Search results for "RAMS"

showing 10 items of 444 documents

MAD+. Introducing Misconceptions in the Temporal Analysis of the Mathematical Modelling Process of a Fermi Problem

2021

This work describes how the combination of the mistakes committed by a group of pre-service teachers when solving a Fermi problem, with the representation of the temporal analysis of their resolutions, can offer more in-depth information about their conceptual misconceptions regarding mathematical and modelling concepts. The combined representation allows knowing when mistakes occur and provides a powerful tool for instructors to adapt the teaching–learning processes of mathematics at all levels of education. Our study is based on a recent categorisation of students’ mistakes, together with the creation of a new representation tool, called MAD+, that can combine all this information. The ma…

Theoretical computer sciencePublic AdministrationestimationGroup (mathematics)Computer scienceProcess (engineering)Physical Therapy Sports Therapy and RehabilitationContext (language use)Resolution (logic)mathematics educationLMatemàtica EnsenyamentComputer Science ApplicationsEducationsymbols.namesakeFermi problemsDevelopmental and Educational PsychologyComputer Science (miscellaneous)symbolsFermi problemmodelling activity diagramsmathematical modellingRepresentation (mathematics)Education Sciences
researchProduct

A Supplementary Text to “Contextuality in Canonical Systems of Random Variables” by Ehtibar N. Dzhafarov, Víctor H. Cervantes, and Janne V. Kujala (P…

2017

Mathematical Proofs

TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESTheoryofComputation_LOGICSANDMEANINGSOFPROGRAMSMathematicsofComputing_GENERAL
researchProduct

A generalized transitive closure for relational queries

1988

We augment relational algebra with a generalized transitive closure operator that allows for the efficient evaluation of a subclass of recursive queries. The operator is based on a composition operator which is as general as possible when the operator is required to be associative and when only relational algebra operators are used in its definition. The closure of such a composition can be computed using the well-known efficient algorithms designed for the computation of the usual transitive closure. Besides the case in which complete materialization of recursive relations are required, our strategy also yields an efficient solution in the case in which a selection is applied to the closur…

Transitive relationSelection (relational algebra)Closure (topology)Transitive closure020207 software engineering02 engineering and technologyTransitive setRelational algebraTransitive reductionAlgebraTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESOperator (computer programming)TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS020204 information systems0202 electrical engineering electronic engineering information engineeringMathematicsProceedings of the seventh ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems - PODS '88
researchProduct

La Convención de Palermo (UNTOC) y la responsabilidad derivada de delitos de las personas jurídicas: itinerarios e intersecciones del ordenamiento it…

2022

Both the United Nations Convention against Transnational Organised Crime (UNTOC: signed in December 2000 in Palermo) and the Delegation Law no. 300/2000, with its corresponding Legislative Decree no. 231/2001, which jointly introduced in Italy the liability arising from crime for collective entities, mark two "paradigm shifts" for the criminal system. The contribution focuses on the overall value of the two legislative innovations examined in the evolution of criminal law, respectively at the international level and in the Italian context. The interest in analysing their respective contributions is further stimulated by the observation that the two areas, although autonomous, present a sign…

Transnational Organised Crime Corporate criminal liability Compliance programs
researchProduct

Differences in treatment adherence, program completion, and recidivism among batterer subtypes

2017

Abstract The present study aimed to cross-validate Holtzworth-Munroe and Stuart's typology in a Spanish sample of court-referred intimate partner violence batterers. The study also analyzed the typology's capability to predict treatment attendance, completion, and IPV recidivism two years after the treatment. The sample consisted of 210 batterers court referred to a batterer intervention program. Using cluster analysis, three batterer subtypes were identified in accordance with the original typology: family-only batterers, borderline/dysphoric, and generally violent-antisocial. The typology predicted program attendance, completion, and recidivism. Batterers from the generally violent-antiso…

TypologyPsychotherapistPerpetratorslcsh:BF1-990Poison controlSuicide preventionBatterer intervention programsInjury prevention0501 psychology and cognitive scienceslcsh:K5000-5582TypologiesApplied Psychology0505 lawRecidivism05 social sciencesAttendancefood and beveragesHuman factors and ergonomicsIntimate partner violencelcsh:Psychology050501 criminologylcsh:Criminal law and procedureDomestic violencePsychologyLaw050104 developmental & child psychologyClinical psychologyThe European Journal of Psychology Applied to Legal Context
researchProduct

Norskfaget i endring : en sammenlikning av L97 og kunnskapsløftet

2006

Masteroppgave i Nordisk språk og litteratur 2006 - Høgskolen i Agder, Kristiansand Oppgaven er bygd opp slik at jeg først gir en kort innføring i L97 og Kunnskapsløftet i innledningskapitlet, og etter det følger det et kapittel om teori og metode. Siden det er vanskelig å skille disse to, velger jeg å skrive om dem sammen. Etter dette kommer et kapittel om læreplaner i historisk perspektiv. Dette har jeg skrevet for å avdekke hvor Kunnskapsløftet plasserer seg i en eksisterende læreplantradisjon. Gjennom det kan jeg undersøke hvor det er mulig å trekke paralleller mellom L97, Kunnskapsløftet og tidligere læreplaner. Pendelen svinger fra epoke til epoke, og muligheten er der jo for at ting f…

VDP::Humaniora: 0::Språkvitenskapelige fag: 10::Nordiske språk: 18NO500NorskfagetHistorisk framstillingStudieplan
researchProduct

Apvienotā Eiropas Tora vakuumkameras volframa materiālu oksidēšanās dažādās vidēs

2020

Bakalaura darbā apkopota informācija par termisko kodolsintēzi, tokamakiem un to potenciālajiem negadījumiem – dzesēšanas un vakuuma zudumu –, divertora materiālu – volframu –, tā oksīdiem un oksidēšanās procesiem atkarībā no temperatūras, kā arī volframa un tā oksīdu reakcijām ar ūdeni. Volframa oksidēšanās procesu izpētei izmantota pulvera rentgendifraktometrijas, termiskās analīzes un elektronu mikroskopijas metode, lai raksturotu volframa struktūru, virsmas morfoloģiju un novērtētu mitruma ietekmi uz volframa oksidēšanos. Eksperimentālajā daļā veikta volframa paraugu karsēšana no istabas temperatūras līdz 1000°C sausā un mitrā sintētiskā gaisa plūsmā. Ar termogravimetrijas metodi noteik…

VOLFRAMSKARSĒŠANAWO3OKSIDĒŠANĀSMITRS UN SAUSS GAISSĶīmija
researchProduct

How should vaccination services be planned, organized, and managed? Results from a survey on the Italian vaccination services

2019

Background. Quality improvement is an increasingly recognized approach to maximize service effectiveness and minimize costs in public health. However, the Italian law never provided for the institutional accreditation of vaccination services. Furthermore, a recently approved law added six more compulsory vaccinations to the original four, which has led to a considerable increase in vaccination efforts, without any previous resources evaluation. The aim of the study was to investigate structural, organizational and managerial characteristics of the Italian vaccination services, in order to suggest the adoption of adequate quality standards. Study design. A survey involving the representative…

Vaccine coverageImmunization ProgramsImmunization ProgramPerformanceInfant NewbornInfantMandatory ProgramMandatory ProgramsQuality ImprovementStandardManagementVaccination serviceItalyHealth Care SurveyHealth Care SurveysHumansImmunization ScheduleManagement; Performance; Quality assessment; Standard; Vaccination service; Vaccine coverageHumanQuality assessmentAged
researchProduct

Perceptual Processing and the Comprehension of Relational Information in Dynamic Diagrams

2018

International audience; To date, research on the processing involved in comprehending and learning from animated diagrams has accorded a minor role only to perceptual operations in general and peripheral processing in particular. For those aspects where the role of perception is acknowledged, it is foveal rather than peripheral processing that is regarded as the main player. In this paper, we use the results from additional finer grained analysis of data collected in a recent empirical study to suggest that information from a viewer’s peripheral field can play a much more central role in animation processing than has previously been recognized. It appears that if the dynamic information com…

Visual perceptionComputer sciencemedia_common.quotation_subject05 social sciences050301 educationAnimation[SCCO] Cognitive science050105 experimental psychologyField (computer science)Comprehension[SCCO]Cognitive scienceEmpirical researchHuman–computer interactionFovealPerception0501 psychology and cognitive sciencesAnimated DiagramsRelation Formation0503 educationPeripheral Processingmedia_common
researchProduct

Anomaly Detection from Network Logs Using Diffusion Maps

2011

The goal of this study is to detect anomalous queries from network logs using a dimensionality reduction framework. The fequencies of 2-grams in queries are extracted to a feature matrix. Dimensionality reduction is done by applying diffusion maps. The method is adaptive and thus does not need training before analysis. We tested the method with data that includes normal and intrusive traffic to a web server. This approach finds all intrusions in the dataset. peerReviewed

Web serverComputer scienceintrusion detectionDimensionality reductionFeature matrixDiffusion mapdiffusion maphyökkäyksen havaitseminenIntrusion detection systemcomputer.software_genreanomaly detectionpoikkeavuuden havaitseminendiffuusiokarttakoneoppiminenAnomaly detectionData miningtiedonlouhintan-grammitcomputern-grams
researchProduct