Статті в журналах з теми "Access list"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Access list.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Access list".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Pleszkun, A. R., and M. J. Thazhuthaveetil. "An architecture for efficient Lisp list access." ACM SIGARCH Computer Architecture News 14, no. 2 (May 1986): 191–98. http://dx.doi.org/10.1145/17356.17378.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Setapa, Sharipah, and Tengku Puteri Suhilah. "An Access Control List for Role-Based System: An Observation and Recommendation." International Journal of Information and Education Technology 4, no. 6 (2014): 468–72. http://dx.doi.org/10.7763/ijiet.2014.v4.452.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Kim, No-Whan. "The case study to verify of a network based on router applying an ACL(: Access List)." Journal of the Korea institute of electronic communication sciences 11, no. 5 (May 31, 2016): 491–98. http://dx.doi.org/10.13067/jkiecs.2016.11.5.491.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Thazhuthaveetil, Matthew J., and Andrew R. Pleszkun. "On the structural locality of reference in LISP list access streams." Information Processing Letters 26, no. 2 (October 1987): 105–10. http://dx.doi.org/10.1016/0020-0190(87)90046-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

McMullen, Anthony. "Resist the list." Bottom Line 27, no. 1 (May 6, 2014): 2–5. http://dx.doi.org/10.1108/bl-02-2014-0005.

Повний текст джерела
Анотація:
Purpose – The purpose of this study is to provide insights into issues encountered in maintaining library technologies and electronic collections in changing times and on a limited budget with limited personnel. Design/methodology/approach – The study uses real world observations and experiences, data collected from an informal survey, insights gleaned from the professional literature and anecdotal evidence to provide commentary on the questionable methods many libraries employ in providing access to electronic resources. Findings – Libraries spend large sums of money and significant percentages of overall budgets on electronic resources, yet many fail to take the extra step to provide access to the content in these disparate resources via a web scale discovery search service. What is worse is that a large number of libraries still employ the flawed “Databases A-Z” list as a primary means of providing access. Originality/value – This paper is a light-hearted piece on one librarian’s observations regarding the inherent flaws in the traditional “Databases A-Z” list. It includes data from an informal survey.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

A.B., Chate, and Chirchi V.R. "Access Control List Provides Security in Network." International Journal of Computer Applications 121, no. 22 (July 18, 2015): 14–16. http://dx.doi.org/10.5120/21831-5090.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Shchukin, V. Yu. "List decoding for a multiple access hyperchannel." Problems of Information Transmission 52, no. 4 (October 2016): 329–43. http://dx.doi.org/10.1134/s0032946016040025.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Duffin, Christian. "Internet access high on nurses’ wish list." Nursing Management 7, no. 2 (May 1, 2000): 5. http://dx.doi.org/10.7748/nm.7.2.5.s5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Kiberd, B., J. Boudreault, V. Bhan, and R. Panek. "Access to the Kidney Transplant Wait List." American Journal of Transplantation 6, no. 11 (November 2006): 2714–20. http://dx.doi.org/10.1111/j.1600-6143.2006.01523.x.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

ZENG, Kuang-Yi. "Towards the Optimization of Access Control List." Journal of Software 18, no. 4 (2007): 978. http://dx.doi.org/10.1360/jos180978.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Song, Junshuai, Zhao Li, Chang Zhou, Jinze Bai, Zhenpeng Li, Jian Li, and Jun Gao. "Co-Displayed Items Aware List Recommendation." IEEE Access 8 (2020): 64591–602. http://dx.doi.org/10.1109/access.2020.2984543.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Marmurek, Harvey H. C., and Peter J. Kwantes. "Reading Words and Wirds: Phonology and Lexical Access." Quarterly Journal of Experimental Psychology Section A 49, no. 3 (August 1996): 696–714. http://dx.doi.org/10.1080/713755634.

