搜索条件
« 上一页 |
1 - 100 共 2,402
|
下一页 »
每页显示结果数
搜索结果
-
- 类型:
- Article
- 摘抄:
- The time dilation formulas of both the Special Relativity and General Relativity could be studied using a factor dependent on specific energy. Should such factor be used to define the relativistic mass, the equation that arises is an approximation of the mass and energy relation. This mathematical definition of mass is finally compared to the equations that define Dark Matter Annihilation into charged states via loop-level processes.
- 作者:
- Viana, Javier
- 提交者:
- Javier Viana
- 上传日期:
- 12/04/2019
- 更改日期:
- 12/04/2019
- 创建:
- November 25, 2019
- 证书:
- All rights reserved
-
- 类型:
- Medium
- 摘抄:
- This webinar was presented to the RDAP community on December 2, 2019 at 12 pm EST. The goal of the webinar was to hear from the RDAP community about their experiences with institutional research data policies that regulate the ownership, management, and transfer of research data in an institution. The webinar organizing committee was Sophie Hou, Amy Schuler, and Clara Liebot invited panelists were: Kristin Briney, Biology & Biochemistry Librarian, Caltech University, Heather Coates, Digital Scholarship & Data Management Librarian / Co-Director, Center for Digital Scholarship, Indiana University Purdue University Indianapolis, Abigail Goben, Information Services and Data Management Librarian Associate Professor, University of Illinois-Chicago, Jonathan Petters, University Libraries Data Management Consultant and Curation Services Coordinator, Virginia Polytechnic Institute and State University. Background/Use Case (provided by Clara Llebot of Oregon State University): I work in a research intensive university as the library data management specialist. I have worked occasionally on data policies during my time here, like when we wrote the policy that regulates dataset reviews in our institutional repository. These policies were usually flexible, informative, and a helpful tool for me. Earlier this year I was asked to be part of a committee that would create an institutional research data management policy in our institution. I was thrilled that the library was being asked to participate, and at the same time terrified that I had no idea what I was getting into. I have been generally interested in concepts around data ownership, the interactions between copyright and data, decision making regarding research data, etc., but I felt unprepared.An institutional research data policy is, from my perspective, a policy that affects a lot of people, and that has the potential of changing behaviors and research practices in a way that I am definitely not used to. We are still beginning the process of creating the policy, so right now what I have is mostly questions, not answers, about what an institutional research data policy should say. Main Discussion Questions: 1. Motivations for the policy Is an institutional research data policy necessary in any institution? What are the issues/gaps that we are trying to address through this policy? What should be the goal of an institutional research data policy? 2. Roles and responsibilities Who should be involved in creating this kind of policy? How should the faculty be involved in the creation of this policy? How should a research data policy be enforced? How should students be affected by this policy? 3. Outcomes of existing data policies What is the type of content addressed in an institutional research data policy? Should ownership be a part of it? Are research data policies encouraging or deterring open data? What can we do, when writing this type of policy, to make clear that the university supports open data? Or should this be in different policies? What are some examples of situations that are easier/better because there is a research data policy at an institution?
- 作者:
- Koshoffer, Amy
- 提交者:
- Amy Koshoffer
- 上传日期:
- 12/03/2019
- 更改日期:
- 12/03/2019
- 创建:
- 2019-12-02
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- Article
- 摘抄:
- The time dilation formulas of both the Special Relativity and General Relativity could be studied using an expression dependent on specific energy. Should such factor be used to define the relativistic mass, the equation that arises is an approximation of the mass and energy relation. An entangled mathematical definition of mass that is finally compared to the equations that define Dark Matter Annihilation into charged states via loop-level processes.
- 作者:
- Viana, Javier
- 提交者:
- Javier Viana
- 上传日期:
- 11/30/2019
- 更改日期:
- 11/30/2019
- 证书:
- All rights reserved
-
- 类型:
- Article
- 摘抄:
- The time dilation formulas of both the Special Relativity and the General Relativity could be understood as children of a common expression that uses a factor dependent on the specific energy. Should such factor be used to define the relativistic mass, the equation that arises is an approximation of the mass and energy relation. An entangled mathematical definition of mass that is finally compared to the equations that define Dark Matter annihilation into charged states via loop-level processes.
- 作者:
- Viana, Javier
- 提交者:
- Javier Viana
- 上传日期:
- 11/20/2019
- 更改日期:
- 11/25/2019
- 创建:
- November 19, 2019
- 证书:
- All rights reserved
-
- 类型:
- Article
- 摘抄:
- The time dilation formulas of both the Special Relativity and the General Relativity could be understood as children of a common expression that uses a factor dependent on the specific energy. Should such factor be used to define the relativistic mass, the equation that arises is an approximation of the mass and energy relation. An entangled mathematical definition of mass that is finally compared to the equations that define Dark Matter annihilation into charged states via loop-level processes.
- 作者:
- Viana, Javier
- 提交者:
- Javier Viana
- 上传日期:
- 11/20/2019
- 更改日期:
- 11/20/2019
- 创建:
- November 18, 2019
- 证书:
- All rights reserved
-
- 类型:
- Article
- 摘抄:
- The time dilation formulas of both the specific relativity and the general relativity could be understood as children of a common expression that uses a factor dependent on the specific energy. Surprisingly when such factor is used to define the relativistic mass, the equation that arises is an extraordinary approximation of the mass and energy relation. An entangled mathematical perspective of both time and mass that opens up again the question of what their definition really is, and which are the factors that modify such variables.
- 作者:
- Viana, Javier
- 提交者:
- Javier Viana
- 上传日期:
- 11/01/2019
- 更改日期:
- 11/01/2019
- 创建:
- November 1, 2019
- 证书:
- All rights reserved
-
- 类型:
- Image
- 摘抄:
- Wind power represents one of the most promising sources of renewable energy and improvements to wind turbine design and control can have a significant impact on energy sustainability. This proposal is about a new design for efficient VAWT. Typically, VAWT power output is generated from the difference between the forces on the forward and backward facing blades to the wind direction. That reduces their efficiency as compared to the Horizontal Axis Wind Turbine (HAWT). The current innovation, eliminates the forces on the backward facing blades using dynamic blades which improve their efficiency to be comparablewith the HAWT. In addition, the turbine is fitted with aerodynamic brakes that safely stop the turbine at low and high wind speeds. This safety feature does not exist in any Vertical Axis Wind Turbine in the market. The innovation received the Accelerator to Commercialization award in 2014 from the state of Ohio and University of Cincinnati. Several small size prototypes were builtwhich validated the concept. VAWTs are capable of catching wind from all directions which avoid the need for yaw mechanisms, rudders or downwind coning. The electric generators can be positioned near the ground and are easily accessible for maintenance. The new invention will revolutionize thewind turbines andwind farms technology by improving the VAWT efficiency and safety.
- 作者:
- Abdallah, Shaaban and Viana, Javier
- 提交者:
- Javier Viana
- 上传日期:
- 10/05/2019
- 更改日期:
- 10/05/2019
- 证书:
- All rights reserved
-
- 类型:
- Article
- 摘抄:
- A formula has been developed that defines the relativity of time in a novel approach. In the present paper, this is particularized for cases of temporary dilation due to speed and gravity. Using the previous equation, that serves as basis of the theory proposed, an interpretation of the nature of Black Holes, their formation, growth, and dimension can be developed. Which ultimately leads to an alternative understanding of mass and energy.
- 作者:
- Viana, Javier
- 提交者:
- Javier Viana
- 上传日期:
- 10/03/2019
- 更改日期:
- 10/03/2019
- 证书:
- All rights reserved
-
- 类型:
- Article
- 摘抄:
- A formula has been developed that defines the relativity of time in a novel approach. In the present paper, this is particularized for cases of temporary dilation due to speed and gravity. Using the previous equation, that serves as basis of the “Time Theory” proposed, an interpretation of the nature of black holes, their formation, growth, and dimension can be developed. Which ultimately leads to an alternative understanding of mass and energy.
- 作者:
- Viana, Javier
- 提交者:
- Javier Viana
- 上传日期:
- 09/11/2019
- 更改日期:
- 09/11/2019
- 证书:
- All rights reserved
-
- 类型:
- Article
- 摘抄:
- A new formula has been developed that determines the passage of time. In the paper, this is particularized for cases of temporary dilation due to speed and gravity. Additionally, using the previous equation, an interpretation of the nature of black holes, their formation, growth, and dimension can be developed. Moreover, and based on all of the above, a different way of understanding mass and space is proposed. Which ultimately implies an alternative expression that relates mass and energy.
