Best Practices 2013 Compendium from the Bio Lit World Best Practices Awards Program 2013

Total Page:16

File Type:pdf, Size:1020Kb

Best Practices 2013 Compendium from the Bio Lit World Best Practices Awards Program 2013 Focus on Best Practices 2013 Compendium from the Bio lIT World Best Practices Awards Program 2013 2013 | Best Practices Compendium | BiolIT World [1] INTRODUCTION Best Practices 2013 2013 Judges The 2013 Best Practices Awards were INTRODUCTION 3 organized by Bio-IT World managing editor KNOWLEDGE MANAGEMENT 4 Allison Proffitt and editor Kevin Davies. Searching for Gold: GSK’s New Search Program that Saved Them Millions Joining the editors in judging the entries GlaxoSmithKline was a distinguished panel of experts: JUDGES’ PRIZE 5 Joe Cerro, SchoonerGroup Genentech Finds Big Savings in Small Places Bill Van Etten,The BioTeam Genentech Stephen Fogelson, Develotron 4 Martin Gollery, Tahoe Informatics CLINICAL AND HEALTH IT 6 PRO-ACT: Bigger and Better ALS Database Open for Mining Phillips Kuhl, Cambridge Healthtech Institute Prize4Life Alan Louie, IDC Health Insights Susan Ward, Consultant INFORMATICS 7 Brenda Yanak, Pfizer From DNA to PDF: Harnessing the Genome and Phenome to Make Better Diagnoses Genomic Medicine Institute, Geisinger Health System - nominated by SimulConsult IT INFRASTRUCTURE/HPC 8 5 The Cloud’s the Limit: Rentable Supercomputers for Improving Drug Discovery Schrodinger - nominated by Cycle Computing EDITORS’ PRIZE 9 GeneInsight: Genetic Knowledge to Action GeneInsight 8 11 HONORABLE MENTION: 10 - 11 Faster, Scarless Assemblies JBI and Amgen - nominated by TeselaGen Biotechnology TrialShare Brings Much Needed Transparency to Clinical Trials Data Immune Tolerance Network - nominated by LabKey Software 2013 BEST PRACTICES OVERVIEW 12 2013 BEST PRACTICES ENTRIES 13 Clinical and Health IT 13 Informatics 65 IT Infrastructure/HPC 155 Knowledge Management 202 2013 | Best Practices Compendium | BiolIT World [2] INTRODUCTION The Bio-IT World Best Practices Awards have been around long enough for us—as editors and judges—to get a little jaded. But instead, our enthusiasm is renewed each year by the excellent entries, innovative ideas, and passion to better our industry. Bio-IT World is honored to be in a position to share these projects with the industry at large. The 2013 awards season was no exception. Our honorees span the whole of the life sciences industry. From an animal work project that saved nearly half a million dollars a year, to a clinical trials data interpretation platform, these truly are best practices for the breadth of the industry. Although every project won’t be applicable to every group, it is our hope that there will be some aspect in each one to emulate and apply for more cost efficient and effective research. The 2014 Bio-IT World Best Practices Call for Entries opens this month, and we have high hopes for the next round of competition. We welcome all collaborations and projects that have advanced the life sciences, and look forward to seeing you at the 2014 Bio-IT World Conference & Expo as we announce the next round of winners. - Allison Proffitt, Editorial Director 2013 Winners BEST Looking to 2014 KNOWLEDGE MANAGEMENT PRACTICES The 2014 Awards will kick off this November when the call GlaxoSmithKline AWARDS for entries goes live. We will collect entries for 4 months before judging begins. JUDGES’ PRIZE 2014 Please visit www.bio-it-world.com/bestpractices for Genentech more information. CLINICAL AND HEALTH IT Prize4Life and the Neurological Clinical Research Do’s and Don’ts for Best Practices Submissions Institute (NCRI) at Massachusetts General Hospital Judging of Best Practices is taken very seriously. While the quality of the winning entries typically shines through, the judges’ task is complicated by a number of INFORMATICS entries that fail to do the underlying quality justice. You can help your chances by Genomic Medicine Institute, Geisinger Health System following some simple guidelines: Nominated by SimulConsult • DO remember the ROI. We cannot judge the potential impact or effect of