Повний текст джерела
Анотація:
Naming latency for printed words is inversely related to their frequency. Four experiments were run to test whether the naming of non-words that are homophones of words (pseudohomophones) is similarly influenced by the frequency of those words. McCann and Besner (1987) failed to find such a frequency effect for pseudohomophones when they were presented in a list of non-words. The present studies show that list structure is critical: A frequency effect occurs for pseudohomophones in a list only of homophones and in a list containing words. The list structure effect was found for three different stimulus lists and suggests that lexical access is strategic. If none of the items in a list has a lexical entry, then pronunciation may be the product of a non-lexical process. If all items have a lexical entry that may be accessed orthographically or phonologically, then pronunciation will be the product of a lexical process.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Mohammad, Aijaz. "Access controls on bmj.com: List of countries with free access seems incomplete." BMJ 330, no. 7496 (April 14, 2005): 904.3. http://dx.doi.org/10.1136/bmj.330.7496.904-b.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Cai, Ning. "List Decoding for Arbitrarily Varying Multiple Access Channel Revisited: List Configuration and Symmetrizability." IEEE Transactions on Information Theory 62, no. 11 (November 2016): 6095–110. http://dx.doi.org/10.1109/tit.2016.2608900.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Watson, Roger. "Beall's list of predatory open access journals: RIP." Nursing Open 4, no. 2 (February 28, 2017): 60. http://dx.doi.org/10.1002/nop2.78.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Al Abdulmohsin, Ibrahim M. "Techniques and algorithms for access control list optimization." Computers & Electrical Engineering 35, no. 4 (July 2009): 556–66. http://dx.doi.org/10.1016/j.compeleceng.2008.08.003.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Zeng, Weixin, Xiang Zhao, Jiuyang Tang, and Haichuan Shang. "Collective List-Only Entity Linking: A Graph-Based Approach." IEEE Access 6 (2018): 16035–45. http://dx.doi.org/10.1109/access.2018.2817652.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Xu, Bin, Chenhao Ying, and Yuan Luo. "An Improved $A^{\ast}$ Decoding Algorithm With List Decoding." IEEE Access 6 (2018): 46877–85. http://dx.doi.org/10.1109/access.2018.2866396.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Doan, Nghia, Seyyed Ali Hashemi, and Warren J. Gross. "Fast Successive-Cancellation List Flip Decoding of Polar Codes." IEEE Access 10 (2022): 5568–84. http://dx.doi.org/10.1109/access.2021.3140151.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Feng, Guo Fu, Ming Wang, Ming Chen, and Tao Chi. "Optimizing the Performance for Nonbonded Force Calculation of Chemical Simulation on CBEA." Applied Mechanics and Materials 80-81 (July 2011): 322–26. http://dx.doi.org/10.4028/www.scientific.net/amm.80-81.322.

Повний текст джерела
Анотація:
The molecular dynamics tool usually employs a neighbor list that contains the particle pairs for which non-bonded forces would be calculated. Though accessing to the array of atoms’ position and force does not exhibit a cache friendly pattern on a computer during the nonbonded force calculation, the neighbor list could be referred as a directive for the memory access. Designing specific data prefetching policy according to the neighbour list which was generated before the calculation can reduce the latency of memory access and improve the molecular dynamics simulation process. In this paper, an optimization memory access method referred by particle neighbor list based on CBEA was proposed. The experimental result shows that the proposed method reduces the latency of memory access and improves performance of the molecular-dynamics-based chemical simulation greatly.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Reid, A. B., A. J. Grant, and P. D. Alexander. "List Detection for the$K$-Symmetric Multiple-Access Channel." IEEE Transactions on Information Theory 51, no. 8 (August 2005): 2930–36. http://dx.doi.org/10.1109/tit.2005.851775.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Canady, Valerie A. "More funding, access, employment top 2019 readers' wish list." Mental Health Weekly 29, no. 2 (January 13, 2019): 3–5. http://dx.doi.org/10.1002/mhw.31732.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Galloway, S., A. Sharma, J. Ward, and A. R. Bodenham. "A review of an anaesthetic led vascular access list." Anaesthesia 60, no. 8 (August 2005): 772–78. http://dx.doi.org/10.1111/j.1365-2044.2005.04189.x.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Jing, Changle, Jun Xiong, Xin Wang, Jibo Wei, and Yantao Guo. "Low-Complexity Group Alternate Iterative List Detection for MIMO Systems." IEEE Access 4 (2016): 5858–67. http://dx.doi.org/10.1109/access.2016.2607222.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Laksono, Agung Tri, and M. Alvian Habib Nasution. "Implementasi Keamanan Jaringan Komputer Local Area Network Menggunakan Access Control List pada Perusahaan X." Jurnal Sistem Komputer dan Informatika (JSON) 1, no. 2 (January 25, 2020): 83. http://dx.doi.org/10.30865/json.v1i2.1920.

