998 resultados para Access Pricing


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Queen's University Belfast has submitted its open access compliance report to the RCUK for 2014/2015. Queen's receives an annual open access block grant from RCUK. The funds are made available to support universities in meeting the requirements of the RCUK open access policy, in particular meeting the cost of article processing charges (APC) to make articles open access through the publisher.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Densely deployed WiFi networks will play a crucial role in providing the capacity for next generation mobile internet. However, due to increasing interference, overlapped channels in WiFi networks and throughput efficiency degradation, densely deployed WiFi networks is not a guarantee to obtain higher throughput. An emergent challenge is how to efficiently utilize scarce spectrum resources, by matching physical layer resources to traffic demand. In this aspect, access control allocation strategies play a pivotal role but remain too coarse-grained. As a solution, this research proposes a flexible framework for fine-grained channel width adaptation and multi-channel access in WiFi networks. This approach, named SFCA (Sub-carrier Fine-grained Channel Access), adopts DOFDM (Discontinuous Orthogonal Frequency Division Multiplexing) at the PHY layer. It allocates the frequency resource with a sub-carrier granularity, which facilitates the channel width adaptation for multi-channel access and thus brings more flexibility and higher frequency efficiency. The MAC layer uses a frequency-time domain backoff scheme, which combines the popular time-domain BEB scheme with a frequency-domain backoff to decrease access collision, resulting in higher access probability for the contending nodes. SFCA is compared with FICA (an established access scheme) showing significant outperformance. Finally we present results for next generation 802.11ac WiFi networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study multicarrier multiuser multiple-input multiple-output (MU-MIMO) systems, in which the base station employs an asymptotically large number of antennas. We analyze a fully correlated channel matrix and provide a beam domain channel model, where the channel gains are independent of sub-carriers. For this model, we first derive a closed-form upper bound on the achievable ergodic sum-rate, based on which, we develop asymptotically necessary and sufficient conditions for optimal downlink transmission that require only statistical channel state information at the transmitter. Furthermore, we propose a beam division multiple access (BDMA) transmission scheme that simultaneously serves multiple users via different beams. By selecting users within non-overlapping beams, the MU-MIMO channels can be equivalently decomposed into multiple single-user MIMO channels; this scheme significantly reduces the overhead of channel estimation, as well as, the processing complexity at transceivers. For BDMA transmission, we work out an optimal pilot design criterion to minimize the mean square error (MSE) and provide optimal pilot sequences by utilizing the Zadoff-Chu sequences. Simulations demonstrate the near-optimal performance of BDMA transmission and the advantages of the proposed pilot sequences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Successful root canal treatment requires management of the bacterial infection within the root canal space and protection of residual tooth structure with direct/indirect restorations. Long-term success depends upon prevention of re-infection of the root canal space as well as ensuring favorable distribution of the occlusal forces throughout the residual tooth structure. Appropriate planning and design of the final restoration prior to initiating root canal treatment is paramount in achieving this objective. This article describes simultaneous restorability assessment and access cavity preparation to optimize outcome of both endodontic and prosthodontic treatment of the endodontically involved tooth.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In order to protect user privacy on mobile devices, an event-driven implicit authentication scheme is proposed in this paper. Several methods of utilizing the scheme for recognizing legitimate user behavior are investigated. The investigated methods compute an aggregate score and a threshold in real-time to determine the trust level of the current user using real data derived from user interaction with the device. The proposed scheme is designed to: operate completely in the background, require minimal training period, enable high user recognition rate for implicit authentication, and prompt detection of abnormal activity that can be used to trigger explicitly authenticated access control. In this paper, we investigate threshold computation through standard deviation and EWMA (exponentially weighted moving average) based algorithms. The result of extensive experiments on user data collected over a period of several weeks from an Android phone indicates that our proposed approach is feasible and effective for lightweight real-time implicit authentication on mobile smartphones.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Evidence correlates physical activity, psychological restoration, and social health to proximity to parks and sites of recreation. The purpose of this study was to identify perceived constraints to park use in low-income communities facing significant health disparities, with access to underutilized parks. We used a series of focus groups with families, teens, and older adults in neighborhoods with similar demographic distribution and access to parks over 125 acres in size. Constraints to park use varied across age groups as well as across social ecological levels, with perceived constraints to individuals, user groups, communities, and society. Policies and interventions aimed at increasing park use must specifically address barriers across social ecological levels to be successful.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis consists of an introductory chapter (essay I) and five more empirical essays on electricity markets and CO2 spot price behaviour, derivatives pricing analysis and hedging. Essay I presents the structure of the thesis and electricity markets functioning and characteristics, as well as the type of products traded, to be analyzed on the following essays. In the second essay we conduct an empirical study on co-movements in electricity markets resorting to wavelet analysis, discussing long-term dynamics and markets integration. Essay three is about hedging performance and multiscale relationships in the German electricity spot and futures markets, also using wavelet analysis. We concentrate the investigation on the relationship between coherence evolution and hedge ratio analysis, on a time-frequency-scale approach, between spot and futures which conditions the effectiveness of the hedging strategy. Essays four, five and six are interrelated between them and with the other two previous essays given the nature of the commodity analyzed, CO2 emission allowances, traded in electricity markets. Relationships between electricity prices, primary energy fuel prices and carbon dioxide permits are analyzed on essay four. The efficiency of the European market for allowances is examined taking into account markets heterogeneity. Essay five analyzes stylized statistical properties of the recent traded asset CO2 emission allowances, for spot and futures returns, examining also the relation linking convenience yield and risk premium, for the German European Energy Exchange (EEX) between October 2005 and October 2009. The study was conducted through empirical estimations of CO2 allowances risk premium, convenience yield, and their relation. Future prices from an ex-post perspective are examined to show evidence for significant negative risk premium, or else a positive forward premium. Finally, essay six analyzes emission allowances futures hedging effectiveness, providing evidence for utility gains increases with investor’s preference over risk. Deregulation of electricity markets has led to higher uncertainty in electricity prices and by presenting these essays we try to shed new lights about structuring, pricing and hedging in this type of markets.