999 research outputs found

    An evaluation of the Interactive Software Invocation System (ISIS) for software development applications

    Get PDF
    The Interactive Software Invocation System (ISIS), which allows a user to build, modify, control, and process a total flight software system without direct communications with the host computer, is described. This interactive data management system provides the user with a file manager, text editor, a tool invoker, and an Interactive Programming Language (IPL). The basic file design of ISIS is a five level hierarchical structure. The file manager controls this hierarchical file structure and permits the user to create, to save, to access, and to purge pages of information. The text editor is used to manipulate pages of text to be modified and the tool invoker allows the user to communicate with the host computer through a RUN file created by the user. The IPL is based on PASCAL and contains most of the statements found in a high-level programming language. In order to evaluate the effectiveness of the system as applied to a flight project, the collection of software components required to support the Annular Suspension and Pointing System (ASPS) flight project were integrated using ISIS. The ASPS software system and its integration into ISIS is described

    Cold molecular welding study Final report, Jun. 15, 1966 - Jun. 14, 1967

    Get PDF
    Cold molecular welding characteristics of metal pellets on stainless steel wear plate

    Interpretive computer simulator for the NASA Standard Spacecraft Computer-2 (NSSC-2)

    Get PDF
    An Interpretive Computer Simulator (ICS) for the NASA Standard Spacecraft Computer-II (NSSC-II) was developed as a code verification and testing tool for the Annular Suspension and Pointing System (ASPS) project. The simulator is written in the higher level language PASCAL and implented on the CDC CYBER series computer system. It is supported by a metal assembler, a linkage loader for the NSSC-II, and a utility library to meet the application requirements. The architectural design of the NSSC-II is that of an IBM System/360 (S/360) and supports all but four instructions of the S/360 standard instruction set. The structural design of the ICS is described with emphasis on the design differences between it and the NSSC-II hardware. The program flow is diagrammed, with the function of each procedure being defined; the instruction implementation is discussed in broad terms; and the instruction timings used in the ICS are listed. An example of the steps required to process an assembly level language program on the ICS is included. The example illustrates the control cards necessary to assemble, load, and execute assembly language code; the sample program to to be executed; the executable load module produced by the loader; and the resulting output produced by the ICS

    Cold molecular welding study in ultra-high vacuum Final report, 8 Oct. 1964 - 17 Dec. 1965

    Get PDF
    Cold molecular welding in ultrahigh vacuum of metals for use in Apollo projec

    Reframing Lesson Plans: The Foundation for Improving Instruction

    Get PDF
    This dissertation is a policy advocacy document that boldly states that it is our moral imperative to change the current educational landscape for the students attending Milwaukee Public Schools. In advocating for such a change, it is strongly suggested that the way to accomplish this challenging task is to mandate a stronger instructional foundation by leveraging the power of thoughtful lesson planning and design. Through its own merit, public and professional opinions and research findings, a viable argument is crafted to eliminate the current policy that marginalizes the planning process by suggesting through its current language, that the planning process is linear and serves nothing more than to meet compliance mandates. This advocated policy calls for improved educational outcomes for students by making a shift from transactional to transformational practices in what stands as the foundation and heart of teaching—lesson planning and design

    What Everyone Should Know About Cancer

    Get PDF

    Auto-Photography as Research Practice: Identity and Self-Esteem Research

    Get PDF
    This paper explores auto-photography as a form of research practice in the area of identity and self-esteem research. It allows researchers to capture and articulate the ways identity guides human action and thought. It involves the generation and examination of the static images that participants themselves believe best represent them. Auto-photography is an important tool for building bridges with marginalized groups in the research process, since it offers researchers a way to let participants speak for themselves. Furthermore, by using this method researchers can avoid exclusive reliance on survey questionnaires and other such research instruments that may be culturally biased. I present two research projects using auto-photography: one involving adolescent Latina girls and one involving Indian women. Based on the experience of these projects, I discuss auto-photography's importance in identity and self-esteem research. Finally, I discuss some of the benefits and challenges of working with this method

    Institutional Barriers to Research on Sensitive Topics: Case of Sex Communication Research Among University Students

    Get PDF
    When conducting research on sensitive topics, it is challenging to use new methods of data collection given the apprehensions of Institutional Review Boards (IRBs). This is especially worrying because sensitive topics of research often require novel approaches. In this article a brief personal history of navigating the IRB process for conducting sex communication research is presented, along with data from a survey that tested the assumptions long held by many IRBs. Results support some of the assumptions IRBs hold about sex communication research, but do not support some other assumptions

    An Analysis Of SAS No. 99 And Its Impact On The Big Fraud In Kentucky

    Get PDF
    Statement on Auditing Standards (SAS) No. 99 was implemented in 2002 and requires auditors to expand audit procedures to detect fraud.  This paper analyzes the impact the procedures outlined in SAS No. 99 would have made if they had been in effect at the time of one of the largest frauds in the history of Kentucky.  Wallace Wilkinson, former governor of Kentucky, was the target of FBI investigations at least seven times.  Wilkinson entangled such well-known names as the late Dave Thomas, founder of Wendy’s restaurants, in his fraud.  At the time of his death in July 2002, Wilkinson’s business empire was in bankruptcy after being kept afloat for years by one of the largest Ponzi schemes in the history of the state.&nbsp

    The normalization of sibling violence: Does gender and personal experience of violence influence perceptions of physical assault against siblings?

    Get PDF
    Despite its pervasive and detrimental nature, sibling violence (SV) remains marginalized as a harmless and inconsequential form of familial aggression. The present study investigates the extent to which perceptions of SV differ from those of other types of interpersonal violence. A total of 605 respondents (197 males, 408 females) read one of four hypothetical physical assault scenarios that varied according to perpetrator–victim relationship type (i.e., sibling vs. dating partner vs. peer vs. stranger) before completing a series of 24 attribution items. Respondents also reported on their own experiences of interpersonal violence during childhood. Exploratory factor analysis reduced 23 attribution items to three internally reliable factors reflecting perceived assault severity, victim culpability, and victim resistance ratings. A 4 × 2 MANCOVA—controlling for respondent age—revealed several significant effects. Overall, males deemed the assault less severe and the victim more culpable than did females. In addition, the sibling assault was deemed less severe compared to assault on either a dating partner or a stranger, with the victim of SV rated just as culpable as the victim of dating, peer, or stranger-perpetrated violence. Finally, respondents with more (frequent) experiences of childhood SV victimization perceived the hypothetical SV assault as being less severe, and victim more culpable, than respondents with no SV victimization. Results are discussed in the context of SV normalization. Methodological limitations and applications for current findings are also outlined
    • …
    corecore