LIBRARIANS ASSESSMENTS OF AUTOMATION SYSTEMS SURVEY RESULTS 2007 2010 A LIBRARY TECHNOLOGY REPORT ANDROMEDA YELTON
Preferences for Updates on General Research Results: A
There is a need for multimodal strategies to keep research participants informed about study results. Our aim was to characterize preferences of genomic research participants from two institutions along four dimensions of general research result updates: content, timing, mechanism, and frequency. Methods: We conducted a web-based cross-sectional survey that was administered from 25 June 2018
Conservation | Free Full-Text | Assessments of Bacterial
May 31, 2021Sustainable use of freshwater resources for human civilization needs requires the assessment and monitoring of freshwater health, and bacterial communities from riverbed sediments have been shown to be susceptible to chronic anthropogenic disturbances in freshwater ecosystems. Here, we took advantage of the occurrence of well-recognized adjacent sections from the Upper São
Buildings | Free Full-Text | A Comprehensive Framework for
This paper aims to propose a comprehensive framework for a clear description of system boundary conditions in life cycle energy assessment (LCEA) analysis in order to promote the incorporation of embodied energy impacts into building energy-efficiency regulations (BEERs). The proposed framework was developed based on an extensive review of 66 studies representing 243 case studies in over 15
Dissecting racial bias in an algorithm used to manage the
Oct 25, 2019Abstract. Health systems rely on commercial prediction algorithms to identify and help patients with complex health needs. We show that a widely used algorithm, typical of this industry-wide approach and affecting millions of patients, exhibits significant racial bias: At a given risk score, Black patients are considerably sicker than White patients, as evidenced by signs of uncontrolled
DRAA Book Titles - Library Holdings | JSTOR For Librarians
Academic E-Books: Publishers, Librarians, and Users: Purdue University Press: 2016: Book: Academic General Practice in the UK Medical Schools, 1948-2000: A Short History: Edinburgh University Press: 2011: Book: The Academic Mind and Reform: The Influence of Richard T. Ely in American Life: University Press of Kentucky: 1966: Book
IJERPH | Free Full-Text | Is a Mask That Covers the Mouth
Many countries introduced the requirement to wear masks in public spaces for containing SARS-CoV-2 making it commonplace in 2020. Up until now, there has been no comprehensive investigation as to the adverse health effects masks can cause. The aim was to find, test, evaluate and compile scientifically proven related side effects of wearing masks. For a quantitative evaluation, 44 mostly
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY
Feb 20, 2018This paper also examines re-identification attacks that can be realized on releases that adhere to k-anonymity unless accompanying policies are respected. The k-anonymity protection model is important because it forms the basis on which the real-world systems known as Datafly, μ-Argus and k-Similar provide guarantees of privacy protection.
How and Why Are Libraries Changing?
Jan 31, 2020One of the librarians interviewed in the DLF survey of usage and usability assessments told a story of a vendor who called to report a large number of turn-aways trying to access their resource, presumably to get the institution to license more simultaneous users.
The future of employment: How susceptible are jobs to
Jan 01, 2017First, together with a group of ML researchers, we subjectively hand-labelled 70 occupations, assigning 1 if automatable, and 0 if not. For our subjective assessments, we draw upon a workshop held at the Oxford University Engineering Sciences Department, examining the automatability of a wide range of tasks.
AUDITING THEORY AUDITING IN A COMPUTER INFORMATION SYSTEMS
Workstations cannot be used by many users, for different purposes, in different locations, all at the same time. 29. On-line computer systems may be classified according to a. How information is entered into the system. b. How it is processed. c. When the results are available to the user. d. All of the above. 30.