a IT INFRASTRUCTURE/HPC Best Practice submission if the entry doesn’t explain qualitatively (and ideally Schrodinger quantitatively) how it benefitted the host or user organization. Nominated by Cycle Computing • DON’T repurpose marketing material. Shockingly, some of the entries we receive are poorly disguised press releases. EDITORS’ PRIZE GeneInsight • DO follow the guidelines. We offer specific guidelines on word length, figure limits, etc. for a reason. We can’t make a valid assessment on a two-page entry, nor HONORABLE MENTIONS: can the judges wade through a 20-page thesis. Follow the format. JBI and Amgen • DON’T submit a new product. The competition seeks to recognize partnerships Nominated by TeselaGen Biotechnology and innovative deploy-ments of new technology, not mere descriptions of a Immune Tolerance Network standalone product or resource. Nominated by LabKey Software 2013 | Best Practices Compendium | BiolIT World [3] KNOWLEDGE MANAGEMENT Searching for Gold: GSK’s New Search Program that Saved Them Millions By Matt Luchette | June 5, 2013 2011, the leadership in the GlaxoSmithKline’s R&D department made a troubling realization: their scientists were having a tough time finding their data. By that point, GSK’s research staff was logging all of their experimental results in In electronic lab notebooks. But once the data was saved, the company’s search program, GSKSearch, wasn’t able to parse the records. If researchers in one division wanted to investigate Bio-IT World Editor Allison a compound for clinical development, they had no way of efficiently accessing any studies the Proffitt presents GSK’s company had already done on the compound. And for the data GSKSearch could access, the Andrew Wooster with the program couldn’t recognize many of the chemical, biological, and clinical terms that identified Best Practices Award for specific experiments. Knowledge Management NIKI HINKLE “The search capabilities were not adequate,” said Mirna Samano, the program manager for GlaxoSmithKline’s MaxData strategic program. Hard-to-reach data and archived experiments meant lost time and money for the company, capabilities, including improved text analytics and data extraction with software from NextMove, so Samano and her R&D division set up focus groups with GSK scientists to identify what they and web integration with Microsoft’s C# ASP.NET libraries. The result was a new program needed in order to make the most of their data. that could search through the company’s archived electronic lab notebooks and recognize a vast The message from the scientists was resounding: “Why can’t we have something like Google?” library of scientific terms, bringing once inaccessible data to scientists’ fingertips. To resolve the program, the R&D engineers’ first instinct was to investigate Autonomy, the Samano said the program was an excellent exercise in “how to combine a company’s existing text search program used for GSKSearch, for any limitations or errors in the code. But the tools to accomplish goals.” program was full-functioning and gave robust results. What they realized, though, was that Samano added that while Socrates has been optimized to recognize the company’s chemical the search requirements for their scientists were different than those of a standard text search and biological experiments, in future iterations, she hopes to make the program more useful for engine. They didn’t need Google; they needed a specialized program that could recognize the other areas of R&D, such as clinical and regulatory records. various chemical compounds or drug targets that GSK researchers test every day. Today, Socrates Search has access to over 2 million of the company’s online lab notebooks, has “We needed to help R&D maximize the value of their data,” said Samano. indexed over 70 million unique terms, and supports an average of 500 users every month. GSK The R&D IT engineers set to work developing a new search program that would expand the spent about 1 million pounds (about $1.5 million) on the project, and the company estimates capabilities of GSKSearch. Most