Academic literature on the topic 'Information Access Pattern'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information Access Pattern.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Information Access Pattern"

1

Shanta.S.Betageri and Chandrappa S. "Electronic Resources Use and Access Pattern." Shanlax International Journal of Arts, Science and Humanities 6, S1 (2019): 99–104. https://doi.org/10.5281/zenodo.3335446.

Full text
Abstract:
In today’s rapidly changing world, the information needs of learners and knowledge seekers are met through a plethora of sources. The digital resources available in a library play a prominent role in facilitating access to required information to the users in an easy and expeditious manner. The library is a repository of resources that create a fundamental change in education. Adequate electronic resource facilities empower and enrich the higher education system in meeting the best academic needs. Users can access e-resources either by local or remote locations. The electronic resources
APA, Harvard, Vancouver, ISO, and other styles
2

Barik, Nilaranjan, and Puspanjali Jena. "Author productivity pattern and applicability of Lotka’s inverse square law: a bibliometric appraisal of selected LIS open access journals." Digital Library Perspectives 37, no. 3 (2021): 223–41. http://dx.doi.org/10.1108/dlp-10-2020-0103.

Full text
Abstract:
Purpose The purpose of this paper is to know whether the authors’ productivity pattern of library and information science (LIS) open access journals adheres to Lotka’s inverse square law of scientific productivity. Since the law was introduced, it has been tested in various fields of knowledge, and results have varied. This study has closely followed Lotka’s inverse square law in the field of LIS open access journals to find a factual result and set a baseline for future studies on author productivity of LIS open access journals. Design/methodology/approach The publication data of selected ten
APA, Harvard, Vancouver, ISO, and other styles
3

Unger, A. Y. "A formal pattern of information system design." Journal of Physics: Conference Series 2094, no. 3 (2021): 032045. http://dx.doi.org/10.1088/1742-6596/2094/3/032045.

Full text
Abstract:
Abstract A new design pattern intended for distributed cloud-based information systems is proposed. Pattern is based on the traditional client-server architecture. The server side is divided into three principal components: data storage, application server and cache server. Each component can be used to deploy parts of several independent information systems, thus realizing shared-resource approach. A strategy of separation of competencies between the client and the server is proposed. The strategy assumes that the client side is responsible for application logic and the server side is respons
APA, Harvard, Vancouver, ISO, and other styles
4

Yan, Jing, Zhao Chang, Ke Cheng, and Shuguang Wang. "A Range Query Method for Data Access Pattern Protection Based on Uniform Access Frequency Distribution." Journal of Networking and Network Applications 3, no. 1 (2023): 11–18. http://dx.doi.org/10.33969/j-nana.2023.030102.

Full text
Abstract:
Data encryption is necessary to keep user information secure and private on the cloud. However, adversaries can still learn valuable information about the encrypted data by observing data access patterns. To solve this issue, Oblivious RAMs (ORAMs) are proposed to hide access patterns. However, ORAMs are expensive and not suitable for deployment in a large database. In this work, we propose a range query algorithm while providing data access pattern protection based on uniform access frequency. In the preprocessing, multiple key-value pairs in the database are grouped and stored in each storag
APA, Harvard, Vancouver, ISO, and other styles
5

Yun, Unil, Gwangbum Pyun, and Eunchul Yoon. "Efficient Mining of Robust Closed Weighted Sequential Patterns Without Information Loss." International Journal on Artificial Intelligence Tools 24, no. 01 (2015): 1550007. http://dx.doi.org/10.1142/s0218213015500074.

Full text
Abstract:
Sequential pattern mining has become one of the most important topics in data mining. It has broad applications such as analyzing customer purchase data, Web access patterns, network traffic data, DNA sequencing, and so on. Previous studies have concentrated on reducing redundant patterns among the sequential patterns, and on finding meaningful patterns from huge datasets. In sequential pattern mining, closed sequential pattern mining and weighted sequential pattern mining are the two main approaches to perform mining tasks. This is because closed sequential pattern mining finds representative
APA, Harvard, Vancouver, ISO, and other styles
6

Morishita-Suzuki, Kumi, and Shuichiro Watanabe. "Health Information Source Patterns and Dietary Variety among Older Adults Living in Rural Japan." International Journal of Environmental Research and Public Health 21, no. 7 (2024): 865. http://dx.doi.org/10.3390/ijerph21070865.

