Dissertations / Theses on the topic 'Implementation science and evaluation'

To see the other types of publications on this topic, follow the link: Implementation science and evaluation.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Implementation science and evaluation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Luk, Sau-yung Maria, and 陸秀容. "An evaluation on the implementation of the advanced level engineering science." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1996. http://hub.hku.hk/bib/B42574511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Luk, Sau-yung Maria. "An evaluation on the implementation of the advanced level engineering science." Click to view the E-thesis via HKUTO, 1996. http://sunzi.lib.hku.hk/hkuto/record/B42574511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hon, Keone D. (Keone David). "Trust based app marketing : design, implementation and evaluation." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/66310.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2011.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student submitted PDF version of thesis.
Includes bibliographical references (p. 119).
A trust-based marketing application is a web or mobile app which provides a utility to the consumer that is not directly linked to purchasing products or services from the company. In this thesis, I explore the efficacy of trust-based marketing apps by designing and building two apps{one iPhone app and one Adobe Flash app{ and test them under market research conditions. These apps attack two important and complementary questions: how trust-based apps compare to traditional stimuli such as television ads; and how different dimensions of app design (degrees of social network embeddedness, customizability, and information discovery) affect the efficacy of a trust-based app. I build a Flash-based design environment capable of basic image manipulations, I design a web engine that organizes tens of thousands of images used in the design environment, and I build modular systems for parsing, logging, and data extraction-essential features for testing how consumers interact with these apps. Analysis of the iPhone app study demonstrates excellent results for trust-based marketing apps, with a favorable comparison against television ads that included a 60% greater increase in consideration and a 34% greater increase in preference for the sponsoring company (compared to television ads). Analysis of the Flash app is forthcoming as the study is in market research at the time of writing.
by Keone D. Hon.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
4

Söderlund, Magnus. "An Advertisement Framework Implementation and Scalable Database Architecture Evaluation." Thesis, Umeå universitet, Institutionen för datavetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-53159.

Full text
Abstract:
This thesis report provides a detailed description of an iOS framework implementation for the product developed at Dohi Sweden, used to target advertisement. Targeting properties are stored in a relational database and the customer estimates the amount of requests performed against the database to reach several hundred million requests per month when fully integrated. Possible system architectures are therefore evaluated using denitions of scalability, elasticity and availability made in this report. With the possibility of a cloud based deployment three large cloud service providers are also evaluated using the definitions made. Testing of the back-end, coupled with the theory for the evaluation show that the back-end should be able to handle the amount of requests required. The framework is designed to provide easy integration, high modularity and only necessary exposure of possibilities.
APA, Harvard, Vancouver, ISO, and other styles
5

Cheiner, Oleg M. (Oleg Mikhail) 1975. "Implementation and evaluation of an eventually-serializable data service." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42745.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1997.
Includes bibliographical references (p. 63-64).
by Oleg M. Cheiner.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
6

Ambross, Johannes Nikolaas. "A case study of the implementation of science process skills for grades 4 to 7 learners in natural sciences in a South African primary school." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1411.

Full text
Abstract:
With the publication of the National Curriculum Statement (2002) (NCS) the use and development of science process skills have become a critical part of the teaching and learning of the Natural Sciences in South Africa. This study sought to evaluate the implementation and development of these basic skills by four grade 4-7 educators at classroom level at a primary school in the northern areas of Port Elizabeth. Qualitative data for this evaluation were collected through educator interviews, classroom observation as well as a focus-group interview. Quantitative data were gathered by means of a Science Process Skills Observation Scale and through examining the learners' assessment activities. An Assessment Activity Science Process Skill Rating-Scale was used to evaluate assessment activities. Data generated from this study were carefully analysed and on the basis of their interpretation it was concluded that the implementation and development of science process skills were strongly influenced by the educators' understanding of these basic concepts, the belief held by each educator about their role and how their learners learn, the presence of quality support and effective training programmes as well continuous professional development.
APA, Harvard, Vancouver, ISO, and other styles
7

Dawson, Vaille M. "Bioethics education in the science curriculum : evaluation of strategies for effective and meaningful implementation." Curtin University of Technology, Science and Mathematics Education Centre, 1999. http://espace.library.curtin.edu.au:80/R/?func=dbin-jump-full&object_id=11952.

Full text
Abstract:
Although science is viewed by some as objective, analytical and unaffected by morals and values, the practice of science does raise many ethical issues. From an ethical standpoint, science teachers have an obligation to ensure that their students develop the skills to enable them to evaluate and make decisions about ethical issues associated with scientific advances so that they can make informed choices as adults. An appropriate forum for such a pedagogical concern is the subject of bioethics education.The purpose of this doctoral study was to investigate the teaching of bioethics in science. Specifically, the study attempted to evaluate the effectiveness of a range of innovative pedagogical strategies utilised by teachers who were incorporating bioethics education into their secondary science curricula. Bioethics education is concerned with enabling students, firstly, to appreciate the range of ethical issues associated with the life sciences and, secondly, to develop decision making skills based on ethical theories.Using an interpretive case study approach underpinned by a constructivist theoretical framework, I examined the teaching practice of three science teachers in different school systems. Each of these teachers taught Year 10 or Year 11 science courses that included a bioethics component. The research process was informed by an ethic of care and the constructivist criteria of credibility, transferability and ontological authenticity.As a result of the early data generated, I adopted the role of a bricoleur and used alternative research methods to pursue emergent research questions. I developed a survey consisting of four bioethical dilemmas. Bioethics students were asked to resolve each of the dilemmas and provide reasons to support their decisions. Using an ex post facto research design, I compared students who had studied bioethics with a comparison ++
group of students who had not. I also wrote narrative tales in an endeavour to provide an authentic account of the learning of individual students. Commentaries on the tales, by students and teachers, helped to enrich my understanding of students' learning experiences in the bioethics classes.The research findings are presented as 'inferences', a term which acknowledges the context dependent nature of the data generated. Five themes emerged from the data analysis which, together, indicate (1) the nature of potentially successful teaching strategies for bioethics education and (2) obstacles to students' successful engagement in learning bioethics: teacher attributes; design of bioethics courses; student attributes; impact on student learning; and physical and social constraints. Another key finding concerns the difficulty facing researchers who wish to 'measure' the impact of bioethics teaching on student learning.All three teachers displayed potentially successful teaching strategies. They were committed to the inclusion of bioethics education in their science courses. They had clearly articulated pedagogical goals related to bioethics education. They endeavoured to create safe learning environments in which students could clarify and explore their developing ethical values. When students expressed extreme views, the teachers, through careful questioning, challenged them to consider alternative ethical positions.In relation to the design of bioethics education courses, most of the learning activities in which students participated were based on small group and whole-class discussion (e.g., role plays, oral presentations). These activities provided opportunities for students to examine a topic in depth. Importantly, students were provided with information to help them understand the scientific content area before they could appreciate the associated ethical issues.In ++
the three cases, it appears that bioethics education had a variable effect on student learning. Attributes were identified that may have influenced student engagement in opportunities to learn bioethics: the students' moral maturity, academic ability, attitude to learning, beliefs about science and ethics, family and religious background.Evidence suggests that exposure to bioethics education can affect favourably students' attitudes to science. However, the results of the bioethical dilemma survey suggest that, on average, there was no difference in the way that students resolved dilemmas, regardless of whether or not they had been exposed to bioethics education. Although there was considerable variation amongst students, most of the students' responses differed from those of experts in that the students tended to focus solely on the rights of individuals, without considering the long term consequences of their decisions.Constraints were identified that may adversely affect the impact of bioethics education in science: scarcity of resources, including insufficient teaching time; and, amongst science teachers, lack of expertise in the content areas that raise bioethical issues and lack of experience in the types of learning activities appropriate for bioethics education.The findings of this research study are significant as they highlight important issues that may need to be considered by curriculum planners and science teachers who wish to incorporate bioethics education into science curricula.
APA, Harvard, Vancouver, ISO, and other styles
8

Dawson, Vaille. "Bioethics education in the science curriculum : evaluation of strategies for effective and meaningful implementation." Thesis, Curtin University, 1999. http://hdl.handle.net/20.500.11937/2463.

