48 research outputs found

    Reports required by government auditing standards and the uniform guidance for the year ended June 30, 2018

    Get PDF
    This is an audit of Clemson University’s compliance with the types of compliance requirements described in the OMB Compliance Supplement that could have a direct and material effect on each of the University’s major federal programs. The University’s major federal programs are identified in the summary of auditor’s results section of the accompanying schedule of findings and questioned costs

    Recent Advances in Minimally Invasive Surgery

    Get PDF
    Minimally invasive surgery has become a common term in visceral as well as gynecologic surgery. It has almost evolved into its own surgical speciality over the past 20 years. Today, being firmly established in every subspeciality of visceral surgery, it is now no longer a distinct skillset, but a fixed part of the armamentarium of surgical options available. In every indication, the advantages of a minimally invasive approach include reduced intraoperative blood loss, less postoperative pain, and shorter rehabilitation times, as well as a marked reduction of overall and surgical postoperative morbidity. In the advent of modern oncologic treatment algorithms, these effects not only lower the immediate impact that an operation has on the patient, but also become important key steps in reducing the side-effects of surgery. Thus, they enable surgery to become a module in modern multi-disciplinary cancer treatment, which blends into multimodular treatment options at different times and prolongs and widens the possibilities available to cancer patients. In this quickly changing environment, the requirement to learn and refine not only open surgical but also different minimally invasive techniques on high levels deeply impact modern surgical training pathways. The use of modern elearning tools and new and praxis-based surgical training possibilities have been readily integrated into modern surgical education,which persists throughout the whole surgical career of modern gynecologic and visceral surgery specialists

    Management: A bibliography for NASA managers

    Get PDF
    This bibliography lists 706 reports, articles, and other documents introduced into the NASA scientific and technical information system in 1984. Entries, which include abstracts, are arranged in the following categories: human factors and personnel issues; management theory and techniques; industrial management and manufacturing; robotics and expert systems; computers and information management; research and development; economics, costs, and markets; logistics and operations management; reliability and quality control; and legality, legislation, and policy. Subject, personal author, corporate source, contract number, report number, and accession number indexes are included

    \u3ci\u3eThe Conference Proceedings of the 2001 Air Transport Research Society (ATRS) of the WCTR Society, Volume 2\u3c/i\u3e

    Get PDF
    UNOAI Report 01-7https://digitalcommons.unomaha.edu/facultybooks/1147/thumbnail.jp

    Text Similarity Between Concepts Extracted from Source Code and Documentation

    Get PDF
    Context: Constant evolution in software systems often results in its documentation losing sync with the content of the source code. The traceability research field has often helped in the past with the aim to recover links between code and documentation, when the two fell out of sync. Objective: The aim of this paper is to compare the concepts contained within the source code of a system with those extracted from its documentation, in order to detect how similar these two sets are. If vastly different, the difference between the two sets might indicate a considerable ageing of the documentation, and a need to update it. Methods: In this paper we reduce the source code of 50 software systems to a set of key terms, each containing the concepts of one of the systems sampled. At the same time, we reduce the documentation of each system to another set of key terms. We then use four different approaches for set comparison to detect how the sets are similar. Results: Using the well known Jaccard index as the benchmark for the comparisons, we have discovered that the cosine distance has excellent comparative powers, and depending on the pre-training of the machine learning model. In particular, the SpaCy and the FastText embeddings offer up to 80% and 90% similarity scores. Conclusion: For most of the sampled systems, the source code and the documentation tend to contain very similar concepts. Given the accuracy for one pre-trained model (e.g., FastText), it becomes also evident that a few systems show a measurable drift between the concepts contained in the documentation and in the source code.</p

    “Be a Pattern for the World”: The Development of a Dark Patterns Detection Tool to Prevent Online User Loss

    Get PDF
    Dark Patterns are designed to trick users into sharing more information or spending more money than they had intended to do, by configuring online interactions to confuse or add pressure to the users. They are highly varied in their form, and are therefore difficult to classify and detect. Therefore, this research is designed to develop a framework for the automated detection of potential instances of web-based dark patterns, and from there to develop a software tool that will provide a highly useful defensive tool that helps detect and highlight these patterns

    Minding the Gap: Computing Ethics and the Political Economy of Big Tech

    Get PDF
    In 1988 Michael Mahoney wrote that “[w]hat is truly revolutionary about the computer will become clear only when computing acquires a proper history, one that ties it to other technologies and thus uncovers the precedents that make its innovations significant” (Mahoney, 1988). Today, over thirty years after this quote was written, we are living right in the middle of the information age and computing technology is constantly transforming modern living in revolutionary ways and in such a high degree that is giving rise to many ethical considerations, dilemmas, and social disruption. To explore the myriad of issues associated with the ethical challenges of computers using the lens of political economy it is important to explore the history and development of computer technology

    Technical Debt is an Ethical Issue

    Get PDF
    We introduce the problem of technical debt, with particular focus on critical infrastructure, and put forward our view that this is a digital ethics issue. We propose that the software engineering process must adapt its current notion of technical debt – focusing on technical costs – to include the potential cost to society if the technical debt is not addressed, and the cost of analysing, modelling and understanding this ethical debt. Finally, we provide an overview of the development of educational material – based on a collection of technical debt case studies - in order to teach about technical debt and its ethical implication
    corecore