Spelling suggestions: "subject:"1technology"" "subject:"3dtechnology""
81 |
Applying COBIT in an ERP environment, with specific reference to Qmuzik /Kieviet, Frèda. January 2006 (has links)
Assignment (MRek)--University of Stellenbosch, 2006. / Bibliography. Also available via the Internet.
|
82 |
A comparative analysis of perceptions of technology among doctoral students from selected science, technology, and society (STS) programs in the United StatesWang, Chain-Wen. January 2001 (has links)
Thesis (Ed. D.)--West Virginia University, 2001. / Title from document title page. Document formatted into pages; contains ix, 145 p. : ill. Includes abstract. Includes bibliographical references (p. 125-130).
|
83 |
Influence of technology on adolescent development and spiritual formationMonahan, Kevin Daniel. January 2009 (has links)
Thesis (D.Min.)--Liberty Baptist Theological Seminary, 2009. / Includes bibliographical references.
|
84 |
Heightening Interest in STEM through a Mentoring Project Between Undergraduate and Middle School StudentsLong, Anthony W. 31 July 2012 (has links)
No description available.
|
85 |
Technology Use and Training of Selected High School Principal in the Commonwealth of VirginiaGordon, John B. III 02 May 2012 (has links)
The purpose of this study is to identify the perceptions of selected high school principals regarding their use of technology and technology related professional development. The design of the study is based on the phenomenological study approach in which the lived experiences of a small number of people is investigated (Rossman & Rallis, 2003). This study used a qualitative methodology in which the researcher conducted interviews of nine current high school principals in the Commonwealth of Virginia. Using the qualitative method of interviewing allowed the individuals to completely describe their personal feelings and beliefs towards technology professional development. Personal responses tend to provide increased detail and reasoning for practices and experiences, and provides a way for researchers to understand the meaning of the participant's behavior (Seidman, 2006). Investigating the technology use and the technology related professional development of selected high school principals in the Commonwealth of Virginia provides further insight into the technology needs of current high school principals as well as the technology related professional development that makes their jobs more efficient.
Six findings were identified from this research study, including: (a) participating high school principals use technology on average twenty three to twenty-six hours per week, including the weekends; (b) participating high school principals use technology for administrative uses such as staying in communication with the school community, and analyzing data in order to review student attendance and performance on standardized assessments; (c) participating high school principals use technology for instructional uses such as modeling instructional technology to the faculty and staff and being familiar with the same instructional technology that is being used in the classroom (d) participating high school principals in the Commonwealth of Virginia receive technology related training if it is the same technology that is being used in the classrooms of their respective buildings; (e) participating high school principals feel it was important to participate in some type of technology related professional development; and (f) participating high school principals feel that technology related professional development was necessary in order to have a better understanding of financing technology, learning about hardware and software, and relaying the importance of staying "current" in technology.
This study contains several implications for future educational leaders. The implications are that school and division leaders should recognize the importance of (a) including in the job description the expectation that high school principals use technology; (b) providing professional development for using technology to review instructional data, and maintain contact with the school community; (c) providing professional development for instructional technology so that principals will be considered the instructional technology leaders for their respective buildings; (d) high school principals having knowledge of the instructional technology that is being used within classrooms, and be able to model it for the faculty and school community; (e) high school principals participating in technology related professional development in order to complete their administrative and instructional responsibilities; and (f) developing technology professional development plans that describe the financial responsibility of technology within a school, and provide specific details on the importance of the selection of hardware and software. / Ed. D.
|
86 |
Adoption of HighTrust-High Risk Technologies: The Case of Computer Assisted SurgeryBrewster, Jonathan B. January 2010 (has links)
No description available.
|
87 |
Engaging Prometheus assessing the security/technology nexus in China and Taiwan /Boutin, J. D. Kenneth. January 2000 (has links)
Thesis (Ph. D.)--York University, 2000. Graduate Programme in Political Science. / Typescript. Title on certificate page: Engaging Prometheus : assessing the security/technology nexus in emerging industrial states. Includes bibliographical references (leaves 399-439). Also available on the Internet. MODE OF ACCESS via web browser by entering the following URL: http://wwwlib.umi.com/cr/yorku/fullcit?pNQ67910.
|
88 |
Testing a conceptual model of high technology industrial developmentNewman, Nils Christian 05 1900 (has links)
No description available.