Full text
Abstract:
Although science is viewed by some as objective, analytical and unaffected by morals and values, the practice of science does raise many ethical issues. From an ethical standpoint, science teachers have an obligation to ensure that their students develop the skills to enable them to evaluate and make decisions about ethical issues associated with scientific advances so that they can make informed choices as adults. An appropriate forum for such a pedagogical concern is the subject of bioethics education.The purpose of this doctoral study was to investigate the teaching of bioethics in science. Specifically, the study attempted to evaluate the effectiveness of a range of innovative pedagogical strategies utilised by teachers who were incorporating bioethics education into their secondary science curricula. Bioethics education is concerned with enabling students, firstly, to appreciate the range of ethical issues associated with the life sciences and, secondly, to develop decision making skills based on ethical theories.Using an interpretive case study approach underpinned by a constructivist theoretical framework, I examined the teaching practice of three science teachers in different school systems. Each of these teachers taught Year 10 or Year 11 science courses that included a bioethics component. The research process was informed by an ethic of care and the constructivist criteria of credibility, transferability and ontological authenticity.As a result of the early data generated, I adopted the role of a bricoleur and used alternative research methods to pursue emergent research questions. I developed a survey consisting of four bioethical dilemmas. Bioethics students were asked to resolve each of the dilemmas and provide reasons to support their decisions. Using an ex post facto research design, I compared students who had studied bioethics with a comparison group of students who had not. I also wrote narrative tales in an endeavour to provide an authentic account of the learning of individual students. Commentaries on the tales, by students and teachers, helped to enrich my understanding of students' learning experiences in the bioethics classes.The research findings are presented as 'inferences', a term which acknowledges the context dependent nature of the data generated. Five themes emerged from the data analysis which, together, indicate (1) the nature of potentially successful teaching strategies for bioethics education and (2) obstacles to students' successful engagement in learning bioethics: teacher attributes; design of bioethics courses; student attributes; impact on student learning; and physical and social constraints. Another key finding concerns the difficulty facing researchers who wish to 'measure' the impact of bioethics teaching on student learning.All three teachers displayed potentially successful teaching strategies. They were committed to the inclusion of bioethics education in their science courses. They had clearly articulated pedagogical goals related to bioethics education. They endeavoured to create safe learning environments in which students could clarify and explore their developing ethical values. When students expressed extreme views, the teachers, through careful questioning, challenged them to consider alternative ethical positions.In relation to the design of bioethics education courses, most of the learning activities in which students participated were based on small group and whole-class discussion (e.g., role plays, oral presentations). These activities provided opportunities for students to examine a topic in depth. Importantly, students were provided with information to help them understand the scientific content area before they could appreciate the associated ethical issues.In the three cases, it appears that bioethics education had a variable effect on student learning. Attributes were identified that may have influenced student engagement in opportunities to learn bioethics: the students' moral maturity, academic ability, attitude to learning, beliefs about science and ethics, family and religious background.Evidence suggests that exposure to bioethics education can affect favourably students' attitudes to science. However, the results of the bioethical dilemma survey suggest that, on average, there was no difference in the way that students resolved dilemmas, regardless of whether or not they had been exposed to bioethics education. Although there was considerable variation amongst students, most of the students' responses differed from those of experts in that the students tended to focus solely on the rights of individuals, without considering the long term consequences of their decisions.Constraints were identified that may adversely affect the impact of bioethics education in science: scarcity of resources, including insufficient teaching time; and, amongst science teachers, lack of expertise in the content areas that raise bioethical issues and lack of experience in the types of learning activities appropriate for bioethics education.The findings of this research study are significant as they highlight important issues that may need to be considered by curriculum planners and science teachers who wish to incorporate bioethics education into science curricula.
APA, Harvard, Vancouver, ISO, and other styles
9

Rajaraman, Bhargavi. "IMPLEMENTATION AND EVALUATION OF REGISTER TILING FOR PERFECTLY NESTED LOOPS." The Ohio State University, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=osu1245123518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Chao Gilbert Juan E. "CSSE document management system implementation and usability evaluation /." Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Summer/Theses/WANG_CHAO_41.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Payne, Joshua Estes. "Implementation and performance evaluation of a GPU particle-in-cell code." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/76970.

Full text
Abstract:
Thesis (S.M. and S.B.)--Massachusetts Institute of Technology, Dept. of Nuclear Science and Engineering; and, (S.B.)--Massachusetts Institute of Technology, Dept. of Physics, 2012.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 105-107).
In this thesis, I designed and implemented a particle-in-cell (PIC) code on a graphical processing unit (GPU) using NVIDA's Compute Unified Architecture (CUDA). The massively parallel nature of computing on a GPU nessecitated the development of new methods for various steps of the PIC method. I investigated different algorithms and data structures used in the past for GPU PIC codes, as well as developed some of new ones. The results of this research and development were used to implement an efficient multi-GPU version of the 3D3v PIC code SCEPTIC3D. The performance of the SCEPTIC3DGPU code was evaluated and compared to that of the CPU version on two different systems. For test cases with a moderate number of particles per cell, the GPU version of the code was 71x faster than the system with a newer processor, and 160x faster than the older system. These results indicate that SCEPTIC3DCPU can run problems on a modest workstation that previously would have required a large cluster.
by Joshua Estes Payne.
S.B.
S.M.and S.B.
APA, Harvard, Vancouver, ISO, and other styles
12

Hall, Miguel G. (Miguel Geissler). "The design and implementation of a continuously updated class evaluation guide." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/40178.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Shen, Shen Ph D. Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science. "Design, implementation, and evaluation of a social learning network for Chess." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/93054.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014.
Cataloged from PDF version of thesis.
Includes bibliographical references (page 67).
Abstract This thesis demonstrates how an active team environment, enabled by educational technology, enhances an individual's learning experience. With the inspiration and insight from international chess Grandmaster Maurice Ashley, who is also an experienced and successful chess coach, this thesis examines the question in the context of chess. Two of GM Ashley's acclaimed chess skill builders, Pawn Mower and Chess- Maze are digitally transformed, and then extended to create a social learning network. Three types of team interactions are designed, which we call EnLighten Me, Peers' Peek, and Heat Map respectively. EnLighten Me and Peers' Peek are implemented into browser-based webpage, while Heat Map is visualized in a mobile application written on the Android platform. A comparative experiment is then designed according to learning theory, to test the effectiveness of the proposed social learning network. User data was collected and interpreted for possible future work.
by Shen Shen.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
14

Staite, Christopher. "Identity management architecture and implementation : evaluation and improvement." Thesis, University of Birmingham, 2012. http://etheses.bham.ac.uk//id/eprint/3388/.