Full text
Abstract:
Dietary variety is associated with some health outcomes among older adults. Rural areas, however, often have difficulty accessing health information that influences dietary variety. This study aimed to identify patterns of health information sources by using latent class analysis and assess their association with dietary variety among older adults aged ≥75 in rural Japan (n = 411). Three patterns of health information sources were identified: multi-sources (29.7%), television-only (53.5%), and non-sources (16.8%). In the multi-sources pattern, more people used television, radio, and newspapers
APA, Harvard, Vancouver, ISO, and other styles
7

Chu, Maoxiang, Liming Liu, Yonghui Yang, and Rongfen Gong. "Twin Support Vector Machine With Local Structural Information for Pattern Classification." IEEE Access 6 (2018): 64237–49. http://dx.doi.org/10.1109/access.2018.2877444.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

SMYTH, BARRY. "ADAPTIVE INFORMATION ACCESS: PERSONALIZATION AND PRIVACY." International Journal of Pattern Recognition and Artificial Intelligence 21, no. 02 (2007): 183–205. http://dx.doi.org/10.1142/s0218001407005363.

Full text
Abstract:
As online information continues to grow at an exponential rate our ability to access this information effectively does not, and users are often frustrated by how difficult it is to locate the right information quickly and easily. So-called personalization technology is a potential solution to this information overload problem: by automatically learning about the needs and preferences of users, personalized information access solutions have the potential to offer users a more proactive and intelligent form of information access that is sensitive to their long-term preferences and current needs.
APA, Harvard, Vancouver, ISO, and other styles
9

BANERJEE, ANINDYA, and DAVID A. NAUMANN. "Stack-based access control and secure information flow." Journal of Functional Programming 15, no. 2 (2005): 131–77. http://dx.doi.org/10.1017/s0956796804005453.

Full text
Abstract:
Access control mechanisms are often used with the intent of enforcing confidentiality and integrity policies, but few rigorous connections have been made between information flow and runtime access control. The Java virtual machine and the .NET runtime system provide a dynamic access control mechanism in which permissions are granted to program units and a runtime mechanism checks permissions of code in the calling chain. We investigate a design pattern by which this mechanism can be used to achieve confidentiality and integrity goals: a single interface serves callers of more than one securit
APA, Harvard, Vancouver, ISO, and other styles
10

Berridge, Philip, Volker Koch, and Andre G. P. Brown. "Information Spaces for Mobile City Access." International Journal of Architectural Computing 1, no. 1 (2003): 34–45. http://dx.doi.org/10.1260/147807703322467315.

Full text
Abstract:
This paper describes two complementary European research projects that share common interests and goals. The work described is intended to facilitate city analysis and support decision-making. The first project focuses on the distribution, access and ease of use of city data. The system allows access to historical data concerning key buildings in Liverpool, England, via a suite of web-based tools and a palmtop device. The second project looks at extending the functionality of traditional computer aided design (CAD) software to enable geometric and semantic data to be combined within a single e
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Information Access Pattern"

1

Samii, Soheil. "Power Modeling and Scheduling of Tests for Core-based System Chips." Thesis, Linköping University, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2863.

Full text
Abstract:
<p>The technology today makes it possible to integrate a complete system on a single chip, called "System-on-Chip'' (SOC). Nowadays SOC designers use previously designed hardware modules, called cores, together with their user defined logic (UDL), to form a complete system on a single chip. The manufacturing process may result in defect chips, for instance due to the base material, and therefore testing chips after production is important in order to ensure fault-free chips. </p><p>The testing time for a chip will affect its final cost. Thus it is important to minimize the testing time for eac
APA, Harvard, Vancouver, ISO, and other styles
2

Oskarsson, Tim. "Digital incursion: Breaching the android lock screen and liberating data." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44939.

Full text
Abstract:
Android is the most used operating system in the world, because of this the probability of an android device being acquired in an investigation is high. To begin to extract data from an android device you first need to gain access to it. Mechanisms like full system encryption can make this very difficult. In this paper, the advantages and disadvantages of different methods of gaining access and extracting data from an android device with an unlocked bootloader are discussed. Many users unlock the bootloader of their android device to gain a much greater level of control over it. Android forens
APA, Harvard, Vancouver, ISO, and other styles
3

Yan, Peng Fan. "Detecting suspicious access patterns in secure physical environment." Thesis, University of Macau, 2009. http://umaclib3.umac.mo/record=b2099647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kavathe, Rucha S. "Patterns of Access and Use of Online Health Information among Internet Users: A Case Study." Bowling Green State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1250696451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Milne, Patricia A., and n/a. "The effect of enhanced electronic access to information on academics' patterns of scholarly communication at the Australian National University." University of Canberra. Information Management & Tourism, 1998. http://erl.canberra.edu.au./public/adt-AUC20050819.124920.