|
89 |
Loop detection and extended target tracking using laser dataGranström, Karl January 2011 (has links)
In the past two decades, robotics and autonomous vehicles have received ever increasing research attention. For an autonomous robot to function fully autonomously alongside humans, it must be able to solve the same tasks as humans do, and it must be able to sense the surrounding environment. Two such tasks are addressed in this thesis, using data from laser range sensors. The first task is recognising that the robot has returned to a previously visited location, a problem called loop closure detection. Loop closure detection is a fundamental part of the simultaneous localisation and mapping problem, which consists of mapping an unknown area and simultaneously localise in the same map. In this thesis, a classification approach is taken to the loop closure detection problem. The laser range data is described in terms of geometrical and statistical properties, called features. Pairs of laser range data from two different locations are compared by using adaptive boosting to construct a classifier that takes as input the computed features. Experiments using real world laser data are used to evaluate the properties of the classifier, and the classifier is shown to compare well to existing solutions. The second task is keeping track of objects that surround the robot, a problem called target tracking. Target tracking is an estimation problem in which data association between the estimates and measurements is of high importance. The data association is complicated by things such as noise and false measurements. In this thesis, extended targets, i.e. targets that potentially generate more than one measurement per time step, are considered. The multiple measurements per time step further complicate the data association. Tracking of extended targets is performed using an implementation of a probability hypothesis density filter, which is evaluated in simulations using the optimal sub-pattern assignment metric. The filter is also used to track humans with real world laser range data, and the experiments show that the filter can handle the so called occlusion problem.
|
90 |
Design and Optimization of Wireless Remote Monitoring and Control System Using the ZigBee ProtocolZhang, Jingcheng January 2011 (has links)
This thesis presents the design and the optimization of a wireless remote monitoring and control system utilizing the ZigBee protocol. From the system architecture point of view, the remote wireless monitoring and control system is mainly combined by 3 parts, the wireless sensor network, the message gateway and the web service. In order to increase the system flexibility and the reconfigurability, each part communicates with each other by using the standard communication protocols. The wireless sensor network of the system can be deployed in many different locations. The network includes the sensor module, the message relay, the control module and the network coordinator. The sensor module calculates the sensor information (e.g., temperature) periodically and sends the message to the network coordinator. If the radio link of the sensor module is not long enough to reach the coordinator, a message relay could be utilized in between to forward the message to the destination. Meanwhile, the message relay can be utilized as a control module as well. For example, when connected with the air conditioning system (radiator or ventilation), the control device can generate control signal to adjust the temperature and the relative humidity. The network coordinator is the root of the network. When the network coordinator receives the sensor information from the sensor module, it forwards the message to the connected gateway. On the other hand, the coordinator also receives the control command from the gateway. When the control command is received, the network coordinator forwards the control command to the corresponding control device of the wireless sensor network to execute the command. Generally speaking, it is the wireless sensor network part provides the sensor information and executes the control commands in the system. The gateway works as a translator and synchronizer between the wireless sensor network and the web service. It communicates with the wireless sensor network via the connection of the network coordinator. When receiving the sensor information from the wireless sensor network, the gateway forwards the message to the web service through the Internet. On the other hand, the gateway also receives control commands from the web service. When the gateway receives the control command from the web service, it forwards the command to the network coordinator of the wireless sensor network. Moreover, the gateway also works as a local monitoring and control agent. The gateway can be utilized to monitor and control the local sensor network without login to the web service. During the network deployment, the gateway needs to be equipped for each wireless sensor network. Different gateways can communicate with the web service via the Internet at the same time. The web service contains the sensor information uploaded from different locations. When the control command is received from the user configuration, the web service forwards the control command to the correct local server. From the user point of view, the web service is a website which can be accessed by a normal web browser. Users can register the website to apply for monitoring and control privilege. The monitoring function provides the graphical presentation of the sensor information from different locations. The control function of the system includes the ON/OFF control, temperature control and humidity control. In order to increase the system reliability, extra optimizations are developed in different parts of the system. In the wireless sensor network, the power consumption of the battery powered sensor module is optimized. A method is discovered to manage the network topology and the message forwarding pattern. Moreover, an alternative routing algorithm is designed which could be utilized by the coordinator to communicated with the sensor network. This method is verified to be much more efficient than the original algorithm utilized by the sensor network. Finally, a general purpose communication reliability enhancement framework is developed for the wireless sensor network. It helps the wireless sensor network to handle the exceptions without interference to the sensor network applications. In the gateway part, the Internet connection status is checked all the time. When the Internet connection is broken, sensor messages sent from the coordinators are buffered in the gateway to avoid the message lost. Finally, the remote monitoring and control system has received a nomination for the Swedish Embedded Award 2010 and been demonstrated at the Scandinavia Embedded Conference 2010 in Stockholm.
|
Page generated in 0.0892 seconds