Full text
Abstract:
The definition of identity varies, and on the Internet it can be difficult to keep track of. Rather than trying to discuss the philosophical question of "who am I?", I like to define your digital identity as the information you place on the Internet (actively or passively). Managing this identity comes down to what information you give out and how to protect and modify that information. This thesis focuses on the latter half, the protection and modification of online identities and only skims the realms of protecting the information given to third parties. A distinct lack of drive in the development of technologies for managing authentication has dogged the Internet for some time. Numerous efforts have been made to simplify administration, but open protocols meant for simplifying the user experience have had little promotion and ended up forgotten or used to simplify administration. The question that needs to be answered, as usual in research, is why? Studies have shown that password fatigue is a very real issue and identity theft is increasing. Companies will always optimise their time and resources, but academics need to focus their work on optimising the user experience. In this thesis, a study of existing work produces a methodology to evaluate previous developments. This aids in determining where progress has been made in previous iterations and how, leading to a new development in identity management focussed on the needs of the end user. Finally, two implementations are created to realise this new form of identity management.
APA, Harvard, Vancouver, ISO, and other styles
15

Lee, Michelle Lanphere. "IMPLEMENTATION AND EVALUATION OF A HEALTH PROMOTION PROGRAM ON UNIVERSITY CAMPUSES." MSSTATE, 2008. http://sun.library.msstate.edu/ETD-db/theses/available/etd-11042008-170512/.

Full text
Abstract:
Obesity is a national epidemic with approximately 66% of American adults overweight or obese, and more than 30% of Mississippians having a body mass index (BMI) of 30 or greater. Only 23% of adults eat the daily recommended servings of fruits and vegetables and 75% have sedentary lifestyles. Diet and exercise play pivotal roles in preventing chronic diseases. Mississippi In Motion (MIM) is a research based, peer-reviewed curriculum for a 12-week community program designed to promote healthy eating and physical activity, encourage social support, and build self-efficacy. Program objectives are for participants to consume 5-9 servings of fruits and vegetables, engage in 30 minutes of physical activity daily, and attend weekly educational sessions. Individuals form teams for social support, participate in a health fair and complete pre- and post-evaluations. MIM has been implemented on two university campuses with students, staff and faculty completing the program (n=283). A six month follow-up survey was sent to the 283 participants with 96 returned (34% response rate). Data were collected from pre-evaluations, post-evaluations and follow-up surveys, in addition to anthropometric data. SPSS was used for statistical analysis. In 12 weeks, body weight decreased from 83.52 kg±20.96 SD to 81.92 kg±20.61 SD (p<.001) and BMI decreased from 29.40 kg/m2±6.79 SD to 28.84 kg/m2±6.69 SD (p<.001). Physical activity levels increased as well as fruit, vegetable, and water intakes (p<.001). Independent t-tests determined that six months after program completion, individuals (n=96) continued to consume fruits and vegetables similar to amounts reported in the post-evaluations; however, participants had not maintained physical activity behaviors when compared to post-evaluations. These results indicate MIM was successful with improving eating habits that continued six months after participants completed the program but should emphasize physical activity maintenance. Seventy-eight percent reported they were willing to participate in MIM again if offered on campus. Universities are in a unique situation to develop long-term strategies to promote healthy eating and physical activity behaviors among students, faculty and staff. Mississippi leads the nation in obesity and MIM is having a positive impact on improving health status in Mississippi.
APA, Harvard, Vancouver, ISO, and other styles
16

Snyder, Sheldon L. "Efficient XML Interchange (EXI) compression and performance benefits development, implementation and evaluation /." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FSynder.pdf.

Full text
Abstract:
Thesis (M.S. in Modeling, Virtual Environments and Simulation (MOVES))--Naval Postgraduate School, March 2010.
Thesis Advisor(s): Brutzman, Don ; McGregor, Don. "March 2010." Description based on title screen as viewed on April 23, 2010. Author(s) subject terms: Extensible Markup Language (XML), Efficient XML Interchange (EXI), Compression. Includes bibliographical references (p. 337-353). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
17

Kondrakunta, Sravya. "Implementation and Evaluation of Goal Selection in a Cognitive Architecture." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1503319861179462.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Asplund, Katarina. "Implementation and Experimental Evaluation of a Partially Reliable Transport Protocol." Licentiate thesis, Karlstad University, Division for Information Technology, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-2437.

Full text
Abstract:

In the last decade, we have seen an explosive growth in the deployment of multimedia applications on the Internet. However, the transport service provided over the Internet is not always feasible for these applications, since the network was originally designed for other types of applications. One way to better accommodate the service requirements of some of these applications is to provide a partially reliable transport service. A partially reliable transport service does not insist on recovering all, but just some of the packet losses, thus providing a lower transport delay than a reliable transport service. The work in this thesis focuses on the design, implementation, and evaluation of a partially reliable transport protocol called PRTP. PRTP has been designed as an extension to TCP in order to show that such a service could be effectively integrated with current protocol standards. An important feature of PRTP is that all modifications for PRTP are restricted to the receiver side, which means that it could be very easily deployed. The thesis presents performance results from various experiments on a Linux implementation of PRTP. The results suggest that transfer times can be decreased significantly when using PRTP as opposed to TCP in networks in which packet loss occurs. Furthermore, the thesis includes a study that investigates how users perceive an application that is based on a partially reliable service. Specifically, how users select the trade-off between image quality and latency when they download Web pages is explored. The results indicate that many of the users in the study could accept less than perfect image quality

if the latency could be shortened.

APA, Harvard, Vancouver, ISO, and other styles
19

Bayliss, Roderick S. III. "Design, implementation, and evaluation of high-efficiency high-power radio-frequency inductors." Thesis, Massachusetts Institute of Technology, 2021. https://hdl.handle.net/1721.1/130679.

Full text
Abstract:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, February, 2021
Cataloged from the official PDF of thesis.
Includes bibliographical references (pages 111-112).
Radio-Frequency (RF) power inductors are critical to many application spaces such as communications, RF food processing, heating, and plasma generation for semiconductor processing. Inductors for high frequency and high power (e.g., tens of MHz and hundreds of watts and above) have traditionally been implemented as air-core solenoids to avoid high-frequency core loss. These designs have more turns than magnetic-core inductors and thus high copper loss; their high loss and large size are both major contributors to the overall system efficiency and size. One contribution of this thesis is a magnetic-core inductor design approach that leverages NiZn ferrites with low loss at RF, distributed gaps and field balancing to achieve improved performance at tens of MHz and at hundreds of watts and above. This approach is demonstrated in a 13.56 MHz, 580 nH, 80 A[subscript pk] magnetic-core inductor design that achieves a quality factor of > 1100, a significant improvement over Q~600 achieved by conventional air-core inductors of similar volume and power rating. This thesis additionally describes the difficulties in experimentally measuring inductor quality factors with very high current and very low loss at very high frequency. Several measurement techniques are proposed and evaluated to enable consistent measurement of inductor resistance at these operating points. Finally, these design techniques are extended to an inductor design which achieves "self-shielding" in which the magnetic field generated by the element is wholly contained within the physical volume of the structure rather than extending into space as a conventional air-core inductor would. This development enables significant reductions of system enclosure volume and improvements in overall system efficiency.
by Roderick S. Bayliss III.
M. Eng.
M.Eng. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
APA, Harvard, Vancouver, ISO, and other styles
20

Anwar, Mohammad. "Implementation and evaluation of scoring schemes for the automated discovery of nucleic acid structures." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27220.

