    As the amount of data generated by biomolecular simulations dramatically increases, new tools need to be developed to help manage this data at the individual investigator or small research group level. In this paper, we introduce iBIOMES Lite, a lightweight tool for biomolecular simulation data indexing and summarization. The main goal of iBIOMES Lite is to provide a simple interface to summarize computational experiments in a setting where the user might have limited privileges and limited access to IT resources. A command-line interface allows the user to summarize, publish, and search local simulation data sets. Published data sets are accessible via static hypertext markup language (HTML) pages that summarize the simulation protocols and also display data analysis graphically. The publication process is customized via extensible markup language (XML) descriptors while the HTML summary template is customized through extensible stylesheet language (XSL). iBIOMES Lite was tested on different platforms and at several national computing centers using various data sets generated through classical and quantum molecular dynamics, quantum chemistry, and QM/MM. The associated parsers currently support AMBER, GROMACS, Gaussian, and NWChem data set publication. The code is available at https://github.com/jcvthibault/ibiomes. PMID:24830957

  11. The digital health divide: evaluating online health information access and use among older adults.

    PubMed

    Hall, Amanda K; Bernhardt, Jay M; Dodd, Virginia; Vollrath, Morgan W

    2015-04-01

    Innovations in health information technology (HIT) provide opportunities to reduce health care spending, improve quality of care, and improve health outcomes for older adults. However, concerns relating to older adults' limited access and use of HIT, including use of the Internet for health information, fuel the digital health divide debate. This study evaluated the potential digital health divide in relation to characteristic and belief differences between older adult users and nonusers of online health information sources. A cross-sectional survey design was conducted using a random sample of older adults. A total of 225 older adults (age range = 50-92 years, M = 68.9 years, SD = 10.4) participated in the study. Seventy-six percent of all respondents had Internet access. Users and nonusers of online health information differed significantly on age (M = 66.29 vs. M = 71.13), education, and previous experience with the health care system. Users and nonusers of online health information also differed significantly on Internet and technology access, however, a large percentage of nonusers had Internet access (56.3%), desktop computers (55.9%), and laptop computers or netbooks (43.2%). Users of online health information had higher mean scores on the Computer Self-Efficacy Measure than nonusers, t(159) = -7.29, p < .0001. This study found significant differences between older adult users and nonusers of online health information. Findings suggest strategies for reducing this divide and implications for health education programs to promote HIT use among older adults. © 2014 Society for Public Health Education.

  12. The ChIP-Seq tools and web server: a resource for analyzing ChIP-seq and other types of genomic data.

    PubMed

    Ambrosini, Giovanna; Dreos, René; Kumar, Sunil; Bucher, Philipp

    2016-11-18

    ChIP-seq and related high-throughput chromatin profilig assays generate ever increasing volumes of highly valuable biological data. To make sense out of it, biologists need versatile, efficient and user-friendly tools for access, visualization and itegrative analysis of such data. Here we present the ChIP-Seq command line tools and web server, implementing basic algorithms for ChIP-seq data analysis starting with a read alignment file. The tools are optimized for memory-efficiency and speed thus allowing for processing of large data volumes on inexpensive hardware. The web interface provides access to a large database of public data. The ChIP-Seq tools have a modular and interoperable design in that the output from one application can serve as input to another one. Complex and innovative tasks can thus be achieved by running several tools in a cascade. The various ChIP-Seq command line tools and web services either complement or compare favorably to related bioinformatics resources in terms of computational efficiency, ease of access to public data and interoperability with other web-based tools. The ChIP-Seq server is accessible at http://ccg.vital-it.ch/chipseq/ .

  13. Public Access Policy and Communications | DOE PAGES

    Science.gov Websites

    Close Clear All Find DOE PAGES Public Access Policy and Communications Public Access Policy and Communications 7/24/14 Department of Energy Public Access Plan DOE Public Access Plan 2/22/13 White House Office Information (ICSTI) Insights article Public Access at the United States Department of Energy (1,011 KB), by

  14. An Examination of Adolescent Recall of Anti-Smoking Messages: Attitudes, Message Type, and Message Perceptions.

    PubMed

    Bigsby, Elisabeth; Monahan, Jennifer L; Ewoldsen, David R

    2017-04-01

    Delayed message recall may be influenced by currently held accessible attitudes, the nature of the message, and message perceptions (perception of bias and message elaboration). This study examined the potential of message perceptions to mediate the influence of valenced attitude accessibility and message type on unaided recall of anti-smoking Public Service Announcements (PSAs). In a field experiment, ninth grade students (N = 244) watched three PSAs and responded to items on laptop computers. Twelve weeks later, follow-up telephone surveys were conducted to assess unaided recall. Both valenced attitude accessibility and message type were associated with message perceptions. However, only perception of message bias partially mediated the relationship between message type and unaided recall.

  15. Improving data workflow systems with cloud services and use of open data for bioinformatics research.

    PubMed

    Karim, Md Rezaul; Michel, Audrey; Zappa, Achille; Baranov, Pavel; Sahay, Ratnesh; Rebholz-Schuhmann, Dietrich

    2017-04-16

    Data workflow systems (DWFSs) enable bioinformatics researchers to combine components for data access and data analytics, and to share the final data analytics approach with their collaborators. Increasingly, such systems have to cope with large-scale data, such as full genomes (about 200 GB each), public fact repositories (about 100 TB of data) and 3D imaging data at even larger scales. As moving the data becomes cumbersome, the DWFS needs to embed its processes into a cloud infrastructure, where the data are already hosted. As the standardized public data play an increasingly important role, the DWFS needs to comply with Semantic Web technologies. This advancement to DWFS would reduce overhead costs and accelerate the progress in bioinformatics research based on large-scale data and public resources, as researchers would require less specialized IT knowledge for the implementation. Furthermore, the high data growth rates in bioinformatics research drive the demand for parallel and distributed computing, which then imposes a need for scalability and high-throughput capabilities onto the DWFS. As a result, requirements for data sharing and access to public knowledge bases suggest that compliance of the DWFS with Semantic Web standards is necessary. In this article, we will analyze the existing DWFS with regard to their capabilities toward public open data use as well as large-scale computational and human interface requirements. We untangle the parameters for selecting a preferable solution for bioinformatics research with particular consideration to using cloud services and Semantic Web technologies. Our analysis leads to research guidelines and recommendations toward the development of future DWFS for the bioinformatics research community. © The Author 2017. Published by Oxford University Press.

  16. Big Data for Public Health Policy-Making: Policy Empowerment.

    PubMed

    Mählmann, Laura; Reumann, Matthias; Evangelatos, Nikolaos; Brand, Angela

    2018-04-04

    Digitization is considered to radically transform healthcare. As such, with seemingly unlimited opportunities to collect data, it will play an important role in the public health policy-making process. In this context, health data cooperatives (HDC) are a key component and core element for public health policy-making and for exploiting the potential of all the existing and rapidly emerging data sources. Being able to leverage all the data requires overcoming the computational, algorithmic, and technological challenges that characterize today's highly heterogeneous data landscape, as well as a host of diverse regulatory, normative, governance, and policy constraints. The full potential of big data can only be realized if data are being made accessible and shared. Treating research data as a public good, creating HDC to empower citizens through citizen-owned health data, and allowing data access for research and the development of new diagnostics, therapies, and public health policies will yield the transformative impact of digital health. The HDC model for data governance is an arrangement, based on moral codes, that encourages citizens to participate in the improvement of their own health. This then enables public health institutions and policymakers to monitor policy changes and evaluate their impact and risk on a population level. © 2018 S. Karger AG, Basel.

  17. An Interactive, Web-based High Performance Modeling Environment for Computational Epidemiology.

    PubMed

    Deodhar, Suruchi; Bisset, Keith R; Chen, Jiangzhuo; Ma, Yifei; Marathe, Madhav V

    2014-07-01

    We present an integrated interactive modeling environment to support public health epidemiology. The environment combines a high resolution individual-based model with a user-friendly web-based interface that allows analysts to access the models and the analytics back-end remotely from a desktop or a mobile device. The environment is based on a loosely-coupled service-oriented-architecture that allows analysts to explore various counter factual scenarios. As the modeling tools for public health epidemiology are getting more sophisticated, it is becoming increasingly hard for non-computational scientists to effectively use the systems that incorporate such models. Thus an important design consideration for an integrated modeling environment is to improve ease of use such that experimental simulations can be driven by the users. This is achieved by designing intuitive and user-friendly interfaces that allow users to design and analyze a computational experiment and steer the experiment based on the state of the system. A key feature of a system that supports this design goal is the ability to start, stop, pause and roll-back the disease propagation and intervention application process interactively. An analyst can access the state of the system at any point in time and formulate dynamic interventions based on additional information obtained through state assessment. In addition, the environment provides automated services for experiment set-up and management, thus reducing the overall time for conducting end-to-end experimental studies. We illustrate the applicability of the system by describing computational experiments based on realistic pandemic planning scenarios. The experiments are designed to demonstrate the system's capability and enhanced user productivity.

  18. An Interactive, Web-based High Performance Modeling Environment for Computational Epidemiology

    PubMed Central

    Deodhar, Suruchi; Bisset, Keith R.; Chen, Jiangzhuo; Ma, Yifei; Marathe, Madhav V.

    2014-01-01

    We present an integrated interactive modeling environment to support public health epidemiology. The environment combines a high resolution individual-based model with a user-friendly web-based interface that allows analysts to access the models and the analytics back-end remotely from a desktop or a mobile device. The environment is based on a loosely-coupled service-oriented-architecture that allows analysts to explore various counter factual scenarios. As the modeling tools for public health epidemiology are getting more sophisticated, it is becoming increasingly hard for non-computational scientists to effectively use the systems that incorporate such models. Thus an important design consideration for an integrated modeling environment is to improve ease of use such that experimental simulations can be driven by the users. This is achieved by designing intuitive and user-friendly interfaces that allow users to design and analyze a computational experiment and steer the experiment based on the state of the system. A key feature of a system that supports this design goal is the ability to start, stop, pause and roll-back the disease propagation and intervention application process interactively. An analyst can access the state of the system at any point in time and formulate dynamic interventions based on additional information obtained through state assessment. In addition, the environment provides automated services for experiment set-up and management, thus reducing the overall time for conducting end-to-end experimental studies. We illustrate the applicability of the system by describing computational experiments based on realistic pandemic planning scenarios. The experiments are designed to demonstrate the system's capability and enhanced user productivity. PMID:25530914

  19. Self-reported use of internet by cervical cancer clients in two National Referral Hospitals in Kenya.

    PubMed

    Kivuti-Bitok, Lucy W; McDonnell, Geoff; Pokhariyal, Ganesh P; Roudsari, Abdul V

    2012-10-09

    Cervical cancer remains a devastating disease in Kenya accounting for more than 2000 deaths each year. Lack of information on cervical cancer prevention and management has been attributed to the apathy among women in seeking health interventions. Use of internet-based and mobile e-health tools could increase information access among cervical cancer patients. The objective of the study was; to establish the extent of use of mobile phones and internet by cervical cancer patients in accessing information related to cancer treatment and management.; find out the characteristics of patients associated with internet use and identify barriers faced by the patients in internet use. A cross sectional descriptive survey of 199 cervical patients visiting the two main referral hospitals in Kenya was done. A structured questionnaire was used to collect data. The average length of illness was 2.43 years (SD ± 3.0). Only 7.5 %( n=15) reported to having used the internet as a source of information. 92.5 %( n=184) did not use internet. With Multiple options, 70.9% did not know how to use a computer, 29.2% did not have access to a computer, 14.6% lacked the money to use computers at the local cyber cafe while other barriers identified accounted for 11.1%. Patients reported that the internet had an important role in the management of cancer of the cervix in health education (17.6%), online consultation (14.6%), booking of patients (13.6%), referrals (8.5%) and collecting data (7%). The 96.5% of the respondents who had access to a mobile phone, recommended mobile phones for health education messages (31.7%), reminder alerts for medication (29.7%) and booking appointments (21.6%). There was a statistically significant association between income of the patients and internet use (p = 0.026) in this study. There is low level use of the internet by cervical cancer clients attended in Public referral facilities in Kenya. This was attributed to; lack of knowledge on how to use computers and lack of access to a computer. High level of access to mobile phones was reported. This is an indicator of great potential for use of mobile phones in the management of cervical cancer through short messaging services (sms), without internet connectivity. There is even greater potential to internet use through web access via mobile phones.

  20. Building a Generic Virtual Research Environment Framework for Multiple Earth and Space Science Domains and a Diversity of Users.

    NASA Astrophysics Data System (ADS)

    Wyborn, L. A.; Fraser, R.; Evans, B. J. K.; Friedrich, C.; Klump, J. F.; Lescinsky, D. T.

    2017-12-01

    Virtual Research Environments (VREs) are now part of academic infrastructures. Online research workflows can be orchestrated whereby data can be accessed from multiple external repositories with processing taking place on public or private clouds, and centralised supercomputers using a mixture of user codes, and well-used community software and libraries. VREs enable distributed members of research teams to actively work together to share data, models, tools, software, workflows, best practices, infrastructures, etc. These environments and their components are increasingly able to support the needs of undergraduate teaching. External to the research sector, they can also be reused by citizen scientists, and be repurposed for industry users to help accelerate the diffusion and hence enable the translation of research innovations. The Virtual Geophysics Laboratory (VGL) in Australia was started in 2012, built using a collaboration between CSIRO, the National Computational Infrastructure (NCI) and Geoscience Australia, with support funding from the Australian Government Department of Education. VGL comprises three main modules that provide an interface to enable users to first select their required data; to choose a tool to process that data; and then access compute infrastructure for execution. VGL was initially built to enable a specific set of researchers in government agencies access to specific data sets and a limited number of tools. Over the years it has evolved into a multi-purpose Earth science platform with access to an increased variety of data (e.g., Natural Hazards, Geochemistry), a broader range of software packages, and an increasing diversity of compute infrastructures. This expansion has been possible because of the approach to loosely couple data, tools and compute resources via interfaces that are built on international standards and accessed as network-enabled services wherever possible. Built originally for researchers that were not fussy about general usability, increasing emphasis on User Interfaces (UIs) and stability will lead to increased uptake in the education and industry sectors. Simultaneously, improvements are being added to facilitate access to data and tools by experienced researchers who want direct access to both data and flexible workflows.

  1. Uncover the Cloud for Geospatial Sciences and Applications to Adopt Cloud Computing

    NASA Astrophysics Data System (ADS)

    Yang, C.; Huang, Q.; Xia, J.; Liu, K.; Li, J.; Xu, C.; Sun, M.; Bambacus, M.; Xu, Y.; Fay, D.

    2012-12-01

    Cloud computing is emerging as the future infrastructure for providing computing resources to support and enable scientific research, engineering development, and application construction, as well as work force education. On the other hand, there is a lot of doubt about the readiness of cloud computing to support a variety of scientific research, development and educations. This research is a project funded by NASA SMD to investigate through holistic studies how ready is the cloud computing to support geosciences. Four applications with different computing characteristics including data, computing, concurrent, and spatiotemporal intensities are taken to test the readiness of cloud computing to support geosciences. Three popular and representative cloud platforms including Amazon EC2, Microsoft Azure, and NASA Nebula as well as a traditional cluster are utilized in the study. Results illustrates that cloud is ready to some degree but more research needs to be done to fully implemented the cloud benefit as advertised by many vendors and defined by NIST. Specifically, 1) most cloud platform could help stand up new computing instances, a new computer, in a few minutes as envisioned, therefore, is ready to support most computing needs in an on demand fashion; 2) the load balance and elasticity, a defining characteristic, is ready in some cloud platforms, such as Amazon EC2, to support bigger jobs, e.g., needs response in minutes, while some are not ready to support the elasticity and load balance well. All cloud platform needs further research and development to support real time application at subminute level; 3) the user interface and functionality of cloud platforms vary a lot and some of them are very professional and well supported/documented, such as Amazon EC2, some of them needs significant improvement for the general public to adopt cloud computing without professional training or knowledge about computing infrastructure; 4) the security is a big concern in cloud computing platform, with the sharing spirit of cloud computing, it is very hard to ensure higher level security, except a private cloud is built for a specific organization without public access, public cloud platform does not support FISMA medium level yet and may never be able to support FISMA high level; 5) HPC jobs needs of cloud computing is not well supported and only Amazon EC2 supports this well. The research is being taken by NASA and other agencies to consider cloud computing adoption. We hope the publication of the research would also benefit the public to adopt cloud computing.

  2. The Computational Infrastructure for Geodynamics: An Example of Software Curation and Citation in the Geodynamics Community

    NASA Astrophysics Data System (ADS)

    Hwang, L.; Kellogg, L. H.

    2017-12-01

    Curation of software promotes discoverability and accessibility and works hand in hand with scholarly citation to ascribe value to, and provide recognition for software development. To meet this challenge, the Computational Infrastructure for Geodynamics (CIG) maintains a community repository built on custom and open tools to promote discovery, access, identification, credit, and provenance of research software for the geodynamics community. CIG (geodynamics.org) originated from recognition of the tremendous effort required to develop sound software and the need to reduce duplication of effort and to sustain community codes. CIG curates software across 6 domains and has developed and follows software best practices that include establishing test cases, documentation, and a citable publication for each software package. CIG software landing web pages provide access to current and past releases; many are also accessible through the CIG community repository on github. CIG has now developed abc - attribution builder for citation to enable software users to give credit to software developers. abc uses zenodo as an archive and as the mechanism to obtain a unique identifier (DOI) for scientific software. To assemble the metadata, we searched the software's documentation and research publications and then requested the primary developers to verify. In this process, we have learned that each development community approaches software attribution differently. The metadata gathered is based on guidelines established by groups such as FORCE11 and OntoSoft. The rollout of abc is gradual as developers are forward-looking, rarely willing to go back and archive prior releases in zenodo. Going forward all actively developed packages will utilize the zenodo and github integration to automate the archival process when a new release is issued. How to handle legacy software, multi-authored libraries, and assigning roles to software remain open issues.

  3. VDJServer: A Cloud-Based Analysis Portal and Data Commons for Immune Repertoire Sequences and Rearrangements.

    PubMed

    Christley, Scott; Scarborough, Walter; Salinas, Eddie; Rounds, William H; Toby, Inimary T; Fonner, John M; Levin, Mikhail K; Kim, Min; Mock, Stephen A; Jordan, Christopher; Ostmeyer, Jared; Buntzman, Adam; Rubelt, Florian; Davila, Marco L; Monson, Nancy L; Scheuermann, Richard H; Cowell, Lindsay G

    2018-01-01

    Recent technological advances in immune repertoire sequencing have created tremendous potential for advancing our understanding of adaptive immune response dynamics in various states of health and disease. Immune repertoire sequencing produces large, highly complex data sets, however, which require specialized methods and software tools for their effective analysis and interpretation. VDJServer is a cloud-based analysis portal for immune repertoire sequence data that provide access to a suite of tools for a complete analysis workflow, including modules for preprocessing and quality control of sequence reads, V(D)J gene segment assignment, repertoire characterization, and repertoire comparison. VDJServer also provides sophisticated visualizations for exploratory analysis. It is accessible through a standard web browser via a graphical user interface designed for use by immunologists, clinicians, and bioinformatics researchers. VDJServer provides a data commons for public sharing of repertoire sequencing data, as well as private sharing of data between users. We describe the main functionality and architecture of VDJServer and demonstrate its capabilities with use cases from cancer immunology and autoimmunity. VDJServer provides a complete analysis suite for human and mouse T-cell and B-cell receptor repertoire sequencing data. The combination of its user-friendly interface and high-performance computing allows large immune repertoire sequencing projects to be analyzed with no programming or software installation required. VDJServer is a web-accessible cloud platform that provides access through a graphical user interface to a data management infrastructure, a collection of analysis tools covering all steps in an analysis, and an infrastructure for sharing data along with workflows, results, and computational provenance. VDJServer is a free, publicly available, and open-source licensed resource.

  4. Differences in media access and use between rural Native American and White children.

    PubMed

    Hswen, Yulin; Naslund, John A; Bickham, David S

    2014-01-01

    Native American children experience greater disparities in the number and magnitude of health-related diseases than White children. Multimedia-based health interventions may afford valuable opportunities for reaching this underserved demographic; however, limited data are available describing the use of media technologies among Native Americans. This study characterized diverse media access and use between rural Native American and White children. Surveys were administered to students (n=477) aged 10-15 years in grades 6-8 across four public middle schools in the rural Upper Peninsula of the Midwestern USA state of Michigan. Native American children (n=41) were more likely than White children (n=436) to have a video game system in their bedroom (65.9% vs 45.4%; p=0.01) and watch more minutes of television on Saturdays (110.3±91.7 vs 80.7±80.8; p=0.03). Native American children also had fewer computers within the home (1.20±0.81 vs 1.68±1.21; p=0.01) than White children and less household internet access (75.6% vs 87.1%; p=0.04), but demonstrated more use in minutes after school (79.9±97.9 vs 51.1±71.6; p=0.02) and on Saturdays (92.6±107.4 vs 60.0±85.1; p=0.02). This represents the first cross-cultural comparison of media access and use between Native American and White children from rural Michigan. Greater computer and internet use observed among the Native American children surveyed in this study supports the use of web-based public health initiatives aimed at reducing health disparities within this vulnerable group.

  5. Geoinformatics in the public service: building a cyberinfrastructure across the geological surveys

    USGS Publications Warehouse

    Allison, M. Lee; Gundersen, Linda C.; Richard, Stephen M.; Keller, G. Randy; Baru, Chaitanya

    2011-01-01

    Advanced information technology infrastructure is increasingly being employed in the Earth sciences to provide researchers with efficient access to massive central databases and to integrate diversely formatted information from a variety of sources. These geoinformatics initiatives enable manipulation, modeling and visualization of data in a consistent way, and are helping to develop integrated Earth models at various scales, and from the near surface to the deep interior. This book uses a series of case studies to demonstrate computer and database use across the geosciences. Chapters are thematically grouped into sections that cover data collection and management; modeling and community computational codes; visualization and data representation; knowledge management and data integration; and web services and scientific workflows. Geoinformatics is a fascinating and accessible introduction to this emerging field for readers across the solid Earth sciences and an invaluable reference for researchers interested in initiating new cyberinfrastructure projects of their own.

  6. On the duality of resilience and privacy†.

    PubMed

    Crowcroft, Jon

    2015-03-08

    Protecting information has long been an important problem. We would like to protect ourselves from the risk of loss: think of the library of Alexandria; and from unauthorized access: consider the very business of the 'Scandal Sheets', going back centuries. This has never been more true than today when vast quantities of data (dare one say lesser quantities of information) are stored on computer systems, and routinely moved around the Internet, at almost no cost. Computer and communication systems are both fragile and vulnerable, and so the risk of catastrophic loss or theft is potentially much higher. A single keystroke can delete a public database, or expose a private dataset to the world. In this paper, I consider the problems of providing resilience against loss, and against unacceptable access as a dual . Here, we see that two apparently different solutions to different technical problems may be transformed into one another, and hence give better insight into both problems.

  7. High-performance integrated virtual environment (HIVE): a robust infrastructure for next-generation sequence data analysis

    PubMed Central

    Simonyan, Vahan; Chumakov, Konstantin; Dingerdissen, Hayley; Faison, William; Goldweber, Scott; Golikov, Anton; Gulzar, Naila; Karagiannis, Konstantinos; Vinh Nguyen Lam, Phuc; Maudru, Thomas; Muravitskaja, Olesja; Osipova, Ekaterina; Pan, Yang; Pschenichnov, Alexey; Rostovtsev, Alexandre; Santana-Quintero, Luis; Smith, Krista; Thompson, Elaine E.; Tkachenko, Valery; Torcivia-Rodriguez, John; Wan, Quan; Wang, Jing; Wu, Tsung-Jung; Wilson, Carolyn; Mazumder, Raja

    2016-01-01

    The High-performance Integrated Virtual Environment (HIVE) is a distributed storage and compute environment designed primarily to handle next-generation sequencing (NGS) data. This multicomponent cloud infrastructure provides secure web access for authorized users to deposit, retrieve, annotate and compute on NGS data, and to analyse the outcomes using web interface visual environments appropriately built in collaboration with research and regulatory scientists and other end users. Unlike many massively parallel computing environments, HIVE uses a cloud control server which virtualizes services, not processes. It is both very robust and flexible due to the abstraction layer introduced between computational requests and operating system processes. The novel paradigm of moving computations to the data, instead of moving data to computational nodes, has proven to be significantly less taxing for both hardware and network infrastructure. The honeycomb data model developed for HIVE integrates metadata into an object-oriented model. Its distinction from other object-oriented databases is in the additional implementation of a unified application program interface to search, view and manipulate data of all types. This model simplifies the introduction of new data types, thereby minimizing the need for database restructuring and streamlining the development of new integrated information systems. The honeycomb model employs a highly secure hierarchical access control and permission system, allowing determination of data access privileges in a finely granular manner without flooding the security subsystem with a multiplicity of rules. HIVE infrastructure will allow engineers and scientists to perform NGS analysis in a manner that is both efficient and secure. HIVE is actively supported in public and private domains, and project collaborations are welcomed. Database URL: https://hive.biochemistry.gwu.edu PMID:26989153

  8. High-performance integrated virtual environment (HIVE): a robust infrastructure for next-generation sequence data analysis.

    PubMed

    Simonyan, Vahan; Chumakov, Konstantin; Dingerdissen, Hayley; Faison, William; Goldweber, Scott; Golikov, Anton; Gulzar, Naila; Karagiannis, Konstantinos; Vinh Nguyen Lam, Phuc; Maudru, Thomas; Muravitskaja, Olesja; Osipova, Ekaterina; Pan, Yang; Pschenichnov, Alexey; Rostovtsev, Alexandre; Santana-Quintero, Luis; Smith, Krista; Thompson, Elaine E; Tkachenko, Valery; Torcivia-Rodriguez, John; Voskanian, Alin; Wan, Quan; Wang, Jing; Wu, Tsung-Jung; Wilson, Carolyn; Mazumder, Raja

    2016-01-01

    The High-performance Integrated Virtual Environment (HIVE) is a distributed storage and compute environment designed primarily to handle next-generation sequencing (NGS) data. This multicomponent cloud infrastructure provides secure web access for authorized users to deposit, retrieve, annotate and compute on NGS data, and to analyse the outcomes using web interface visual environments appropriately built in collaboration with research and regulatory scientists and other end users. Unlike many massively parallel computing environments, HIVE uses a cloud control server which virtualizes services, not processes. It is both very robust and flexible due to the abstraction layer introduced between computational requests and operating system processes. The novel paradigm of moving computations to the data, instead of moving data to computational nodes, has proven to be significantly less taxing for both hardware and network infrastructure.The honeycomb data model developed for HIVE integrates metadata into an object-oriented model. Its distinction from other object-oriented databases is in the additional implementation of a unified application program interface to search, view and manipulate data of all types. This model simplifies the introduction of new data types, thereby minimizing the need for database restructuring and streamlining the development of new integrated information systems. The honeycomb model employs a highly secure hierarchical access control and permission system, allowing determination of data access privileges in a finely granular manner without flooding the security subsystem with a multiplicity of rules. HIVE infrastructure will allow engineers and scientists to perform NGS analysis in a manner that is both efficient and secure. HIVE is actively supported in public and private domains, and project collaborations are welcomed. Database URL: https://hive.biochemistry.gwu.edu. © The Author(s) 2016. Published by Oxford University Press.

  9. A Platform for Scalable Satellite and Geospatial Data Analysis

    NASA Astrophysics Data System (ADS)

    Beneke, C. M.; Skillman, S.; Warren, M. S.; Kelton, T.; Brumby, S. P.; Chartrand, R.; Mathis, M.

    2017-12-01

    At Descartes Labs, we use the commercial cloud to run global-scale machine learning applications over satellite imagery. We have processed over 5 Petabytes of public and commercial satellite imagery, including the full Landsat and Sentinel archives. By combining open-source tools with a FUSE-based filesystem for cloud storage, we have enabled a scalable compute platform that has demonstrated reading over 200 GB/s of satellite imagery into cloud compute nodes. In one application, we generated global 15m Landsat-8, 20m Sentinel-1, and 10m Sentinel-2 composites from 15 trillion pixels, using over 10,000 CPUs. We recently created a public open-source Python client library that can be used to query and access preprocessed public satellite imagery from within our platform, and made this platform available to researchers for non-commercial projects. In this session, we will describe how you can use the Descartes Labs Platform for rapid prototyping and scaling of geospatial analyses and demonstrate examples in land cover classification.

