...evaluating the consequences of each choice. Tradeoffs If you got this far without a solution, it’s probably because your decision is really tricky. It also means that it has conflicting objectives — and that you’ll need to consider some hard tradeoffs between them. Week 3 Data Quality Issues When transferring data from one program to another (ie from Excel to Access), you need to consider the following: * Uniformity (data has transferred in the same manner for all records in a file). * Version (ensure format of original data and variables has not changed when data was transformed). * Completeness check (all records are transferred in the file). * Conformity check (does data look right?). * Spot check (trace some records back to their source file eg. 10 random records to see they have transferred correctly). Cleaning Data One of first and most important steps in data analysis is to verify that your data values are correct, or conform to a set of rules. * For example a variable called Gender would be expected to have only 2 values (M or F). * You need to consider the variables and their values firstly to see they are appropriate for the data they contain. * MS Access and SAS have a number of ways you can use to check for...
Words: 3223 - Pages: 13
...An Analysis for Thermal Management of Lithium-Ion Powered Battery for Electrical Automobile Table of Contents 1.0 Introduction 2.1 Motivation of Developing Electrical Automobile 2.2 Thermal Issues of Powered Battery 2.3 Application of Thermal Management 2.0 Comparative Analysis of Conventional and PCMs Thermal Management 3.4 Conventional air or liquid based Thermal Management 3.5 PCMs Thermal Management 3.6 Effectiveness comparison 3.7 Cost efficiency comparison 3.0 Background Information on PCMs 4.8 Description of Organic and Non-organic PCMs 4.9 Standard of Selecting PCMs for Thermal Management 4.10 The chemical and thermal characteristics of paraffin wax (Organic) 4.11 The chemical and thermal characteristics of stearic acid (Non-organic) 4.0 Thermal Conductivity Improvement of PCMs Using Expanded Graphite (EG) 5.12 Microstructures of Composite PCMs 5.13 Thermal Characteristic of Composite PCMs 5.14.1 Paraffin Wax with EG composite 5.14.2 Stearic Acid with EG Composite 5.14 Comparison on Thermal Storage Performance of paraffin/EG with stearic acid/EG 5.0 Conclusion and Recommendation 6.0 Bibliography Table of Figures Figure 1 - Power Battery Pack Figure 2 – Thermal Management Using Air Figure 3 – Thermal Management Using Liquid Figure 4 – Thermal Management Using PCM Figure 5 - Thermophysical Properties of PCMs Figure...
Words: 6831 - Pages: 28
...effectiveness in form of clicks, link sharing, page views * Descriptive Analytics Tools -> Google Analytics, Optimizely Diagnostic Analytics: * Post Event Analytics * Analytics used to diagnose why something/phenomenon happened the way it did * It basically provides a very good understanding of a limited piece of the problem you want to solve. * Usually less than 10% of companies surveyed do this on occasion and less than 5% do so consistently. Predictive Analytics: * Used for Prediction of Phenomenon using past and current data statistics * Essentially, you can predict what will happen if you keep things as they are. * However, less than 1% of companies surveyed have tried this yet. The ones who have, found incredible results that have already made a big difference in their business. * Eg:- SAS, RapidMiner, Statistica Prescriptive Analytics: * Prescriptive analytics automatically synthesizes big data, multiple disciplines of mathematical sciences and computational sciences, and business rules, to make predictions and then suggests decision options to take advantage of the predictions. * It is considered final phase of Analytics Some Analytics Techniques used Linear Regression In statistics, linear regression is an approach for modeling the relationship between a scalar dependent variable y and one or more explanatory variables (or independent variable) denoted X. The case of one explanatory variable is called simple linear...
Words: 1288 - Pages: 6
...Cryobiology of Rat Embryos I: Determination of Zygote Membrane Permeability Coefficients for Water and Cryoprotectants, Their Activation Energies, and the Development of Improved Cryopreservation Methods During the 1nd Semester 2012-2013 A Research Paper Presented to Mr. Luis Gallardo Mago In partial fulfillment Of the requirements in Nat. Sci. Subject By: Table of contents Abstract Materials and methods Results Discussion References Figures Tables Abstract Cryobiology of Rat Embryos I: Determination of Zygote Membrane Permeability Coefficients for Water and Cryoprotectants, Their Activation Energies, and the Development of Improved Cryopreservation Methods. Reinhold T. Pfaffa,b, Yuksel Agcaa,b, Jun Liua, Erik J. Woodsa, Augustine T. Peterb and John K. Critser2,,a,b a Cryobiology Research Institute, Herman B Wells Center for Pediatric Research, Department of Pediatrics, Indiana University School of Medicine, Indianapolis, Indiana 46202 Department of Veterinary Clinical Sciences, b School of Veterinary Medicine, Purdue University, West Lafayette, Indiana 47907 New rat models are being developed at an exponential rate, making improved methods to cryopreserve rat embryos extremely important. However, cryopreservation of rat embryos has proven to be difficult and expensive. In this study, a series of experiments was performed to characterize the fundamental cryobiology of rat fertilized 1-cell embryos (zygotes)...
Words: 7434 - Pages: 30
...Bronx, New York (Cunningham); Department of Health Policy and Management, the Johns Hopkins Bloomberg School of Public Health, Baltimore, Maryland (Barry) Abstract Author Manuscript IMPORTANCE—Opioid analgesic overdose mortality continues to rise in the United States, driven by increases in prescribing for chronic pain. Because chronic pain is a major indication for medical cannabis, laws that establish access to medical cannabis may change overdose mortality related to opioid analgesics in states that have enacted them. OBJECTIVE—To determine the association between the presence of state medical cannabis laws and opioid analgesic overdose mortality. DESIGN, SETTING, AND PARTICIPANTS—A time-series analysis was conducted of medical cannabis laws and state-level death certificate data in the United States from 1999 to 2010; all 50 states...
Words: 5146 - Pages: 21
...Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. SSL Man-in-the-Middle Attacks TCP/IP protocols have long been subject to man-in-the-middle (MITM) attacks, but the advent of SSL/TLS was supposed to mitigate that risk for web transactions by providing endpoint authentication and encryption. The advent of Dug Song's 'webmitm' in late 2000 demonstrated the feasibility of mounting an MITM attack on the protocol, but a properlyconfigured client SSL implementation would warn the user about problems with the server certificate. This paper examines the mechanics of the SSL protocol attack, then focuses o... Copyright SANS Institute Author Retains Full Rights AD SSL Man-in-the-Middle Attacks Peter Burkholder February 1, 2002 (v2.0) Abstract TCP/IP protocols have long been subject to man-in-the-middle (MITM) attacks, but the advent of SSL/TLS was supposed to mitigate that risk for web transactions by providing endpoint authentication and encryption. The advent of Dug Song's 'webmitm' in late 2000 demonstrated the feasibility of mounting an MITM attack on the protocol, but a properlyKey fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 configured client SSL implementation would warn the user about problems with the server certificate. This paper examines the mechanics of the SSL protocol attack, then focusses...
Words: 6154 - Pages: 25
...guide 1 – a CIPD guide for personnel professionals to help them identify, collate, analyse and communicate data on human capital Written by Jim Matthewman and Floriane Matignon of Mercer Human Resource Consulting Acknowledgements The document draws on the perspectives, experience and measurement methods set out in the recent book by Haig R. Nalbantian, Richard A. Guzzo, Dave Kieffer and Jay Doherty, Play to Your Strengths: Managing your internal labour markets for lasting competitive advantage (New York: McGraw Hill, 2004). We are grateful to members of the CIPD Human Capital Working Party who provided input and advice: Greg Aitken, Head of Employee Research and Measurement, Royal Bank of Scotland Group Ron Collard, Partner, PricewaterhouseCoopers Andrew Mayo, Director, Mayo Learning International Tim Miller, Group Head of Human Resources, Standard Chartered Bank Tony Palmer, Head of the Marple Partnership Vicky Wright, Partner, Human Capital, Ernst & Young Human capital reporting Human capital reporting: an internal perspective 3 Human capital reprting Contents Preface 4 Introduction 6 Step 1 – Setting human capital management in context 10 Step 2 – Getting started: gathering and collating the data 21 Step 3 – Measuring human capital: tools and methodologies 27 Step 4 – Reporting the data: from internal to external reporting 34 Step 5 – Developing a route map to human capital reporting 40 ...
Words: 19595 - Pages: 79
...that acts to the event within a specified time period. A real time system depicts those systems which have to perform certain calculation within specific time period, delayed results may be considered wrong. In 2001, Shaw explained that real time systems have a very limited time constraints which are defined by the systems requirements, which reflects the aspects of outer world. Real time systems are now become important part of this modern age, safety and privacy issues and performance of such systems have also been raised .In 2000 Halang and Druzovec explained that performance in real time system depends on higher bandwidth, faster response and faster computation power. A real time systems state is dependent on a function of physical time eg; a chemical reaction continues to change its state from one state to another even after the supervising computer system is stopped. This real time system can easily be decomposed into a set of subsystems i.e. human operator, controlled object, real time computer system. A real time system must react to the stimuli with the help of the controlled object within specific time period. Typical examples of real time systems include multimedia applications, command control systems, air traffic control systems, space systems, embedded automotive electronics etc. Real time systems are classified into two categories:- * Factors outside the computer system * Factors inside the computer system Characteristics of Real time systems:- Real time...
Words: 3481 - Pages: 14
...test the Maximo upgrade from the current version of Maximo 4.01 to version 6 ensuring full data integrity and accuracy. • The POC must ensure that the Maximo software is fully operational within the Illovo architecture and environment i.e. the POC must test co-existence with all other Illovo software products and hardware. • The POC must also ensure that all re-worked existing application interfaces are fully operational on the upgraded version. • The following new requirements must be met: - Provision of a scheduling tool and full integration with MS project - Fully operational new interfaces as defined in the Functional Specification • All existing application customisations must be re-applied and must be fully functional • Reports as defined in the functional specification must be fully functional • The POC must also result in a standard migration path being documented to ensure a smooth rollout and implementation process. • To select/Replace the thin client (NCD 200) with new models that meet business requirements (Group replacement) • To select and install hardware for the Maximo Application/Report server (Maximo & Kronos Sites only) • The architecture selected must cater for SA and African Maximo hardware requirements. APPLICATION POC OBJECTIVES • To migrate all current Maximo transactional data from version 4.01 to the new release version 6 and to document an appropriate migration path...
Words: 4365 - Pages: 18
...Strategy Formation in Former South African Firms' London Headquarters and in Their South African Your title should be not more than 16 words, must include “South Africa” and/or other relevant countries and should not refer to the methodology (eg A case study of . . .”). Don’t start each word with a capital letter – use ordinary sentence case and only capitalise proper nouns. Operations Sxxxx Cxxxxx Student number: 1234567 Tel: 089 555 5555 Student.wbs@hotmail.com A research proposal submitted by Proposed Supervisor: Dr Txxxx Mxxxxx Your proposal is the plan of your research. You must NOT do any actual research, eg interviews, before the panel. Wits Business School 2nd March 2009 The final Research Report resulting from this proposal was 116 pages long, including references and appendices, excluding the beginning section – dedication, declaration, Table of Contents, etc (see Research Report template at www.wbs.ac.za). This is just about exactly the length expected. TABLE OF CONTENTS LIST OF TABLES .............................................................................. LIST OF FIGURES ............................................................................III 1 1.1 1.2 1.3 INTRODUCTION........................................................................1 PURPOSE OF THE STUDY ................................................................................ 1 CONTEXT OF THE STUDY.................................................................
Words: 8300 - Pages: 34
...RESEAR CH AR TICLE Psychosocial Distress and Alcohol Use as Factors in Adolescent Sexual Behavior Among Sub-Saharan African Adolescents RANDY M. PAGE, PhDa COUGAR P. HALL, PhDb ABSTRACT BACKGROUND: This study examines the relationship between sexual behavior, alcohol use, and indicators of psychosocial distress (mental health) of adolescents in 6 sub-Saharan African countries using the Global School-based Student Health Survey (GSHS). METHODS: The sample consisted of 22,949 adolescents from Botswana, Kenya, Namibia, Uganda, Zambia, and Zimbabwe who participated in 2003 or 2004 GSHS surveys. Statistical analysis was conducted to determine whether sexual behaviors increased with levels of psychosocial distress and alcohol use. RESULTS: Sexual behaviors (having sex or having sex with 2 or more people) were associated with both psychosocial distress and alcohol use. Odds ratios showed that both boys and girls reporting psychosocial distress and alcohol use were at higher risk for having sex. Results also indicated that the likelihood of sexual behaviors increased when there was an increase in the number of psychosocial indicators and frequency of alcohol consumption. CONCLUSION: The results of this study are consistent with those conducted in the United States suggesting that sexual behavior, psychosocial distress, and substance use are interconnected. These findings highlight the need for school health education and health services in sub-Saharan Africa...
