48 research outputs found
Reports required by government auditing standards and the uniform guidance for the year ended June 30, 2018
This is an audit of Clemson University’s compliance with the types of compliance requirements described in the OMB Compliance Supplement that could have a direct and material effect on each of the University’s major federal programs. The University’s major federal programs are identified in the summary of auditor’s results section of the accompanying schedule of findings and questioned costs
Recent Advances in Minimally Invasive Surgery
Minimally invasive surgery has become a common term in visceral as well as gynecologic surgery. It has almost evolved into its own surgical speciality over the past 20 years. Today, being firmly established in every subspeciality of visceral surgery, it is now no longer a distinct skillset, but a fixed part of the armamentarium of surgical options available. In every indication, the advantages of a minimally invasive approach include reduced intraoperative blood loss, less postoperative pain, and shorter rehabilitation times, as well as a marked reduction of overall and surgical postoperative morbidity. In the advent of modern oncologic treatment algorithms, these effects not only lower the immediate impact that an operation has on the patient, but also become important key steps in reducing the side-effects of surgery. Thus, they enable surgery to become a module in modern multi-disciplinary cancer treatment, which blends into multimodular treatment options at different times and prolongs and widens the possibilities available to cancer patients. In this quickly changing environment, the requirement to learn and refine not only open surgical but also different minimally invasive techniques on high levels deeply impact modern surgical training pathways. The use of modern elearning tools and new and praxis-based surgical training possibilities have been readily integrated into modern surgical education,which persists throughout the whole surgical career of modern gynecologic and visceral surgery specialists
Recommended from our members
Patterns of injury and violence in Yaoundé Cameroon: an analysis of hospital data.
BackgroundInjuries are quickly becoming a leading cause of death globally, disproportionately affecting sub-Saharan Africa, where reports on the epidemiology of injuries are extremely limited. Reports on the patterns and frequency of injuries are available from Cameroon are also scarce. This study explores the patterns of trauma seen at the emergency ward of the busiest trauma center in Cameroon's capital city.Materials and methodsAdministrative records from January 1, 2007, through December 31, 2007, were retrospectively reviewed; information on age, gender, mechanism of injury, and outcome was abstracted for all trauma patients presenting to the emergency ward. Univariate analysis was performed to assess patterns of injuries in terms of mechanism, date, age, and gender. Bivariate analysis was used to explore potential relationships between demographic variables and mechanism of injury.ResultsA total of 6,234 injured people were seen at the Central Hospital of Yaoundé's emergency ward during the year 2007. Males comprised 71% of those injured, and the mean age of injured patients was 29 years (SD = 14.9). Nearly 60% of the injuries were due to road traffic accidents, 46% of which involved a pedestrian. Intentional injuries were the second most common mechanism of injury (22.5%), 55% of which involved unarmed assault. Patients injured in falls were more likely to be admitted to the hospital (p < 0.001), whereas patients suffering intentional injuries and bites were less likely to be hospitalized (p < 0.001). Males were significantly more likely to be admitted than females (p < 0.001)DiscussionPatterns in terms of age, gender, and mechanism of injury are similar to reports from other countries from the same geographic region, but the magnitude of cases reported is high for a single institution in an African city the size of Yaoundé. As the burden of disease is predicted to increase dramatically in sub-Saharan Africa, immediate efforts in prevention and treatment in Cameroon are strongly warranted
Management: A bibliography for NASA managers
This bibliography lists 706 reports, articles, and other documents introduced into the NASA scientific and technical information system in 1984. Entries, which include abstracts, are arranged in the following categories: human factors and personnel issues; management theory and techniques; industrial management and manufacturing; robotics and expert systems; computers and information management; research and development; economics, costs, and markets; logistics and operations management; reliability and quality control; and legality, legislation, and policy. Subject, personal author, corporate source, contract number, report number, and accession number indexes are included
\u3ci\u3eThe Conference Proceedings of the 2001 Air Transport Research Society (ATRS) of the WCTR Society, Volume 2\u3c/i\u3e
UNOAI Report 01-7https://digitalcommons.unomaha.edu/facultybooks/1147/thumbnail.jp
Text Similarity Between Concepts Extracted from Source Code and Documentation
Context: Constant evolution in software systems often results in its documentation losing sync with the content of the source code. The traceability research field has often helped in the past with the aim to recover links between code and documentation, when the two fell out of sync. Objective: The aim of this paper is to compare the concepts contained within the source code of a system with those extracted from its documentation, in order to detect how similar these two sets are. If vastly different, the difference between the two sets might indicate a considerable ageing of the documentation, and a need to update it. Methods: In this paper we reduce the source code of 50 software systems to a set of key terms, each containing the concepts of one of the systems sampled. At the same time, we reduce the documentation of each system to another set of key terms. We then use four different approaches for set comparison to detect how the sets are similar. Results: Using the well known Jaccard index as the benchmark for the comparisons, we have discovered that the cosine distance has excellent comparative powers, and depending on the pre-training of the machine learning model. In particular, the SpaCy and the FastText embeddings offer up to 80% and 90% similarity scores. Conclusion: For most of the sampled systems, the source code and the documentation tend to contain very similar concepts. Given the accuracy for one pre-trained model (e.g., FastText), it becomes also evident that a few systems show a measurable drift between the concepts contained in the documentation and in the source code.</p
“Be a Pattern for the World”: The Development of a Dark Patterns Detection Tool to Prevent Online User Loss
Dark Patterns are designed to trick users into sharing more information or spending more money than they had intended to do, by configuring online interactions to confuse or add pressure to the users. They are highly varied in their form, and are therefore difficult to classify and detect. Therefore, this research is designed to develop a framework for the automated detection of potential instances of web-based dark patterns, and from there to develop a software tool that will provide a highly useful defensive tool that helps detect and highlight these patterns
Minding the Gap: Computing Ethics and the Political Economy of Big Tech
In 1988 Michael Mahoney wrote that “[w]hat is truly revolutionary about the computer will become clear only when computing acquires a proper history, one that ties it to other technologies and thus uncovers the precedents that make its innovations significant” (Mahoney, 1988). Today, over thirty years after this quote was written, we are living right in the middle of the information age and computing technology is constantly transforming modern living in revolutionary ways and in such a high degree that is giving rise to many ethical considerations, dilemmas, and social disruption. To explore the myriad of issues associated with the ethical challenges of computers using the lens of political economy it is important to explore the history and development of computer technology
Technical Debt is an Ethical Issue
We introduce the problem of technical debt, with particular focus on critical infrastructure, and put forward our view that this is a digital ethics issue. We propose that the software engineering process must adapt its current notion of technical debt – focusing on technical costs – to include the potential cost to society if the technical debt is not addressed, and the cost of analysing, modelling and understanding this ethical debt. Finally, we provide an overview of the development of educational material – based on a collection of technical debt case studies - in order to teach about technical debt and its ethical implication