  10. National Library Service of the Library of Congress: New Electronic Information Projects. Part Four of a Four-Part Series.

    ERIC Educational Resources Information Center

    McNulty, Tom, Ed.

    1995-01-01

    This final installment of a four-part series on the National Library Service (NLS) examines recently implemented and future projects, with a focus on alternative formats for patrons with disabilities. Discusses LOCIS, the Library of Congress online public access catalog; MARVEL, the Library of Congress gopher; the NLS Web site; and computer disk…

  11. Stonix, Version 0.x

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    2015-05-13

    STONIX is a program for configuring UNIX and Linux computer operating systems. It applies configurations based on the guidance from publicly accessible resources such as: NSA Guides, DISA STIGs, the Center for Internet Security (CIS), USGCB and vendor security documentation. STONIX is written in the Python programming language using the QT4 and PyQT4 libraries to provide a GUI. The code is designed to be easily extensible and customizable.

  12. Real ePublishing, Really Publishing! How To Create Digital Books by and for All Ages.

    ERIC Educational Resources Information Center

    Condon, Mark W. F.; McGuffee, Michael

    This book aims to help teachers turn their classrooms into their very own publishing companies. All that is needed is a computer, a word processor, a digital camera, a color printer, and access to the Internet. The book explains that a new genre of publication, Webbes, are simple nonfiction picture books, and that, matching meaningful text with…

  13. Agent-Based Computing Integration and Testing

    DTIC Science & Technology

    2006-12-01

    Query Language (DQL). Regrettably, DQL never became a W3C Member Submission itself, but likely had some influence on the SPARQL Protocol And RDF... Query Language ( SPARQL ) subsequently produced by the W3C Data Access Working Group (DAWG) as that working group also contained members from the DAML...Sponsored by Defense Advanced Research Projects Agency DARPA Order No. K536 APPROVED FOR PUBLIC RELEASE

  14. Computer and internet use in a community health clinic population.

    PubMed

    Peterson, Neeraja B; Dwyer, Kathleen A; Mulvaney, Shelagh A

    2009-01-01

    To determine if patients from a community health clinic have access to computers and/or the Internet and if they believe a computer is useful in their medical care. A convenience sample of 100 subjects, aged 50 years and older, from a community health clinic in Nashville, Tennessee, completed a structured interview and a health literacy assessment. Of the 100 participants, 40 did not have any computer access, 27 had computer but not Internet access, and 33 had Internet access. Participants with computer access (with or without Internet) had higher incomes, higher educational status, and higher literacy status than those without computer access. Of participants reporting current computer use (n = 54), 33% reported never using their computer to look up health and medical information. Of those who "never'' used their computer for this activity, 54% reported they did not have Internet connectivity, whereas 31% reported they did not know how to use the Internet. Although this group of individuals reported that they were comfortable using a computer (77%), they reported being uncomfortable with accessing the Internet (53%). Not only does access to computers and the Internet need to be improved before widespread use by patients, but computer users will need to be instructed on how to navigate the Internet.

  15. An Interactive Web-Based Analysis Framework for Remote Sensing Cloud Computing

    NASA Astrophysics Data System (ADS)

    Wang, X. Z.; Zhang, H. M.; Zhao, J. H.; Lin, Q. H.; Zhou, Y. C.; Li, J. H.

    2015-07-01

    Spatiotemporal data, especially remote sensing data, are widely used in ecological, geographical, agriculture, and military research and applications. With the development of remote sensing technology, more and more remote sensing data are accumulated and stored in the cloud. An effective way for cloud users to access and analyse these massive spatiotemporal data in the web clients becomes an urgent issue. In this paper, we proposed a new scalable, interactive and web-based cloud computing solution for massive remote sensing data analysis. We build a spatiotemporal analysis platform to provide the end-user with a safe and convenient way to access massive remote sensing data stored in the cloud. The lightweight cloud storage system used to store public data and users' private data is constructed based on open source distributed file system. In it, massive remote sensing data are stored as public data, while the intermediate and input data are stored as private data. The elastic, scalable, and flexible cloud computing environment is built using Docker, which is a technology of open-source lightweight cloud computing container in the Linux operating system. In the Docker container, open-source software such as IPython, NumPy, GDAL, and Grass GIS etc., are deployed. Users can write scripts in the IPython Notebook web page through the web browser to process data, and the scripts will be submitted to IPython kernel to be executed. By comparing the performance of remote sensing data analysis tasks executed in Docker container, KVM virtual machines and physical machines respectively, we can conclude that the cloud computing environment built by Docker makes the greatest use of the host system resources, and can handle more concurrent spatial-temporal computing tasks. Docker technology provides resource isolation mechanism in aspects of IO, CPU, and memory etc., which offers security guarantee when processing remote sensing data in the IPython Notebook. Users can write complex data processing code on the web directly, so they can design their own data processing algorithm.

  16. ENVIRONMENTAL REVIEWS AND CASE STUDIES: Addressing the Public Outreach Responsibilities of the National Historic Preservation Act: Argonne National Laboratory’s Box Digital Display Platform

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    O’Rourke, Daniel J.; Weber, Cory C.; Richmond, Pamela D.

    Federal agencies are made responsible for managing the historic properties under their jurisdiction by the National Historic Preservation Act of 1966, as amended. A component of this responsibility is to mitigate the effect of a federal undertaking on historic properties through mitigation often through documentation. Providing public access to this documentation has always been a challenge. To address the issue of public access to mitigation information, personnel from Argonne National Laboratory created the Box Digital Display Platform, a system for communicating information about historic properties to the public. The platform, developed for the US Army Dugway Proving Ground, uses shortmore » introductory videos to present a topic but can also incorporate photos, drawings, GIS information, and documents. The system operates from a small, self-contained computer that can be attached to any digital monitor via an HDMI cable. The system relies on web-based software that allows the information to be republished as a touch-screen device application or as a website. The system does not connect to the Internet, and this increases security and eliminates the software maintenance fees associated with websites. The platform is designed to incorporate the products of past documentation to make this information more accessible to the public; specifically those documentations developed using the Historic American Building Survey/ Historic American Engineering Record (HABS/HAER) standards. Argonne National Laboratory’s Box Digital Display Platform can assist federal agencies in complying with the requirements of the National Historic Preservation Act. Environmental Practice 18: 209–213 (2016)« less

  17. The GMT/MATLAB Toolbox

    NASA Astrophysics Data System (ADS)

    Wessel, Paul; Luis, Joaquim F.

    2017-02-01

    The GMT/MATLAB toolbox is a basic interface between MATLAB® (or Octave) and GMT, the Generic Mapping Tools, which allows MATLAB users full access to all GMT modules. Data may be passed between the two programs using intermediate MATLAB structures that organize the metadata needed; these are produced when GMT modules are run. In addition, standard MATLAB matrix data can be used directly as input to GMT modules. The toolbox improves interoperability between two widely used tools in the geosciences and extends the capability of both tools: GMT gains access to the powerful computational capabilities of MATLAB while the latter gains the ability to access specialized gridding algorithms and can produce publication-quality PostScript-based illustrations. The toolbox is available on all platforms and may be downloaded from the GMT website.

  18. How Accessible Are Public Libraries' Web Sites? A Study of Georgia Public Libraries

    ERIC Educational Resources Information Center

    Ingle, Emma; Green, Ravonne A.; Huprich, Julia

    2009-01-01

    One issue that public librarians must consider when planning Web site design is accessibility for patrons with disabilities. This article reports a study of Web site accessibility of public libraries in Georgia. The focus of the report is whether public libraries use accessible guidelines and standards in making their Web sites accessible. An…

  19. A Science Information Infrastructure for Access to Earth and Space Science Data through the Nation's Science Museums

    NASA Technical Reports Server (NTRS)

    Murray, S.

    1999-01-01

    In this project, we worked with the University of California at Berkeley/Center for Extreme Ultraviolet Astrophysics and five science museums (the National Air and Space Museum, the Science Museum of Virginia, the Lawrence Hall of Science, the Exploratorium., and the New York Hall of Science) to formulate plans for computer-based laboratories located at these museums. These Science Learning Laboratories would be networked and provided with real Earth and space science observations, as well as appropriate lesson plans, that would allow the general public to directly access and manipulate the actual remote sensing data, much as a scientist would.

  20. Open Access: From Myth to Paradox

    ScienceCinema

    Ginsparg, Paul [Cornell University, Ithaca, New York, United States

    2018-04-19

    True open access to scientific publications not only gives readers the possibility to read articles without paying subscription, but also makes the material available for automated ingestion and harvesting by 3rd parties. Once articles and associated data become universally treatable as computable objects, openly available to 3rd party aggregators and value-added services, what new services can we expect, and how will they change the way that researchers interact with their scholarly communications infrastructure? I will discuss straightforward applications of existing ideas and services, including citation analysis, collaborative filtering, external database linkages, interoperability, and other forms of automated markup, and speculate on the sociology of the next generation of users.

  1. LSST Resources for the Community

    NASA Astrophysics Data System (ADS)

    Jones, R. Lynne

    2011-01-01

    LSST will generate 100 petabytes of images and 20 petabytes of catalogs, covering 18,000-20,000 square degrees of area sampled every few days, throughout a total of ten years of time -- all publicly available and exquisitely calibrated. The primary access to this data will be through Data Access Centers (DACs). DACs will provide access to catalogs of sources (single detections from individual images) and objects (associations of sources from multiple images). Simple user interfaces or direct SQL queries at the DAC can return user-specified portions of data from catalogs or images. More complex manipulations of the data, such as calculating multi-point correlation functions or creating alternative photo-z measurements on terabyte-scale data, can be completed with the DAC's own resources. Even more data-intensive computations requiring access to large numbers of image pixels on petabyte-scale could also be conducted at the DAC, using compute resources allocated in a similar manner to a TAC. DAC resources will be available to all individuals in member countries or institutes and LSST science collaborations. DACs will also assist investigators with requests for allocations at national facilities such as the Petascale Computing Facility, TeraGrid, and Open Science Grid. Using data on this scale requires new approaches to accessibility and analysis which are being developed through interactions with the LSST Science Collaborations. We are producing simulated images (as might be acquired by LSST) based on models of the universe and generating catalogs from these images (as well as from the base model) using the LSST data management framework in a series of data challenges. The resulting images and catalogs are being made available to the science collaborations to verify the algorithms and develop user interfaces. All LSST software is open source and available online, including preliminary catalog formats. We encourage feedback from the community.

  2. Lowering industry firewalls: pre-competitive informatics initiatives in drug discovery.

    PubMed

    Barnes, Michael R; Harland, Lee; Foord, Steven M; Hall, Matthew D; Dix, Ian; Thomas, Scott; Williams-Jones, Bryn I; Brouwer, Cory R

    2009-09-01

    Pharmaceutical research and development is facing substantial challenges that have prompted the industry to shift funding from early- to late-stage projects. Among the effects is a major change in the attitude of many companies to their internal bioinformatics resources: the focus has moved from the vigorous pursuit of intellectual property towards exploration of pre-competitive cross-industry collaborations and engagement with the public domain. High-quality, open and accessible data are the foundation of pre-competitive research, and strong public-private partnerships have considerable potential to enhance public data resources, which would benefit everyone engaged in drug discovery. In this article, we discuss the background to these changes and propose new areas of collaboration in computational biology and chemistry between the public domain and the pharmaceutical industry.

  3. IT Security Support for the Spaceport Command Control System Development

    NASA Technical Reports Server (NTRS)

    Varise, Brian

    2014-01-01

    My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.

  4. 2B-Alert Web: An Open-Access Tool for Predicting the Effects of Sleep/Wake Schedules and Caffeine Consumption on Neurobehavioral Performance.

    PubMed

    Reifman, Jaques; Kumar, Kamal; Wesensten, Nancy J; Tountas, Nikolaos A; Balkin, Thomas J; Ramakrishnan, Sridhar

    2016-12-01

    Computational tools that predict the effects of daily sleep/wake amounts on neurobehavioral performance are critical components of fatigue management systems, allowing for the identification of periods during which individuals are at increased risk for performance errors. However, none of the existing computational tools is publicly available, and the commercially available tools do not account for the beneficial effects of caffeine on performance, limiting their practical utility. Here, we introduce 2B-Alert Web, an open-access tool for predicting neurobehavioral performance, which accounts for the effects of sleep/wake schedules, time of day, and caffeine consumption, while incorporating the latest scientific findings in sleep restriction, sleep extension, and recovery sleep. We combined our validated Unified Model of Performance and our validated caffeine model to form a single, integrated modeling framework instantiated as a Web-enabled tool. 2B-Alert Web allows users to input daily sleep/wake schedules and caffeine consumption (dosage and time) to obtain group-average predictions of neurobehavioral performance based on psychomotor vigilance tasks. 2B-Alert Web is accessible at: https://2b-alert-web.bhsai.org. The 2B-Alert Web tool allows users to obtain predictions for mean response time, mean reciprocal response time, and number of lapses. The graphing tool allows for simultaneous display of up to seven different sleep/wake and caffeine schedules. The schedules and corresponding predicted outputs can be saved as a Microsoft Excel file; the corresponding plots can be saved as an image file. The schedules and predictions are erased when the user logs off, thereby maintaining privacy and confidentiality. The publicly accessible 2B-Alert Web tool is available for operators, schedulers, and neurobehavioral scientists as well as the general public to determine the impact of any given sleep/wake schedule, caffeine consumption, and time of day on performance of a group of individuals. This evidence-based tool can be used as a decision aid to design effective work schedules, guide the design of future sleep restriction and caffeine studies, and increase public awareness of the effects of sleep amounts, time of day, and caffeine on alertness. © 2016 Associated Professional Sleep Societies, LLC.

  5. Scholarly Electronic Full-Text Publications via the Internet: Issues and Impacts

    NASA Technical Reports Server (NTRS)

    Kosmin, Linda J.

    1999-01-01

    On-line access to complete texts of scholarly journal articles, conference papers, and books is facilitated by rapidly developing World-wide Web Internet access and capabilities. Meanwhile, print publications continue to be produced and read in spite of the proliferation of many networked electronic publications. The purpose of this presentation is to highlight fundamental issues impacting stakeholder groups, as the trend continues towards migration from paper to affordable ubiquitous networked full-text publications. Librarians, publishers, authors and end-users have various viewpoints, interests, and concerns. There are many issues challenging all stakeholder groups. For instance, all share concerns about administering copyright compliance and enforcing fair use. Uncontrollable electronic downstreaming could result in infringed copyright, while limiting a publisher's entitled revenue stream. Moreover, metered fee-based access may hamper scholarly information research. And, self-authoring on the Internet without peer filtering could lead to information clutter. Many related issues challenge librarians in particular. Among these are rising journal subscription prices, regardless if offered in print or electronic. Some electronic offerings are independent of print, others supplement or duplicate print; several publishers presently require subscribing to print in order to access electronic. Furthermore, numbers of publications are n'ow being marketed via the Internet directly to end-users, which can be viewed as encouraging users to bypass the traditional library. A key issue challenging publishers today is the rapidly expanding electronic user base that is demanding delivery of added-value full-text to desktop computers. Also of growing concern appears to be the decline in print sales to libraries, thereby reducing traditional revenue stream potential. Nowadays, publishers are more hesitant about investing in the production of publications geared toward small niche subjects, since these tend to require higher pricing and carry limited sales potential. Both electronic and print publications necessitate similar editorial, production, operating, and marketing dollars. Tradeoffs owing to delivery format difference do not necessarily mean less dollars need to be spent. Authors wishing to publish books are facing a decline in the role of scholarly monographs in electronic media. However, they are witnessing increased roles of electronic preprints and electronic journal articles. Moreover, the Internet fosters self-publishing without peer monitoring or formal review. Issues challenging end-users include electronic barriers to peer-reviewed formal published works (i.e., fee-based subscriptions to journal literature vs. traditional free-library concept). This often means password only access or IP address controlled site-licensed access. Also, in an uncontrolled Internet environment, sometimes there is a blurring of publication authorship/ownership, as various pieces of publications are cut/pasted into/re-posted on various, disconnected Web searchable home pages.

  6. EFTofPNG: a package for high precision computation with the effective field theory of post-Newtonian gravity

    NASA Astrophysics Data System (ADS)

    Levi, Michele; Steinhoff, Jan

    2017-12-01

    We present a novel public package ‘EFTofPNG’ for high precision computation in the effective field theory of post-Newtonian (PN) gravity, including spins. We created this package in view of the timely need to publicly share automated computation tools, which integrate the various types of physics manifested in the expected increasing influx of gravitational wave (GW) data. Hence, we created a free and open source package, which is self-contained, modular, all-inclusive, and accessible to the classical gravity community. The ‘EFTofPNG’ Mathematica package also uses the power of the ‘xTensor’ package, suited for complicated tensor computation, where our coding also strategically approaches the generic generation of Feynman contractions, which is universal to all perturbation theories in physics, by efficiently treating n-point functions as tensors of rank n. The package currently contains four independent units, which serve as subsidiaries to the main one. Its final unit serves as a pipeline chain for the obtainment of the final GW templates, and provides the full computation of derivatives and physical observables of interest. The upcoming ‘EFTofPNG’ package version 1.0 should cover the point mass sector, and all the spin sectors, up to the fourth PN order, and the two-loop level. We expect and strongly encourage public development of the package to improve its efficiency, and to extend it to further PN sectors, and observables useful for the waveform modelling.

  7. Information needs and seeking behaviour among health professionals working at public hospital and health centres in Bahir Dar, Ethiopia.

    PubMed

    Andualem, Mulusew; Kebede, Gashaw; Kumie, Abera

    2013-12-27

    Universal access to information for health professionals is a need to achieve "health for all strategy." A large proportion of the population including health professionals have limited access to health information in resource limited countries. The aim of this study is to assess information needs among Ethiopian health professionals. A cross sectional quantitative study design complemented with qualitative method was conducted among 350 health care workers in February 26-June 5/2012. Pretested self-administered questionnaire and observation checklist were used to collect data on different variables. Data entry and data analysis were done using Epi-Info version 3.5.1 and by SPSS version19, respectively. Descriptive statistics and multivariate regression analyses were applied to describe study objectives and identify the determinants of information seeking behaviours respectively. Odds ratio with 95% CI was used to assess the association between a factor and an outcome variable. The majority of the respondents acknowledged the need of health information to their routine activities. About 54.0% of respondents lacked access to health information. Only 42.8% of respondents have access to internet sources. Important barriers to access information were geographical, organizational, personal, economic, educational status and time. About 58.0% of the respondents accessed information by referring their hard copies and asking senior staff. Age, sex, income, computer literacy and access, patient size, work experience and working site were significantly associated with information needs and seeking behaviour. The health information seeking behaviour of health professional was significant. The health facilities had neither information center such as library, nor Internet facilities. Conducting training on managing health information, accessing computer and improving infrastructures are important interventions to facilitate evidence based decisions.

  8. Mining User spatiotemporal Behavior in Geospatial Cyberinfrastructure --using GEOSS Clearinghouse as an example

    NASA Astrophysics Data System (ADS)

    XIA, J.; Yang, C.; Liu, K.; Huang, Q.; Li, Z.

    2013-12-01

    Big Data becomes increasingly important in almost all scientific domains, especially in geoscience where hundreds to millions of sensors are collecting data of the Earth continuously (Whitehouse News 2012). With the explosive growth of data, various Geospatial Cyberinfrastructure (GCI) (Yang et al. 2010) components are developed to manage geospatial resources and provide data access for the public. These GCIs are accessed by different users intensively on a daily basis. However, little research has been done to analyze the spatiotemporal patterns of user behavior, which could be critical to the management of Big Data and the operation of GCIs (Yang et al. 2011). For example, the spatiotemporal distribution of end users helps us better arrange and locate GCI computing facilities. A better indexing and caching mechanism could be developed based on the spatiotemporal pattern of user queries. In this paper, we use GEOSS Clearinghouse as an example to investigate spatiotemporal patterns of user behavior in GCIs. The investigation results show that user behaviors are heterogeneous but with patterns across space and time. Identified patterns include (1) the high access frequency regions; (2) local interests; (3) periodical accesses and rush hours; (4) spiking access. Based on identified patterns, this presentation reports several solutions to better support the operation of the GEOSS Clearinghouse and other GCIs. Keywords: Big Data, EarthCube, CyberGIS, Spatiotemporal Thinking and Computing, Data Mining, User Behavior Reference: Fayyad, U. M., Piatetsky-Shapiro, G., Smyth, P., & Uthurusamy, R. 1996. Advances in knowledge discovery and data mining. Whitehouse. 2012. Obama administration unveils 'BIG DATA' initiative: announces $200 million in new R&D investments. Whitehouse. Retrieved from http://www.whitehouse.gov/sites/default/files/microsites/ostp/big_data_press_release_final_2.pdf [Accessed 14 June 2013] Yang, C., Wu, H., Huang, Q., Li, Z., & Li, J. 2011. Using spatial principles to optimize distributed computing for enabling the physical science discoveries. Proceedings of the National Academy of Sciences, 108(14), 5498-5503. doi:10.1073/pnas.0909315108 Yang, C., Raskin, R., Goodchild, M., & Gahegan, M. 2010. Geospatial Cyberinfrastructure: Past, present and future. Computers, Environment and Urban Systems, 34(4), 264-277. doi:10.1016/j.compenvurbsys.2010.04.001

  9. Experimental comparison of two quantum computing architectures.

    PubMed

    Linke, Norbert M; Maslov, Dmitri; Roetteler, Martin; Debnath, Shantanu; Figgatt, Caroline; Landsman, Kevin A; Wright, Kenneth; Monroe, Christopher

    2017-03-28

    We run a selection of algorithms on two state-of-the-art 5-qubit quantum computers that are based on different technology platforms. One is a publicly accessible superconducting transmon device (www. ibm.com/ibm-q) with limited connectivity, and the other is a fully connected trapped-ion system. Even though the two systems have different native quantum interactions, both can be programed in a way that is blind to the underlying hardware, thus allowing a comparison of identical quantum algorithms between different physical systems. We show that quantum algorithms and circuits that use more connectivity clearly benefit from a better-connected system of qubits. Although the quantum systems here are not yet large enough to eclipse classical computers, this experiment exposes critical factors of scaling quantum computers, such as qubit connectivity and gate expressivity. In addition, the results suggest that codesigning particular quantum applications with the hardware itself will be paramount in successfully using quantum computers in the future.

  10. Virtual Labs (Science Gateways) as platforms for Free and Open Source Science

    NASA Astrophysics Data System (ADS)

    Lescinsky, David; Car, Nicholas; Fraser, Ryan; Friedrich, Carsten; Kemp, Carina; Squire, Geoffrey

    2016-04-01

    The Free and Open Source Software (FOSS) movement promotes community engagement in software development, as well as provides access to a range of sophisticated technologies that would be prohibitively expensive if obtained commercially. However, as geoinformatics and eResearch tools and services become more dispersed, it becomes more complicated to identify and interface between the many required components. Virtual Laboratories (VLs, also known as Science Gateways) simplify the management and coordination of these components by providing a platform linking many, if not all, of the steps in particular scientific processes. These enable scientists to focus on their science, rather than the underlying supporting technologies. We describe a modular, open source, VL infrastructure that can be reconfigured to create VLs for a wide range of disciplines. Development of this infrastructure has been led by CSIRO in collaboration with Geoscience Australia and the National Computational Infrastructure (NCI) with support from the National eResearch Collaboration Tools and Resources (NeCTAR) and the Australian National Data Service (ANDS). Initially, the infrastructure was developed to support the Virtual Geophysical Laboratory (VGL), and has subsequently been repurposed to create the Virtual Hazards Impact and Risk Laboratory (VHIRL) and the reconfigured Australian National Virtual Geophysics Laboratory (ANVGL). During each step of development, new capabilities and services have been added and/or enhanced. We plan on continuing to follow this model using a shared, community code base. The VL platform facilitates transparent and reproducible science by providing access to both the data and methodologies used during scientific investigations. This is further enhanced by the ability to set up and run investigations using computational resources accessed through the VL. Data is accessed using registries pointing to catalogues within public data repositories (notably including the NCI National Environmental Research Data Interoperability Platform), or by uploading data directly from user supplied addresses or files. Similarly, scientific software is accessed through registries pointing to software repositories (e.g., GitHub). Runs are configured by using or modifying default templates designed by subject matter experts. After the appropriate computational resources are identified by the user, Virtual Machines (VMs) are spun up and jobs are submitted to service providers (currently the NeCTAR public cloud or Amazon Web Services). Following completion of the jobs the results can be reviewed and downloaded if desired. By providing a unified platform for science, the VL infrastructure enables sophisticated provenance capture and management. The source of input data (including both collection and queries), user information, software information (version and configuration details) and output information are all captured and managed as a VL resource which can be linked to output data sets. This provenance resource provides a mechanism for publication and citation for Free and Open Source Science.

  11. Joint Forces Command - Operation United Assistance Case Study: Lessons and Best Practices

    DTIC Science & Technology

    2016-07-01

    additional and prioritized computers and access in the operations center for these mission requirements are essential. 127 JFC-OUA CASE STUDY Issue...this publication is welcomed and highly encouraged. Joint Forces Command – Operation United Assistance Case Study JFC-OUA CASE STUDY iii Foreword...Based on information drawn from various sources including after action reports, lessons learned, case studies , umbrella-week visits, and key-leader

  12. Application of Optical Disc Databases and Related Technology to Public Access Settings

    DTIC Science & Technology

    1992-03-01

    users to download and retain data. A Video Graphics Adapter (VGA) monitor was included. No printer was provided. 2. CD-ROM Product Computer Select, a...download facilities, without printer support, satisfy user needs? 38 A secondary, but significant, objective was avoidance of unnecessary Reader...design of User Log sheets and mitigated against attachment of a printer to the workstation. F. DATA COLLECTION This section describes the methodology

  13. Household computer and Internet access: The digital divide in a pediatric clinic population

    PubMed Central

    Carroll, Aaron E.; Rivara, Frederick P.; Ebel, Beth; Zimmerman, Frederick J.; Christakis, Dimitri A.

    2005-01-01

    Past studies have noted a digital divide, or inequality in computer and Internet access related to socioeconomic class. This study sought to measure how many households in a pediatric primary care outpatient clinic had household access to computers and the Internet, and whether this access differed by socio-economic status or other demographic information. We conducted a phone survey of a population-based sample of parents with children ages 0 to 11 years old. Analyses assessed predictors of having home access to a computer, the Internet, and high-speed Internet service. Overall, 88.9% of all households owned a personal computer, and 81.4% of all households had Internet access. Among households with Internet access, 48.3% had high speed Internet at home. There were statistically significant associations between parental income or education and home computer ownership and Internet access. However, the impact of this difference was lessened by the fact that over 60% of families with annual household income of $10,000–$25,000, and nearly 70% of families with only a high-school education had Internet access at home. While income and education remain significant predictors of household computer and internet access, many patients and families at all economic levels have access, and might benefit from health promotion interventions using these modalities. PMID:16779012

  14. Elementary School Computer Access, Socioeconomic Status, Ethnicity, and Grade 5 Student Achievement

    ERIC Educational Resources Information Center

    Barrett, Julie Ann

    2013-01-01

    Purpose: The purpose of this study was to describe the current school computer access rates of elementary school students and to determine the extent to which school computer access relates to academic achievement among Grade 5 students in the state of Texas. Specifically, the relationship of school computer access to student passing rates on the…

  15. An exploration of the socio-economic profile of women and costs of receiving abortion services at public health facilities of Madhya Pradesh, India.