Full text
Abstract:
This study examined the effect of enhanced electronic access to information on patterns of scholarly communication. Using a panel typology, the academics at the Australian National University were surveyed in 1991 and again in 1994, with the data collected by means of mailed questionnaires. The research drew on the literature of scholarly communication and information-seeking behaviour. Principles of systems theory were used to explain the changes taking place within the academics' environments, including both the system of scholarly communication and the culture of the three disciplinary grou
APA, Harvard, Vancouver, ISO, and other styles
6

Ylikoski, Teemu. "Acces denied : patterns of consumer Internet information search and the effects of Internet search expertise /." Helsinki : Helsinki School of Economics, 2003. http://aleph.unisg.ch/hsgscan/hm00085002.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cousins, Karlene C. "Access Anytime Anyplace: An Empircal Investigation of Patterns of Technology Use in Nomadic Computing Environments." unrestricted, 2004. http://etd.gsu.edu/theses/available/etd-12132004-144636/.

Full text
Abstract:
Thesis (Ph.D.)--Georgia State University, 2004.<br>Ttitle from title screen. Daniel Robey, committee chair; Marie Claude-Boudreau , Michale Gallivan, Upkar Varshney, committee members. 191 p. [numbered vi, 181] : ill. (some col.). Description based on contents viewed Feb. 26, 2007. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
8

Torres, Carvajal Raul Ernesto [Verfasser], and Thomas [Akademischer Betreuer] Ludwig. "Comparison of Compiler's Intermediate Representations and Input/Output Access Patterns with String Kernels / Raul Ernesto Torres Carvajal ; Betreuer: Thomas Ludwig." Hamburg : Staats- und Universitätsbibliothek Hamburg, 2018. http://d-nb.info/1173323074/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Torres, Carvajal Raul Ernesto Verfasser], and Thomas [Akademischer Betreuer] [Ludwig. "Comparison of Compiler's Intermediate Representations and Input/Output Access Patterns with String Kernels / Raul Ernesto Torres Carvajal ; Betreuer: Thomas Ludwig." Hamburg : Staats- und Universitätsbibliothek Hamburg, 2018. http://d-nb.info/1173323074/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Badino, Leonardo. "Identifying prosodic prominence patterns for English text-to-speech synthesis." Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4744.

Full text
Abstract:
This thesis proposes to improve and enrich the expressiveness of English Text-to-Speech (TTS) synthesis by identifying and generating natural patterns of prosodic prominence. In most state-of-the-art TTS systems the prediction from text of prosodic prominence relations between words in an utterance relies on features that very loosely account for the combined effects of syntax, semantics, word informativeness and salience, on prosodic prominence. To improve prosodic prominence prediction we first follow up the classic approach in which prosodic prominence patterns are flattened into binary seq
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Information Access Pattern"

1

Arthur, S. W. Enhanced logical access control of distributed information systems using pattern recognition techniques. The Author], 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

IEEE Workshop on Content-Based Access of Image and Video Libraries (1998 Santa Barbara, Calif.). IEEE Workshop on Content-based Access of Image and Video Libraries: Proceedings : June 21, 1998, Santa Barabra, California. IEEE Computer Society, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

IEEE Workshop on Content-Based Access of Image and Video Libraries (1997 San Juan, P.R.). Proceedings, IEEE Workshop on Content-Based Access of Image and Video Libraries: June 20, 1997, San Juan, Puerto Rico. IEEE Computer Society, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

IEEE Workshop on Content-Based Access of Image and Video Libraries (2001 Kauai, Hawaii). IEEE Workshop on Content-Based Access of Image and Video Libraries (CBAIVL 2001): Proceedings : 14 December, 2001, Kauai, Hawaii. IEEE Computer Society, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

IEEE Workshop on Content-Based Access of Image and Video Libraries (2000 Hilton Head Island, S.C.). Proceedings, IEEE Workshop on Content-Based Access of Image and Video Libraries, Hilton Head Island, South Carolina, June 12, 2000. IEEE Computer Society, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