- 作者:
- Viaña, Javier
- 提交者:
- Javier Viana
- 上传日期:
- 09/06/2019
- 更改日期:
- 09/06/2019
- 创建:
- 2016-06-10
- 证书:
- All rights reserved
-
- 类型:
- Article
- 摘抄:
- The development of complex and dependable systems like autonomous vehicles relies increasingly on the use of systems modeling language (SysML). In fact, SysML has become a de facto standard for systems engineering. With model-driven engineering, a SysML model serves as a reference for the early defect detection of the system under design: the earlier the errors are detected, the less is the cost of handling the errors. Mutation testing is a fault-based technique that has recently seen its applications to SysML behavioral models (e.g., state machine diagrams). Specifically, a system's state-transition design can be fed to a model checker where mutants are automatically generated and then killed against the desired design specifications (e.g., safety properties). In this paper, we present a novel approach based on process mining to improve the effectiveness and efficiency of the SysML mutation testing based on model checking. In our approach, the mutation operators are applied directly to the state machine diagram. These mutants are then fed as traces into a process mining tool and checked according to the event logs. Our initial results indicates that the process mining approach kills more mutants faster than the model checking method.
- 作者:
- Alenazi, Mounifah; Savolainen, Juha, and Niu, Nan
- 提交者:
- Nan Niu
- 上传日期:
- 09/02/2019
- 更改日期:
- 09/05/2019
- 创建:
- 2019-09-02
- 证书:
- Open Data Commons Attribution License (ODC-By)
-
- 类型:
- Dataset
- 摘抄:
- The NATO and the EU Peacebuilding Missions Dataset is created to use fuzzy seta Qualitative Comparative Analysis (fsQCA) analysis as a method of researching how NATO and the EU missions’ outcomes are influences by organizational assets and decision-making in both organizations. Outcome pertaining to these two sets of missions are intended to measure various aspects of organizational efficacy. There are two groups of variables – condition variables and outcome variables. In the next few sections, we will explain how these two groups of variables were generated, what existing sources and datasets were used and how mission indicators were generated. See attached research note for more detailed information. Condition Sets: Description By and large conditions sets that have been generated measure organizational assets for these NATO and EU missions, as well as patterns in their decision-making process. Two critical organizational assets used for both sets of missions are their annual operational budget and their annual deployed personnel. The dataset contains two control variables measuring operational legitimacy – number of contributing nations and number of UN resolutions passed in relevance to the situation in the area of deployment for the duration of the EU and NATO Mission. Operational Duration – duration of the operation (in months). For ongoing missions, we have used December 31, 2018 as the end date. All data reflect occurrences no later than December 31, 2018. Type of Operation – based on their mandate, operations are classified as civilian (coded as 0), military (coded as 1) and hybrid (i.e. with military and civilian components, coded as 0.5). Annual Operational Budget – total annual mission budget in USD. Sources include SIPRI yearbook and peace operations database. In cases of missing data from the SIPRI yearbook, mission factsheets and original data from the mission have been used. This latter technique applies for the following missions: AMUK, AVSEC, BAM1, BAM2, CAP1, CAP2, MAM1, NAVF1, NAVF2, TMC1, EUAMI. If data is reported in EUR, average exchange rate for the duration of the mission has been used to convert the cost. Data has been adjusted to reflect operational budget over a 12-month period. Average Annual Mission Personnel – it reflects the average total number of personnel/ staff supporting the NATO or EU peacebuilding mission per annum. Sources have been collected from SIPRI yearbook based on reportings for actual deployments on the ground. In cases when no data has been reported I the SIPRI yearbook/ peace operations dataset, mission factsheets and original data from the mission have been used. The data has been averaged and adjusted for a 12-month period. Days to Launch – describes the number of days needed from the time a decision has been made by the IO top decision-making body (the European Council and NAC) to launch the mission to the time that the mission is officially declared “operational.” If no declaration that the mission is “fully operational” exists, landmark indicators that the mission is fully operational include: ceremony on the ground marking the beginning of the mission, the appointment of mission commander or first recoded operational presence involving activity on the ground. Sources include official EU and NATO documents announcing the decision to create the peacebuilding operation as well as official documents, press releases and reports in reliable media outlets (including New Agencies) documenting an event that would indicate the mission is “fully operational.” Number of Contributing Nations –highest reported number of contributing nations for the duration of the NATO and the EU peacebuilding operation. UN Security Council Resolutions – total number of UN Security Council (UNSG) resolutions relevant for the area of conflict adopted for the duration of the NATO and the EU mission. In cases when UNSC resolutions are relevant for multiple NATO and EU peacebuilding missions those have been reported to all relevant missions. Outcome Sets: Description Outcome sets include various indicators created to measure operational efficacy. They include annual events contributing toward peace, conflict and the mission’s functioning, annual fatalities and annual deaths among mission personnel, as well as annual difference in fatalities. A more detailed description of these indicators is included below: Annual Peace Events – this is an annual indicator based on chronologically recorded events by the SIPRI yearbook that have contributed for the peace process in the conflict area where NATO and EU mission have been deployed. Examples of peace events include steps taken to contribute to the peace process (e.g. creation of buffer zone, cession of hostilities, meeting intended to cease fire or set up the peace process, political events related to or contributing toward the peace process and successful conclusion of a peace agreement. It may also include a decision of an international body (e.g. UN Security Council, UN General Assembly or UN Secretary General, as well as a decision made by the NATO and the EU D-M bodies that contributes toward the peace process in the areas where the mission operates. For ongoing missions is December 31, 2017 the last date when annual peace events are recoded. Annual Conflict Events -- this is an annual indicator based on chronologically recorded events by the SIPRI yearbook that have increased the conflict and the conflict potential in the area where NATO and EU mission have been deployed. Instances include resumption of hostilities among warring parties, occurrence of attacks, clashes, eruption of violence, the killing of civilians, military and peacemaking personnel and other violence-related events that contribute toward instability in the mission’s area. For ongoing missions is December 31, 2017 the last date when annual conflict events are recoded. Annual Mission-related Events -- this is an annual indicator based on chronologically recorded events by the SIPRI yearbook that measures events related to functioning of the mission – the decision to launch, the actual launch, implementation, transfer of authority and/ or mandate, transformation and termination of the mission. It also includes events that reflect decisions made by the contributing nations or sponsoring IOs intended to impact mission’s performances (e.g. decisions related to funding, control and command, transformation of mission mandate and rules and other similar events). For ongoing missions is December 31, 2017 the last date when annual mission-related events are recoded. Average Annual Fatalities – this indicator reports how many average annual civilian deaths have been recorded for the duration of the mission. The data is drawn from the Armed Conflict Dataset (ACD) managed by the London-based International Institute for Strategic Studies ( https://acd.iiss.org/member/datatools.aspx). Average Annual Mission Casualties – average annual number of deaths among peacebuilding personnel as reported in SIPRI yearbook/ peace operations database for the duration of the mission. Authors have used discretion to determine the accuracy in cases when there is discrepancy of reported data. Fatalities Annual Difference – an indicator of differenced annual data of civilian casualties on the ground for the duration of the mission. The indicator is calculated as follows: Differenced Fatalities = Ʃ (CasualtiesY1-Y2 … Casualties Yn-Y(n-1))/ Duration of the mission (in years). It is intended to capture improvement of situation on the ground as a result of presence of the peacebuilding effort. Condition Sets: Calibration and Rationale Annual Operational Budget – mission budget reflects resources USD 5 million or less indicate fully out while USD 100 million or more would indicate fully in. A budget of USD 30 should be the watershed borderline of “nether in, not out.” [5-100 million] Average Annual Mission Personnel – this indicator draws distinction between larger well-resourced missions and smaller missions with limited assets. By and large, missions with 20 personnel or less are fully out, while those with 20,000 or more are fully in. The borderline (net hither in, not out) is 130 people. Days to Launch – the speed with which the decision is taken indicates how decision-making operated in the case of this mission. D-M that took 5 days or less should be fully out (in, change direction) while D-M 150 days or more should be fully in (out, change direction). 30 days (1 month) should be the neither in, nor out border. Number of Contributing Nations –control indicator that demotes how high number of contributing nations contribute toward greater legitimacy (30 or more countries marks fully in), while 5 or fewer nations marks fully out. The “nether fully in, nor fully out” is at 15 nations. UN Security Council Resolutions – total number of UNSC resolutions can vary, fully out is at 0 resolutions while fully in at 50 or more. Since moist of the missions are shorter, Nether fully in, not fully out would be at 8 UNSC resolutions. [Inductive] Operational Duration – 1 year (12 months) denotes fully out (i.e. short-term mission) while 10 year 120 months denotes fully in; nether in not out would be for missions lasting 5 years (60 months). In other words, a decade is too long, a year is to short, five years is in the middle. Outcome Variables: Calibration and Rationale Annual Peace Events – this variable measures the occurrence of peace-related events – 0 events per annum is fully out; 10 events per annum is fully in. 1 event is nether in not out. Annual Conflict Events -- this variable measures the occurrence of conflict-related events – 0 events per annum is fully out; 10 events per annum is fully in. 1 event is nether in not out. Annual Mission-related Events -- this variable measures the occurrence of peace-related events – 0 events per annum is fully out; 10 events per annum is fully in. 0.5 event is nether in not out. Average Annual Fatalities – this set measures average number of annual fatalities for the duration of the mission. Cases with 0 fatalities are fully out; cases with 10,000 fatalities are fully in. 1,000 fatalities represent “nether in, not out” value. Fatalities Annual Difference – this is an indicator that measures the average year-to-year difference in number of fatalities for the duration of the conflict. -50 casualties is fully out (i.e. average growth of casualties by 50 per annum) as this indicator reflects low mission efficacy. 500 is fully in. This number indicates high efficacy; it denotes an average annual decline of casualties by 500 people. If the average number of casualties remains unchanged, then 0 denotes nether in, nor out. Average Annual Mission Casualties – this indicator measures average number of annual casualties for the duration of the mission. 0 casualties is fully out; 500 casualties is fully in. 0.5 is nether in, nor out.