    PubMed

    Banerjee, Sushanta K; Kumar, Rakesh; Warvadekar, Janardan; Manning, Vinoj; Andersen, Kathryn Louise

    2017-03-21

    Maternal mortality, which primarily burdens developing countries, reflects the greatest health divide between rich and poor. This is especially pronounced for access to safe abortion services which alone avert 1 of every 10 maternal deaths in India. Primarily due to confidentiality concerns, poor women in India prefer private services which are often offered by untrained providers and may be expensive. In 2006 the state government of Madhya Pradesh (population 73 million) began a concerted effort to ensure access to safe abortion services at public health facilities to both rural and urban poor women. This study aims to understand the socio-economic profile of women seeking abortion services in public health facilities across this state and out of pocket cost accessing abortion services. In particular, we examine the level of access that poor women have to safe abortion services in Madhya Pradesh. This study consisted of a cross-sectional client follow-up design. A total of 19 facilities were selected using two-stage random sampling and 1036 women presenting to chosen facilities with abortion and post-abortion complications were interviewed between May and December 2014. A structured data collection tool was developed. A composite wealth index computed using principal component analysis derived weights from consumer durables and asset holding and classified women into three categories, poor, moderate, and rich. Findings highlight that overall 57% of women who received abortion care at public health facilities were poor, followed by 21% moderate and 22% rich. More poor women sought care at primary level facilities (58%) than secondary level facilities and among women presenting for postabortion complications (67%) than induced abortion. Women reported spending no money to access abortion services as abortion services are free of cost at public facilities. However, poor women spend INR 64 (1 USD) while visiting primary level facilities and INR 256 (USD 4) while visiting urban hospitals, primarily for transportation and food. Improved availability of safe abortion services at the primary level in Madhya Pradesh has helped meeting the need of safe abortion services among poor, which eventually will help reducing the maternal mortality and morbidity due to unsafe abortion.

  16. Computational knowledge integration in biopharmaceutical research.

    PubMed

    Ficenec, David; Osborne, Mark; Pradines, Joel; Richards, Dan; Felciano, Ramon; Cho, Raymond J; Chen, Richard O; Liefeld, Ted; Owen, James; Ruttenberg, Alan; Reich, Christian; Horvath, Joseph; Clark, Tim

    2003-09-01

    An initiative to increase biopharmaceutical research productivity by capturing, sharing and computationally integrating proprietary scientific discoveries with public knowledge is described. This initiative involves both organisational process change and multiple interoperating software systems. The software components rely on mutually supporting integration techniques. These include a richly structured ontology, statistical analysis of experimental data against stored conclusions, natural language processing of public literature, secure document repositories with lightweight metadata, web services integration, enterprise web portals and relational databases. This approach has already begun to increase scientific productivity in our enterprise by creating an organisational memory (OM) of internal research findings, accessible on the web. Through bringing together these components it has also been possible to construct a very large and expanding repository of biological pathway information linked to this repository of findings which is extremely useful in analysis of DNA microarray data. This repository, in turn, enables our research paradigm to be shifted towards more comprehensive systems-based understandings of drug action.

  17. High Tech Programmers in Low-Income Communities: Creating a Computer Culture in a Community Technology Center

    NASA Astrophysics Data System (ADS)

    Kafai, Yasmin B.; Peppler, Kylie A.; Chiu, Grace M.

    For the last twenty years, issues of the digital divide have driven efforts around the world to address the lack of access to computers and the Internet, pertinent and language appropriate content, and technical skills in low-income communities (Schuler & Day, 2004a and b). The title of our paper makes reference to a milestone publication (Schon, Sanyal, & Mitchell, 1998) that showcased some of the early work and thinking in this area. Schon, Sanyal and Mitchell's book edition included an article outlining the Computer Clubhouse, a type of community technology center model, which was developed to create opportunities for youth in low-income communities to become creators and designers of technologies by (1998). The model has been very successful scaling up, with over 110 Computer Clubhouses now in existence worldwide.

  18. Self-reported use of internet by cervical cancer clients in two National Referral Hospitals in Kenya

    PubMed Central

    2012-01-01

    Background Cervical cancer remains a devastating disease in Kenya accounting for more than 2000 deaths each year. Lack of information on cervical cancer prevention and management has been attributed to the apathy among women in seeking health interventions. Use of internet-based and mobile e-health tools could increase information access among cervical cancer patients. The objective of the study was; to establish the extent of use of mobile phones and internet by cervical cancer patients in accessing information related to cancer treatment and management.; find out the characteristics of patients associated with internet use and identify barriers faced by the patients in internet use. A cross sectional descriptive survey of 199 cervical patients visiting the two main referral hospitals in Kenya was done. A structured questionnaire was used to collect data. Findings The average length of illness was 2.43 years (SD ± 3.0). Only 7.5 %( n=15) reported to having used the internet as a source of information. 92.5 %( n=184) did not use internet. With Multiple options, 70.9% did not know how to use a computer, 29.2% did not have access to a computer, 14.6% lacked the money to use computers at the local cyber cafe while other barriers identified accounted for 11.1%. Patients reported that the internet had an important role in the management of cancer of the cervix in health education (17.6%), online consultation (14.6%), booking of patients (13.6%), referrals (8.5%) and collecting data (7%). The 96.5% of the respondents who had access to a mobile phone, recommended mobile phones for health education messages (31.7%), reminder alerts for medication (29.7%) and booking appointments (21.6%). There was a statistically significant association between income of the patients and internet use (p = 0.026) in this study. Conclusions There is low level use of the internet by cervical cancer clients attended in Public referral facilities in Kenya. This was attributed to; lack of knowledge on how to use computers and lack of access to a computer. High level of access to mobile phones was reported. This is an indicator of great potential for use of mobile phones in the management of cervical cancer through short messaging services (sms), without internet connectivity. There is even greater potential to internet use through web access via mobile phones. PMID:23046538

  19. CTserver: A Computational Thermodynamics Server for the Geoscience Community

    NASA Astrophysics Data System (ADS)

    Kress, V. C.; Ghiorso, M. S.

    2006-12-01

    The CTserver platform is an Internet-based computational resource that provides on-demand services in Computational Thermodynamics (CT) to a diverse geoscience user base. This NSF-supported resource can be accessed at ctserver.ofm-research.org. The CTserver infrastructure leverages a high-quality and rigorously tested software library of routines for computing equilibrium phase assemblages and for evaluating internally consistent thermodynamic properties of materials, e.g. mineral solid solutions and a variety of geological fluids, including magmas. Thermodynamic models are currently available for 167 phases. Recent additions include Duan, Møller and Weare's model for supercritical C-O-H-S, extended to include SO2 and S2 species, and an entirely new associated solution model for O-S-Fe-Ni sulfide liquids. This software library is accessed via the CORBA Internet protocol for client-server communication. CORBA provides a standardized, object-oriented, language and platform independent, fast, low-bandwidth interface to phase property modules running on the server cluster. Network transport, language translation and resource allocation are handled by the CORBA interface. Users access server functionality in two principal ways. Clients written as browser- based Java applets may be downloaded which provide specific functionality such as retrieval of thermodynamic properties of phases, computation of phase equilibria for systems of specified composition, or modeling the evolution of these systems along some particular reaction path. This level of user interaction requires minimal programming effort and is ideal for classroom use. A more universal and flexible mode of CTserver access involves making remote procedure calls from user programs directly to the server public interface. The CTserver infrastructure relieves the user of the burden of implementing and testing the often complex thermodynamic models of real liquids and solids. A pilot application of this distributed architecture involves CFD computation of magma convection at Volcan Villarrica with magma properties and phase proportions calculated at each spatial node and at each time step via distributed function calls to MELTS-objects executing on the CTserver. Documentation and programming examples are provided at http://ctserver.ofm- research.org.

  20. 20 CFR 655.550 - Public access.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Activities in U.S. Ports Public Access § 655.550 Public access. (a) Public examination at ETA. ETA shall make... documentation it has received. (b) Notice to public. ETA periodically shall publish a list in the Federal...

  1. 10 CFR 727.5 - What acknowledgment and consent is required for access to information on DOE computers?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a DOE...

  2. 10 CFR 727.5 - What acknowledgment and consent is required for access to information on DOE computers?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a DOE...

  3. 10 CFR 727.5 - What acknowledgment and consent is required for access to information on DOE computers?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a DOE...

  4. 10 CFR 727.5 - What acknowledgment and consent is required for access to information on DOE computers?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a DOE...

  5. 10 CFR 727.5 - What acknowledgment and consent is required for access to information on DOE computers?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a DOE...

  6. Applying the technology acceptance model to explore public health nurses' intentions towards web-based learning: a cross-sectional questionnaire survey.

    PubMed

    Chen, I Ju; Yang, Kuei-Feng; Tang, Fu-In; Huang, Chun-Hsia; Yu, Shu

    2008-06-01

    In the era of the knowledge economy, public health nurses (PHNs) need to update their knowledge to ensure quality of care. In pre-implementation stage, policy makers and educators should understand PHNs' behavioural intentions (BI) toward web-based learning because it is the most important determinant of actual behaviour. To understand PHNs' BI toward web-based learning and further to identify the factors influencing PHNs' BI based on the technology acceptance model (TAM) in pre-implementation stage. A nationwide-based cross-sectional research design was used in this study. Three hundred and sixty-nine health centres in Taiwan. A randomly selected sample, 202 PHNs participated in this study. Data were collected by mailing in a questionnaire. The majority of PHNs (91.6%, n=185) showed an affirmative BI toward web-based learning. PHNs rated moderate values of perceived usefulness (U), perceived ease of use (EOU) and attitude toward web-based learning (A). Multiple regression analyses indicated that only U revealed a significantly direct influence on BI. U and EOU had significantly direct relationships with A; however, no significant relationship existed between A and BI. Additionally, EOU and an individual's computer competence revealed significant relationships with U; Internet access at the workplace revealed a significant relationship with EOU. In the pre-implementation stage, PHNs perceived a high likelihood of adopting web-based learning as their way of continuing education. In pre-implementation stage, perceived usefulness is the most important factor for BI instead of the attitude. Perceived EOU, an individual's computer competency, and Internet access at workplaces revealed indirect effects on BI. Therefore, increasing U, EOU, computer competence, and Internet access at workplace will be helpful in increasing PHNs' BI. Moreover, we suggest that future studies should focus on clarifying problems in different stages of implementation to build a more complete understanding of implementing web-based learning.

  7. Use of cell phones and computers for health promotion and tobacco cessation by American Indian college students in Montana.

    PubMed

    Dotson, Jo Ann W; Nelson, Lonnie A; Young, Sara L; Buchwald, Dedra; Roll, John

    2017-01-01

    Cell phones and personal computers have become popular mechanisms for delivering and monitoring health information and education, including the delivery of tobacco cessation education and support. Tobacco smoking is prevalent among American Indians (AIs) and Alaska Natives (ANs), with 26% AI/AN adult men smoking compared to 19% of Caucasian adult males and 22% of African American adult males. Smoking is even more prevalent in Northern Plains AI populations, with 42% of men and women reporting current smoking. The literature on the availability and use of cell phones and computers, or the acceptability of use in health promotion among AIs and ANs, is scant. The authors report findings from a survey of AI students regarding their cell phone and computer access and use. The survey was conducted to inform the development and implementation of a text messaging smoking cessation intervention modeled on a program developed and used in Australia. A 22-item paper and pencil survey was administered to students at tribal colleges in rural Montana. The survey questions included cell phone ownership and access to service, use of cell phones and computers for health information, demographics, tobacco use habits, and interest in an intervention study. The study was reviewed and determined exempt by the institutional review boards at the tribal colleges and the lead research university. The study was conducted by researchers at the tribal colleges. Survey respondents received $10 when the survey was completed and returned. Data analysis was performed with the Statistical Package for the Social Sciences. Among 153 AI respondents, the mean age was 29 years, range was 18-64 years. Overall, 40% reported smoking cigarettes with a mean age of 16 years at initiation. A total of 131 participants (86%) had cell phones and, of those, 122 (93%) had unlimited text messaging. A total of 104 (68%) had smart phones (with internet access), although 40% of those with smart phones reported that internet access on their phone was very slow or location limited. A total of 146 (95%) participants reported having access to a computer, although 32% of those did not have daily access. Students aged less than 23 years were more likely to have cell phones with internet access. Cell phone ownership differed by site (93% vs 77%, p=0.007). About 60% of the respondents who smoked indicated interest in participating in the intervention study. This study revealed that AI tribal college students in the rural communities surveyed had less cell phone, smart phone, and computer and internet access than that reported for undergraduate college students elsewhere in the USA. Research efforts and public health interventions must be culturally appropriate and technologically viable, therefore access to and acceptability of mobile technology must be evaluated when planning and implementing interventions for rural and other marginalized populations. The findings from this study contribute to the literature regarding the access to and acceptability of mobile technology for health promotion among AI/AN college students in rural and remote areas, and helped introduce the proposed study to the community and solicited useful data regarding tobacco prevalence and interest in tobacco research in the target population.

  8. Interoperable PKI Data Distribution in Computational Grids

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pala, Massimiliano; Cholia, Shreyas; Rea, Scott A.

    One of the most successful working examples of virtual organizations, computational grids need authentication mechanisms that inter-operate across domain boundaries. Public Key Infrastructures(PKIs) provide sufficient flexibility to allow resource managers to securely grant access to their systems in such distributed environments. However, as PKIs grow and services are added to enhance both security and usability, users and applications must struggle to discover available resources-particularly when the Certification Authority (CA) is alien to the relying party. This article presents how to overcome these limitations of the current grid authentication model by integrating the PKI Resource Query Protocol (PRQP) into the Gridmore » Security Infrastructure (GSI).« less

  9. Field of genes: using Apache Kafka as a bioinformatic data repository.

    PubMed

    Lawlor, Brendan; Lynch, Richard; Mac Aogáin, Micheál; Walsh, Paul

    2018-04-01

    Bioinformatic research is increasingly dependent on large-scale datasets, accessed either from private or public repositories. An example of a public repository is National Center for Biotechnology Information's (NCBI's) Reference Sequence (RefSeq). These repositories must decide in what form to make their data available. Unstructured data can be put to almost any use but are limited in how access to them can be scaled. Highly structured data offer improved performance for specific algorithms but limit the wider usefulness of the data. We present an alternative: lightly structured data stored in Apache Kafka in a way that is amenable to parallel access and streamed processing, including subsequent transformations into more highly structured representations. We contend that this approach could provide a flexible and powerful nexus of bioinformatic data, bridging the gap between low structure on one hand, and high performance and scale on the other. To demonstrate this, we present a proof-of-concept version of NCBI's RefSeq database using this technology. We measure the performance and scalability characteristics of this alternative with respect to flat files. The proof of concept scales almost linearly as more compute nodes are added, outperforming the standard approach using files. Apache Kafka merits consideration as a fast and more scalable but general-purpose way to store and retrieve bioinformatic data, for public, centralized reference datasets such as RefSeq and for private clinical and experimental data.

  10. The NatCarb geoportal: Linking distributed data from the Carbon Sequestration Regional Partnerships

    USGS Publications Warehouse

    Carr, T.R.; Rich, P.M.; Bartley, J.D.

    2007-01-01

    The Department of Energy (DOE) Carbon Sequestration Regional Partnerships are generating the data for a "carbon atlas" of key geospatial data (carbon sources, potential sinks, etc.) required for rapid implementation of carbon sequestration on a broad scale. The NATional CARBon Sequestration Database and Geographic Information System (NatCarb) provides Web-based, nation-wide data access. Distributed computing solutions link partnerships and other publicly accessible repositories of geological, geophysical, natural resource, infrastructure, and environmental data. Data are maintained and enhanced locally, but assembled and accessed through a single geoportal. NatCarb, as a first attempt at a national carbon cyberinfrastructure (NCCI), assembles the data required to address technical and policy challenges of carbon capture and storage. We present a path forward to design and implement a comprehensive and successful NCCI. ?? 2007 The Haworth Press, Inc. All rights reserved.

  11. Overcoming Spatial and Temporal Barriers to Public Access Defibrillators Via Optimization

    PubMed Central

    Sun, Christopher L. F.; Demirtas, Derya; Brooks, Steven C.; Morrison, Laurie J.; Chan, Timothy C.Y.

    2016-01-01

    BACKGROUND Immediate access to an automated external defibrillator (AED) increases the chance of survival from out-of-hospital cardiac arrest (OHCA). Current deployment usually considers spatial AED access, assuming AEDs are available 24 h a day. OBJECTIVES We sought to develop an optimization model for AED deployment, accounting for spatial and temporal accessibility, to evaluate if OHCA coverage would improve compared to deployment based on spatial accessibility alone. METHODS This was a retrospective population-based cohort study using data from the Toronto Regional RescuNET cardiac arrest database. We identified all nontraumatic public-location OHCAs in Toronto, Canada (January 2006 through August 2014) and obtained a list of registered AEDs (March 2015) from Toronto emergency medical services. We quantified coverage loss due to limited temporal access by comparing the number of OHCAs that occurred within 100 meters of a registered AED (assumed 24/7 coverage) with the number that occurred both within 100 meters of a registered AED and when the AED was available (actual coverage). We then developed a spatiotemporal optimization model that determined AED locations to maximize OHCA actual coverage and overcome the reported coverage loss. We computed the coverage gain between the spatiotemporal model and a spatial-only model using 10-fold cross-validation. RESULTS We identified 2,440 atraumatic public OHCAs and 737 registered AED locations. A total of 451 OHCAs were covered by registered AEDs under assumed 24/7 coverage, and 354 OHCAs under actual coverage, representing a coverage loss of 21.5% (p < 0.001). Using the spatiotemporal model to optimize AED deployment, a 25.3% relative increase in actual coverage was achieved over the spatial-only approach (p < 0.001). CONCLUSIONS One in 5 OHCAs occurred near an inaccessible AED at the time of the OHCA. Potential AED use was significantly improved with a spatiotemporal optimization model guiding deployment. PMID:27539176

  12. A Community Publication and Dissemination System for Hydrology Education Materials

    NASA Astrophysics Data System (ADS)

    Ruddell, B. L.

    2015-12-01

    Hosted by CUAHSI and the Science Education Resource Center (SERC), federated by the National Science Digital Library (NSDL), and allied with the Water Data Center (WDC), Hydrologic Information System (HIS), and HydroShare projects, a simple cyberinfrastructure has been launched for the publication and dissemination of data and model driven university hydrology education materials. This lightweight system's metadata describes learning content as a data-driven module with defined data inputs and outputs. This structure allows a user to mix and match modules to create sequences of content that teach both hydrology and computer learning outcomes. Importantly, this modular infrastructure allows an instructor to substitute a module based on updated computer methods for one based on outdated computer methods, hopefully solving the problem of rapid obsolescence that has hampered previous community efforts. The prototype system is now available from CUAHSI and SERC, with some example content. The system is designed to catalog, link to, make visible, and make accessible the existing and future contributions of the community; this system does not create content. Submissions from hydrology educators are eagerly solicited, especially for existing content.

  13. 7 CFR 1739.3 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... terrestrial technology having the capacity to provide transmission facilities that enable subscribers of the...) Computer Access Points and wireless access, that is used for the purposes of providing free access to and..., and after normal working hours and on Saturdays or Sunday. Computer Access Point means a new computer...

  14. Open Access: From Myth to Paradox

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ginsparg, Paul

    2009-05-06

    True open access to scientific publications not only gives readers the possibility to read articles without paying subscription, but also makes the material available for automated ingestion and harvesting by 3rd parties. Once articles and associated data become universally treatable as computable objects, openly available to 3rd party aggregators and value-added services, what new services can we expect, and how will they change the way that researchers interact with their scholarly communications infrastructure? I will discuss straightforward applications of existing ideas and services, including citation analysis, collaborative filtering, external database linkages, interoperability, and other forms of automated markup, and speculatemore » on the sociology of the next generation of users.« less

  15. Evidence-based Patient Choice and Consumer health informatics in the Internet age

    PubMed Central

    2001-01-01

    In this paper we explore current access to and barriers to health information for consumers. We discuss how computers and other developments in information technology are ushering in the era of consumer health informatics , and the potential that lies ahead. It is clear that we witness a period in which the public will have unprecedented ability to access information and to participate actively in evidence-based health care. We propose that consumer health informatics be regarded as a whole new academic discipline, one that should be devoted to the exploration of the new possibilities that informatics is creating for consumers in relation to health and health care issues. PMID:11720961

  16. Comprehensive security framework for the communication and storage of medical images

    NASA Astrophysics Data System (ADS)

    Slik, David; Montour, Mike; Altman, Tym

    2003-05-01

    Confidentiality, integrity verification and access control of medical imagery and associated metadata is critical for the successful deployment of integrated healthcare networks that extend beyond the department level. As medical imagery continues to become widely accessed across multiple administrative domains and geographically distributed locations, image data should be able to travel and be stored on untrusted infrastructure, including public networks and server equipment operated by external entities. Given these challenges associated with protecting large-scale distributed networks, measures must be taken to protect patient identifiable information while guarding against tampering, denial of service attacks, and providing robust audit mechanisms. The proposed framework outlines a series of security practices for the protection of medical images, incorporating Transport Layer Security (TLS), public and secret key cryptography, certificate management and a token based trusted computing base. It outlines measures that can be utilized to protect information stored within databases, online and nearline storage, and during transport over trusted and untrusted networks. In addition, it provides a framework for ensuring end-to-end integrity of image data from acquisition to viewing, and presents a potential solution to the challenges associated with access control across multiple administrative domains and institution user bases.

  17. Individual Public Transportation Accessibility is Positively Associated with Self-Reported Active Commuting.

    PubMed

    Djurhuus, Sune; Hansen, Henning Sten; Aadahl, Mette; Glümer, Charlotte

    2014-01-01

    Active commuters have lower risk of chronic disease. Understanding which of the, to some extent, modifiable characteristics of public transportation that facilitate its use is thus important in a public health perspective. The aim of the study was to examine the association between individual public transportation accessibility and self-reported active commuting, and whether the associations varied with commute distance, age, and gender. Twenty-eight thousand nine hundred twenty-eight commuters in The Capital Region of Denmark reported self-reported time spent either walking or cycling to work or study each day and the distance to work or study. Data were obtained from the Danish National Health Survey collected in February to April 2010. Individual accessibility by public transportation was calculated using a multi-modal network in a GIS. Multilevel logistic regression was used to analyze the association between accessibility, expressed as access area, and being an active commuter. Public transport accessibility area based on all stops within walking and cycling distance was positively associated with being an active commuter. Distance to work, age, and gender modified the associations. Residing within 10 km commute distance and in areas of high accessibility was associated with being an active commuter and meeting the recommendations of physical activity. For the respondents above 29 years, individual public transportation accessibility was positively associated with being an active commuter. Women having high accessibility had significantly higher odds of being an active commuter compared to having a low accessibility. For men, the associations were insignificant. This study extends the knowledge about the driving forces of using public transportation for commuting by examining the individual public transportation accessibility. Findings suggest that transportation accessibility supports active commuting and planning of improved public transit accessibility has thus a potential of providing health benefits to commuters.

  18. A service-oriented data access control model

    NASA Astrophysics Data System (ADS)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  19. Distance learning--an educational tool for developing countries.

    PubMed

    Dobson, M B

    2000-01-01

    Many anaesthetists in small hospitals and developing countries have poor access to educational materials. The use of electronic means of publication and distribution, combined with the concepts of distance learning, can lead to better levels of knowledge and clinical practice. A project based on these principles has been set up in Zimbabwe, and is proving helpful to both trainers and trainees. All District Hospitals have been visited, and trainees in them identified. A survey has been completed to identify the subject areas in which training is most necessary. Trainees have been provided with reference materials on CD-ROM which they can access by computer (each hospital has a computer). Specialist anaesthesiologists in the country are producing interactive tutorials which can be sent out by e-mail to every hospital, and these are backed up by a programme of regular visits, seminars and clinical teaching. The programme is proving helpful to both trainees and tutors, and has the potential to be used in the future in other developing countries.

  20. KiMoSys: a web-based repository of experimental data for KInetic MOdels of biological SYStems

    PubMed Central

    2014-01-01

    Background The kinetic modeling of biological systems is mainly composed of three steps that proceed iteratively: model building, simulation and analysis. In the first step, it is usually required to set initial metabolite concentrations, and to assign kinetic rate laws, along with estimating parameter values using kinetic data through optimization when these are not known. Although the rapid development of high-throughput methods has generated much omics data, experimentalists present only a summary of obtained results for publication, the experimental data files are not usually submitted to any public repository, or simply not available at all. In order to automatize as much as possible the steps of building kinetic models, there is a growing requirement in the systems biology community for easily exchanging data in combination with models, which represents the main motivation of KiMoSys development. Description KiMoSys is a user-friendly platform that includes a public data repository of published experimental data, containing concentration data of metabolites and enzymes and flux data. It was designed to ensure data management, storage and sharing for a wider systems biology community. This community repository offers a web-based interface and upload facility to turn available data into publicly accessible, centralized and structured-format data files. Moreover, it compiles and integrates available kinetic models associated with the data. KiMoSys also integrates some tools to facilitate the kinetic model construction process of large-scale metabolic networks, especially when the systems biologists perform computational research. Conclusions KiMoSys is a web-based system that integrates a public data and associated model(s) repository with computational tools, providing the systems biology community with a novel application facilitating data storage and sharing, thus supporting construction of ODE-based kinetic models and collaborative research projects. The web application implemented using Ruby on Rails framework is freely available for web access at http://kimosys.org, along with its full documentation. PMID:25115331

  1. Towards an Approach of Semantic Access Control for Cloud Computing

    NASA Astrophysics Data System (ADS)

    Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai

    With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.

  2. The Geoscience Paper of the Future: Best Practices for Documenting and Sharing Research from Data to Software to Provenance

    NASA Astrophysics Data System (ADS)

    Gil, Y.; Yu, X.; David, C. H.; Demir, I.; Essawy, B.; Fulweiler, R. W.; Goodall, J. L.; Karlstrom, L.; Lee, H.; Mills, H. J.; Pierce, S. A.; Pope, A.; Tzeng, M.; Villamizar, S. R.

    2016-12-01

    Geoscientists live in a world rich with digital data and methods, and their computational research cannot be fully captured in traditional publications. The Geoscience Paper of the Future (GPF) proposes best practices for GPF authors to make data, software, and methods openly accessible, citable, and well documented. Those best practices come from recommendations by both scholars and organizations concerning open science, reproducible publications, and digital scholarship. The publication of digital objects empowers scientists to manage their research products as valuable scientific assets in an open and transparent way that enables broader access by other scientists, students, decision makers, and the public. Improving documentation and dissemination of research will accelerate the pace of scientific discovery by improving the ability of others to build upon published work. This presentation summarizes these best practices, as well as the practical experiences of several GPF authors in different geosciences disciplines. It will also discuss existing challenges for authors and publishers to produce GPFs in practice, and the opportunities to develop new approaches and infrastructure to implement those best practices. The adoption of GPF recommendations requires awareness and social change in the scientific community, including clear communication of the benefits and best practices that may be new to geoscientists.

  3. PKI-based secure mobile access to electronic health services and data.

    PubMed

    Kambourakis, G; Maglogiannis, I; Rouskas, A

    2005-01-01

    Recent research works examine the potential employment of public-key cryptography schemes in e-health environments. In such systems, where a Public Key Infrastructure (PKI) is established beforehand, Attribute Certificates (ACs) and public key enabled protocols like TLS, can provide the appropriate mechanisms to effectively support authentication, authorization and confidentiality services. In other words, mutual trust and secure communications between all the stakeholders, namely physicians, patients and e-health service providers, can be successfully established and maintained. Furthermore, as the recently introduced mobile devices with access to computer-based patient record systems are expanding, the need of physicians and nurses to interact increasingly with such systems arises. Considering public key infrastructure requirements for mobile online health networks, this paper discusses the potential use of Attribute Certificates (ACs) in an anticipated trust model. Typical trust interactions among doctors, patients and e-health providers are presented, indicating that resourceful security mechanisms and trust control can be obtained and implemented. The application of attribute certificates to support medical mobile service provision along with the utilization of the de-facto TLS protocol to offer competent confidentiality and authorization services is also presented and evaluated through experimentation, using both the 802.11 WLAN and General Packet Radio Service (GPRS) networks.

  4. OS2: Oblivious similarity based searching for encrypted data outsourced to an untrusted domain

    PubMed Central

    Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Ramzan, Naeem

    2017-01-01

    Public cloud storage services are becoming prevalent and myriad data sharing, archiving and collaborative services have emerged which harness the pay-as-you-go business model of public cloud. To ensure privacy and confidentiality often encrypted data is outsourced to such services, which further complicates the process of accessing relevant data by using search queries. Search over encrypted data schemes solve this problem by exploiting cryptographic primitives and secure indexing to identify outsourced data that satisfy the search criteria. Almost all of these schemes rely on exact matching between the encrypted data and search criteria. A few schemes which extend the notion of exact matching to similarity based search, lack realism as those schemes rely on trusted third parties or due to increase storage and computational complexity. In this paper we propose Oblivious Similarity based Search (OS2) for encrypted data. It enables authorized users to model their own encrypted search queries which are resilient to typographical errors. Unlike conventional methodologies, OS2 ranks the search results by using similarity measure offering a better search experience than exact matching. It utilizes encrypted bloom filter and probabilistic homomorphic encryption to enable authorized users to access relevant data without revealing results of search query evaluation process to the untrusted cloud service provider. Encrypted bloom filter based search enables OS2 to reduce search space to potentially relevant encrypted data avoiding unnecessary computation on public cloud. The efficacy of OS2 is evaluated on Google App Engine for various bloom filter lengths on different cloud configurations. PMID:28692697

  5. [Formula: see text]: Oblivious similarity based searching for encrypted data outsourced to an untrusted domain.