David, Hutchison. Advances in Biometrics: Third International Conference, ICB 2009, Alghero, Italy, June 2-5, 2009. Proceedings. Springer Berlin Heidelberg, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gregory, Neven, and SpringerLink (Online service), eds. Progress in Cryptology – LATINCRYPT 2012: 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ylikoski, Teemu. Access denied: Patterns of consumer Internet information search and the effects of Internet search expertise. Helsinki School of Economics, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Multilingual Information Access Evaluation. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Content-Based Access of Image and Video Libraries (Cbaivl 2001), 2001 IEEE Workshop on. Ieee, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Information Access Pattern"

1

Morzy, Tadeusz, Marek Wojciechowski, and Maciej Zakrzewicz. "Optimizing Pattern Queries for Web Access Logs." In Advances in Databases and Information Systems. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44803-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alraizza, Amjad, Abdulmohsen Algarni, and Asmaa Alrayzah. "Enhancing Ransomware Detection Using Storage Access Pattern." In IFIP Advances in Information and Communication Technology. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-96231-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kitsuregawa, Masaru, and Iko Pramudiono. "PC Cluster Based Parallel Frequent Pattern Mining and Parallel Web Access Pattern Mining." In Databases in Networked Information Systems. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39845-5_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shin, Ilhoon. "Influence of Access Pattern on Performance of NAND-Based Storage." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22603-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bao, Jian. "Research of Matrix Clustering Algorithm Based on Web User Access Pattern." In Web Information Systems and Mining. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23982-3_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cho, Doosan. "A Memory Access Pattern Based Data Distribution Technique for Array Processors." In Convergence and Hybrid Information Technology. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24106-2_80.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Van Rompay, Cédric, Refik Molva, and Melek Önen. "Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage." In Information and Communications Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01950-1_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Saiz-Noeda, Maximiliano, José Luis Vicedo, and Rubén Izquierdo. "Pattern-Based Image Retrieval with Constraints and Preferences on ImageCLEF 2004." In Multilingual Information Access for Text, Speech and Images. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11519645_61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tang, Xingpeng, and Jingwei Li. "Improving Online Restore Performance of Backup Storage via Historical File Access Pattern." In Communications in Computer and Information Science. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-8445-7_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mangal, Deepak, Saurabh Singhal, and Dilip Sharma. "An Algorithm for Prediction of Web User Navigation Pattern and Restructuring of Web Structure Based on Visitor’s Web Access Pattern." In Communications in Computer and Information Science. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9942-8_64.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Information Access Pattern"

1

Yan, Jianxiang, Guanghui Song, Ying Li, Zhaoji Zhang, and Yuhao Chi. "Enhanced ODMA with Channel Code Design and Pattern Collision Resolution for Unsourced Multiple Access." In 2024 IEEE International Symposium on Information Theory (ISIT). IEEE, 2024. http://dx.doi.org/10.1109/isit57864.2024.10619608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Xu, Jiawei Zhang, Huitao Zhou, Bojun Zhang, Zhiqun Gu, and Yuefeng Ji. "A Traffic Pattern Identification and Switching Granularity Selection Scheme in Metro/Access All-Optical Switching Networks." In 2024 Asia Communications and Photonics Conference (ACP) and International Conference on Information Photonics and Optical Communications (IPOC). IEEE, 2024. https://doi.org/10.1109/acp/ipoc63121.2024.10809667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"IMPLEMENTING THE DATA ACCESS OBJECT PATTERN USING ASPECTJ." In 10th International Conference on Enterprise Information Systems. SciTePress - Science and and Technology Publications, 2008. http://dx.doi.org/10.5220/0001714805230530.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cho, KyoungWoon, YeonSeung Ryu, Youjip Won, and Kern Koh. "Considering User's Access Pattern in Multimedia File Systems." In ITCom 2002: The Convergence of Information Technologies and Communications, edited by Andrew G. Tescher, Bhaskaran Vasudev, V. Michael Bove, Jr., and Ajay Divakaran. SPIE, 2002. http://dx.doi.org/10.1117/12.455698.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Reimer, Tim, Phil Abraham, and Qing Tan. "Federated Identity Access Broker Pattern for Cloud Computing." In 2013 16th International Conference on Network-Based Information Systems (NBiS). IEEE, 2013. http://dx.doi.org/10.1109/nbis.2013.23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, Changjong, Yongseok Son, and Sunggon Kim. "Towards Access Pattern Prediction for Big Data Applications." In 2022 13th International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2022. http://dx.doi.org/10.1109/ictc55196.2022.9952775.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nakano, Yuto, Shinsaku Kiyomoto, and Yutaka Miyake. "Evaluation of Memory Access Pattern Protection in a Practical Setting." In Information Security and Assurance 2014. Science & Engineering Research Support soCiety, 2014. http://dx.doi.org/10.14257/astl.2014.48.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hue, T. B. P., D. N. Thuc, T. B. D. Thuy, I. Echizen, and S. Wohlgemuth. "Protecting Access Pattern Privacy in Database Outsourcing Service." In 2013 Workshops of 27th International Conference on Advanced Information Networking and Applications (WAINA). IEEE, 2013. http://dx.doi.org/10.1109/waina.2013.198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Grund, Martin, Matthieu Schapranow, Jens Krueger, Jan Schaffner, and Anja Bog. "Shared Table Access Pattern Analysis for Multi-Tenant Applications." In 2008 IEEE Symposium on Advanced Management of Information for Globalized Enterprises, AMIGE. IEEE, 2008. http://dx.doi.org/10.1109/amige.2008.ecp.37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Xing, Qiquan Shi, Gang Hu, et al. "Block Access Pattern Discovery via Compressed Full Tensor Transformer." In CIKM '21: The 30th ACM International Conference on Information and Knowledge Management. ACM, 2021. http://dx.doi.org/10.1145/3459637.3482323.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Information Access Pattern"