Повний текст джерела
Анотація:
In Company X, the use of the internet is a demand for workers. Therefore, an internet network is very much needed in a Company X. The absence of restrictions in the use of the internet network can interfere with the security and misuse of the internet network, for this reason the arrangements in the internet network are designed. One method used is the Virtual Local Area Network (VLAN) Access Control List (ACL) method that is applied to Company X. The Vlan Access Control List method is one of the techniques for requesting an internet network access or data communication and sending a number of data packets from one computer to another. The author resets the results proving that the Vlan Access Control List with the filtering and sharing method of internet connection users can filter and identify users who have restricted access to access other users or to servers in Company X to improve data security.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Wu, Ke He, Hong Jiang Ji, Long Chen, and Tong Zhang. "A Trusted Process Security Model for the Access to Power Enterprise Data Center." Advanced Materials Research 341-342 (September 2011): 472–77. http://dx.doi.org/10.4028/www.scientific.net/amr.341-342.472.

Повний текст джерела
Анотація:
Aiming the lack of the authentication and access control when the business processes of the power business systems visit the enterprise data center, this article proposes a trusted process security model for the access to the power enterprise data center. The model gives the concept of “Trusted Process” firstly, and then builds “Trusted Process List” and the “Process Access List” to convert the business process into trusted process, and finally implements the authentication and access control of the business processes when visiting the data center.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Zhang, Xiaojun, Rongquan Sui, Jianming Cui, Dexue Zhang, and Qingtian Zeng. "Efficient Sorting Architecture for List-Fast-SSC Decoding of Polar Codes." IEEE Access 6 (2018): 61773–81. http://dx.doi.org/10.1109/access.2018.2875756.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Kim, Jae-Won, Jun-Woo Tak, Hee-youl Kwak, and Jong-Seon No. "A New List Decoding Algorithm for Short-Length TBCCs With CRC." IEEE Access 6 (2018): 35105–11. http://dx.doi.org/10.1109/access.2018.2847348.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Lee, Kyungpil, and In-Cheol Park. "Large-Small Sorting for Successive Cancellation List Decoding of Polar Codes." IEEE Access 8 (2020): 96955–62. http://dx.doi.org/10.1109/access.2020.2996016.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Wang, Chao, Jian Yang, Huasen He, Ruida Zhou, Shuangwu Chen, and Xiaofeng Jiang. "Neighbor Cell List Optimization in Handover Management Using Cascading Bandits Algorithm." IEEE Access 8 (2020): 134137–50. http://dx.doi.org/10.1109/access.2020.3011015.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Cheng, Fengyi, Aijun Liu, Yingxian Zhang, and Jing Ren. "Bit-Flip Algorithm for Successive Cancellation List Decoder of Polar Codes." IEEE Access 7 (2019): 58346–52. http://dx.doi.org/10.1109/access.2019.2914691.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Nguyen, Thanh-Ngo, Loan T. T. Nguyen, Bay Vo, Ngoc-Thanh Nguyen, and Trinh D. D. Nguyen. "An N-List-Based Approach for Mining Frequent Inter-Transaction Patterns." IEEE Access 8 (2020): 116840–55. http://dx.doi.org/10.1109/access.2020.3004530.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Saha, Suman, Junbin Gao, and Richard Gerlach. "Stock Ranking Prediction Using List-Wise Approach and Node Embedding Technique." IEEE Access 9 (2021): 88981–96. http://dx.doi.org/10.1109/access.2021.3090834.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
34