    PubMed

    Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Ramzan, Naeem; Khan, Wajahat Ali

    2017-01-01

    Public cloud storage services are becoming prevalent and myriad data sharing, archiving and collaborative services have emerged which harness the pay-as-you-go business model of public cloud. To ensure privacy and confidentiality often encrypted data is outsourced to such services, which further complicates the process of accessing relevant data by using search queries. Search over encrypted data schemes solve this problem by exploiting cryptographic primitives and secure indexing to identify outsourced data that satisfy the search criteria. Almost all of these schemes rely on exact matching between the encrypted data and search criteria. A few schemes which extend the notion of exact matching to similarity based search, lack realism as those schemes rely on trusted third parties or due to increase storage and computational complexity. In this paper we propose Oblivious Similarity based Search ([Formula: see text]) for encrypted data. It enables authorized users to model their own encrypted search queries which are resilient to typographical errors. Unlike conventional methodologies, [Formula: see text] ranks the search results by using similarity measure offering a better search experience than exact matching. It utilizes encrypted bloom filter and probabilistic homomorphic encryption to enable authorized users to access relevant data without revealing results of search query evaluation process to the untrusted cloud service provider. Encrypted bloom filter based search enables [Formula: see text] to reduce search space to potentially relevant encrypted data avoiding unnecessary computation on public cloud. The efficacy of [Formula: see text] is evaluated on Google App Engine for various bloom filter lengths on different cloud configurations.

  6. The article of the future.

    PubMed

    Souza, Eliana Pereira Salles de; Cabrera, Eliana Márcia Sotello; Braile, Domingo Marcolino

    2010-01-01

    Technological advances and the Internet have contributed to the increased disclosure and updating of knowledge and science. Scientific papers are considered the best form of disclosure of information and have been undergoing many changes, not on their way of development, but on the structure of publication. The Future paper, a name for this new structure, uses hypermediatic resources, allowing a quick, easy and organized access to these items online. The exchange of information, comments and criticisms can be performed in real time, providing agility in science disclosure. The trend for the future of documents, both from professionals or enterprises, is the "cloud computing", in which all documents will be developed and updated with the use of various equipments: computer, palm, netbook, ipad, without need to have the software installed on your computer, requiring only an Internet connection.

  7. Ubiquitous Accessibility for People with Visual Impairments: Are We There Yet?

    PubMed

    Billah, Syed Masum; Ashok, Vikas; Porter, Donald E; Ramakrishnan, I V

    2017-05-01

    Ubiquitous access is an increasingly common vision of computing, wherein users can interact with any computing device or service from anywhere, at any time. In the era of personal computing, users with visual impairments required special-purpose, assistive technologies, such as screen readers, to interact with computers. This paper investigates whether technologies like screen readers have kept pace with, or have created a barrier to, the trend toward ubiquitous access, with a specific focus on desktop computing as this is still the primary way computers are used in education and employment. Towards that, the paper presents a user study with 21 visually-impaired participants, specifically involving the switching of screen readers within and across different computing platforms, and the use of screen readers in remote access scenarios. Among the findings, the study shows that, even for remote desktop access-an early forerunner of true ubiquitous access-screen readers are too limited, if not unusable. The study also identifies several accessibility needs, such as uniformity of navigational experience across devices, and recommends potential solutions. In summary, assistive technologies have not made the jump into the era of ubiquitous access, and multiple, inconsistent screen readers create new practical problems for users with visual impairments.

  8. Docker Container Manager: A Simple Toolkit for Isolated Work with Shared Computational, Storage, and Network Resources

    NASA Astrophysics Data System (ADS)

    Polyakov, S. P.; Kryukov, A. P.; Demichev, A. P.

    2018-01-01

    We present a simple set of command line interface tools called Docker Container Manager (DCM) that allow users to create and manage Docker containers with preconfigured SSH access while keeping the users isolated from each other and restricting their access to the Docker features that could potentially disrupt the work of the server. Users can access DCM server via SSH and are automatically redirected to DCM interface tool. From there, they can create new containers, stop, restart, pause, unpause, and remove containers and view the status of the existing containers. By default, the containers are also accessible via SSH using the same private key(s) but through different server ports. Additional publicly available ports can be mapped to the respective ports of a container, allowing for some network services to be run within it. The containers are started from read-only filesystem images. Some initial images must be provided by the DCM server administrators, and after containers are configured to meet one’s needs, the changes can be saved as new images. Users can see the available images and remove their own images. DCM server administrators are provided with commands to create and delete users. All commands were implemented as Python scripts. The tools allow to deploy and debug medium-sized distributed systems for simulation in different fields on one or several local computers.

  9. Simple re-instantiation of small databases using cloud computing.

    PubMed

    Tan, Tin Wee; Xie, Chao; De Silva, Mark; Lim, Kuan Siong; Patro, C Pawan K; Lim, Shen Jean; Govindarajan, Kunde Ramamoorthy; Tong, Joo Chuan; Choo, Khar Heng; Ranganathan, Shoba; Khan, Asif M

    2013-01-01

    Small bioinformatics databases, unlike institutionally funded large databases, are vulnerable to discontinuation and many reported in publications are no longer accessible. This leads to irreproducible scientific work and redundant effort, impeding the pace of scientific progress. We describe a Web-accessible system, available online at http://biodb100.apbionet.org, for archival and future on demand re-instantiation of small databases within minutes. Depositors can rebuild their databases by downloading a Linux live operating system (http://www.bioslax.com), preinstalled with bioinformatics and UNIX tools. The database and its dependencies can be compressed into an ".lzm" file for deposition. End-users can search for archived databases and activate them on dynamically re-instantiated BioSlax instances, run as virtual machines over the two popular full virtualization standard cloud-computing platforms, Xen Hypervisor or vSphere. The system is adaptable to increasing demand for disk storage or computational load and allows database developers to use the re-instantiated databases for integration and development of new databases. Herein, we demonstrate that a relatively inexpensive solution can be implemented for archival of bioinformatics databases and their rapid re-instantiation should the live databases disappear.

  10. Simple re-instantiation of small databases using cloud computing

    PubMed Central

    2013-01-01

    Background Small bioinformatics databases, unlike institutionally funded large databases, are vulnerable to discontinuation and many reported in publications are no longer accessible. This leads to irreproducible scientific work and redundant effort, impeding the pace of scientific progress. Results We describe a Web-accessible system, available online at http://biodb100.apbionet.org, for archival and future on demand re-instantiation of small databases within minutes. Depositors can rebuild their databases by downloading a Linux live operating system (http://www.bioslax.com), preinstalled with bioinformatics and UNIX tools. The database and its dependencies can be compressed into an ".lzm" file for deposition. End-users can search for archived databases and activate them on dynamically re-instantiated BioSlax instances, run as virtual machines over the two popular full virtualization standard cloud-computing platforms, Xen Hypervisor or vSphere. The system is adaptable to increasing demand for disk storage or computational load and allows database developers to use the re-instantiated databases for integration and development of new databases. Conclusions Herein, we demonstrate that a relatively inexpensive solution can be implemented for archival of bioinformatics databases and their rapid re-instantiation should the live databases disappear. PMID:24564380

  11. Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce.

    PubMed

    Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita

    2014-05-01

    Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme.

  12. NCBI GEO: mining millions of expression profiles--database and tools.

    PubMed

    Barrett, Tanya; Suzek, Tugba O; Troup, Dennis B; Wilhite, Stephen E; Ngau, Wing-Chi; Ledoux, Pierre; Rudnev, Dmitry; Lash, Alex E; Fujibuchi, Wataru; Edgar, Ron

    2005-01-01

    The Gene Expression Omnibus (GEO) at the National Center for Biotechnology Information (NCBI) is the largest fully public repository for high-throughput molecular abundance data, primarily gene expression data. The database has a flexible and open design that allows the submission, storage and retrieval of many data types. These data include microarray-based experiments measuring the abundance of mRNA, genomic DNA and protein molecules, as well as non-array-based technologies such as serial analysis of gene expression (SAGE) and mass spectrometry proteomic technology. GEO currently holds over 30,000 submissions representing approximately half a billion individual molecular abundance measurements, for over 100 organisms. Here, we describe recent database developments that facilitate effective mining and visualization of these data. Features are provided to examine data from both experiment- and gene-centric perspectives using user-friendly Web-based interfaces accessible to those without computational or microarray-related analytical expertise. The GEO database is publicly accessible through the World Wide Web at http://www.ncbi.nlm.nih.gov/geo.

  13. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  14. Completeness and overlap in open access systems: Search engines, aggregate institutional repositories and physics-related open sources.

    PubMed

    Tsay, Ming-Yueh; Wu, Tai-Luan; Tseng, Ling-Li

    2017-01-01

    This study examines the completeness and overlap of coverage in physics of six open access scholarly communication systems, including two search engines (Google Scholar and Microsoft Academic), two aggregate institutional repositories (OAIster and OpenDOAR), and two physics-related open sources (arXiv.org and Astrophysics Data System). The 2001-2013 Nobel Laureates in Physics served as the sample. Bibliographic records of their publications were retrieved and downloaded from each system, and a computer program was developed to perform the analytical tasks of sorting, comparison, elimination, aggregation and statistical calculations. Quantitative analyses and cross-referencing were performed to determine the completeness and overlap of the system coverage of the six open access systems. The results may enable scholars to select an appropriate open access system as an efficient scholarly communication channel, and academic institutions may build institutional repositories or independently create citation index systems in the future. Suggestions on indicators and tools for academic assessment are presented based on the comprehensiveness assessment of each system.

  15. Remote visual analysis of large turbulence databases at multiple scales

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pulido, Jesus; Livescu, Daniel; Kanov, Kalin

    The remote analysis and visualization of raw large turbulence datasets is challenging. Current accurate direct numerical simulations (DNS) of turbulent flows generate datasets with billions of points per time-step and several thousand time-steps per simulation. Until recently, the analysis and visualization of such datasets was restricted to scientists with access to large supercomputers. The public Johns Hopkins Turbulence database simplifies access to multi-terabyte turbulence datasets and facilitates the computation of statistics and extraction of features through the use of commodity hardware. In this paper, we present a framework designed around wavelet-based compression for high-speed visualization of large datasets and methodsmore » supporting multi-resolution analysis of turbulence. By integrating common technologies, this framework enables remote access to tools available on supercomputers and over 230 terabytes of DNS data over the Web. Finally, the database toolset is expanded by providing access to exploratory data analysis tools, such as wavelet decomposition capabilities and coherent feature extraction.« less

  16. Remote visual analysis of large turbulence databases at multiple scales

    DOE PAGES

    Pulido, Jesus; Livescu, Daniel; Kanov, Kalin; ...

    2018-06-15

    The remote analysis and visualization of raw large turbulence datasets is challenging. Current accurate direct numerical simulations (DNS) of turbulent flows generate datasets with billions of points per time-step and several thousand time-steps per simulation. Until recently, the analysis and visualization of such datasets was restricted to scientists with access to large supercomputers. The public Johns Hopkins Turbulence database simplifies access to multi-terabyte turbulence datasets and facilitates the computation of statistics and extraction of features through the use of commodity hardware. In this paper, we present a framework designed around wavelet-based compression for high-speed visualization of large datasets and methodsmore » supporting multi-resolution analysis of turbulence. By integrating common technologies, this framework enables remote access to tools available on supercomputers and over 230 terabytes of DNS data over the Web. Finally, the database toolset is expanded by providing access to exploratory data analysis tools, such as wavelet decomposition capabilities and coherent feature extraction.« less

  17. Prognocean Plus: the Science-Oriented Sea Level Prediction System as a Tool for Public Stakeholders

    NASA Astrophysics Data System (ADS)

    Świerczyńska, M. G.; Miziński, B.; Niedzielski, T.

    2015-12-01

    The novel real-time system for sea level prediction, known as Prognocean Plus, has been developed as a new generation service available through the Polish supercomputing grid infrastructure. The researchers can access the service at https://prognocean.plgrid.pl/. Although the system is science-oriented, we wish to discuss herein its potentials to enhance ocean management studies carried out routinely by public stakeholders. The system produces the short- and medium-term predictions of global altimetric gridded Sea Level Anomaly (SLA) time series, updated daily. The spatial resolution of the SLA forecasts is 1/4° x 1/4°, while the temporal resolution of prognoses is equal to 1 day. The system computes the predictions of time-variable ocean topography using five data-based models, which are not computationally demanding, enabling us to compare their skillfulness in respect to physically-based approaches commonly used by different sea level prediction systems. However, the aim of the system is not only to compute the predictions for science purposes, but primarily to build a user-oriented platform that serves the prognoses and their statistics to a broader community. Thus, we deliver the SLA forecasts as a rapid service available online. In order to provide potential users with the access to science results the Web Map Service (WMS) for Prognocean Plus is designed. We regularly publish the forecasts, both in the interactive graphical WMS service, available from the browser, as well as through the Web Coverage Service (WCS) standard. The Prognocean Plus system, as an early-response system, may be interesting for public stakeholders. It may be used for marine navigation as well as for climate risk management (delineate areas vulnerable to local sea level rise), marine management (advise offered for offshore activities) and coastal management (early warnings against coastal floodings).

  18. 76 FR 58466 - Models To Advance Voluntary Corporate Notification to Consumers Regarding the Illicit Use of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-21

    ...The U.S. Department of Commerce and U.S. Department of Homeland Security are requesting information on the requirements of, and possible approaches to creating, a voluntary industry code of conduct to address the detection, notification and mitigation of botnets.\\1\\ Over the past several years, botnets have increasingly put computer owners at risk. A botnet infection can lead to the monitoring of a consumer's personal information and communication, and exploitation of that consumer's computing power and Internet access. Networks of these compromised computers are often used to disseminate spam, to store and transfer illegal content, and to attack the servers of government and private entities with massive, distributed denial of service attacks. The Departments seek public comment from all Internet stakeholders, including the commercial, academic, and civil society sectors, on potential models for detection, notification, prevention, and mitigation of botnets' illicit use of computer equipment. ---------------------------------------------------------------------------

  19. 46 CFR 503.86 - Public access to records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 9 2010-10-01 2010-10-01 false Public access to records. 503.86 Section 503.86 Shipping FEDERAL MARITIME COMMISSION GENERAL AND ADMINISTRATIVE PROVISIONS PUBLIC INFORMATION Public Observation of Federal Maritime Commission Meetings and Public Access to Information Pertaining to Commission Meetings...

  20. Assured Access/Mobile Computing Initiatives on Five University Campuses.

    ERIC Educational Resources Information Center

    Blurton, Craig; Chee, Yam San; Long, Phillip D.; Resmer, Mark; Runde, Craig

    Mobile computing and assured access are becoming popular terms to describe a growing number of university programs which take advantage of ubiquitous network access points and the portability of notebook computers to ensure all students have access to digital tools and resources. However, the implementation of such programs varies widely from…

  1. Defining Data Access Pathways for Atmosphere to Electrons Wind Energy Data

    NASA Astrophysics Data System (ADS)

    Macduff, M.; Sivaraman, C.

    2016-12-01

    Atmosphere to Electrons (A2e), is a U.S. Department of Energy (DOE) Wind Program research initiative designed to optimize the performance of wind power plants by lowering the levelized cost of energy (LCOE). The Data Archive and Portal (DAP), managed by PNNL and hosted on Amazon Web Services, is a key capability of the A2e initiative. The DAP is used to collect, store, catalog, preserve and disseminate results from the experimental and computational studies representing a diverse user community requiring both open and proprietary data archival solutions(http://a2e.pnnl.gov). To enable consumer access to the data in DAP it is being built on a set of API's that are publically accessible. This includes persistent references for key meta-data objects as well as authenticated access to the data itself. The goal is to make the DAP catalog visible through a variety of data access paths bringing the data and metadata closer to the consumer. By providing persistent metadata records we hope to be able to build services that capture consumer utility and make referencing datasets easier.

  2. Digital imaging of root traits (DIRT): a high-throughput computing and collaboration platform for field-based root phenomics.

    PubMed

    Das, Abhiram; Schneider, Hannah; Burridge, James; Ascanio, Ana Karine Martinez; Wojciechowski, Tobias; Topp, Christopher N; Lynch, Jonathan P; Weitz, Joshua S; Bucksch, Alexander

    2015-01-01

    Plant root systems are key drivers of plant function and yield. They are also under-explored targets to meet global food and energy demands. Many new technologies have been developed to characterize crop root system architecture (CRSA). These technologies have the potential to accelerate the progress in understanding the genetic control and environmental response of CRSA. Putting this potential into practice requires new methods and algorithms to analyze CRSA in digital images. Most prior approaches have solely focused on the estimation of root traits from images, yet no integrated platform exists that allows easy and intuitive access to trait extraction and analysis methods from images combined with storage solutions linked to metadata. Automated high-throughput phenotyping methods are increasingly used in laboratory-based efforts to link plant genotype with phenotype, whereas similar field-based studies remain predominantly manual low-throughput. Here, we present an open-source phenomics platform "DIRT", as a means to integrate scalable supercomputing architectures into field experiments and analysis pipelines. DIRT is an online platform that enables researchers to store images of plant roots, measure dicot and monocot root traits under field conditions, and share data and results within collaborative teams and the broader community. The DIRT platform seamlessly connects end-users with large-scale compute "commons" enabling the estimation and analysis of root phenotypes from field experiments of unprecedented size. DIRT is an automated high-throughput computing and collaboration platform for field based crop root phenomics. The platform is accessible at http://www.dirt.iplantcollaborative.org/ and hosted on the iPlant cyber-infrastructure using high-throughput grid computing resources of the Texas Advanced Computing Center (TACC). DIRT is a high volume central depository and high-throughput RSA trait computation platform for plant scientists working on crop roots. It enables scientists to store, manage and share crop root images with metadata and compute RSA traits from thousands of images in parallel. It makes high-throughput RSA trait computation available to the community with just a few button clicks. As such it enables plant scientists to spend more time on science rather than on technology. All stored and computed data is easily accessible to the public and broader scientific community. We hope that easy data accessibility will attract new tool developers and spur creative data usage that may even be applied to other fields of science.

  3. Genomics Portals: integrative web-platform for mining genomics data.

    PubMed

    Shinde, Kaustubh; Phatak, Mukta; Johannes, Freudenberg M; Chen, Jing; Li, Qian; Vineet, Joshi K; Hu, Zhen; Ghosh, Krishnendu; Meller, Jaroslaw; Medvedovic, Mario

    2010-01-13

    A large amount of experimental data generated by modern high-throughput technologies is available through various public repositories. Our knowledge about molecular interaction networks, functional biological pathways and transcriptional regulatory modules is rapidly expanding, and is being organized in lists of functionally related genes. Jointly, these two sources of information hold a tremendous potential for gaining new insights into functioning of living systems. Genomics Portals platform integrates access to an extensive knowledge base and a large database of human, mouse, and rat genomics data with basic analytical visualization tools. It provides the context for analyzing and interpreting new experimental data and the tool for effective mining of a large number of publicly available genomics datasets stored in the back-end databases. The uniqueness of this platform lies in the volume and the diversity of genomics data that can be accessed and analyzed (gene expression, ChIP-chip, ChIP-seq, epigenomics, computationally predicted binding sites, etc), and the integration with an extensive knowledge base that can be used in such analysis. The integrated access to primary genomics data, functional knowledge and analytical tools makes Genomics Portals platform a unique tool for interpreting results of new genomics experiments and for mining the vast amount of data stored in the Genomics Portals backend databases. Genomics Portals can be accessed and used freely at http://GenomicsPortals.org.

  4. Genomics Portals: integrative web-platform for mining genomics data

    PubMed Central

    2010-01-01

    Background A large amount of experimental data generated by modern high-throughput technologies is available through various public repositories. Our knowledge about molecular interaction networks, functional biological pathways and transcriptional regulatory modules is rapidly expanding, and is being organized in lists of functionally related genes. Jointly, these two sources of information hold a tremendous potential for gaining new insights into functioning of living systems. Results Genomics Portals platform integrates access to an extensive knowledge base and a large database of human, mouse, and rat genomics data with basic analytical visualization tools. It provides the context for analyzing and interpreting new experimental data and the tool for effective mining of a large number of publicly available genomics datasets stored in the back-end databases. The uniqueness of this platform lies in the volume and the diversity of genomics data that can be accessed and analyzed (gene expression, ChIP-chip, ChIP-seq, epigenomics, computationally predicted binding sites, etc), and the integration with an extensive knowledge base that can be used in such analysis. Conclusion The integrated access to primary genomics data, functional knowledge and analytical tools makes Genomics Portals platform a unique tool for interpreting results of new genomics experiments and for mining the vast amount of data stored in the Genomics Portals backend databases. Genomics Portals can be accessed and used freely at http://GenomicsPortals.org. PMID:20070909

  5. Alternative treatment technology information center computer database system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sullivan, D.

    1995-10-01

    The Alternative Treatment Technology Information Center (ATTIC) computer database system was developed pursuant to the 1986 Superfund law amendments. It provides up-to-date information on innovative treatment technologies to clean up hazardous waste sites. ATTIC v2.0 provides access to several independent databases as well as a mechanism for retrieving full-text documents of key literature. It can be accessed with a personal computer and modem 24 hours a day, and there are no user fees. ATTIC provides {open_quotes}one-stop shopping{close_quotes} for information on alternative treatment options by accessing several databases: (1) treatment technology database; this contains abstracts from the literature on all typesmore » of treatment technologies, including biological, chemical, physical, and thermal methods. The best literature as viewed by experts is highlighted. (2) treatability study database; this provides performance information on technologies to remove contaminants from wastewaters and soils. It is derived from treatability studies. This database is available through ATTIC or separately as a disk that can be mailed to you. (3) underground storage tank database; this presents information on underground storage tank corrective actions, surface spills, emergency response, and remedial actions. (4) oil/chemical spill database; this provides abstracts on treatment and disposal of spilled oil and chemicals. In addition to these separate databases, ATTIC allows immediate access to other disk-based systems such as the Vendor Information System for Innovative Treatment Technologies (VISITT) and the Bioremediation in the Field Search System (BFSS). The user may download these programs to their own PC via a high-speed modem. Also via modem, users are able to download entire documents through the ATTIC system. Currently, about fifty publications are available, including Superfund Innovative Technology Evaluation (SITE) program documents.« less

  6. 5 CFR 1320.14 - Public access.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Public access. 1320.14 Section 1320.14 Administrative Personnel OFFICE OF MANAGEMENT AND BUDGET OMB DIRECTIVES CONTROLLING PAPERWORK BURDENS ON THE PUBLIC § 1320.14 Public access. (a) In order to enable the public to participate in and provide comments...

  7. The Impacts of Free Public Internet Access on Public Library Patrons and Communities

    ERIC Educational Resources Information Center

    Bertot, John Carlo; McClure, Charles R.; Jaeger, Paul T.

    2008-01-01

    Public libraries have evolved into a primary source of Internet access in many communities, generating wide-ranging impacts in the communities that public libraries serve. Based on the findings of the 2007 Public Libraries and the Internet study, this article examines the ways in which the Internet access delivered by public libraries affects…

  8. Strategic Integration of Multiple Bioinformatics Resources for System Level Analysis of Biological Networks.

    PubMed

    D'Souza, Mark; Sulakhe, Dinanath; Wang, Sheng; Xie, Bing; Hashemifar, Somaye; Taylor, Andrew; Dubchak, Inna; Conrad Gilliam, T; Maltsev, Natalia

    2017-01-01

    Recent technological advances in genomics allow the production of biological data at unprecedented tera- and petabyte scales. Efficient mining of these vast and complex datasets for the needs of biomedical research critically depends on a seamless integration of the clinical, genomic, and experimental information with prior knowledge about genotype-phenotype relationships. Such experimental data accumulated in publicly available databases should be accessible to a variety of algorithms and analytical pipelines that drive computational analysis and data mining.We present an integrated computational platform Lynx (Sulakhe et al., Nucleic Acids Res 44:D882-D887, 2016) ( http://lynx.cri.uchicago.edu ), a web-based database and knowledge extraction engine. It provides advanced search capabilities and a variety of algorithms for enrichment analysis and network-based gene prioritization. It gives public access to the Lynx integrated knowledge base (LynxKB) and its analytical tools via user-friendly web services and interfaces. The Lynx service-oriented architecture supports annotation and analysis of high-throughput experimental data. Lynx tools assist the user in extracting meaningful knowledge from LynxKB and experimental data, and in the generation of weighted hypotheses regarding the genes and molecular mechanisms contributing to human phenotypes or conditions of interest. The goal of this integrated platform is to support the end-to-end analytical needs of various translational projects.

  9. 45 CFR 1232.13 - General requirement concerning accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false General requirement concerning accessibility. 1232.13 Section 1232.13 Public Welfare Regulations Relating to Public Welfare (Continued) CORPORATION FOR... FEDERAL FINANCIAL ASSISTANCE Accessibility § 1232.13 General requirement concerning accessibility. No...

  10. 47 CFR 76.702 - Public access.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Public access. 76.702 Section 76.702 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Cable Television Access § 76.702 Public access. A cable operator may refuse to...

  11. Individual Public Transportation Accessibility is Positively Associated with Self-Reported Active Commuting

    PubMed Central

    Djurhuus, Sune; Hansen, Henning Sten; Aadahl, Mette; Glümer, Charlotte

    2014-01-01

    Background: Active commuters have lower risk of chronic disease. Understanding which of the, to some extent, modifiable characteristics of public transportation that facilitate its use is thus important in a public health perspective. The aim of the study was to examine the association between individual public transportation accessibility and self-reported active commuting, and whether the associations varied with commute distance, age, and gender. Methods: Twenty-eight thousand nine hundred twenty-eight commuters in The Capital Region of Denmark reported self-reported time spent either walking or cycling to work or study each day and the distance to work or study. Data were obtained from the Danish National Health Survey collected in February to April 2010. Individual accessibility by public transportation was calculated using a multi-modal network in a GIS. Multilevel logistic regression was used to analyze the association between accessibility, expressed as access area, and being an active commuter. Results: Public transport accessibility area based on all stops within walking and cycling distance was positively associated with being an active commuter. Distance to work, age, and gender modified the associations. Residing within 10 km commute distance and in areas of high accessibility was associated with being an active commuter and meeting the recommendations of physical activity. For the respondents above 29 years, individual public transportation accessibility was positively associated with being an active commuter. Women having high accessibility had significantly higher odds of being an active commuter compared to having a low accessibility. For men, the associations were insignificant. Conclusion: This study extends the knowledge about the driving forces of using public transportation for commuting by examining the individual public transportation accessibility. Findings suggest that transportation accessibility supports active commuting and planning of improved public transit accessibility has thus a potential of providing health benefits to commuters. PMID:25453030

  12. Publication of science data on CD-ROM: A guide and example

    NASA Technical Reports Server (NTRS)

    Angelici, Gary; Skiles, J. W.

    1993-01-01

    CD-ROM (Compact Disk-Read Only Memory) is becoming the standard media not only in audio recording, but also in the publication of data and information accessible on many computer platforms. Little has been written about the complicated process involved in creating easy-to-use, high quality, and useful CD-ROM's containing scientific data. This document is a manual designed to aid those who are responsible for the publication of scientific data on CD-ROM. All aspects and steps of the procedure are covered, from feasibility assessment through disk design, data preparation, disc mastering, and CD-ROM distribution. General advice and actual examples are based on lessons learned from the publication of scientific data for an interdisciplinary field experiment. Appendices include actual files from a CD-ROM, a purchase request for CD-ROM mastering services, and the disk art for the first disk published for the project.

  13. A national assessment of public recreational access on family forestlands in the United States

    Treesearch

    Stephanie A. Snyder; Brett J. Butler

    2012-01-01

    Private forestlands in the United States are important for public recreation, but access to them may be threatened. Using the US Forest Service's National Woodland Owner Survey, we examined the following questions: (1) How prevalent is public recreational access on family forestland? (2) What influences whether a family forest owner allows public access? (3) Are...

