Question 1
The Uniform Commercial Code incorporates some of the same elements as the Statute of Frauds. Under the Statute of Frauds, certain contracts must be in writing to be enforceable. Research the types of contracts that must be in writing under the Statute of Frauds.
Do you agree with the contracts that need to be in writing and explain why or why not? Imagine that you were asked to be part of a team to draft revisions to the Statute of Frauds. What changes or proposals would you make? Why?
Respond to this… The Statute of Frauds requires that certain types of contracts be in writing to be able to be enforced. These types of contracts include goods that are priced at $500 or more, interest in land, promises to pay off debt, and contracts that cannot be performed within one year, all of which have been signed by the defendant to be enforceable. I do think that all of these contracts should be in writing because it is a type of safeguard of the resource to ensure that each party is responsible for whatever the contract is regarding. For example, if we did not have to sign for a car loan, the responsible party that needs to pay the loan back could walk away, and without a signature of agreement to the terms of the loan, it would be hard for the company to fight for their money, as there is no signature enforcing the agreement.
If I had to revise something with the Statute of Frauds, I would change the contacts that cannot be performed within one year. I think one year is a long time to let a contract slide. I feel that six months sounds more reasonable. I guess if I was a business and I did not get commitment to a contract for a whole year, I feel this would greatly affect my business. I also think it might be a harder fight to get whatever the other party is responsible for as it was a year ago. As a business, I think I would want to pursue a breach of contract in three or four months even. That is a long time to not pay up.
Question 2
Let’s assume that you are interested in doing a statistical survey and you use confidence intervals for your conclusion. Describe a possible scenario and indicate what the population is, and what measure of the population you would try to estimate (proportion or mean) by using a sample.
· What is your estimate of the population size?
· What sample size will you use?
· How will you gather information for your sample?
· What confidence percentage will you use?
Let’s assume that you have completed the survey and now state your results using a confidence interval statement. You can make up the numbers based on a reasonable result.
Respond to this… had found a study in Australia and New Zealand where they wanted to see if there was efficient care when dealing with people that suffered from acute coronary syndrome, that required an understanding of the sources of variation in their care. Basically, they wanted to see if the people that did not speak English well were receiving the same amount of care a ...
5) You are performing an audit of purchases of desktop compute.docxalinainglis
5) You are performing an audit of purchases of desktop computers. Describe the audit procedure(s) you might use to achieve each of the five audit objectives listed below. Be specific. Use slide 3 in the week 5 lecture for the list of possible audit procedures (you may want to also consult PCAOB 15 paragraphs 15-21 as well as other readings in week 5). You will not get credit for a one word answer.
slide 3 in the week 5 lecture
1) PCAOB 15 Audit Evidence
http://pcaobus.org/Standards/Auditing/Pages/Auditing_Standard_15.aspx
1) All of the computers purchased have been recorded in the accounting records.
2) The computers recorded as being purchased actually exist.
3) Depreciation expense has been calculated correctly
4) Laws and regulations regarding software usage have been followed (e.g., no pirated or illegal software is installed).
5) The computers are properly safeguarded from theft or unauthorized use.
Here is a helpful hint on how to go about responding to question 5.
For example let’s say you are asked to determine that the useful lives and salvage values of the computers are reasonable. A possible response would be to inquire about how the useful lives and salvage values of the computers were determined and then compare the estimated useful lives and salvage values of these computers with comparable computers used in other divisions or functional areas of the company.
Extra Credit – True/False (each question is worth 1 point)
1) Most frauds are detected by internal auditors.
2) Evidence from within the company is considered more reliable than evidence obtained from third parties
3) The internal auditor has no role in fraud prevention or detection
4) Confirmation involves examining trends and relationship among financial and non-financial data
5) Expertise within the internal auditing department is a barrier to implementing data analysis technologies
Paula Thompson
1 posts
Re:Constructing 10 Strategic Points
Hello Elizabeth-
I am so glad that you worked on this over the weekend and sent it to me in advance. What you have done -- and this happens with a few students every class -- is propose an interesting future study on incivility in higher ed. However, the guidelines for this assignment limit the scope to a replication of the 2007 Clark and Springer study. This means that many of the elements of the 10 Strategic Points (e.g., problem statement, research questions, purpose statement, data colection, data analysis) should be exactly the same as the Week 2 strategic points except with a population of undergraduate psychology students and faculty.
For example, the correct phrasing of the Week 2 problem statement that I provided you was "It is not known what the possible causes and remedies are of incivility in nursing education in a university environment from both student and faculty perspectives." For the Week 5 assignment, you would use the problem statement verbatim but just change "nursing ed.
Intervention for
Education
Markis’ Edwards
January 29, 2018
1
Area of Focus
Enforcing IEPs children with
Autism
Learning and behavioral difficulties
In reinforcing learners in Individualized Educational Programs(IEPs), educators will assist in shaping the behaviors of the students, as well as, becoming more self-sufficient (Bambara, Koger, & Bartholomew, 2011). The students’ educational needs are met in areas, such as reading, writing, math, adaptive living, and science. The objective is to meet the learners' needs via creating a plan that will effectively ensure the students’ educational and behavioral level are met or exceeded (Tyner, 2014).
2
Explanation of Problem
Lack of reinforcement by teachers
No use of different learning techniques
No use of technology
3
Variables
Mixed Group of children
Verbally proficient but with behavioral difficulty
Nonspeaking children with severe behavioral difficulty
Basic speaking skills with minimal behavioral difficulty
4
Research Questions
Qualitative Questions
Why should I consider eLearning-based training?
Can eLearning courses be customized?
What is the perspective of researcher in regards to having daily awareness of students IEP goals?
Quantitative Questions
What are 2-3 hardware and software requirements for online training?
What is the difference in researchers expectations of students when applying IEP goals daily verses being applied over three weeks?
5
Locus of Control
Being part of the intervention
Confidential Research for myself
Research Summaries
The main goal of being part of the intervention is the assurance that children are educated regardless of limitations or disabilities (Wehmeyer, 2005).
6
Intervention/Innovation
The Use of iPads
Use of designated applications
This will all be provided by the designed application known as “Proloquo” that is designed for such activities (Brown, Dehoney, & Millichap, 2015).
7
Negotiations
Observation of children in their learning environment
Terms set by the DHR had to be followed
8
Ethics
Student Rights
Training of students on the usage of the devices
Restricting the devices to specific sites
When the intervention is being implemented several things have to be considered and at the top of the list is the maintenance of the students rights (Bamb.
The World Testifies Of Data And Our Understanding Of It EssaySandy Harwell
The document discusses qualitative research methods. It defines qualitative research as exploring and describing phenomena through subjective and inductive strategies. Some key points made include:
- Qualitative research aims to answer questions about why and how things occur.
- There are three main purposes: exploratory, explanatory, and descriptive. Exploratory research discovers patterns in phenomena, while explanatory research identifies relationships shaping phenomena and descriptive research documents phenomena of interest.
- Qualitative research relies on non-experimental and phenomenological approaches to collect data through open-ended questions and observations.
DATA COLLECTION TOOLS Edwards 1
Data Collection Strategies
Markis’ Edwards
EDU 675: Change Leadership for the Differentiated Educational Environment
Dr. Regina Miller
February 5, 2018
Project-based learning
The fact that learning is achieved through a number of ways best explains why different methods are tested in order to know the best method that can be applied. Project-based learning is thought to be a solution used to improve students’ state assessment scores when relating to the Common Core State Standards especially in comprehending non-fiction text. However, this method has to be tested in order to be recommended.
Purpose of the study
This study is meant to get the best data collection tool that can be used in a research. Before making any decision on what learning and teaching method to be used in teaching non-fiction texts, it is important to understand how each method works and how it can be used to improve learning. In order to be sure about how a method works, one needs to experiment or collect data that will be used as a base for making conclusions (Eodice, Geller, & Lerner, 2017). The purpose of this study is thus to provide the best data collection tool to be used in getting information that can be used in making viable conclusions.
The research question is; Will the inclusion of project-based learning improve student application of comprehending non-fiction text at a high depth of knowledge level?
Data collection
The researcher will use a number of data collection tools in order to recommend this learning method. The data needed should be quantitative so as to give the researcher the way forward to make a decision. One of the data collection tools to be used is the pre-test and post-tests. This is a type of experiment that will use two groups; where one group is given a treatment while the other group is left to be the control group.
In this sort of experiment, the researcher will collect a random number of people from the community who can be able to read and write. The people will be divided into two groups, the test group, and the control group. The conditions for the test will be set and the treatment applied to the test group. The control group will not be given treatment and after a given period of time, the researcher will collect the results. The results will measure ow the treatment affected the group as differentiated by the control group. The result from the group will be recorded exactly depending on the number of people who participated and how the experiment affected each one of them. This can enable the researcher to know whether the method can be used to improve student assessment.
Another data collection tool that can be used is interviewing (Phillips & Stawarski, 2016). The researcher can organize for short and structured interviews. The interviews should have a given number of people and the result expected sh.
Running Header PROJECT BASED LEARNING PROJECT BASED LEARNING .docxagnesdcarey33086
Running Header: PROJECT BASED LEARNING
PROJECT BASED LEARNING 6
Effects of project based learning on education
Marcus Coleman
Ashford University
Effects of in cooperating Project based Learning in the school curriculum
Introduction
Learning is determined by a number of factors, some of which are environmental related while others are not. The approach of teaching is one of the major determinants of learning as far classroom learning is concerned, however there has been a concern that the current approaches to learning are a little too abstract. Lack of real life scenarios and too much theory has been responsible for the growing apathy towards learning. It is for this reason that studies are being contacted to see if the change in tact can improve learning. One of the suggested ways is the project based learning approach which uses non fictional concepts for teaching.
Purpose of the study
The purpose of this study is to find out the effects of in cooperating project based learning in the school curriculum. The study seeks to ascertain if there is any relationship between projects based learning and the improvement in scores for students (Daniel 2012). Previous studies have shown that students are likely to improve in cases where some form of simulation or use of no fictional material. According to these, the use of non fictional approaches stimulates the students to look at issues from the reality perspective hence making it easy to internalize whatever they are learning for the sake of being able to remember, however these studies have not clearly explained the actual relationships that exist between the performance and the project based learning. There are other factors which could have in for the findings to be so, for those studies, this study would critically examine the direct impact that project based learning has on students.
Research questions
1. Will the incorporation of project based learning improve students state assessment scores as it relates to the common core state standards in comprehending non fiction text?
2. Will the inclusion of project based learning improve student application of comprehending non fictional text at a high depth of learning level?
3. How does project based learning integrate clear expectations and essential criteria and remain successful
In research, data is an important factor because it is the one which determines the findings and recommendations for the, decisions to be made (Peter 2011). The main data collection methods will be observation, interviews and artifacts, questionnaires will also be used to collect data concerning the stakeholders. Observation will be effective tools for confirming how students behave in classes, when the various approaches are used. Students will be observed in a classroom setting and comparisons be made between those classes that imp.
A Neat Sampling Strategy Based On Purposive Sampling EssayTammy Majors
The document discusses research methodology for a study on leasing business in Mauritius. It will use a descriptive research design with both primary and secondary data collection methods. Primary data will be collected through questionnaires distributed to Mauritians who own vehicles. Secondary data will come from sources like books, publications from the Central Statistical Office, internet resources, and financial magazines. The study aims to examine the evolution of leasing business and factors affecting lessees and lessors, compare leasing to other financing options, and understand its popularity among Mauritians.
Running head DATA ANALYSIS PLAN 1DATA ANALYSIS PLAN.docxtodd271
Running head: DATA ANALYSIS PLAN
1
DATA ANALYSIS PLAN
6
Data Analysis Plan
Columbia Southern University
PUH 6301 Public Health Research
February 25, 2020
Data Analysis Plan
Checking for Data Accuracy
Data accuracy checking will incorporate various measures for efficacy. The first method will include using reliable data sources. The data sources are critical to successful data collection as well as further analysis. Therefore, I will ensure the credibility and reliability of the systems as well as personnel responsible for information and data generation. Another significant measure will be aligning the key parameters and factors. It entails analyzing and sifting through the features that contribute to data communication, by figuring out the most relevant parameters that are needed for the performance report of the specific operations or developing the feasibility (Cole & Trinh, 2017). Then, I will design a set of essential and basic parameters and formulate a plan for the data collection.
Equally, maintaining neutrality is essential for checking data accuracy since claims and exaggerations create a negative balance to data sets. Therefore, by ascertaining that data is neutral, it becomes easy to justify the completeness of data. Importantly, I will use computerized and automated programs. There is always room for more mistakes as well as a human error with the use of manual mechanisms during information recording and data entry (Cole & Trinh, 2017). Besides, there can be higher risks of inaccuracy and compromised data entries based on personal favors and biases that wholly affect data results and inferences, leading to loss of portability and efficacy of data accuracy and analysis. However, the data collection through automated and smart systems makes it easier for focusing on parameters and factors, while the system records accurate data and real-time in a perfect manner.
Level of Measurement
The important level of measurement for my research project is the nominal level of measurement. The measurement is essential to the research since it uses elements such as letters, words, numbers, and alpha-numeric (Ekinci, 2017). In the research, the hypothesis is establishing the difference in performance between private and public schools. Specifically, the hypothesis is “private schools perform better than public schools.” Therefore, one of the elements will be a comparison of performance by gender. In this case, female students will be classified as F and male students will be classified as M. The nominal level of measurement is equally essential in this research since it only possess the description of the character meaning the unique label for identifying values to subjects. In this case, it is used to identify male and female students and utilizes a one-on-one correlation between the objects and letters assigned. Therefore, the letters are merely for identifying the gender of the students and not their capabilities in the learning .
GE 3000 – Introduction Section (Research Problem Statement)Int.docxshericehewat
GE 3000 – Introduction Section (Research Problem Statement)
Introduction: Formulating a Research Problem is the first and most important step of the research process. While the main portion of your work for this semester is focused on the Literature Review, the introduction to the research paper - The Research Problem Statement – is an important step in setting up the research problem to be investigated.
The Research Problem Statement comes before the Literature Review and acts as an introduction in a full-length research paper. The Research Problem Statement should be about 250-350 words in length, or about a page to a page-and-a-half when double-spaced. You must cite a minimum of two references (two scholarly sources) in proper MLA or APA format.
The main questions a Research Problem answers are:
· What will be researched? Identify a specific problem, program, or phenomenon
· Who will be researched? Who is the study population (people)?
Questions you should ask yourself when composing the Research Problem:
(Note that these questions are not necessarily going to be explicitly answered question-by-question in the Research Problem Statement. Rather, these are things that you should be thinking about and able to answer for yourself before you begin constructing the document).
· Who is the study population? How can you further refine the study population?
· What exactly do you want to understand about the topic/problem?
· Is the Research Problem too broad?
· How relevant is the research to your study area/discipline/major/interests?
· What motivates you to do the research on the chosen topic/problem?
· Why should others be interested in your chosen topic/problem?
· What are the concepts and issues to be studied?
· What concepts and measurements have to be further defined before the study begins?
· Do you have enough time to complete the research?
· Is an answer to the Research Problem obvious?
Constructing a Research Problem
A Research Problem typically consists of three parts: 1) the ideal, 2) the reality, and 3) the consequences.
1. Part A- the ideal: Describes a desired goal or ideal situation; explains how things should be.
2. Part B - the reality: Describes a condition that prevents the goal, state, or value in Part A from being achieved or realized at this time; explains how the current situation falls short of the goal or ideal.
3. Part C - the consequences: Identifies the way you propose to improve the current situation and move it closer to the goal or ideal.
Steps to Writing a Research Problem:
Step 1 (statement 1): Construct statement 1 by describing a goal or desired state of a given situation, phenomenon etc. This will build the ideal situation (what should be, what is expected, desired). How should things be in your topic? What is the ideal scenario?
Step 2 (statement 2): Describe a condition that prevents the goal, state, or value discussed in step 1 from being achieved or realized at the present time. This will build ...
5) You are performing an audit of purchases of desktop compute.docxalinainglis
5) You are performing an audit of purchases of desktop computers. Describe the audit procedure(s) you might use to achieve each of the five audit objectives listed below. Be specific. Use slide 3 in the week 5 lecture for the list of possible audit procedures (you may want to also consult PCAOB 15 paragraphs 15-21 as well as other readings in week 5). You will not get credit for a one word answer.
slide 3 in the week 5 lecture
1) PCAOB 15 Audit Evidence
http://pcaobus.org/Standards/Auditing/Pages/Auditing_Standard_15.aspx
1) All of the computers purchased have been recorded in the accounting records.
2) The computers recorded as being purchased actually exist.
3) Depreciation expense has been calculated correctly
4) Laws and regulations regarding software usage have been followed (e.g., no pirated or illegal software is installed).
5) The computers are properly safeguarded from theft or unauthorized use.
Here is a helpful hint on how to go about responding to question 5.
For example let’s say you are asked to determine that the useful lives and salvage values of the computers are reasonable. A possible response would be to inquire about how the useful lives and salvage values of the computers were determined and then compare the estimated useful lives and salvage values of these computers with comparable computers used in other divisions or functional areas of the company.
Extra Credit – True/False (each question is worth 1 point)
1) Most frauds are detected by internal auditors.