1

Guzmán, Eduardo Alonso. Central American Report No. 1 (2000). Inter-American Development Bank, 2001. http://dx.doi.org/10.18235/0008590.

Full text
Abstract:
The Central American Common Market (CACM) comprises Costa Rica, El Salvador, Guatemala, Honduras and Nicaragua, the signatories of the General Treaty on Economic Integration in 1960. The basic pattern of economic integration in Central America was based on a free trade area, with a common external tariff and standardized customs rules, a preferential payments system that operated until the start of the 1980s, and a scheme for the subregional coordination of economic policy. This annual report aims to facilitate access to information for a broad potential readership interested in the Central Am
APA, Harvard, Vancouver, ISO, and other styles
2

Jansson, Tor. Financing Microfinance: Exploring the Funding Side of Microfinance Institutions. Inter-American Development Bank, 2003. http://dx.doi.org/10.18235/0009076.

Full text
Abstract:
This paper aims to reveal some basic trends in the financing of microfinance institutions, such as where the financing comes from, and how the distribution changes over time. The paper does not claim to be a comprehensive review of this topic, but it offers some new information and points to some previously unexplored patterns. The paper also identifies and examines key emerging issues that face the increasing number of transformed microfinance institutions, including access to capital markets, greater reliance on foreign currency liabilities and the search for additional equity.
APA, Harvard, Vancouver, ISO, and other styles
3

Lamarque, Hugh, and Hannah Brown. Key considerations: Mpox in the Busia-Malaba border region linking Uganda and Kenya. Institute of Development Studies, 2025. https://doi.org/10.19088/sshap.2025.022.

Full text
Abstract:
Mpox has spread along the Busia-Malaba border that links eastern Uganda and western Kenya, with risk factors centred on cross-border mobility. Community responses to mpox are shaped by access to information on radio, television and social media as well as local terminologies, understandings of disease aetiology, spiritual and religious beliefs, household structures and cross-border mobility patterns. Despite vaccine allocations from the World Health Organization (WHO), the response has been hindered by resource constraints, mistrust and cross-border challenges. This brief summarises findings o
APA, Harvard, Vancouver, ISO, and other styles
4

Collins, Clarence O., and Tyler J. Hesser. altWIZ : A System for Satellite Radar Altimeter Evaluation of Modeled Wave Heights. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/39699.

Full text
Abstract:
This Coastal and Hydraulics Engineering Technical Note (CHETN) describes the design and implementation of a wave model evaluation system, altWIZ, which uses wave height observations from operational satellite radar altimeters. The altWIZ system utilizes two recently released altimeter databases: Ribal and Young (2019) and European Space Agency Sea State Climate Change Initiative v.1.1 level 2 (Dodet et al. 2020). The system facilitates model evaluation against 1 Hz1 altimeter data or a product created by averaging altimeter data in space and time around model grid points. The system allows, fo
APA, Harvard, Vancouver, ISO, and other styles
5

Vlaicu, Razvan. Digital Payments Adoption by Consumers and Firms: Implications for Financial Inclusion. Inter-American Development Bank, 2025. https://doi.org/10.18235/0013575.