  14. The Wired Island: The First Two Years of Public Access To Cable Television In Manhattan.

    ERIC Educational Resources Information Center

    Othmer, David

    A review is presented of the first two years of free public access programing on New York City's cable television (CATV) systems. The report provides some background information on franchising, public access to CATV in New York City, and Federal Communications Commission regulations. It also deals with the public access programing developed; it…

  15. Internet Access in Public and Private Schools. Indicator of the Month.

    ERIC Educational Resources Information Center

    National Center for Education Statistics (ED), Washington, DC.

    This brief examines patterns of Internet access in schools. Highlights include: (1) Between fall 1994 and 1997, Internet access in public schools increased from 35 to 78 percent, but in fall 1997, 27 percent of instructional rooms had Internet access; (2) in fall 1995, public schools were more likely to have Internet access than private schools…

  16. Internet Access in Public and Private Schools. Indicator of the Month.

    ERIC Educational Resources Information Center

    National Center for Education Statistics (ED), Washington, DC.

    This indicator highlights findings about Internet access in schools. From 1994-98, Internet access and the percentage of instructional rooms with Internet access in public schools increased. Public schools with a high student poverty level were less likely to have Internet access than schools with a low poverty level from 1994-97. In fall 1998,…

  17. Voice-enabled Knowledge Engine using Flood Ontology and Natural Language Processing

    NASA Astrophysics Data System (ADS)

    Sermet, M. Y.; Demir, I.; Krajewski, W. F.

    2015-12-01

    The Iowa Flood Information System (IFIS) is a web-based platform developed by the Iowa Flood Center (IFC) to provide access to flood inundation maps, real-time flood conditions, flood forecasts, flood-related data, information and interactive visualizations for communities in Iowa. The IFIS is designed for use by general public, often people with no domain knowledge and limited general science background. To improve effective communication with such audience, we have introduced a voice-enabled knowledge engine on flood related issues in IFIS. Instead of navigating within many features and interfaces of the information system and web-based sources, the system provides dynamic computations based on a collection of built-in data, analysis, and methods. The IFIS Knowledge Engine connects to real-time stream gauges, in-house data sources, analysis and visualization tools to answer natural language questions. Our goal is the systematization of data and modeling results on flood related issues in Iowa, and to provide an interface for definitive answers to factual queries. The goal of the knowledge engine is to make all flood related knowledge in Iowa easily accessible to everyone, and support voice-enabled natural language input. We aim to integrate and curate all flood related data, implement analytical and visualization tools, and make it possible to compute answers from questions. The IFIS explicitly implements analytical methods and models, as algorithms, and curates all flood related data and resources so that all these resources are computable. The IFIS Knowledge Engine computes the answer by deriving it from its computational knowledge base. The knowledge engine processes the statement, access data warehouse, run complex database queries on the server-side and return outputs in various formats. This presentation provides an overview of IFIS Knowledge Engine, its unique information interface and functionality as an educational tool, and discusses the future plans for providing knowledge on flood related issues and resources. IFIS Knowledge Engine provides an alternative access method to these comprehensive set of tools and data resources available in IFIS. Current implementation of the system accepts free-form input and voice recognition capabilities within browser and mobile applications.

  18. Reese Sorenson's Individual Professional Page

    NASA Technical Reports Server (NTRS)

    Sorenson, Reese; Nixon, David (Technical Monitor)

    1998-01-01

    The subject document is a World Wide Web (WWW) page entitled, "Reese Sorenson's Individual Professional Page." Its can be accessed at "http://george.arc.nasa.gov/sorenson/personal/index.html". The purpose of this page is to make the reader aware of me, who I am, and what I do. It lists my work assignments, my computer experience, my place in the NASA hierarchy, publications by me, awards received by me, my education, and how to contact me. Writing this page was a learning experience, pursuant to an element in my Job Description which calls for me to be able to use the latest computers. This web page contains very little technical information, none of which is classified or sensitive.

  19. Menu-driven cloud computing and resource sharing for R and Bioconductor.

    PubMed

    Bolouri, Hamid; Dulepet, Rajiv; Angerman, Michael

    2011-08-15

    We report CRdata.org, a cloud-based, free, open-source web server for running analyses and sharing data and R scripts with others. In addition to using the free, public service, CRdata users can launch their own private Amazon Elastic Computing Cloud (EC2) nodes and store private data and scripts on Amazon's Simple Storage Service (S3) with user-controlled access rights. All CRdata services are provided via point-and-click menus. CRdata is open-source and free under the permissive MIT License (opensource.org/licenses/mit-license.php). The source code is in Ruby (ruby-lang.org/en/) and available at: github.com/seerdata/crdata. hbolouri@fhcrc.org.

  20. Production of graphic symbol sentences by individuals with aphasia: efficacy of a computer-based augmentative and alternative communication intervention.

    PubMed

    Koul, Rajinder; Corwin, Melinda; Hayes, Summer

    2005-01-01

    The study employed a single-subject multiple baseline design to examine the ability of 9 individuals with severe Broca's aphasia or global aphasia to produce graphic symbol sentences of varying syntactical complexity using a software program that turns a computer into a speech output communication device. The sentences ranged in complexity from simple two-word phrases to those with morphological inflections, transformations, and relative clauses. Overall, results indicated that individuals with aphasia are able to access, manipulate, and combine graphic symbols to produce phrases and sentences of varying degrees of syntactical complexity. The findings are discussed in terms of the clinical and public policy implications.

  1. Experimental comparison of two quantum computing architectures

    PubMed Central

    Linke, Norbert M.; Maslov, Dmitri; Roetteler, Martin; Debnath, Shantanu; Figgatt, Caroline; Landsman, Kevin A.; Wright, Kenneth; Monroe, Christopher

    2017-01-01

    We run a selection of algorithms on two state-of-the-art 5-qubit quantum computers that are based on different technology platforms. One is a publicly accessible superconducting transmon device (www.research.ibm.com/ibm-q) with limited connectivity, and the other is a fully connected trapped-ion system. Even though the two systems have different native quantum interactions, both can be programed in a way that is blind to the underlying hardware, thus allowing a comparison of identical quantum algorithms between different physical systems. We show that quantum algorithms and circuits that use more connectivity clearly benefit from a better-connected system of qubits. Although the quantum systems here are not yet large enough to eclipse classical computers, this experiment exposes critical factors of scaling quantum computers, such as qubit connectivity and gate expressivity. In addition, the results suggest that codesigning particular quantum applications with the hardware itself will be paramount in successfully using quantum computers in the future. PMID:28325879

  2. Access to medication in the Public Health System and equity: populational health surveys in São Paulo, Brazil.

    PubMed

    Monteiro, Camila Nascimento; Gianini, Reinaldo José; Barros, Marilisa Berti de Azevedo; Cesar, Chester Luiz Galvão; Goldbaum, Moisés

    2016-03-01

    Since 2003, the access to medication has been increasing in Brazil and particularly in São Paulo. The present study aimed to analyze the access to medication obtained in the public sector and the socioeconomic differences in this access in 2003 and 2008. Also, we explored the difference in access to medication from 2003 to 2008. Data were obtained from two cross-sectional population-based household surveys from São Paulo, Brazil (ISA-Capital 2003 and ISA-Capital 2008). Concentration curve and concentration index were calculated to analyze the associations between socioeconomic factors and access to medication in the public sector. Additionally, the differences between 2003 and 2008 regarding socioeconomic characteristics and access to medication were studied. Access to medication was 89.55% in 2003 and 92.99% in 2008, and the proportion of access to medication did not change in the period. Access in the public sector increased from 26.40% in 2003 to 48.55% in 2008 and there was a decrease in the concentration index between 2003 and 2008 in access to medication in the public sector. The findings indicate an expansion of Brazilian Unified Health System (Sistema Único de Saúde ) users, with the inclusion of people of higher socioeconomic position in the public sector. As the SUS gives more support to people of lower socioeconomic position in terms of medication provision, the SUS tends to equity. Nevertheless, universal coverage for medication and equity in access to medication in the public sector are still challenges for the Brazilian public health system.

  3. Citation analytics: Data exploration and comparative analyses of CiteScores of Open Access and Subscription-Based publications indexed in Scopus (2014-2016).

    PubMed

    Atayero, Aderemi A; Popoola, Segun I; Egeonu, Jesse; Oludayo, Olumuyiwa

    2018-08-01

    Citation is one of the important metrics that are used in measuring the relevance and the impact of research publications. The potentials of citation analytics may be exploited to understand the gains of publishing scholarly peer-reviewed research outputs in either Open Access (OA) sources or Subscription-Based (SB) sources in the bid to increase citation impact. However, relevant data required for such comparative analysis must be freely accessible for evidence-based findings and conclusions. In this data article, citation scores ( CiteScores ) of 2542 OA sources and 15,040 SB sources indexed in Scopus from 2014 to 2016 were presented and analyzed based on a set of five inclusion criteria. A robust dataset, which contains the CiteScores of OA and SB publication sources included, is attached as supplementary material to this data article to facilitate further reuse. Descriptive statistics and frequency distributions of OA CiteScores and SB CiteScores are presented in tables. Boxplot representations and scatter plots are provided to show the statistical distributions of OA CiteScores and SB CiteScores across the three sub-categories (Book Series, Journal, and Trade Journal). Correlation coefficient and p-value matrices are made available within the data article. In addition, Probability Density Functions (PDFs) and Cumulative Distribution Functions (CDFs) of OA CiteScores and SB CiteScores are computed and the results are presented using tables and graphs. Furthermore, Analysis of Variance (ANOVA) and multiple comparison post-hoc tests are conducted to understand the statistical difference (and its significance, if any) in the citation impact of OA publication sources and SB publication source based on CiteScore . In the long run, the data provided in this article will help policy makers and researchers in Higher Education Institutions (HEIs) to identify the appropriate publication source type and category for dissemination of scholarly research findings with maximum citation impact.

  4. Public health situation awareness: toward a semantic approach

    NASA Astrophysics Data System (ADS)

    Mirhaji, Parsa; Richesson, Rachel L.; Turley, James P.; Zhang, Jiajie; Smith, Jack W.

    2004-04-01

    We propose a knowledge-based public health situation awareness system. The basis for this system is an explicit representation of public health situation awareness concepts and their interrelationships. This representation is based upon the users" (public health decision makers) cognitive model of the world, and optimized towards the efficacy of performance and relevance to the public health situation awareness processes and tasks. In our approach, explicit domain knowledge is the foundation for interpretation of public health data, as apposed to conventional systems where the statistical methods are the essence of the processes. Objectives: To develop a prototype knowledge-based system for public health situation awareness and to demonstrate the utility of knowledge intensive approaches in integration of heterogeneous information, eliminating the effects of incomplete and poor quality surveillance data, uncertainty in syndrome and aberration detection and visualization of complex information structures in public health surveillance settings, particularly in the context of bioterrorism (BT) preparedness. The system employs the Resource Definition Framework (RDF) and additional layers of more expressive languages to explicate the knowledge of domain experts into machine interpretable and computable problem-solving modules that can then guide users and computer systems in sifting through the most "relevant" data for syndrome and outbreak detection and investigation of root cause of the event. The Center for Biosecurity and Public Health Informatics Research is developing a prototype knowledge-based system around influenza, which has complex natural disease patterns, many public health implications, and is a potential agent for bioterrorism. The preliminary data from this effort may demonstrate superior performance in information integration, syndrome and aberration detection, information access through information visualization, and cross-domain investigation of the root causes of public health events.

  5. Access to emergency hospital care provided by the public sector in sub-Saharan Africa in 2015: a geocoded inventory and spatial analysis.

    PubMed

    Ouma, Paul O; Maina, Joseph; Thuranira, Pamela N; Macharia, Peter M; Alegana, Victor A; English, Mike; Okiro, Emelda A; Snow, Robert W

    2018-03-01

    Timely access to emergency care can substantially reduce mortality. International benchmarks for access to emergency hospital care have been established to guide ambitions for universal health care by 2030. However, no Pan-African database of where hospitals are located exists; therefore, we aimed to complete a geocoded inventory of hospital services in Africa in relation to how populations might access these services in 2015, with focus on women of child bearing age. We assembled a geocoded inventory of public hospitals across 48 countries and islands of sub-Saharan Africa, including Zanzibar, using data from various sources. We only included public hospitals with emergency services that were managed by governments at national or local levels and faith-based or non-governmental organisations. For hospital listings without geographical coordinates, we geocoded each facility using Microsoft Encarta (version 2009), Google Earth (version 7.3), Geonames, Fallingrain, OpenStreetMap, and other national digital gazetteers. We obtained estimates for total population and women of child bearing age (15-49 years) at a 1 km 2 spatial resolution from the WorldPop database for 2015. Additionally, we assembled road network data from Google Map Maker Project and OpenStreetMap using ArcMap (version 10.5). We then combined the road network and the population locations to form a travel impedance surface. Subsequently, we formulated a cost distance algorithm based on the location of public hospitals and the travel impedance surface in AccessMod (version 5) to compute the proportion of populations living within a combined walking and motorised travel time of 2 h to emergency hospital services. We consulted 100 databases from 48 sub-Saharan countries and islands, including Zanzibar, and identified 4908 public hospitals. 2701 hospitals had either full or partial information about their geographical coordinates. We estimated that 287 282 013 (29·0%) people and 64 495 526 (28·2%) women of child bearing age are located more than 2-h travel time from the nearest hospital. Marked differences were observed within and between countries, ranging from less than 25% of the population within 2-h travel time of a public hospital in South Sudan to more than 90% in Nigeria, Kenya, Cape Verde, Swaziland, South Africa, Burundi, Comoros, São Tomé and Príncipe, and Zanzibar. Only 16 countries reached the international benchmark of more than 80% of their populations living within a 2-h travel time of the nearest hospital. Physical access to emergency hospital care provided by the public sector in Africa remains poor and varies substantially within and between countries. Innovative targeting of emergency care services is necessary to reduce these inequities. This study provides the first spatial census of public hospital services in Africa. Wellcome Trust and the UK Department for International Development. Copyright © 2018 The Author(s). Published by Elsevier Ltd. This is an Open Access article under the CC BY 4.0 license. Published by Elsevier Ltd.. All rights reserved.

  6. No Special Equipment Required: The Accessibility Features Built into the Windows and Macintosh Operating Systems make Computers Accessible for Students with Special Needs

    ERIC Educational Resources Information Center

    Kimball,Walter H.; Cohen,Libby G.; Dimmick,Deb; Mills,Rick

    2003-01-01

    The proliferation of computers and other electronic learning devices has made knowledge and communication accessible to people with a wide range of abilities. Both Windows and Macintosh computers have accessibility options to help with many different special needs. This documents discusses solutions for: (1) visual impairments; (2) hearing…

  7. Increasing the impact of medical image computing using community-based open-access hackathons: The NA-MIC and 3D Slicer experience.

    PubMed

    Kapur, Tina; Pieper, Steve; Fedorov, Andriy; Fillion-Robin, J-C; Halle, Michael; O'Donnell, Lauren; Lasso, Andras; Ungi, Tamas; Pinter, Csaba; Finet, Julien; Pujol, Sonia; Jagadeesan, Jayender; Tokuda, Junichi; Norton, Isaiah; Estepar, Raul San Jose; Gering, David; Aerts, Hugo J W L; Jakab, Marianna; Hata, Nobuhiko; Ibanez, Luiz; Blezek, Daniel; Miller, Jim; Aylward, Stephen; Grimson, W Eric L; Fichtinger, Gabor; Wells, William M; Lorensen, William E; Schroeder, Will; Kikinis, Ron

    2016-10-01

    The National Alliance for Medical Image Computing (NA-MIC) was launched in 2004 with the goal of investigating and developing an open source software infrastructure for the extraction of information and knowledge from medical images using computational methods. Several leading research and engineering groups participated in this effort that was funded by the US National Institutes of Health through a variety of infrastructure grants. This effort transformed 3D Slicer from an internal, Boston-based, academic research software application into a professionally maintained, robust, open source platform with an international leadership and developer and user communities. Critical improvements to the widely used underlying open source libraries and tools-VTK, ITK, CMake, CDash, DCMTK-were an additional consequence of this effort. This project has contributed to close to a thousand peer-reviewed publications and a growing portfolio of US and international funded efforts expanding the use of these tools in new medical computing applications every year. In this editorial, we discuss what we believe are gaps in the way medical image computing is pursued today; how a well-executed research platform can enable discovery, innovation and reproducible science ("Open Science"); and how our quest to build such a software platform has evolved into a productive and rewarding social engineering exercise in building an open-access community with a shared vision. Copyright © 2016 Elsevier B.V. All rights reserved.

  8. Field of genes: using Apache Kafka as a bioinformatic data repository

    PubMed Central

    Lynch, Richard; Walsh, Paul

    2018-01-01

    Abstract Background Bioinformatic research is increasingly dependent on large-scale datasets, accessed either from private or public repositories. An example of a public repository is National Center for Biotechnology Information's (NCBI’s) Reference Sequence (RefSeq). These repositories must decide in what form to make their data available. Unstructured data can be put to almost any use but are limited in how access to them can be scaled. Highly structured data offer improved performance for specific algorithms but limit the wider usefulness of the data. We present an alternative: lightly structured data stored in Apache Kafka in a way that is amenable to parallel access and streamed processing, including subsequent transformations into more highly structured representations. We contend that this approach could provide a flexible and powerful nexus of bioinformatic data, bridging the gap between low structure on one hand, and high performance and scale on the other. To demonstrate this, we present a proof-of-concept version of NCBI’s RefSeq database using this technology. We measure the performance and scalability characteristics of this alternative with respect to flat files. Results The proof of concept scales almost linearly as more compute nodes are added, outperforming the standard approach using files. Conclusions Apache Kafka merits consideration as a fast and more scalable but general-purpose way to store and retrieve bioinformatic data, for public, centralized reference datasets such as RefSeq and for private clinical and experimental data. PMID:29635394

  9. [Public control and equity of access to hospitals under non-State public administration].

    PubMed

    Carneiro Junior, Nivaldo; Elias, Paulo Eduardo

    2006-10-01

    To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.

  10. High Availability Applications for NOMADS at the NOAA Web Operations Center Aimed at Providing Reliable Real Time Access to Operational Model Data

    NASA Astrophysics Data System (ADS)

    Alpert, J. C.; Rutledge, G.; Wang, J.; Freeman, P.; Kang, C. Y.

    2009-05-01

    The NOAA Operational Modeling Archive Distribution System (NOMADS) is now delivering high availability services as part of NOAA's official real time data dissemination at its Web Operations Center (WOC). The WOC is a web service used by all organizational units in NOAA and acts as a data repository where public information can be posted to a secure and scalable content server. A goal is to foster collaborations among the research and education communities, value added retailers, and public access for science and development efforts aimed at advancing modeling and GEO-related tasks. The services used to access the operational model data output are the Open-source Project for a Network Data Access Protocol (OPeNDAP), implemented with the Grid Analysis and Display System (GrADS) Data Server (GDS), and applications for slicing, dicing and area sub-setting the large matrix of real time model data holdings. This approach insures an efficient use of computer resources because users transmit/receive only the data necessary for their tasks including metadata. Data sets served in this way with a high availability server offer vast possibilities for the creation of new products for value added retailers and the scientific community. New applications to access data and observations for verification of gridded model output, and progress toward integration with access to conventional and non-conventional observations will be discussed. We will demonstrate how users can use NOMADS services to repackage area subsets either using repackaging of GRIB2 files, or values selected by ensemble component, (forecast) time, vertical levels, global horizontal location, and by variable, virtually a 6- Dimensional analysis services across the internet.

  11. Endodontic applications of 3D printing.

    PubMed

    Anderson, J; Wealleans, J; Ray, J

    2018-02-27

    Computer-aided design (CAD) and computer-aided manufacturing (CAM) technologies can leverage cone beam computed tomography data for production of objects used in surgical and nonsurgical endodontics and in educational settings. The aim of this article was to review all current applications of 3D printing in endodontics and to speculate upon future directions for research and clinical use within the specialty. A literature search of PubMed, Ovid and Scopus was conducted using the following terms: stereolithography, 3D printing, computer aided rapid prototyping, surgical guide, guided endodontic surgery, guided endodontic access, additive manufacturing, rapid prototyping, autotransplantation rapid prototyping, CAD, CAM. Inclusion criteria were articles in the English language documenting endodontic applications of 3D printing. Fifty-one articles met inclusion criteria and were utilized. The endodontic literature on 3D printing is generally limited to case reports and pre-clinical studies. Documented solutions to endodontic challenges include: guided access with pulp canal obliteration, applications in autotransplantation, pre-surgical planning and educational modelling and accurate location of osteotomy perforation sites. Acquisition of technical expertise and equipment within endodontic practices present formidable obstacles to widespread deployment within the endodontic specialty. As knowledge advances, endodontic postgraduate programmes should consider implementing 3D printing into their curriculums. Future research directions should include clinical outcomes assessments of treatments employing 3D printed objects. Published 2018. This article is a U.S. Government work and is in the public domain in the USA.

  12. Prescription for trouble: Medicare Part D and patterns of computer and internet access among the elderly.

    PubMed

    Wright, David W; Hill, Twyla J

    2009-01-01

    The Medicare Prescription Drug, Improvement, and Modernization Act of 2003 specifically encourages Medicare enrollees to use the Internet to obtain information regarding the new prescription drug insurance plans and to enroll in a plan. This reliance on computer technology and the Internet leads to practical questions regarding implementation of the insurance coverage. For example, it seems unlikely that all Medicare enrollees have access to computers and the Internet or that they are all computer literate. This study uses the 2003 Current Population Survey to examine the effects of disability and income on computer access and Internet use among the elderly. Internet access declines with age and is exacerbated by disabilities. Also, decreases in income lead to decreases in computer ownership and use. Therefore, providing prescription drug coverage primarily through the Internet seems likely to maintain or increase stratification of access to health care, especially for low-income, disabled elderly, who are also a group most in need of health care access.

  13. Usability of a Low-Cost Head Tracking Computer Access Method following Stroke.

    PubMed

    Mah, Jasmine; Jutai, Jeffrey W; Finestone, Hillel; Mckee, Hilary; Carter, Melanie

    2015-01-01

    Assistive technology devices for computer access can facilitate social reintegration and promote independence for people who have had a stroke. This work describes the exploration of the usefulness and acceptability of a new computer access device called the Nouse™ (Nose-as-mouse). The device uses standard webcam and video recognition algorithms to map the movement of the user's nose to a computer cursor, thereby allowing hands-free computer operation. Ten participants receiving in- or outpatient stroke rehabilitation completed a series of standardized and everyday computer tasks using the Nouse™ and then completed a device usability questionnaire. Task completion rates were high (90%) for computer activities only in the absence of time constraints. Most of the participants were satisfied with ease of use (70%) and liked using the Nouse™ (60%), indicating they could resume most of their usual computer activities apart from word-processing using the device. The findings suggest that hands-free computer access devices like the Nouse™ may be an option for people who experience upper motor impairment caused by stroke and are highly motivated to resume personal computing. More research is necessary to further evaluate the effectiveness of this technology, especially in relation to other computer access assistive technology devices.

  14. 41 CFR 60-250.81 - Access to records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Access to records. 60-250.81 Section 60-250.81 Public Contracts and Property Management Other Provisions Relating to Public... VETERANS Ancillary Matters § 60-250.81 Access to records. Each contractor shall permit access during normal...

  15. 41 CFR 60-250.81 - Access to records.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 1 2011-07-01 2009-07-01 true Access to records. 60-250.81 Section 60-250.81 Public Contracts and Property Management Other Provisions Relating to Public... VETERANS Ancillary Matters § 60-250.81 Access to records. Each contractor shall permit access during normal...

  16. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network

    PubMed Central

    Rajagopalan, S. P.

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network. PMID:29040290

  17. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

    PubMed

    Alagarsamy, Sumithra; Rajagopalan, S P

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.

  18. Eruptive event generator based on the Gibson-Low magnetic configuration

    NASA Astrophysics Data System (ADS)

    Borovikov, D.; Sokolov, I. V.; Manchester, W. B.; Jin, M.; Gombosi, T. I.

    2017-08-01

    Coronal mass ejections (CMEs), a kind of energetic solar eruptions, are an integral subject of space weather research. Numerical magnetohydrodynamic (MHD) modeling, which requires powerful computational resources, is one of the primary means of studying the phenomenon. With increasing accessibility of such resources, grows the demand for user-friendly tools that would facilitate the process of simulating CMEs for scientific and operational purposes. The Eruptive Event Generator based on Gibson-Low flux rope (EEGGL), a new publicly available computational model presented in this paper, is an effort to meet this demand. EEGGL allows one to compute the parameters of a model flux rope driving a CME via an intuitive graphical user interface. We provide a brief overview of the physical principles behind EEGGL and its functionality. Ways toward future improvements of the tool are outlined.

  19. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  20. Distributed structure-searchable toxicity (DSSTox) public database network: a proposal.

    PubMed

    Richard, Ann M; Williams, ClarLynda R

    2002-01-29

    The ability to assess the potential genotoxicity, carcinogenicity, or other toxicity of pharmaceutical or industrial chemicals based on chemical structure information is a highly coveted and shared goal of varied academic, commercial, and government regulatory groups. These diverse interests often employ different approaches and have different criteria and use for toxicity assessments, but they share a need for unrestricted access to existing public toxicity data linked with chemical structure information. Currently, there exists no central repository of toxicity information, commercial or public, that adequately meets the data requirements for flexible analogue searching, Structure-Activity Relationship (SAR) model development, or building of chemical relational databases (CRD). The distributed structure-searchable toxicity (DSSTox) public database network is being proposed as a community-supported, web-based effort to address these shared needs of the SAR and toxicology communities. The DSSTox project has the following major elements: (1) to adopt and encourage the use of a common standard file format (structure data file (SDF)) for public toxicity databases that includes chemical structure, text and property information, and that can easily be imported into available CRD applications; (2) to implement a distributed source approach, managed by a DSSTox Central Website, that will enable decentralized, free public access to structure-toxicity data files, and that will effectively link knowledgeable toxicity data sources with potential users of these data from other disciplines (such as chemistry, modeling, and computer science); and (3) to engage public/commercial/academic/industry groups in contributing to and expanding this community-wide, public data sharing and distribution effort. The DSSTox project's overall aims are to effect the closer association of chemical structure information with existing toxicity data, and to promote and facilitate structure-based exploration of these data within a common chemistry-based framework that spans toxicological disciplines.

  1. The use of computer mediated communication in providing patient support: A review of the research literature.

    PubMed

    Wagg, Amanda J; Callanan, Margie M; Hassett, Alexander

    2018-03-16

    The aim of this study is to explore how computer mediated communication has been used by a variety of healthcare,professionals to support their patients and discuss the implication that this may have for future practice. A systematized review of the literature. A review of empirical studies within the literature was carried out in April 2016 in CINAHL, MEDLINE, ASSIA, BNI, Psychinfo, and Web of Science databases. The databases searched produced 2930 titles, of which 190 publications were considered relevant to the objectives. Titles and abstracts were then reviewed and duplicates removed producing 67 publications. Exclusion and inclusion criteria were applied. The inclusion criteria were (1) interventions that facilitate two-way communication between any healthcare professional and their patients via a computer; (2) Interventions aimed at providing any type of support e.g. emotional, tangible, informational, or esteem support; (3) English language; (4) Primary empirical studies. Data quality was assessed and thematic analysis applied. Thirty-one publications were included in this study. Intervention types included Email (n = 8), Videoconferencing (n = 7), Online Social Support Groups (n = 9) and multifaceted interventions (n = 7). Three themes emerged from the data including increasing access to healthcare, adding value to healthcare delivery and improving patient outcomes. Twenty-five (81%) of the studies found that computer mediated communication could produce positive effects. Computer mediated communication could be both what patients want and a way of delivering support to patients in a resource tight environment. This has implications for a range of health support needs and professionals including nurses, midwives and allied healthcare professionals. Reviewing the lessons learnt will ensure future interventions are tailored to the support needs of the patients, carefully planned and mindful of the risks. Copyright © 2018 Elsevier Ltd. All rights reserved.

  2. [Chapter 2. Internet of Things help to collect Big Data].