2) Evidence from within the company is considered more reliable than evidence obtained from third parties
3) The internal auditor has no role in fraud prevention or detection
4) Confirmation involves examining trends and relationship among financial and non-financial data
5) Expertise within the internal auditing department is a barrier to implementing data analysis technologies
Paula Thompson
1 posts
Re:Constructing 10 Strategic Points
Hello Elizabeth-
I am so glad that you worked on this over the weekend and sent it to me in advance. What you have done -- and this happens with a few students every class -- is propose an interesting future study on incivility in higher ed. However, the guidelines for this assignment limit the scope to a replication of the 2007 Clark and Springer study. This means that many of the elements of the 10 Strategic Points (e.g., problem statement, research questions, purpose statement, data colection, data analysis) should be exactly the same as the Week 2 strategic points except with a population of undergraduate psychology students and faculty.
For example, the correct phrasing of the Week 2 problem statement that I provided you was "It is not known what the possible causes and remedies are of incivility in nursing education in a university environment from both student and faculty perspectives." For the Week 5 assignment, you would use the problem statement verbatim but just change "nursing ed.
Intervention for
Education
Markis’ Edwards
January 29, 2018
1
Area of Focus
Enforcing IEPs children with
Autism
Learning and behavioral difficulties
In reinforcing learners in Individualized Educational Programs(IEPs), educators will assist in shaping the behaviors of the students, as well as, becoming more self-sufficient (Bambara, Koger, & Bartholomew, 2011). The students’ educational needs are met in areas, such as reading, writing, math, adaptive living, and science. The objective is to meet the learners' needs via creating a plan that will effectively ensure the students’ educational and behavioral level are met or exceeded (Tyner, 2014).
2
Explanation of Problem
Lack of reinforcement by teachers
No use of different learning techniques
No use of technology
3
Variables
Mixed Group of children
Verbally proficient but with behavioral difficulty
Nonspeaking children with severe behavioral difficulty
Basic speaking skills with minimal behavioral difficulty
4
Research Questions
Qualitative Questions
Why should I consider eLearning-based training?
Can eLearning courses be customized?
What is the perspective of researcher in regards to having daily awareness of students IEP goals?
Quantitative Questions
What are 2-3 hardware and software requirements for online training?
What is the difference in researchers expectations of students when applying IEP goals daily verses being applied over three weeks?
5
Locus of Control
Being part of the intervention
Confidential Research for myself
Research Summaries
The main goal of being part of the intervention is the assurance that children are educated regardless of limitations or disabilities (Wehmeyer, 2005).
6
Intervention/Innovation
The Use of iPads
Use of designated applications
This will all be provided by the designed application known as “Proloquo” that is designed for such activities (Brown, Dehoney, & Millichap, 2015).
7
Negotiations
Observation of children in their learning environment
Terms set by the DHR had to be followed
8
Ethics
Student Rights
Training of students on the usage of the devices
Restricting the devices to specific sites
When the intervention is being implemented several things have to be considered and at the top of the list is the maintenance of the students rights (Bamb.
The World Testifies Of Data And Our Understanding Of It EssaySandy Harwell
The document discusses qualitative research methods. It defines qualitative research as exploring and describing phenomena through subjective and inductive strategies. Some key points made include:
- Qualitative research aims to answer questions about why and how things occur.
- There are three main purposes: exploratory, explanatory, and descriptive. Exploratory research discovers patterns in phenomena, while explanatory research identifies relationships shaping phenomena and descriptive research documents phenomena of interest.
- Qualitative research relies on non-experimental and phenomenological approaches to collect data through open-ended questions and observations.
DATA COLLECTION TOOLS Edwards 1
Data Collection Strategies
Markis’ Edwards
EDU 675: Change Leadership for the Differentiated Educational Environment
Dr. Regina Miller
February 5, 2018
Project-based learning
The fact that learning is achieved through a number of ways best explains why different methods are tested in order to know the best method that can be applied. Project-based learning is thought to be a solution used to improve students’ state assessment scores when relating to the Common Core State Standards especially in comprehending non-fiction text. However, this method has to be tested in order to be recommended.
Purpose of the study
This study is meant to get the best data collection tool that can be used in a research. Before making any decision on what learning and teaching method to be used in teaching non-fiction texts, it is important to understand how each method works and how it can be used to improve learning. In order to be sure about how a method works, one needs to experiment or collect data that will be used as a base for making conclusions (Eodice, Geller, & Lerner, 2017). The purpose of this study is thus to provide the best data collection tool to be used in getting information that can be used in making viable conclusions.
The research question is; Will the inclusion of project-based learning improve student application of comprehending non-fiction text at a high depth of knowledge level?
Data collection
The researcher will use a number of data collection tools in order to recommend this learning method. The data needed should be quantitative so as to give the researcher the way forward to make a decision. One of the data collection tools to be used is the pre-test and post-tests. This is a type of experiment that will use two groups; where one group is given a treatment while the other group is left to be the control group.
In this sort of experiment, the researcher will collect a random number of people from the community who can be able to read and write. The people will be divided into two groups, the test group, and the control group. The conditions for the test will be set and the treatment applied to the test group. The control group will not be given treatment and after a given period of time, the researcher will collect the results. The results will measure ow the treatment affected the group as differentiated by the control group. The result from the group will be recorded exactly depending on the number of people who participated and how the experiment affected each one of them. This can enable the researcher to know whether the method can be used to improve student assessment.
Another data collection tool that can be used is interviewing (Phillips & Stawarski, 2016). The researcher can organize for short and structured interviews. The interviews should have a given number of people and the result expected sh.
Running Header PROJECT BASED LEARNING PROJECT BASED LEARNING .docxagnesdcarey33086
Running Header: PROJECT BASED LEARNING
PROJECT BASED LEARNING 6
Effects of project based learning on education
Marcus Coleman
Ashford University
Effects of in cooperating Project based Learning in the school curriculum
Introduction
Learning is determined by a number of factors, some of which are environmental related while others are not. The approach of teaching is one of the major determinants of learning as far classroom learning is concerned, however there has been a concern that the current approaches to learning are a little too abstract. Lack of real life scenarios and too much theory has been responsible for the growing apathy towards learning. It is for this reason that studies are being contacted to see if the change in tact can improve learning. One of the suggested ways is the project based learning approach which uses non fictional concepts for teaching.
Purpose of the study
The purpose of this study is to find out the effects of in cooperating project based learning in the school curriculum. The study seeks to ascertain if there is any relationship between projects based learning and the improvement in scores for students (Daniel 2012). Previous studies have shown that students are likely to improve in cases where some form of simulation or use of no fictional material. According to these, the use of non fictional approaches stimulates the students to look at issues from the reality perspective hence making it easy to internalize whatever they are learning for the sake of being able to remember, however these studies have not clearly explained the actual relationships that exist between the performance and the project based learning. There are other factors which could have in for the findings to be so, for those studies, this study would critically examine the direct impact that project based learning has on students.
Research questions
1. Will the incorporation of project based learning improve students state assessment scores as it relates to the common core state standards in comprehending non fiction text?
2. Will the inclusion of project based learning improve student application of comprehending non fictional text at a high depth of learning level?
3. How does project based learning integrate clear expectations and essential criteria and remain successful
In research, data is an important factor because it is the one which determines the findings and recommendations for the, decisions to be made (Peter 2011). The main data collection methods will be observation, interviews and artifacts, questionnaires will also be used to collect data concerning the stakeholders. Observation will be effective tools for confirming how students behave in classes, when the various approaches are used. Students will be observed in a classroom setting and comparisons be made between those classes that imp.
A Neat Sampling Strategy Based On Purposive Sampling EssayTammy Majors
The document discusses research methodology for a study on leasing business in Mauritius. It will use a descriptive research design with both primary and secondary data collection methods. Primary data will be collected through questionnaires distributed to Mauritians who own vehicles. Secondary data will come from sources like books, publications from the Central Statistical Office, internet resources, and financial magazines. The study aims to examine the evolution of leasing business and factors affecting lessees and lessors, compare leasing to other financing options, and understand its popularity among Mauritians.
Running head DATA ANALYSIS PLAN 1DATA ANALYSIS PLAN.docxtodd271
Running head: DATA ANALYSIS PLAN
1
DATA ANALYSIS PLAN
6
Data Analysis Plan
Columbia Southern University
PUH 6301 Public Health Research
February 25, 2020
Data Analysis Plan
Checking for Data Accuracy
Data accuracy checking will incorporate various measures for efficacy. The first method will include using reliable data sources. The data sources are critical to successful data collection as well as further analysis. Therefore, I will ensure the credibility and reliability of the systems as well as personnel responsible for information and data generation. Another significant measure will be aligning the key parameters and factors. It entails analyzing and sifting through the features that contribute to data communication, by figuring out the most relevant parameters that are needed for the performance report of the specific operations or developing the feasibility (Cole & Trinh, 2017). Then, I will design a set of essential and basic parameters and formulate a plan for the data collection.
Equally, maintaining neutrality is essential for checking data accuracy since claims and exaggerations create a negative balance to data sets. Therefore, by ascertaining that data is neutral, it becomes easy to justify the completeness of data. Importantly, I will use computerized and automated programs. There is always room for more mistakes as well as a human error with the use of manual mechanisms during information recording and data entry (Cole & Trinh, 2017). Besides, there can be higher risks of inaccuracy and compromised data entries based on personal favors and biases that wholly affect data results and inferences, leading to loss of portability and efficacy of data accuracy and analysis. However, the data collection through automated and smart systems makes it easier for focusing on parameters and factors, while the system records accurate data and real-time in a perfect manner.
Level of Measurement
The important level of measurement for my research project is the nominal level of measurement. The measurement is essential to the research since it uses elements such as letters, words, numbers, and alpha-numeric (Ekinci, 2017). In the research, the hypothesis is establishing the difference in performance between private and public schools. Specifically, the hypothesis is “private schools perform better than public schools.” Therefore, one of the elements will be a comparison of performance by gender. In this case, female students will be classified as F and male students will be classified as M. The nominal level of measurement is equally essential in this research since it only possess the description of the character meaning the unique label for identifying values to subjects. In this case, it is used to identify male and female students and utilizes a one-on-one correlation between the objects and letters assigned. Therefore, the letters are merely for identifying the gender of the students and not their capabilities in the learning .
GE 3000 – Introduction Section (Research Problem Statement)Int.docxshericehewat
GE 3000 – Introduction Section (Research Problem Statement)
Introduction: Formulating a Research Problem is the first and most important step of the research process. While the main portion of your work for this semester is focused on the Literature Review, the introduction to the research paper - The Research Problem Statement – is an important step in setting up the research problem to be investigated.
The Research Problem Statement comes before the Literature Review and acts as an introduction in a full-length research paper. The Research Problem Statement should be about 250-350 words in length, or about a page to a page-and-a-half when double-spaced. You must cite a minimum of two references (two scholarly sources) in proper MLA or APA format.
The main questions a Research Problem answers are:
· What will be researched? Identify a specific problem, program, or phenomenon
· Who will be researched? Who is the study population (people)?
Questions you should ask yourself when composing the Research Problem:
(Note that these questions are not necessarily going to be explicitly answered question-by-question in the Research Problem Statement. Rather, these are things that you should be thinking about and able to answer for yourself before you begin constructing the document).
· Who is the study population? How can you further refine the study population?
· What exactly do you want to understand about the topic/problem?
· Is the Research Problem too broad?
· How relevant is the research to your study area/discipline/major/interests?
· What motivates you to do the research on the chosen topic/problem?
· Why should others be interested in your chosen topic/problem?
· What are the concepts and issues to be studied?
· What concepts and measurements have to be further defined before the study begins?
· Do you have enough time to complete the research?
· Is an answer to the Research Problem obvious?
Constructing a Research Problem
A Research Problem typically consists of three parts: 1) the ideal, 2) the reality, and 3) the consequences.
1. Part A- the ideal: Describes a desired goal or ideal situation; explains how things should be.
2. Part B - the reality: Describes a condition that prevents the goal, state, or value in Part A from being achieved or realized at this time; explains how the current situation falls short of the goal or ideal.
3. Part C - the consequences: Identifies the way you propose to improve the current situation and move it closer to the goal or ideal.
Steps to Writing a Research Problem:
Step 1 (statement 1): Construct statement 1 by describing a goal or desired state of a given situation, phenomenon etc. This will build the ideal situation (what should be, what is expected, desired). How should things be in your topic? What is the ideal scenario?
Step 2 (statement 2): Describe a condition that prevents the goal, state, or value discussed in step 1 from being achieved or realized at the present time. This will build ...
According to Davenport (2014) social media and health care are c.docxmakdul
Social media is collaborating with healthcare to meet the needs of providers and patients, and is moving toward using analytics to evaluate its value within healthcare. The document instructs the reader to research areas of social media that could benefit from an analytic model combining data and value-based analytics, then evaluate a resource by discussing five major social media stakeholder roles, whether social media could improve medical practice and provide rationale, and concluding with main points.
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docxmakdul
According to (Fatehi, Gordon & Florida, N.D.) theoretical orientation represent styles of mind for understanding reality. This theoretical orientation can be organized as a continuum from theoretical constructs that are independent and concrete as with the Behavioral/ CBT theories, to theoretical constructs that are interdependent and abstract as with the Psychodynamic theories (Fatehi, Gordon & Florida, N.D.). Family systems and Humanistic/Existential are theoretical midpoints (Fatehi, Gordon & Florida, N.D.). Trait theory tends to focus on the premise that we are born with traits or characteristics that make us unique and explain our behaviors (Cervone& Pervin, 2019). For example, introversion, extroversion, shyness, agreeableness, kindness, etc. all these innate characteristics that we are born help to explain why we behave in a certain manner according to the situations we face, (Cervone& Pervin, 2019). Psychoanalytic perspective on the other hand focuses on childhood experiences and the unconscious mind which plays a role in our personality development, (Cervone& Pervin, 2019).
According to Freud, (Cervone& Pervin, 2019) our unconscious mind includes all our hidden desires and conflicts which form the root cause of our mental health issues or maladaptive behaviors. The main difference between these two perspectives is that trait theory helps to explain why we behave in a certain manner, whereas psychoanalytic theory only describes the personality and predicting behavior and not really explaining why we behave the way we do. There is no such evident similarity between the two perspectives, but kind of rely on underlying mechanisms to explain personality. Also, there is some degree of subjectivity present in both the perspectives. Trait theories involve subjectivity regarding interpretations of which can be considered as important traits that explain our behaviors, and psychoanalytic theory is subjective and vague in the concepts been used like the unconscious mind. My opinions accord with the visible contrasts between the two, one focused on internal features describing our behaviors in clearer words, whilst other concentrating on unconscious mind in anticipating behavior which is ambiguous and harder to grasp.
References
Cervone, D., & Pervin, L. A. (2019). Personality: Theory and research (14th ed.). Wiley.
Fatehi, M., Gordon, R. M., & Florida, O. A Meta-Theoretical Integration of Psychotherapy Orientations.
.
According to Libertarianism, there is no right to any social service.docxmakdul
According to Libertarianism, there is no right to any social services besides those of a night-watchman state, protecting citizens from harming each other via courts, police, and military.
Consider this town
that decided to remove fire rescue as a basic social service. To benefit from it, one had to pay a yearly fee. Do you think libertarians would generally have to support such a policy in order to be consistent? Why or why not? Also, can you think of any other social services that might no longer exist in a libertarian society? (Btw, none has ever existed).
.
According to Kirk (2016), most of your time will be spent working wi.docxmakdul
Kirk (2016) identified four data action groups for working with data: data acquisition, data examination, data transformation, and data exploration. Data acquisition involves gathering the raw material.
According to cultural deviance theorists like Cohen, deviant sub.docxmakdul
This document discusses how cultural deviance theorists view subcultures as having their own value systems that oppose mainstream society's values. It asks how rap culture has perpetuated these subcultural values and promoted violence and crime among young men. It also asks how theorists would explain the persistence and popularity of rap culture given its deviation from conventional norms and values, citing examples from Tupac Shakur and 50 Cent. The document requests a 750-1000 word essay on this topic supported by 3-5 scholarly sources.
According to Gray et al, (2017) critical appraisal is the proce.docxmakdul
According to Gray et al, (2017) “critical appraisal is the process of carefully and systematically assessing the outcome of all aspects of a study, judging the strengths, limitation, trustworthiness, meaning, and its applicability to practice”. The steps involved in critical appraisal include “identifying the study's elements or processes, determining the strengths and weaknesses, and evaluating the credibility and trustworthiness of the study” (Gray et al., 2017). The journal article chosen is
“change in staff perspectives on indwelling urinary catheter use after implementation of an intervention bundle in seven Swiss acute care hospitals: a result of a before/after survey study”
by Niederhauser, Zullig, Marschall, Schweiger, John, Kuster, and Schwappach. (2019).
Identifying the study's elements or processes
A significant issue addressed by the study is the nursing “staffs’ perspective towards indwelling urinary catheter (IUC) and evaluation of changes in their perspectives towards indwelling urinary catheter (IUC) use after implementation of a 1-year quality improvement project” (Niederhauser et al, 2019). the process of the research was conducted in “seven acute care hospitals in Switzerland” (Niederhauser et al, 2019). With a “sample size of 1579 staff members participated in the baseline survey and 1527 participated in the follow-up survey. The survey captures all nursing and medical staff members working at the participating hospitals at the time of survey distribution, using a multimodal intervention bundle, consisting of an evidence-based indication list, daily re-evaluation of ongoing catheter needs, and staff training were implemented over the course of 9 months” (Niederhauser et al, 2019).
Determining the strengths and weaknesses
A great strength of the study is a large sample size of over 1000 and the use of well-constructed and easy-to-read heading for better understanding. Also, the use of figures, graphs, and tables make the article less cumbersome to read. Another strength is the implementation of the ethical principles of research by enabling informed consent and voluntary participation as well as confidentiality and anonymity of information.