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Access control is a software engineering challenge in database applications. Currently, there is no satisfactory solution to dynamically implement evolving fine-grained access control mechanisms (FGACM) on business tiers of relational database applications. To tackle this access control gap, we propose an architecture, herein referred to as Dynamic Access Control Architecture (DACA). DACA allows FGACM to be dynamically built and updated at runtime in accordance with the established fine-grained access control policies (FGACP). DACA explores and makes use of Call Level Interfaces (CLI) features to implement FGACM on business tiers. Among the features, we emphasize their performance and their multiple access modes to data residing on relational databases. The different access modes of CLI are wrapped by typed objects driven by FGACM, which are built and updated at runtime. Programmers prescind of traditional access modes of CLI and start using the ones dynamically implemented and updated. DACA comprises three main components: Policy Server (repository of metadata for FGACM), Dynamic Access Control Component (DACC) (business tier component responsible for implementing FGACM) and Policy Manager (broker between DACC and Policy Server). Unlike current approaches, DACA is not dependent on any particular access control model or on any access control policy, this way promoting its applicability to a wide range of different situations. In order to validate DACA, a solution based on Java, Java Database Connectivity (JDBC) and SQL Server was devised and implemented. Two evaluations were carried out. The first one evaluates DACA capability to implement and update FGACM dynamically, at runtime, and, the second one assesses DACA performance against a standard use of JDBC without any FGACM. The collected results show that DACA is an effective approach for implementing evolving FGACM on business tiers based on Call Level Interfaces, in this case JDBC.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For the actual existence of e-government it is necessary and crucial to provide public information and documentation, making its access simple to citizens. A portion, not necessarily small, of these documents is in an unstructured form and in natural language, and consequently outside of which the current search systems are generally able to cope and effectively handle. Thus, in thesis, it is possible to improve access to these contents using systems that process natural language and create structured information, particularly if supported in semantics. In order to put this thesis to test, this work was developed in three major phases: (1) design of a conceptual model integrating the creation of structured information and making it available to various actors, in line with the vision of e-government 2.0; (2) definition and development of a prototype instantiating the key modules of this conceptual model, including ontology based information extraction supported by examples of relevant information, knowledge management and access based on natural language; (3) assessment of the usability and acceptability of querying information as made possible by the prototype - and in consequence of the conceptual model - by users in a realistic scenario, that included comparison with existing forms of access. In addition to this evaluation, at another level more related to technology assessment and not to the model, evaluations were made on the performance of the subsystem responsible for information extraction. The evaluation results show that the proposed model was perceived as more effective and useful than the alternatives. Associated with the performance of the prototype to extract information from documents, comparable to the state of the art, results demonstrate the feasibility and advantages, with current technology, of using natural language processing and integration of semantic information to improve access to unstructured contents in natural language. The conceptual model and the prototype demonstrator intend to contribute to the future existence of more sophisticated search systems that are also more suitable for e-government. To have transparency in governance, active citizenship, greater agility in the interaction with the public administration, among others, it is necessary that citizens and businesses have quick and easy access to official information, even if it was originally created in natural language.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Improving Access to Psychological Therapies (IAPT) was introduced in the United Kingdom in 2006 to provide more effective and efficient services to people experiencing mild to moderate mental ill health. The model represents a paradigm shift in how we provide psychological care to large populations. Aims: We wanted to document how the IAPT programme impacted on patients’ understanding of their mental health, and mental health treatment. Methods: We used Foucauldian Discourse Analysis to analyse six semi-structured research interviews with patients from one IAPT service in a major UK city. Results: Participants constructed their mental health problems as individual pathologies. Constructions of mental health and of treatment evidenced the privileging of personal responsibility and social productivity over dependency on others and the state. Conclusions: Services are functioning well for some. The role of IAPT in pathologising those who are dependent on people and services requires further commentary and action. Declaration of interest: The first author was employed by the same organisation that delivered the IAPT service, although through a separate staffing and management line.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis contributes to the advancement of Fiber-Wireless (FiWi) access technologies, through the development of algorithms for resource allocation and energy efficient routing. FiWi access networks use both optical and wireless/cellular technologies to provide high bandwidth and ubiquity, required by users and current high demanding services. FiWi access technologies are divided in two parts. In one of the parts, fiber is brought from the central office to near the users, while in the other part wireless routers or base stations take over and provide Internet access to users. Many technologies can be used at both the optical and wireless parts, which lead to different integration and optimization problems to be solved. In this thesis, the focus will be on FiWi access networks that use a passive optical network at the optical section and a wireless mesh network at the wireless section. In such networks, two important aspects that influence network performance are: allocation of resources and traffic routing throughout the mesh section. In this thesis, both problems are addressed. A fair bandwidth allocation algorithm is developed, which provides fairness in terms of bandwidth and in terms of experienced delays among all users. As for routing, an energy efficient routing algorithm is proposed that optimizes sleeping and productive periods throughout the wireless and optical sections. To develop the stated algorithms, game theory and networks formation theory were used. These are powerful mathematical tools that can be used to solve problems involving agents with conflicting interests. Since, usually, these tools are not common knowledge, a brief survey on game theory and network formation theory is provided to explain the concepts that are used throughout the thesis. As such, this thesis also serves as a showcase on the use of game theory and network formation theory to develop new algorithms.