P, Vidhya, and A. P. V. Raghavendra. "Protecting Global Records Sharing with Identity Based Access Control List." International Journal of Computer Applications Technology and Research 3, no. 11 (November 1, 2014): 661–63. http://dx.doi.org/10.7753/ijcatr0311.1001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Walsh, Gretchen. "African Newspaper Union List: low‐tech resource/high‐tech access." Library Hi Tech 18, no. 3 (September 2000): 215–23. http://dx.doi.org/10.1108/07378830010348116.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Gingerich, Barbara Stover. "Sanctions List Findings: How to Access, What Actions to Take." Home Health Care Management & Practice 14, no. 5 (August 2002): 389–90. http://dx.doi.org/10.1177/1084822302014005012.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Firmansyah, Firmansyah, and Mochamad Wahyudi. "Analisis Performa Access Control List Menggunakan Metode Firewall Policy Base." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 20, no. 2 (May 31, 2021): 283–92. http://dx.doi.org/10.30812/matrik.v20i2.1068.

Повний текст джерела
Анотація:
Pemanfaatan teknologi informasi mampu mendukung mobilitas yang begitu cepat dan sangat efesien. Kini, hampir semua transfer data dilakukan menggunakan jaringan komputer dan bersifat terbuka. dengan terjadinya transfer data yang bersifat terbuka hal ini mampu memicu terjadinya kejahatan didalam dunia jaringan komputer (cybercrime). Penerapan keamanan jaringan komputer merupakan hal yang sangat vital. untuk memiminalisir cybercrime didalam jaringan komputer, maka diterapkanlah keamanan jaringan menggunakan metode zone-based policy firewall. Zone-based policy firewall mampu melakukan pembatasan akses berdasarkan mekanisme keamanan yang digunakan untuk melindungi sistem internal dari gangguan para pelaku Cybercrime atau pihak-pihak lain yang ingin memasuki kedalam sistem tanpa mempunyai hak akses. dari hasil penelitian analisa performa access control list menggunakan metode zon based policy firewall didapatkan penerapan keamanan jaringan komputer zone-based policy firewall mampu membatasi akses menuju server dari client yang terhubung didalam jaringan yang sama. Serta zone-based policy firewall mampu menyembunyikan hop count yang dilalui untuk menghubungkan antara client dengan server.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Fitriansyah, Ahmad, Alarik Andreansyah, and Abu Sopian. "Penerapan Static VLAN Dan Access List Untuk Meningkatkan Keamanan Jaringan." Jurnal Teknologi Informatika dan Komputer 5, no. 2 (October 1, 2019): 58–63. http://dx.doi.org/10.37012/jtik.v5i2.176.

Повний текст джерела
Анотація:
Di jaringan, satu komputer dapat berbagi dan bertukar data dengan komputer lain dalam bentuk gambar, teks, atau suara dengan melewati media yang menghubungkan komputer. Jaringan Komputer yang memiliki banyak kelebihan yang dapat memudahkan pekerjaan juga memiliki kelemahan bagi organisasi. Salah satu ancaman yang mungkin terjadi adalah pencurian data. Salah satu cara untuk melindungi terhadap transfer data dalam jaringan komputer adalah dengan menggunakan VLAN Statis dan Daftar Akses. Tujuan dari penelitian ini adalah untuk menganalisis kondisi saat ini dan menerapkan konsep VLAN Statis dan Daftar Akses sehingga perusahaan dapat memberikan hak akses data dari setiap pengguna komputer di setiap divisi, sehingga meminimalkan penggunaan perlindungan data oleh pihak yang tidak berwenang.Metode yang digunakan dalam penelitian ini adalah metode simulasi yang menggunakan perangkat lunak Cisco Packet Tracer dan perangkat router Sangfor firewall. Metode pengumpulan data dalam penelitian ini adalah observasi dan wawancara dengan direktur perusahaan.Hasil penelitian menunjukkan bahwa distribusi jaringan menggunakan VLAN statis dan keamanan data menggunakan Daftar Akses dapat diimplementasikan dengan baik di perusahaan dan membuat jaringan yang dibuat dapat membuat perusahaan melakukan pekerjaan lebih mudah dan data transaksi untuk setiap divisi dapat dilakukan dengan aman.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Abdulla, Aziz. "Friends of Open Access." TJES Vol.27 No.3 (2020) 27, no. 3 (September 1, 2020): 1–7. http://dx.doi.org/10.25130/tjes.27.3.pb1.