Full text
Abstract:
Digital payments have increasingly been adopted by consumers and firms in Latin America and the Caribbean. This policy research paper analyzes recent post-pandemic data on digital payments in the region to describe adoption patterns, measure adoption gaps, and identify adoption barriers. The data reveal a positive trend in the use of financial accounts for receiving wages, and of payment apps and digital wallets for purchases in-person and online. Despite increased average adoption, sizable gaps remain both between countries and within countries. At the consumer level, factors associated with
APA, Harvard, Vancouver, ISO, and other styles
6

Tawfik, Aly, and Utsav Shah. Analysis of Freight Movements in the San Joaquin Valley. Mineta Transportation Institute, 2023. http://dx.doi.org/10.31979/mti.2023.2131.

Full text
Abstract:
Freight transportation plays a primary role in supply chains, costs, and availability of goods and is a major part of the economy. This study identifies, assesses, and utilizes different data sources to uncover and understand the patterns and movements of different types of freight in the San Joaquin Valley’s (SJV's) different counties. The San Joaquin Valley region consists of eight counties: San Joaquin, Stanislaus, Merced, Madera, Fresno, Kings, and Tulare. This research explored some major datasets with freight information, such as Global Trade Atlas (GTA), Port Imports and Exports Reporti
APA, Harvard, Vancouver, ISO, and other styles
7

Melad, Kris Ann. From Complaints to Opportunities: Analyzing Grievance Trends and Responsiveness in the 4Ps. Philippine Institute for Development Studies, 2023. http://dx.doi.org/10.62986/dp2023.25.

Full text
Abstract:
The 4Ps grievance redress system (GRS) is designed to facilitate due process in resolving the concerns and complaints about the program of beneficiary households, program stakeholders, and the general public. As with other social programs globally, the 4Ps GRS serves as a social accountability measure in response to risks of error, fraud, corruption, and leakages due to the intensive requirements and complexity of its operations. This study investigates the 4Ps GRS by analyzing grievance case data from 2010 to 2022. Key patterns and challenges emerged, with a notable increase in grievance volu
APA, Harvard, Vancouver, ISO, and other styles
8

Lines, Lisa M., Florence K. L. Tangka, Sonja Hoover, and Sujha Subramanian. People with Colorectal Cancer in SEER-Medicare: Part D Uptake, Costs, and Outcomes. RTI Press, 2020. http://dx.doi.org/10.3768/rtipress.2020.rr.0037.2005.

Full text
Abstract:
Limited information exists about enrollment in Part D prescription coverage by Medicare beneficiaries with cancer. Part D coverage may increase access to medicines. This study evaluated patterns of Part D uptake and costs and assessed the effects of coverage on hospitalizations and emergency department (ED) use among people with colorectal cancer (CRC). We analyzed Surveillance, Epidemiology, and End Results (SEER)–Medicare linked data on fee-for-service (FFS) Medicare beneficiaries with at least 36 months of follow-up who were diagnosed with CRC at any point from January 2007 through December
APA, Harvard, Vancouver, ISO, and other styles
9

Thomas, Samuel, Elaine Baker, Kamal Aryal, et al. Towards Climate Resilient Agriculture in Nepal: Solutions for smallholder farmers. International Centre for Integrated Mountain Development (ICIMOD), 2024. https://doi.org/10.53055/icimod.1077.

Full text
Abstract:
Nepal, one of the world’s most climate-vulnerable countries, is facing severe impacts from climate change, particularly in its agricultural sector, which employs two-thirds of the population and contributes more than a quarter of the nation’s GDP. Smallholder farmers, the backbone of this sector, are grappling with rising temperatures, erratic monsoon patterns, droughts, and increasingly frequent extreme weather events. Adapting to these challenges through Climate-Resilient Agriculture (CRA) is essential to ensuring food security and safeguarding the livelihoods of millions. CRA incorporates n
APA, Harvard, Vancouver, ISO, and other styles
10

Lynch, Clifford, and Diane Goldenberg-Hart. Beyond the Pandemic: The Future of the Research Enterprise in Academic Year 2021-22 and Beyond. Coalition for Networked Information, 2021. http://dx.doi.org/10.56561/mwrp9673.

Full text
Abstract:
In early June 2021, representatives from a number of CNI member institutions gathered for the third in a series of Executive Roundtable discussions that began in spring 2020, during the early days of the COVID-19 emergency. The conversations were intended to inform our understanding of how the pandemic had impacted the research enterprise and to share information about how institutions were planning to shape investments and strategies surrounding the research enterprise going forward. Previous Roundtables were held in April and September 2020 and reports from those conversations are available
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!