scholarly journals Scenarios and Spectra Set for CTBT OSI Information Barrier Testing

2017 ◽  
Author(s):  
Glen A. Warren ◽  
Brian D. Milbrath ◽  
Brian D. Milbrath
Keyword(s):  
2006 ◽  
Vol 55 (7) ◽  
pp. 3203
Author(s):  
Liu Su-Ping ◽  
Gong Jian ◽  
Hu Guang-Chun ◽  
Zhang Jian-Hua
Keyword(s):  

1993 ◽  
Vol 31 (5) ◽  
Author(s):  
Stanley C. Ross
Keyword(s):  

Author(s):  
Chitrakalpa Sen ◽  
Surya Teja Adury

Shared economy or access economy has ushered in a new revolution. It is often mentioned that the fourth industrial revolution will be propagated by sharing economies. This study reviews the nature of shared economy and its impacts. It focuses on the challenges posed by access economy, especially in context of emerging nations. It discusses the unique nature of trust as a construct, the potential of sharing economy platforms to reduce the information barrier, the changing nature of relationship with the factors of production and most importantly, the regulatory challenges in this particular market structure.


2012 ◽  
Vol 36 (4) ◽  
pp. 126-130 ◽  
Author(s):  
James McIntyre ◽  
Masum Khwaja ◽  
Venkata Yelamanchili ◽  
Sobia Naz ◽  
Maria Clarke

Aims and methodThis study explores knowledge and uptake of the voting rights of adult in-patients in the 2010 UK general election. A clinician-completed survey was used.ResultsEligible to vote psychiatric adult in-patients were half as likely to register as the general population and half as likely to vote if registered. Nine out of ten of those unregistered cited a lack of knowledge of their eligibility to vote or of the registration process. Long-stay patients were particularly disenfranchised.Clinical implicationsMany patients and staff remain unaware of the new rules which have given a greater proportion of in-patients the right to vote and have simplified the registration and voting processes. This information barrier may be addressed in future elections by providing timely written information to both patients and staff. Once registered, patients may need further support to overcome practical and psychological barriers, and cast their vote.


2013 ◽  
Vol 336-338 ◽  
pp. 2397-2400
Author(s):  
Yong Gang Huo ◽  
Peng Xu ◽  
Su Fen Li ◽  
Feng Han

Information barrier technology could meet the dual requirements to protect sensitive information and have a high confidence in the verification. It is an integrated mature technology in many fields which include nuclear detection science, nuclear electronics, and data encryption processing, and so on. It uses mature hardware and software technology to form multiple layers of protection to get the purpose of the protection of sensitive information. In this paper, the information barrier functional requirements and objectives are combined, the verification information barrier program is designed, and the system authentication method is discussed.


1994 ◽  
Vol 1 (1) ◽  
pp. 98
Author(s):  
David Robie

Review of Mastering the Maze: How to Use your Library to Break the Information Barrier, by Christine Fogg. Sydney: Australian Centre for Independent Journalism, 1994. Mastering the Maze is written for journalists  and researchers working in the media to show how they can use their library to tap into the global electronic village.


Sign in / Sign up

Export Citation Format

Share Document