    PubMed

    Brouard, Benoît

    2017-10-27

    According to the report ?The Internet of Things Market? the number of connected devices will reach 68 billion in 2020. In 2012, the total amount of data was 500 petabytes. So, after the race to increase power computation, now the stake is in the capacity to store all these data in the cloud, to open their access and to analyze these data properly. The use of these data is a major challenge for medical research and public health.

  3. Development of Disruptive Open Access Journals

    ERIC Educational Resources Information Center

    Anderson, Terry; McConkey, Brigette

    2009-01-01

    Open access (OA) publication has emerged, with disruptive effects, as a major outlet for scholarly publication. OA publication is usually associated with on-line distribution and provides access to scholarly publications to anyone, anywhere--regardless of their ability to pay subscription fees or their association with an educational institution.…

  4. Arkheia: Data Management and Communication for Open Computational Neuroscience

    PubMed Central

    Antolík, Ján; Davison, Andrew P.

    2018-01-01

    Two trends have been unfolding in computational neuroscience during the last decade. First, a shift of focus to increasingly complex and heterogeneous neural network models, with a concomitant increase in the level of collaboration within the field (whether direct or in the form of building on top of existing tools and results). Second, a general trend in science toward more open communication, both internally, with other potential scientific collaborators, and externally, with the wider public. This multi-faceted development toward more integrative approaches and more intense communication within and outside of the field poses major new challenges for modelers, as currently there is a severe lack of tools to help with automatic communication and sharing of all aspects of a simulation workflow to the rest of the community. To address this important gap in the current computational modeling software infrastructure, here we introduce Arkheia. Arkheia is a web-based open science platform for computational models in systems neuroscience. It provides an automatic, interactive, graphical presentation of simulation results, experimental protocols, and interactive exploration of parameter searches, in a web browser-based application. Arkheia is focused on automatic presentation of these resources with minimal manual input from users. Arkheia is written in a modular fashion with a focus on future development of the platform. The platform is designed in an open manner, with a clearly defined and separated API for database access, so that any project can write its own backend translating its data into the Arkheia database format. Arkheia is not a centralized platform, but allows any user (or group of users) to set up their own repository, either for public access by the general population, or locally for internal use. Overall, Arkheia provides users with an automatic means to communicate information about not only their models but also individual simulation results and the entire experimental context in an approachable graphical manner, thus facilitating the user's ability to collaborate in the field and outreach to a wider audience. PMID:29556187

  5. Arkheia: Data Management and Communication for Open Computational Neuroscience.

    PubMed

    Antolík, Ján; Davison, Andrew P

    2018-01-01

    Two trends have been unfolding in computational neuroscience during the last decade. First, a shift of focus to increasingly complex and heterogeneous neural network models, with a concomitant increase in the level of collaboration within the field (whether direct or in the form of building on top of existing tools and results). Second, a general trend in science toward more open communication, both internally, with other potential scientific collaborators, and externally, with the wider public. This multi-faceted development toward more integrative approaches and more intense communication within and outside of the field poses major new challenges for modelers, as currently there is a severe lack of tools to help with automatic communication and sharing of all aspects of a simulation workflow to the rest of the community. To address this important gap in the current computational modeling software infrastructure, here we introduce Arkheia. Arkheia is a web-based open science platform for computational models in systems neuroscience. It provides an automatic, interactive, graphical presentation of simulation results, experimental protocols, and interactive exploration of parameter searches, in a web browser-based application. Arkheia is focused on automatic presentation of these resources with minimal manual input from users. Arkheia is written in a modular fashion with a focus on future development of the platform. The platform is designed in an open manner, with a clearly defined and separated API for database access, so that any project can write its own backend translating its data into the Arkheia database format. Arkheia is not a centralized platform, but allows any user (or group of users) to set up their own repository, either for public access by the general population, or locally for internal use. Overall, Arkheia provides users with an automatic means to communicate information about not only their models but also individual simulation results and the entire experimental context in an approachable graphical manner, thus facilitating the user's ability to collaborate in the field and outreach to a wider audience.

  6. 76 FR 44663 - Accessibility Guidelines for Pedestrian Facilities in the Public Right-of-Way

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-26

    ... buildings, facilities, rail passenger cars, and vehicles are accessible in terms of architecture and design... Compliance Board 36 CFR Part 1190 Accessibility Guidelines for Pedestrian Facilities in the Public Right- of... [Docket No. ATBCB 2011-04] RIN 3014-AA26 Accessibility Guidelines for Pedestrian Facilities in the Public...

  7. IMG/M: integrated genome and metagenome comparative data analysis system

    DOE PAGES

    Chen, I-Min A.; Markowitz, Victor M.; Chu, Ken; ...

    2016-10-13

    The Integrated Microbial Genomes with Microbiome Samples (IMG/M: https://img.jgi.doe.gov/m/) system contains annotated DNA and RNA sequence data of (i) archaeal, bacterial, eukaryotic and viral genomes from cultured organisms, (ii) single cell genomes (SCG) and genomes from metagenomes (GFM) from uncultured archaea, bacteria and viruses and (iii) metagenomes from environmental, host associated and engineered microbiome samples. Sequence data are generated by DOE's Joint Genome Institute (JGI), submitted by individual scientists, or collected from public sequence data archives. Structural and functional annotation is carried out by JGI's genome and metagenome annotation pipelines. A variety of analytical and visualization tools provide support formore » examining and comparing IMG/M's datasets. IMG/M allows open access interactive analysis of publicly available datasets, while manual curation, submission and access to private datasets and computationally intensive workspace-based analysis require login/password access to its expert review(ER) companion system (IMG/M ER: https://img.jgi.doe.gov/ mer/). Since the last report published in the 2014 NAR Database Issue, IMG/M's dataset content has tripled in terms of number of datasets and overall protein coding genes, while its analysis tools have been extended to cope with the rapid growth in the number and size of datasets handled by the system.« less

  8. IMG/M: integrated genome and metagenome comparative data analysis system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, I-Min A.; Markowitz, Victor M.; Chu, Ken

    The Integrated Microbial Genomes with Microbiome Samples (IMG/M: https://img.jgi.doe.gov/m/) system contains annotated DNA and RNA sequence data of (i) archaeal, bacterial, eukaryotic and viral genomes from cultured organisms, (ii) single cell genomes (SCG) and genomes from metagenomes (GFM) from uncultured archaea, bacteria and viruses and (iii) metagenomes from environmental, host associated and engineered microbiome samples. Sequence data are generated by DOE's Joint Genome Institute (JGI), submitted by individual scientists, or collected from public sequence data archives. Structural and functional annotation is carried out by JGI's genome and metagenome annotation pipelines. A variety of analytical and visualization tools provide support formore » examining and comparing IMG/M's datasets. IMG/M allows open access interactive analysis of publicly available datasets, while manual curation, submission and access to private datasets and computationally intensive workspace-based analysis require login/password access to its expert review(ER) companion system (IMG/M ER: https://img.jgi.doe.gov/ mer/). Since the last report published in the 2014 NAR Database Issue, IMG/M's dataset content has tripled in terms of number of datasets and overall protein coding genes, while its analysis tools have been extended to cope with the rapid growth in the number and size of datasets handled by the system.« less

  9. IMG/M: integrated genome and metagenome comparative data analysis system

    PubMed Central

    Chen, I-Min A.; Markowitz, Victor M.; Chu, Ken; Palaniappan, Krishna; Szeto, Ernest; Pillay, Manoj; Ratner, Anna; Huang, Jinghua; Andersen, Evan; Huntemann, Marcel; Varghese, Neha; Hadjithomas, Michalis; Tennessen, Kristin; Nielsen, Torben; Ivanova, Natalia N.; Kyrpides, Nikos C.

    2017-01-01

    The Integrated Microbial Genomes with Microbiome Samples (IMG/M: https://img.jgi.doe.gov/m/) system contains annotated DNA and RNA sequence data of (i) archaeal, bacterial, eukaryotic and viral genomes from cultured organisms, (ii) single cell genomes (SCG) and genomes from metagenomes (GFM) from uncultured archaea, bacteria and viruses and (iii) metagenomes from environmental, host associated and engineered microbiome samples. Sequence data are generated by DOE's Joint Genome Institute (JGI), submitted by individual scientists, or collected from public sequence data archives. Structural and functional annotation is carried out by JGI's genome and metagenome annotation pipelines. A variety of analytical and visualization tools provide support for examining and comparing IMG/M's datasets. IMG/M allows open access interactive analysis of publicly available datasets, while manual curation, submission and access to private datasets and computationally intensive workspace-based analysis require login/password access to its expert review (ER) companion system (IMG/M ER: https://img.jgi.doe.gov/mer/). Since the last report published in the 2014 NAR Database Issue, IMG/M's dataset content has tripled in terms of number of datasets and overall protein coding genes, while its analysis tools have been extended to cope with the rapid growth in the number and size of datasets handled by the system. PMID:27738135

  10. Unaffiliated Users' Access to Academic Libraries: A Survey.

    ERIC Educational Resources Information Center

    Courtney, Nancy

    2003-01-01

    Most of 814 academic libraries surveyed allow onsite access to unaffiliated users, and many give borrowing privileges to certain categories of users. Use of library computers to access library resources and other computer applications is commonly allowed although authentication on library computers is increasing. Five tables show statistics.…

  11. Full Computer Access for People with Disabilities: The Goal of Transparency.

    ERIC Educational Resources Information Center

    Scheffel, Debora L.; Agnew, Jo

    This paper examines the goal of providing transparent computer access to people with disabilities, especially those with visual impairments. First, four basic strategies to provide this population with access to technology are identified: (1) building features into the computer, operating system, or application programs; (2) using adaptive…

  12. TERRA REF: Advancing phenomics with high resolution, open access sensor and genomics data

    NASA Astrophysics Data System (ADS)

    LeBauer, D.; Kooper, R.; Burnette, M.; Willis, C.

    2017-12-01

    Automated plant measurement has the potential to improve understanding of genetic and environmental controls on plant traits (phenotypes). The application of sensors and software in the automation of high throughput phenotyping reflects a fundamental shift from labor intensive hand measurements to drone, tractor, and robot mounted sensing platforms. These tools are expected to speed the rate of crop improvement by enabling plant breeders to more accurately select plants with improved yields, resource use efficiency, and stress tolerance. However, there are many challenges facing high throughput phenomics: sensors and platforms are expensive, currently there are few standard methods of data collection and storage, and the analysis of large data sets requires high performance computers and automated, reproducible computing pipelines. To overcome these obstacles and advance the science of high throughput phenomics, the TERRA Phenotyping Reference Platform (TERRA-REF) team is developing an open-access database of high resolution sensor data. TERRA REF is an integrated field and greenhouse phenotyping system that includes: a reference field scanner with fifteen sensors that can generate terrabytes of data each day at mm resolution; UAV, tractor, and fixed field sensing platforms; and an automated controlled-environment scanner. These platforms will enable investigation of diverse sensing modalities, and the investigation of traits under controlled and field environments. It is the goal of TERRA REF to lower the barrier to entry for academic and industry researchers by providing high-resolution data, open source software, and online computing resources. Our project is unique in that all data will be made fully public in November 2018, and is already available to early adopters through the beta-user program. We will describe the datasets and how to use them as well as the databases and computing pipeline and how these can be reused and remixed in other phenomics pipelines. Finally, we will describe the National Data Service workbench, a cloud computing platform that can access the petabyte scale data while supporting reproducible research.

  13. EarthCube Activities: Community Engagement Advancing Geoscience Research

    NASA Astrophysics Data System (ADS)

    Kinkade, D.

    2015-12-01

    Our ability to advance scientific research in order to better understand complex Earth systems, address emerging geoscience problems, and meet societal challenges is increasingly dependent upon the concept of Open Science and Data. Although these terms are relatively new to the world of research, Open Science and Data in this context may be described as transparency in the scientific process. This includes the discoverability, public accessibility and reusability of scientific data, as well as accessibility and transparency of scientific communication (www.openscience.org). Scientists and the US government alike are realizing the critical need for easy discovery and access to multidisciplinary data to advance research in the geosciences. The NSF-supported EarthCube project was created to meet this need. EarthCube is developing a community-driven common cyberinfrastructure for the purpose of accessing, integrating, analyzing, sharing and visualizing all forms of data and related resources through advanced technological and computational capabilities. Engaging the geoscience community in EarthCube's development is crucial to its success, and EarthCube is providing several opportunities for geoscience involvement. This presentation will provide an overview of the activities EarthCube is employing to entrain the community in the development process, from governance development and strategic planning, to technical needs gathering. Particular focus will be given to the collection of science-driven use cases as a means of capturing scientific and technical requirements. Such activities inform the development of key technical and computational components that collectively will form a cyberinfrastructure to meet the research needs of the geoscience community.

  14. Method and apparatus for managing access to a memory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    DeBenedictis, Erik

    A method and apparatus for managing access to a memory of a computing system. A controller transforms a plurality of operations that represent a computing job into an operational memory layout that reduces a size of a selected portion of the memory that needs to be accessed to perform the computing job. The controller stores the operational memory layout in a plurality of memory cells within the selected portion of the memory. The controller controls a sequence by which a processor in the computing system accesses the memory to perform the computing job using the operational memory layout. The operationalmore » memory layout reduces an amount of energy consumed by the processor to perform the computing job.« less

  15. Bringing numerous methods for expression and promoter analysis to a public cloud computing service.

    PubMed

    Polanski, Krzysztof; Gao, Bo; Mason, Sam A; Brown, Paul; Ott, Sascha; Denby, Katherine J; Wild, David L

    2018-03-01

    Every year, a large number of novel algorithms are introduced to the scientific community for a myriad of applications, but using these across different research groups is often troublesome, due to suboptimal implementations and specific dependency requirements. This does not have to be the case, as public cloud computing services can easily house tractable implementations within self-contained dependency environments, making the methods easily accessible to a wider public. We have taken 14 popular methods, the majority related to expression data or promoter analysis, developed these up to a good implementation standard and housed the tools in isolated Docker containers which we integrated into the CyVerse Discovery Environment, making these easily usable for a wide community as part of the CyVerse UK project. The integrated apps can be found at http://www.cyverse.org/discovery-environment, while the raw code is available at https://github.com/cyversewarwick and the corresponding Docker images are housed at https://hub.docker.com/r/cyversewarwick/. info@cyverse.warwick.ac.uk or D.L.Wild@warwick.ac.uk. Supplementary data are available at Bioinformatics online. © The Author(s) 2017. Published by Oxford University Press.

  16. Getting the Most out of PubChem for Virtual Screening

    PubMed Central

    Kim, Sunghwan

    2016-01-01

    Introduction With the emergence of the “big data” era, the biomedical research community has great interest in exploiting publicly available chemical information for drug discovery. PubChem is an example of public databases that provide a large amount of chemical information free of charge. Areas covered This article provides an overview of how PubChem’s data, tools, and services can be used for virtual screening and reviews recent publications that discuss important aspects of exploiting PubChem for drug discovery. Expert opinion PubChem offers comprehensive chemical information useful for drug discovery. It also provides multiple programmatic access routes, which are essential to build automated virtual screening pipelines that exploit PubChem data. In addition, PubChemRDF allows users to download PubChem data and load them into a local computing facility, facilitating data integration between PubChem and other resources. PubChem resources have been used in many studies for developing bioactivity and toxicity prediction models, discovering polypharmacologic (multi-target) ligands, and identifying new macromolecule targets of compounds (for drug-repurposing or off-target side effect prediction). These studies demonstrate the usefulness of PubChem as a key resource for computer-aided drug discovery and related area. PMID:27454129

  17. Public-access AED pad application and outcomes for out-of-hospital cardiac arrests in Osaka, Japan.

    PubMed

    Kiyohara, Kosuke; Kitamura, Tetsuhisa; Sakai, Tomohiko; Nishiyama, Chika; Nishiuchi, Tatsuya; Hayashi, Yasuyuki; Sakamoto, Tetsuya; Marukawa, Seishiro; Iwami, Taku

    2016-09-01

    Actual application of public-access automated external defibrillator (AED) pads to patients with an out-of-hospital cardiac arrest (OHCA) by the public has been poorly investigated. AED applications, prehospital characteristics, and one-month outcomes of OHCAs occurring in Osaka Prefecture from 2011 to 2012 were obtained from the Utstein Osaka Project registry. Patients with a non-traumatic OHCA occurring before emergency medical service attendance were enrolled. The proportion of AED pads that were applied to the patients' chests by the public and one-month outcomes were analysed according to the location of OHCA. In total, public-access AED pads were applied to 3.5% of OHCA patients (351/9978) during the study period. In the multivariate analyses, OHCAs that occurred in public places and received bystander-initiated cardiopulmonary resuscitation were associated with significantly higher application of public-access AEDs. Among the patients for whom public-access AED pads were applied, 29.6% (104/351) received public-access defibrillation. One-month survival with a favourable neurological outcome was significantly higher among patients who had an AED applied compared to those who did not (19.4% vs. 3.0%; OR: 2.76 [95% CI: 1.92-3.97]). The application of public-access AEDs leads to favourable outcomes after an OHCA, but utilisation of available equipment remains insufficient, and varies considerably according to the location of the OHCA event. Alongside disseminating public-access AEDs, further strategic approaches for the deployment of AEDs at the scene, as well as basic life support training for the public are required to improve survival rates after OHCAs. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  18. Public Access Report.

    ERIC Educational Resources Information Center

    Anshien, Carol M.; And Others

    A short review of the development of cable television in New York City, a brief description of wiring patterns, a history of public access, and some statistical data on public channel usage are provided in the first portion of this report. The second major part describes the Public Access Celebration, a three-day informational event held in July…

  19. Computer access security code system

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  20. Children's Access to Public Library Services: Prince George's County Memorial Public Library, Maryland, 1980.

    ERIC Educational Resources Information Center

    Gerhardt, Lillian N.

    1981-01-01

    Evaluates the Prince George's County Memorial Public Library's approach to providing access to its services for children, and examines policies, regulations, practices, and conditions that affect such access. Six references are cited. (FM)

  1. Overhauling, updating and augmenting NASA spacelink electronic information system

    NASA Technical Reports Server (NTRS)

    Blake, Jean A.

    1991-01-01

    NASA/Spacelink is a collection of NASA information and educational materials stored on a computer at the MSFC. It is provided by the NASA Educational Affairs Division and is operated by the Education Branch of the Marshall Center Public Affairs Office. It is designed to communicate with a wide variety of computers and modems, especially those most commonly found in classrooms and homes. It was made available to the public in February, 1988. The system may be accessed by educators and the public over regular telephone lines. NASA/Spacelink is free except for the cost of long distance calls. Overhauling and updating Spacelink was done to refurbish NASA/Spacelink, a very valuable resource medium. Several new classroom activities and miscellaneous topics were edited and entered into Spacelink. One of the areas that received a major overhaul (under the guidance of Amos Crisp) was the SPINOFFS BENEFITS, the great benefits resulting from America's space explorations. The Spinoff Benefits include information on a variety of topics including agriculture, communication, the computer, consumer, energy, equipment and materials, food, health, home, industry, medicine, natural resources, public services, recreation, safety, sports, and transportation. In addition to the Space Program Spinoff Benefits, the following is a partial list of some of the material updated and introduced: Astronaut Biographies, Miscellaneous Aeronautics Classroom Activities, Miscellaneous Astronomy Classroom Activities, Miscellaneous Rocketry Classroom Activities, Miscellaneous Classroom Activities, NASA and Its Center, NASA Areas of Research, NASA Patents, Licensing, NASA Technology Transfer, Pictures from Space Classroom Activities, Status of Current NASA Projects, Using Art to Teach Science, and Word Puzzles for Use in the Classroom.

  2. Ubiquitous Accessibility for People with Visual Impairments: Are We There Yet?

    PubMed Central

    Billah, Syed Masum; Ashok, Vikas; Porter, Donald E.; Ramakrishnan, IV

    2017-01-01

    Ubiquitous access is an increasingly common vision of computing, wherein users can interact with any computing device or service from anywhere, at any time. In the era of personal computing, users with visual impairments required special-purpose, assistive technologies, such as screen readers, to interact with computers. This paper investigates whether technologies like screen readers have kept pace with, or have created a barrier to, the trend toward ubiquitous access, with a specific focus on desktop computing as this is still the primary way computers are used in education and employment. Towards that, the paper presents a user study with 21 visually-impaired participants, specifically involving the switching of screen readers within and across different computing platforms, and the use of screen readers in remote access scenarios. Among the findings, the study shows that, even for remote desktop access—an early forerunner of true ubiquitous access—screen readers are too limited, if not unusable. The study also identifies several accessibility needs, such as uniformity of navigational experience across devices, and recommends potential solutions. In summary, assistive technologies have not made the jump into the era of ubiquitous access, and multiple, inconsistent screen readers create new practical problems for users with visual impairments. PMID:28782061

  3. Youth with cerebral palsy with differing upper limb abilities: how do they access computers?

    PubMed

    Davies, T Claire; Chau, Tom; Fehlings, Darcy L; Ameratunga, Shanthi; Stott, N Susan

    2010-12-01

    To identify the current level of awareness of different computer access technologies and the choices made regarding mode of access by youth with cerebral palsy (CP) and their families. Survey. Two tertiary-level rehabilitation centers in New Zealand and Canada. Youth (N=60) with CP, Manual Ability Classification Scale (MACS) levels I to V, age 13 to 25 years. Not applicable. Questionnaire. Fifty (83%) of the 60 youth were aware of at least 1 available assistive technology (AT), such as touch screens and joysticks. However, only 34 youth (57%) were familiar with the accessibility options currently available in the most common operating systems. Thirty-three (94%) of 35 youth who were MACS I and II used a standard mouse and keyboard, while few chose to use assistive technology or accessibility options. In contrast, 10 (40%) of 25 youth who were MACS III to V used a variety of assistive technologies such as touch screens, joysticks, trackballs, and scanning technologies. This group also had the highest use of accessibility options, although only 15 (60%) of the 25 were aware of them. Most youth with CP were aware of, and used, assistive technologies to enhance their computer access but were less knowledgeable about accessibility options. Accessibility options allow users to modify their own computer interface and can thus enhance computer access for youth with CP. Clinicians should be knowledgeable enough to give informed advice in this area of computer access, thus ensuring that all youth with CP can benefit from both AT and accessibility options, as required. Copyright © 2010 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  4. DDBJ read annotation pipeline: a cloud computing-based pipeline for high-throughput analysis of next-generation sequencing data.

    PubMed

    Nagasaki, Hideki; Mochizuki, Takako; Kodama, Yuichi; Saruhashi, Satoshi; Morizaki, Shota; Sugawara, Hideaki; Ohyanagi, Hajime; Kurata, Nori; Okubo, Kousaku; Takagi, Toshihisa; Kaminuma, Eli; Nakamura, Yasukazu

    2013-08-01

    High-performance next-generation sequencing (NGS) technologies are advancing genomics and molecular biological research. However, the immense amount of sequence data requires computational skills and suitable hardware resources that are a challenge to molecular biologists. The DNA Data Bank of Japan (DDBJ) of the National Institute of Genetics (NIG) has initiated a cloud computing-based analytical pipeline, the DDBJ Read Annotation Pipeline (DDBJ Pipeline), for a high-throughput annotation of NGS reads. The DDBJ Pipeline offers a user-friendly graphical web interface and processes massive NGS datasets using decentralized processing by NIG supercomputers currently free of charge. The proposed pipeline consists of two analysis components: basic analysis for reference genome mapping and de novo assembly and subsequent high-level analysis of structural and functional annotations. Users may smoothly switch between the two components in the pipeline, facilitating web-based operations on a supercomputer for high-throughput data analysis. Moreover, public NGS reads of the DDBJ Sequence Read Archive located on the same supercomputer can be imported into the pipeline through the input of only an accession number. This proposed pipeline will facilitate research by utilizing unified analytical workflows applied to the NGS data. The DDBJ Pipeline is accessible at http://p.ddbj.nig.ac.jp/.

  5. DDBJ Read Annotation Pipeline: A Cloud Computing-Based Pipeline for High-Throughput Analysis of Next-Generation Sequencing Data

    PubMed Central

    Nagasaki, Hideki; Mochizuki, Takako; Kodama, Yuichi; Saruhashi, Satoshi; Morizaki, Shota; Sugawara, Hideaki; Ohyanagi, Hajime; Kurata, Nori; Okubo, Kousaku; Takagi, Toshihisa; Kaminuma, Eli; Nakamura, Yasukazu

    2013-01-01

    High-performance next-generation sequencing (NGS) technologies are advancing genomics and molecular biological research. However, the immense amount of sequence data requires computational skills and suitable hardware resources that are a challenge to molecular biologists. The DNA Data Bank of Japan (DDBJ) of the National Institute of Genetics (NIG) has initiated a cloud computing-based analytical pipeline, the DDBJ Read Annotation Pipeline (DDBJ Pipeline), for a high-throughput annotation of NGS reads. The DDBJ Pipeline offers a user-friendly graphical web interface and processes massive NGS datasets using decentralized processing by NIG supercomputers currently free of charge. The proposed pipeline consists of two analysis components: basic analysis for reference genome mapping and de novo assembly and subsequent high-level analysis of structural and functional annotations. Users may smoothly switch between the two components in the pipeline, facilitating web-based operations on a supercomputer for high-throughput data analysis. Moreover, public NGS reads of the DDBJ Sequence Read Archive located on the same supercomputer can be imported into the pipeline through the input of only an accession number. This proposed pipeline will facilitate research by utilizing unified analytical workflows applied to the NGS data. The DDBJ Pipeline is accessible at http://p.ddbj.nig.ac.jp/. PMID:23657089

  6. Internet and computer access and use for health information in an underserved community.

    PubMed

    Kind, Terry; Huang, Zhihuan J; Farr, Deeonna; Pomerantz, Karyn L

    2005-01-01

    The "digital divide" is the gap between those with access to information tools such as the Internet and those without access. The gap has been described by income, education, age, and race. Little information exists on computer and Internet access and use for health information by parents, particularly among populations of low income and low education level. To describe computer and Internet access and use, including health information retrieval, among low-income, urban, African American caregivers (parents). Cross-sectional survey administered in pediatric waiting rooms of urban community-based health centers in a low-income area. Caregivers of pediatric outpatients. Access to computers, Internet access, and use of Internet for health information. In 2003, among 260 African Americans who completed surveys, 58% had a computer and 41% had home Internet access. Fifty-two percent had used the Internet for finding health information. Ninety-three percent agreed or strongly agreed that there is useful health information on the Internet. Ninety-two percent agreed or strongly agreed that they would want to talk with a medical professional about health information on the Internet. Sixty-five percent of respondents had no additional schooling after high school. Annual household income was

  7. Overcoming Spatial and Temporal Barriers to Public Access Defibrillators Via Optimization.

    PubMed

    Sun, Christopher L F; Demirtas, Derya; Brooks, Steven C; Morrison, Laurie J; Chan, Timothy C Y

    2016-08-23

    Immediate access to an automated external defibrillator (AED) increases the chance of survival for out-of-hospital cardiac arrest (OHCA). Current deployment usually considers spatial AED access, assuming AEDs are available 24 h a day. The goal of this study was to develop an optimization model for AED deployment, accounting for spatial and temporal accessibility, to evaluate if OHCA coverage would improve compared with deployment based on spatial accessibility alone. This study was a retrospective population-based cohort trial using data from the Toronto Regional RescuNET Epistry cardiac arrest database. We identified all nontraumatic public location OHCAs in Toronto, Ontario, Canada (January 2006 through August 2014) and obtained a list of registered AEDs (March 2015) from Toronto Paramedic Services. Coverage loss due to limited temporal access was quantified by comparing the number of OHCAs that occurred within 100 meters of a registered AED (assumed coverage 24 h per day, 7 days per week) with the number that occurred both within 100 meters of a registered AED and when the AED was available (actual coverage). A spatiotemporal optimization model was then developed that determined AED locations to maximize OHCA actual coverage and overcome the reported coverage loss. The coverage gain between the spatiotemporal model and a spatial-only model was computed by using 10-fold cross-validation. A total of 2,440 nontraumatic public OHCAs and 737 registered AED locations were identified. A total of 451 OHCAs were covered by registered AEDs under assumed coverage 24 h per day, 7 days per week, and 354 OHCAs under actual coverage, representing a coverage loss of 21.5% (p < 0.001). Using the spatiotemporal model to optimize AED deployment, a 25.3% relative increase in actual coverage was achieved compared with the spatial-only approach (p < 0.001). One in 5 OHCAs occurred near an inaccessible AED at the time of the OHCA. Potential AED use was significantly improved with a spatiotemporal optimization model guiding deployment. Copyright © 2016 American College of Cardiology Foundation. Published by Elsevier Inc. All rights reserved.

  8. Virtual Computing Laboratories: A Case Study with Comparisons to Physical Computing Laboratories

    ERIC Educational Resources Information Center

    Burd, Stephen D.; Seazzu, Alessandro F.; Conway, Christopher

    2009-01-01

    Current technology enables schools to provide remote or virtual computing labs that can be implemented in multiple ways ranging from remote access to banks of dedicated workstations to sophisticated access to large-scale servers hosting virtualized workstations. This paper reports on the implementation of a specific lab using remote access to…

  9. Computers in Academic Architecture Libraries.

    ERIC Educational Resources Information Center

    Willis, Alfred; And Others

    1992-01-01

    Computers are widely used in architectural research and teaching in U.S. schools of architecture. A survey of libraries serving these schools sought information on the emphasis placed on computers by the architectural curriculum, accessibility of computers to library staff, and accessibility of computers to library patrons. Survey results and…

  10. Technological advancements and Internet sexuality: does private access to the Internet influence online sexual behavior?

    PubMed

    Daneback, Kristian; Månsson, Sven-Axel; Ross, Michael W

    2012-08-01

    The aim of this study was to investigate whether demographic characteristics and sexual behavior online and offline were associated with private, respectively, nonprivate access to the Internet in a Web sample of people who use the Internet for sexual purposes. A total of 1,913 respondents completed an online questionnaire about Internet sexuality, and 1,614 reported using the Internet for sexual purposes. The majority of these respondents reported having access to an Internet-connected computer no one else had access to (62 percent women and 70 percent men). The results showed that it is possible to differentiate between those who have access to an Internet-connected computer no one else has access to and those who have shared access to an Internet-connected computer. Not only did they differ in demographic characteristics, but also in the sexual activities they engaged in on the Internet. Different patterns were found for women and men. For example, men who had private access to Internet-connected computers were more likely than those who had shared access to seek information about sexual issues. Thus, having access to Internet computers no one else has access to may promote sexual knowledge and health for men. The results of this study along with the technological development implies that in future research, attention should be paid to where and how people access the Internet in relation to online behavior in general and online sexual behavior in particular.

  11. Technological Advancements and Internet Sexuality: Does Private Access to the Internet Influence Online Sexual Behavior?

    PubMed Central

    Månsson, Sven-Axel; Ross, Michael W.

    2012-01-01

    Abstract The aim of this study was to investigate whether demographic characteristics and sexual behavior online and offline were associated with private, respectively, nonprivate access to the Internet in a Web sample of people who use the Internet for sexual purposes. A total of 1,913 respondents completed an online questionnaire about Internet sexuality, and 1,614 reported using the Internet for sexual purposes. The majority of these respondents reported having access to an Internet-connected computer no one else had access to (62 percent women and 70 percent men). The results showed that it is possible to differentiate between those who have access to an Internet-connected computer no one else has access to and those who have shared access to an Internet-connected computer. Not only did they differ in demographic characteristics, but also in the sexual activities they engaged in on the Internet. Different patterns were found for women and men. For example, men who had private access to Internet-connected computers were more likely than those who had shared access to seek information about sexual issues. Thus, having access to Internet computers no one else has access to may promote sexual knowledge and health for men. The results of this study along with the technological development implies that in future research, attention should be paid to where and how people access the Internet in relation to online behavior in general and online sexual behavior in particular. PMID:22823598

  12. Poor Access for African Researchers to African Emergency Care Publications: A Cross-sectional Study

    PubMed Central

    Bruijns, Stevan R.; Maesela, Mmapeladi; Sinha, Suniti; Banner, Megan

    2017-01-01

    Introduction Based on relative population size and burden of disease, emergency care publication outputs from low- and middle-income regions are disproportionately lower than those of high-income regions. Ironically, outputs from regions with higher publication rates are often less relevant in the African context. As a result, the dissemination of and access to local research is essential to local researchers, but the cost of this access (actual and cost-wise) remains unknown. The aim of this study was to describe access to African emergency care publications in terms of publisher-based access (open access or subscription) and alternate access (self-archived or author provided), as well as the cost of access. Methods We conducted a retrospective, cross-sectional study using all emergency medicine publications included in Scopus between 2011 and 2015. A sequential search strategy described access to each article, and we calculated mean article charges against the purchasing power parity index (used to describe out-of-pocket expense). Results We included 666 publications from 49 journals, of which 395 (59.3%) were open access. For subscription-based articles, 106 (39.1%) were self-archived, 60 (22.1%) were author-provided, and 105 (38.8%) were inaccessible. Mean article access cost was $36.44, and mean processing charge was $2,319.34. Using the purchasing power parity index it was calculated that equivalent out-of-pocket expenditure for South African, Ghanaian and Tanzanian authors would respectively be $15.77, $10.44 and $13.04 for access, and $1,004.02, $664.36 and $830.27 for processing. Based on this, the corrected cost of a single-unit article access or process charge for South African, Ghanaian and Tanzanian authors, respectively, was 2.3, 3.5 and 2.8 times higher than the standard rate. Conclusion One in six African emergency care publications are inaccessible outside institutional library subscriptions; additionally, the cost of access to publications in low- and middle-income countries appears prohibitive. Publishers should strongly consider revising pricing for more equitable access for researchers from low- and middle-income countries. PMID:29085532

  13. Poor Access for African Researchers to African Emergency Care Publications: A Cross-sectional Study.

    PubMed

    Bruijns, Stevan R; Maesela, Mmapeladi; Sinha, Suniti; Banner, Megan

    2017-10-01

    Based on relative population size and burden of disease, emergency care publication outputs from low- and middle-income regions are disproportionately lower than those of high-income regions. Ironically, outputs from regions with higher publication rates are often less relevant in the African context. As a result, the dissemination of and access to local research is essential to local researchers, but the cost of this access (actual and cost-wise) remains unknown. The aim of this study was to describe access to African emergency care publications in terms of publisher-based access (open access or subscription) and alternate access (self-archived or author provided), as well as the cost of access. We conducted a retrospective, cross-sectional study using all emergency medicine publications included in Scopus between 2011 and 2015. A sequential search strategy described access to each article, and we calculated mean article charges against the purchasing power parity index (used to describe out-of-pocket expense). We included 666 publications from 49 journals, of which 395 (59.3%) were open access. For subscription-based articles, 106 (39.1%) were self-archived, 60 (22.1%) were author-provided, and 105 (38.8%) were inaccessible. Mean article access cost was $36.44, and mean processing charge was $2,319.34. Using the purchasing power parity index it was calculated that equivalent out-of-pocket expenditure for South African, Ghanaian and Tanzanian authors would respectively be $15.77, $10.44 and $13.04 for access, and $1,004.02, $664.36 and $830.27 for processing. Based on this, the corrected cost of a single-unit article access or process charge for South African, Ghanaian and Tanzanian authors, respectively, was 2.3, 3.5 and 2.8 times higher than the standard rate. One in six African emergency care publications are inaccessible outside institutional library subscriptions; additionally, the cost of access to publications in low- and middle-income countries appears prohibitive. Publishers should strongly consider revising pricing for more equitable access for researchers from low- and middle-income countries.

  14. xGDBvm: A Web GUI-Driven Workflow for Annotating Eukaryotic Genomes in the Cloud[OPEN

    PubMed Central

    Merchant, Nirav

    2016-01-01

    Genome-wide annotation of gene structure requires the integration of numerous computational steps. Currently, annotation is arguably best accomplished through collaboration of bioinformatics and domain experts, with broad community involvement. However, such a collaborative approach is not scalable at today’s pace of sequence generation. To address this problem, we developed the xGDBvm software, which uses an intuitive graphical user interface to access a number of common genome analysis and gene structure tools, preconfigured in a self-contained virtual machine image. Once their virtual machine instance is deployed through iPlant’s Atmosphere cloud services, users access the xGDBvm workflow via a unified Web interface to manage inputs, set program parameters, configure links to high-performance computing (HPC) resources, view and manage output, apply analysis and editing tools, or access contextual help. The xGDBvm workflow will mask the genome, compute spliced alignments from transcript and/or protein inputs (locally or on a remote HPC cluster), predict gene structures and gene structure quality, and display output in a public or private genome browser complete with accessory tools. Problematic gene predictions are flagged and can be reannotated using the integrated yrGATE annotation tool. xGDBvm can also be configured to append or replace existing data or load precomputed data. Multiple genomes can be annotated and displayed, and outputs can be archived for sharing or backup. xGDBvm can be adapted to a variety of use cases including de novo genome annotation, reannotation, comparison of different annotations, and training or teaching. PMID:27020957

  15. xGDBvm: A Web GUI-Driven Workflow for Annotating Eukaryotic Genomes in the Cloud.

    PubMed

    Duvick, Jon; Standage, Daniel S; Merchant, Nirav; Brendel, Volker P

    2016-04-01

    Genome-wide annotation of gene structure requires the integration of numerous computational steps. Currently, annotation is arguably best accomplished through collaboration of bioinformatics and domain experts, with broad community involvement. However, such a collaborative approach is not scalable at today's pace of sequence generation. To address this problem, we developed the xGDBvm software, which uses an intuitive graphical user interface to access a number of common genome analysis and gene structure tools, preconfigured in a self-contained virtual machine image. Once their virtual machine instance is deployed through iPlant's Atmosphere cloud services, users access the xGDBvm workflow via a unified Web interface to manage inputs, set program parameters, configure links to high-performance computing (HPC) resources, view and manage output, apply analysis and editing tools, or access contextual help. The xGDBvm workflow will mask the genome, compute spliced alignments from transcript and/or protein inputs (locally or on a remote HPC cluster), predict gene structures and gene structure quality, and display output in a public or private genome browser complete with accessory tools. Problematic gene predictions are flagged and can be reannotated using the integrated yrGATE annotation tool. xGDBvm can also be configured to append or replace existing data or load precomputed data. Multiple genomes can be annotated and displayed, and outputs can be archived for sharing or backup. xGDBvm can be adapted to a variety of use cases including de novo genome annotation, reannotation, comparison of different annotations, and training or teaching. © 2016 American Society of Plant Biologists. All rights reserved.

  16. Completeness and overlap in open access systems: Search engines, aggregate institutional repositories and physics-related open sources

    PubMed Central

    Wu, Tai-luan; Tseng, Ling-li

    2017-01-01

    This study examines the completeness and overlap of coverage in physics of six open access scholarly communication systems, including two search engines (Google Scholar and Microsoft Academic), two aggregate institutional repositories (OAIster and OpenDOAR), and two physics-related open sources (arXiv.org and Astrophysics Data System). The 2001–2013 Nobel Laureates in Physics served as the sample. Bibliographic records of their publications were retrieved and downloaded from each system, and a computer program was developed to perform the analytical tasks of sorting, comparison, elimination, aggregation and statistical calculations. Quantitative analyses and cross-referencing were performed to determine the completeness and overlap of the system coverage of the six open access systems. The results may enable scholars to select an appropriate open access system as an efficient scholarly communication channel, and academic institutions may build institutional repositories or independently create citation index systems in the future. Suggestions on indicators and tools for academic assessment are presented based on the comprehensiveness assessment of each system. PMID:29267327

  17. Web-phreeq: a WWW instructional tool for modeling the distribution of chemical species in water

    NASA Astrophysics Data System (ADS)

    Saini-Eidukat, Bernhardt; Yahin, Andrew

    1999-05-01

    A WWW-based tool, WEB-PHREEQ, was developed for classroom teaching and for routine calculation of low temperature aqueous speciation. Accessible with any computer that has an internet-connected forms-capable WWW-browser, WEB-PHREEQ provides user interface and other support for modeling, creates a properly formatted input file, passes it to the public domain program PHREEQC and returns the output to the WWW browser. Users can calculate the equilibrium speciation of a solution over a range of temperatures or can react solid minerals or gases with a particular water and examine the resulting chemistry. WEB-PHREEQ is one of a number of interactive distributed-computing programs available on the WWW that are of interest to geoscientists.

  18. Menu-driven cloud computing and resource sharing for R and Bioconductor

    PubMed Central

    Bolouri, Hamid; Angerman, Michael

    2011-01-01

    Summary: We report CRdata.org, a cloud-based, free, open-source web server for running analyses and sharing data and R scripts with others. In addition to using the free, public service, CRdata users can launch their own private Amazon Elastic Computing Cloud (EC2) nodes and store private data and scripts on Amazon's Simple Storage Service (S3) with user-controlled access rights. All CRdata services are provided via point-and-click menus. Availability and Implementation: CRdata is open-source and free under the permissive MIT License (opensource.org/licenses/mit-license.php). The source code is in Ruby (ruby-lang.org/en/) and available at: github.com/seerdata/crdata. Contact: hbolouri@fhcrc.org PMID:21685055

  19. The Education Value of Cloud Computing

    ERIC Educational Resources Information Center

    Katzan, Harry, Jr.

    2010-01-01

    Cloud computing is a technique for supplying computer facilities and providing access to software via the Internet. Cloud computing represents a contextual shift in how computers are provisioned and accessed. One of the defining characteristics of cloud software service is the transfer of control from the client domain to the service provider.…

  20. Bridging the digital divide through the integration of computer and information technology in science education: An action research study

    NASA Astrophysics Data System (ADS)

    Brown, Gail Laverne

    The presence of a digital divide, computer and information technology integration effectiveness, and barriers to continued usage of computer and information technology were investigated. Thirty-four African American and Caucasian American students (17 males and 17 females) in grades 9--11 from 2 Georgia high school science classes were exposed to 30 hours of hands-on computer and information technology skills. The purpose of the exposure was to improve students' computer and information technology skills. Pre-study and post-study skills surveys, and structured interviews were used to compare race, gender, income, grade-level, and age differences with respect to computer usage. A paired t-test and McNemar test determined mean differences between student pre-study and post-study perceived skills levels. The results were consistent with findings of the National Telecommunications and Information Administration (2000) that indicated the presence of a digital divide and digital inclusion. Caucasian American participants were found to have more at-home computer and Internet access than African American participants, indicating that there is a digital divide by ethnicity. Caucasian American females were found to have more computer and Internet access which was an indication of digital inclusion. Sophomores had more at-home computer access and Internet access than other levels indicating digital inclusion. Students receiving regular meals had more computer and Internet access than students receiving free/reduced meals. Older students had more computer and Internet access than younger students. African American males had been using computer and information technology the longest which is an indication of inclusion. The paired t-test and McNemar test revealed significant perceived student increases in all skills levels. Interviews did not reveal any barriers to continued usage of the computer and information technology skills.

  1. SIPP ACCESS: Information Tools Improve Access to National Longitudinal Panel Surveys.

    ERIC Educational Resources Information Center

    Robbin, Alice; David, Martin

    1988-01-01

    A computer-based, integrated information system incorporating data and information about the data, SIPP ACCESS systematically links technologies of laser disk, mainframe computer, microcomputer, and electronic networks, and applies relational technology to provide access to information about complex statistical data collections. Examples are given…

  2. 45 CFR 2301.149 - Program accessibility: Discrimination prohibited.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Program accessibility: Discrimination prohibited. 2301.149 Section 2301.149 Public Welfare Regulations Relating to Public Welfare (Continued) ARCTIC... CONDUCTED BY THE UNITED STATES ARCTIC RESEARCH COMMISSION § 2301.149 Program accessibility: Discrimination...

  3. 45 CFR 2301.149 - Program accessibility: Discrimination prohibited.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 4 2011-10-01 2011-10-01 false Program accessibility: Discrimination prohibited. 2301.149 Section 2301.149 Public Welfare Regulations Relating to Public Welfare (Continued) ARCTIC... CONDUCTED BY THE UNITED STATES ARCTIC RESEARCH COMMISSION § 2301.149 Program accessibility: Discrimination...

  4. Public Libraries and Internet Public Access Models: Describing Possible Approaches.

    ERIC Educational Resources Information Center

    Tomasello, Tami K.; McClure, Charles R.

    2002-01-01

    Discusses ways of providing Internet access to the general public and analyzes eight models currently in use: public schools, public libraries, cybermobiles, public housing, community technology centers, community networks, kiosks, and cyber cafes. Concludes that public libraries may wish to develop collaborative strategies with other…

  5. Preface - Access to Knowledge Revisited

    PubMed Central

    Humphreys, Betsy L.

    2016-01-01

    Summary Objective To review and update the Preface to the 1998 Yearbook of Medical Informatics, which had as its Special Topic “Health Informatics and the Internet”. Method Assessment of the accuracy of predictions made in 1998 and consideration of key developments in informatics since that time. Results Predictions made in 1998 were generally accurate regarding reduced dependence on keyboards, expansion of multimedia, medical data privacy policy development, impact of molecular biology on knowledge and treatment of neoplasms, and use of imaging and informatics to advance understanding of brain structure and function. Key developments since 1998 include the huge increase in publicly available electronic information; acknowledgement by leaders in government and science of the importance of biomedical informatics to societal goals for health, health care, and scientific discovery; the influence of the public in promoting clinical research transparency and free access to government-funded research results; the long-awaited arrival of electronic health records; and the “Cloud” as a 21st century reformulation of contracting out the computer center. Conclusions There are many challenging and important problems that deserve the attention of the informatics community. Informatics researchers will be best served by embracing a very broad definition of medical informatics and by promoting public understanding of the field. PMID:27199193

  6. IMPACT: a generic tool for modelling and simulating public health policy.

    PubMed

    Ainsworth, J D; Carruthers, E; Couch, P; Green, N; O'Flaherty, M; Sperrin, M; Williams, R; Asghar, Z; Capewell, S; Buchan, I E

    2011-01-01

    Populations are under-served by local health policies and management of resources. This partly reflects a lack of realistically complex models to enable appraisal of a wide range of potential options. Rising computing power coupled with advances in machine learning and healthcare information now enables such models to be constructed and executed. However, such models are not generally accessible to public health practitioners who often lack the requisite technical knowledge or skills. To design and develop a system for creating, executing and analysing the results of simulated public health and healthcare policy interventions, in ways that are accessible and usable by modellers and policy-makers. The system requirements were captured and analysed in parallel with the statistical method development for the simulation engine. From the resulting software requirement specification the system architecture was designed, implemented and tested. A model for Coronary Heart Disease (CHD) was created and validated against empirical data. The system was successfully used to create and validate the CHD model. The initial validation results show concordance between the simulation results and the empirical data. We have demonstrated the ability to connect health policy-modellers and policy-makers in a unified system, thereby making population health models easier to share, maintain, reuse and deploy.

  7. A database to enable discovery and design of piezoelectric materials

    PubMed Central

    de Jong, Maarten; Chen, Wei; Geerlings, Henry; Asta, Mark; Persson, Kristin Aslaug

    2015-01-01

    Piezoelectric materials are used in numerous applications requiring a coupling between electrical fields and mechanical strain. Despite the technological importance of this class of materials, for only a small fraction of all inorganic compounds which display compatible crystallographic symmetry, has piezoelectricity been characterized experimentally or computationally. In this work we employ first-principles calculations based on density functional perturbation theory to compute the piezoelectric tensors for nearly a thousand compounds, thereby increasing the available data for this property by more than an order of magnitude. The results are compared to select experimental data to establish the accuracy of the calculated properties. The details of the calculations are also presented, along with a description of the format of the database developed to make these computational results publicly available. In addition, the ways in which the database can be accessed and applied in materials development efforts are described. PMID:26451252

  8. A Review of Enhanced Sampling Approaches for Accelerated Molecular Dynamics

    NASA Astrophysics Data System (ADS)

    Tiwary, Pratyush; van de Walle, Axel

    Molecular dynamics (MD) simulations have become a tool of immense use and popularity for simulating a variety of systems. With the advent of massively parallel computer resources, one now routinely sees applications of MD to systems as large as hundreds of thousands to even several million atoms, which is almost the size of most nanomaterials. However, it is not yet possible to reach laboratory timescales of milliseconds and beyond with MD simulations. Due to the essentially sequential nature of time, parallel computers have been of limited use in solving this so-called timescale problem. Instead, over the years a large range of statistical mechanics based enhanced sampling approaches have been proposed for accelerating molecular dynamics, and accessing timescales that are well beyond the reach of the fastest computers. In this review we provide an overview of these approaches, including the underlying theory, typical applications, and publicly available software resources to implement them.

  9. [Profile, competencies and digital fluency of nurses in the Professional Improvement Program].

    PubMed

    Tanabe, Lyvia Pini; Kobayashi, Rika Miyahara

    2013-08-01

    A descriptive exploratory study conducted in the city of São Paulo, which aimed to identify the profile, competencies and digital fluency of nurses in the Professional Improvement Program in handling technology at work. The population, composed by 60 nurses in the program, answered a questionnaire with data about profile, digital fluency and professional competencies. The participants were found to be: 95.0% female, 61.7% between 23 and 25 years old, 75.0% from public schools, 58.3% enrolled in cardiovascular nursing, 98.3% had contact with computing resources during graduation, 100.0% had a computer at home, 86.7% accessed the internet daily, 96.7% used Messenger and 58.3% had an intermediate level of knowledge and skill in computing. Professional competencies required for technology management referred to knowing how to be innovative, creative, and updated to identify and manage software and to use technological resources.

  10. Nature Research journals reproducibility policies and initiatives in the Earth sciences

    NASA Astrophysics Data System (ADS)

    VanDecar, J. C.

    2016-12-01

    The Nature Research journals strongly support the long-term endeavour by funders, institutions, researchers and publishers toward increasing the reliability and reproducibility of published research. In the Earth, space and environmental sciences this mainly takes the form of ensuring that underlying data and methods in each manuscript are made as transparent and accessible as possible. Supporting data must be made available to editors and peer reviewers at the time of submission for the purposes of evaluating each manuscript. But the preferred way to share data sets is via public repositories. When appropriate community repositories are available, we strongly encourage authors to deposit their data prior to publication. We also now require that a statement be included in each manuscript, under the heading "Data availability", indicating whether and how the data can be accessed, including any restrictions to access. To allow authors to describe their experimental design and methods in as much detail as necessary, the Nature Research journals have effectively abolished space restrictions on online methods sections. To further increase transparency, we also encourage authors to provide tables of the data behind graphs and figures as Source Data. This builds on our established data-deposition policy for specific experiments and large data sets. The Source Data is made available directly from the figure legend, for easy access. We also require that details of geological samples and palaeontological specimens include clear provenance information to ensure full transparency of the research methods. Palaeontological and type specimens must be deposited in a recognised museum or collection to permit free access by other researchers in perpetuity. Finally, authors must make available upon request, to editors and reviewers, any previously unreported custom computer code used to generate results that are reported in the paper and central to its main claims. For all studies using custom code that is deemed central to the conclusions, a statement must be included, under the heading "Code availability", indicating whether and how the code can be accessed, including any restrictions to access.

  11. Cloud based emergency health care information service in India.

    PubMed

    Karthikeyan, N; Sukanesh, R

    2012-12-01

    A hospital is a health care organization providing patient treatment by expert physicians, surgeons and equipments. A report from a health care accreditation group says that miscommunication between patients and health care providers is the reason for the gap in providing emergency medical care to people in need. In developing countries, illiteracy is the major key root for deaths resulting from uncertain diseases constituting a serious public health problem. Mentally affected, differently abled and unconscious patients can't communicate about their medical history to the medical practitioners. Also, Medical practitioners can't edit or view DICOM images instantly. Our aim is to provide palm vein pattern recognition based medical record retrieval system, using cloud computing for the above mentioned people. Distributed computing technology is coming in the new forms as Grid computing and Cloud computing. These new forms are assured to bring Information Technology (IT) as a service. In this paper, we have described how these new forms of distributed computing will be helpful for modern health care industries. Cloud Computing is germinating its benefit to industrial sectors especially in medical scenarios. In Cloud Computing, IT-related capabilities and resources are provided as services, via the distributed computing on-demand. This paper is concerned with sprouting software as a service (SaaS) by means of Cloud computing with an aim to bring emergency health care sector in an umbrella with physical secured patient records. In framing the emergency healthcare treatment, the crucial thing considered necessary to decide about patients is their previous health conduct records. Thus a ubiquitous access to appropriate records is essential. Palm vein pattern recognition promises a secured patient record access. Likewise our paper reveals an efficient means to view, edit or transfer the DICOM images instantly which was a challenging task for medical practitioners in the past years. We have developed two services for health care. 1. Cloud based Palm vein recognition system 2. Distributed Medical image processing tools for medical practitioners.

  12. Architecture of a framework for providing information services for public transport.

    PubMed

    García, Carmelo R; Pérez, Ricardo; Lorenzo, Alvaro; Quesada-Arencibia, Alexis; Alayón, Francisco; Padrón, Gabino

    2012-01-01

    This paper presents OnRoute, a framework for developing and running ubiquitous software that provides information services to passengers of public transportation, including payment systems and on-route guidance services. To achieve a high level of interoperability, accessibility and context awareness, OnRoute uses the ubiquitous computing paradigm. To guarantee the quality of the software produced, the reliable software principles used in critical contexts, such as automotive systems, are also considered by the framework. The main components of its architecture (run-time, system services, software components and development discipline) and how they are deployed in the transportation network (stations and vehicles) are described in this paper. Finally, to illustrate the use of OnRoute, the development of a guidance service for travellers is explained.

  13. 45 CFR 2490.150 - Program accessibility: Existing facilities.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 4 2013-10-01 2013-10-01 false Program accessibility: Existing facilities. 2490.150 Section 2490.150 Public Welfare Regulations Relating to Public Welfare (Continued) JAMES MADISON... ACTIVITIES CONDUCTED BY THE JAMES MADISON MEMORIAL FELLOWSHIP FOUNDATION § 2490.150 Program accessibility...

  14. 45 CFR 2490.150 - Program accessibility: Existing facilities.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 4 2012-10-01 2012-10-01 false Program accessibility: Existing facilities. 2490.150 Section 2490.150 Public Welfare Regulations Relating to Public Welfare (Continued) JAMES MADISON... ACTIVITIES CONDUCTED BY THE JAMES MADISON MEMORIAL FELLOWSHIP FOUNDATION § 2490.150 Program accessibility...

  15. 45 CFR 2490.150 - Program accessibility: Existing facilities.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 4 2014-10-01 2014-10-01 false Program accessibility: Existing facilities. 2490.150 Section 2490.150 Public Welfare Regulations Relating to Public Welfare (Continued) JAMES MADISON... ACTIVITIES CONDUCTED BY THE JAMES MADISON MEMORIAL FELLOWSHIP FOUNDATION § 2490.150 Program accessibility...

  16. 45 CFR 2490.150 - Program accessibility: Existing facilities.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 4 2011-10-01 2011-10-01 false Program accessibility: Existing facilities. 2490.150 Section 2490.150 Public Welfare Regulations Relating to Public Welfare (Continued) JAMES MADISON... ACTIVITIES CONDUCTED BY THE JAMES MADISON MEMORIAL FELLOWSHIP FOUNDATION § 2490.150 Program accessibility...

  17. 45 CFR 2301.150 - Program accessibility: Existing facilities.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Program accessibility: Existing facilities. 2301.150 Section 2301.150 Public Welfare Regulations Relating to Public Welfare (Continued) ARCTIC RESEARCH... THE UNITED STATES ARCTIC RESEARCH COMMISSION § 2301.150 Program accessibility: Existing facilities. (a...

  18. 45 CFR 2301.150 - Program accessibility: Existing facilities.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 4 2011-10-01 2011-10-01 false Program accessibility: Existing facilities. 2301.150 Section 2301.150 Public Welfare Regulations Relating to Public Welfare (Continued) ARCTIC RESEARCH... THE UNITED STATES ARCTIC RESEARCH COMMISSION § 2301.150 Program accessibility: Existing facilities. (a...

  19. Australian Infection Control Association members' use of skills and resources that promote evidence-based infection control.