Full text
Abstract:
With recent experimental evidence, it has been shown that RNA (ribonucleic acid) plays a greater role in various cellular functions than previously thought. With the increasing number of known RNA families a need arises to develop computational techniques to analyze RNA sequences. An array of evolutionary related RNA sequences believed to contain signals at both the sequence and structure levels can be exploited to detect motifs common to all or a portion of those sequences. Finding these similar structural features can provide substantial information as to which parts of the sequence are functional. Recently, Nguyen (M.A.Sc thesis, Electrical Engineering, University of Ottawa, 2004) introduced a novel approach for discovering consensus secondary structure motifs in a set of unaligned RNA sequences. The algorithm has been implemented in a software system called Seed. The aim of this thesis is to devise, implement and evaluate (3) scoring schemes for the software system. The first scoring scheme is based on the sum of the thermodynamics free energy, based on the nearest neighbor model. We then present a general framework for evaluation of RNA structures using statistical regression analysis. The third scoring scheme to be validated is based on the framework of minimum description length principle. We implemented and validated the above scoring schemes on four different data sets having varying range of complexity. The first two were derived from selected members of UTRdb database where the coding region is flanked by two untranslated regions (5' UTR and 3' UTR). The others were assembled using a subset of the sequences from Masoumi and Turcotte (IJBRA, 1(2), 230--245, 2005). By three measures, positive predicted value, sensitivity and Matthews correlation coefficient, our methods performed well on the data sets and showed significant ranking statistics. Also, our first method compares favorably with state-of-the-art tool, RNAprofile. For small motifs, the scoring methods are able to rank motifs with high PPV/sensitivity, often 100%. The top ranked motifs were used as input constraints for MFOLD, a widely used tool for RNA secondary structure determination. They showed improvements in both PPV and sensitivity measurements of the foldings made.
APA, Harvard, Vancouver, ISO, and other styles
21

Srinivasan, Pradeep Kumar. "Implementation and Evaluation of Proportional Share Scheduler on Linux Kernel 2.6." Ohio University / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1203706880.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Srivastava, Mayank. "Implementation and Evaluation of a Multiple-Points Haptic Rendering Algorithm." Ohio University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1181049930.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Engström, Gustav, and Marcus Falgert. "Implementation and Evaluation of Concurrency on Parallella." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177385.

Full text
Abstract:
The question asked is what optimizations can be done when working with the Parallella board from Adapteva and how they di er from other concurrent solutions. Parallella is a small super computer with a unique 16 core co-processor that we were to utilize. We have been working to parallelizing image manipulation software, and then analyzing the results of some performed tests. The goal is to conclude how to properly utilize the Epiphany accelerator, and also see how it performs in comparison to other CPUs. This project is a part of the PaPP project, which will utilize Parallella, and the work can be seen as an initial evaluation of the board. We have tested the board to see how it holds up and made our best e orts to adapt to the hardware and explain our path of working. This report is worth reading for anyone who has little experience with Parallella, who desires to learn how well it works and what it's good for. There are descriptions of all libraries used and detailed thoughts on how to implement software solutions for Epiphany. This is a bachelor level project and was performed with no prior knowledge of Parallella.
APA, Harvard, Vancouver, ISO, and other styles
24

Meenakshi, Renganathan Siva. "An Interactive Learning Tool for Early Algebra Education: Design, Implementation, Evaluation and Deployment." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1492659130106009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Johnsson, Andreas. "Modeling, Implementation and Evaluation of IP Network Bandwidth Measurement Methods." Doctoral thesis, Västerås : Department of Computer Science and Electronics, Mälardalen University, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Gilbert, Marcus-Alan. "The design and implementation of an I/O controller for the 386EX evaluation board." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/37782.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1995.
Includes bibliographical references (p. 58-60).
by Marcus-Alan Gilbert.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
27

WERKELIN, AHLIN OSKAR. "Implementation and evaluation of some platformindependent obfuscating transformations." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142376.

Full text
Abstract:
We study the state-of-art of code obfuscation, a technique used to protect software from reverse engineering by complicating the execution flow of a program. The best current solutions are platform dependent. Platform independent code obfuscation techniques are evaluated by implementing specific code obfuscation methods, and comparing their efficiency with respect to a number of defined metrics. The obfuscation methods are implemented tightly coupled with a common open source compiler. We conclude that the choice is good and gives a lot of freedom in implementing an obfuscator. We successfully implement and evaluate some obfuscation methods, which alone are not that potent, but when applied in chain with other methods can make the job harder for a reverse engineer.
Vi studerar kodobfuskering, ett verktyg som används för att skydda mjukvara från att bakåtkompileras. När man obfuskerar programkod så komplicerar man exekveringsflödet och gör det på så sätt svårare för angripare eller konkurrenter att tyda den bakomliggande logiken hos programmet. Dagens bästa lösningar för kodobfuskering är beroende av en viss plattform. Vi utvärderar några plattformsoberoende obfuskeringsalgoritmer genom att implementera dem och utvärdera dem med avseende på ett antal definierade mätvärden. Obfuskeringsmetoderna implementeras med hjälp av ett vanligt kompilatorprojekt som baseras på öppen källkod. Vi konstaterar att det är gynnsamt att göra implementationerna på valt sätt. Givet implementationen av några vanliga obfuskeringsmetoder så utvärderar vi dem var för sig, och ensamma visar de sig inte vara så kraftfulla som förväntat. Vi kan dock konstatera att obfuskeringsmetoderna kan bli mycket mer kraftfulla om de appliceras i kombination med varandra.
APA, Harvard, Vancouver, ISO, and other styles
28

Lerer, Adam. "Implementation and evaluation of an IVR rendering platform for data collection in the developing world." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/61169.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2010.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 91-93).
Due to the rapid spread of mobile phones and coverage in the developing world, mobile phones are being increasingly used as a technology platform for developing-world applications. Data collection is one such application area, and a variety of software has been written to enable data collection over mobile phones. However, reaching the vast majority of mobile phone users without access to specialized software requires a data collection strategy that operates over IVR or SMS. We have developed ODK Voice, an IVR platform for delivering data collection protocols based on the XForms standard and targeted at users in the developing world. User testing of ODK Voice was performed both in controlled scenario experiments, and in a real-world deployment in Uganda. In controlled experiments in the United States, users were able to complete a complex survey with high accuracy. However, in a real-world deployment with teachers in rural Uganda lacking training or IVR experience, a number of significant interface modifications were required in order to achieve high success rates. The task success rate increased from near 0% to over 75% based on changes in interface design. Notably, most participants were not able to use a touchtone or touchtone-voice hybrid interface without prior training. A set of design recommendations is proposed based on the performance of users in Uganda on several interface iterations.
by Adam Lerer.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
29

Rosenqvist, Tobias, and Joël Sloof. "Implementation and evaluation of Polar Codes in 5G." Thesis, Karlstads universitet, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-72467.

Full text
Abstract:
In today’s society the ability to communicate with one another has grown, were a lot of focus is aimed towards speed in the telecommunication industry. For transmissions to become even faster, there are many ways to enhance transmission speeds of which error correction is one. Padding messages such that they are protected from noise, while using as few bits as possible and ensuring safe transmit is handled by error correction codes. Short codes with low complexity is a solution to faster transmission speeds. An error correction code which has gained a lot of attention since its first appearance in 2009 is Polar Codes. Polar Codes was chosen as the 3GPP standard for 5G control channel. The goal of the thesis is to develop and implement Polar Codes and rate matching according to the 3GPP standard 38.212. Polar Codes are then to be evaluated with different block sizes and rate matching settings. Finally Polar Code is compared with Convolutional code in a LTE-simulation environment. The performance evaluations are presented using BLER/(Eb/N0)-graphs. In this thesis a Polar encoder, rate matching and a Polar decoder (with Successive Cancellation algorithm) were successfully implemented. The simulation results show that Polar Codes performs better with longer block sizes and also has a better BLER-performance than Convolutional Codes when given the same message lengths.
APA, Harvard, Vancouver, ISO, and other styles
30

Copley, Ashley Lane. "A Case Study of the Implementation of Co-teaching in a STEAM Elementary Magnet School in a Midwestern State." Thesis, Lindenwood University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13811327.