- 作者:
- Ivanov, Ivan
- 提交者:
- Ivan Ivanov
- 上传日期:
- 08/04/2019
- 更改日期:
- 11/04/2019
- 创建:
- 2019-08-01
- 证书:
- Open Data Commons Public Domain Dedication and License (PDDL)
-
- 类型:
- Article
- 摘抄:
- Shortly after the comparative analysis of Codding et al. was published, I prepared a comment on the article that I submitted for publication. In response to feedback from the editors, I eventually revised the manuscript substantially. That revised version has now been published. In this paper, I share the original submission of the comment, which focuses on important considerations for future studies of risk-‐ sensitive foraging. Meanwhile, Codding and his colleagues have published a response to my comment. They exhibit some confusion about my position, which they describe as “paradoxical.” In a reply to their response, I have therefore added some clarifying remarks at the end of this paper
- 作者:
- Koster, Jeremy
- 提交者:
- Jeremy Koster
- 上传日期:
- 07/26/2019
- 更改日期:
- 07/26/2019
- 创建:
- 2012-03
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- Dataset
- 摘抄:
- The aims of this study is to evaluate the impact of interactive student response software (SRS technology) in large introductory classes in Political Science taught at the University of Cincinnati. Getting the students engaged in these classes has been one of the main priorities of the College of Arts and Sciences. This study draws on data from Introduction to International Relations offerings from Fall 2012 to Spring 2018, some of which have used interactive software while others have not used any software. Additionally, some offerings have had an assigned supplemental instructor (IS) while others have not had SI. The overall aim is to evaluate whether these instructional innovations have helped improved student performance in this class. The main hypothesis tested during the study is that availability of SRS technology tends to improve student performance during exams. The secondary hypothesis is that the availability of more advanced (second-generation) student response technology (such as Echo 360) tends to improve students performance in class in comparison to earlier (first-generation) SRS devices (known as “clickers”). Background and significance The positive impact of SRS engagement technology on student performance the across different disciplines been well documented in the literature (Marlow et al 2009; Kam and Sommer 2006; Prezler et al 2007 and others). Most of the literature focuses on first generation student response system, also known as clickers (Elliott 2003; Riebens 2007; Crossgove and Curan 2008, Shapiro 2009). Some of the studies focus on the use of this technology without a control group (Beavers 2010; DeBourgh 2008; Kennedy and Cutts 2005; Sprague and Dahl 2010) while others discuss how personal response software impact student performance throughout the whole semester (Evans, 2012). This study differs from existing ones in several ways. First, by collecting data over 5-year period, not only can we compare groups of students using SRS systems with those who don’t but also we can compare offerings using first-generation SRS technology (e.g. the “clickers”) and those using second-generation SRS software (such as Echo 360) that contains more advanced interactive features. Second, the study allows comparison of the SRS impact on different course components and requirements. Third, it evaluates the impact of the student response system in combination with other techniques used in a large classroom such as supplemental instruction or SI. This new setting offers valuable insights about the impact of different types of SRS technology and other interactive techniques designed to engage students in large classrooms. Approach and Source of records Records for student performance collected throughout the whole semester for each student. Demographic information for the students enrolled in class collected from the course rosters and from the University of Cincinnati’s student information system Catalyst ( https://catalyst.uc.edu/). All records are electronic. Those that are not available on Catalyst but are generated as a part of the student performance are currently stored in excel format by the instructor and researcher in an external USB drive which is only accessible to the instructor and PI (same person). No other person has access to the data. The research does not involve the collection of data or other results from individuals that will be submitted to, or held for inspection by, the FDA. No part of the research involves any data that will be provided (in any form) to a pharmaceutical, medical device or biotech company.
- 作者:
- Ivanov, Ivan
- 提交者:
- Ivan Ivanov
- 上传日期:
- 07/24/2019
- 更改日期:
- 07/24/2019
- 创建:
- November 30, 2018
- 证书:
- All rights reserved
-
- 类型:
- Article
- 摘抄:
- This paper presents a prime aspect of Augmented and Virtual Reality development in the field of healthcare. We explored several recent works and articles and a comparison between generic application development and immersive technology-based application is included. The paper talks about more practical approaches that can be taken to enhance the effectiveness of the application. The resources (infrastructure) to complete this study are provided by the University of Cincinnati’s Center for Simulation and Virtual Environment Research (UCSIM). And several experiments and projects in the field of health care are used as a reference to make conclusions.
- 作者:
- Gonen, Bilal and Ajmera, Himanshu
- 提交者:
- Himanshu Ajmera
- 上传日期:
- 07/22/2019
- 更改日期:
- 07/22/2019
- 创建:
- 2019-05-08
- 证书:
- All rights reserved
-
- 类型:
- Article
- 摘抄:
- Please find within this study package the following items. Contact anonymously.submit@gmail.com for further information or questions. Thanks!
- 作者:
- Wang, Wen Tao and Niu, Nan
- 提交者:
- Wen Tao Wang
- 上传日期:
- 07/13/2019
- 更改日期:
- 07/13/2019
- 证书:
- All rights reserved
-
- 类型:
- Image
- 摘抄:
- Poster presented at the 2019 Special Libraries Association (SLA) annual conference. Abstract: In 2018, the University of Cincinnati Libraries’ Research & Data Services (RDS) unit unveiled a new Visualization Laboratory (Viz Lab) and expanded service model including data visualization/data analysis. The RDS unit has its roots in STEMM and currently includes informationists, librarians and technical consultants who engages with researchers across all disciplines. The Viz Lab and its associated services are the culmination of several years of planning and implementation. This poster will share lessons learned and good practices with our visualization space and service planning, including considerations for space design, service and training models, staffing and assessment. In addition, this poster will describe the early impact of our efforts, as seen through consultation logs, trainings and campus outreach, space usage and grants activity. We will also reveal some future directions for RDS, including plans to increase integration of the Viz Lab and data visualization/data analysis services into the university’s teaching and research missions. Acknowledgments: Amy Koshoffer, for creation of the Research & Data Services consultation log dataset and database structure.
- 作者:
- Johansen, Richard and Baldwin, Ted
- 提交者:
- Ted Baldwin
- 上传日期:
- 06/27/2019
- 更改日期:
- 07/09/2019
- 创建:
- 2019-06-16
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- Document
- 摘抄:
- Abstract: Can a library support an overseas program with a full-time librarian position? Can this position provide distant services successfully through e-learning techniques, social media and other methods? The answer is yes. As many American universities enroll students through a shared or global campus, librarians can play a vital role as the primary information and library services provider. The University of Cincinnati (UC) and Chongqing University, China (CQU) established the first shared engineering programs in China with mandatory co-operative education, the Joint Co-op Institute (JCI), in 2013. Students primarily receive on-campus instruction in China from JCI instructors; however, no UC librarian is onsite to provide dedicated support. In response, UC Libraries developed the new Global Services Librarian position as the lead presence for support of the Libraries’ growing global engagement and partnerships, especially with the JCI. This Librarian provides a full range of services, mostly at a distance, including instruction, outreach, and faculty support. This presentation will describe the development of the Global Services Librarian position, its roles in supporting the JCI, lessons learned in the first year of this position, and how this role could be adapted for other library environments.
- 作者:
- Cheng, Hong
- 提交者:
- Hong Cheng
- 上传日期:
- 06/26/2019
- 更改日期:
- 06/26/2019
- 创建:
- April 29, 2016
- 证书:
- Attribution-NonCommercial-ShareAlike 4.0 International
-
- 类型:
- Document
- 摘抄:
- If your organization is interested in establishing and developing a joint international program in China, it is inevitable to face both manageable risks and unpredictable changes. There are mainly three types of challenges. ● Political impact on travel and visa application: the 2017 re-election in China and leadership change in the United States affect how efficient for both sides to visit each other and stay for work. ● Technology restriction on teaching and communication: While the fast internet speed and open internet are taken for granted in the US, technological difficulties in China can be a barrier for effective teaching and communication. ● Censorship: In China, censorship is always a challenge, especially in the current state. Be proactive to work effectively within the constraints. The presenter is intended to share some experience and best practice based on a successful joint institute between University of Cincinnati and Chongqing University. As the first coop based program in China, the program continues to be a leading model in international engineering education.