    PubMed

    Murphy, C L; McLaws, M

    2000-04-01

    To adopt an evidence-based approach, professionals must be able to access, identify, interpret, and critically appraise best evidence. Critical appraisal requires essential skills, such as computer literacy and an understanding of research principles. These skills also are required for professionals to contribute to evidence. In 1996, members of the Australian Infection Control Association were surveyed to establish a profile including the extent to which they were reading infection control publications, using specific documents for policy and guideline development, developing and undertaking research, publishing research, and using computers. The relationships between demographics, computer use, and research activity were examined. The response rate was 63. 4% (630/993). The study group comprised mostly women (96.1%), and most (66.4%) were older than 40 years of age. Median infection control experience was 4 years (mean, 5.4 years; range, <12 months to 35 years). When developing guidelines and policies (92.7%; 584/630), infection control professionals reviewed State Health Department Infection Control Guidelines and Regulations. Research relating to infection control was undertaken by 21.5% (135/628) of the sample, and 27.6% (37/134) of this group published their research findings. Of the respondents (51.1%; 318/622) who used a computer to undertake infection control tasks, the majority (89.0%) used a personal computer for word processing. Regardless of infection control experience, Australian infection control professionals must be adequately prepared to contribute to, access, appraise, and where appropriate, apply best evidence to their practice. We suggest that computer literacy, an understanding of research principles, and familiarity with infection control literature are three essential skills that infection control professionals must possess and regularly exercise.

  20. The RNASeq-er API-a gateway to systematically updated analysis of public RNA-seq data.

    PubMed

    Petryszak, Robert; Fonseca, Nuno A; Füllgrabe, Anja; Huerta, Laura; Keays, Maria; Tang, Y Amy; Brazma, Alvis

    2017-07-15

    The exponential growth of publicly available RNA-sequencing (RNA-Seq) data poses an increasing challenge to researchers wishing to discover, analyse and store such data, particularly those based in institutions with limited computational resources. EMBL-EBI is in an ideal position to address these challenges and to allow the scientific community easy access to not just raw, but also processed RNA-Seq data. We present a Web service to access the results of a systematically and continually updated standardized alignment as well as gene and exon expression quantification of all public bulk (and in the near future also single-cell) RNA-Seq runs in 264 species in European Nucleotide Archive, using Representational State Transfer. The RNASeq-er API (Application Programming Interface) enables ontology-powered search for and retrieval of CRAM, bigwig and bedGraph files, gene and exon expression quantification matrices (Fragments Per Kilobase Of Exon Per Million Fragments Mapped, Transcripts Per Million, raw counts) as well as sample attributes annotated with ontology terms. To date over 270 00 RNA-Seq runs in nearly 10 000 studies (1PB of raw FASTQ data) in 264 species in ENA have been processed and made available via the API. The RNASeq-er API can be accessed at http://www.ebi.ac.uk/fg/rnaseq/api . The commands used to analyse the data are available in supplementary materials and at https://github.com/nunofonseca/irap/wiki/iRAP-single-library . rnaseq@ebi.ac.uk ; rpetry@ebi.ac.uk. Supplementary data are available at Bioinformatics online. © The Author(s) 2017. Published by Oxford University Press.

  1. He just wants to play: how goals determine the influence of violent computer games on aggression.

    PubMed

    Denzler, Markus; Häfner, Michael; Förster, Jens

    2011-12-01

    Generally, the accessibility of goal-related constructs is inhibited upon goal fulfillment. In line with this notion, the current studies explored whether violent computer games may reduce relative accessibility of aggression if the game involves the fulfillment of an aggressive goal. Specifically, in Study 1, participants who watched a trailer for a violent computer game that fulfilled the goal of venting anger showed less relative accessibility of aggression compared to participants who watched the trailer without goal fulfillment. In Study 2, actually playing a violent computer game to vent anger also decreased the relative accessibility of aggression compared to a control condition in which the game was played without such a goal. Lastly, in Study 3, the relative accessibility of aggression was reduced after playing a violent computer game for participants who reported a high general tendency to vent their anger.

  2. CyVerse Data Commons: lessons learned in cyberinfrastructure management and data hosting from the Life Sciences

    NASA Astrophysics Data System (ADS)

    Swetnam, T. L.; Walls, R.; Merchant, N.

    2017-12-01

    CyVerse, is a US National Science Foundation funded initiative "to design, deploy, and expand a national cyberinfrastructure for life sciences research, and to train scientists in its use," supporting and enabling cross disciplinary collaborations across institutions. CyVerse' free, open-source, cyberinfrastructure is being adopted into biogeoscience and space sciences research. CyVerse data-science agnostic platforms provide shared data storage, high performance computing, and cloud computing that allow analysis of very large data sets (including incomplete or work-in-progress data sets). Part of CyVerse success has been in addressing the handling of data through its entire lifecycle, from creation to final publication in a digital data repository to reuse in new analyses. CyVerse developers and user communities have learned many lessons that are germane to Earth and Environmental Science. We present an overview of the tools and services available through CyVerse including: interactive computing with the Discovery Environment (https://de.cyverse.org/), an interactive data science workbench featuring data storage and transfer via the Data Store; cloud computing with Atmosphere (https://atmo.cyverse.org); and access to HPC via Agave API (https://agaveapi.co/). Each CyVerse service emphasizes access to long term data storage, including our own Data Commons (http://datacommons.cyverse.org), as well as external repositories. The Data Commons service manages, organizes, preserves, publishes, allows for discovery and reuse of data. All data published to CyVerse's Curated Data receive a permanent identifier (PID) in the form of a DOI (Digital Object Identifier) or ARK (Archival Resource Key). Data that is more fluid can also be published in the Data commons through Community Collaborated data. The Data Commons provides landing pages, permanent DOIs or ARKs, and supports data reuse and citation through features such as open data licenses and downloadable citations. The ability to access and do computing on data within the CyVerse framework or with external compute resources when necessary, has proven highly beneficial to our user community, which has continuously grown since the inception of CyVerse nine years ago.

  3. ARCAS (ACACIA Regional Climate-data Access System) -- a Web Access System for Climate Model Data Access, Visualization and Comparison

    NASA Astrophysics Data System (ADS)

    Hakkarinen, C.; Brown, D.; Callahan, J.; hankin, S.; de Koningh, M.; Middleton-Link, D.; Wigley, T.

    2001-05-01

    A Web-based access system to climate model output data sets for intercomparison and analysis has been produced, using the NOAA-PMEL developed Live Access Server software as host server and Ferret as the data serving and visualization engine. Called ARCAS ("ACACIA Regional Climate-data Access System"), and publicly accessible at http://dataserver.ucar.edu/arcas, the site currently serves climate model outputs from runs of the NCAR Climate System Model for the 21st century, for Business as Usual and Stabilization of Greenhouse Gas Emission scenarios. Users can select, download, and graphically display single variables or comparisons of two variables from either or both of the CSM model runs, averaged for monthly, seasonal, or annual time resolutions. The time length of the averaging period, and the geographical domain for download and display, are fully selectable by the user. A variety of arithmetic operations on the data variables can be computed "on-the-fly", as defined by the user. Expansions of the user-selectable options for defining analysis options, and for accessing other DOD-compatible ("Distributed Ocean Data System-compatible") data sets, residing at locations other than the NCAR hardware server on which ARCAS operates, are planned for this year. These expansions are designed to allow users quick and easy-to-operate web-based access to the largest possible selection of climate model output data sets available throughout the world.

  4. Open Access: "à consommer avec modération"

    NASA Astrophysics Data System (ADS)

    Mahoney, Terence J.

    There is increasing pressure on academics and researchers to publish the results of their investigations in open access journals. Indeed, some funding agencies make open access publishing a basic requirement for funding projects, and the EU is considering taking firm steps in this direction. I argue that astronomy is already one of the most open of disciplines, and that access - both to the general public (in terms of a significantly growing outreach effort) and to developing countries (through efforts to provide computing facilities and Internet access, as well as schemes to provide research centres of limited resources with journals) - is becoming more and more open in a genuine and lasting way. I further argue that sudden switches to more formal kinds of open access schemes could cause irreparable harm to astronomical publishing. Several of the most prestigious astronomical research journals (e.g. MN, ApJ, AJ) have for more than a century met the publishing needs of the research community and continue to adapt successfully to changing demands on the part of that community. The after-effects of abrupt changes in publishing practices - implemented through primarily political concerns - are hard to predict and could be severely damaging. I conclude that open access, in its current acceptation, should be studied with great care and with sufficient time before any consideration is given to its implementation. If forced on the publishing and research communities, open access could well result in much more limited access to properly vetted research results.

  5. High-Performance Computing User Facility | Computational Science | NREL

    Science.gov Websites

    User Facility High-Performance Computing User Facility The High-Performance Computing User Facility technologies. Photo of the Peregrine supercomputer The High Performance Computing (HPC) User Facility provides Gyrfalcon Mass Storage System. Access Our HPC User Facility Learn more about these systems and how to access

  6. 76 FR 62387 - Public User ID Badging

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-07

    ... additional information regarding online access cards or user training should be directed to Douglas Salser... issues online access cards to customers who wish to use the electronic search systems at the Public Search Facility. Customers may obtain an online access card by completing the application at the Public...

  7. 17 CFR 9.13 - Publication of notice.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... REVIEW OF EXCHANGE DISCIPLINARY, ACCESS DENIAL OR OTHER ADVERSE ACTIONS Notice and Effective Date of Disciplinary Action or Access Denial Action § 9.13 Publication of notice. Whenever an exchange suspends, expels... must make such findings public as soon as the disciplinary action or access denial action becomes...

  8. 1 CFR 456.4 - Public access to information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Public access to information. 456.4 Section 456.4 General Provisions MISCELLANEOUS AGENCIES NATIONAL CAPITAL PLANNING COMMISSION (FREEDOM OF INFORMATION ACT REGULATIONS) § 456.4 Public access to information. (a) General policy. It is the Commission's...

  9. Wheelchair accessibility to public buildings in Istanbul.

    PubMed

    Evcil, A Nilay

    2009-03-01

    Accessibility to public environment is the human right and basic need of each citizen and is one of the fundamental considerations for urban planning. The aim of this study is to determine the compliance of public buildings in central business districts (CBD) of Istanbul, Turkey, to wheelchair accessibility to the guidelines of the instrument and identify architectural barriers faced by wheelchair users. This is a descriptive study of 26 public buildings in CBD of Istanbul. The instrument used is the adapted Useh, Moyo and Munyonga questionnaire to collect the data from direct observation and measurement. Descriptive statistics of simple percentages and means are used to explain the compliance to the guidelines of the instrument and wheelchair accessibility. The descriptive survey results indicate that wheelchair users experience many accessibility problems in public environment of the most urbanised city (cultural capital of Europe in 2010) in a developing country. It is found that the major architectural barrier is the public transportation items with the lowest mean compliance (25%). Beside this, the most compliant to the instrument is entrance to building items with 79% as mean percentage. It is also found that there is an intention to improve accessibility when building construction period is investigated. This article describes the example of the compliance of public buildings accessibility when the country has legislation, but lacking regulations about accessibility for the wheelchair users.

  10. Long-Term Impacts of Precolonial Institutions, Geography and Ecological Diversity on Access to Public Infrastructure Services in Nigeria

    NASA Astrophysics Data System (ADS)

    Archibong, B.

    2014-12-01

    Do precolonial institutions, geography and ecological diversity affect population access to public infrastructure services over a century later? Can local leaders from historically centralized or 'conqueror' groups still influence access to public goods today? Do precolonial states located in ecologically diverse environments have better access to water, power and sanitation resources today? A growing body of literature examining the sources of the current state of African economic development has cited the enduring impacts of precolonial institutions and geography on contemporary African economic development using large sample cross-sectional analysis. In this paper, I focus on within country effects of local ethnic and political state institutions on access to public infrastructure services in present day Nigeria. Specifically, I combine information on the spatial distribution of ethnic states and ecological diversity in Nigeria circa mid 19th century and political states in Nigeria circa 1785 and 1850 with information, from a novel geocoded survey dataset, on access to public infrastructure at the local government level in present day Nigeria to examine the impact of precolonial state centralization on the current unequal access to public infrastructure services in Nigeria, accounting for the effects of ecological diversity and other geographic covariates. Some preliminary results show evidence for the long-term impacts of institutions, geography and ecological diversity on access to public infrastructure in Nigeria.

  11. Reproducibility in Natural Language Processing: A Case Study of Two R Libraries for Mining PubMed/MEDLINE.

    PubMed

    Cohen, K Bretonnel; Xia, Jingbo; Roeder, Christophe; Hunter, Lawrence E

    2016-05-01

    There is currently a crisis in science related to highly publicized failures to reproduce large numbers of published studies. The current work proposes, by way of case studies, a methodology for moving the study of reproducibility in computational work to a full stage beyond that of earlier work. Specifically, it presents a case study in attempting to reproduce the reports of two R libraries for doing text mining of the PubMed/MEDLINE repository of scientific publications. The main findings are that a rational paradigm for reproduction of natural language processing papers can be established; the advertised functionality was difficult, but not impossible, to reproduce; and reproducibility studies can produce additional insights into the functioning of the published system. Additionally, the work on reproducibility lead to the production of novel user-centered documentation that has been accessed 260 times since its publication-an average of once a day per library.

  12. Protecting Information

    NASA Astrophysics Data System (ADS)

    Loepp, Susan; Wootters, William K.

    2006-09-01

    For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum computing, thus providing a context in which ideas from mathematics and physics meet. By covering such topics as Shor's quantum factoring algorithm, this text informs the reader about current thinking in quantum information theory and encourages an appreciation of the connections between mathematics and science.Of particular interest are the potential impacts of quantum physics:(i) a quantum computer, if built, could crack our currently used public-key cryptosystems; and (ii) quantum cryptography promises to provide an alternative to these cryptosystems, basing its security on the laws of nature rather than on computational complexity. No prior knowledge of quantum mechanics is assumed, but students should have a basic knowledge of complex numbers, vectors, and matrices. Accessible to readers familiar with matrix algebra, vector spaces and complex numbers First undergraduate text to cover cryptography, error-correction, and quantum computation together Features exercises designed to enhance understanding, including a number of computational problems, available from www.cambridge.org/9780521534765

  13. Open access publishing, article downloads, and citations: randomised controlled trial

    PubMed Central

    Lewenstein, Bruce V; Simon, Daniel H; Booth, James G; Connolly, Mathew J L

    2008-01-01

    Objective To measure the effect of free access to the scientific literature on article downloads and citations. Design Randomised controlled trial. Setting 11 journals published by the American Physiological Society. Participants 1619 research articles and reviews. Main outcome measures Article readership (measured as downloads of full text, PDFs, and abstracts) and number of unique visitors (internet protocol addresses). Citations to articles were gathered from the Institute for Scientific Information after one year. Interventions Random assignment on online publication of articles published in 11 scientific journals to open access (treatment) or subscription access (control). Results Articles assigned to open access were associated with 89% more full text downloads (95% confidence interval 76% to 103%), 42% more PDF downloads (32% to 52%), and 23% more unique visitors (16% to 30%), but 24% fewer abstract downloads (−29% to −19%) than subscription access articles in the first six months after publication. Open access articles were no more likely to be cited than subscription access articles in the first year after publication. Fifty nine per cent of open access articles (146 of 247) were cited nine to 12 months after publication compared with 63% (859 of 1372) of subscription access articles. Logistic and negative binomial regression analysis of article citation counts confirmed no citation advantage for open access articles. Conclusions Open access publishing may reach more readers than subscription access publishing. No evidence was found of a citation advantage for open access articles in the first year after publication. The citation advantage from open access reported widely in the literature may be an artefact of other causes. PMID:18669565

  14. 24 CFR 598.410 - Public access to materials and proceedings.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 3 2014-04-01 2013-04-01 true Public access to materials and proceedings. 598.410 Section 598.410 Housing and Urban Development Regulations Relating to Housing and Urban... DESIGNATIONS Post-Designation Requirements § 598.410 Public access to materials and proceedings. After...

  15. 24 CFR 598.410 - Public access to materials and proceedings.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 3 2012-04-01 2012-04-01 false Public access to materials and proceedings. 598.410 Section 598.410 Housing and Urban Development Regulations Relating to Housing and Urban... DESIGNATIONS Post-Designation Requirements § 598.410 Public access to materials and proceedings. After...

  16. 24 CFR 598.410 - Public access to materials and proceedings.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 3 2013-04-01 2013-04-01 false Public access to materials and proceedings. 598.410 Section 598.410 Housing and Urban Development Regulations Relating to Housing and Urban... DESIGNATIONS Post-Designation Requirements § 598.410 Public access to materials and proceedings. After...

  17. 45 CFR 1624.5 - Accessibility of legal services.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Accessibility of legal services. 1624.5 Section 1624.5 Public Welfare Regulations Relating to Public Welfare (Continued) LEGAL SERVICES CORPORATION PROHIBITION AGAINST DISCRIMINATION ON THE BASIS OF DISABILITY § 1624.5 Accessibility of legal services. (a) No...

  18. 45 CFR 1624.5 - Accessibility of legal services.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 4 2011-10-01 2011-10-01 false Accessibility of legal services. 1624.5 Section 1624.5 Public Welfare Regulations Relating to Public Welfare (Continued) LEGAL SERVICES CORPORATION PROHIBITION AGAINST DISCRIMINATION ON THE BASIS OF DISABILITY § 1624.5 Accessibility of legal services. (a) No...

  19. 45 CFR 1624.5 - Accessibility of legal services.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 4 2014-10-01 2014-10-01 false Accessibility of legal services. 1624.5 Section 1624.5 Public Welfare Regulations Relating to Public Welfare (Continued) LEGAL SERVICES CORPORATION PROHIBITION AGAINST DISCRIMINATION ON THE BASIS OF DISABILITY § 1624.5 Accessibility of legal services. (a) No...

  20. 45 CFR 1624.5 - Accessibility of legal services.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 4 2013-10-01 2013-10-01 false Accessibility of legal services. 1624.5 Section 1624.5 Public Welfare Regulations Relating to Public Welfare (Continued) LEGAL SERVICES CORPORATION PROHIBITION AGAINST DISCRIMINATION ON THE BASIS OF DISABILITY § 1624.5 Accessibility of legal services. (a) No...

  1. 77 FR 73042 - Federal Property Suitable as Facilities To Assist the Homeless

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-07

    ... removal only 5,531 sf., public shop, vacant since Jan. 2011, poor condition, lead/asbestos identified... public access; asbestos/lead identified; contact Army for info. on accessibility/removal Building 50 50... Comments: Off-site removal only; 9,900 sf.; office; poor conditions; limited public access; asbestos/lead...

  2. 45 CFR 1636.3 - Access to written statements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Access to written statements. 1636.3 Section 1636.3 Public Welfare Regulations Relating to Public Welfare (Continued) LEGAL SERVICES CORPORATION CLIENT IDENTITY AND STATEMENT OF FACTS § 1636.3 Access to written statements. (a) Written statements of...

  3. 45 CFR 707.8 - Physical access.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false Physical access. 707.8 Section 707.8 Public... § 707.8 Physical access. (a) Discrimination prohibited. Except as otherwise provided in this section, no... shall be made available for public inspection. The plan shall, at a minimum— (i) Identify physical...

  4. 45 CFR 707.8 - Physical access.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false Physical access. 707.8 Section 707.8 Public... § 707.8 Physical access. (a) Discrimination prohibited. Except as otherwise provided in this section, no... shall be made available for public inspection. The plan shall, at a minimum— (i) Identify physical...

  5. 45 CFR 707.8 - Physical access.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Physical access. 707.8 Section 707.8 Public... § 707.8 Physical access. (a) Discrimination prohibited. Except as otherwise provided in this section, no... shall be made available for public inspection. The plan shall, at a minimum— (i) Identify physical...

  6. 45 CFR 707.8 - Physical access.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 3 2013-10-01 2013-10-01 false Physical access. 707.8 Section 707.8 Public... § 707.8 Physical access. (a) Discrimination prohibited. Except as otherwise provided in this section, no... shall be made available for public inspection. The plan shall, at a minimum— (i) Identify physical...

  7. 45 CFR 707.8 - Physical access.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false Physical access. 707.8 Section 707.8 Public... § 707.8 Physical access. (a) Discrimination prohibited. Except as otherwise provided in this section, no... shall be made available for public inspection. The plan shall, at a minimum— (i) Identify physical...

  8. 40 CFR 1400.3 - Public access to paper copies of off-site consequence analysis information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...-site consequence analysis information. 1400.3 Section 1400.3 Protection of Environment ENVIRONMENTAL... INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.3 Public access to paper copies of off-site consequence analysis information. (a) General. The Administrator and the...

  9. 40 CFR 1400.3 - Public access to paper copies of off-site consequence analysis information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...-site consequence analysis information. 1400.3 Section 1400.3 Protection of Environment ENVIRONMENTAL... INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.3 Public access to paper copies of off-site consequence analysis information. (a) General. The Administrator and the...

  10. 40 CFR 1400.3 - Public access to paper copies of off-site consequence analysis information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...-site consequence analysis information. 1400.3 Section 1400.3 Protection of Environment ENVIRONMENTAL... INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.3 Public access to paper copies of off-site consequence analysis information. (a) General. The Administrator and the...

  11. 40 CFR 1400.3 - Public access to paper copies of off-site consequence analysis information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...-site consequence analysis information. 1400.3 Section 1400.3 Protection of Environment ENVIRONMENTAL... INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.3 Public access to paper copies of off-site consequence analysis information. (a) General. The Administrator and the...

  12. 76 FR 80417 - Request for Information: Public Access to Digital Data Resulting From Federally Funded Scientific...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-23

    ... OFFICE OF SCIENCE AND TECHNOLOGY POLICY Request for Information: Public Access to Digital Data... public access to unclassified digital data that result from federally funded scientific research. The... Technology Council's Interagency Working Group on Digital Data. Release Date: November 3, 2011. Response Date...

  13. 20 CFR 625.18 - Public access to Agreements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Public access to Agreements. 625.18 Section 625.18 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR DISASTER UNEMPLOYMENT ASSISTANCE § 625.18 Public access to Agreements. The State agency of a State will make available...

  14. Logical Access Control Mechanisms in Computer Systems.

    ERIC Educational Resources Information Center

    Hsiao, David K.

    The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…

  15. A Scalable Infrastructure for Lidar Topography Data Distribution, Processing, and Discovery

    NASA Astrophysics Data System (ADS)

    Crosby, C. J.; Nandigam, V.; Krishnan, S.; Phan, M.; Cowart, C. A.; Arrowsmith, R.; Baru, C.

    2010-12-01

    High-resolution topography data acquired with lidar (light detection and ranging) technology have emerged as a fundamental tool in the Earth sciences, and are also being widely utilized for ecological, planning, engineering, and environmental applications. Collected from airborne, terrestrial, and space-based platforms, these data are revolutionary because they permit analysis of geologic and biologic processes at resolutions essential for their appropriate representation. Public domain lidar data collection by federal, state, and local agencies are a valuable resource to the scientific community, however the data pose significant distribution challenges because of the volume and complexity of data that must be stored, managed, and processed. Lidar data acquisition may generate terabytes of data in the form of point clouds, digital elevation models (DEMs), and derivative products. This massive volume of data is often challenging to host for resource-limited agencies. Furthermore, these data can be technically challenging for users who lack appropriate software, computing resources, and expertise. The National Science Foundation-funded OpenTopography Facility (www.opentopography.org) has developed a cyberinfrastructure-based solution to enable online access to Earth science-oriented high-resolution lidar topography data, online processing tools, and derivative products. OpenTopography provides access to terabytes of point cloud data, standard DEMs, and Google Earth image data, all co-located with computational resources for on-demand data processing. The OpenTopography portal is built upon a cyberinfrastructure platform that utilizes a Services Oriented Architecture (SOA) to provide a modular system that is highly scalable and flexible enough to support the growing needs of the Earth science lidar community. OpenTopography strives to host and provide access to datasets as soon as they become available, and also to expose greater application level functionalities to our end-users (such as generation of custom DEMs via various gridding algorithms, and hydrological modeling algorithms). In the future, the SOA will enable direct authenticated access to back-end functionality through simple Web service Application Programming Interfaces (APIs), so that users may access our data and compute resources via clients other than Web browsers. In addition to an overview of the OpenTopography SOA, this presentation will discuss our recently developed lidar data ingestion and management system for point cloud data delivered in the binary LAS standard. This system compliments our existing partitioned database approach for data delivered in ASCII format, and permits rapid ingestion of data. The system has significantly reduced data ingestion times and has implications for data distribution in emergency response situations. We will also address on ongoing work to develop a community lidar metadata catalog based on the OGC Catalogue Service for Web (CSW) standard, which will help to centralize discovery of public domain lidar data.

  16. Computer Access. Tech Use Guide: Using Computer Technology.

    ERIC Educational Resources Information Center

    Council for Exceptional Children, Reston, VA. Center for Special Education Technology.

    One of nine brief guides for special educators on using computer technology, this guide focuses on access including adaptations in input devices, output devices, and computer interfaces. Low technology devices include "no-technology" devices (usually modifications to existing devices), simple switches, and multiple switches. High technology input…

  17. Optical memories in digital computing

    NASA Technical Reports Server (NTRS)

    Alford, C. O.; Gaylord, T. K.

    1979-01-01

    High capacity optical memories with relatively-high data-transfer rate and multiport simultaneous access capability may serve as basis for new computer architectures. Several computer structures that might profitably use memories are: a) simultaneous record-access system, b) simultaneously-shared memory computer system, and c) parallel digital processing structure.

  18. Integrating Web-based technology into distance education for nurses in China: computer and Internet access and attitudes.

    PubMed

    Cragg, C E Betty; Edwards, Nancy; Yue, Zhao; Xin, Song Li; Hui, Zou Dao

    2003-01-01

    To increase continuing education accessibility, nurses around the world are turning to Web-based instruction. However, for Internet education to be successful, particularly in developing countries, nurses must have access to computers and the Internet as well as positive attitudes toward this form of learning. As part of a distance education project for nurses of the Tianjin Municipality in China, a survey of nurses was conducted to examine their sources of professional knowledge as well as their computer and Internet access and attitudes. The attitudes of the nurses were generally positive, and there was evidence of rapidly increasing use of and access to computers and the Internet. This article reports the results of that survey and their implications for Web-based teaching of Chinese nurses.

  19. Due diligence in the open-access explosion era: choosing a reputable journal for publication.

    PubMed

    Masten, Yondell; Ashcraft, Alyce

    2017-11-15

    Faculty are required to publish. Naïve and "in-a-hurry-to-publish" authors seek to publish in journals where manuscripts are rapidly accepted. Others may innocently submit to one of an increasing number of questionable/predatory journals, where predatory is defined as practices of publishing journals for exploitation of author-pays, open-access publication model by charging authors publication fees for publisher profit without provision of expected services (expert peer review, editing, archiving, and indexing published manuscripts) and promising almost instant publication. Authors may intentionally submit manuscripts to predatory journals for rapid publication without concern for journal quality. A brief summary of the open access "movement," suggestions for selecting reputable open access journals, and suggestion for avoiding predatory publishers/journals are described. The purpose is to alert junior and seasoned faculty about predatory publishers included among available open access journal listings. Brief review of open access publication, predatory/questionable journal characteristics, suggestions for selecting reputable open access journals and avoiding predatory publishers/journals are described. Time is required for intentionally performing due diligence in open access journal selection, based on publisher/journal quality, prior to manuscript submission or authors must be able to successfully withdraw manuscripts when submission to a questionable or predatory journal is discovered. © FEMS 2017.

  20. Due diligence in the open-access explosion era: choosing a reputable journal for publication

    PubMed Central

    Ashcraft, Alyce

    2017-01-01

    Abstract Faculty are required to publish. Naïve and “in-a-hurry-to-publish” authors seek to publish in journals where manuscripts are rapidly accepted. Others may innocently submit to one of an increasing number of questionable/predatory journals, where predatory is defined as practices of publishing journals for exploitation of author-pays, open-access publication model by charging authors publication fees for publisher profit without provision of expected services (expert peer review, editing, archiving, and indexing published manuscripts) and promising almost instant publication. Authors may intentionally submit manuscripts to predatory journals for rapid publication without concern for journal quality. A brief summary of the open access “movement,” suggestions for selecting reputable open access journals, and suggestion for avoiding predatory publishers/journals are described. The purpose is to alert junior and seasoned faculty about predatory publishers included among available open access journal listings. Brief review of open access publication, predatory/questionable journal characteristics, suggestions for selecting reputable open access journals and avoiding predatory publishers/journals are described. Time is required for intentionally performing due diligence in open access journal selection, based on publisher/journal quality, prior to manuscript submission or authors must be able to successfully withdraw manuscripts when submission to a questionable or predatory journal is discovered. PMID:29040536

Top