importantly, the engineers wanted the program to search the that Socrates Search could save as much as $2 million pounds each year in improved efficiency. company’s entire library of electronic lab notebooks and recognize chemicals through their “The value of the tool is greatly recognized at GSK,” Samano explained. As a director in GSK’s various generic and scientific names, as well as drawings and substructures. In addition, they Animal Research Strategy remarked, “This tool allows us to more fully apply our considerable wanted to add new capabilities, such as recognizing combination drugs, gene aliases, or standard experience, link internal experience, and design more robust experiments.” disease vocabulary, to make searches more streamlined. The program’s capabilities have been recognized outside of the company as well, most Socrates Search, as the project came to be known, was made by combining a number of recently by winning the2013 Best Practices Award for Knowledge Management at the Bio- commercial search programs, many of which were already in place at GSK. Autonomy’s text IT World Expo in April. Winning the award, Samano said, has been instrumental in gaining search and ChemAxon’s JChem Oracle cartridge, which allows users to search for chemicals interest from more colleagues throughout GlaxoSmithKline who would like to take advantage of with their various names or structure, were already a part of GSKSearch, but now had added Socrates’ capabilities. “The project has been a great experience for our team,” she said. n 2013 | Best Practices Compendium | BiolIT World [4] JUDGE’S PRIZE Genentech Finds Big Savings in Small Places By Aaron Krol | July 19, 2013 Genentech’s Mouse Genetics Department in South San Francisco, Dr. Rhonda I was not surprised that Wiler and her team are proving that the simplest investments in IT can yield the biggest returns. there was a positive return on At Dr. Wiler’s department oversees a breeding facility for genetically engineered investment, but was very happily mice, which produces over 40,000 pups a month representing almost a thousand distinct genetic lines.
Recommended publications
  • SESAR JU CONSOLIDATED ANNUAL ACTIVITY REPORT 2020 Abstract
    SESAR JU CONSOLIDATED ANNUAL ACTIVITY REPORT 2020 Abstract This Consolidated Annual Activity Report, established on the guidelines set forth in Communication from the Commission ref. 2020/2297, provides comprehensive information on the implementation of the agency work programme, budget, staff policy plan, and management and internal control systems in 2020. © SESAR Joint Undertaking, 2021 Reproduction of text is authorised, provided the source is acknowledged. For any use or reproduction of photos, illustrations or artworks, permission must be sought directly from the copyright holders. COPYRIGHT OF IMAGES © Airbus S.A.S. 2021, page 50; © Alexa Mat/Shutterstock.com, page 209; © Alexandra Lande/Shutterstock.com, page 215; © AlexLMX/Shutterstock.com page 177; © chainarong06/Shutterstock.com, page 220; © DG Stock/ Shutterstock.com, cover; © Diana Opryshko page 155; © Dmitry Kalinovsky/Shutterstock.com, page 56; © iStock. com/Gordon Tipene, pages 189 and 194; © iStock.com/Nordroden, page 12; © iStock.com/sharply_done, page 209; © iStock.com/sharply_done, page 18; © iStock.com/stellalevi, page 228, © lassedesignen/Shutterstock.com, page 70 © Mario Hagen/Shutterstock.com, pages 36 and 130; © Michael Penner, page 130; © NickolayV/Shutterstock. com, page 77; © Sergey Peterman/Shutterstock.com, page 10; © SESAR JU, pages 9, 15, 16, 17, 48, 49, 55,79, 86, 102,132, 134, 145, 147, 148 and 190; © SFIO CRACHO/Shutterstock.com, pages 181 and 213; © Skycolors/ Shutterstock.com, page 40; © smolaw/Shutterstock.com, page 211; © Thiago B Trevisan/Shutterstock.com, page 136; © This Is Me/Shutterstock.com, page 175; © VLADGRIN/Shutterstock.com, page 191; © Limare/Shutterstock, page 193; © Photo by Chris Smith on Unsplash, page 227 © Photo by Julien Bessede on Unsplash, page 224 © Photo by Sacha Verheij on Unsplash, page 221 © yuttana Contributor Studio/Shutterstock.com, page 66.