- 作者:
- Cheng, Hong
- 提交者:
- Hong Cheng
- 上传日期:
- 06/26/2019
- 更改日期:
- 06/26/2019
- 创建:
- November 1, 2018
- 证书:
- Attribution-NonCommercial-ShareAlike 4.0 International
-
- 类型:
- GenericWork
- 摘抄:
- Data extraction results of a systematic mapping on the SysML modeling mistakes
- 作者:
- Savolainen, Juha; Niu, Nan, and Alenazi, Mounifah
- 提交者:
- Nan Niu
- 上传日期:
- 06/16/2019
- 更改日期:
- 06/30/2019
- 创建:
- 2019-06-15
- 证书:
- Open Data Commons Open Database License (ODbL)
-
- 类型:
- Article
- 摘抄:
- It is shown in present study that Rainflow method is unable to accurately estimate fatigue life ofcomponents under random loading, almost always. The inconsistencies between results of Rainflowmethod and hysteresis curve are also discussed. Alike the Peak counting method, it is shown that Shadowmethod doesn’t consider the possibility of deformation within individual cycles. Hence, Moshrefifar andAzamfar method is proposed as a novel technique having accurate results in different analytical condi-tions which are in good consistence with results obtained from hysteresis curves. Authors finally proposean algorithm as well as a C language program for this method.
- 作者:
- Moshrefifar, Masoud and Azamfar, Moslem
- 提交者:
- Moslem Azamfar
- 上传日期:
- 06/14/2019
- 更改日期:
- 06/14/2019
- 证书:
- All rights reserved
-
- 类型:
- Article
- 摘抄:
- Control of time delay integrating systems is a challenging and ongoing research. In this paper a new structure for control of stable and integrating time delay systems is presented. The control design process is as simple as selection of some constant gains, for which simple formulae are introduced. The design methods are derived analytically, while no fractional approximation for the time delay term of the plant transfer function is used. Simulation, as well as, experimental studies reveal the exceptional effectiveness of the proposed methods in achieving a robust and well-performing tracking, even when the plant pure time delay is very large. © 2016, Brazilian Association of Computational Mechanics. All rights reserved.
- 作者:
- Azamfar, Moslem and H. Davaie Markazi, Amir
- 提交者:
- Moslem Azamfar
- 上传日期:
- 06/14/2019
- 更改日期:
- 06/14/2019
- 证书:
- All rights reserved
-
- 类型:
- GenericWork
- 摘抄:
- Software engineering candidate interviews and video resumes from YouTube; as of June 2019, there are 180 data points in total
- 作者:
- Niu, Nan and Gudaparthi, Hemanth
- 提交者:
- Nan Niu
- 上传日期:
- 06/09/2019
- 更改日期:
- 06/09/2019
- 创建:
- 2019-06-09
- 证书:
- Open Data Commons Open Database License (ODbL)
-
- 类型:
- GenericWork
- 摘抄:
- Artifacts of “answering the requirements traceability questions”
- 作者:
- Gupta, Arushi
- 提交者:
- Arushi Gupta
- 上传日期:
- 06/03/2019
- 更改日期:
- 06/03/2019
- 证书:
- All rights reserved
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Grimm, Peter
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/28/2019
- 更改日期:
- 05/28/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Patterson, Nathan and Diaz, Kristen
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/28/2019
- 更改日期:
- 05/28/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Manuel, Dion; Glaser, Evan; Schlegel, Mike, and Vira, Rishi
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/28/2019
- 更改日期:
- 05/28/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Ohm, Joshua; Keeney, James; Cook, Jacob, and Laley, Jordan
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/28/2019
- 更改日期:
- 05/28/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Zakrzewski, Cameron and Finkenkeller, Andrew
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/23/2019
- 更改日期:
- 05/23/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Bosticco, Collin and Sandhofer, Zach
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/23/2019
- 更改日期:
- 05/23/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Kimmel, Luke
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/23/2019
- 更改日期:
- 05/23/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Lawlor, Thomas F. and Dreyer, Tyler
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/23/2019
- 更改日期:
- 05/23/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Tisch, Gabriele; Holmes, Jordan; Potter, Brandon; Gelhausen, Taylor; Morris, Mick, and Moore, Alison
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/23/2019
- 更改日期:
- 05/23/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- Dataset
- 摘抄:
- This data set contains ultrasound IQ echo data with corresponding co-registered scanned, TTC-stained tissue sections of rabbit liver with VX2 tumor, after in-vivo ultrasound ablation controlled by echo decorrelation imaging. IQ data and associated parameters are in files *data.mat; corresponding tissue sections are in files *.png, and trials parameters are provided in Parameters*.mat and *.csv files. Further details are provided in the included dissertation (Abbass 2018): see chapter 4, figures 4.4-4.8, and the Appendix.
- 作者:
- Mast, T. Douglas
- 提交者:
- T. Douglas Mast
- 上传日期:
- 05/22/2019
- 更改日期:
- 05/31/2019
- 证书:
- Attribution 4.0 International
-
- 类型:
- Dataset
- 摘抄:
- Matrices of DNA sequences used to generate the phylogeny of Aniba rosiodora and related species (Lauraceae) presented in the manuscript entitled "Chemical and genotypic variations in Aniba species from the Amazonian forest"
- 作者:
- Tepe, Eric
- 提交者:
- Eric Tepe
- 上传日期:
- 05/17/2019
- 更改日期:
- 05/17/2019
- 创建:
- 2019-05-16
- 证书:
- Open Data Commons Public Domain Dedication and License (PDDL)
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Cheslock, Markus and Giese, Justin
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/09/2019
- 更改日期:
- 05/09/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Brown, Shawn
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/07/2019
- 更改日期:
- 05/07/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Bross, Ryan
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/07/2019
- 更改日期:
- 05/07/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Njoh, Gabriel
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/07/2019
- 更改日期:
- 05/07/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Tschaenn, Charles
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/07/2019
- 更改日期:
- 05/07/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Thome, Nic
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/07/2019
- 更改日期:
- 05/07/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Fisher, Mitchell and Carnevale, Nick
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/07/2019
- 更改日期:
- 05/07/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Talbott, William
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/07/2019
- 更改日期:
- 05/07/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Bloom, Devon
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/07/2019
- 更改日期:
- 05/07/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Byler, Blake
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/07/2019
- 更改日期:
- 05/07/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Saliba, Cody
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/07/2019
- 更改日期:
- 05/07/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Angel, Alec
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/07/2019
- 更改日期:
- 05/07/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Cordes, Joshua T.
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/07/2019
- 更改日期:
- 05/07/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Faulkner, Alexander
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/07/2019
- 更改日期:
- 05/07/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Holstrom, William
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/07/2019
- 更改日期:
- 05/07/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Heinrich, Marcus
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/07/2019
- 更改日期:
- 05/07/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- senior design capstone report
- 作者:
- Norton, Ryan Michael
- 提交者:
- CEAS Library Staff
- 上传日期:
- 05/06/2019
- 更改日期:
- 05/06/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Palmer, Heath; Huber, Nathan, and Kucinski, Austin
- 提交者:
- CEAS Library Staff
- 上传日期:
- 04/29/2019
- 更改日期:
- 04/29/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- StudentWork
- 摘抄:
- Senior design capstone report
- 作者:
- Bader, Graydon and Oliver, Nathan
- 提交者:
- CEAS Library Staff
- 上传日期:
- 04/24/2019
- 更改日期:
- 04/24/2019
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- Article
- 摘抄:
- Intelligent Application if defined technically is a strategy that uses hyper-personalized mobile app experiences and services and knowledge-extraction processes to increases the user experience (Jessica Ekholm, 2017). In simple words, the applications that not only know how to support or enable key decisions but also continually learn from the user interactions to become even more relevant and valuable to those users, are known as Intelligent apps. Such applications are smart enough to differentiate between relevant and irrelevant information with the help of AI algorithms. Moreover, these apps have the capability to ease the complex task into the as simple task as a single touch.
- 作者:
- Ajmera, Himanshu
- 提交者:
- Himanshu Ajmera
- 上传日期:
- 04/16/2019
- 更改日期:
- 05/23/2019
- 创建:
- 2017-12-13
- 证书:
- All rights reserved
-
- 类型:
- Document
- 摘抄:
- This document is a supplement to the University of Cincinnati's Power Session workshop presented at Data Day 2019 by Richard Johansen and Mark Chalmers. The goal of this document is to reproduce the step-by-step instructions of the Power Session which demonstrated how to create interactive maps of social vulnerability at the county level. Familiarity with GitHub, R and RStudio environments are highly recommended, but not required to follow this tutorial. For a more in-depth explanation as to how the data was retrieved, cleaned, and manipulated, please refer to the full R script called Mapping_Social_Vulnerability.R located in the Scripts folder of the GitHub repository.
- 作者:
- Chalmers, Mark and Johansen, Richard
- 提交者:
- Richard Johansen
- 上传日期:
- 04/15/2019
- 更改日期:
- 04/18/2019
- 创建:
- 2019-04-15
- 证书:
- CC0 1.0 Universal
-
- 类型:
- StudentWork
- 摘抄:
- There was a lack of standardization of care for patients on venoarterial extracorporeal membrane oxygenation (VA ECMO) at Kettering Medical Center. This project discusses the creation and implementation of a standardized VA ECMO physician order set, VA ECMO anticoagulation embedded physician order set, nursing policy and guideline, and standardized electronic health record (EHR) documentation within an ECMO-specific Epic flowsheet.
- 作者:
- Litteral, Quinten; Vormbrock, Matthew, and Hegman, Michael
- 提交者:
- Quinten Litteral
- 上传日期:
- 04/14/2019
- 更改日期:
- 04/14/2019
- 创建:
- 2019-04-11
- 证书:
- All rights reserved
-
- 类型:
- StudentWork
- 摘抄:
- Our problem solving assignment for informatics in Doctorate of Nursing Practice
- 作者:
- Hemm, Matthew and Scheper, Carly
- 提交者:
- Carly Scheper
- 上传日期:
- 04/06/2019
- 更改日期:
- 04/09/2019
- 创建:
- 2019-04-06
- 证书:
- All rights reserved
-
- 类型:
- Document
- 摘抄:
- Programs used and described in the book "Multivariate Public Key Cryptosystems" by Ding, Petzoldt and Schmidt. All programs can be downloaded via the attached zip file. Modify the file "startup.txt" so that the base directory matches your setup. Put this file where magma can find it. After starting magma run: load "startup.txt"; It will then allow you to select the method on which you want to work. Files can be downloaded individually by clicking on a chapter name and then selecting the scheme of interest.
- 作者:
- Petzoldt, Albrecht; Schmidt, Dieter Sam, and Ding, Jintai
- 提交者:
- Dieter Sam Schmidt
- 上传日期:
- 03/06/2019
- 更改日期:
- 10/01/2019
- 证书:
- Public Domain Mark 1.0
-
- 类型:
- Document
- 摘抄:
- In this paper, I study how general technology users perceive the dark web. In this study, I conducted research on what these users know about dark web technologies, activities, content, and how their perceptions changed after a first-hand experience on dark web marketplaces and sites. I aimed to tackle myths and misconceptions that users had about the dark web and present new data in order to educate and bring awareness to the dark web to those who may never have the opportunity or reason to come upon this information on their own. It is my hope that the findings of this paper and the experiences of the participants will foster the spread of knowledge and awareness to both the threats and benefits that the dark web contributes to society.
- 作者:
- Angel, William
- 提交者:
- William Angel
- 上传日期:
- 03/01/2019
- 更改日期:
- 03/01/2019
- 创建:
- 2018-12-13
- 证书:
- All rights reserved
-
- 类型:
- Article
- 摘抄:
- A conversation between two friends who are not musicians and whose personal histories could hardly be more different. Through a series of conversations we explored those journeys, compared and contrasted our stories, and discussed just why this music affects us so deeply. We discussed specific musicians in terms of whether we liked, did not like, or were indifferent to their music, and why we either agreed or not. In these conversations we posed various questions to each other, hoping to discover and articulate certain essences that we might share. One thing we agreed upon up front is that we are neither musicians nor music critics. In fact, we’re not convinced that the field of music criticism is even a valid endeavor. Music description and personal reaction, however, is another matter. In our conversations we tried to describe our reactions to specific musicians and “schools” of music, without labeling the music as “good” or “lousy”. You will see that this doesn’t prevent us from disagreeing and disagreeing in spirited fashion, while always trying to focus on why our personal reaction is what it is.
- 作者:
- Grier, Melvin and Marine, Stephen
- 提交者:
- Stephen Marine
- 上传日期:
- 02/17/2019
- 更改日期:
- 05/23/2019
- 创建:
- 2019-01
- 证书:
- Attribution 4.0 International
-
- 类型:
- Article
- 摘抄:
- A 1948 exhibition catalogue of the work of Alberto Giacommetti, with an essay by Jean-Paul Sartre, highlights the relationships between sculpture and psychoanalysis, phenomenology, existentialism.
- 作者:
- Krukowski, Samantha
- 提交者:
- Samantha Krukowski
- 上传日期:
- 02/06/2019
- 更改日期:
- 05/23/2019
- 创建:
- 1994
- 证书:
- All rights reserved
-
- 类型:
- Document
- 摘抄:
- This document details our process for creating a service catalog for UC Libraries Research and Data Services and our efforts towards offering data science services. In this document, we identify our gaps in knowledge and expertise while making recommendations for filling these gaps.
- 作者:
- Grant, Tiffany; Burgess, Kristen; Koshoffer, Amy, and Baldwin, Ted
- 提交者:
- Tiffany Grant
- 上传日期:
- 02/05/2019
- 更改日期:
- 02/05/2019
- 证书:
- Attribution-NonCommercial 4.0 International
-
- 类型:
- Document
- 摘抄:
- Cincinnati has one of the lowest home ownership rates in the country for cities of comparable size. Several other cities with low rates of home ownership in 1970 have managed to increase their rates two to four percent over the past 25 years, but the home ownership rate in Cincinnati has been stable over that period at 38 percent. The best explanation for Cincinnati’s low home ownership rate is that the topography of the city encouraged dense development involving multiple-unit structures up until World War II. When the highway programs of the post-war period opened up the suburbs to development, the city was already built-out and could not compete for new single-unit construction that the federal government was subsidizing on a massive scale. In the last 50 years, the Hamilton County suburbs have gained 140,000 owners while the number of owners in the city has decreased by 1,000. As a result, the home ownership rate in the Cincinnati metropolitan area is greater than the national rate for areas of comparable size (63 percent versus 61 percent) while the rate in the city is far less than the national rate. The City of Cincinnati faces a number of challenges in any effort to increase its home ownership rate. Government programs in other cities typically produce dozens of units a year, not the hundreds of units that Cincinnati needs to produce. In order to achieve even a modest increase in home ownership, the city will have to alter market forces in the direction of increased supply of housing suitable for owner-occupancy and increased demand for home ownership. In order to increase its rate of home ownership to 41 percent by the year 2010, the City of Cincinnati needs to adopt a four-part strategy: Increase the Supply of Units The market cannot produce new units on its own. The city needs to assemble and prepare sites in order to reduce the additional costs associated with building in the city as opposed to the suburbs. City Hall must continue to eliminate barriers to development and provide new services to builders. Cincinnati will not be able to increase the number of middle-class owners without creating new neighborhood areas with the appropriate mix of amenities. At the lower end of the owner-market, the city needs to move aggressively to convert abandoned structures into units people will want to buy and rehabilitate. Help Renters Become Owners While converting renters to owners is an essential component of an overall strategy, the City of Cincinnati must recognize that not everyone can be an owner and target its resources appropriately. The city does not have unlimited funds to change the cost equation of owning a home and will, therefore, have to learn from other cities how to work with lending institutions to increase the flow of dollars under Community Reinvestment Act initiatives. Other cities have had some limited success with programs to convert people renting duplex and condo units into owners. The city needs to increase the availability, extent and quality of education and counseling programs. Attract New Households to the City The city has to market its neighborhoods, and in some cases, smaller areas within neighborhoods. This will require market research, training programs for Realtors, investments in street furniture, increased services, publications extolling city neighborhoods, and programs comparable to the Living in Cleveland program. The city needs to start working cooperatively with the Cincinnati Public Schools. Specific market niches in which the city can hope to compete very successfully include the empty nesters, the gay and lesbian community, first time buyers, and people interested in downtown living. Maintain the Existing Pool of Owners About 75 percent of the time a home owner in Cincinnati sells and buys another home in the Cincinnati area, the home purchased will be in the suburbs. The city must create opportunities for the home seller to move up without moving out of the city. In addition to the above strategies, which involve the central city market, the City of Cincinnati needs to actively promote strategies that will help slow the rate of suburbanization and that will create low income housing opportunities in the suburbs. If suburbanization continues at the current rate, and if the city continues to be the governmental unit with de facto responsibility for low income housing, there is every reason to wonder if there is anything that the city can do to increase its rate of home ownership.
- 作者:
- Howe, Steven
- 提交者:
- Steven Howe
- 上传日期:
- 02/05/2019
- 更改日期:
- 05/23/2019
- 创建:
- 1996-12
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- Document
- 摘抄:
- This document is a workshop workbook for EndNote X8, a citation and reference management software product. The workbook provides descriptions and exercises for most of the major features of EndNote, including program customization, importing & exporting data, organization and management of data, full text recovery & management, cite-while-you-write utility and EndNote Online.
- 作者:
- Roberts, Randall
- 提交者:
- Randall Roberts
- 上传日期:
- 01/23/2019
- 更改日期:
- 05/23/2019
- 创建:
- 2017-02-20
- 证书:
- Attribution-NonCommercial 4.0 International
-
- 类型:
- Dataset
- 摘抄:
- ABSTRACT Helicobacter pylori (H. pylori) is the major risk factor for the development of gastric cancer. Our laboratory has reported that the Sonic Hedgehog (Shh) signaling pathway is an early response to infection that is fundamental to the initiation of H. pylori-induced gastritis. H. pylori also induces programmed death ligand 1 (PD-L1) expression on gastric epithelial cells, yet the mechanism is unknown. We hypothesize that H. pylori-induced PD-L1 expression within the gastric epithelium is mediated by the Shh signaling pathway during infection. To identify the role of Shh signaling as a mediator of H. pylori-induced PD-L1 expression, human gastric organoids generated from either induced pluripotent stem cells (HGOs) or tissue (huFGOs) were microinjected with bacteria and treated with Hedgehog/Gli inhibitor GANT61. Gastric epithelial monolayers generated from the huFGOs were also infected with H. pylori and treated with GANT61 to study the role of Hedgehog signaling as a mediator of induced PD-1 expression. A patient-derived organoid/autologous immune cell co-culture system infected with H. pylori and treated with PD-1 inhibitor (PD-1Inh) was developed to study the protective mechanism of PD-L1 in response to bacterial infection. H. pylori significantly increased PD-L1 expression in organoid cultures 48 hours post-infection when compared to uninfected controls. The mechanism was cytotoxic associated gene A (CagA) dependent. This response was blocked by pretreatment with GANT61. Anti-PD-L1 treatment of H. pylori infected huFGOs, co-cultured with autologous patient cytotoxic T lymphocytes and dendritic cells, induced organoid death. H. pylori-induced PD-L1 expression is mediated by the Shh signaling pathway within the gastric epithelium. Cells infected with H. pylori that express PD-L1 may be protected from the immune response, creating premalignant lesions progressing to gastric cancer.
- 作者:
- Zavros, Yana
- 提交者:
- Yana Zavros
- 上传日期:
- 12/21/2018
- 更改日期:
- 12/21/2018
- 创建:
- 证书:
- All rights reserved
-
- 类型:
- GenericWork
- 摘抄:
- The University of Cincinnati (UC) Libraries' Informationist program and Research & Data Services (RDS) unit provide an extensive program of support for the research community. RDS is a highly-integrated unit of UC Libraries, staffed by informationists in the health sciences, sciences, engineering and social sciences and librarians, specialist staff, and student consultants. Our activities infuse across the institution, including the main campus and the Academic Health Center campus, and we oversee innovative spaces that respond to the particular needs of research communities, including informatics, geospatial analysis and data visualization. Since the fall 2015 CNI presentation on the UC Informationists ("New Roles, New Collaborations: Developing an Informationist Program to Support University Research"), we have greatly expanded our partnerships, services and educational offerings. We are now active in data and statistical consulting, collaborations on bioinformatics education, impactful community engagements (e.g., UC Data Day), and deep partnerships with the UC IT unit on initiatives such as the Data & Computational Science Series. At present, we are pursuing a new and challenging vision to realign our work in order to enable the institution's agendas for data science and innovation. We will discuss our experience with scalable growth and other successes in Research & Data Services and our assessment of a future in data science.
- 作者:
- Grant, Tiffany and Baldwin, Ted
- 提交者:
- Ted Baldwin
- 上传日期:
- 12/14/2018
- 更改日期:
- 02/27/2019
- 创建:
- 2018-12-10
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- 类型:
- Image
- 摘抄:
- This Poster describes a collaborative research project between the Culley and Tepe labs in the UC Department of Biology and UC Libraries Digital Scholarship Center presented at the 2017 UC Data Day ( https://libapps.libraries.uc.edu/blogs/dataday/past-data-days/). The project explores publication patterns of research involving hotspot areas of biodiversity and if researchers from developing countries which tend to have most of the biodiversity hotspots, are adequately represented as authors in the scientific literature indexed in Scopus (TM-Elsevier), JSTOR, and PubMed.
- 作者:
- Tunison, Robert; Barreiro-Sanchez, José; Johnson, Arlene; Ammar, Marwa; Torres, Maria; Lee, James; Koshoffer, Amy; Merritt, Benjamin; Culley, Theresa; Tepe, Eric; Elam, Robert, and Philpott, Megan
- 提交者:
- Amy Koshoffer
- 上传日期:
- 10/27/2018
- 更改日期:
- 05/23/2019
- 创建:
- 2017-03
- 证书:
- Attribution-NonCommercial-ShareAlike 4.0 International
-
- 类型:
- Dataset
- 摘抄:
- This data set and accompanying files represents air monitoring data collected by the Environmental Protection Agency from 2009-08-12 to 2012-01-28 at the East Liverpool Water Treatment Plant, in East Liverpool, Ohio (40.639501 , -80.523561). The variables of interest were the amount of manganese and lead in the air measured as PM10 particle size. The visualizations were created from monthly averages for the concentration of airborne manganese The data was collected using the TO-15 collection systems for air monitoring device. (reference - https://www3.epa.gov/air/sat/pdfs/VocTechdocwithappendix1209.pdf) The files included are: The raw data - EastLiverpool_WaterTreatmentPlant_Raw.csv . Aggregated monthly averages of the raw data - EastLiverpool_WaterTreatmentPlant_Processed.csv. How the raw data are processed into monthly averages - Marietta_EastLiverpool_WaterTreatmentPlant_WorkingFile.xlsx. How the video is generated- EastLiverpool_WaterTreatmentPlant.ppt. Video - EastLiverpool_WaterTreatmentPlant- generated from EastLiverpool_WaterTreatmentPlant.ppt.
- 作者:
- Yao, Zhiyuan; Hilbert, Tim, and Haynes, Erin
- 提交者:
- Amy Koshoffer
- 上传日期:
- 10/27/2018
- 更改日期:
- 07/11/2019
- 创建:
- 2009-01 to 2018-04
- 证书:
- CC0 1.0 Universal
-
- 类型:
- Dataset
- 摘抄:
- This data set and accompanying files represents air monitoring data collected by the Environmental Protection Agency from 2009-08-12 to 2012-01-28 at the East Liverpool East Elementary School, in East Liverpool, Ohio (40.635093 , -80.545558). The variables of interest were the amount of manganese and lead in the air measured as PM10 particle size. The visualizations were created from monthly averages for the concentration of airborne manganese. The data was collected using the TO-15 collection systems for air monitoring device. (reference - https://www3.epa.gov/air/sat/pdfs/VocTechdocwithappendix1209.pdf) The files included are: The raw data - EastLiverpoolEastElementarySchool_Raw.csv . Aggregated monthly averages of the raw data - EastLiverpoolEastElementarySchool_Processed.csv. How the raw data are processed into monthly averages - Marietta_EastLiverpoolEastElementarySchool_WorkingFile.xlsx. How the video is generated- EastLiverpoolEastElementarySchool.ppt. Video - EastLiverpoolEastElementarySchool- generated from EastLiverpoolEastElementarySchool.ppt.
- 作者:
- Haynes, Erin; Hilbert, Tim, and Yao, Zhiyuan
- 提交者:
- Amy Koshoffer
- 上传日期:
- 10/27/2018
- 更改日期:
- 07/11/2019
- 创建:
- 2009-08-12 to 2012-01-28
- 证书:
- CC0 1.0 Universal
-
- 类型:
- Dataset
- 摘抄:
- This data set and accompanying files represents air monitoring data collected by the Environmental Protection Agency from 2009-08-17 to 2012-02-25 at the Ohio Valley Educational Service Center in Marietta, Ohio (39.443477 , -81.452199). The variables of interest were the amount of manganese and lead in the air measured as PM10 particle size. The visualizations were created from monthly averages for the concentration of airborne manganese The data was collected using the TO-15 collection systems for air monitoring device. (reference - https://www3.epa.gov/air/sat/pdfs/VocTechdocwithappendix1209.pdf) The files included are: The raw data - Marietta_OhioValleyEducationalServiceCenter_Raw.csv . Aggregated monthly averages of the raw data - Marietta_OhioValleyEducationalServiceCenter_Processed.csv. How the raw data are processed into monthly averages - Marietta_OhioValleyEducationalServiceCenter_WorkingFile.xlsx. How the video is generated- Marietta_OhioValleyEducationalServiceCenter.ppt. Video - Marietta_OhioValleyEducationalServiceCenter - generated from Marietta_OhioValleyEducationalServiceCenter.ppt.
- 作者:
- Yao, Zhiyuan; Hilbert, Tim, and Haynes, Erin
- 提交者:
- Amy Koshoffer
- 上传日期:
- 10/27/2018
- 更改日期:
- 07/11/2019
- 创建:
- 2009-08-17 to 2012-02-25
- 证书:
- CC0 1.0 Universal
-
- 类型:
- Dataset
- 摘抄:
- This data set and accompanying files represents air monitoring data collected by the Environmental Protection Agency from 2009-08-17 to 2012-02-25 at the Warren Elementary School in Marietta, Ohio (39.393536, -81.554015). The variables of interest were the amount of manganese and lead in the air measured as PM10 particle size. The visualizations were created from monthly averages for the concentration of airborne manganese. The data was collected using the TO-15 collection systems for air monitoring device. (reference - https://www3.epa.gov/air/sat/pdfs/VocTechdocwithappendix1209.pdf) The files included are: The raw data - Marietta_WarrenElementraySchool_Raw.csv . Aggregated monthly averages of the raw data - Marietta_WarrenElementraySchool_Processed.csv. How the raw data are processed into monthly averages - Marietta_WarrenElementraySchool_WorkingFile.xlsx. How the video is generated- Marietta_WarrenElementraySchool.ppt. Video - Marietta_WarrenElementraySchool.mp4 - generated from Marietta_WarrenElementraySchool.ppt.
- 作者:
- Erin Hayes; Zhiyuan Yao, and Tim Hilbert
- 提交者:
- Amy Koshoffer
- 上传日期:
- 10/26/2018
- 更改日期:
- 07/11/2019
- 创建:
- 2009-08-17 to 2012-02-25
- 证书:
- CC0 1.0 Universal
-
- 类型:
- Article
- 摘抄:
- In this paper, I study how medical records are being used by cyber-criminal for financial gain and patient manipulation. I studied what kind of criminal organizations may be involved in these operations and confirmed incidents from the black market. I conducted a literature review which generated several sources from online databases. I determined five major criminal factions that are most likely to use compromised medical records, determined possible motivations and looked at several cases of medical records being sold on the black market. The healthcare industry’s digitization efforts have left it tremendously ill-equip to combat emerging threats. It is evident that the healthcare industry must take extreme measures in order to counteract the evolving threat landscape. It is my hope that the findings of paper will being to shed light on these issues and help healthcare professionals understand what kind of threats the industry is facing.
- 作者:
- Angel, William
- 提交者:
- William Angel
- 上传日期:
- 10/10/2018
- 更改日期:
- 10/10/2018
- 创建:
- 2018-04-23
- 证书:
- All rights reserved
-
- 类型:
- StudentWork
- 摘抄:
- UC SCHOOL OF ART MFA GRADUATING SHOW 2015 — TEXTS AND PROJECTS This collection of texts and images brings together the work of graduate students and faculty in art history, art education, and fine arts at the University of Cincinnati in the spring of 2015. We invited students in art education and art history to write accompanying texts for the final projects of their peers in the fine arts graduate program – projects encompassing everything from multimedia installation, abstract painting, video animation, fiber-based sculptural assemblages, photography, and drawing. The students’ projects were presented at the Contemporary Arts Center, Cincinnati, as part of the School of Art’s MFA Thesis Exhibition, which ran from April 1 and April 25, 2015. A process of looking, talking, looking again, writing, reading, and re-writing unfolded. Shorter versions of the texts were shown at the CAC alongside the artworks at the CAC. The process created a working space for artists and writers in dialogue, giving rise to new ideas and projects in turn. Morgan Thomas Vittoria Daiello [from Foreword] Design: Sso-Rha Kang
- 作者:
- Daiello, Vittoria; Girandola, Joe; Oswald, Sean; Turner, Miles; Thomas, Morgan; Kang, Sso-Rha; Spires, Lauren; Karimi, Saeide; Klimesh, Colin; Drout, Julie; Wyatt Bauman, Emily; Morren, Samuel; Wolhoy, Rick; Norton, Ben; Asadipour, Saeedeh; Johnson, Leigh; Horwitz, Ian; Tinney, Ross; Lang, Gabrielle, and Stenger, Kate
- 提交者:
- Morgan Thomas
- 上传日期:
- 09/20/2018
- 更改日期:
- 05/23/2019
- 创建:
- 2015-04-27
- 证书:
- All rights reserved
-
- 类型:
- Article
- 摘抄:
- Al-Tahrir Square, surrounded by commercial crowded streets, financial headquarters, and governmental institutions is one of the most iconic squares in Baghdad. It is part of daily life for many Iraqi people due to its central location, which is characterized by busy roads with honking cars. In this essay, I am going to explore Al-Tahrir Square in Baghdad, Iraq as a venue of rebellion for Iraqi people. Since 2015, Iraqi people from diverse backgrounds have been gathering in the square to protest for their rights every Friday. It has been the site of many historical events in Iraq although it has been established as a social place. I will explore the sociopolitical significance of Al-Tahrir Square by connecting the history of the place with how it has been changed since 1961 when the Freedom Monument was first open to the public. The research addresses the urban landscape of Al-Tahrir Square and its transformation over time, taking into consideration the political issues that affect it. I will analyze policies and regulations that have discouraged people from gathering in the Square to prevent political threats to the government and suggest ways to create safer spaces and mixed used attractions, modify the natural landscape of Al-Ummah Garden to make it more connected to the Square, and revitalize the existing kaleidoscope for closer proximity to Tigris River. Keywords: Al-Tahrir Square, Freedom monument, Al-Ummah Garden, Al-Rasheed Street, and urban planning Al-Tahrir Square has a complicated history. It was a parking lot in the 1950s, but in 1961, it use shifted and it became the location of the Freedom Monument. This shift marked AlTahrir Square as evidence of the Iraqi people’s journey of struggle and victory that designated it as a symbol of a new era of liberation from British colonialism. It has always been selected as a protest site because of its location in central Baghdad, especially in the past when it was the focal point for social gatherings. Besides being accessible from both Al-Karkh and Al-Rusafa, the two sides of Baghdad, through the highways and bridges that shorten the distance, the Square has had a long history of political demonstrations and has become a symbol for liberation, represented by the Freedom Monument.
- 作者:
- Alberto, Lora
- 提交者:
- Lora Alberto
- 上传日期:
- 09/20/2018
- 更改日期:
- 09/20/2018
- 创建:
- 2017-10-31
- 证书:
- Attribution-NonCommercial 4.0 International
-
- 类型:
- Article
- 摘抄:
- Ideation flexibility is the ability to shift between a designer’s preferred and non-preferred ways of generating solutions as required by the presented task. There are many tools that exist to support ideation; however, there is a lack of research defining how to facilitate ideation flexibility and how to support designers in this process through use of such tools. In this paper, we report on the development of a new tool, the "Incremental to Radical Heuristics" (I2Rh), which may provide inspiring prompts for ideation, ranging from more incremental to more radical examples. We tested the use of this I2Rh with a small set of industrial design and architecture students and aim to report on ways in which designers with varying cognitive styles perceive and apply these heuristics and further the impact of the heuristics on the students’ problem solving processes and ideation outcomes. Preliminary results demonstrate that more innovative students found the adaptive applications of the heuristics to trigger more novel solutions, whereas the more adaptive students found that the innovative applications to be more inspiring. Ideation is critical as it allows designers to form many diverse ideas to choose from and eventually test and validate them (Sheppard, Macatangay et al. 2009). However, in many cases, designers find it difficult to come up with many diverse ideas as a result of fixation they experience on particular ideas (Crilly 2015). Being a flexible designer means being able to move from one solution to another, in order to produce the most promising solutions for the given context. In this movement, idea generation methods play a critical role as facilitators of this movement while pushing designers to think differently (Silk, Daly et al. 2014). The focus of the proposed work is ideation flexibility (Yilmaz, Daly et al. 2014), defined as the ability to ideate in both incremental and radical ways – or, more precisely, to ideate along a continuum of thinking between the two, depending on the needs of the problem. Building on the theoretical foundation of Kirton’s adaption-innovation theory (Kirton 1976), we defined the ideation success as a designer’s ability to move between his/her preferred and nonpreferred ways of generating ideas as required in the design brief. To specifically target ideation flexibility, we took an empirically-driven and validated ideation tool, Design Heuristics (Yilmaz, Seifert et al. 2016), and modified it based on the Kirton’s adaptiveinnovative theory. This revised set, called the "Incremental to Radical Heuristics" (I2Rh), illustrates heuristics’ application both incrementally and radically to the same example design problem. I2Rh is intended to help designers execute an ideation strategy based on prompts, examples, and directions to incorporate more incremental or more radical changes to their naturally preferred ways of generating ideas, through facilitating flexible thinking. Our goal in this paper was to investigate how designers with different cognitive styles perceive and apply these revised heuristics and their impact on the students’ ideation outcomes.
- 作者:
- Baker, Ian; Sevier, Daniel; McKilligan, Seda; Jablokow, Kathryn W.; Daly, Shanna R. and Silk, Eli M.
- 提交者:
- Lora Alberto
- 上传日期:
- 09/20/2018
- 更改日期:
- 06/28/2019
- 创建:
- 2017-10-31
- 证书:
- Attribution-NonCommercial 4.0 International
-
- 类型:
- Article
- 摘抄:
- Al-Tahrir Square, surrounded by commercial crowded streets, financial headquarters, and governmental institutions is one of the most iconic squares in Baghdad. It is part of daily life for many Iraqi people due to its central location, which is characterized by busy roads with honking cars. In this essay, I am going to explore Al-Tahrir Square in Baghdad, Iraq as a venue of rebellion for Iraqi people. Since 2015, Iraqi people from diverse backgrounds have been gathering in the square to protest for their rights every Friday. It has been the site of many historical events in Iraq although it has been established as a social place. I will explore the sociopolitical significance of Al-Tahrir Square by connecting the history of the place with how it has been changed since 1961 when the Freedom Monument was first open to the public. The research addresses the urban landscape of Al-Tahrir Square and its transformation over time, taking into consideration the political issues that affect it. I will analyze policies and regulations that have discouraged people from gathering in the Square to prevent political threats to the government and suggest ways to create safer spaces and mixed used attractions, modify the natural landscape of Al-Ummah Garden to make it more connected to the Square, and revitalize the existing kaleidoscope for closer proximity to Tigris River. Keywords: Al-Tahrir Square, Freedom monument, Al-Ummah Garden, Al-Rasheed Street, and urban planning Al-Tahrir Square has a complicated history. It was a parking lot in the 1950s, but in 1961, it use shifted and it became the location of the Freedom Monument. This shift marked AlTahrir Square as evidence of the Iraqi people’s journey of struggle and victory that designated it as a symbol of a new era of liberation from British colonialism. It has always been selected as a protest site because of its location in central Baghdad, especially in the past when it was the focal point for social gatherings. Besides being accessible from both Al-Karkh and Al-Rusafa, the two sides of Baghdad, through the highways and bridges that shorten the distance, the Square has had a long history of political demonstrations and has become a symbol for liberation, represented by the Freedom Monument.
- 作者:
- Al-Tameemi, Rasha
- 提交者:
- Lora Alberto
- 上传日期:
- 09/20/2018
- 更改日期:
- 09/20/2018
- 创建:
- 2017-10-31
- 证书:
- Attribution-NonCommercial 4.0 International
-
- 类型:
- Image
- 摘抄:
- A detail of the rider on the battle scene (short side).
- 作者:
- Wallrodt, John
- 提交者:
- John Wallrodt
- 上传日期:
- 09/10/2018
- 更改日期:
- 09/10/2018
- 创建:
- 1999-08-15
- 证书:
- Attribution-NonCommercial 4.0 International
-
- 类型:
- Image
- 摘抄:
- A detail of the fallen warrior on the battle scene (short side).
- 作者:
- Wallrodt, John
- 提交者:
- John Wallrodt
- 上传日期:
- 09/10/2018
- 更改日期:
- 09/10/2018
- 创建:
- 证书:
- Attribution-NonCommercial 4.0 International
-
- 类型:
- Image
- 摘抄:
- A detail of the henchman behind the rider on the battle scene on the short side.
- 作者:
- Wallrodt, John
- 提交者:
- John Wallrodt
- 上传日期:
- 09/10/2018
- 更改日期:
- 09/10/2018
- 创建:
- 1999-08-15
- 证书:
- Attribution-NonCommercial 4.0 International
-
- 类型:
- Image
- 摘抄:
- A detail of the rider and blanket in the battle scene on the short side.
- 作者:
- Wallrodt, John
- 提交者:
- John Wallrodt
- 上传日期:
- 09/10/2018
- 更改日期:
- 09/10/2018
- 创建:
- 1999-08-15
- 证书:
- Attribution-NonCommercial 4.0 International
-
- 类型:
- Image
- 摘抄:
- A detail of the rider of the boar hunt scene on the long side.
- 作者:
- Wallrodt, John
- 提交者:
- John Wallrodt
- 上传日期:
- 09/10/2018
- 更改日期:
- 09/10/2018
- 创建:
- 1999-08-15
- 证书:
- Attribution-NonCommercial 4.0 International
-
- 类型:
- Image
- 摘抄:
- A detail of the rider of the boar hunt scene on the long side.
- 作者:
- Wallrodt, John
- 提交者:
- John Wallrodt
- 上传日期:
- 09/10/2018
- 更改日期:
- 09/10/2018
- 创建:
- 1999-08-15
- 证书:
- Attribution-NonCommercial 4.0 International
-
- 类型:
- Image
- 摘抄:
- A detail of the rider's horse on the board hunt scene on the long side.
- 作者:
- Wallrodt, John
- 提交者:
- John Wallrodt
- 上传日期:
- 09/10/2018
- 更改日期:
- 09/10/2018
- 创建:
- 1999-08-15
- 证书:
- Attribution-NonCommercial 4.0 International
-
- 类型:
- Image
- 摘抄:
- A detail of the rider of the stag hunt scene on the long side.
- 作者:
- Wallrodt, John
- 提交者:
- John Wallrodt
- 上传日期:
- 09/07/2018
- 更改日期:
- 09/10/2018
- 创建:
- 1999-08-15
- 证书:
- Attribution-NonCommercial 4.0 International
-
- 类型:
- Image
- 摘抄:
- A detail of the dog and boar portion of the hunt scene on the long side (lower right).
- 作者:
- Wallrodt, John
- 提交者:
- John Wallrodt
- 上传日期:
- 09/07/2018
- 更改日期:
- 09/10/2018
- 创建:
- 1999-08-15
- 证书:
- Attribution-NonCommercial 4.0 International
-
- 类型:
- Article
- 摘抄:
- Proceedings of the 2018 Information Technology Research Symposium
- 作者:
- Information Technology Research Symposium
- 提交者:
- Jess Kropczynski
- 上传日期:
- 08/21/2018
- 更改日期:
- 05/23/2019
- 创建:
- 2018-04-10
- 证书:
- All rights reserved
-
- 类型:
- Article
- 摘抄:
- Proceedings of the 2018 Information Technology Research Symposium
- 作者:
- Information Technology Research Symposium
- 提交者:
- Jess Kropczynski
- 上传日期:
- 08/21/2018
- 更改日期:
- 05/23/2019
- 创建:
- 2018-04-10
- 证书:
- All rights reserved
-
- 类型:
- Article
- 摘抄:
- Proceedings of the 2018 Information Technology Research Symposium
- 作者:
- Information Technology Research Symposium
- 提交者:
- Jess Kropczynski
- 上传日期:
- 08/21/2018
- 更改日期:
- 05/23/2019
- 创建:
- 2018-04-10
- 证书:
- All rights reserved
-
- 类型:
- Medium
- 摘抄:
- Decision Tree Analysis for Lawyers
- 作者:
- Aaron, Marjorie
- 提交者:
- Marjorie Aaron
- 上传日期:
- 08/06/2018
- 更改日期:
- 08/07/2018
- 创建:
- 证书:
- Attribution 4.0 International
-
- 类型:
- Medium
- 摘抄:
- Risk and Rigor. Decision Tree Analysis for Lawyers
- 作者:
- Aaron, Marjorie
- 提交者:
- Marjorie Aaron
- 上传日期:
- 08/06/2018
- 更改日期:
- 08/07/2018
- 创建:
- 证书:
- Attribution 4.0 International
-
- 类型:
- Medium
- 摘抄:
- Decision Tree Analysis for Lawyers
- 作者:
- Aaron, Marjorie
- 提交者:
- Marjorie Aaron
- 上传日期:
- 08/06/2018
- 更改日期:
- 08/07/2018
- 创建:
- 证书:
- Attribution 4.0 International
-
- 类型:
- Medium
- 摘抄:
- Risk and Rigor. Decision Tree Analysis for Lawyers
- 作者:
- Aaron, Marjorie
- 提交者:
- Marjorie Aaron
- 上传日期:
- 08/06/2018
- 更改日期:
- 08/07/2018
- 创建:
- 证书:
- Attribution 4.0 International
-
- 类型:
- Medium
- 摘抄:
- Risk and Rigor. Decision Tree Analysis for Lawyers
- 作者:
- Aaron, Marjorie
- 提交者:
- Marjorie Aaron
- 上传日期:
- 08/06/2018
- 更改日期:
- 08/07/2018
- 创建:
- 证书:
- Attribution 4.0 International
-
- 类型:
- Medium
- 摘抄:
- Risk and Rigor. Decision Tree Analysis for Lawyers
- 作者:
- Aaron, Marjorie
- 提交者:
- Marjorie Aaron
- 上传日期:
- 08/06/2018
- 更改日期:
- 08/07/2018
- 创建:
- 证书:
- Attribution 4.0 International
-
- 类型:
- Medium
- 摘抄:
- Risk and Rigor. Decision Tree Analysis for Lawyers
- 作者:
- Aaron, Marjorie
- 提交者:
- Marjorie Aaron
- 上传日期:
- 08/06/2018
- 更改日期:
- 08/07/2018
- 创建:
- 证书:
- Attribution 4.0 International
-
- 类型:
- Medium
- 摘抄:
- Risk and Rigor: Video 1- Hand drawn coin toss calculation.
- 作者:
- Aaron, Marjorie
- 提交者:
- Marjorie Aaron
- 上传日期:
- 08/06/2018
- 更改日期:
- 08/07/2018
- 创建:
- 证书:
- Attribution 4.0 International
-
- 类型:
- Medium
- 摘抄:
- Decision Tree Analysis for Lawyers
- 作者:
- Aaron, Marjorie
- 提交者:
- Marjorie Aaron
- 上传日期:
- 08/06/2018
- 创建:
- 证书:
- Attribution 4.0 International
-
- 类型:
- Medium
- 摘抄:
- Decision Tree Analysis for Lawyers
- 作者:
- Aaron, Marjorie
- 提交者:
- Marjorie Aaron
- 上传日期:
- 08/06/2018
- 创建:
- 证书:
- Attribution 4.0 International
-
- 类型:
- Medium
- 摘抄:
- Risk and Rigor. Decision Tree Analysis for Lawyers
- 作者:
- Aaron, Marjorie
- 提交者:
- Marjorie Aaron
- 上传日期:
- 08/06/2018
- 更改日期:
- 08/07/2018
- 创建:
- 证书:
- Attribution 4.0 International