42 research outputs found

    Third International Symposium on Space Mission Operations and Ground Data Systems, part 1

    Get PDF
    Under the theme of 'Opportunities in Ground Data Systems for High Efficiency Operations of Space Missions,' the SpaceOps '94 symposium included presentations of more than 150 technical papers spanning five topic areas: Mission Management, Operations, Data Management, System Development, and Systems Engineering. The papers focus on improvements in the efficiency, effectiveness, productivity, and quality of data acquisition, ground systems, and mission operations. New technology, techniques, methods, and human systems are discussed. Accomplishments are also reported in the application of information systems to improve data retrieval, reporting, and archiving; the management of human factors; the use of telescience and teleoperations; and the design and implementation of logistics support for mission operations

    Technology and Testing

    Get PDF
    From early answer sheets filled in with number 2 pencils, to tests administered by mainframe computers, to assessments wholly constructed by computers, it is clear that technology is changing the field of educational and psychological measurement. The numerous and rapid advances have immediate impact on test creators, assessment professionals, and those who implement and analyze assessments. This comprehensive new volume brings together leading experts on the issues posed by technological applications in testing, with chapters on game-based assessment, testing with simulations, video assessment, computerized test development, large-scale test delivery, model choice, validity, and error issues. Including an overview of existing literature and ground-breaking research, each chapter considers the technological, practical, and ethical considerations of this rapidly-changing area. Ideal for researchers and professionals in testing and assessment, Technology and Testing provides a critical and in-depth look at one of the most pressing topics in educational testing today

    Protection of Future Electricity Systems

    Get PDF
    The electrical energy industry is undergoing dramatic changes: massive deployment of renewables, increasing share of DC networks at transmission and distribution levels, and at the same time, a continuing reduction in conventional synchronous generation, all contribute to a situation where a variety of technical and economic challenges emerge. As the society’s reliance on electrical power continues to increase as a result of international decarbonisation commitments, the need for secure and uninterrupted delivery of electrical energy to all customers has never been greater. Power system protection plays an important enabling role in future decarbonized energy systems. This book includes ten papers covering a wide range of topics related to protection system problems and solutions, such as adaptive protection, protection of HVDC and LVDC systems, unconventional or enhanced protection methods, protection of superconducting transmission cables, and high voltage lightning protection. This volume has been edited by Adam Dyśko, Senior Lecturer at the University of Strathclyde, UK, and Dimitrios Tzelepis, Research Fellow at the University of Strathclyde

    Pseudo National Security System of Health in Indonesia

    Get PDF
    ABstRACt Adolescence is a crucial period where one tends to identify who they are as an individual. However, as a teenager is struggling to find his/her place in this world, it is also a time where they are prone to engaging in risk behaviors, which tend to have an extreme psychological impact. The objective was to explore the experiences of an adolescent who engages in risk behaviors and to understand their level of personal fables. The study was a qualitative design with content analysis with semi-structured interviews of ten male adolescents aged 16-18 years. The major findings of the study indicated that adolescent’s pattern of thinking revolves around the fact that they are invincible and invulnerable. Furthermore, adolescents are aware of the risks they are putting themselves through and how in the process they are hurting others. The implications of the study are to conduct more life skill programs in schools; greater awareness has to be created on the impact and harmful effects of such behaviors

    Beyond Storytime: Whole Class Interactive Reading Aloud in Kindergarten

    Get PDF
    Existing research has established the value of reading aloud to young children and suggested a lens with three elements to describe when a teacher reads aloud to an entire kindergarten class during a planned period of instruction (CIRA): teacher practice, student activity, and text. Over four months, I observed and interviewed four experienced kindergarten teachers in the naturalistic setting of their public school classrooms. To analyze the data, I created bounded collective and individual case studies that answer my central questions: What patterns characterize teacher practice, student activity, and text during kindergarten CIRA sessions taught by experienced kindergarten teachers? How do these patterns relate to one another within or across teachers? Across the four classrooms, teachers read with inflection; employed a transparent proactive style of classroom management; purposefully selected texts to read; embedded instruction of concepts of print, vocabulary, and comprehension while they read; and differentiated for their students, especially English Language Learners (ELL). Students demonstrated nearly exclusive on task behavior including spontaneous responses. Texts were primarily narrative, chosen to support the literacy skills or content to be taught, but often did not reflect the cultural or linguistic backgrounds of the students. CIRA also differed within the four classrooms. At one end of a continuum, CIRA sessions were characterized by little apparent planning on the part of the teacher (similar to the features of parent/child read aloud sessions), impulsive student responses, and complex texts. At the other end of the continuum, the teacher planned highly controlled CIRA sessions (with many of the characteristics of a scripted lesson), students' answers were constrained by the teacher's questions, and the texts were simplistic. No Child Left Behind Act (NCLB) (2002) appeared to directly influence state and local policy that impacted the practice of all four teachers. Differences within classrooms paralleled the continuum: the teacher with the less structured sessions had the highest SES students and was least impacted by NCLB, and the teacher with the most highly-controlled sessions had the lowest SES students and was most impacted by NCLB. Results from the study inform both future research and teacher education

    10th International Conference on Business, Technology and Innovation 2021

    Get PDF
    Welcome to IC – UBT 2021 UBT Annual International Conference is the 10th international interdisciplinary peer reviewed conference which publishes works of the scientists as well as practitioners in the area where UBT is active in Education, Research and Development. The UBT aims to implement an integrated strategy to establish itself as an internationally competitive, research-intensive university, committed to the transfer of knowledge and the provision of a world-class education to the most talented students from all background. The main perspective of the conference is to connect the scientists and practitioners from different disciplines in the same place and make them be aware of the recent advancements in different research fields, and provide them with a unique forum to share their experiences. It is also the place to support the new academic staff for doing research and publish their work in international standard level. This conference consists of sub conferences in different fields like: Security Studies Sport, Health and Society Psychology Political Science Pharmaceutical and Natural Sciences Mechatronics, System Engineering and Robotics Medicine and Nursing Modern Music, Digital Production and Management Management, Business and Economics Language and Culture Law Journalism, Media and Communication Information Systems and Security Integrated Design Energy Efficiency Engineering Education and Development Dental Sciences Computer Science and Communication Engineering Civil Engineering, Infrastructure and Environment Architecture and Spatial Planning Agriculture, Food Science and Technology Art and Digital Media This conference is the major scientific event of the UBT. It is organizing annually and always in cooperation with the partner universities from the region and Europe. We have to thank all Authors, partners, sponsors and also the conference organizing team making this event a real international scientific event. Edmond Hajrizi, President of UBT UBT – Higher Education Institutio

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    Psychological Engagement in Choice and Judgment Under Risk and Uncertainty

    Get PDF
    Theories of choice and judgment assume that agents behave rationally, choose the higher expected value option, and evaluate the choice consistently (Expected Utility Theory, Von Neumann, & Morgenstern, 1947). However, researchers in decision-making showed that human behaviour is different in choice and judgement tasks (Slovic & Lichtenstein, 1968; 1971; 1973). In this research, we propose that psychological engagement and control deprivation predict behavioural inconsistencies and utilitarian performance with judgment and choice. Moreover, we explore the influences of engagement and control deprivation on agent’s behaviours, while manipulating content of utility (Kusev et al., 2011, Hertwig & Gigerenzer 1999, Tversky & Khaneman, 1996) and decision reward (Kusev et al, 2013, Shafir et al., 2002)

    Context-aware task scheduling in distributed computing systems

    Full text link
    These days, the popularity of technologies such as machine learning, augmented reality, and big data analytics is growing dramatically. This leads to a higher demand of computational power not only for IT professionals but also for ordinary device users who benefit from new applications. At the same time, the computational performance of end-user devices increases to meet the demands of these resource-hungry applications. As a result, there is a coexistence of a huge demand of computational power on the one side and a large pool of computational resources on the other side. Bringing these two sides together is the idea of computational resource sharing systems which allow applications to forward computationally intensive workload to remote resources. This technique is often used in cloud computing where customers can rent computational power. However, we argue that not only cloud resources can be used as offloading targets. Rather, idle CPU cycles from end-user administered devices at the edge of the network can be spontaneously leveraged as well. Edge devices, however, are not only heterogeneous in their hardware and software capabilities, they also do not provide any guarantees in terms of reliability or performance. Does it mean that either the applications that require further guarantees or the unpredictable resources need to be excluded from such a sharing system? In this thesis, we propose a solution to this problem by introducing the Tasklet system, our approach for a computational resource sharing system. The Tasklet system supports computation offloading to arbitrary types of devices, including stable cloud instances as well as unpredictable end-user owned edge resources. Therefore, the Tasklet system is structured into multiple layers. The lowest layer is a best-effort resource sharing system which provides lightweight task scheduling and execution. Here, best-effort means that in case of a failure, the task execution is dropped and that tasks are allocated to resources randomly. To provide execution guarantees such as a reliable or timely execution, we add a Quality of Computation (QoC) layer on top of the best-effort execution layer. The QoC layer enforces the guarantees for applications by using a context-aware task scheduler which monitors the available resources in the computing environment and performs the matchmaking between resources and tasks based on the current state of the system. As edge resources are controlled by individuals, we consider the fact that these users need to be able to decide with whom they want to share their resources and for which price. Thus, we add a social layer on top of the system that allows users to establish friendship connections which can then be leveraged for social-aware task allocation and accounting of shared computation
    corecore