Повний текст джерела
Анотація:
Abstract Peace, mercy, and blessings of God be upon you https://scholarlyoa.net I looked at the site above, and on the allegations, he makes against Beall Jeffrey I would like to clarify the following 1-It seems that the site is not official, and those who are responsible for it are unknown and they call themselves Friends of Open Access or a group of librarians did not say, publishers or university professors, they did not mention any name or institution sponsoring the site. 2-I read most of their claims about Beall Jaffrey’s criteria, and it is incorrect. The criteria of Beall Jeffrey consist of about 40 items, and all of them are logical. And through it, the predatory journal is published quickly, without evaluation, and without classifying the article in international databases. 3-It focuses on the standard of publishing fees only, which is one of the criteria and does not mean that every journal that asks for fees is a predatory journal. 4-The site uses the same name as the Beall list but has a .net extension instead of .com, It violates publishing ethics and exploits the reputation of the well-known and well-known website. 5-Below are the links to Beall Jeffrey scientific pages, which shows the credibility of his articles published in reputable international journals. He has more than 1000 citations in the Scopus database and more than 3000 total citations in all journals –https://scholar.google.com.my/citations?hl=ar&user=EtHsEcMAAAAJ –https://www.scopus.com/authid/detail.uri?authorId=8869689200 6-Beall’s main website was suspended in 2017, there are many websites now that rely on Beall Jeffrey’s criteria, but most of them are unofficial, and it may demand sums from journals to be removed from the list. 7-This site claims the existence of lawsuits against Bell Jefri and does not provide any evidence for that.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Zhang, Huazi, Jiajie Tong, Rong Li, Pengcheng Qiu, Yourui Huangfu, Chen Xu, Xianbin Wang, and Jun Wang. "A Flip-Syndrome-List Polar Decoder Architecture for Ultra-Low-Latency Communications." IEEE Access 7 (2019): 1149–59. http://dx.doi.org/10.1109/access.2018.2886464.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Zhong, Hong, Bo Huang, Jie Cui, Yan Xu, and Lu Liu. "Conditional Privacy-Preserving Authentication Using Registration List in Vehicular Ad Hoc Networks." IEEE Access 6 (2018): 2241–50. http://dx.doi.org/10.1109/access.2017.2782672.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Wang, Lijin, Rongying Cai, Min Lin, and Yiwen Zhong. "Enhanced List-Based Simulated Annealing Algorithm for Large-Scale Traveling Salesman Problem." IEEE Access 7 (2019): 144366–80. http://dx.doi.org/10.1109/access.2019.2945570.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Wei, Chunting, Jiwei Qin, and Wei Zeng. "DNR: A Unified Framework of List Ranking With Neural Networks for Recommendation." IEEE Access 9 (2021): 158313–21. http://dx.doi.org/10.1109/access.2021.3130369.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Jacek, Anna, Klaudia Kędzior, and Sławomir Porada. "The waiting list as an instrument, rationalizing access to health care benefits." Zdrowie Publiczne 123, no. 2 (May 1, 2013): 112–15. http://dx.doi.org/10.12923/j.0044-2011/123-2/a.02.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Chen, Tianpei, and Harry Leib. "Selection Based List Detection With Approximate Matrix Inversion for Large-Scale MIMO Systems." IEEE Access 6 (2018): 71751–66. http://dx.doi.org/10.1109/access.2018.2881412.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Nam, Hyoju, Unil Yun, Bay Vo, Tin Truong, Zhi-Hong Deng, and Eunchul Yoon. "Efficient Approach for Damped Window-Based High Utility Pattern Mining With List Structure." IEEE Access 8 (2020): 50958–68. http://dx.doi.org/10.1109/access.2020.2979289.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Alkhalili, Mohannad, Mahmoud H. Qutqut, and Fadi Almasalha. "Investigation of Applying Machine Learning for Watch-List Filtering in Anti-Money Laundering." IEEE Access 9 (2021): 18481–96. http://dx.doi.org/10.1109/access.2021.3052313.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Beal, Eliza W., Dmitry Tumin, Lindsay Sobotka, Joseph D. Tobias, Don Hayes, Timothy M. Pawlik, Kenneth Washburn, Khalid Mumtaz, Lanla Conteh, and Sylvester M. Black. "Patients From Appalachia Have Reduced Access to Liver Transplantation After Wait-Listing." Progress in Transplantation 28, no. 4 (September 11, 2018): 305–13. http://dx.doi.org/10.1177/1526924818800037.