On the other hand, the study has several weaknesses such as the use of “the theory of planned behavior to model intentions to reduce catheter use, but it is not possible to know if changes observed in staff perception led to a true change in practice” (Niederhauser et al, 2019). Another weakness of the study is the repeated survey design which allows assessment of changes in staff perspectives after implementation of a quality improvement intervention but the sustainability of the effects over time could not be evaluated.
Evaluating the credibility and trustworthiness of the study
Although the study used a larger sample size of over 1000, the “use of a single-group design and no control group weakens its credibility and trustworthiness because there are no causal inferences abou.
According to article Insecure Policing Under Racial Capitalism by.docxmakdul
According to article "Insecure: Policing Under Racial Capitalism" by Robin D.G. Kelley and the article "Yes, We Mean Literally Abolish the Police" by Mariame Kaba, the police are no longer an attribute of safety and security. The facts that are given in the articles are similar within the meaning of the content. The police do not serve for the benefit of the whole community. Racial and class division according to social status became the basis of lawlessness and injustice on the part of the police. Kaaba in his article cites several stories confirming the racial hatred that led to the murder of African Americans. After that, people massively took to the streets of many cities in several countries, demanding an end to racial discrimination and the murder of African Americans. Kelley's article describes numerous manifestos where demands for police abolition have been raised, but all have been rejected. In the protests, people suggested that they themselves would take care of each other, which the police could not do. I understand that the police system is far from ideal and the permissiveness of police representatives should be limited. Ruth Wilson Gilmore says that "capitalism is never racial." I think that this phrase she wants to say that the stronger people take away from the weak people and use them for their own well-being. And since the roots of history go back to slavery, then African Americans are the weak link. In this regard, a huge number of prisons and police power appeared. The common and small class do not feel protected, on the contrary; they expect a threat from people who must protect them. The police take an oath to respect and protect human and civil rights and freedoms, regardless of skin color and social status. If this does not happen, then you need to change the system.
.
Abstract In this experiment, examining the equivalence poi.docxmakdul
Abstract:
In this experiment, examining the equivalence point in a titration with NaOH identified an
unknown diprotic acid. The molar mass of the unknown was found to be 100.78 g/mol with pKa
values of 2.6 and 6.6. The closest diprotic acid to this molar mass is malonic acid with a percent
error of 3.48%.
Introduction:
The purpose of the experiment was to determine the identity of an unknown diprotic acid. The
equivalence and half-equivalence points on the titration curve give important information, which
can then be used to calculate the molecular weight of the acid. The equivalence point is the
moment when there is an equal amount of acid and NaOH. Knowing the concentration and
volume of added NaOH at that moment, the amount of moles of NaOH can be determined. The
amount of moles of NaOH is then equivalent to the amount of acid present. Dividing the original
mass of the acid by the moles present gave the molar mass of the acid.
In this particular titration, there were two equivalence points as the acid is diprotic.
Consequently, the titration curve had two inflection points. The acid dissociated in a two-step
process with the net reaction being:
H2X + 2 NaOH Na2X + 2 H2O
This was important to take into consideration when calculating the molar mass of the diprotic
acid. If the first equivalence point was to be used, the ratio of acid to NaOH was 1:1. If the
second equivalence point was used in the calculations, the ratio became 1:2 as now a second
set of NaOH molecules reacted with the acid to dissociate the second hydrogen ion. The
titration curve also showed the pKa values of the acid. This happened at the half-equivalence
point where half of the acid was dissociated to its conjugate base (again, because of the diprotic
properties of the acid, this happens twice on the curve). The Henderson Hasselbalch equation
pH = pKa+log(A-/HA)
shows that at the half-equivalence point, the pKa value equaled the pH and was visually
represented by the flattest part of the graphs.
Discussion:
The titration graph showed that the data was consistent with the methodology and proved to be
an precise execution of the procedure and followed the expected shape. One possible source of
error was the actual mass of the acid solid. While transferring the dust from the weigh boat to
the solution, some remained in the weigh boat this could have altered the molar mass
calculations and shifted the final the final mass lighter than actual.
The Vernier pH method was definitely a much more concrete method of interpreting the results.
It was possible to see which addition of NaOH gave the greatest increase in pH ( greatest 1st
derivative of the titration graph). The relying solely on the indicator color would make it very
difficult to judge at which precise point the color shifted most, as the shift was a lot more gradual
compared to the precise numbers. This may have been a more reliable method if there was a
de.
ACC 403- ASSIGNMENT 2 RUBRIC!!!
Points: 280
Assignment 2: Audit Planning and Control
Criteria
UnacceptableBelow 60% F
Meets Minimum Expectations60-69% D
Fair70-79% C
Proficient80-89% B
Exemplary90-100% A
1. Outline the critical steps inherent in planning an audit and designing an effective audit program. Based upon the type of company selected, provide specific details of the actions that the company should undertake during planning and designing the audit program.
Weight: 15%
Did not submit or incompletely outlined the critical steps inherent in planning an audit and designing an effective audit program. Did not submit or incompletely provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Insufficiently outlined the critical steps inherent in planning an audit and designing an effective audit program. Insufficiently provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Partially outlined the critical steps inherent in planning an audit and designing an effective audit program. Partially provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Satisfactorily outlined the critical steps inherent in planning an audit and designing an effective audit program. Satisfactorily provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Thoroughly outlined the critical steps inherent in planning an audit and designing an effective audit program. Thoroughly provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
2. Examine at least two (2) performance ratios that you would use in order to determine which analytical tests to perform. Identify the accounts that you would test, and select at least three (3) analytical procedures that you would use in your audit.
Weight: 15%
Did not submit or incompletely examined at least two (2) performance ratios that you would use in order to determine which analytical tests to perform. Did not submit or incompletely identified the accounts that you would test; did not submit or incompletely selected at least three (3) analytical procedures that you would use in your audit.
Insufficiently examined at least two (2) performance ratios that you would use in order to determine which analytical tests to perform. Insufficiently identified the accounts that you would test; insufficiently selected at least three (3) analytical procedures that you would use in your audit.
Partially examined at least two (2) performance ratios that you would use in order to determine which analytical tests .
ACC 601 Managerial Accounting Group Case 3 (160 points) .docxmakdul
ACC 601 Managerial Accounting
Group Case 3 (160 points)
Instructions:
1. As a group, complete the following activities in good form. Use excel or
word only. Provide all supporting calculations to show how you arrived at
your numbers
2. Add only the names of group members who participated in the completion
of this assignment.
3. Submit only one copy of your completed work via Moodle. Do not send it to
me by email.
4. Due: No later than the last day of Module 7. Please note that your professor
has the right to change the due date of this assignment.
Part A: Capital Budgeting Decisions
Chee Company has gathered the following data on a proposed investment project:
Investment required in equipment ............. $240,000
Annual cash inflows .................................. $50,000
Salvage value ............................................ $0
Life of the investment ............................... 8 years
Required rate of return .............................. 10%
Assets will be depreciated using straight
line depreciation method
Required:
Using the net present value and the internal rate of return methods, is this a good investment?
Part B: Master Budget
You have just been hired as a new management trainee by Earrings Unlimited, a distributor of
earrings to various retail outlets located in shopping malls across the country. In the past, the
company has done very little in the way of budgeting and at certain times of the year has
experienced a shortage of cash. Since you are well trained in budgeting, you have decided to
prepare a master budget for the upcoming second quarter. To this end, you have worked with
accounting and other areas to gather the information assembled below.
The company sells many styles of earrings, but all are sold for the same price—$10 per pair. Actual
sales of earrings for the last three months and budgeted sales for the next six months follow (in pairs
of earrings):
January (actual) 20,000 June (budget) 50,000
February (actual) 26,000 July (budget) 30,000
March (actual) 40,000 August (budget) 28,000
April (budget) 65,000 September (budget) 25,000
May (budget) 100,000
The concentration of sales before and during May is due to Mother’s Day. Sufficient inventory should
be on hand at the end of each month to supply 40% of the earrings sold in the following month.
Suppliers are paid $4 for a pair of earrings. One-half of a month’s purchases is paid for in the month
of purchase; the other half is paid for in the following month. All sales are on credit. Only 20% of a
month’s sales are collected in the month of sale. An additional 70% is collected in the following
month, and the remaining 10% is collected in the second month following sale. Bad debts have been
negligible.
Monthly operating expenses for the company are given below:
Variable:
Sales commissions 4 % of sales
.
Academic Integrity A Letter to My Students[1] Bill T.docxmakdul
Academic Integrity:
A Letter to My Students[1]
Bill Taylor
Professor of Political Science
Oakton Community College
Des Plaines, IL 60016
[email protected]
Here at the beginning of the semester I want to say something to you about academic integrity.[2]
I’m deeply convinced that integrity is an essential part of any true educational experience, integrity on
my part as a faculty member and integrity on your part as a student.
To take an easy example, would you want to be operated on by a doctor who cheated his way through
medical school? Or would you feel comfortable on a bridge designed by an engineer who cheated her
way through engineering school. Would you trust your tax return to an accountant who copied his
exam answers from his neighbor?
Those are easy examples, but what difference does it make if you as a student or I as a faculty member
violate the principles of academic integrity in a political science course, especially if it’s not in your
major?
For me, the answer is that integrity is important in this course precisely because integrity is important in
all areas of life. If we don’t have integrity in the small things, if we find it possible to justify plagiarism or
cheating or shoddy work in things that don’t seem important, how will we resist doing the same in areas
that really do matter, in areas where money might be at stake, or the possibility of advancement, or our
esteem in the eyes of others?
Personal integrity is not a quality we’re born to naturally. It’s a quality of character we need to nurture,
and this requires practice in both meanings of that word (as in practice the piano and practice a
profession). We can only be a person of integrity if we practice it every day.
What does that involve for each of us in this course? Let’s find out by going through each stage in the
course. As you’ll see, academic integrity basically requires the same things of you as a student as it
requires of me as a teacher.
I. Preparation for Class
What Academic Integrity Requires of Me in This Area
With regard to coming prepared for class, the principles of academic integrity require that I come having
done the things necessary to make the class a worthwhile educational experience for you. This requires
that I:
reread the text (even when I’ve written it myself),
clarify information I might not be clear about,
prepare the class with an eye toward what is current today (that is, not simply rely on past
notes), and
plan the session so that it will make it worth your while to be there.
What Academic Integrity Requires of You in This Area
With regard to coming prepared for class, the principles of academic integrity suggest that you have a
responsibility to yourself, to me, and to the other students to do the things necessary to put yourself in
a position to make fruitful contributions to class discussion. This will require you to:
read the text before.
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docxmakdul
Access the Center for Disease Control and Prevention’s (CDC’s)
“Nutrition, Physical Activity, and Obesity: Data, Trends and Maps”
database. Choose a state other than your home state and compare their health status and associated behaviors. What behaviors lead to the current obesity status?
Initial discussion post should be approximately 300 words. Any sources used should be cited in APA format.
.
According to DSM 5 This patient had very many symptoms that sugg.docxmakdul
According to DSM 5 This patient had very many symptoms that suggested Major Depressive Disorder.
Objective(s)
Analyze psychometric properties of assessment tools
Evaluate appropriate use of assessment tools in psychotherapy
Compare assessment tools used in psychotherapy
.
Acceptable concerts include professional orchestras, soloists, jazz,.docxmakdul
Acceptable concerts include professional orchestras, soloists, jazz, Broadway musicals and instrumental or vocal ensembles, and comparable college or community groups performing music relevant to the content of this class. (Optionally, either your concert report
or
your concert review - but not both unless advance permission is given - may be based on a concert of non-western music selected from events on the concert list.)
Acceptable concerts include the following:
• Symphony orchestras • Concert bands and wind ensembles • Chamber Music (string quartets, brass and woodwind quintets, etc.) • Solo recitals (piano, voice, etc.) • Choral concerts • Early music concerts • Non-western music • Some jazz concerts • Opera• Broadway Musicals• Flamenco• Ballet• Tango
Assignment Format
The following are required on the concert review assignment and, thus, may affect your grade.
• Must be typed• Must be double-spaced• Must be between
2 and 4 pages
in length
not including the cover sheet
.• Must use conventional size and formatting of text - e.g. 10-12 point serif or sans serif fonts with normal margins. • Must include the printed program from the concert and/or your ticket stubs. Photocopies are unacceptable. (Contact me at least 24 hours before due date if any materials are unavailable.)• All materials (text, program, ticket stub) must be
stapled
together securely. Folded corners, paper clips, etc. instead of staples will not be accepted.• Careful editing, proofreading, and spelling are expected, although minor errors will not affect your grade.
Papers that do not follow these format guidelines may be returned for resubmission, and late penalties will apply.
Concert Review Assignment Content
I. Cover Sheet:
Include the following on a cover sheet attached to the front of your review:
• Title or other description of the event/performers you heard, along with the date and location of the performance. For example:
New World Symphony Orchestra
1258 Lincoln Road
Saturday, June 5, 2013
Lincoln Road Theater, Miami Beach
• Your name, assignment submission date, course. For example:
Pat Romero
October 31, 2013
Humanities 1020 MWF 8:05 a.m.
II. Descriptions
The main body of the concert review should include brief discussions of
three of the
pieces
in the concert you attend. In most cases, a single paragraph for each piece should be sufficient, although you may wish to break descriptions of longer pieces into separate short paragraphs, one per movement.
Your description of each piece (song) should include:
• The title of the piece and the composer's name if possible, as listed in the concert program.• A brief description of your reaction to the piece. For example:
When the piece started I thought it was going to be slow and boring, but the faster section in the first movement made it more exciting. A really great flute solo full of fast and high notes in the third movement caught my attention. I'm not sure, but I thought that som.
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docxmakdul
ACA was passed in 2010, under the presidency of Barack Obama. Prior to this new act, there were plenty of votes that did not agree with the notion of accessible insurance. Before 2010, The private sector had been given coverage in such a way that Milstead and Short (2019) called it sickness insurance; meaning companies will risk incurring medical expenses as long as it was balanced by healthy people. They were doing so by excluding people that had pre-existing conditions, becoming a very solvent business (Milstead & Short, 2019). After ACA was passed that was no longer the case. When President Trump came into term he did so by bringing his own healthcare agenda, which attempted to repeal ACA, but ultimately failed to come up with a replacement.
In 2016, the Republican's party platform was to repeal ACA, while continuing Medicare and Medicaid, but on the other hand, democrats put down that Obamacare is a step towards the goals of universal health care, and that this was just the beginning (Physicians for a National Health Program, n.d.). As for the cost analysis of repealing the Affordable Care Act, this would increase the number of uninsured people by 23 million, and it will cost about 350 billion through 2027, as well as creating costly coverage provisions to replace it (Committee for a Responsible Federal Budget, 2017).
(2 references required)
.
Access the FASB website. Once you login, click the FASB Accounting S.docxmakdul
Access the FASB website. Once you login, click the FASB Accounting Standards Codification link. Review the materials in the FASB Codification, especially the links on the left side column. Next, write a 1-page memo to a friend introducing and explaining this new accounting research resource that you have found. Provide at least one APA citation to the FASB Codification and reference that citation using the APA guidelines.
.
Academic Paper Overview This performance task was intended to asse.docxmakdul
This document provides an overview of an academic paper performance task intended to assess students' ability to conduct scholarly research, articulate an evidence-based argument, and effectively communicate a conclusion. Specifically, the performance task evaluates students' capacity to generate a focused research question, explore relationships between multiple scholarly works, develop and support their own argument using relevant evidence, and integrate sources while distinguishing their own voice.
Academic Research Team Project PaperCOVID-19 Open Research Datas.docxmakdul
Academic Research Team Project Paper
COVID-19 Open Research Dataset Challenge (CORD-19)
An AI challenge with AI2, CZI, MSR, Georgetown, NIH & The White House
(1) FULL-LENGTH PROJECT
Dataset Description
In response to the COVID-19 pandemic, the White House and a coalition of leading research groups have prepared the COVID-19 Open Research Dataset (CORD-19). CORD-19 is a resource of over 44,000 scholarly articles, including over 29,000 with full text, about COVID-19, SARS-CoV-2, and related corona viruses. This freely available dataset is provided to the global research community to apply recent advances in natural language processing and other AI techniques to generate new insights in support of the ongoing fight against this infectious disease. There is a growing urgency for these approaches because of the rapid acceleration in new coronavirus literature, making it difficult for the medical research community to keep up.
Call to Action
We are issuing a call to action to the world's artificial intelligence experts to develop text and data mining tools that can help the medical community develop answers to high priority scientific questions. The CORD-19 dataset represents the most extensive machine-readable coronavirus literature collection available for data mining to date. This allows the worldwide AI research community the opportunity to apply text and data mining approaches to find answers to questions within, and connect insights across, this content in support of the ongoing COVID-19 response efforts worldwide. There is a growing urgency for these approaches because of the rapid increase in coronavirus literature, making it difficult for the medical community to keep up.
A list of our initial key questions can be found under the
Tasks
section of this dataset. These key scientific questions are drawn from the NASEM’s SCIED (National Academies of Sciences, Engineering, and Medicine’s Standing Committee on Emerging Infectious Diseases and 21st Century Health Threats)
research topics
and the World Health Organization’s
R&D Blueprint
for COVID-19.
Many of these questions are suitable for text mining, and we encourage researchers to develop text mining tools to provide insights on these questions.
In this project, you will follow your own interests to create a portfolio worthy single-frame viz or multi-frame data story that will be shared in your presentation. You will use all the skills taught in this course to complete this project step-by-step, with guidance from your instructors along the way. You will first create a project proposal to identify your goals for the project, including the question you wish to answer or explore with data. You will then find data that will provide the information you are seeking. You will then import that data into Tableau and prepare it for analysis. Next, you will create a dashboard that will allow you to explore the data in-depth and identify meaningful insights. You will then give structure .
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxmakdul
Abstract
Voice over Internet Protocol (VoIP) is an advanced telecommunication technology which transfers the voice/video over
high speed network that provides advantages of flexibility, reliability and cost efficient advanced telecommunication
features. Still the issues related to security are averting many organizations to accept VoIP cloud environment due to
security threats, holes or vulnerabilities. So, the novel secured framework is absolutely necessary to prevent all kind of
VoIP security issues. This paper points out the existing VoIP cloud architecture and various security attacks and issues
in the existing framework. It also presents the defense mechanisms to prevent the attacks and proposes a new security
framework called Intrusion Prevention System (IPS) using video watermarking and extraction technique and Liveness
Voice Detection (LVD) technique with biometric features such as face and voice. IPSs updated with new LVD features
protect the VoIP services not only from attacks but also from misuses.
A Comprehensive Survey of Security Issues and
Defense Framework for VoIP Cloud
Ashutosh Satapathy* and L. M. Jenila Livingston
School of Computing Science and Engineering, VIT University, Chennai - 600127, Tamil Nadu, India;
[email protected], [email protected]
Keywords: Defense Mechanisms, Liveness Voice Detection, VoIP Cloud, Voice over Internet Protocol, VoIP Security Issues
1. Introduction
The rapid progress of VoIP over traditional services is
led to a situation that is common to many innovations
and new technologies such as VoIP cloud and peer to
peer services like Skype, Google Hangout etc. VoIP is the
technology that supports sending voice (and video) over
an Internet protocol-based network1,2. This is completely
different than the public circuit-switched telephone net-
work. Circuit switching network allocates resources to
each individual call and path is permanent throughout
the call from start to end. Traditional telephony services
are provided by the protocols/components such as SS7, T
carriers, Plain Old Telephone Service (POTS), the Public
Switch Telephone Network (PSTN), dial up, local loops
and anything under International Telecommunication
Union. IP networks are based on packet switching and
each packet follows different path, has its own header and
is forwarded separately by routers. VoIP network can be
constructed in various ways by using both proprietary
protocols and protocols based on open standards.
1.1 VoIP Layer Architecture
VoIP communication system typically consist of a front
end platform (soft-phone, PBX, gateway, call manager),
back end platform (server, CPU, storage, memory, net-
work) and intermediate platforms such as VoIP protocols,
database, authentication server, web server, operating sys-
tems etc. It is mainly divided into five layers as shown in
Figure1.
1.2 VoIP Cloud Architecture
VoIP cloud is the framework for delivering telephony
services in which resourc.
This study examined a problem, used a particular method to do so, and found results that were interpreted. It concluded by recommending future research on the topic.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
According to Davenport (2014) social media and health care are c.docxmakdul
Social media is collaborating with healthcare to meet the needs of providers and patients, and is moving toward using analytics to evaluate its value within healthcare. The document instructs the reader to research areas of social media that could benefit from an analytic model combining data and value-based analytics, then evaluate a resource by discussing five major social media stakeholder roles, whether social media could improve medical practice and provide rationale, and concluding with main points.
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docxmakdul
According to (Fatehi, Gordon & Florida, N.D.) theoretical orientation represent styles of mind for understanding reality. This theoretical orientation can be organized as a continuum from theoretical constructs that are independent and concrete as with the Behavioral/ CBT theories, to theoretical constructs that are interdependent and abstract as with the Psychodynamic theories (Fatehi, Gordon & Florida, N.D.). Family systems and Humanistic/Existential are theoretical midpoints (Fatehi, Gordon & Florida, N.D.). Trait theory tends to focus on the premise that we are born with traits or characteristics that make us unique and explain our behaviors (Cervone& Pervin, 2019). For example, introversion, extroversion, shyness, agreeableness, kindness, etc. all these innate characteristics that we are born help to explain why we behave in a certain manner according to the situations we face, (Cervone& Pervin, 2019). Psychoanalytic perspective on the other hand focuses on childhood experiences and the unconscious mind which plays a role in our personality development, (Cervone& Pervin, 2019).
According to Freud, (Cervone& Pervin, 2019) our unconscious mind includes all our hidden desires and conflicts which form the root cause of our mental health issues or maladaptive behaviors. The main difference between these two perspectives is that trait theory helps to explain why we behave in a certain manner, whereas psychoanalytic theory only describes the personality and predicting behavior and not really explaining why we behave the way we do. There is no such evident similarity between the two perspectives, but kind of rely on underlying mechanisms to explain personality. Also, there is some degree of subjectivity present in both the perspectives. Trait theories involve subjectivity regarding interpretations of which can be considered as important traits that explain our behaviors, and psychoanalytic theory is subjective and vague in the concepts been used like the unconscious mind. My opinions accord with the visible contrasts between the two, one focused on internal features describing our behaviors in clearer words, whilst other concentrating on unconscious mind in anticipating behavior which is ambiguous and harder to grasp.
References
Cervone, D., & Pervin, L. A. (2019). Personality: Theory and research (14th ed.). Wiley.
Fatehi, M., Gordon, R. M., & Florida, O. A Meta-Theoretical Integration of Psychotherapy Orientations.
.
According to Libertarianism, there is no right to any social service.docxmakdul
According to Libertarianism, there is no right to any social services besides those of a night-watchman state, protecting citizens from harming each other via courts, police, and military.
Consider this town
that decided to remove fire rescue as a basic social service. To benefit from it, one had to pay a yearly fee. Do you think libertarians would generally have to support such a policy in order to be consistent? Why or why not? Also, can you think of any other social services that might no longer exist in a libertarian society? (Btw, none has ever existed).
.
According to Kirk (2016), most of your time will be spent working wi.docxmakdul
Kirk (2016) identified four data action groups for working with data: data acquisition, data examination, data transformation, and data exploration. Data acquisition involves gathering the raw material.
According to cultural deviance theorists like Cohen, deviant sub.docxmakdul
This document discusses how cultural deviance theorists view subcultures as having their own value systems that oppose mainstream society's values. It asks how rap culture has perpetuated these subcultural values and promoted violence and crime among young men. It also asks how theorists would explain the persistence and popularity of rap culture given its deviation from conventional norms and values, citing examples from Tupac Shakur and 50 Cent. The document requests a 750-1000 word essay on this topic supported by 3-5 scholarly sources.
According to Gray et al, (2017) critical appraisal is the proce.docxmakdul
According to Gray et al, (2017) “critical appraisal is the process of carefully and systematically assessing the outcome of all aspects of a study, judging the strengths, limitation, trustworthiness, meaning, and its applicability to practice”. The steps involved in critical appraisal include “identifying the study's elements or processes, determining the strengths and weaknesses, and evaluating the credibility and trustworthiness of the study” (Gray et al., 2017). The journal article chosen is
“change in staff perspectives on indwelling urinary catheter use after implementation of an intervention bundle in seven Swiss acute care hospitals: a result of a before/after survey study”
by Niederhauser, Zullig, Marschall, Schweiger, John, Kuster, and Schwappach. (2019).
Identifying the study's elements or processes
A significant issue addressed by the study is the nursing “staffs’ perspective towards indwelling urinary catheter (IUC) and evaluation of changes in their perspectives towards indwelling urinary catheter (IUC) use after implementation of a 1-year quality improvement project” (Niederhauser et al, 2019). the process of the research was conducted in “seven acute care hospitals in Switzerland” (Niederhauser et al, 2019). With a “sample size of 1579 staff members participated in the baseline survey and 1527 participated in the follow-up survey. The survey captures all nursing and medical staff members working at the participating hospitals at the time of survey distribution, using a multimodal intervention bundle, consisting of an evidence-based indication list, daily re-evaluation of ongoing catheter needs, and staff training were implemented over the course of 9 months” (Niederhauser et al, 2019).
Determining the strengths and weaknesses
A great strength of the study is a large sample size of over 1000 and the use of well-constructed and easy-to-read heading for better understanding. Also, the use of figures, graphs, and tables make the article less cumbersome to read. Another strength is the implementation of the ethical principles of research by enabling informed consent and voluntary participation as well as confidentiality and anonymity of information.
On the other hand, the study has several weaknesses such as the use of “the theory of planned behavior to model intentions to reduce catheter use, but it is not possible to know if changes observed in staff perception led to a true change in practice” (Niederhauser et al, 2019). Another weakness of the study is the repeated survey design which allows assessment of changes in staff perspectives after implementation of a quality improvement intervention but the sustainability of the effects over time could not be evaluated.
Evaluating the credibility and trustworthiness of the study
Although the study used a larger sample size of over 1000, the “use of a single-group design and no control group weakens its credibility and trustworthiness because there are no causal inferences abou.
According to article Insecure Policing Under Racial Capitalism by.docxmakdul
According to article "Insecure: Policing Under Racial Capitalism" by Robin D.G. Kelley and the article "Yes, We Mean Literally Abolish the Police" by Mariame Kaba, the police are no longer an attribute of safety and security. The facts that are given in the articles are similar within the meaning of the content. The police do not serve for the benefit of the whole community. Racial and class division according to social status became the basis of lawlessness and injustice on the part of the police. Kaaba in his article cites several stories confirming the racial hatred that led to the murder of African Americans. After that, people massively took to the streets of many cities in several countries, demanding an end to racial discrimination and the murder of African Americans. Kelley's article describes numerous manifestos where demands for police abolition have been raised, but all have been rejected. In the protests, people suggested that they themselves would take care of each other, which the police could not do. I understand that the police system is far from ideal and the permissiveness of police representatives should be limited. Ruth Wilson Gilmore says that "capitalism is never racial." I think that this phrase she wants to say that the stronger people take away from the weak people and use them for their own well-being. And since the roots of history go back to slavery, then African Americans are the weak link. In this regard, a huge number of prisons and police power appeared. The common and small class do not feel protected, on the contrary; they expect a threat from people who must protect them. The police take an oath to respect and protect human and civil rights and freedoms, regardless of skin color and social status. If this does not happen, then you need to change the system.
.
Abstract In this experiment, examining the equivalence poi.docxmakdul
Abstract:
In this experiment, examining the equivalence point in a titration with NaOH identified an
unknown diprotic acid. The molar mass of the unknown was found to be 100.78 g/mol with pKa
values of 2.6 and 6.6. The closest diprotic acid to this molar mass is malonic acid with a percent
error of 3.48%.
Introduction:
The purpose of the experiment was to determine the identity of an unknown diprotic acid. The
equivalence and half-equivalence points on the titration curve give important information, which
can then be used to calculate the molecular weight of the acid. The equivalence point is the
moment when there is an equal amount of acid and NaOH. Knowing the concentration and
volume of added NaOH at that moment, the amount of moles of NaOH can be determined. The
amount of moles of NaOH is then equivalent to the amount of acid present. Dividing the original
mass of the acid by the moles present gave the molar mass of the acid.
In this particular titration, there were two equivalence points as the acid is diprotic.
Consequently, the titration curve had two inflection points. The acid dissociated in a two-step
process with the net reaction being:
H2X + 2 NaOH Na2X + 2 H2O
This was important to take into consideration when calculating the molar mass of the diprotic
acid. If the first equivalence point was to be used, the ratio of acid to NaOH was 1:1. If the
second equivalence point was used in the calculations, the ratio became 1:2 as now a second
set of NaOH molecules reacted with the acid to dissociate the second hydrogen ion. The
titration curve also showed the pKa values of the acid. This happened at the half-equivalence
point where half of the acid was dissociated to its conjugate base (again, because of the diprotic
properties of the acid, this happens twice on the curve). The Henderson Hasselbalch equation
pH = pKa+log(A-/HA)
shows that at the half-equivalence point, the pKa value equaled the pH and was visually
represented by the flattest part of the graphs.
Discussion:
The titration graph showed that the data was consistent with the methodology and proved to be
an precise execution of the procedure and followed the expected shape. One possible source of
error was the actual mass of the acid solid. While transferring the dust from the weigh boat to
the solution, some remained in the weigh boat this could have altered the molar mass
calculations and shifted the final the final mass lighter than actual.
The Vernier pH method was definitely a much more concrete method of interpreting the results.
It was possible to see which addition of NaOH gave the greatest increase in pH ( greatest 1st
derivative of the titration graph). The relying solely on the indicator color would make it very
difficult to judge at which precise point the color shifted most, as the shift was a lot more gradual
compared to the precise numbers. This may have been a more reliable method if there was a
de.
ACC 403- ASSIGNMENT 2 RUBRIC!!!
Points: 280
Assignment 2: Audit Planning and Control
Criteria
UnacceptableBelow 60% F
Meets Minimum Expectations60-69% D
Fair70-79% C
Proficient80-89% B
Exemplary90-100% A
1. Outline the critical steps inherent in planning an audit and designing an effective audit program. Based upon the type of company selected, provide specific details of the actions that the company should undertake during planning and designing the audit program.
Weight: 15%
Did not submit or incompletely outlined the critical steps inherent in planning an audit and designing an effective audit program. Did not submit or incompletely provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Insufficiently outlined the critical steps inherent in planning an audit and designing an effective audit program. Insufficiently provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Partially outlined the critical steps inherent in planning an audit and designing an effective audit program. Partially provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Satisfactorily outlined the critical steps inherent in planning an audit and designing an effective audit program. Satisfactorily provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Thoroughly outlined the critical steps inherent in planning an audit and designing an effective audit program. Thoroughly provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
2. Examine at least two (2) performance ratios that you would use in order to determine which analytical tests to perform. Identify the accounts that you would test, and select at least three (3) analytical procedures that you would use in your audit.
Weight: 15%
Did not submit or incompletely examined at least two (2) performance ratios that you would use in order to determine which analytical tests to perform. Did not submit or incompletely identified the accounts that you would test; did not submit or incompletely selected at least three (3) analytical procedures that you would use in your audit.
Insufficiently examined at least two (2) performance ratios that you would use in order to determine which analytical tests to perform. Insufficiently identified the accounts that you would test; insufficiently selected at least three (3) analytical procedures that you would use in your audit.
Partially examined at least two (2) performance ratios that you would use in order to determine which analytical tests .
ACC 601 Managerial Accounting Group Case 3 (160 points) .docxmakdul
ACC 601 Managerial Accounting
Group Case 3 (160 points)
Instructions:
1. As a group, complete the following activities in good form. Use excel or
word only. Provide all supporting calculations to show how you arrived at
your numbers
2. Add only the names of group members who participated in the completion
of this assignment.
3. Submit only one copy of your completed work via Moodle. Do not send it to
me by email.
4. Due: No later than the last day of Module 7. Please note that your professor
has the right to change the due date of this assignment.
Part A: Capital Budgeting Decisions
Chee Company has gathered the following data on a proposed investment project:
Investment required in equipment ............. $240,000
Annual cash inflows .................................. $50,000
Salvage value ............................................ $0
Life of the investment ............................... 8 years
Required rate of return .............................. 10%
Assets will be depreciated using straight
line depreciation method
Required:
Using the net present value and the internal rate of return methods, is this a good investment?
Part B: Master Budget
You have just been hired as a new management trainee by Earrings Unlimited, a distributor of
earrings to various retail outlets located in shopping malls across the country. In the past, the
company has done very little in the way of budgeting and at certain times of the year has
experienced a shortage of cash. Since you are well trained in budgeting, you have decided to
prepare a master budget for the upcoming second quarter. To this end, you have worked with
accounting and other areas to gather the information assembled below.
The company sells many styles of earrings, but all are sold for the same price—$10 per pair. Actual
sales of earrings for the last three months and budgeted sales for the next six months follow (in pairs
of earrings):
January (actual) 20,000 June (budget) 50,000
February (actual) 26,000 July (budget) 30,000
March (actual) 40,000 August (budget) 28,000
April (budget) 65,000 September (budget) 25,000
May (budget) 100,000
The concentration of sales before and during May is due to Mother’s Day. Sufficient inventory should
be on hand at the end of each month to supply 40% of the earrings sold in the following month.
Suppliers are paid $4 for a pair of earrings. One-half of a month’s purchases is paid for in the month
of purchase; the other half is paid for in the following month. All sales are on credit. Only 20% of a
month’s sales are collected in the month of sale. An additional 70% is collected in the following
month, and the remaining 10% is collected in the second month following sale. Bad debts have been
negligible.
Monthly operating expenses for the company are given below:
Variable:
Sales commissions 4 % of sales
.
Academic Integrity A Letter to My Students[1] Bill T.docxmakdul
Academic Integrity:
A Letter to My Students[1]
Bill Taylor
Professor of Political Science
Oakton Community College
Des Plaines, IL 60016
[email protected]
Here at the beginning of the semester I want to say something to you about academic integrity.[2]
I’m deeply convinced that integrity is an essential part of any true educational experience, integrity on
my part as a faculty member and integrity on your part as a student.
To take an easy example, would you want to be operated on by a doctor who cheated his way through
medical school? Or would you feel comfortable on a bridge designed by an engineer who cheated her
way through engineering school. Would you trust your tax return to an accountant who copied his
exam answers from his neighbor?
Those are easy examples, but what difference does it make if you as a student or I as a faculty member
violate the principles of academic integrity in a political science course, especially if it’s not in your
major?