Full text
Abstract:

Although research is limited on the effectiveness of co-teaching as a service delivery model for students with disabilities, through observation, many educators have reported positive outcomes with co-teaching (Beninghof, 2011). This case study was designed to examine the implementation of co-teaching in an elementary magnet school in a Midwestern school district driven by science, technology, engineering, arts, and mathematics (STEAM) and with a strong emphasis on personalized learning. General education teachers, special education teachers, and administrators were interviewed three times during the initial implementation school year. In addition, journaling was documented by three of the participants, and co-teaching fidelity checks were completed by the school district’s Executive Director of Special Services. After information was gathered and analyzed, it was discovered both students with and without disabilities benefit from co-teaching as a service delivery model. It was also noted there are similarities between the benefits and challenges in a traditional co-taught classroom and a co-taught class in a STEAM elementary school with an emphasis on personalized learning. The benefits of co-teaching far outweigh the detriments. It was further discovered the success of co-teaching is attributed to the pairing of co-teaching partnerships. Finally, the participants shared the need for special education administrators to play a more active role in professional development and the sustainability of co-teaching.

APA, Harvard, Vancouver, ISO, and other styles
31

Moran, Renee Rice. "The Changing Face of Teacher Evaluation: Teacher Perceptions of One Policy Implementation." Digital Commons @ East Tennessee State University, 2014. https://dc.etsu.edu/etsu-works/3604.

Full text
Abstract:
The call for teacher improvement has recently moved into the realm of policy with the implementation of Race to the Top. RTTT challenged states to raise the bar of teacher effectiveness through the implementation of more rigorous evaluation procedures, which are tied in part to student achievement. Tennessee was one of the first states to implement this type of teacher evaluation policy. Therefore, the purpose of this study was to examine teacher perception and to explore the role of the teacher in policy implementation and the relationship to instructional decision making in the classroom. Results point to the complexity of instructional change and the pivotal role of the administrator in facilitating that change.
APA, Harvard, Vancouver, ISO, and other styles
32

Lundgren, Henrik. "Implementation and Experimental Evaluation of Wireless Ad hoc Routing Protocols." Doctoral thesis, Uppsala : Acta Universitatis Upsaliensis : Univ.-bibl. [distributör], 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-4806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Chen, Chao. "A novel framework for the implementation and evaluation of type-1 and interval type-2 ANFIS." Thesis, University of Nottingham, 2018. http://eprints.nottingham.ac.uk/49442/.

Full text
Abstract:
This thesis explores a novel framework for implementing and evaluating type-1 (T1) and interval type-2 (IT2) models of Adaptive Network Fuzzy Inference Systems (ANFIS). A fundamental requirement for this research is the capability to reliably and efficiently implement ANFIS models. In the last ten years, many studies have been devoted to creating IT2 ANFIS models. However, a clear architecture for IT2 ANFIS has not yet been presented. This somehow has been an obstacle to the research of IT2 ANFIS and its application to real-world problems. In this thesis, we introduce an extended ANFIS architecture that can be used for both T1 and IT2 models. In conjunction with this, a crucial obstacle to the use of IT2 fuzzy systems in general (and including IT2 ANFIS) is that IT2 models are often more computationally expensive than T1 models. Note that a bottle-neck for IT2 ANFIS is to aggregate the output of each rule produced by the inference process of the Karnik-Mendel (KM) algorithm. Many enhanced algorithms have been proposed to improve the computational efficiency of the KM algorithm. However, all of these algorithms are still based on iterative procedures to determine the switch points required for the lower and upper bounds of defuzzification. This thesis introduces a `direct approach' which can be used to determine these switch points based on derivatives, without the need for multiple iterations. When comparing various models (including T1 and IT2 ANFIS models), it is necessary to conduct fair comparisons. Partly to address this issue, a new accuracy measure is proposed which combines the best features of various alternative measures without having their common drawbacks. Experimental comparisons are made between T1 and IT2 ANFIS using the novel accuracy measure in addition to the commonly used RMSE, on both synthetic and real-world data. Finally, it is shown that IT2 ANFIS models are not easy to optimise from scratch due to difficulties with the output intervals, that are not present in T1 ANFIS models. Detailed experiments are carried out to evaluate the comparative performance of IT2 ANFIS models, including the best method for initialising the IT2 membership functions. In summary, a coherent framework for efficiently implementing IT2 ANFIS models and fairly evaluating their comparative performance is presented. This framework allows the implementation of IT2 ANFIS in any application context, and the resultant performance to be carefully considered, since clear performance improvement compared to T1 ANFIS may not always be found.
APA, Harvard, Vancouver, ISO, and other styles
34

Fetherstonhaugh, A. R. "The development, implementation and evaluation of a Constructivist learning approach based on personal construct psychology." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 1993. https://ro.ecu.edu.au/theses/1699.

Full text
Abstract:
This study involved the development, implementation and evaluation of a constructivist learning model based on Kelly's (1955) Personal Construct Psychology (PCP). The thesis begins with a rationale for the use of PCP and then the instructional approach is derived from this theoretical basis. Following the derivation, examples of learning materials used in the implementation are presented. The second half of the thesis deals with data gathered before, during and after the implementation which occurred in two Year 9 science classes. The classes were part of a city high school in Western Australia.
APA, Harvard, Vancouver, ISO, and other styles
35

Huddlestone, Grant E. "Implementation and evaluation of two prediction techniques for the Lorenz time series." Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53459.

Full text
Abstract:
Thesis (MSc)-- Stellenbosch University, 2003.
ENGLISH ABSTRACT: This thesis implements and evaluates two prediction techniques used to forecast deterministic chaotic time series. For a large number of such techniques, the reconstruction of the phase space attractor associated with the time series is required. Embedding is presented as the means of reconstructing the attractor from limited data. Methods for obtaining the minimal embedding dimension and optimal time delay from the false neighbour heuristic and average mutual information method are discussed. The first prediction algorithm that is discussed is based on work by Sauer, which includes the implementation of the singular value decomposition on data obtained from the embedding of the time series being predicted. The second prediction algorithm is based on neural networks. A specific architecture, suited to the prediction of deterministic chaotic time series, namely the time dependent neural network architecture is discussed and implemented. Adaptations to the back propagation training algorithm for use with the time dependent neural networks are also presented. Both algorithms are evaluated by means of predictions made for the well-known Lorenz time series. Different embedding and algorithm-specific parameters are used to obtain predicted time series. Actual values corresponding to the predictions are obtained from Lorenz time series, which aid in evaluating the prediction accuracies. The predicted time series are evaluated in terms of two criteria, prediction accuracy and qualitative behavioural accuracy. Behavioural accuracy refers to the ability of the algorithm to simulate qualitative features of the time series being predicted. It is shown that for both algorithms the choice of the embedding dimension greater than the minimum embedding dimension, obtained from the false neighbour heuristic, produces greater prediction accuracy. For the neural network algorithm, values of the embedding dimension greater than the minimum embedding dimension satisfy the behavioural criterion adequately, as expected. Sauer's algorithm has the greatest behavioural accuracy for embedding dimensions smaller than the minimal embedding dimension. In terms of the time delay, it is shown that both algorithms have the greatest prediction accuracy for values of the time delay in a small interval around the optimal time delay. The neural network algorithm is shown to have the greatest behavioural accuracy for time delay close to the optimal time delay and Sauer's algorithm has the best behavioural accuracy for small values of the time delay. Matlab code is presented for both algorithms.
AFRIKAANSE OPSOMMING: In hierdie tesis word twee voorspellings-tegnieke geskik vir voorspelling van deterministiese chaotiese tydreekse ge"implementeer en geevalueer. Vir sulke tegnieke word die rekonstruksie van die aantrekker in fase-ruimte geassosieer met die tydreeks gewoonlik vereis. Inbedmetodes word aangebied as 'n manier om die aantrekker te rekonstrueer uit beperkte data. Metodes om die minimum inbed-dimensie te bereken uit gemiddelde wedersydse inligting sowel as die optimale tydsvertraging te bereken uit vals-buurpunt-heuristiek, word bespreek. Die eerste voorspellingsalgoritme wat bespreek word is gebaseer op 'n tegniek van Sauer. Hierdie algoritme maak gebruik van die implementering van singulierwaarde-ontbinding van die ingebedde tydreeks wat voorspel word. Die tweede voorspellingsalgoritme is gebaseer op neurale netwerke. 'n Spesifieke netwerkargitektuur geskik vir deterministiese chaotiese tydreekse, naamlik die tydafhanklike neurale netwerk argitektuur word bespreek en ge"implementeer. 'n Modifikasie van die terugprapagerende leer-algoritme vir gebruik met die tydafhanklike neurale netwerk word ook aangebied. Albei algoritmes word geevalueer deur voorspellings te maak vir die bekende Lorenz tydreeks. Verskeie inbed parameters en ander algoritme-spesifieke parameters word gebruik om die voorspelling te maak. Die werklike waardes vanuit die Lorentz tydreeks word gebruik om die voorspellings te evalueer en om voorspellingsakkuraatheid te bepaal. Die voorspelde tydreekse word geevalueer op grand van twee kriteria, naamlik voorspellingsakkuraatheid, en kwalitatiewe gedragsakkuraatheid. Gedragsakkuraatheid verwys na die vermoe van die algoritme om die kwalitatiewe eienskappe van die tydreeks korrek te simuleer. Daar word aangetoon dat vir beide algoritmes die keuse van inbed-dimensie grater as die minimum inbeddimensie soos bereken uit die vals-buurpunt-heuristiek, grater akkuraatheid gee. Vir die neurale netwerkalgoritme gee 'n inbed-dimensie grater as die minimum inbed-dimensie ook betel' gedragsakkuraatheid soos verwag. Vir Sauer se algoritme, egter, word betel' gedragsakkuraatheid gevind vir 'n inbed-dimensie kleiner as die minimale inbed-dimensie. In terme van tydsvertraging word dit aangetoon dat vir beide algoritmes die grootste voorspellingsakkuraatheid verkry word by tydvertragings in 'n interval rondom die optimale tydsvetraging. Daar word ook aangetoon dat die neurale netwerk-algoritme die beste gedragsakkuraatheid gee vir tydsvertragings naby aan die optimale tydsvertraging, terwyl Sauer se algoritme betel' gedragsakkuraatheid gee by kleineI' waardes van die tydsvertraging. Die Matlab kode van beide algoritmes word ook aangebied.
APA, Harvard, Vancouver, ISO, and other styles
36