Повний текст джерела
Анотація:
Background: The Appalachian region is medically underserved and characterized by high morbidity and mortality. We investigated disparities among patients listed for liver transplantation (LT) in wait-list outcomes, according to residence in the Appalachian region. Methods: Data on adult patients listed for LT were obtained from the United Network for Organ Sharing for July 2013 to December 2015. Wait-list outcomes were compared using cause-specific hazard models by region of residence (Appalachian vs non-Appalachian) among patients listed at centers serving Appalachia. Posttransplant patient and graft survival were also compared. The study included 1835 LT candidates from Appalachia and 5200 from non-Appalachian regions, of whom 1016 patients experienced wait-list mortality or were delisted; 3505 received liver transplants. Results: In multivariable analyses, patients from Appalachia were less likely to receive LT (hazard ratio [HR] = 0.86; 95% confidence interval [CI]: 0.79-0.93; P < .001), but Appalachian residence was not associated with wait-list mortality or delisting (HR = 1.03; 95% CI: 0.89-1.18; P = .696). Among liver transplant recipients, patient and graft survival did not differ by Appalachian versus non-Appalachian residence. Conclusion: Appalachian residence was associated with lower access to transplantation after listing for LT. This geographic disparity should be addressed in the current debate over reforming donor liver allocation and patient priority for LT.
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Hearnshaw, J. B. "Access to Telescopes in Developing Countries." Highlights of Astronomy 11, no. 2 (1998): 920–22. http://dx.doi.org/10.1017/s153929960001916x.

Повний текст джерела
Анотація:
The ambiguity in this paper’s title is deliberate. Are we talking about astronomers or telescopes in developing countries? And are the countries concerned developing economically or astronomically? In practice I will cover both options in each case.The list below summarizes six possible routes for the acquisition of astronomical observational data that may be available to astronomers in countries developing economically, astronomically or in both ways. Not all these options will be available in any one case; indeed most of them will probably not be available. However, examples of all of them can readily be found.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Merivaki, Thessalia. "“Our Voter Rolls Are Cleaner Than Yours”: Balancing Access and Integrity in Voter List Maintenance." American Politics Research 48, no. 5 (February 17, 2020): 560–70. http://dx.doi.org/10.1177/1532673x20906472.

Повний текст джерела
Анотація:
Accurate voter lists facilitate access to the electoral process, indicate efficient voter list maintenance, and reinforce electoral integrity. Errors in voter records often result from variation in practices that are difficult to avoid given the decentralized structure of election administration in the United States. In many states, localities lack capacity to efficiently complete voter list maintenance, especially when pressured to keep “clean” voter rolls. I argue that local challenges remain when maintaining voters’ registration and voting history information, which undermines the quality of voter lists and the integrity of the electoral process. I analyze Mississippi’s Statewide Election Management System (SEMS) records and find that voter registration and voting history errors are linked to the county’s active and inactive registered voter rates and demographic characteristics. These findings confirm that local variation in voter list maintenance can impact voters depending on their voter registration status and can result in premature voter list removal.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії