LinCa Ling, Chen; Wang, Lei; Lang, Jun ...
Companion Proceedings of the The Web Conference 2018,
04/2018
Conference Proceeding
Odprti dostop
Internet access restriction in various areas unceasingly poses inconvenience for users. Unblocked websites or web pages always accompany couple fate-to-fail links from blocked servers due to such ...restrictions, while users wait for a long time to see contents of these blocked/invalid links. Therefore, it is better to directly show timeout links to users for better experiences rather than making users excessively wait. In this paper, we present LinCa (Links Catcher), a novel approach that fully considers the Internet access restriction and reduces page loading time on client-side by parsing all HTTP requests, and intercepting all invalid links when a web navigation starts. Thus, we first create and maintain a Rule Base to store invalid links under given access restriction rules. We then update the Rule Base periodically to cover as many invalid links as possible and remove links that become valid. We finally demonstrate the effectiveness of LinCa through experiments by building and deploying a Chrome extension. Experimental results show that LinCa can reduce page loading time with average 28.12% of original page loading time for our data sets.
The required elements for developing, implementing, and administering effective electromagnetic energy (EME) safety programs (SPs) to achieve compliance with applicable human exposure limits are ...specified. Concomitant EME hazards, such as those caused by interference to medical devices, ignition of flammable atmospheres, and detonation of explosive devices, are also addressed. Well-established safety processes are used to manage potential EME hazards from known EME sources in the 0 Hz to 300 GHz frequency range. SP elements for identifying EME hazard locations, implementing needed controls, and training personnel, are included. Additional descriptions and examples of the SP elements and various factors that can be helpful when assessing potential hazards and creating SPs are annexed. (NOTE: The PDF of this standard is available at no charge via the IEEE GET program, compliments of the United States Air Force, United States Army, United States Navy, and United States Marine Corps https://ieeexplore.ieee.org/browse/standards/get-program/page/series?id=82)
The required elements for developing, implementing, and administering effective electromagnetic energy (EME) safety programs (SPs) to achieve compliance with applicable human exposure limits are ...specified. Concomitant EME hazards, such as those caused by interference to medical devices, ignition of flammable atmospheres, and detonation of explosive devices, are also addressed. Well-established safety processes are used to manage potential EME hazards from known EME sources in the 0 Hz to 300 GHz frequency range. SP elements for identifying EME hazard locations, implementing needed controls, and training personnel, are included. Additional descriptions and examples of the SP elements and various factors that can be helpful when assessing potential hazards and creating SPs are annexed. (NOTE: The PDF of this standard is available at no charge via the IEEE GET program, compliments of the United States Air Force, United States Army, United States Navy, and United States Marine Corps https://ieeexplore.ieee.org/browse/standards/get-program/page/series?id=82)
This work describes the declaration and enforcement of geospatial access restrictions for the infrastructure of heterogenous and distributed geospatial information objects, as they are accessible via ...the service-oriented geospatial data infrastructure (GDI). Assuming a valid XML markup of the objects and their geometry using the Geographic Markup Language (GML), which is an international standard of the Open GIS Consortium, Inc. (OGC), a solution is introduced that allows the declaration and enforcement of access restrictions, encoded in GeoXACML. GeoXACML is a geospatial extension to the OASIS standard eXtensible Access Control Markup Language (XACML). Due to the nature of the introduced restrictions, the declaration of access restrictions can result in different kinds of inconsistencies. This work describes a mechanism for the detection and classification of contrary permissions. This work also describes a prototype implementation and an illustrating demonstration.
Elements of a radio frequency (RF) exposure safety program that provide reasonable and adequate guidance for preventing exposures in excess of recognized limits to electromagnetic fields from RF ...sources that operate in the frequency range of 3 kHz to 300 GHz are described in IEEE Std C95.7™-2014. The means for accomplishing this are classifying exposure locations into one of four categories based on the potential hazard, as defined by exposure limits, and specifying appropriate controls for each category. Such controls include engineering and administrative controls as well as the use of personal protective equipment, placement of appropriate RF safety signage, designation of restricted access areas, the use of personal RF monitors, and RF safety awareness training. These recommendations are not intended to apply to the purposeful exposure of patients by or under the direction of medical practitioners, but can be used in the development of safety programs for medical staff and other persons working with or incidentally exposed to RF fields, and for those wearing implanted or external medical electronic devices. Although designed to complement IEEE Std C95.1™, this recommended practice may also be used for the development of programs to ensure conformance with other guidelines, standards, or regulations for controlling human exposure to electromagnetic energy as well as IEEE Std C95.6™ in which case, appropriate modifications will be necessary to address the low frequency region addressed by IEEE Std C95.6™.
Elements of a radio frequency (RF) exposure safety program that provide reasonable and adequate guidance for preventing exposures in excess of recognized limits to electromagnetic fields from RF sources that operate in the frequency range of 3 kHz to 300 GHz are described in IEEE Std C95.7(TM)-2014. The means for accomplishing this are classifying exposure locations into one of four categories based on the potential hazard, as defined by exposure limits, and specifying appropriate controls for each category. Such controls include engineering and administrative controls as well as the use of personal protective equipment, placement of appropriate RF safety signage, designation of restricted access areas, the use of personal RF monitors, and RF safety awareness training. These recommendations are not intended to apply to the purposeful exposure of patients by or under the direction of medical practitioners, but can be used in the development of safety programs for medical staff and other persons working with or incidentally exposed to RF fields, and for those wearing implanted or external medical electronic devices. Although designed to complement IEEE Std C95.1(TM), this recommended practice may also be used for the development of programs to ensure conformance with other guidelines, standards, or regulations for controlling human exposure to electromagnetic energy as well as IEEE Std C95.6(TM) in which case, appropriate modifications will be necessary to address the low frequency region addressed by IEEE Std C95.6(TM). (The PDF of this standards is available at no charge thru the "IEEE Get Program" http://ieeexplore.ieee.org/servlet/opac?punumber=6874472)
Elements of a radio frequency (RF) exposure safety program that can prevent or control potential risks associated with exposure to the electromagnetic fields from RF sources that operate in the ...frequency range of 3kHz to 300 GHz are described in this recommended practice. The means for accomplishing this are classifying exposure locations into one of four categories based on the potential hazard, as defined by exposure limits, and specifying appropriate controls for each category. Such controls include engineering and administrative controls as well as the use of personal protective equipment, placement of appropriate RF safety signage, designation of restricted access areas, the use of personal RF monitors, and RF safety awareness training. These recommendations are not intended to apply to the purposeful exposure of patients by or under the direction of medical practitioners, but can be used in the development of safety programs for medical staff and other persons working with or incidentally exposed to RF fields, and for those wearing implanted or external medical electronic devices. Although designed to complement IEEE Std C95.1, this recommended practice may also be used for the development of programs to insure conformance with IEEE Std C95.6 and with other guidelines, standards, or regulations for controlling human exposure to electromagnetic energy.
The number of undocumented migrants in high‐income countries has increased in recent decades, imposing considerable political, fiscal, and social pressures on governments. This has fostered ...discussions on whether and to what extent undocumented migrants should get access to public programs and public benefits. Looking at the 2012 Spanish health reform, this is the first paper to document the impacts of a restriction on access to the health‐care system for undocumented migrants on health‐care utilization, health‐care system perceptions, and self‐reported health in a high‐income country. We show that such restrictions may significantly reduce planned care for undocumented migrants and result in sharp fall in positive opinions about the health‐care services still left available to them. We also exploit the heterogeneity in implementing the policy across regions and report stronger effects in regions that enforced the national ban more fully. Furthermore, in the first 3 years since the implementation of the reform, we find suggestive evidence of a worsening in self‐assessed health. This study is relevant for policymakers in the developed world, especially in countries that have recently implemented initiatives aimed at reducing the health‐care coverage for targeted groups, such as the United Kingdom and the United States.
Market access restrictions have been the focus of attention for various market players, but there are fewer studies on the competitive mechanism of market access restrictions on firms' product sales. ...This paper investigates the competitive mechanism of leader-follower product sales based on market access restrictions and forward contracts. First, the mechanism of leader-follower sales decisions based on market access restrictions and forward contracts is clarified. Second, it models the forward default risk suffered by followers and the profit rate of leader-follower based on market access restrictions and forward considerations by Bayes' posterior probability method. Moreover, it severely explores the impact mechanisms of the degree of market access restrictions on leaders and followers when followers do not adopt and adopt forwards and makes a simulation analysis. The results show that: (i) When followers do not employ forward contracts, the less restrictive degree of market access increases the supply of leaders, and leaders' competition for product sales further leads to a decrease in the provision of followers. (ii) When followers use forwards, leaders' and followers' expected discounted profit rates decrease with the total supply of products in the market increases. (iii) If the degree of market access restrictions is low, the followers suffer an increased forward default risk, resulting in their rate of revenue decrease. The findings of this paper have some practical significance and policy implications for the regulator to adjust the degree of market access restriction in each restricted access area, to establish a reasonable and efficient competitive environment for product sales, as well as for firms to choose the optimal way of competing for product sales.
Avoiding humans will be more difficult and energetically costly for animals as outdoor recreation increases and people venture farther into wildland areas that provide high‐quality habitat for ...wildlife. Restricting human access can be an attractive management tool to mitigate effects of human recreation activities on wildlife; however, the efficacy of such measures is rarely assessed. In 1982, Yellowstone National Park identified areas important to grizzly bears (Ursus arctos) to help protect critical grizzly bear habitat and reduce the likelihood of human injuries by bears. Referred to as bear management areas (BMAs), human access is restricted in these areas for 2–8 months each year, with timing and type of restrictions varying by area. We examined 2 datasets to evaluate grizzly bear selection of BMAs and differences of bear density in BMAs and non‐BMAs. First, we used 17 years of recent global positioning system telemetry data for grizzly bears to assess their selection of BMAs during periods when human access was allowed, and when access was restricted. We used step‐selection functions to test the hypothesis that bears spend time in places that allow them to avoid people and select quality food sources. There was support that grizzly bears differentially select for BMAs regardless of whether human access was restricted at the time, compared with areas outside BMAs, and that selection changed with sex and season. Only males during the summer and hyperphagic seasons changed their selection of BMAs based on whether access restrictions were in place, and overall, male bears preferred unrestricted BMAs (BMAs without restrictions in place). Females preferentially selected BMAs regardless of whether the area had access restrictions in place only during the mating season. Individuals varied widely in their preference for BMAs and access restrictions. Bears likely choose to spend time in BMAs based on available food resources rather than restrictions to human access. Supporting this interpretation, our analyses indicated that a greater proportion of BMA in an area was associated with higher densities of grizzly bear. Thus, restrictions to human access likely help reduce the potential for human–bear interactions, accomplishing one of the original objectives for establishing the BMAs.
In 1982, Yellowstone National Park instituted seasonal (from 2 to 8 months) restrictions to human access in areas thought to be important to grizzly bears (Bear Management Areas, BMAs), to help protect critical habitat for grizzly bears and reduce the likelihood of human injuries by bears. We evaluated selection of these areas by grizzly bears and found support that they selected BMAs, but that bears likely chose to spend time in these areas for the resources available rather than the restrictions to human access. We also found higher densities of grizzly bears inside BMAs, compared with outside these areas, suggesting that restrictions of human access likely helped to reduce the potential for human‐bear interactions.
This paper considers job shop scheduling problem followed by an assembly stage and Lot Streaming (LS). It is supposed here that a number of products have been ordered to be produced. Each product is ...assembled with a set of several parts. The production system includes two stages. The first stage is a job shop to produce parts. Each machine can process only one part at the same time. The second stage is an assembly shop that contains several parallel machines. Maintenance operations and access restrictions to machines in the first stage are also considered. The objective function is to minimize the completion time of all products (makespan). At first, this problem is described and modelled as a mixed integer linear programming, and GAMS software is applied to solve small-sized problems. Since this problem has been proved to be strongly NP-hard, two new algorithms based on GA and SA are developed to solve the medium- and large-sized problems. In order to verify the effectiveness of the proposed algorithms, a statistical analysis is used along with Relative Percentage Deviation (RPD) factor and well-known criterion. IMP. Various problems are solved by the proposed algorithms. Computational results reveal that both of the two proposed algorithms have good performance. However, the method based on the genetic algorithm performs better than the other proposed algorithm with respect to the objective functi