White, Richard Neal. "A high school physics instructor's website: Design, implementation, and evaluation." CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2062.

Full text
Abstract:
In order to test the ability of the Internet to supplement classroom instruction, an instructor-authored WWW site crashwhite.com was developed for two Berkeley High courses: Advanced Placement (AP) physics, and college-prep physics class. The website was intended to supplement classroom instruction by making classroom materials available to students and parents outside the classroom, and to facilitate increased teacher-parent, teacher-student, and student-student communication.
APA, Harvard, Vancouver, ISO, and other styles
37

Englund, Henric. "Evaluation of traffic generation tools and implementation of test system." Thesis, Umeå universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-40730.

Full text
Abstract:
The purpose of this master’s thesis is to examine the possibilities to build an efficient and accurate distributed IP traffic generator based on a open source software traffic generator. The problem lies in the demand for high performance traffic generators during quality assurance of IP equipment and the high price of commercial hardware traffic generators. An evaluation is conducted to identify a suitable traffic generator, given a set of requirements that the traffic generator must fulfill to be usable in performance testing. A distributed system utilizing the most suitable traffic generator is then implemented. The result and conclusion of this report is that hardware traffic generators are superior to the software based counterpart due to the several drawbacks that software traffic generators suffers from, such as disc I/O and CPU load.
APA, Harvard, Vancouver, ISO, and other styles
38

Wilson, Thomas Joseph. "The development, implementation, and evaluation of Labdog : a novel web-based laboratory response system for practical work in science education." Thesis, University of Southampton, 2018. https://eprints.soton.ac.uk/418168/.

Full text
Abstract:
The teaching laboratory is common component of chemical, and science, education. However it is often an exercise in recipe-following, where students simply follow instructions. This research adopts a design-based research (DBR) approach to conceiving, developing, and piloting Labdog: a novel web-based technology for the teaching laboratory. Educators create a digitised version of practical instructions in Labdog, and can enhance instruction through the use of questions, and evidence recording. Students access Labdog before, during, and after the laboratory to answer questions, and record observations in text and photo. Labdog can be considered a Laboratory Response System (LaRS), a novel type of technology, which combines the pedagogical bases of formative assessment, classroom response systems, e-portfolios, and electronic lab notebooks. In alignment with DBR principles, this work adopts an iterative approach to generation and evaluation of such a novel technology. Specifically, this work details a series of three pilot studies, followed by a year-long investigation - each of which took place in Southampton between 2015-2017, with A-level equivalent chemistry students. DBR principles also focus on providing actionable advise foreducators who may wish to use Labdog, or some future LaRS technology. The results from these pilots repeatedly suggest that Labdog helped students consciously engage with the relevant chemical or scientific principles of their actions. The evaluation revealed the importance of well-considered design of practicals in LaRS software, notably the need to space questions and steps in accordance with the flow of the practical activities themselves. Students should be allowed to immerse themselves in practical activities, without having to worry about managing the activity on Labdog simultaneously. These findings relate to the psychological concepts of cognitive overload, which should be avoided through question content and focus, and the flow-state, which can be encouraged by the spacing of questions and consideration of practical difficulty versus student ability. Ultimately the research presents a completely novel, technologically-enhanced approach to practical work. It produces both a new tool, and a series of heuristics for designing practical work with a LaRS, based on this, and previous, research. In doing so, this work represents a successful example of DBR, and identifies a number of avenues for future research. Namely, there is a need for more experimentally-designed investigation of the impact of LaRS use on student understanding, as well as more exploratory work on cognitive overload and question design.
APA, Harvard, Vancouver, ISO, and other styles
39

Cuy, Castellanos Diana, Haozhou Pu, and Rachel Piero. "Development and implementation of an evaluation tool for measuring Cultural Competency learning activities in Health and Sport Science undergraduate students." Digital Commons @ East Tennessee State University, 2021. https://dc.etsu.edu/ijhse/vol8/iss1/3.

Full text
Abstract:
Due to the diversity within the healthcare system, it is important to promote cultural competency in healthcare providers. The integration of pedagogical approaches to cultural competency into health-related programs cannot be understated. Therefore, the purpose of this study was to develop an instrument to examine the student engagement in cultural competency-related activities within health-related degree programs and determine the relationship between engagement and cultural competency. Participants of the study included first- and fourth-year undergraduate students studying within a health-related program at a mid-sized, private university in the Midwestern US. Participants completed a cultural competency inventory questionnaire which included activities identified from prior studies that facilitated cultural competency learning. They also completed The Inventory for Assessing the Process of Cultural Competence For Healthcare Professionals -Student Version (IAPCC-SV, 2009); a measure of cultural competency. Using the exploratory factor analysis, the Cultural Learning Inventory (CLI) indicated a 4-factor construct with adequate construct detection. Overall, three of the four CLI constructs were positively associated with overall cultural competency. Further, first-year students had lower CLI and cultural competency scores compared to fourth year students. In conclusion, promoting learning activities and programs can positively impact future cultural competency in health-related professionals.
APA, Harvard, Vancouver, ISO, and other styles
40

Knutsson, Tor. "Implementation and evaluation of data persistence tools for temporal versioned data models." Thesis, Department of Computer and Information Science, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-19979.

Full text
Abstract:

The purpose of this thesis was to investigate different concepts and tools which could support the development of a middleware which persists a temporal and versioned relational data model in an enterprise environment. Further requirements for the target application was that changes to the data model had to be facilitated, so that a small change to the model would not result in changes in several files and application layers. Other requirements include permissioning and audit tracing. In the thesis the reader is presented with a comparison of a set of tools for enterprise development and object/relational mapping. One of the tools, a code generator, is chosen as a good candidate to match the requirements of the project. An implementation is presented, where the chosen tool is used. An XML-based language which is used to define a data model and to provide input data for the tool is presented. Other concepts concerning the implementation is then described in detail. Finally, the author discusses alternative solutions and future improvements.

APA, Harvard, Vancouver, ISO, and other styles
41

Baskaravel, Yogaraj. "Implementation and evaluation of global router for Information-Centric Networking." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5986.

Full text
Abstract:
Context. A huge majority of the current Internet traffic is information dissemination. Information-Centric Networking (ICN) is a future networking paradigm that focuses on global level information dissemination. In ICN, the communication is defined in terms of requesting and providing Named Data Objects (NDO). NetInf is a future networking architecture based on Information-Centric Networking principles. Objectives. In this thesis, a global routing solution for ICN has been implemented. The authority part of NDO's name is mapped to a set of routing hints each with a priority value. Multiple NDOs can share the same authority part and thus the first level aggregation is provided. The routing hints are used to forward a request for a NDO towards a suitable copy of the NDO. The second level aggregation is achieved by aggregating high priority routing hints on low priority routing hints. The performance and scalability of the routing implementation are evaluated with respect to global ICN requirements. Furthermore, some of the notable challenges in implementing global ICN routing are identified. Methods. The NetInf global routing solution is implemented by extending NEC's NetInf Router Platform (NNRP). A NetInf testbed is built over the Internet using the extended NNRP implementation. Performance measurements have been taken from the NetInf testbed. The performance measurements have been discussed in detail in terms of routing scalability. Results. The performance measurements show that hop-by-hop transport has significant impact on the overall request forwarding. A notable amount of time is taken for extracting and inserting binary objects such as routing hints at each router. Conclusions. A more suitable hop-by-hop transport mechanism can be evaluated and used with respect to global ICN requirements. The NetInf message structure can be redefined so that binary objects such as routing hints can be transmitted more efficiently. Apart from that, the performance of the global routing implementation appears to be reasonable. As the NetInf global routing solution provides two levels of aggregation, it can be scalable as well.
APA, Harvard, Vancouver, ISO, and other styles
42

Kӧnik, Stella. "Music education software : an HCI evaluation of existing software and prototype implementation of an ear training programme based on a proposed approach." Master's thesis, University of Cape Town, 2003. http://hdl.handle.net/11427/6408.

Full text
Abstract:
Includes bibliographical references.
This research paper uses Human Computer Interaction(HCI) evaluation methods, namely questionnaires and interviews, to obtain information about the kind of music software currently in common use in music departments, and the level of satisfaction of the students with this software. The evaluation results are then used to examine the possibilities for some improvement of this software. The evaluation reveals that certain software, such as that used for the area of aural (ear) training in music study, may not be used to its fullest extent as a result of a lack of student interest in the software. This research considers one possible reason for the lack of interest, namely that students find no relevance or meaning in the content of such software.
APA, Harvard, Vancouver, ISO, and other styles
43

Melin, Tomas. "Implementation and Evaluation of a Continuous Code Inspection Platform." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-130575.

Full text
Abstract:
Establishing and preserving a high level of software quality is a not a trivial task, although the benefits of succeeding with this task has been proven profitable and advantageous. An approach to mitigate the decreasing quality of a project is to track metrics and certain properties of the project, in order to view the progression of the project’s properties. This approach may be carried out by introducing continuous code inspection with the application of static code analysis. However, as the initial common opinion is that these type of tools produce a too high number of false positives, there is a need to investigate what the actual case is. This is the origin for the investigation and case study performed in this paper. The case study is performed at Ida Infront AB in Linköping, Sweden and involves interviews with developers to determine the performance of the continuous inspection platform SonarQube, in addition to examine the general opinion among developers at the company. The author executes the implementation and configuration of a continuous inspection environment to analyze a partition of the company’s product and determine what rules that are appropriate to apply in the company’s context. The results from the investigation indicate the high quality and accuracy of the tool, in addition to the advantageous functionality of continuously monitoring the code to observe trends and the progression of metrics such as cyclomatic complexity and duplicated code, with the goal of preventing the constant increase of complex and duplicated code. Combining this with features such as false positive suppression, instant analysis feedback in pull requests and the possibility to break the build given specified conditions, suggests that the implemented environment is a way to mitigate software quality difficulties.
建立和保持高水平的软件质量可以带来经济利益等诸多好处,然而这是一项很困难的任务。其中一种防止软件项目质量下降的方法是通过跟踪项目的度量值和某些属性,来查看项目的属性的变化情况。通过引入持续的代码审查和应用静态代码分析方法可以实现这种方法。然而,在人们的印象中,这类工具往往具有较高的误检,因此需要进一步调查实际情况、研究其可行性,这是本文的初始研究目标。本文在瑞典林雪平的Ida Infront AB公司开展了案例研究,调研了该公司开发人员的意见,并通过访问开发人员,确定持续的代码审查平台SonarQube的性能。作者对持续的代码审查环境进行了配置,分析了公司的部分产品,进而确定哪些规则适用于该公司。调查结果表明该工具是高质量并且准确的,还提供了持续监测代码来观察度量值的趋势和进展等先进功能,例如通过监测环路复杂度和重复代码等度量值,来防止复杂度和重复代码的增加。通过组合误检压缩、对pull requests的瞬间分析反馈、以及分解和建立给定的条件等特征,使得所实现的环境成为一种可以降低软件质量保障难度的方式。
APA, Harvard, Vancouver, ISO, and other styles
44

Magnani, Antonio. "Design, implementation and performance evaluation of an anonymous distributed simulator." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10503/.

Full text
Abstract:
La simulazione è definita come la rappresentazione del comportamento di un sistema o di un processo per mezzo del funzionamento di un altro o, alternativamente, dall'etimologia del verbo “simulare”, come la riproduzione di qualcosa di fittizio, irreale, come se in realtà, lo fosse. La simulazione ci permette di modellare la realtà ed esplorare soluzioni differenti e valutare sistemi che non possono essere realizzati per varie ragioni e, inoltre, effettuare differenti valutazioni, dinamiche per quanto concerne la variabilità delle condizioni. I modelli di simulazione possono raggiungere un grado di espressività estremamente elevato, difficilmente un solo calcolatore potrà soddisfare in tempi accettabili i risultati attesi. Una possibile soluzione, viste le tendenze tecnologiche dei nostri giorni, è incrementare la capacità computazionale tramite un’architettura distribuita (sfruttando, ad esempio, le possibilità offerte dal cloud computing). Questa tesi si concentrerà su questo ambito, correlandolo ad un altro argomento che sta guadagnando, giorno dopo giorno, sempre più rilevanza: l’anonimato online. I recenti fatti di cronaca hanno dimostrato quanto una rete pubblica, intrinsecamente insicura come l’attuale Internet, non sia adatta a mantenere il rispetto di confidenzialità, integrità ed, in alcuni, disponibilità degli asset da noi utilizzati: nell’ambito della distribuzione di risorse computazionali interagenti tra loro, non possiamo ignorare i concreti e molteplici rischi; in alcuni sensibili contesti di simulazione (e.g., simulazione militare, ricerca scientifica, etc.) non possiamo permetterci la diffusione non controllata dei nostri dati o, ancor peggio, la possibilità di subire un attacco alla disponibilità delle risorse coinvolte. Essere anonimi implica un aspetto estremamente rilevante: essere meno attaccabili, in quanto non identificabili.
APA, Harvard, Vancouver, ISO, and other styles
45

Ali, Noman Mumtaz, and Robert Potys. "Implementation and Evaluation of NetInf TP, an Information-centric Transport Protocol." Thesis, SICS, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-23686.