    [Show full text]
  • Clangjit: Enhancing C++ with Just-In-Time Compilation
    ClangJIT: Enhancing C++ with Just-in-Time Compilation Hal Finkel David Poliakoff David F. Richards Lead, Compiler Technology and Lawrence Livermore National Lawrence Livermore National Programming Languages Laboratory Laboratory Leadership Computing Facility Livermore, CA, USA Livermore, CA, USA Argonne National Laboratory [email protected] [email protected] Lemont, IL, USA [email protected] ABSTRACT body of C++ code, but critically, defer the generation and optimiza- The C++ programming language is not only a keystone of the tion of template specializations until runtime using a relatively- high-performance-computing ecosystem but has proven to be a natural extension to the core C++ programming language. successful base for portable parallel-programming frameworks. As A significant design requirement for ClangJIT is that the runtime- is well known, C++ programmers use templates to specialize al- compilation process not explicitly access the file system - only gorithms, thus allowing the compiler to generate highly-efficient loading data from the running binary is permitted - which allows code for specific parameters, data structures, and so on. This capa- for deployment within environments where file-system access is bility has been limited to those specializations that can be identi- either unavailable or prohibitively expensive. In addition, this re- fied when the application is compiled, and in many critical cases, quirement maintains the redistributibility of the binaries using the compiling all potentially-relevant specializations is not practical. JIT-compilation features (i.e., they can run on systems where the ClangJIT provides a well-integrated C++ language extension allow- source code is unavailable). For example, on large HPC deploy- ing template-based specialization to occur during program execu- ments, especially on supercomputers with distributed file systems, tion.
    [Show full text]
  • Neufuzz: Efficient Fuzzing with Deep Neural Network
    Received January 15, 2019, accepted February 6, 2019, date of current version April 2, 2019. Digital Object Identifier 10.1109/ACCESS.2019.2903291 NeuFuzz: Efficient Fuzzing With Deep Neural Network YUNCHAO WANG , ZEHUI WU, QIANG WEI, AND QINGXIAN WANG China National Digital Switching System Engineering and Technological Research Center, Zhengzhou 450000, China Corresponding author: Qiang Wei ([email protected]) This work was supported by National Key R&D Program of China under Grant 2017YFB0802901. ABSTRACT Coverage-guided graybox fuzzing is one of the most popular and effective techniques for discovering vulnerabilities due to its nature of high speed and scalability. However, the existing techniques generally focus on code coverage but not on vulnerable code. These techniques aim to cover as many paths as possible rather than to explore paths that are more likely to be vulnerable. When selecting the seeds to test, the existing fuzzers usually treat all seed inputs equally, ignoring the fact that paths exercised by different seed inputs are not equally vulnerable. This results in wasting time testing uninteresting paths rather than vulnerable paths, thus reducing the efficiency of vulnerability detection. In this paper, we present a solution, NeuFuzz, using the deep neural network to guide intelligent seed selection during graybox fuzzing to alleviate the aforementioned limitation. In particular, the deep neural network is used to learn the hidden vulnerability pattern from a large number of vulnerable and clean program paths to train a prediction model to classify whether paths are vulnerable. The fuzzer then prioritizes seed inputs that are capable of covering the likely to be vulnerable paths and assigns more mutation energy (i.e., the number of inputs to be generated) to these seeds.
    [Show full text]
  • Labkey Server
    Nelson et al. BMC Bioinformatics 2011, 12:71 http://www.biomedcentral.com/1471-2105/12/71 SOFTWARE Open Access LabKey Server: An open source platform for scientific data integration, analysis and collaboration Elizabeth K Nelson1*, Britt Piehler1, Josh Eckels1, Adam Rauch1, Matthew Bellew1, Peter Hussey1, Sarah Ramsay2, Cory Nathe2, Karl Lum1, Kevin Krouse1, David Stearns1, Brian Connolly1, Tom Skillman2, Mark Igra1 Abstract Background: Broad-based collaborations are becoming increasingly common among disease researchers. For example, the Global HIV Enterprise has united cross-disciplinary consortia to speed progress towards HIV vaccines through coordinated research across the boundaries of institutions, continents and specialties. New, end-to-end software tools for data and specimen management are necessary to achieve the ambitious goals of such alliances. These tools must enable researchers to organize and integrate heterogeneous data early in the discovery process, standardize processes, gain new insights into pooled data and collaborate securely. Results: To meet these needs, we enhanced the LabKey Server platform, formerly known as CPAS. This freely available, open source software is maintained by professional engineers who use commercially proven practices for software development and maintenance. Recent enhancements support: (i) Submitting specimens requests across collaborating organizations (ii) Graphically defining new experimental data types, metadata and wizards for data collection (iii) Transitioning experimental results from a multiplicity of spreadsheets to custom tables in a shared database (iv) Securely organizing, integrating, analyzing, visualizing and sharing diverse data types, from clinical records to specimens to complex assays (v) Interacting dynamically with external data sources (vi) Tracking study participants and cohorts over time (vii) Developing custom interfaces using client libraries (viii) Authoring custom visualizations in a built-in R scripting environment.
    [Show full text]
  • Master's Thesis
    FACULTY OF SCIENCE AND TECHNOLOGY MASTER'S THESIS Study programme/specialisation: Computer Science Spring / Autumn semester, 20......19 Open/Confidential Author: ………………………………………… Nicolas Fløysvik (signature of author) Programme coordinator: Hein Meling Supervisor(s): Hein Meling Title of master's thesis: Using domain restricted types to improve code correctness Credits: 30 Keywords: Domain restrictions, Formal specifications, Number of pages: …………………75 symbolic execution, Rolsyn analyzer, + supplemental material/other: …………0 Stavanger,……………………….15/06/2019 date/year Title page for Master's Thesis Faculty of Science and Technology Domain Restricted Types for Improved Code Correctness Nicolas Fløysvik University of Stavanger Supervised by: Professor Hein Meling University of Stavanger June 2019 Abstract ReDi is a new static analysis tool for improving code correctness. It targets the C# language and is a .NET Roslyn live analyzer providing live analysis feedback to the developers using it. ReDi uses principles from formal specification and symbolic execution to implement methods for performing domain restriction on variables, parameters, and return values. A domain restriction is an invariant implemented as a check function, that can be applied to variables utilizing an annotation referring to the check method. ReDi can also help to prevent runtime exceptions caused by null pointers. ReDi can prevent null exceptions by integrating nullability into the domain of the variables, making it feasible for ReDi to statically keep track of null, and de- tecting variables that may be null when used. ReDi shows promising results with finding inconsistencies and faults in some programming projects, the open source CoreWiki project by Jeff Fritz and several web service API projects for services offered by Innovation Norway.
    [Show full text]
  • Task 4 – Data Integration and Management Jim Collett (PNNL) and Rachel Emerson (INL)
    DOE Bioenergy Technologies Office (BETO) 2021 Project Peer Review 3/16/2021 Feedstock-Conversion Interface Consortium Task 4 – Data Integration and Management Jim Collett (PNNL) and Rachel Emerson (INL) This presentation does not contain any proprietary, confidential, or otherwise restricted information PNNL-SA-159498 FCIC Task Organization Task X: Project Management: Provide scientific leadership and orGanizational project manaGement Feedstock Preprocessing Conversion Task 1: Materials of Construction: Specify materials that do not corrode, wear, or break at unacceptable rates Task 2: Feedstock Task 5: Task 6: Conversion Task 2: Feedstock Variability: Quantify & understand the Variability Preprocessing High-Temp sources of biomass resource and feedstock variability Task 7: Conversion Task 1: Materials of Construction Low-Temp Task 3: Materials Handling: Develop tools that enable continuous, steady, trouble free feed into reactors Task 3: Materials Handling Task 4: Data Integration: Ensure the data Generated in the FCIC are curated and stored – FAIR Guidelines Enabling Tasks Task 5: Preprocessing: Enable well-defined and homogeneous feedstock from variable biomass resources Task X: Project Management Task 6 & 7: Conversion (High- & Low-Temp Pathways): Task 4: Data Integration Produce homoGeneous intermediates to convert into market-ready products Task 8: TEA/LCA Task 8:Crosscutting Analyses TEA/LCA: Valuation of intermediate streams & quantify variability impact Project Overview Objectives: • Provide a web-enabled database PI/PM for integrating, standardizing, and Direction and Approvals Team archiving FCIC data intended for public release, and for channeling integrated datasets to Task 8 Cross-cutting Analysis. • Establish controlled vocabularies, data standards, and critical Development property specifications for & Admin Team Design & Training Liaison Team biorefinery unit operations and Bioenergy process streams within a Quality Data Hub by Design (QbD) framework.
    [Show full text]
  • Main Page 1 Main Page
    Main Page 1 Main Page FLOSSMETRICS/ OpenTTT guides FLOSS (Free/Libre open source software) is one of the most important trends in IT since the advent of the PC and commodity software, but despite the potential impact on European firms, its adoption is still hampered by limited knowledge, especially among SMEs that could potentially benefit the most from it. This guide (developed in the context of the FLOSSMETRICS and OpenTTT projects) present a set of guidelines and suggestions for the adoption of open source software within SMEs, using a ladder model that will guide companies from the initial selection and adoption of FLOSS within the IT infrastructure up to the creation of suitable business models based on open source software. The guide is split into an introduction to FLOSS and a catalog of open source applications, selected to fulfill the requests that were gathered in the interviews and audit in the OpenTTT project. The application areas are infrastructural software (ranging from network and system management to security), ERP and CRM applications, groupware, document management, content management systems (CMS), VoIP, graphics/CAD/GIS systems, desktop applications, engineering and manufacturing, vertical business applications and eLearning. This is the third edition of the guide; the guide is distributed under a CC-attribution-sharealike 3.0 license. The author is Carlo Daffara ([email protected]). The complete guide in PDF format is avalaible here [1] Free/ Libre Open Source Software catalog Software: a guide for SMEs • Software Catalog Introduction • SME Guide Introduction • 1. What's Free/Libre/Open Source Software? • Security • 2. Ten myths about free/libre open source software • Data protection and recovery • 3.
    [Show full text]
  • Validating Software Via Abstract State Specifications Technical Report
    Validating Software via Abstract State Specifications Jonathan S. Ostroff Technical Report EECS-2017-02 July 31 2017 Department of Electrical Engineering and Computer Science 4700 Keele Street, Toronto, Ontario M3J 1P3 Canada VALIDATING SOFTWARE VIA ABSTRACT STATE SPECIFICATIONS, 31 JULY 2017 1 Validating Software via Abstract State Specifications Jonathan S. Ostroff Abstract We describe two tools—ETF and Mathmodels—for developing reliable software by eliciting precise specifica- tions, validating them and verifying that the final software product satisfies the requirements. Mathmodels extends the classical Eiffel contracting notation with the use of mathematical models (sets, sequences, relations, functions, bags) to describe abstract state machines. Classical contracts are incomplete or are low level implementation assertions. Mathmodel contracts provide complete specifications of components and systems that can be verified via runtime contract checking scaling up to large systems. Mathmodels are void safe and have immutable queries (for specifications) as well as relatively efficient mutable commands for the abstract description of algorithms. The ETF tool is used in requirements elicitation to derive specifications, to describe the user interface, to identify the abstract state, and to develop use cases before the software product is constructed. The ETF tool generates code that decouples the user interface from the design (the business logic). The ETF Tool supports the derivation of important system safety invariants which become Mathmodel class invariants in the production code. The ideas can be extended to other contracting languages and frameworks and are placed in the context of best practices for software engineering. We also discuss this work in the light of proposals for software engineering education.
    [Show full text]
  • Support for Algebraic Data Types in Viper Bachelor of Science Thesis Project Description
    Support for Algebraic Data Types in Viper Bachelor of Science Thesis Project Description David Rohr Supervised by Arshavir Ter-Gabrielyan Prof. Dr. Peter Müller Chair of Programming Methodology Department of Computer Science ETH Zürich September 30, 2016 1 Introduction Viper [1] is a suite of verication tools developed at ETH Zurich. A central part of Viper is its intermediate verication language, which can be used to describe, for instance, object-oriented programs and their properties (in the form of preconditions, postconditions and assertions) as well as complex data structures like trees and other types of graphs. These data structures can be specied in Viper using recursive predicates [1, pp. 9f.], quantied permissions [1, pp. 12f.] or, potentially, algebraic data types (sometimes referred to as ADTs, but not to be confused with abstract data types), which are commonly used in several functional and multi-paradigm programming languages like Haskell [2], F# [3], Scala [4] or Rust [5]. Although it is not possible to directly reference or dereference their instances (because they are value types), their simplicity and the fact that operations on algebraic data types don't cause any side eects - you could also call them pure - make them a useful tool for the specication of data structures. However, Viper does currently not support the direct (native) declaration of algebraic data types. Instead, they need to be encoded in Viper using custom domains [1, pp. 16f.], which is, depending on the encoded data type, considerably more complicated and error-prone than, for example, a native ADT declaration in Haskell. The main goal of this project is to design and implement a language extension that facilitates the denition and usage of algebraic data types in Viper.
    [Show full text]
  • Travma Sonrası Stres Bozukluğu Tedavisinde Bilişsel Ve Davranışçı Yaklaşımlar 28
    Hasan Kalyoncu Üniversitesi Psikoloji Bölümü www.hku.edu.tr Havalimanı Yolu Üzeri 8.Km 27410 Şahinbey/GAZİANTEP +90 (342) 211 80 80 - [email protected] EDİTÖR Doç. Dr. Şaziye Senem BAŞGÜL YARDIMCI EDİTÖR Arş. Gör. Saadet YAPAN YAYIN KURULU Prof. Dr. Mehmet Hakan TÜRKÇAPAR Prof. Dr. Mücahit ÖZTÜRK Prof. Dr. Bengi SEMERCİ Prof. Dr. Osman Tolga ARICAK Doç. Dr. Şaziye Senem BAŞGÜL Doç. Dr. Hanna Nita SCHERLER Öğr. Gör. Mehmet DİNÇ Öğr. Gör. Ferhat Jak İÇÖZ Öğr. Gör. Mediha ÖMÜR Arş. Gör. Saadet YAPAN Arş. Gör. Mahmut YAY Arş. Gör. Feyza TOPÇU DANIŞMA KURULU Prof. Dr. Can TUNCER Doç. Dr. Zümra ÖZYEŞİL Yrd. Doç. Dr. Itır TARI CÖMERT Dr. Özge MERGEN Dr. Akif AVCU KAPAK TASARIM Uğur Servet KARALAR GRAFİK UYGULAMA Yakup BAYRAM 0342 211 80 80 psikoloji.hku.edu.tr [email protected] Havalimanı Yolu Üzeri 8. Km 27410 Şahinbey/GAZİANTEP Sonbahar ve ilkbahar sayıları olarak yılda iki kere çıkar. İÇİNDEKİLER Önsöz 4 Editörden 5 Bilimsel Bir Araştırmanın Yol Haritası 6 Psikoterapilere Varoluşçu Bir Bakış 10 Anne, Baba ve Çocuk Tarafından Algılanan Ebeveyn Kabul-Ret ve Kontrolünün Çocuğun Duygu Düzenleme Becerisi İle İlişkisi 13 Fabrika İşçilerinde Stres ve Depresyon Arasındaki İlişki 20 Travma Sonrası Stres Bozukluğu Tedavisinde Bilişsel ve Davranışçı Yaklaşımlar 28 Araştırmalar ve Olgu Değerlendirmelerinde Nöro-Psikolojik Testler ve Bilgisayar Programlarının Bütünleştirilmesi: Bir Gözden Geçirme 32 Tez Özetleri 35 ÖNSÖZ Değerli okurlarımız, Hasan Kalyoncu Üniversitesi Psikoloji Bölümü öğretim üyeleri ve öğ- rencilerinin girişimiyle yayınlanan Psikoloji Araştırmaları dergisinin yeni bir sayısıyla yeniden karşınızdayız. Yolculuğumuz dördüncü sayı- sına ulaştı. Psikoloji Araştırmaları dergisinin bu sayısında, klinik çalışmalar ve göz- den geçirme derleme yazıları yer alıyor.
    [Show full text]
  • Formal Specification and Verification Stephan Merz
    Formal specification and verification Stephan Merz To cite this version: Stephan Merz. Formal specification and verification. Dahlia Malkhi. Concurrency: the Works of Leslie Lamport, 29, Association for Computing Machinery, pp.103-129, 2019, ACM Books, 10.1145/3335772.3335780. hal-02387780 HAL Id: hal-02387780 https://hal.inria.fr/hal-02387780 Submitted on 2 Dec 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Formal specification and verification Stephan Merz University of Lorraine, CNRS, Inria, LORIA, Nancy, France 1. Introduction Beyond his seminal contributions to the theory and the design of concurrent and distributed algorithms, Leslie Lamport has throughout his career worked on methods and formalisms for rigorously establishing the correctness of algorithms. Commenting on his first article about a method for proving the correctness of multi-process programs [32] on the website providing access to his collected writings [47], Lamport recalls that this interest originated in his submitting a flawed mutual-exclusion algorithm in the early 1970s. As a trained mathematician, Lamport is perfectly familiar with mathematical set theory, the standard formal foundation of classical mathematics. His career in industrial research environments and the fact that his main interest has been in algorithms, not formalisms, has certainly contributed to his designing reasoning methods that combine pragmatism and mathematical elegance.
    [Show full text]
  • Course Descriptions
    Course Descriptions 08/18 ACCT 090 Introduction to Accounting 3 Credits Prerequisites: None. Introduces the basic principles of accounting as utilized in a variety of office settings. Includes the principles of debit and credit, double-entry bookkeeping, use of journals, and analyzing transactions. Uses of ledgers, posting procedures, petty cash, banking procedures, payroll, depreciation, work sheets, balance sheets, and income statements are covered as well. ACCT 101 Financial Accounting TransferIN 3 Credits Prerequisites: Demonstrated competency through appropriate assessment or earning a grade of “C” or better in ENGL 093 and ENGL 083, or ENGL 095, and MATH 023 or higher. Introduces the fundamental principles, techniques, and tools of financial accounting. The development and use of the basic financial statements pertaining to corporations both service and retail. ACCT 102 Managerial Accounting TransferIN 3 Credits Prerequisites: ACCT 101. Emphasizes managerial accounting concepts, general versus cost accounting systems, cost behavior, cost-volume profit analysis, standard cost systems, responsibility accounting, incremental analysis, and capital investment analysis. ACCT 106 Payroll Accounting 3 Credits Prerequisites: Demonstrated competency through appropriate assessment or earning a grade of “C” or better in ENGL 093 and ENGL 083, or ENGL 095 and MATH 023 or higher. Covers payroll calculating and reporting including various federal and state withholding taxes, employer payroll taxes, typical insurance and other arrangements affecting the preparation of payroll registers and employee earning records. ACCT 118 Financial Concepts for Accounting 3 Credits Prerequisites: None. Surveys the applications of mathematics to various business and accounting activities. Includes a review of basic mathematical operations and their subsequent application to such commercial activities as payroll, consumer finance, business borrowing, inventory control, pricing, depreciation, and time value of money.
    [Show full text]