For me, the answer is that integrity is important in this course precisely because integrity is important in
all areas of life. If we don’t have integrity in the small things, if we find it possible to justify plagiarism or
cheating or shoddy work in things that don’t seem important, how will we resist doing the same in areas
that really do matter, in areas where money might be at stake, or the possibility of advancement, or our
esteem in the eyes of others?
Personal integrity is not a quality we’re born to naturally. It’s a quality of character we need to nurture,
and this requires practice in both meanings of that word (as in practice the piano and practice a
profession). We can only be a person of integrity if we practice it every day.
What does that involve for each of us in this course? Let’s find out by going through each stage in the
course. As you’ll see, academic integrity basically requires the same things of you as a student as it
requires of me as a teacher.
I. Preparation for Class
What Academic Integrity Requires of Me in This Area
With regard to coming prepared for class, the principles of academic integrity require that I come having
done the things necessary to make the class a worthwhile educational experience for you. This requires
that I:
reread the text (even when I’ve written it myself),
clarify information I might not be clear about,
prepare the class with an eye toward what is current today (that is, not simply rely on past
notes), and
plan the session so that it will make it worth your while to be there.
What Academic Integrity Requires of You in This Area
With regard to coming prepared for class, the principles of academic integrity suggest that you have a
responsibility to yourself, to me, and to the other students to do the things necessary to put yourself in
a position to make fruitful contributions to class discussion. This will require you to:
read the text before.
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docxmakdul
Access the Center for Disease Control and Prevention’s (CDC’s)
“Nutrition, Physical Activity, and Obesity: Data, Trends and Maps”
database. Choose a state other than your home state and compare their health status and associated behaviors. What behaviors lead to the current obesity status?
Initial discussion post should be approximately 300 words. Any sources used should be cited in APA format.
.
According to DSM 5 This patient had very many symptoms that sugg.docxmakdul
According to DSM 5 This patient had very many symptoms that suggested Major Depressive Disorder.
Objective(s)
Analyze psychometric properties of assessment tools
Evaluate appropriate use of assessment tools in psychotherapy
Compare assessment tools used in psychotherapy
.
Acceptable concerts include professional orchestras, soloists, jazz,.docxmakdul
Acceptable concerts include professional orchestras, soloists, jazz, Broadway musicals and instrumental or vocal ensembles, and comparable college or community groups performing music relevant to the content of this class. (Optionally, either your concert report
or
your concert review - but not both unless advance permission is given - may be based on a concert of non-western music selected from events on the concert list.)
Acceptable concerts include the following:
• Symphony orchestras • Concert bands and wind ensembles • Chamber Music (string quartets, brass and woodwind quintets, etc.) • Solo recitals (piano, voice, etc.) • Choral concerts • Early music concerts • Non-western music • Some jazz concerts • Opera• Broadway Musicals• Flamenco• Ballet• Tango
Assignment Format
The following are required on the concert review assignment and, thus, may affect your grade.
• Must be typed• Must be double-spaced• Must be between
2 and 4 pages
in length
not including the cover sheet
.• Must use conventional size and formatting of text - e.g. 10-12 point serif or sans serif fonts with normal margins. • Must include the printed program from the concert and/or your ticket stubs. Photocopies are unacceptable. (Contact me at least 24 hours before due date if any materials are unavailable.)• All materials (text, program, ticket stub) must be
stapled
together securely. Folded corners, paper clips, etc. instead of staples will not be accepted.• Careful editing, proofreading, and spelling are expected, although minor errors will not affect your grade.
Papers that do not follow these format guidelines may be returned for resubmission, and late penalties will apply.
Concert Review Assignment Content
I. Cover Sheet:
Include the following on a cover sheet attached to the front of your review:
• Title or other description of the event/performers you heard, along with the date and location of the performance. For example:
New World Symphony Orchestra
1258 Lincoln Road
Saturday, June 5, 2013
Lincoln Road Theater, Miami Beach
• Your name, assignment submission date, course. For example:
Pat Romero
October 31, 2013
Humanities 1020 MWF 8:05 a.m.
II. Descriptions
The main body of the concert review should include brief discussions of
three of the
pieces
in the concert you attend. In most cases, a single paragraph for each piece should be sufficient, although you may wish to break descriptions of longer pieces into separate short paragraphs, one per movement.
Your description of each piece (song) should include:
• The title of the piece and the composer's name if possible, as listed in the concert program.• A brief description of your reaction to the piece. For example:
When the piece started I thought it was going to be slow and boring, but the faster section in the first movement made it more exciting. A really great flute solo full of fast and high notes in the third movement caught my attention. I'm not sure, but I thought that som.
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docxmakdul
ACA was passed in 2010, under the presidency of Barack Obama. Prior to this new act, there were plenty of votes that did not agree with the notion of accessible insurance. Before 2010, The private sector had been given coverage in such a way that Milstead and Short (2019) called it sickness insurance; meaning companies will risk incurring medical expenses as long as it was balanced by healthy people. They were doing so by excluding people that had pre-existing conditions, becoming a very solvent business (Milstead & Short, 2019). After ACA was passed that was no longer the case. When President Trump came into term he did so by bringing his own healthcare agenda, which attempted to repeal ACA, but ultimately failed to come up with a replacement.
In 2016, the Republican's party platform was to repeal ACA, while continuing Medicare and Medicaid, but on the other hand, democrats put down that Obamacare is a step towards the goals of universal health care, and that this was just the beginning (Physicians for a National Health Program, n.d.). As for the cost analysis of repealing the Affordable Care Act, this would increase the number of uninsured people by 23 million, and it will cost about 350 billion through 2027, as well as creating costly coverage provisions to replace it (Committee for a Responsible Federal Budget, 2017).
(2 references required)
.
Access the FASB website. Once you login, click the FASB Accounting S.docxmakdul
Access the FASB website. Once you login, click the FASB Accounting Standards Codification link. Review the materials in the FASB Codification, especially the links on the left side column. Next, write a 1-page memo to a friend introducing and explaining this new accounting research resource that you have found. Provide at least one APA citation to the FASB Codification and reference that citation using the APA guidelines.
.
Academic Paper Overview This performance task was intended to asse.docxmakdul
This document provides an overview of an academic paper performance task intended to assess students' ability to conduct scholarly research, articulate an evidence-based argument, and effectively communicate a conclusion. Specifically, the performance task evaluates students' capacity to generate a focused research question, explore relationships between multiple scholarly works, develop and support their own argument using relevant evidence, and integrate sources while distinguishing their own voice.
Academic Research Team Project PaperCOVID-19 Open Research Datas.docxmakdul
Academic Research Team Project Paper
COVID-19 Open Research Dataset Challenge (CORD-19)
An AI challenge with AI2, CZI, MSR, Georgetown, NIH & The White House
(1) FULL-LENGTH PROJECT
Dataset Description
In response to the COVID-19 pandemic, the White House and a coalition of leading research groups have prepared the COVID-19 Open Research Dataset (CORD-19). CORD-19 is a resource of over 44,000 scholarly articles, including over 29,000 with full text, about COVID-19, SARS-CoV-2, and related corona viruses. This freely available dataset is provided to the global research community to apply recent advances in natural language processing and other AI techniques to generate new insights in support of the ongoing fight against this infectious disease. There is a growing urgency for these approaches because of the rapid acceleration in new coronavirus literature, making it difficult for the medical research community to keep up.
Call to Action
We are issuing a call to action to the world's artificial intelligence experts to develop text and data mining tools that can help the medical community develop answers to high priority scientific questions. The CORD-19 dataset represents the most extensive machine-readable coronavirus literature collection available for data mining to date. This allows the worldwide AI research community the opportunity to apply text and data mining approaches to find answers to questions within, and connect insights across, this content in support of the ongoing COVID-19 response efforts worldwide. There is a growing urgency for these approaches because of the rapid increase in coronavirus literature, making it difficult for the medical community to keep up.
A list of our initial key questions can be found under the
Tasks
section of this dataset. These key scientific questions are drawn from the NASEM’s SCIED (National Academies of Sciences, Engineering, and Medicine’s Standing Committee on Emerging Infectious Diseases and 21st Century Health Threats)
research topics
and the World Health Organization’s
R&D Blueprint
for COVID-19.
Many of these questions are suitable for text mining, and we encourage researchers to develop text mining tools to provide insights on these questions.
In this project, you will follow your own interests to create a portfolio worthy single-frame viz or multi-frame data story that will be shared in your presentation. You will use all the skills taught in this course to complete this project step-by-step, with guidance from your instructors along the way. You will first create a project proposal to identify your goals for the project, including the question you wish to answer or explore with data. You will then find data that will provide the information you are seeking. You will then import that data into Tableau and prepare it for analysis. Next, you will create a dashboard that will allow you to explore the data in-depth and identify meaningful insights. You will then give structure .
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxmakdul
Abstract
Voice over Internet Protocol (VoIP) is an advanced telecommunication technology which transfers the voice/video over
high speed network that provides advantages of flexibility, reliability and cost efficient advanced telecommunication
features. Still the issues related to security are averting many organizations to accept VoIP cloud environment due to
security threats, holes or vulnerabilities. So, the novel secured framework is absolutely necessary to prevent all kind of
VoIP security issues. This paper points out the existing VoIP cloud architecture and various security attacks and issues
in the existing framework. It also presents the defense mechanisms to prevent the attacks and proposes a new security
framework called Intrusion Prevention System (IPS) using video watermarking and extraction technique and Liveness
Voice Detection (LVD) technique with biometric features such as face and voice. IPSs updated with new LVD features
protect the VoIP services not only from attacks but also from misuses.
A Comprehensive Survey of Security Issues and
Defense Framework for VoIP Cloud
Ashutosh Satapathy* and L. M. Jenila Livingston
School of Computing Science and Engineering, VIT University, Chennai - 600127, Tamil Nadu, India;
[email protected], [email protected]
Keywords: Defense Mechanisms, Liveness Voice Detection, VoIP Cloud, Voice over Internet Protocol, VoIP Security Issues
1. Introduction
The rapid progress of VoIP over traditional services is
led to a situation that is common to many innovations
and new technologies such as VoIP cloud and peer to
peer services like Skype, Google Hangout etc. VoIP is the
technology that supports sending voice (and video) over
an Internet protocol-based network1,2. This is completely
different than the public circuit-switched telephone net-
work. Circuit switching network allocates resources to
each individual call and path is permanent throughout
the call from start to end. Traditional telephony services
are provided by the protocols/components such as SS7, T
carriers, Plain Old Telephone Service (POTS), the Public
Switch Telephone Network (PSTN), dial up, local loops
and anything under International Telecommunication
Union. IP networks are based on packet switching and
each packet follows different path, has its own header and
is forwarded separately by routers. VoIP network can be
constructed in various ways by using both proprietary
protocols and protocols based on open standards.
1.1 VoIP Layer Architecture
VoIP communication system typically consist of a front
end platform (soft-phone, PBX, gateway, call manager),
back end platform (server, CPU, storage, memory, net-
work) and intermediate platforms such as VoIP protocols,
database, authentication server, web server, operating sys-
tems etc. It is mainly divided into five layers as shown in
Figure1.
1.2 VoIP Cloud Architecture
VoIP cloud is the framework for delivering telephony
services in which resourc.
This study examined a problem, used a particular method to do so, and found results that were interpreted. It concluded by recommending future research on the topic.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
Question 1The Uniform Commercial Code incorporates some of the s.docx
1. Question 1
The Uniform Commercial Code incorporates some of the same
elements as the Statute of Frauds. Under the Statute of Frauds,
certain contracts must be in writing to be enforceable. Research
the types of contracts that must be in writing under the Statute
of Frauds.
Do you agree with the contracts that need to be in writing and
explain why or why not? Imagine that you were asked to be part
of a team to draft revisions to the Statute of Frauds. What
changes or proposals would you make? Why?
Respond to this… The Statute of Frauds requires that certain
types of contracts be in writing to be able to be enforced. These
types of contracts include goods that are priced at $500 or more,
interest in land, promises to pay off debt, and contracts that
cannot be performed within one year, all of which have been
signed by the defendant to be enforceable. I do think that all of
these contracts should be in writing because it is a type of
safeguard of the resource to ensure that each party is
responsible for whatever the contract is regarding. For
example, if we did not have to sign for a car loan, the
responsible party that needs to pay the loan back could walk
away, and without a signature of agreement to the terms of the
loan, it would be hard for the company to fight for their money,
as there is no signature enforcing the agreement.
If I had to revise something with the Statute of Frauds, I would
change the contacts that cannot be performed within one year. I
think one year is a long time to let a contract slide. I feel that
six months sounds more reasonable. I guess if I was a business
and I did not get commitment to a contract for a whole year, I
feel this would greatly affect my business. I also think it might
be a harder fight to get whatever the other party is responsible
for as it was a year ago. As a business, I think I would want to
pursue a breach of contract in three or four months even. That
is a long time to not pay up.
2. Question 2
Let’s assume that you are interested in doing a statistical survey
and you use confidence intervals for your conclusion. Describe
a possible scenario and indicate what the population is, and
what measure of the population you would try to estimate
(proportion or mean) by using a sample.
· What is your estimate of the population size?
· What sample size will you use?
· How will you gather information for your sample?
· What confidence percentage will you use?
Let’s assume that you have completed the survey and now state
your results using a confidence interval statement. You can
make up the numbers based on a reasonable result.
Respond to this… had found a study in Australia and New
Zealand where they wanted to see if there was efficient care
when dealing with people that suffered from acute coronary
syndrome, that required an understanding of the sources of
variation in their care. Basically, they wanted to see if the
people that did not speak English well were receiving the same
amount of care as the English proficient ones. Basically, the
result was out of 4387 patients, 294 LEP (less efficient English
patients) were older (70.9 vs 66.3 years; P< 0.001), and higher
prevalence of suffering from high blood pressure (71.1% vs
62.8%; P=0.007), diabetes (40.5% vs 24.3%; P< 0.001), and had
kidney damage (16.3% vs 11.1%; P=0.007) compared to the
other 4093 (Hyun, et al., 2017). Once they were in the hospital,
there was no difference on how they received the care, they
were not treated differently. Patient demographics, medical
history, in hospital care, and acute and late outcomes were used
in this study to compare the two groups. A multiple-adjusted
regression model was used for length of stay, and multiple
adjusted logistic regression models were used for each of the
outcomes to estimate the offs ratios and corresponding 95%
confidence intervals (Hyun, et al., 2017). I think this
conclusion made since to me. If someone that doesn’t speak
3. English (or any language that is not native to the country that
you are in) will not seek out medical help for any issues
because they will not necessarily know what is happening and
would rather take their chances. I am at least glad to know that
once that patient reaches to the hospital they are treated just as
fairly as the English speaking patients.
Hyun, K., Redfern, J., Woodward, M., Briffa, T., Cher, D.,
Ellis, C., . . . . (2017, May/June). Is There Inequity in Hospital
Care Among Patients With Acute Coronary Syndrome Who Are
Proficient and Not Proficient in English Language?: Analysis of
the SNAPSHOT ACS Study. Is There Inequity in Hospital Care
Among Patients With Acute Coronary Syndrome Who Are
Proficient and Not Proficient in English Language?: Analysis of
the SNAPSHOT ACS Study, 288-295.
doi:10.1097/JCN.0000000000000342
Article
DOI: 10.1111/exsy.12138
Ordinal regression by a gravitational model in the field of
educational data mining
Pilar Gómez-Rey,1* Francisco Fernández-Navarro2 and
Elena Barberà1
(1) eLearn Center, Open University of Catalunya, Barcelona,
Spain
E-mail: [email protected]
(2) Department of Mathematics and Engineering, Universidad
Loyola Andalucia, Andalucia, Spain
Abstract: Educational data mining (EDM) is a research area
where the goal is to develop data mining methods to examine
4. data
critically from educational environments. Traditionally, EDM
has addressed the following problems: clustering, classification,
regression,
anomaly detection and association rule mining. In this paper,
the ordinal regression (OR) paradigm, is introduced in the field
of EDM. The
goal of OR problems is the classification of items in an ordinal
scale. For instance, the prediction of students’ performance in
categories
(where the different grades could be ordered according to A ≻
B ≻ C ≻ D) is a classical example of an OR problem. The EDM
community
has not yet explored this paradigm (despite the importance of
these problems in the field of EDM). Furthermore, an amenable
and
interpretable OR model based on the concept of gravitation is
proposed. The model is an extension of a recently proposed
gravitational
model that tackles imbalanced nominal classification problems.
The model is carefully adapted to the ordinal scenario and
validated with
four EDM datasets. The results obtained were compared with
state-of-the-art OR algorithms and nominal classification ones.
The
proposed models can be used to better understand the learning–
teaching process in higher education environments.
Keywords: educational data mining, ordinal regression models,
students satisfaction, gravitational models
1. Introduction
Educational data mining (EDM) is a recent framework based on
the application of data mining (DM) techniques to educational
problems (Oberreuter & Velasquez, 2013; Romero et al., 2013).
5. The main goal of EDM is to analyse educational data to find
patterns that can improve the quality of the learning process and
guide students’ learning (Romero & Ventura, 2007, 2010). The
knowledge discovered by EDM techniques may be useful for
teachers/instructors to manage their classes, understand their
students and reflect on their teaching methodologies. EDM has
contributed to the development of learning theories typically
investigated in the educational psychology field (Baker, 2010).
Siemens and d Baker (2012) described the similarities and
differences between learning analytics and EDM and concluded
that both fields are closely tied. EDM techniques can be applied
to data from both traditional classroom educational systems
(based on face-to-face contact) and to data coming from
distance
education environments (e-learning). It is important to note that
every type of education differs in nature and has different
objectives. Therefore, the conclusions obtained in these
environments will be also different. Currently, EDM techniques
have been used to address the following problems (Romero &
Ventura, 2007): data visualization and analysis, clustering,
classification, regression, outlier detection and association rule
learning. An explanation of each problem type can be found in
Appendix A.
On the other hand, ordinal regression (OR) problems are
those problems where the objective is to classify patterns in
an ordinal scale. For example, student satisfaction surveys
usually involve rating teachers based on an ordinal scale
{poor, average, good, very good and excellent}. Hence, the
class label has a natural order, that is, a pattern associated
with class label average has a higher rating (or better) than
another having class poor, but having class good is better
than both labels. This problem falls between nominal
classification, in which data are instead an unordered set,
and regression, in which data are instead a continuous,
totally ordered set. OR problems are also closely related to
7. the idea of a data-driven gravitational law (Wang & Chen,
2005; Zong-chang, 2008; Peng et al., 2009; Cano et al.,
2013). The underlying ideas of the DGMs are the following:
(a) there exists a force between any two patterns; (b) this force
follows Newton’s law of universal gravitation where the body
masses are substituted by a set of data points; and (c) the class
value of a test pattern is determined by comparing the force of
attraction between the pattern and the different classes.
Another goal of this paper is to propose a generalized force-
based model (GFM) specifically designed for OR problems
with educational purposes, extending in several ways to the
state-of-the-art DGMs. The outputs of the model are assumed
to be unimodal (da Costa et al., 2008). To impose this
constraint, the error function has been redefined to penalize
non-unimodal outputs. The proposed method extends to the
DGMs previously presented by considering, besides an
attribute-class weight matrix, a vector representing different
scaling of the class pattern interaction with the distance. The
model has been adapted to the characteristics of the problem
considered. Finally, the model parameters have been
optimized through the covariance matrix adaptation
evolution strategy (CMA-ES) global optimization algorithm
(Hansen & Ostermeier, 2001).
Summarizing, the main contributions of this paper are as
follows:
• To introduce the OR paradigm in the EDM community.
Most of the EDM problems require the classification of
object in an ordinal scale. Despite this, the EDM
community has not yet explored this paradigm.
• To propose a GFM that considers the particularities of
OR problems. The performance of the model proposed
was validated using two publicly available datasets and
one real-world educational problem used to analyse
8. students’ perceptions about online learning success
factors.
• For EDM problems, the accuracy of the model is equally
as important as its interpretability because EDM
techniques should be applied by practitioners (not just
by researchers) (Lin et al., 2013). Therefore, it is
important to apply and develop interpretable and
amenable models. Accordingly, the high interpretability
of the proposed models was also demonstrated
considering four OR EDM problems.
The remainder of the paper is organized as follows: a brief
analysis of some OR educational problems that were treated
as non-ordinal ones is provided in Section 2. Section 3
describes the case of studies considered in this research
work. Section 4 depicts the main ideas of the model
proposed. Section 5 presents the experimental framework
and the results obtained, while the model interpretability is
discussed in Section 6. Section 7 summarizes the
achievements and outlines some future developments of
the proposed methodology. Finally, a short but useful
glossary of technical terms that may be encountered in the
world of expert systems and artificial intelligence is included
in the Appendix C.
2. Some examples of ordinal regression educational
problems addressed without an ordinal regression technique
In this section, some examples of educational ordinal
problems that were addressed with the inappropriate
technique will be described. As we will discuss later, OR
problems can be easily simplified to other standard data
mining problems. In the EDM community, OR problems
have been traditionally tackled using classification or
standard regression approaches that generally involve
10. Vol. 33, No. 2
accomplished after graduating was the most
important variable to explain the student’s
satisfaction variable. From a different perspective,
Roberts and Styron Jr (2010) analysed students’
perceptions of services, interactions and experiences,
taking into account students from the College of
Education and Psychology (Southern University of
Mississippi, United States). The questionnaire was
related to academic advising, social connectedness,
involvement and engagement, faculty and staff
approachability and others. The application of
discriminant analysis to these data revealed that
the learning experience variables were the most
significant to be considered in the evaluation of
students’ satisfaction, while the Social
Connectedness and Involvement and Engagement
variables were the least significant ones in the
determination of students’ satisfaction.
○ Predicting students’ performance: Minaei-Bidgoli and
Punch (2003) proposed a genetic algorithm (GA) to
optimize a combination of classifiers such as quadratic
Bayesian classifier, 1-nearest neighbour (1-NN), k-
nearest neighbour (k-NN), Parzen-window, multi-
layer perceptron (MLP) and decision tree (DT) to
predict the students’ final grade. They took into
account features extracted from data logged in an
education web-based system. Some of these features
were the success rate, the number of attempts before
the correct answer is provided or the difference
between time of the last submission and the first time
the problem was examined. The final assessment
11. showed that the total number of correct answers and
the total number of tries are the most important
factors for the classification. From a different point
of view, Bhardwaj and Pal (2011) also tried to predict
the performance of students. They proposed a
categorization of students of the current year based
on the analysis carried out with the students of the
previous year. To evaluate the effectiveness of their
Bayesian classifier, the study used variables such as
the mother’s qualification, the student’s habits, the
annual family income, the students’ family status or
the living location, among others. Their main finding
was that the academic performance of students does
not only depend on their own effort.
• Ordinal regression problems addressed with a regression
approach:
○ Predicting students’ satisfaction: Analysing the paper of
Sun et al. (2008) allows us to discover the main factors
affecting learner satisfaction in e-learning. Factors such
as the attitude and the motivation of the learners, the
instructor’s performance, the design of the courses, the
available technology and the environment were
considered in this study. The findings support that
learner computer anxiety, instructor attitude towards
e-learning, e-learning course flexibility, e-learning
course quality, perceived usefulness, perceived ease of
use and diversity in assessments are the critical variables
affecting learners’ perceived satisfaction. This study
employed a stepwise multiple regression analysis.
Additionally, the research of Chang and Smith (2008)
explored the correlation between students’ perceptions
of course-related interaction and their course
satisfaction within the learner-centred paradigm in
12. distance education. The results demonstrated that
student–instructor personal interaction, student–
student personal interaction and student–content
interaction, along with students’ perceptions of WebCT
features and gender, really matter. A multiple linear
regression was used to prove the significance of the
variables and to model the educational problem.
○ Predicting students’ performance. Through a sample of
71 schools, Tanner (2009) analysed student performance
across three school design factors: movement and
circulation, day lighting and views. Hence, reading
comprehension, reading vocabulary, language arts,
mathematics, social studies and science were the
variables considered in the study. The prediction of
student performance was carried out through regression
analysis. The main conclusions of the paper were the
following: (a) a crowded school has a negative influence
on student performance; (b) day lighting impides on the
variables in the scores obtained in science and reading
vocabulary; and (c) views affect patterns of reading
vocabulary, language arts and mathematics allowing
the provision for the students to rest their eyes. Akiri
and Ugborugbo (2009) also investigated this topic. Their
paper attempts to model the influence of teachers’
classroom effectiveness on students’ academic
performance in public secondary schools in Delta State,
Nigeria. Factors such as lesson preparation and
Table 1: Summary of the literature review results
Predicting students satisfaction
Paper Approach Models
Atay and
13. Yildirim (2010)
Classification CT
Roberts and
Styron Jr (2010)
Classification Discriminant analysis
Sun et al. (2008) Regression Multiple linear regression
Chang and
Smith (2008)
Regression Multiple linear regression
Predicting students performance
Paper Approach Models
Minaei-Bidgoli
and Punch (2003)
Classification Quadratic Bayesian,
K-NN, Parzen-window,
MLP, DT
Bhardwaj and
Pal (2011)
Classification Bayesian classifier
Tanner (2009) Regression Linear regression
Akiri and
Ugborugbo (2009)
Regression Linear regression
15. 3.1. Turkiye student evaluation
The Turkiye Student Evaluation (TSE) dataset is composed
of 5820 evaluation scores provided by students from Gazi
University in Ankara (Turkey) (Gündüz & Fokoué, 2013).
The dataset is publicy available in the UCI Machine
Learning repository.2 Each participant was asked 28
education-related questions. The questionnaire is listed in
Appendix B. In the original dataset, 2835 students out of
the total 5280 students provided the same score. These
evaluators were called single-minded evaluators (taking into
account the zero variation nature). Following the
recommendations of Gündüz and Fokoué (2013), two
datasets were considered in this study: the TSE dataset
including the single-minded evaluators (TSE-I-SME) and
the TSE dataset without including the single-minded
evaluators (TSE-W-SME). Furthermore, five attributes
were also taken into account in the study. These attributes
were the instructor’s identifier, the course code, the number
of times the student took the course, the level of attendance
and, finally, the level of difficulty of the course as perceived
by the student. The complete set of attributes considered in
this study are the following:
• Professor(P).Thisisanominal attributecomposedofthree
values (three professors were considered for the study).
• Subject (S). The course code is also a nominal variable. In
this case, the variable was defined with 13 values (13
subjects were considered for the study).
• Repetitions of the course (R). It is an integer attribute with
ranging values from 0 to 4 (the student with the most
repetitions was a student with four repetitions).
16. • Attendance level (A). The Attendance attribute is defined
in ordinal scale with the following possible values: {poor,
minimal, good, very good, excellent}.
• Difficulty level (D). The Difficulty attribute examined in the
study is an ordinal variable as well. This ordinal variable
ranges from Too easy to Too difficult, with the following five
possible values: {Too easy, Easy, Normal, Difficult, Too
difficult}.
In order to compare our results and discussions with those
obtained by Gündüz and Fokoué (2013), the dependent
variable is built through a clustering process for this specific
problem. Therefore, cluster analysis is applied to identify
potential groups in the way students rate their professors.
For the sake of simplicity, the k-Means algorithm is used
to determine the degree of satisfaction of each student. The
number of clusters (classes) was determined according to
the accumulated variance explained by the number of factors
selected. In our case, the optimum number of clusters was
three. After analysing the scores associated with each class,
we proceeded to label the three clusters. The labels for each
cluster were as follows: {Dissatisfied, neutral, satisfied}
modelling in that way the students’ satisfaction level.
3.2. Teaching assistant evaluation
Teaching Assistant Evaluation (TAE) is composed of
evaluations of teaching performance over three regular
semesters and two summer semesters of 151 teaching assistant
(TA) assignments at the Statistics Department of the
University of Wisconsin-Madison. The dataset is publicy
available in the UCI Machine Learning repository.3 The
performance of each teacher is measured with an ordinal
variable with three different levels: low performance, medium
18. 3.3. Culture and learners satisfaction
This research was carried out with a sample of students in
four online universities: the Open University of Catalonia
in Spain, the University of New Mexico in the United States,
the University of Peking in China and the Autonomous
Popular University of the State of Puebla in Mexico. The
majority of the participants were enrolled in online social
sciences courses (mainly Education or Psychology studies).
Data were collected through a survey of 709 participants.
This dataset was analysed by Barbera and Linder-Van
Berschot (2011) using statistical tests. This study will use an
OR approach. The dependent variable is learner satisfaction
(LST), while the independent ones are eight institutional
factors as follows:
(a) Learner support (LS);
(b) Social presence (SP) measuring the degree to which the
instructor seems to be concerned about the learners needs;
(c) The degree of effectiveness of the teaching strategies of
the instructor (also called Instruction (I));
(d) The quality of the Learning Platform (LP);
(e) Instructor interaction (II);
(f) Learner interaction (LI);
(g) Learning content (LC);
(h) Course design (CD).
Finally, it is also important to note that all variables are
measured with a four-point Likert scale with the following
options: strongly disagree (SD), disagree (D), agree (A)
and strongly agree (SA).
4. The method proposed: a gravitational model for ordinal
regression
19. This section presents the proposed algorithm. Firstly, the
ordinal regression scenario is described. Secondly, the
definition of force and distance and the probabilistic
interpretation of the force model are presented. Thirdly,
the error function used as objective function is introduced
and motivated, and finally, the procedures used to estimate
the parameters of the model are discussed.
4.1. Ordinal regression scenario
In the ordinal regression problem, a training sample set
D ¼ xn; ynð Þf gNn¼1 is available, where xn = (x1n, …, xKn)
is
the vector of input variables taking values in the input
space Ω ⊂ ℝK and the label, yn, belongs to a finite set
C = {C1, …, CJ}. Moreover, there is an order relation
between these labels, such as C1 ≺C2 ≺…CJ, where ≺ denotes
the given order between different ranks. For the proposal, the
‘1-of-J’encodingvectorisadopted.Forthatreason,eachtarget
has been encoded asyn ¼ y 1ð Þn ; y 2ð Þn ; …; y Jð Þn
� �
withy jð Þn ¼ 1 if the
pattern is from class j, and y jð Þn ¼ 0 if it is not. Clearly it
stands
that ∑Jj¼1 y
jð Þ
n ¼ 1 for every n∈ {1,…,N}.
4.2. Force definition
4.2.1. Definition of force as defined in Cano et al. (2013)
20. The definition of force as proposed by Cano et al. (2013) is
described first. Cano et al. (2013) weighted the gravitation
of a class by its number of patterns and the total number
of patterns.4 In that way, the gravitation of a pattern x
for a class j was defined as
g x; jð Þ ¼ G ∑
Nj
n¼1
1
d xn; x; jð Þ2
; xn ∈ Cj (1)
G :¼ 1 � Nj � 1
N
� �
(2)
where Nj is the number of patterns of the class j and N is the
total number of patterns. Furthermore, Cano et al. (2013) used
a weight matrix W∈ ℝJ ×ℝK to define the importance of each
attribute in each class. This matrix was applied to the distance
calculation in their gravitational model. Therefore, the
distance proposed in their work is defined as follows:
d x1; x2jð Þ ¼
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
ffiffiffiffiffiffiffiffiffiffiffiffiffi
∑
K
k¼1
22. gravitational forces existing between the pattern considered
and the different classes. The pattern will adopt the label of
the class with the highest gravitational force.
4.2.2. Definition of force for the ordinal regression case In
the OR case, the model must take into account the ordinal
information of the labels. For the sake of simplicity, suppose
you have a problem with J=3 classes ordered as C1 ≺C2 ≺C3.
Figure 1 represents the input space of this hypothetical ordinal
regression problem.
Given a new test pattern x1, according to the gravitational
models, the gravitational forces of this pattern with respect
to the three classes have to be estimated. Assuming a
Euclidean distance, the gravitational forces (computed as
in proposed in Cano et al. (2013)) for the test pattern x1 are
g(x, C1) = 20.132, g(x, C2) = 1.734 and g(x, C3) = 23.006.
The highest gravitational force is g(x, C3). C3 is then
attributed to the test pattern. If there is no order relation
between the classes, the second highest gravitational force
is g(x, C1). However, if the classes are ordered, C2 is closer
to C3 than C1, and therefore, the second highest gravitational
force should be attained in this class. To generalize, the
forces associated to each class should follow a unimodal
distribution, that is, they should present only one maximum,
which should be absolute. This idea was already applied in
the context of neural networks (da Costa et al., 2008).
To preserve the ordinal information of the different
classes, two approaches could be applied as follows:
• Modification of the distance: The first possibility to modify
the force is to directly modify the distance allowing the
ordering of the class labels for the pattern considered. There
23. are many possible choices for the definition of this distance.
The most natural choice is to employ a matrix G∈ ℝK ×ℝK
so that the distance between two patterns is computed as
xTGx, like in the Mahalanobis distance case. Another
possibility is to adopt the definition of distance of Cano
et al. (2013) (also called the weighted Euclidean distance).
Depending on the choice of the distance, the interpretability
of the model will be different. In fact, the elements of the
matrix G are a measure of the correlation between the
different attributes of the given dataset, whereas the
elements of the matrix W∈ ℝJ ×ℝK indicate theimportance
of an attribute in the classification with respect to a certain
class. In our study, both possibilities will be considered
(extending in this direction previous works that only consider
the weighted Euclidean distance for gravitational models).
• Modification of the force: Another possibility, in the
example of 1, to reduce the value of gravitation in C1 is
to act on the definition of the force itself. For example, one
could define a general force law of a pattern x for a class j as
g x; jð Þ ¼ 1 � Nj � 1
N
� �
∑
Nj
n¼1
1
d xn; x; jð Þ þ aj
� �vj ; xn ∈ Cj; (4)
24. where Nj is the number of patterns of the class j, N is the total
number of patterns and the distance is defined as in Equation
(3).
Note that in the aforementioned definition, one parameter
vj for each class is considered and that, when the distance
tends to zero, the force tends to infinity. To have a proper
control over the force value, the aj ∈ ℝ parameter is introduced
in the definition of force and is calculated for each class as
aj ¼
1
maxForce
� �1
vj
; (5)
where maxForce is the maximum value of force allowed.
4.3. Probabilistic interpretation of the forces
The order is included in the model following a cost-sensitive
approach, penalizing non-unimodal distributions of the
force outputs. After this procedure, a multinomial logit
formulation could be applied to define the probabilities of
each force. Therefore, for robustness of the optimization
process, the force for each class is normalized according to
the softmax activation function (Bishop, 2007). The softmax
activation function maps the range of the force for the j-th
class, into the interval [0, 1] with the additional property that
the sum of the forces of a pattern towards all classes is one.
This transformation can be seen as an estimation of the a
posterior probability of a pattern to be classified as a
25. member of each class. The softmax function for the force-
based model proposed is defined as
P Cljxð Þ ¼
exp g x; lð Þð Þ
∑Jj¼1 exp g x; jð Þð Þ
; (6)
where P(Cl|x) is the a posterior probability of the pattern x to
belong to Cl and g(x,j) is defined as in Equation (4). This
transformation allows us to have the forces in the same scale
that the targets labels (because the 1-of-J encoding is adopted
in this work).
4.4. Error function formulation
As previously stated, the forces (or the a posterior
probabilities) obtained for a given pattern x must follow a
−1 0 1 2 3 4 5 6 7 8 9
−1
0
1
2
3
4
5
6
27. � �
� 1
� �2
þ 1 � y jð Þn
� �
cnjP Cjjxn
� �2�
(7)
where cnj is the cost associated with the pattern n for the jth
class. As can be seen in Equation (7), the error function
penalizes non-unimodal outputs. The total cost matrix is
obtained as C = Y × M, where Y is the matrix representing
the ‘1-of-J’ encoding and M is a well-known cost matrix.
For example, the absolute cost matrix (mij = |i � j|), the
quadratic cost one (mij = |i � j|2) or the zero–one cost
matrix. Note that the zero–one cost matrix is the one
assumed in nominal classification. In this study, the
penalization function with quadratic cost terms achieved
the best trade-off between convergence of the optimization
problem, quality of the solution and the related classification
performance. Therefore, the quadratic cost matrix is used for
the proposed model.
4.5. Parameter estimation
The optimization of the W or the G matrices and the v vector is
a
continuous optimization problem whose dimension J� K+J or
K� K+J depends on the number of dimensions and the number
of classes. To estimate the parameters of the model, an
evolutionary algorithm is considered. Evolutionary algorithms
have been successfully applied to estimate the parameters of
28. machine-learning models in recent years Fernández-Navarro
et al. (2012); Mirchevska et al. (2014). Specifically, the CMA-
ES algorithm Hansen and Ostermeier (2001) was used to
determine the optimization variables (the W or the G matrix
and the v vector). The CMA-ES algorithm is an evolutionary
algorithm (global optimization procedure) for difficult non-
linear non-convex optimization problems in continuous domain.
Furthermore, the initial values for the W are set to 1.0
and for the v to 2.0, that is, all dimensions initially
considered equally relevant and the Euclidean distance is
assumed. The correlation matrix, G, was initialized to have
zero correlation between the different input variables (the
matrix was initialized to be equal to the identity matrix).
4.6. Summary of methodologies
The algorithm proposed has several variations according to
the cost matrix used (nominal or ordinal classification) and
to the distance considered (the weighted Euclidean or the
Mahalanobis distance). The different combinations are
summarized as follows:
• Nominal approaches:
○ Generalized force-based model with a zero–one cost
and the Mahalanobis distance GFMMZOC
� �
.
○ Generalized force-based model using a zero–one cost
and the weighted Euclidean distance GFMWEZOC
� �
.
29. • Ordinal regression approaches:
○ Generalized force-based model assuming a quadratic
cost and the Mahalanobis distance GFMMQC
� �
.
○ Generalized force-based model considering a quadratic
cost and the weighted Euclidean distance GFMWEQC
� �
.
5. Computational experiments and results
This section presents the experimental study performed to
validate the new algorithms. In Section 5.1, the measures
employed to evaluate the performance of the algorithms and
the description of the algorithms chosen for the comparison
and their relevant parameters are given. The results of the
different methods selected are provided in Section 5.2.
5.1. Experimental design
For comparison purposes, different state-of-the-art methods
have been included in the experimentation. These methods
are the following:
• Nominal classifiers
○ The multi-logistic regression (MLR) algorithm. It is
based on applying the LogitBoost algorithm with
31. for ordinal multi-class categorization problems. This is
one of the first models specifically designed for ordinal
regression, and it arose from a statistical background.
For educational purposes, this model was used in Yay
and Akıncı (2009) and Liu (2009).
○ Support vector ordinal regression (SVOR) by Chu and
Keerthi (2005, 2007) proposes two new support vector
approaches for ordinal regression. In this study, the
two approaches proposed are considered: the SVOR
with explicit constraints algorithm (SVOREX) and the
SVOR with implicit constraints method (SVORIM).
All SVM classifiers were run using tools available in the
libsvm library (version 3.0) (Chang & Lin, 2001). The authors
of SVOREX and SVORIM provide software tools of their
methods.5 The mnrfit function of MATLAB (MathWorks,
Natick, MA, United States) was used for training the POM
model. The MLP and MLR methods were run using Weka’s
tools.6 Finally, the RNN method was implemented following
the suggestions by the authors Fernández-Navarro et al. (2013).
Regarding the hyper-parameters of different algorithms,
the following procedure has been applied. For the support
vector algorithms, that is, SVC, SVOREX and SVORIM,
the corresponding hyper-parameters (regularization
parameter, C and width of the Gaussian functions, γ) were
adjusted using a grid search with a fivefold cross-validation,
with the following ranges: C ∈ {103, 101, …, 10� 3} and
γ ∈ {103, 100, …, 10� 3}. For the neural network algorithms,
that is, MLP and RNN, the corresponding hyper-
parameters (number of hidden neuron, H, and number of
iterations of the local search procedure, iterations 7) were
adjusted using a grid search with a fivefold cross-validation,
considering the following ranges: H ∈ {5, 10, 15, 20, 30, 40}
32. and iterations ∈ {25, 50, …, 500}. For the MLP method,
the learning rate was set to 0.3 and the momentum to 0.2.
Two evaluation metrics were considered to validate the
performance of the different models: (a) the Accuracy
(Acc) and (b) the mean absolute error (MAE). Acc is the
correct classification rate
Acc ¼ 1 � 1
N
∑
N
i¼1
I y�i ≠ yi
� �
¼ 1 � MZE; (8)
where yi is the true label, y
�
i is the predicted label, N is the
number of patterns and I(�) corresponds to the zero–one loss
function. Hence, MZE is the mean zero error. The MAE is
the average deviation in absolute value of the predicted rank
from the true one
MAE ¼ 1
N
∑
N
i¼1
O yið Þ � O y�i
33. � � ; (9)
where O yið Þ � O y�i
� � is the distance between the true and
predicted ranks. The first measure is simply the fraction of
correct predictions on individual samples. The second
metric is defined as the average deviation of the prediction
from the true targets. These two measures aim to evaluate
different aspects when an OR problem is considered:
accuracy measures that patterns are generally well classified
and the MAE measures that the classifier tends to predict a
class as close to the real class as possible.
Finally, regarding the evaluation of the performance of
the different methods, multiple random splits of the
datasets were considered. For the educational OR
problems, 30 splits with 50 % and 50 % of the instances
in the training and test sets were considered, respectively.
All the partitions were the same for all the methods
evaluated, and one model was trained and evaluated for each
split. A similar experimental setup was performed in a recent
review of ordinal models Gutiérrez et al. (2012).
5.2. Results
The gravitation-based methods were compared with the
well-known nominal classification, OR and regression
techniques described in Section 5.1, using the OR metrics.
Table 2 shows the overall generalization results obtained
with the different techniques tested. A descriptive analysis
of the results leads to the following remarks: (a) The
GFMMQC methods achieved the best results in two datasets
and the second best result in one case using the MAEG
metric as the test variable, while the GFMWQC achieved the
best performance in one dataset and the second best results
34. in another problem using the same metric. (b) The
gravitational ordinal models are still competitive in AccG,
achieving the best results in two problems and the second
best results in other two problems. As can be observed,
the POM model is not able to reflect non-linear
relationships among input variables, necessary for
performing a realistic classification task. It is important to
highlight that this was the model that was tested in Yay
and Akıncı (2009) and in Liu (2009). In general, OR
models tended to outperform their nominal counterparts
(the SVORIM and the SVOREX methods obtained better
results than their nominal version, the SVC).
Finally, each pair of algorithms is compared by means of
the Wilcoxon test Demsar (2006). A level of significance of
α = 0.05 was considered, and the corresponding correction
for the number of comparisons was also included. The
control method was the GFMMQC method because it obtained
the best mean ranking specially in the MAEG metric
(especially useful in ordinal problems). As shown in Table 2,
the GFMMQC yields the state-of-the-art in the OR field.
6. Discussions
In this section, we analyse the force-based ordinal models
(both the model based on the Mahalanobis distance, the
GFMMQC method and the one based on the weighted Euclidean
5SVOREX and SVORIM methods source code available at
http://
gatsby.ucl.ac.uk/ chuwei/svor.html
6Weka: http://www.cs.waikato.ac.nz/ml/weka/
7The iterations in the MLP method correspond to the training
time
required
37. RNN 54.564.76 0.47970.05 3.0E � 11∘ 2.2E � 7∘ 60.121.03
0.50540.06 3.0E � 11∘ 8.1E � 10∘
POM 50.447.73 0.49620.07 3.0E � 11∘ 7.7E � 6∘ 57.231.43
0.56890.05 3.0E � 11∘ 3.0E � 11∘
SVOREX 57.895.82 0.44110.06 0.0040∘ 0.0300∘ 67.800.89
0.42350.07 5.9E � 5∘ 0.6843
SVORIM 57.635.71 0.40110.07 1.94E � 4∘ 0.9823 68.711.34
0.42690.03 0.4733 0.9589
GFMMQC 59.186.40 0.39830.05 — — 68.902.14 0.42740.05 —
-
GFMWEQC 59.406.40 0.39110.05 — — 67.121.99 0.43120.07
— -
MLR, multi-logistic regression; SVC, support vector
classification; MLR, multi-layer perceptron; RNN, regression
neural network model; POM,
proportional odd model; SVOREX, support vector ordinal
regression with explicit constraints algorithm; SVORM, support
vector ordinal
regression with implicit constraints; TSE-I-SME, Turkiye
student dataset including the single-minded evaluation; TSE-W-
SME, Turkiye student
dataset without including the single-minded evaluation; TAE,
Teaching assistant evaluation; CLS, Culture and learners
satisfaction.
The best result is in bold face and the second one in italics
∘ : The null hypothesis that results provided by the comparison
method and the results ofGFMMQC are samples continuous
distributions with equal medians is rejected
8The contingency or confusion matrix CM for a classification
problem
with J classes and N training or generalization patterns is given
by the
following expression:
38. M ¼ nij; ∑
J
i;j¼1
nij ¼ N
( )
(10)
where nij represents the number of times the patterns are
predicted by
classifier g to be in class j when they really belong to class i.
The diagonal
corresponds to correctly classified patterns and the off-diagonal
to mistakes
in the classification task.
Table 3: Statistical values of the best GFMWEQC model
Best GFMWEQC ordinal regression model
AccT ¼ 100:00%; AccG ¼ 92:80%
MAET ¼ 0:0000; MAEG ¼ 0:0832
CMT ¼
648 0 0
0 507 0
0 0 213
0
[email protected]
1
CA; CMG ¼
40. to students’ views (Q22), instructor’s positive approach to
students (Q21), instructor readiness for classes (Q14), instructor
explanations about the course and instructor helpfulness (Q20).
On the other hand, the least important variables to explain
student satisfaction ratings were the following (in this order):
new perspective of students’ life and world (Q12), clearness of
course aims (Q1), subject (S), difficulty (D), attendance (A),
professor (P) and number of repetitions of the course (R). It
can be seen from these results that the best indicators of student
satisfaction are those related to professor competencies.
Specifically, the students tend to consider the variables related
to the professor more important, giving less importance to the
variables related to the effect of learning and the course design.
These results align with previous research that claims that the
learner’s satisfaction is positively correlated with quality of
learning outcomes. For example, Palmer and Holt (2009)
justified the importance of adopting an interactive learning
approach instead of a planned learning approach where the
learners’ satisfaction is promoted mainly through the elements
existing in the educational interaction (instead of basing the
learners’ satisfaction in the preparation of the lectures and in
the content taught during the lectures). These results also
validate the work of Chang and Smith (2008), where the
importance of the educational interaction for learner
satisfaction is strongly emphasized. Furthermore, our work is
also in line with the works of Bangert (2008) and Shea and
Bidjerano (2009), where the importance of the social presence
in educational environments is highlighted. Differing from the
study of Atay and Yildirim (2010), our learners do not consider
the elements of learning transfer for their academic satisfaction
important; instead, they focus on the elements of the
instructional moment. It is also worth highlighting that this
study contradicts the traditional belief that the student
satisfaction is highly correlated with the difficulty of the course
as perceived by the learners. Unfortunately, this study has not
considered all the variables affecting learner satisfaction
41. reported in the learner satisfaction literature (Yukselturk,
2009). For example, the educational level, the self-efficacy or
the locus of control variables were not included in this study.
Finally, we compare our work with that of Gündüz and
Fokoué (2013); in particular, we discuss the similarities and
differences of the two studies. Gündüz and Fokoué (2013)
concluded that the Q10, Q14, Q20 and Q24 questions were the
most important variables to explain student satisfaction ratings.
In the study of Gündüz and Fokoué (2013), learners give more
importance to individual questions and structural aspects related
to the design of the learning process in contrast to what has
been
found in our study. This study also shares some similarities with
our study. For example, both studies consider the instructor
readiness for classes and the instructor’s positive approach to
students to be very important. The differences between the two
studies can be justified for the following reasons. Firstly,
Gündüz and Fokoué (2013) included the single-minded
evaluators in their dataset, while in the TSE-W-SME, these
evaluators were discarded. Secondly, Gündüz and Fokoué
(2013) applied a nominal classifier to detect the most
important variables, ignoring the ordinal information existing
in the dependent variable. Taking into account the ordering
information, our study was able to outperform the base
classifier adopted in the study of Gündüz and Fokoué (2013).
6.2. Analysis of the best GFMMQC model
In this section, we analyse the performance of the
bestGFMMQC
model, interpreting its coefficients as a way of improving the
learning–teaching process. Table 4 shows the statistical results
of the best model implemented. As can be seen in the CMs in
Table 4, the model promotes the ordering among the different
classes. There are less errors between not adjacent classes than
42. between adjacent ones. For example, considering the test set,
there are eight students classified as Neutral when they should
be classified as Satisfied and just two students that were
classified as Dissatisfied, being Satisfied students.
On the other hand, we also analyse the coefficients of the
G ∈ ℝK × ℝK matrix. The elements of the matrix G are a
measure of the correlation between the different attributes
of the given dataset. The G matrix represents the existing
covariance between the independent variables. In this
section, we focus our attention on the existing correlations
detected by the algorithm for the ordered variables (numeric
and Likert variables).9 It is important to note that these
9Note that all nominal variables were transformed to binary
variables
generating k variables per attribute, where k is the number of
possible
values of the nominal attribute.
Table 4: Statistical values of the best GFMMQC model
Best GFMMQC ordinal regression model
AccT ¼ 100:00%; AccG ¼ 96:47%
MAET ¼ 0:0000; MAEG ¼ 0:0409
CMT ¼
648 0 0
0 507 0
0 0 213
0
[email protected]
44. According to that, having top-level knowledge allows the
teachers to effectively use his/her teaching hours. This
synergy has an important effect in the final student
satisfaction rating as shown in the previous section. On the
other hand, the instructor’s coherence with the lesson plan
(Q15) variable is significantly correlated to the following
variables: openness and respect of the instructor to students’
views (Q22), instructor’s positive approach to students
(Q21), instructor readiness for classes (Q14) and instructor
explanations about the course and instructor helpfulness
(Q20). Taking into account the existing correlations
between the most important variables, we recommend that
the instructors focus on the two following ones:
• The instructor’s knowledge (Q13): Improving this
variable, we can also improve the second most important
variable (instructor’s effective use of the class hours
(Q19)). This finding allows us to discover a new point
of view in the traditional overview of a university
professor. Subject matter knowledge is important,
however, in the teaching–learning process, it is necessary
to have a professor who can communicate his/her
knowledge effectively (an effective professor). The work
of Gibbs and Coffey (2004) showed that there were
significant positive changes with respect to his/her
effectiveness in trained teachers and negative changes in
untrained teachers. In fact, this is one of the reasons
why the professor training in universities around the
world is so appreciated. So, it is critical to pay special
attention to the training of professors. Because of this
theory, student give to the effective use of the class hours
variable an organizational and personal status because they
have no sense of wasting time in class. The duo composed
of the knowledge of the professor variable and the
methodology applied variable is extended to a triplet in this
study (by the inclusion of the effective use of hours
45. variable). In this new framework of learning, the feeling
of learning governs the experience of learning. For
knowing the scope of the aforementioned, these
correlations should be linked to learning outcomes. Thus,
we would have an external measure of the students’
perceptions about what gives them greater academic
satisfaction.
• The instructor’s coherence with lesson plan (Q15):
Controlling this variable, the instructor may yield high
rates also in the following next four important variables
(Q22, Q21, Q14 and Q20). The teachers’ coherence in
their teaching–learning method directly affects the
student’s academic satisfaction. Empirically, we have
proved that the participation that teachers allow to their
students is a powerful variable in the determination of
the student’s satisfaction rating. Thus, students do not
have a good perception of a professor who gives a
traditional lecture (without any interaction). They
appreciate it when the professor follows the learning plan
rigorously, interacts with them taking into account their
previous knowledge and experiences in a positive way
and is willing to help in their learning. It stresses the
importance of leaving the traditional teaching method
(where the only interaction with the learners is in the
transfer of the professor’ knowledge to the students) to
adopt a more interactive teaching method (focused on
enhancing students skills, promoting that students are
able to continue the quest for knowledge throughout their
studies). On the other hand, the inquiry-based learning
approach promotes the social presence, the cognitive
presence and the teaching presence Garrison (2011). All
these variables were highlighted as key variables in the
prediction of students’ performance. Therefore, the
adoption of this learning approach will allow to
47. to be tackled. The proposed method extends the state-of-
the-art of gravitational models by generalizing the definition
of force in its mathematical expressions. Furthermore, the
model was adapted to the ordinal scenario (imposing
the well-known unimodal constraint in the outputs of the
model). The proposed models are easily interpretable, which
make them especially interesting for educational purposes
enabling use by educational practitioners, not just by
researchers. To exhibit the importance of this paradigm
for the EDM community and also the interpretability of
the proposed models, the methods were tested with four
OR EDM datasets. The gravitational ordinal models
achieved a competitive performance especially if they are
compared with state-of-the-art classification models.
Finally, it is worth mentioning that the interpretation of
the model allows us to extract some important conclusions
for educational environments. The main educational
findings of this study are that the two key factors in the
prediction of learners’ satisfaction are the instructor’s
knowledge and the instructor’s coherence with the lesson
plan. The remaining most important variables are strongly
correlated with these ones. From these correlations, we show
the importance of leaving traditional teaching methods to
adopt a teaching method that analyses and appreciates the
students’ knowledge and skills and promotes the interaction
between the main actors in the learning–teaching experience.
Acknowledgements
The research work of F. Fernández-Navarro was partially
supported by the TIN2014-54583-C2-1-R project of the
Spanish Ministry of Economy and Competitiveness
(MINECO), FEDER funds and the P2011- TIC-7508
project of the “Junta de Andalucia” (Spain).
48. Appendix A. EDM techniques implemented nowadays
Currently, EDM techniques have been used to address mainly
the following type of problems (Romero & Ventura, 2007):
(a) Analysis and visualization data: The objective of the
analysis and visualization data is to summarize useful
information in a visual way and to support the
decision-making process. Statistics and visualization
information are the two main techniques used for this
task. Statistics on students’ usage are a powerful tool
to evaluate the impact of an e-learning system. Usage
statistics may be extracted using standard tools
designed to analyse web server logs (Zaïane et al.,
1998). Other general statistics may also represent the
connected student distribution through time or the
most frequently acceded courses (Zorrilla et al., 2005).
(b) Clustering: It is the task of grouping a set of patterns in
such a way that patterns in the same group (called a
cluster) are more similar (in general according to a
distance criteria) to each other than those in the other
groups (clusters). For example, in Tang et al. (2000),
data clustering is used to promote group-based
collaborative learning. They found clusters of students
with similar learning characteristics based on the
sequence and the contents of the pages they visited.
(c) Classification: The main objective of classification is to
identify which of a set of categories (sub-populations)
a new pattern (also called observation or instance)
belongs, on the basis of a training set of data containing
patterns whose category membership is known (Zafra
et al., 2011). An example of this task could be the
classification of the final grade of the students based
49. on features extracted from web-logs, as proposed in
Minaei-Bidgoli and Punch (2003). In this research work,
the dependent variable is estimated as a discrete variable
(the final grade is represented as A, B, C and D). One
problem associated with this approach is that the
ordinal nature of the dependent variable was not taken
into account in the design of the classifier. This can
result in the underperformance of the final classifier.
(d) Regression: The main objective of regression analysis is the
prediction of the value a continuous dependent variable
according to the values of several independent variables.
In classification problems, the dependent variable is
discrete, while in regression analysis, the dependent
variable is continuous. An example of regression analysis
is the prediction of the final grade of certain students. In
this specific problem, the final grade should be represented
as a continuous variable (ranging from 0 to 10).
(e) Outlier detection (or anomaly detection) is the
identification of items, events or patterns that do not
conform to an expected pattern or other items in a
dataset. Typically, the anomalous items will translate
to some kind of problem such as bank fraud or a
structural defect. Anomalies are also referred to as
outliers, novelties, noise, deviations and exceptions.
Ueno (2003) proposes to use the response time data
from e-learning environments as a means of detecting
outliers or irregular learning patterns in learners. The
outlier statistics are developed considering both
students’ abilities and content difficulties.
(f) Association rule learning is a method for discovering
interesting relations between variables in large datasets.
For example, the rule { morning, high flexibility } → {A}
found in e-learning systems would indicate that if the
51. applications and studies were satisfactory.
• Q6: The textbook and other course resources were
sufficient and up to date.
• Q7: The course allowed field work, applications,
laboratory, discussion and other studies.
• Q8: The quizzes, assignments, projects and exams
contributed to helping the learning.
• Q9: I greatly enjoyed the class and was eager to actively
participate during the lectures.
• Q10: My initial expectations about the course were met at
the end of the period or year.
• Q11: The course was relevant and beneficial to my
professional development.
• Q12: The course helped me look at life and the world with
a new perspective.
• Q13: The Instructor’s knowledge was relevant and up to
date.
• Q14: The Instructor came prepared for classes.
• Q15: The Instructor taught in accordance with the
announced lesson plan.
• Q16: The Instructor was committed to the course and was
understandable.
• Q17: The Instructor arrived on time for classes.
• Q18: The Instructor has a smooth and easy to follow
delivery/speech.
52. • Q19: The Instructor made effective use of class hours.
• Q20: The Instructor explained the course and was eager
to be helpful to students.
• Q21: The Instructor demonstrated a positive approach to
students.
• Q22: The Instructor was open and respectful of the views
of students about the course.
• Q23: The Instructor encouraged participation in the
course.
• Q24: The Instructor gave relevant homework assign
ments/projects, and helped/guided students.
• Q25: The Instructor responded to questions about the
course inside and outside of the course.
• Q26: The Instructor’s evaluation system (midterm and final
questions, projects, assignments, etc.) effectively
measured the course objectives.
• Q27: The Instructor provided solutions to exams and
discussed them with students.
• Q28: The Instructor treated all students in a fair and
objective manner.
Appendix C. Glossary of Terms
A list of technical words related to the manuscript is given in
the following.
Accuracy Accuracy is the percentage of patterns
53. correctly classified by the model. It is
also known as the Correct Classification
Rate (CCR).
Educational data
mining
Educational Data Mining is a field of
study where the goal is to develop new
methods for exploring educational data.
Confusion matrix
(or contingence
matrix)
A confusion matrix, also known as a
contingency matrix, is a table that
contains information about actual and
predicted classifications carried out by a
classification model. Each column of the
matrix encompasses the instances in a
predicted class, while each row includes
the instances in an actual class.
Classification In supervised learning, classification is
the problem of determining to which of
a set of categories a new pattern belongs,
on the basis of a training set where the
category to which each pattern belongs
and its characterization are known.
Clustering Clustering is the task of grouping a set of
patterns in such a way that patterns in the
same category are more similar to each
other than to those in other categories.
54. Error term In econometric, the error term is a
variable that represents the differences
among the real data and the predicted
ones. The error term is also known as
the ‘residual’ term.
Mean absolute
error
Mean absolute error is the average
deviation of the prediction from the
actual targets
Distance metric
learning
Distance metric learning is a task where the
goal is to learn a metric for the input data
space from a given set of pair of
similar/dissimilar patterns that preserves
the distance relation among the training set.
Ordinal
regression
The learning task of ordinal regression is
to assign patterns into a set of finite
ordered classes.
Regression In statistics, regression is a task where the
goal is to estimate the relationship among
one or more input variable and a scalar
(continuous) dependent variable.
Softmax function The softmax activation function maps the
range of the data for each class, into the
56. presence on the quality of online critical inquiry, Journal of
Computing in Higher Education, 20, 34–61.
BARBERA, E. and J. LINDER-VAN BERSCHOT (2011)
Systemic
multicultural model for online education: Tracing connections
among learner inputs, instructional processes and outcomes,
Quarterly Review of Distance Education, 12, 167–180.
BHARDWAJ, B.K. and S. PAL (2011) Data mining: a
prediction for
performance improvement using classification, International
Journal of Computer Science and Information Security, 9,
136–140.
BISHOP, C.M. (2007) Pattern Recognition and Machine
Learning, 1st
edn., Springer.
CANO, A., A. ZAFRA and S. VENTURA (2013) Weighted data
gravitation classification for standard and imbalanced data,
Cybernetics, IEEE Transactions on, 43, 1672–1687.
CHANG, C.-C., C.-J. LIN (2001) LIBSVM: a library for support
vector machines. Software available at: http://www.csie.ntu.
edu.tw/~cjlin/libsvm/faq.html (Accessed 25th October 2015).
CHANG, S.-H.H. and R.A. SMITH (2008) Effectiveness of
personal
interaction in a learner- centered paradigm distance education
class based on student satisfaction, Journal of Research on
Technology in Education, 40, 407–426.
CHU, W. and S.S. KEERTHI (2005) New approaches to support
vector ordinal regression, in In ICML ‘05: Proceedings of the
22nd International Conference on Machine Learning, 145–152.
57. CHU, W. and S.S. KEERTHI (2007) Support vector ordinal
regression,
Neural Computation, 19, 792–815.
DA COSTA, J.F.P., H. ALONSO and J.S. CARDOSO (2008)
The
unimodal model for the classification of ordinal data, Neural
Networks, 21, 78–91.
DEMSAR, J. (2006) Statistical comparisons of classifiers over
multiple
data sets, Journal of Machine Learning Research, 7, 1–30.
FERNÁNDEZ-NAVARRO, F., P. GUTIERREZ, C. HERVÁS-
MARTÍNEZ
and X. YAO (2013) Negative correlation ensemble learning for
ordinal regression, IEEE Transactions on Neural Networks and
Learning Systems, 24, 1836–1849.
FERNÁNDEZ-NAVARRO, F., C. HERVÁS-MARTÍNEZ, R.
RUIZ and J.C.
RIQUELME (2012) Evolutionary generalized radial basis
function
neural networks for improving prediction accuracy in gene
classification using feature selection, Applied Soft Computing,
12, 1787–1800.
GARRISON, D.R. (2011) E-learning in the 21st Century: A
Framework
for Research and Practice, Taylor & Francis.
GIBBS, G. and M. COFFEY (2004) The impact of training of
university teachers on their teaching skills, their approach to
teaching and the approach to learning of their students, Active
Learning in Higher Education, 5, 87–100.
58. GÜNDÜZ, N. and E. FOKOUÉ (2013) Data mining and machine
learning techniques for extracting patterns in students’
evaluations
of instructors. Working Paper CQAS-2013-2, Rochester
Institute
of Technology, Center for Quality and Applied Statistics, 98
Lomb
Memorial Drive, Rochester, NY 14623, USA.
GUTIÉRREZ, P., M. PÉREZ-ORTIZ, F. FERNÁNDEZ-
NAVARRO, J.
SÁNCHEZ-MONEDERO and C. HERVÁS-MARTÍNEZ (2012)
An
experimental study of different ordinal regression methods and
measures, in Hybrid Artificial Intelligent Systems. Vol. 7209 of
Lecture Notes in Computer Science, 296–307.
HANSEN, N. and A. OSTERMEIER (2001) Completely
derandomized
self-adaptation in evolution strategies, Evolutionary
Computation,
9, 159–195.
LANDWEHR, N., M. HALL and E. FRANK (2005) Logistic
model
trees, Machine Learning, 59, 161–205.
LIN, C.F., Y.-C. YEH, Y.H. HUNG and R.I. CHANG (2013)
Data
mining for providing a personalized learning path in creativity:
an
application of decision trees, Computers & Education, 68, 199–
210.
59. LIU, X. (2009) Ordinal regression analysis: Fitting the
proportional
odds model using Stata, SAS and SPSS, Journal of Modern
Applied Statistical Methods, 8, 632–645.
MCCULLAGH, P. (1980) Regression models for ordinal data,
Journal
of the Royal Statistical Society: Series B: Methodological, 42,
109–142.
MINAEI-BIDGOLI, B. and W.F. PUNCH (2003) Using genetic
algorithms for data mining optimization in an educational web-
based system. In Genetic and Evolutionary Computation-
GECCO 2003, Springer, 2252–2263.
MIRCHEVSKA, V., M. LUŠTREK and M. GAMS (2014)
Combining
domain knowledge and machine learning for robust fall
detection, Expert Systems, 31, 163–175.
MONJARDET, B. (1997) Concordance between two linear
orders: the
Spearman and Kendall coefficients revisited, Journal of
Classification, 14, 269–295.
MOREIRA, C., P. CALADO and B. MARTINS (2013) Learning
to rank
academic experts in the DBLP dataset, Expert Systems, In
Press,
10.1111/exsy.12062
NA AYALA, A.P. (2014) Educational data mining: a survey and
a
data mining-based analysis of recent works, Expert Systems
with
Applications, 41(4, Part 1), 1432–1462.
60. NEBOT, A., F. CASTRO, A. VELLIDO and F. MUGICA (2006)
Identification of fuzzy models to predict students performance
in an e-learning environment, in The Fifth IASTED
International
Conference on Web-Based Education, WBE, 74–79.
OBERREUTER, G. and J.D. VELASQUEZ (2013) Text mining
applied to
plagiarism detection: the use of words for detecting deviations
in
the writing style, Expert Systems with Applications, 40, 3756–
3763.
PALMER, S.R. and D.M. HOLT (2009) Examining student
satisfaction with wholly online learning, Journal of Computer
Assisted Learning, 25, 101–113.
PENG, L., B. YANG, Y. CHEN and A. ABRAHAM (2009) Data
gravitation based classification, Information Sciences, 179,
809–819.
ROBERTS, J. and R. STYRON JR. (2010) Student satisfaction
and
persistence: factors vital to student retention, Research in
Higher
Education Journal, 6, 1–18.
ROMERO, C. and S. VENTURA (2007) Educational data
mining: a
survey from 1995 to 2005, Expert Systems with Applications,
33,
135–146.
ROMERO, C. and S. VENTURA (2010) Educational data
mining: a
62. SIEMENS, G. and D R.S. BAKER (2012) Learning analytics
and
educational data mining: towards communication and
collaboration, in Proceedings of the 2nd International
Conference
on Learning Analytics and Knowledge. ACM, 252–254.
SUN, P.-C., R.J. TSAI, G. FINGER, Y.-Y. CHEN and D. YEH
(2008)
What drives a successful e-learning? An empirical investigation
of the critical factors influencing learner satisfaction,
Computers
& Education, 50, 1183–1202.
TANG, C., R.W. LAU, Q. LI, H. YIN, T. LI and D. KILIS
(2000)
Personalized courseware construction based on web data
mining.
in Web Information Systems Engineering, 2000. Proceedings of
the First International Conference on. Vol. 2. IEEE, 204–211.
TANNER, C.K. (2009) Effects of school design on student
outcomes,
Journal of Educational Administration, 47, 381–399.
TORRA, V., J. DOMINGO-FERRER, J.M. MATEO-SANZ and
M. NG
(2006) Regression for ordinal variables without underlying
continuous variables, Information Sciences, 176, 465–474.
UENO, M. (2003) On-line statistical outlier detection of
irregular
learning processes for e-learning. in World Conference on
Educational Multimedia, Hypermedia and Telecommunications.
Vol. 2003, 227–234.
63. VAPNIK, V.N. (1999) The Nature of Statistical Learning
Theory,
Springer.
WANG, C. and Y. CHEN (2005) Improving nearest neighbor
classification with simulated gravitational collapse. In Wang,
L.,
K. Chen and Y. Ong (editors), Advances in Natural
Computation.
Vol. 3612 of Lecture Notes in Computer Science, Springer,
Berlin
Heidelberg, 845–854.
WITTEN, I.H. and E. FRANK (2005) data mining: practical
machine
learning tools and techniques. In Data Management Systems,
2nd edn., Morgan Kaufmann (Elsevier).
YAY, M. and E.D. AKINCI (2009) Application of ordinal
logistic
regression and artificial neural networks in a study of student
satistaction, Cypriot Journal of Educational Sciences, 4, 58–69.
YUKSELTURK, E. (2009) Do entry characteristics of online
learners
affect their satisfaction?, International Journal on E-Learning,
8,
263–281.
ZAFRA, A., C. ROMERO and S. VENTURA (2011) Multiple
instance
learning for classifying students in learning management
systems,
Expert Systems with Applications, 38, 15020–15031.
ZAÏANE, O.R., M. XIN and J. HAN (1998) Discovering web
64. access
patterns and trends by applying olap and data mining
technology
on web logs, in Research and Technology Advances in Digital
Libraries, 1998. ADL 98. Proceedings. IEEE International
Forum on. IEEE, 19–29.
ZONG-CHANG, Y. (2008) A vector gravitational force model
for
classification, Pattern Analysis and Applications, 11, 169–177.
ZORRILLA, M.E., E. MENASALVAS, D. MARIN, E. MORA
and J.
SEGOVIA (2005) Web usage mining project for improving web-
based learning sites. In Computer Aided Systems Theory–
EUROCAST 2005, Springer, 205–210.
The authors
Pilar Gómez-Rey
Pilar Gómez-Rey received the MSc degree in Business
Administration from University ETEA, Spain, in 2012 and
the MSc degree in Teaching Economics for Pre-Higher
Education from the International University of La Rioja,
Spain, in 2014. Currently, she is a PhD candidate at the
Open University of Catalonia where she is developing her
thesis through the Doctoral Programme in Education and
ICT (e-learning). Her main research interests include Higher
Education, e-learning, students’ perceptions as well as
quality education.
Francisco Fernández-Navarro
Francisco Fernández-Navarro received the MSc degree in
computer science from the University of Cordoba, Spain,