Full text
Abstract:
In recent times, there has been a significant growth in the number of Internet users, resulting in an increased demand for different types and amounts of content. As content distribution over the Internet has become a key issue, one proposal is that the Internet architecture could evolve to a more ``Information-Centric'' paradigm instead of the currently designed ``Host-Centric'' paradigm. In the host-based architecture, the data is often restricted to a location and will become unavailable if the host holding the data (or network connection) becomes unreachable. With the Information-centric data approach, the requestor requests data and receives it regardless of where the data actually originated from. Hence, the focus moves from ``where'' to ``what'' one is interested in. The heterogeneity of access methods and devices makes this type of approach even more appealing, especially when caching of data at intermediate points can be achieved. The prototype developed in the thesis builds an important part of the Information-Centric vision, that is a receiver-driven transport protocol. This is in contrast to the host-centric transport protocols which are always source driven. The advantage of having the receiver driven feature is to allow for multiple senders or receivers of the same data. That is, one receiver may ask more than one holder to send different pieces of the same file. We have implemented, simulated and assessed the performance of the proposed protocol, hereby called NetInf TP. Since the protocol may have to co-exist with existing sender driven TCP implementations for some time, we have looked at the inter-operation of NetInf TP with TCP variants from both qualitative and quantitative perspectives.
CNS
APA, Harvard, Vancouver, ISO, and other styles
46

Brown, Mark A. "Proposition of the Temporal Variation Data model and Evaluation of an Implementation." NSUWorks, 1998. http://nsuworks.nova.edu/gscis_etd/426.

Full text
Abstract:
This dissertation identifies the need to develop practical implementations of temporal databases. Most databases today model the real world at one particular time. As new information is collected older information is deleted. This degrades the capabilities of decision support systems because only trends that were anticipated and included in the design of the database can be reported. The retention of older information requires significant increases in resources. This dissertation focuses on temporal databases which retain older information rather than delete it. This dissertation reviews the relevance and significance of the use of temporal databases. It then presents a problem that has been identified through review of the literature on temporal databases. Using current models to design relations in a temporal database results in large databases that are costly to query. The Temporal Variation Data Model (TVDM), is proposed to address this problem. There are two basic approaches to implementing temporal databases. These are attribute and tuple versioning. Ahn (1986) provides calculations to compare the storage requirements between these alternatives. Shiftan (1986) assesses the temporal differentiation of attributes as an implementation strategy. His proposed implementation included both tuple and attribute versioned relations. Shiftan notes an additional step, separating event information, for use in organizing tuples. That additional step, taken concurrently with additional consideration of the variation of those attributes Shiftan included in tuple versioned relations, serves as the foundation for the TVDM. Using one set of source data, attribute and tuple versioned databases are created, then the TVDM is used to create a third temporal database. This dissertation reports the results of a case study that includes a three-way comparison. It found increased utility for a temporal database as a result of using the new data model. Utility is operationally defined as a scaled comparison of central processing unit (CPU) time, input/output activity (VO), and required storage measurements. The CPU time and VO requirements are recorded for a series of test queries accessing each of the alternatives. The TVDM based database in the case study required the least storage space and had the lowest requirements for CPU time and VO.
APA, Harvard, Vancouver, ISO, and other styles
47

Mtetwa, Albert Charles. "Has it happened in Mpumalanga? An evaluation of the implementation of Curriculum 2005." Diss., Pretoria : [s.n.], 2003. http://upetd.up.ac.za/thesis/available/etd-03042004-141957/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Johansson, David. "An Evaluation of Shortest Path Algorithms on Real Metropolitan Area Networks." Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-17491.

Full text
Abstract:

This thesis examines some of the best known algorithms for solving the shortest point-to-point path problem, and evaluates their performance on real metropolitan area networks. The focus has mainly been on Dijkstra‟s algorithm and different variations of it, and the algorithms have been implemented in C# for the practical tests. The size of the networks used in this study varied between 358 and 2464 nodes, and both running time and representative operation counts were measured.

The results show that many different factors besides the network size affect the running time of an algorithm, such as arc-to-node ratio, path length and network structure. The queue implementation of Dijkstra‟s algorithm showed the worst performance and suffered heavily when the problem size increased. Two techniques for increasing the performance were examined: optimizing the management of labelled nodes and reducing the search space. A bidirectional Dijkstra‟s algorithm using a binary heap to store temporarily labelled nodes combines both of these techniques, and it was the algorithm that performed best of all the tested algorithms in the practical tests.

This project was initiated by Netadmin Systems i Sverige AB who needed a new path finding module for their network management system NETadmin. While this study is primarily of interest for researchers dealing with path finding problems in computer networks, it may also be useful in evaluations of path finding algorithms for road networks since the two networks share some common characteristics.

APA, Harvard, Vancouver, ISO, and other styles
49

Zhou, Yang. "An Implementation and Evaluation of the Least-effort Approach of Crowd Simulation." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166428.

Full text
Abstract:
Crowd simulation serves as an important tool in architecture, where efficiency and safety could be improved with the knowledge of how large groups of people behave, and computer graphics as well as entertainment industry, where demands of animating large amounts of avatars exist. This project has implemented and evaluated an approach of crowd simulation based on the Principle of Least Effort, a fundamental rule of human behavior. The approach is capable of simulating thousands of agent in real time, and can be parallelized naturally to utilize the power of multiprocessor. The approach has been implemented using C++ and OpenMP. Results show that the approach generates smooth, collision-free, and visually plausible agent trajectories. To evaluate the approach in a quantitative manner, a set of metrics have been defined, and a set of test cases have been selected. By comparing the approach with RVO, a similar approach that does not consider the Principle of Least Effort, the evaluation shows that optimization based on the principle leads to agent trajectories that cost less effort and time. In further case studies, the approach has been proved to be able to generate a number of emergent phenomena verified in real crowd.
APA, Harvard, Vancouver, ISO, and other styles
50

Vilhelmsson, Lina, and Pontus Sjöberg. "Implementation and Evaluation of a DataPipeline for Industrial IoT Using ApacheNiFi." Thesis, Karlstads universitet, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-78032.

Full text
Abstract:
In the last few years, the popularity of Industrial IoT has grown a lot, and it is expected to have an impact of over 14 trillion USD on the global economy by 2030. One application of Industrial IoT is using data pipelining tools to move raw data from industry machines to data storage, where the data can be processed by analytical instruments to help optimize the industrial operations. This thesis analyzes and evaluates a data pipeline setup for Industrial IoT built with the tool Apache NiFi. A data flow setup was designed in NiFi, which connected an SQL database, a file system, and a Kafka topic to a distributed file system. To evaluate the NiFi data pipeline setup, some tests were conducted to see how the system performed under different workloads. The first test consisted of determining which size to merge a FlowFile into to get the lowest latency, the second test if data from the different data sources should be kept separate or be merged together. The third test was to compare the NiFi setup with an alternative setup, which had a Kafka topic as an intermediary between NiFi and the endpoint. The first test showed that the lowest latency was achieved when merging FlowFiles together into 10 kB files. In the second test, merging together FlowFiles from all three sources gave a lower latency than keeping them separate for larger merging sizes. Finally, it was shown that there was no significant difference between the two test setups.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography