Experimental research aims to determine cause-and-effect relationships by manipulating an independent variable and observing its impact on a dependent variable. Key characteristics include comparing groups, one receiving a treatment and one not; manipulating the independent variable; and random assignment to control for extraneous variables. True experiments use random assignment, while quasi-experiments employ other techniques like matching. Various experimental designs differ in their ability to control threats to internal validity like history, maturation, testing, instrumentation, regression, selection, mortality, and interaction effects. Factorial designs allow investigation of interactions between variables.
By the end of this presentation you should be able to:
Describe the justification of qualitative Sampling Techniques
Understand different types of Sampling Techniques
Experimental Research Design - Meaning, Characteristics and ClassificationSundar B N
This ppt contains Experimental Research Design Which covers Meaning, Characteristics and Classification of Experimental Research Design.
Subscribe to Vision Academy
https://www.youtube.com/channel/UCjzpit_cXjdnzER_165mIiw
By the end of this presentation you should be able to:
Describe the justification of qualitative Sampling Techniques
Understand different types of Sampling Techniques
Experimental Research Design - Meaning, Characteristics and ClassificationSundar B N
This ppt contains Experimental Research Design Which covers Meaning, Characteristics and Classification of Experimental Research Design.
Subscribe to Vision Academy
https://www.youtube.com/channel/UCjzpit_cXjdnzER_165mIiw
Slides of the lecturer given by me on 30-03-2015 at Seminar Library, Department of Psychology, University of Sindh, Pakistan; as part of the Research Methods in Psychology Course.
Quantitative Research: Surveys and ExperimentsMartin Kretzer
- Example lecture of the course "Methods and Theories in Information Systems"
- Target group: students who want to get an impression of the course before joining it
This presentation is for educational purpose only. I do not own the rights to written material or pictures or illustrations used.
This is being uploaded for students who are in search of, or trying to understand how a quasi-experimental research design should look like.
An experimental research design helps researchers execute their research objectives with more clarity and transparency.Experimental research design is a framework of protocols and procedures created to conduct experimental research with a scientific approach using two sets of variables.The best example of experimental research methods is quantitative research.
Experimental research helps a researcher gather the necessary data for making better research decisions and determining the facts of a research study.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
3. Uniqueness of Experimental Research
• Experimental Research is unique in two important
respects:
1) Only type of research that attempts to influence a
particular variable
2) Best type of research for testing hypotheses about cause-
and-effect relationships
• Experimental Research looks at the following
variables:
• Independent variable (treatment)
• Dependent variable (outcome)
4. Major Characteristics of
Experimental Research
• The researcher manipulates the independent
variable.
• They decide the nature and the extent of the
treatment.
• After the treatment has been administered,
researchers observe or measure the groups
receiving the treatments to see if they differ.
• Experimental research enables researchers
to go beyond description and prediction, and
attempt to determine what caused effects.
5. Essential Characteristics of
Experimental Research
Comparison of Groups:
• The experimental group receives a treatment of
some sort while the control group receives no
treatment.
• Enables the researcher to determine whether the
treatment has had an effect or whether one
treatment is more effective than another.
Manipulation of the Independent Variable:
• The researcher deliberately and directly determines
what forms the independent variable will take and
which group will get which form.
6. Essential Characteristics of
Experimental Research
Randomization
• Random assignment is similar but not identical to random
selection.
• Random assignment means that every individual who is
participating in the experiment has an equal chance of
being assigned to any of the experimental or control
groups.
• Random selection means that every member of a
population has an equal chance of being selected to be a
member of the sample.
• Three things occur with random assignments of subjects:
1) It takes place before the experiment begins
2) Process of assigning the groups takes place
3) Groups should be equivalent
7. Control of Extraneous Variables
• The researcher has the ability to control many
aspects of an experiment.
• It is the responsibility of the researcher to control for
possible threats to internal validity.
• This is done by ensuring that all subject
characteristics that might affect the study are
controlled.
8. Most Common Ways to
Eliminate Threats
• Randomization
• Hold certain variables constant
• Build the variable into the design
• Matching
• Use subjects as their own control
• Analysis of Covariance (ANCOVA)
9. Poor Experimental Designs
• The following designs are considered weak since they do
not have built-in controls for threats to internal validity
– The One-Shot Case Study
• A single group is exposed to a treatment and its effects are assessed
– The One-Group-Pretest-Posttest Design
• Single group is measured both before and after a treatment exposure
– The Static-Group Comparison Design
• Two intact groups receive two different treatments
10. The One-Shot Case Study
A single measure is recorded after the
treatment in administered.
Study lacks any comparison or control of
extraneous influences.
To remedy this design, a comparison could
be made with another group.
Diagrammed as:
11. The One-Group Pretest-Posttest
Design
Subjects are measured before and after
treatment is administered.
Uncontrolled-for threats to internal validity
exist.
To remedy this design, a comparison group
could be added.
Diagrammed as:
12. The Static-Group Comparison Design
Use of 2 existing, or intact groups.
Experimental group is measured after being
exposed to treatment.
Control group is measured without having
been exposed to the treatment.
Diagrammed as:
13. The Static-Group Pretest-Posttest
Design
Pretest is given to both groups.
“Gain” or “change” = pretest score - posttest
score.
Better control of subject characteristics
threat.
A pretest raises the possibility of a testing
threat.
14. True Experimental Designs
• The essential ingredient of a true experiment is random
assignment of subjects to treatment groups
• Random assignments is a powerful tool for controlling
threats to internal validity
– The Randomized Posttest-only Control Group Design
• Both groups receiving different treatments
– The Randomized Pretest-Posttest Control Group Design
• Pretest is included in this design
– The Randomized Solomon Four-Group Design
• Four groups used, with two pre-tested and two not pre-tested
15. The Randomized Posttest-Only
Control Group Design
Experimental group tested after treatment
exposure.
Control group tested at the same time
without exposure to experimental
treatment.
Includes random assignment to groups.
Threats to internal validity –
mortality, attitudinal, implementation, data
collector bias, location and history.
16. Example of a Randomized Posttest-
Only Control Group Design
17. The Randomized Pretest-Posttest
Control Group Design
Experimental group tested before and after
treatment exposure.
Control group tested at same two times
without exposure to experimental
treatment.
Includes random assignment to groups.
Pretest raises the possibility of a pretest
treatment interaction threat.
18. Example of a Randomized Pretest-
Posttest Control Group Design
19. The Randomized Solomon Four-
Group Design
Combines pretest-posttest with control
group design and the posttest-only with
control group design.
Provides means of controlling the interactive
test effect and other sources of extraneous
variation.
Does include random assignment.
Weakness: requires a large sample.
20. Example of a Randomized Solomon
Four-Group Design
21. Random Assignment with Matching
• To increase the likelihood that groups of
subjects will be equivalent, pairs of subjects
may be matched on certain variables.
• Members of matched groups are then
assigned to experimental or control groups.
• Matching can be mechanical or statistical.
22. Mechanical and Statistical Matching
• Mechanical matching is a process of pairing two
persons whose scores on a particular variable are
similar.
• Statistical matching does not necessitate a loss of
subjects, nor does it limit the number of matching
variables.
– Each subject is given a “predicted” score on the dependent
variable, based on the correlation between the dependent
variable and the variable on which the subjects are being
matched.
– The difference between the predicted and actual scores
for each individual is then used to compare experimental
and control groups.
24. Quasi-Experimental Designs
• Do not include the use of random assignments
but use other techniques to control for threats
to internal validity:
– The Matching-Only Design
• Similar except that no random assignment occurs
– Counterbalanced Design
• All groups are exposed to all treatments but in a different order
– Time-Series Design
• Involves repeated measures over time, both before and after
treatment
25. The Matching-Only Design
Random assignment is not used.
An alternative to random assignment of
subjects but never a substitute for random
assignment.
26. Counterbalanced Designs
Each group is exposed to all treatments but in a
different order.
The effectiveness of the various treatment can
be determined by comparing the average score
for all groups on the posttest for each
treatment.
e.g. Results (Means) from a Study Using a
Counterbalanced Design.
27. Time-Series Design
Involves periodic measurements on the
dependent variable for a group of test units.
After multiple measurements, experimental
treatment is administered (or occurs naturally).
After the treatment, periodic measurements are
continued in order to determine the treatment
effect.
The threats to internal validity –
history, instrumentation, and testing.
Infrequently used due to extensive amount of
data collection.
29. Factorial Designs
• Factorial Designs extend the number of relationships that may
be examined in an experimental study.
• They are modifications of either the posttest-only control
group or pretest-posttest control group designs which permit
the investigation of additional independent variables.
• They also allow a researcher to study the interaction of an
independent variable with one or more other variables
(moderator variable).
30. Using a Factorial Design to Study
Effects of Method and Class Size on
Achievement
33. Controlling Threats to Internal Validity
• Subject Characteristics • Testing
• Mortality • History
• Location • Maturation
• Instrument decay • Attitudinal
• Data Collector Characteristics • Regression
• Data Collector bias • Implementation
The above must be controlled to reduce threats to internal validity
34. Effectiveness of Experimental Designs in Controlling Threats to Internal Validity
KEY: (++) = strong control, threat unlikely to occur; (+) = some control, threat may possibly occur;
(–) = weak control, threat likely to occur; (?) = can’t determine; (NA) = threat does not apply
Subject Instru- Data Collec-
Charac- Morta- Loca- ment tor Charac- Data Col- Matur- Atti- Regres- Implemen-
Design teristics lity tion Decay teristics lector Bias Testing History ation tudinal sion tation
One-shot case
study – – – (NA) – – (NA) – – – – –
One group pre-
posttest – ? – – – – – – – – – –
Static group
comparison – – – + – – + ? + – – –
Randomized post-
test-only control
group ++ + – + – – ++ + ++ – ++ –
Randomized pre-
post-test control
group ++ + – + – – + + ++ – ++ –
Solomon four-
group ++ ++ – + – – ++ + ++ – ++ –
Randomized
posttest only
control group
with matched
subjects ++ + – + – – ++ + ++ – ++ –
Matching-only
pre-posttest
control group + + – + – – + + + – + –
Counterbalanced ++ ++ – + – – – ++ ++ ++ ++ –
Time-series ++ – + _ – – – – + – ++ –
Factorial with
randomization ++ ++ – ++ – – + + ++ – ++ –
Factorial without
randomization ? ? – ++ – – + + + – ? –
35. Evaluating the Likelihood of a
Threat to Internal Validity
Procedures in assessing the likelihood of a threat
to internal validity –
Step 1: Ask: What specific factors either are known to
affect the dependent variable or may logically be
expected to affect this variable?
Step 2: Ask: What is the likelihood of the comparison
groups differing on each of these factors?
Step 3: Evaluate the threats on the basis of how likely
they are to have an effect, and plan to control for
them.
Uniqueness in terms in which researchers managed to manipulate variable and able to test theory and effectiveness of treatment based on the outcome.Independent variable a.k.a. experimental or treatment variable (e.g. methods of instruction, types of assignment, learning materials rewards given to students and types of questions asked by teacher)Dependent variable a.k.a. criterion or outcome variable (e.g. achievement, interest in a subject, attention span, motivation and attitudes toward school)Enables researchers to go beyond description and prediction, beyond the identification of relationships, to at least a partial determination of what causes them.
Experimental research = try something and systematically observe what happens.Two basic conditions of formal experiments – 1st, at least 2 (or more) conditions or methods are compared to assess the effect of treatments (independent variable). 2nd, independent variable directly manipulated by researcher.
Experimental group receives a treatment.Control/comparison group receives no/different treatment. Become yardstick to determine whether the treatment is effective/not.Researcher actively manipulates a treatment (independent variable) – deliberately & directly determines what forms (treatment) and which group will get.Independent variables that can be manipulated – teaching method, type of counseling, learning activities, etc.Independent variables may be established in several ways – (i) one variable vs. another, (ii) presence vs. absence, (iii) varying degrees of the same form.
Intended to eliminate the threat of extraneous or additional variables.Ensures that groups formed are equivalent at the beginning of an experiment.No guarantee of equivalent groups unless both groups (experimental & control) are sufficiently large.
Researchers exercise far more control – determine treatment, select sample, assign individuals to group, decide treatment to group, control factors beside treatment that may influence result, observe or measure the effect of the treatment.Researchers need to do their best to control (eliminate/minimize) the possible effect of the threat.e.g. effect of 2 different methods of instruction on students attitudes towards history but did not make sure that the groups involved were equivalent in ability.
Random assigned enable researchers to assume that the group are equivalent. (one of the uniqueness + characteristics of experimental research).Eliminate possible effects of a variable by removing it from the study (e.g. gender might influence outcome, restrict it).Involve the variable and analyze the effect of it on the outcome (e.g. effects of both gender and method)Matched be made on certain variables of interest (e.g. age affect the outcome, match according to age and randomly assign to comparison group).Subject = students (e.g. assessment of behavior before and after treatment to see whether changes occur)Equate groups statistically based on pretest or other variables.
Poor as these designs has difficulty assessing the effectiveness of the independent variable (treatment).
One group only (experimental group) that received treatment. No control/comparison group = to effectiveness cannot be measured.No pretest, researcher knows nothing about the subject before treatment thus does not know whether it is effective or not.
Pretest exist, so does nine uncontrolled-for threats (history, maturation, instrument decay, data collector characteristics, data collector bias, testing, statistical regression, attitude of subjects & implementation.Researcher would not know if any differences between pretest and posttest due to treatment given/threats.
a.k.a. nonequivalent control group designSubjects are being formed but not randomly assigned.Diagrammed shows better control (history, maturation, testing & regression) but still not a good design as the possibility of other threats (mortality, location & subject characteristics) occur.
? Better control = changed being analyzed but still remain a threat as it depends on initial performance (pretest improve or less).
? True=random assignment to treatment (independent variable) group.Random assignment best tool to control threat to internal validity.
Two groups – experimental and control/comparison group which is formed by random assignment.There are still threats but can sometimes be controlled by appropriate modifications.Important to keep clear distinction between random selection and random assignment.Random selection is intended to provide a representative sample.Random assignment is intended to equate groups and often is not accompanying by random selection.
X1 represents exposure to treatment (independent variable).O refers to the measurement of the dependent variable (outcome).R represents random assignment of individual to groups.X2 represents control group.
Differs from the previous design solely in the use of a pretest.However, pretest may alert members of the experimental group thereby causing them to do better (or poorly).
Attempt to eliminate the possible threat of a pretest.2 groups being pretested but 2 not.One pretested group, one un-pretested groups is exposed to experimental treatment.All are post-tested.Requires a considerable amount of energy and effort.
Variables can be based on previous research, theory and/or the experience of the researcher.
Mechanical = process of pairing two persons whose scores on a particular variable are similar.2 problems in mechanical matching: (1) difficult to match on more than 2 or 3 variables, (2) inevitable that some subjects must be eliminated from the study because no “matches” for them can be found.Statistical = subject is given a “predicted” score on the dependent variable, based on the correlation between the dependent variable (outcome) and the variable/(s) on which the subjects are being matched. The difference between the predicted and actual scores for each individual is then used to compare experimental and control groups.When pretest is used as the matching variable, the difference between the predicted and actual score called a regressed gain score.Gain scores (post-test minus pretest score)Mechanical vs. Statistical = one member of each matched pair is randomly assigned to the experimental group, the other to control group vs. sample is divided randomly at the outset, and the statistical adjustments are made after all data have been collected.
Do not rely on random assignment but other techniques to control/at least reduce threats to internal validity.
Researcher matches the subjects in the experimental & control groups on certain variables but had no assurance whether they are equivalent on others.Reason: even though matched, subjects already are in intact groups.The correlation between matching and dependent variable should be fairly substantial.
Another technique for equating experimental & comparison groups.Method X is superior for both groups