Words: 9184 - Pages: 37
...Course Syllabus RES/341 RESEARCH AND EVALUATION I Welcome to RES/341, let’s do everything we can to ensure that the next six weeks will be an enlightening and enjoyable learning experience for all of us. Please print a copy of this syllabus for handy reference. Whenever there is a question about what assignments are due, this syllabus is considered the ruling document. Classroom Management Policies Breaks in the On Campus classes will be when deemed necessary. Please leave the classroom clean. Phones: Turn them off or keep them in silent mode. ***DO NOT answer the phone in the classroom. Laptop/notebook computers: If I determine the use of a laptop during class time is disruptive behavior that hinders or interferes with the educational process, you will be required to turn it off. Technical Support Technical Support is available 24 hours a day, 365 days a year. Call 1-877-832-4867, or use the e-mail support form. For answers to the most common issues, go to “Knowledge Base” by clicking Help, found at the top of every student Web site. Course Description See eCampus. Course Topics & Objectives See eCampus. Course Materials See eCampus. Participation In an intensive, collaborative learning environment such as that of University of Phoenix, class attendance is perhaps the most obvious and objective starting point as a measure for participation. If you are not in attendance, you miss out on many opportunities for learning. Consequently, if you...
Words: 3437 - Pages: 14
...APA 6th edition REFERENCING GUIDE Library January 2014 Foreword This guide is designed to give a clear understanding of the accepted format for the acknowledgement of sources of information in accordance with the Publication Manual of the American Psychological Association (6th ed.). Please read through the guide carefully and follow the recommendations. Any comments or queries can be discussed with your lecturer or library staff. For further reading, copies of both the APA Publication Manual and the Concise Rules of APA Style are available from the Polytechnic West libraries. Further information is also available from the APA style website at http://apastyle.org This document is open to continuous improvement. We welcome your comments and contribution. Library Polytechnic West Updated January 2014 APA Referencing Guide 6th Ed 2014 UPDATE.docx 2 Contents What is a referencing system? ................................................................................................................. 4 The APA referencing system .................................................................................................................... 4 In-text citations............................................................................................................................................ 5 Layout of in-text citations ......................................................................................................................
Words: 6721 - Pages: 27
...Systematic Review and Meta-Analysis Name Affiliation Date ABSTRACT Objectives: Enlargement of the tracheoesophageal puncture (TEP) is a challenging complication after laryngectomy with TEP. We sought to estimate the rate of enlarged puncture, associated pneumonia rates, potential risk factors, and conservative treatments excluding complete surgical TEP closure. Methods: A systematic review was conducted (1978–2008). A summary risk estimate was calculated using a random-effects meta-analysis model. Results: Twenty-seven peer-reviewed manuscripts were included. The rate of enlarged puncture and/or leakage around the prosthesis was reported in 23 articles (range, 1% to 29%; summary risk estimate, 7.2%; 95% confidence interval [CI], 4.8% to 9.6%). Temporary removal of the prosthesis and TEP- site injections were the most commonly reported conservative treatments. Prosthetic diameter (p =.076) and timing of TEP (p = .297) were analyzed as risk factors; however, radiotherapy variables were inconsistently reported. Conclusions: The overall risk of enlarged puncture seems relatively low, but it remains a rehabilitative challenge. Future research should clearly establish risk factors for enlarged puncture and optimal conservative management. Keywords: tracheoesophageal puncture, total laryngectomy, enlarged tracheoesophageal puncture, complications, leakage Enlarged Tracheoesophageal Puncture after Total Laryngectomy: A Systematic Review and Meta-Analysis Introduction: The gold standard...
Words: 6352 - Pages: 26
...MNUALLL/301/0/2013 Tutorial Letter 101/0/2013 General tutorial letter for proposal, dissertation and thesis writing MNUALLL Year module Department of Health Studies IMPORTANT INFORMATION: This tutorial letter contains important information about your module. Note: Copyright pertaining to Mouton (2006) has been ceded to Unisa CONTENTS Page 1 2 2.1 2.2 2.3 2.3.1 2.4 2.5 2.6 2.7 2.8 3 3.1 3.2 3.3 3.4 3.5 4 4.1 4.2 4.3 4.4 4.5 4.6 5 5.1 5.2 5.2.1 5.2.2 2 WELCOME ................................................................................................................................... 6 SECTION 1: BEING REGISTERED FOR THE RESEARCH PROPOSAL MODULE (RPM) .... 7 Introduction ................................................................................................................................... 7 Application .................................................................................................................................... 7 Registration for Research Proposal Module (RPM) ...................................................................... 7 Registration................................................................................................................................... 8 Appointment of supervisor ............................................................................................................ 8 Guidelines for writing a proposal ...............................................................................................
Words: 30137 - Pages: 121